scholarly journals Characteristics and Applications of the New High Level Architecture-HLA to Parallel or Distributed Simulation and Control of Aerospace Vehicles

Author(s):  
Gilberto Trivelato ◽  
Marcelo Souza
Author(s):  
Fouzia Ounnar ◽  
Patrick Pujo ◽  
Selma Limam Mansar

Contrary to actual logistics networks in which chains are frozen, in the proposed partnership network, a dynamic chain is only built each time an order is requested; nothing is planned ahead of time. An isoarchic control model based on the holonic paradigm is proposed. The control of the partnership network can be seen through a simultaneous analysis of the holon views. The proposed control is based on a multicriteria analysis method by complete aggregation (Analytic Hierarchy Process (AHP)). The assignment of orders is based on the search for the best response to a Call For Proposals submitted by a customer. The solution that appears to be the most efficient in terms of the evaluation criteria will be adopted. For validation purposes, a simulation of the proposed approach was implemented using a distributed simulation environment HLA (High Level Architecture). A set of realistic tests were used to evaluate the proposed approach.


Information ◽  
2020 ◽  
Vol 11 (10) ◽  
pp. 469
Author(s):  
Mario Marin ◽  
Gene Lee ◽  
Jaeho Kim

Multiple resolution modeling (MRM) is the future of distributed simulation. This article describes different definitions and notions related to MRM. MRM is a relatively new research area, and there is a demand for simulator integration from a modeling complexity point of view. This article also analyzes a taxonomy based on the experience of the researchers in detail. Finally, an example that uses the high-level architecture (HLA) is explained to illustrate the above definitions and, in particular, to look at the problems that are common to these distributed simulation configurations. The steps required to build an MRM distributed simulation system are introduced. The conclusions describe the lessons learned for this unique form of distributed simulation.


Author(s):  
Tom van den Berg ◽  
Barry Siegel ◽  
Anthony Cramp

NATO and the nations use distributed simulation environments for various purposes, such as training, mission rehearsal, and decision support in acquisition processes. Consequently, modeling and simulation (M&S) has become a critical technology for the coalition and its nations. Achieving interoperability between participating simulation systems and ensuring credibility of results currently often requires enormous effort with regards to time, personnel, and budget. Recent technical developments in the area of cloud computing technology and service oriented architecture (SOA) may offer opportunities to better utilize M&S capabilities in order to satisfy NATO critical needs. A new concept that includes service orientation and the provision of M&S applications via the as-a-service model of cloud computing may enable composable simulation environments that can be deployed rapidly and on-demand. This new concept is known as M&S as a Service (MSaaS). There has also been the recent emergence of containerization as an alternative to virtualization. Containerization is the process of creating, packaging, distributing, deploying, and executing applications in a lightweight and standardized process execution environment known as a container. Because containers are, in principle, lightweight, they are suitable to serve as the vehicle for the provision of packaged (micro)services. Service orientation is an approach to the design of heterogeneous, distributed systems in which solution logic is structured in the form of interoperating services. This paper investigates various aspects of service orientation and containerization including simulation composition, networking, discovery, scalability, and overall performance. This investigation provides background information on the topics of service orientation, containerization, and Docker – a technology ecosystem for working with containers. A case study is presented for the use of Docker in support of a training simulation based on the high level architecture (HLA). The HLA is an IEEE standard architecture for distributed simulation environments that was originally developed for defense applications. The case study introduces a number of training use cases, and shows how Docker can be used to assist in their implementation. The performance impact of running a simulation within container technology is also investigated. The application of container technology to HLA-based simulations as presented in this paper is novel. The motivation for looking at this topic stems from the activity being conducted within NATO MSG-136.


Author(s):  
Weiliang Zhao ◽  
Jian Yang

Existing identity metasystems provide enabling tools to manage, select, and control of digital identities but they have not provided the support of trust management that should cover how trust requirements associated with digital identities are modeled, how runtime conditions for trust are evaluated, and how the results of trust evaluation are consumed by systems/applications. In this paper, the authors propose an approach toward a trust management enabled identity metasystem that covers the analysis of trust requirements and the development of trust management system in a consistent manner. The proposed trust management architecture extends the existing identity metasystems by introducing computing components for carrying out typical trust management tasks associated with digital identities. The computing components in proposed architecture provide intelligent services for these tasks. The proposed high level architecture targets the automation of the development of the trust management layer for digital identities.


Author(s):  
Weiliang Zhao ◽  
Jian Yang

Existing identity metasystems provide enabling tools to manage, select, and control of digital identities but they have not provided the support of trust management that should cover how trust requirements associated with digital identities are modeled, how runtime conditions for trust are evaluated, and how the results of trust evaluation are consumed by systems/applications. In this paper, the authors propose an approach toward a trust management enabled identity metasystem that covers the analysis of trust requirements and the development of trust management system in a consistent manner. The proposed trust management architecture extends the existing identity metasystems by introducing computing components for carrying out typical trust management tasks associated with digital identities. The computing components in proposed architecture provide intelligent services for these tasks. The proposed high level architecture targets the automation of the development of the trust management layer for digital identities.


Sign in / Sign up

Export Citation Format

Share Document