Figure 3 - uploaded by Robert Siegfried
Content may be subject to copyright.
Behavior of the Engagement-Agent (depicted as sensor-effectorchains)

Behavior of the Engagement-Agent (depicted as sensor-effectorchains)

Source publication
Conference Paper
Full-text available
This paper presents an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern war fighting approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose high requirements on the coordination of all involved parties. Following the Gene...

Context in source publication

Context 1
... all this is not possible or this agent is on top of the hierarchy, he puts the request in a queue and checks the feasibility again later. 4) Engagement unit: Figure 3 illustrates the behavior of the Engagement-Agent. The Engagement-Agent waits at his starting point until he is ordered to fight a target. ...

Similar publications

Article
Full-text available
Simulation can be used for several purposes; at the beginning of the article, they are outlined to appreciate the rich possibilities it offers. A systematic glossary of about twenty types of intelligence provides a synoptic background for intelligent behavior that can be represented by agents. Three categories of the synergy of simulation and softw...
Article
Full-text available
Process manufacturing industries are complex and dynamic systems composed of several processes, subject to many operations and unexpected events that can compromise overall system performance. Therefore, the use of technologies and methods that can transform traditional process industries into smart factories is necessary. In this paper, a smart in...
Conference Paper
Full-text available
Explores the role of gaze in coordinating turn-taking in mixed-initiative conversation, and specifically how gaze indicators might be usefully modeled in computational dialogue systems. We analyzed about 20 minutes of videotape of eight dialogues by four pairs of subjects performing a simple face-to-face cooperative laboratory task. We extend previ...
Article
Full-text available
This is a progress report on the Computer Science input to the AIMSS project (Adaptive Intel-ligent Model-Building for the Social Sciences). The work involves the building of an exploratory prototype to apply the paradigm of "Dynamic Data-Driven Application simulation" (DDDAS) to a housing case study in the Public Policy domain. The prototype is co...
Conference Paper
Full-text available
Structural monitoring is a distributed engineering task, frequently using visual methods or investigating local properties of a structure. However, with respect to tighter economic limits, it is becoming evident that in the next few years a paradigm shift is required from manually based to actively computer-controlled monitoring; appropriate automa...

Citations

... Fidanci's work required around three months, while using several machines, to complete all simulations. Gerstner et al. (2010) partially used cares' vision of the IACM as a basis for a model they developed for joint fire support systems. Their model had target, reconnaissance, command and control, and engagement units. ...
Article
Network centric operations (NCO) has been dubbed the most significant revolution in military affairs (RMA) in the past 200 years. The promise of NCO is based on the notion that information sharing and connectivity is fundamental to the effectiveness of a combat force. This is due to the ability of a properly networked force to self-synchronise itself as it engages enemy forces. The information age combat model (IACM) is a popular representation of NCO. Previous research at modelling the IACM has so far focused solely at using agent-based modelling. That work produced significant contributions to the IACM literature. However, it has proven to be computationally expensive. IACM simulations must be sustainable as research into IACM evolves and more NCO complexities are introduced. This research will propose a discrete-event simulation (DES) approach to model the IACM. The paper will present the basis upon which DES was selected for this purpose and will illustrate how the DES approach can provide significant improvements in terms of the time and computational power needed to run IACM simulations.
... Despite the hierarchical design of the response plans, it has been observed that organizations follow a " net-centric approach " when it comes to the actual response to a disaster (Gerstner, Siegfried, Kratzke, 2010; Boersma, et. al, 2014). ...
Conference Paper
Full-text available
Crisis management frameworks are typically associated with concepts related to command and control or " hierarchical " decision-making. However, advancements in communication technologies and new media platforms have brought new prospects to the design of crisis management frameworks. Social media platforms, for example, enable volunteering citizens to actively take part in crisis response efforts. In our paper we explore comparing and contrasting two forms of crisis management frameworks: a formal, the well-tested Incident Command System of the US, and an informal example, the Community Emergency Response Teams (CERT) program. The goal of the paper is to outline potential ways to examine the disparities in network structure and collaboration linkages in different forms of crisis management frameworks.
Article
Wireless Body Area Networks (WBANs) are a growing field of research; the challenges and applications have been explored and resolved by many researchers. The benefits of mobile communication based WBANs is using cellular communication as communication methodologies in the WBANs. Especially in emergency systems like medicare and military system, WBANs can be described as ease of provision, maintenance and management. In this paper, a Search Knight (SK) algorithm is proposed which is Outlier Analysis based technique. The SK algorithm is proposed for identifying unknown nodes (terrorist) in the border line using WBANs. The geographical location of the each node position is identified and tabulated on each time unit. The difference on neighbourhood time period is calculated and the proposed SK algorithm is applied to the location and movements. To detect the terrorist intrusion in the military system, the proposed SK algorithm is proved its capability and relaibility.