Skip to main content

Computer Models of Sensor and Weapon Systems: Assessing Model Utility Early in War-Game Development

  • Conference paper
  • 2028 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8906))

Abstract

All models are wrong, but some are useful” as the statistician George Box famously remarked (1979). Indeed, all computer models entail approximations that make them quantitatively “wrong” to some degree. Yet some models can be useful, likewise to a degree, for some applications but not for all. This holds when computer models of sensor or weapon systems are used to simulate actual system performance during the action of the game. In war gaming (broadly defined here as any application relying on models of sensor & weapon systems), a model is useful insofar as it supports the outcomes of the gaming, which may be education, training, tactical evaluation, force optimization, concept development, and so forth. To prove that a model suffices for given objectives is difficult, costly, and usually inconclusive. An alternate method for evaluating model adequacy early in a project in light of gaming objectives is described here. The method is based on well-known principles of hypothesis testing. It is therefore 1) objective and evidence based; 2) applicable to a wide range of computer models and gaming objectives; 3) requires moderate technical expertise, without requiring war-game developers to venture into the specialization of model developers. The method provides a framework for soliciting and evaluating the available evidence for model adequacy in light of gaming objectives, when allocating resources and exploring modeling options and suitability, early in a project.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Box, G.E.P.: Robustness in the strategy of scientific model building. In: Launer, R.L., Wilkinson, G.N. (eds.) Robustness in Statistics. Academic Press, New York (1979)

    Google Scholar 

  2. Kessel, R.T.: How ground-truth data can quietly stall your modelling & simulation programme, Technical Note TN-001-08Mar14 (2014)

    Google Scholar 

  3. Carson, J.S.: Model Verification & Validation. In: Yücesan, E., Chen, C.-H., Snowdon, J.L., Charnes, J.M. (eds.) Proceedings of the 2002 Winter Simulation Conference (2002)

    Google Scholar 

  4. Sargent, R.G.: Verification and Validation of Simulation Models. In: Jain, S., Creasey, R.R., Himmelspach, J., White, K.P., Fu, M. (eds.) Proceedings of the 2011 Winter Simulation Conference (2011)

    Google Scholar 

  5. Kessel, R.T.: Probabilistic versus Physical Models of Sensor and Weapon Systems, Technical Note TN-002-08Mar14 (2014)

    Google Scholar 

  6. Kessel, R.T.: Harbour Protection Table-Top Exercise (HPT2E): Final Report, CMRE-FR-2013 (February 2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Kessel, R.T. (2014). Computer Models of Sensor and Weapon Systems: Assessing Model Utility Early in War-Game Development. In: Hodicky, J. (eds) Modelling and Simulation for Autonomous Systems. MESAS 2014. Lecture Notes in Computer Science, vol 8906. Springer, Cham. https://doi.org/10.1007/978-3-319-13823-7_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13823-7_26

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13822-0

  • Online ISBN: 978-3-319-13823-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics