Академический Документы
Профессиональный Документы
Культура Документы
SYSTEM
CHAPTER 1
INTRODUCTION
1.1 Project Description
The development in Information Technology has helped us to use Modelling and
Simulation in providing a development for the nation to check the weapons.By using the
actual firing units, radar control, positioning and missile control it provides live defence
training to the soldiers at the provided place.The simulation is divided into some
operations such as detecting the enemy, classifying the objects detected and to destroy
them.The Implementation of the simulation of air defense system encompass totally
different methodologies which incorporates applied mathematics, Mathematical ways,
Numerical based mostly simulation.The aim of the Air defence software package
framework is to provide similar functionalities used by every defense system. Air defense
application framework consists of modules such as middleware which helps in the
network and communication among the sub modules and the model helps in simulation.
1.1.1 Background Work
Technology is a new way in which u can communicate or learn something new .
It is like ocean of knowledge there are many things to know from technology and many
things that we can develop[1]. As their is growth in the software technology field many
innovative and creative products have been launched such as robots,unmanned aireal
vehicle etc. Modelling and simulation is one such method in software technology which
helps us in reducing the manual work by making the job easier and faster[3].Modelling
and simulation can be implemented to test a weapon or give live traning of weapons to
the soliders[3].
1. Radar Controlling
Radar Should detect the invading air craft, the radar works by sending a radio
waves which travel at the same speed of light waves. But the radar waves are lower in
frequencies and longer when compared to light waves. When the radar starts some inputs
such as frequency,amplitude are set and the range at which it should be searched is
specified,then if any suspicious objects are found it will send a message threat detected.
2. Positioning
Current position of the aircraft is be found with respect to the Ground Based Control
System with its Velocity , the mode of the Aircraft and its Altitude from the Ground is
found.The positioning of the aircraft will help to launch a missile to destroy it.
3. Fire Controlling
These radars continuously provide data of the position of single target. Most
tracking radar system used by the military are also fire-control radar.
I2soft was founded in 2008,it is operating based on some belief and value.
They believe their values ,belifes have helped them to gain success in the information
technology field.It is one of the finest software developing company in Bangladesh,it
provides its services to corperate companies as well as individual.I2soft is one among the
i2Soft Technology a leading company offers the clients a best line of services and
software.Their products and services provide the customer a efficient product,application
or services[5].
The Company always works to give the best and most innovative products and
services to the clients they also maintain a good working environment which help the
staff and interns to do their job well without any work pressure.The company works on
wide variety of projects and gives the interns nice opportunity to learn new programming
languages.
i2soft is providing all the enterprise and tools required for the customers which
make their jobs easier and faster [6].
The Company Provide Various Solutions and Services They are
Services and Technologies are:
Development of application.
Application based on web and windows
Quality Check and Testing of application
Maintenance and support
The dissertation report has been organized into nine chapters in total. Each chapter
consists of the following:
. Chapter 2: Literature
This chapter discusses the issues with the existing system and the challenges involved.
The feasibility study is included along with the tools and technologies used to solve the
problem in the project.
Chapter 6: Implementation
This chapter contains sample code and resulting screenshots of the project with
description and explanation with respect to the user context.
Chapter 8: Conclusion
Concluding remarks about the project, issues that were resolved successfully and the
results are discussed here.
Future enhancements discuss a few key areas of the project that could be enhanced in the
future.
CHAPTER 2
LITERATURE SURVEY
then the further work must be stopped. Otherwise the extra time, cost and manpower are
wasted[4].
Economic Feasibility
The developed system is said to be low cost when compared to the existing
system, which uses the radar which is developed and released by the Nav-tech company
which gives support to the application to be developed accordingly to its properties with
low cost and high efficiency.This project uses technologies like Vb.net,Css3,Html and
JavaScript which is easily available and makes it easy to use.
Behavioral Feasibility
The developed system is coded in such a way that it responds to all the
emergency changes in the simulation so that it responds immediately to the parameters
entered and avoids collision while destroying an aircraft. Which will be helpful in
protecting from the crashing.
Technical Feasibility
The system is developed using the best resulting network algorithm so that it
satisfies all the requirements of the system to perform in any kind to environments.
Tools
The tools used in the development of the project were as follows -
2.4.1 Platform - .NET Framework
The .NET Framework provides an environment where we can develop all web
based and windows based program.It constist of two segments one is the Common
Language runtime which handles the execution and also the applications running[10].
The .NET Framework is an oversaw execution environment that gives an assortment of
administrations to its running applications..NET Framework has class library that
provides reuable code for there applications[11].
Technical Features of .NET Framework:The .NET Framework is a totally
new model for building frameworks on the Windows group of working
a compile target for source-to-source compilers from both element dialects and static
dialects[22].
2.4.4 Simulation and Modeling
A Simulation and Modelling is creating a virtual scenario without any real time
risk[23].This project is mainly based on simulation and modeling of air defence system in
a software framework.It help the user to enact to a situation ,understand the situation
better and can be easily implemented[24] .
Operating System
Windows
Processor APU Dual Core E1-6010 or Above
RAM 2 GB
Speed of 2Ghz
2.5.2 Software Requirements:The software which is used must be the latest version.
The product which is developed used the latest technologies. Some of the technologies
are listed below,
Web Technologies
HTML5
CSS3
JavaScript
DataBase
MySQL
Framework
Visual studio framework
CHAPTER 3:
3.1 Users
User is a person who access the application there are two users in this system one
admin and the other trainee
1) Admin
Admin will give authorization for the user to access .The admin will create a
login and password for each user and assign it to them .
2)Trainee/User
The trainee would be given a user id and password to login to the application and
perform the simulation
3.1.1 User Characteristics
1)The user should have minimum knowledge of how to use the software framework.
2)The user should know to give the parameter values of the radar,missile
The defense has given certain constraints for the user to maintain some security and
secrecy as information related to army it highly confidencial
1)The user cannot share his user id and password he has make it a point it is not
disclosed anywhere.
2)The user cannot share the details of weapons or trainng details to others.
The functional requirements for the project contains various module that need to work
in synchronous fashion to achive desired objective
The user is provided with a login by the admin after which he can login to simulation
environment where he can perform the testing of weapons and also learn how to use the
weapons and also perform simulation of the war.
Admin
Module 1: Login
Introduction
The Login facilitate end users to login to the system. Then only they will
get the access to the application.
Input
User name and the password
Processing
Validate the name and also validate the password.
Output
If both the user name and passwords are valid then the login will be successful
else unsuccessful.
Processing
Processing the distance between the provided check points.
Output
Introduction
The Position of the flight has to be determined with respect to the Ground
Control Station, velocity in which the aircraft is flying and its Altitude from the
ground has to be determined.
Input
Processing
Output
Introduction
The radar sends information if the air craft detected is enemy aircraft immediately
the missile would be launched
Input
Processing
Output
User Interface
Since the application being an complete user interaction based application special
care is taken in order to make the user feel convenient with the usage of the application.
User interface takes place through the keyboard to give values and also mouse to
specify the location.
1. The application should be able to provide trajectory route over maximum 1000
meters in a rectangular area.
2. The application should allow the aircraft to reach 300 meters maximum height.
The project should follow the industry coding and documentation standards ISO
9001. The generated output should be accurate and live information and verified
manually.
The Application needs approximate 2GB of RAM during its execution. Otherwise
there is a chance that the performance may break due to out of time.
Availability: the application should be available for usage to the user at every
point of time, irrespective of the location where the application is being used.
Usability: the application should be user friendly that is it should hold light
weight user interface.
Security: the application should be safe and secure such that there is no harm to
the users account by any means.
CHAPTER 4
SYSTEM DESIGN
The wide growth of technology in every walk of life has a great scope for the new
applications where the simulation and modelling can be used in all the fields to make the
things possible which turns impossible for the humans to do. Now a days military fields
have a wide variety use of these aerial vehicles where to detect the illegal use of the land
resources and to click the images of the war fields and a wide variety of applications even
in agriculture fields. But the systems which are existing are of more cost and with low
efficiency because they are remotely control and also handled by the humans.
Since there are no systems which can give guidelines of operating a weapon ,
where we do not have the problem of testing it for any number of times unlike in real time
. This is taken as motivation to develop the project which overcomes all these drawbacks.
Most existing systems lack in the correct functioning of the system in any critical
situations where emergency situations occur which includes firefighting and
environmental changes and natural calamities where the system fails to take a correct
decision to avoid the crash. The system lacks in the implementation of the data
acquisition technique and also collision avoidance technique which plays a major role in
the system and positioning systems with lots of scope.
The Figure 4.1 Shows the architecture of the entire application of the a framework for
real-time simulation environment of air defence system
Module Specification
Module 1 : Radar Module
The admin provides the user with a valid login id and password to enter into the
application.The user then login to the application to perform various operations. This
module helps the user to detect for any suspicious objects found in the specified area.
1)Object tracking for which some data is inputted from which we can track any object
entering into the restricted boundaries
2)Object detection is to display the image of the captured object found to take further
actions.
The user enter this module after he searches for object in radar and if the objects are
detected then he finds the postion of the aircraft by passing some parameters.
1)Find the position by entering the parameters such as longitude,latitude,speed and range.
2)Send a message wehen the object is detected to take future actions such as to launch a
missile.
After the Object is found It sends a alert message to the module as threat detected destroy
it immediately after which quick actions are taken to destroy it
1)The user will enter parameters such as speed,direction at which missile should be
launched.
2)It destroy the invading aircraft after which the mission or task is completed .
The Figure 4.2 Shows the flow of the application and the components in involved.It
shows the workin flow of the application framework first the radar is operated then the
position is found at last missile is launched and destroyed the invading aircraft.
CHAPTER 5
Use case diagram various users associated with system . Use case diagrams
generally identify the performers related with the system and their functions that
are related to the working of the system.
5.1 Use case use case are used to identify the usage of the actors and use - cases in the
System.
Figure 5.1 Use-Case Diagram of a framework for air defense system shows the scenario
where user logins to the simulation environment
5.2 Sequence Diagram :A sequence diagram show the interaction between two
objects.
Figure 5.2 shows the sequence of starting radar and finding the invading aircraft and
destroying it.
5.3 Activity Diagram :A activity diagram show the activity flow in application
Figure 5.3 shows the activity flow in the simulation of air defence framework.the user
logs into the system after which he enters into the simulation environment and performs
other actions such as initializing radar,finding the position and destroying.
5.4Class Diagram
Figure 5.4 shows the class diagram in the simulation of air defence framework
5.5 Data Flow Diagram:A data flow is a graphical representations of the flow of
data. It is used to create the overview of the System.
0
User login simulation Perform
Simulation
User Simulation
of air
defence
system
Admin
User details
postition
3
send a message to launch
Postistioning
missile
Missile
Launch
CHAPTER 6
IMPLEMENTATION
6.1 SCREEN SHOTS
Figure 6.1(a) shows the home page of the a framework for real-time distributed
simulation of air defence system system along with the different menu options login,
radar,missile launch and postioning modules.
Figure 6.3 shows parameters where the user has to enter to detect a object also track the
object.
Figure 6.4 shows alert message of launching a missile immediately after the threat is
detected.
Figure 6.5 shows parameters where the user has to enter to track the postion of an aircraft.
Figure 6.6 shows missile to be launched message after the threat is detected.
Figure 6.6 shows the object found message along with the detected aircraft then it alerts
the user to send a message to launch a missile.
Figure 6.7 shows parameters to be entered by user to launch a missile after which missile
will be launch to destroy a invading aircraft.
Figure 6.8 shows parameters where the user has to enter to track the position of an
aircraft.
6.2 Detailed design
In the development of this project, object oriented modelling approach has been
followed as it allows the software developers to measure the performance.
Chapter 7
SOFTWARE TESTING
This chapter involves the different testing techniques carried out on the product. It
also depicts the screen shots of the tested application along with the different possible test
cases in it.
The software development cycle does not restrict to software development but
also includes testing portion too, in order to ensure the standards of the work. Software
Testing is one of the significant parts of any software development. Basically the testing
is carried out by a team of testers the results and actions are recorded in a test document
which will be kept for future reference. While performing the testing in case if any hug
bugs are found then the product is sent back to the development team to rectify the same
and rebuilt. The test cases are performed in multiple ways just to ensure the developed
product is bug free and works according to user requirements [37].
Test plan – It is a document which showcases the details like reason for testing, scope of
testing, risks involved, environment, timeframes, objective of testing and incharge person
of testing team along with scheduled time and date [38].
Test case – It generally shows the details of product to be tested such as test case id,
summary, procedure, inputs used and outputs generated [39].
Automation testing and Manual testing are the two major techniques used in software
testing in today’s work culture. Manual testing is done without using any testing tools
while automation testing is done with some automated testing tools using test scripts.
Cost involved in manual testing is comparatively less to the automated testing techniques.
And time consumption in automation testing is less compared to manual testing due to the
usage of automated testing tools [40].
7.1 Unit testing
Unit testing is defined as preparation to perform testing on units of implemented
code. IT clearly helps is identifying the faults in the logic associated or algorithms in
individual units [41]. Once unit testing is done then the function is said to be error free or
else the function part has to be recorded and tested again and again. Stubs and Drivers are
most associated part of unit testing, where drivers basically works on calling unit and
stubs works on called units. They both allows the reuse of functions so that the constant
changes in the application can be tested repeatedly without incorporating complex coding
lines in test code [42].
Tc_H104 Appropriate Click on button On click of Redirect Pass
control to
same page
in same
page
The figure 7.1 describes the connectivity between the forms, how each and every forms in
the system are interconnected with other and they are tested so that the connections are
appropriate and no forms are left without connectivity.
Upon exit
Exit
from simulation Appropriate
Edge back to Redirect back to application
radar control student phase redirection
page with a alert
Tc_MI04 towards the Pass
from simulation indication
Home page
user about
application
their action
CHAPTER 8
Conclusion
The application developed, is course work carried out for a span of six months which is
consists of five stages: collecting information, gathering requirements, development,
testing and implementation.
The development system has user friendly interface where user will feel very
comfortable to work on the system, with enhanced security feature to enable
communication between various entities coexist in the system. Since the application
provides the user instructions, user feel very comfortable to handle the system without
any deep knowledge about the application. It also enables interaction between the users is
very fast and accurate and each interaction is being noted and saved in database for future
usage.
The proposed system would help to work on simulation framework and provides
virtual environment and keeps track of the parameters such as velocity, height and
position along with the postioning of aircraft. In addition, it provides Collision
Avoidance. The expected efficiency of the proposed project is of 70-80%.
CHAPTER 9
Future Enhancement
The application developed, meets the basic requirement of air defence department,
but due to time constraint some of the major features that adds glories to the system are
left unimplemented.Upon extension of time one can include or add many features which
enhance the application and makes it more user interactive.The application can be utilized
to include simulation of different type weapons such as land to air missile,land to land
missile or surface to water.And also the enhancement of the project can include by giving
the user alert message or navigations message to guide them the procedure to access the
system simultaneously.
The enhancement of the application can work on the front end design. And include the
details of each and every weapons used in the military and give the working details of
each weapon and how to use it and also train them by giving live demo.It can include
Threat detecting alarm which rings as soon as it notices some suspicious object in the
restricted area
References
[1] Hco G.B.”The Application of the Modelling and simulation”China ,C1-C13 2004.
[2] Miang B.G “The Development phase Cehlmae-I System Simulations for Testing and
Evaluation based on M&S”In Proceeding of the 2nd conference on the Modelling and
Simulation of the weapons France C1-C6 2007.
[4] KIIM D. L”A Design and Implementations Of Framework for Developing High
Level Architecture for a system”Journal of Korea Information Society of
science:Comuting Practices VOL. 8-E NO.07,2237-4411.2001.
[7] T. G. Kim al,”DEVS Framework and Toolkit for Simulation using HLA.”In
Proceeding Asia Simulation Conference/5th International Conference on Scientific
Computational methods and Simulation,16-22.2006.
[11] Chai P.Y “Measurement and Analysis of Performance In the Distributed Real-Time
KMASAS Simulation.”Journal of China Information and security,Computing,VOL 17
NO.3,150-167.2003.
[17]Yuvliano A. K. and Capt. Zuan “Simulation the Changing view for Air Defence
Operations”
[18]Murthy R. S. “Navy Threat Wide Hardware in the Loop End to End Simulation Using
HLA based Standard Missile-4.”Workshop2000
[20] Alvenrez and Vanqueron, F “Using the Permutation Test in Signal Processiong to test
Radar ,“EISP Proceeding,Vol 4128, Advanced Signal Processing Implementation
and testing .
[22]Vyas, D., Wombwell, E.,Russell, E., & Caligiuri, F. (2010). High-fidelity patient
simulationseries to supplement introductory pharmacy practice experiences. Am J
Pharm Educ, 74(9), 169.
[24] Knight P. et al. ″WBT RTI Independent Benchmark Tests: Design, Implementation,
and Updates Results.″ Simulation Interoperability Workshop, 2002.
[27] Denver Colorado, August 1996, pp. 134-140. Amori, R., “An Adversarial Plan
Recognition System for Multi-Agent Airborne Threats,” Symposium on Applied
Computing, 1992.
[28]Barcio, B., Ramaswamy, S., MacFadzean, R., & Barber, K., "Object-Oriented
Analysis, Modeling, and Simulation of a Notional Air Defense System," IEEE
International Conference on Systems for the 21st Century, Vancouver, BC, Canada,
Vol. 5, October 1995, pp. 22-25.
[29] Bloeman, A., & Witberg, R., "Anti-Air Warfare Research for Naval Forces," Naval
Forces, Vol. 21, No. 5, 2000, pp. 20-24. Burr, R., Palinkas, L., and Banta, G.,
"Psychological Effects of Sustained Shipboard Operations on U.S. Navy
Personnel," Current Psychology: Developmental, Learning, Personality, Social, Vol.
12, 1993, pp.
[30]. United States Marine Corps. Initial capabilities document for United States Marine
Corps expeditionary energy, wa- ter and waste. Report, US Marine Corps, August
2011.
[31] Army Senior Energy Council and Office of the Deputy As- sistant Secretary of the
Army for Energy and Partnerships. Army energy security implementation strategy.
Report, Washington, DC, January 2009.
[32]. Khodr HM, et al. Optimal methodology for renewable en- ergy dispatching in
islanded operation. In: 2010 IEEE PES transmission and distribution conference
and exposition, 19–22 April 2010, pp.1–7.
[33]. Bansal M, Saini RP, Khatod DK. An off-grid hybrid sys- tem scheduling for a
remote area. In: 2012 IEEE Students’ Conference on Electrical, Electronics and
Computer Science (SCEECS), 1–2 March 2012, pp.1–4.
[34]. Chedid R, Karaki S, Rifai, A. A multi-objective design meth- odology for hybrid
renewable energy systems. In: 2005 IEEE Russia Power Tech, 27–30 June 2005,
pp.1–6.
[35]. Taylor J and Love B. Proof-of-concept for a green energy linear program for
optimizing deployments. In the Pro- ceedings of Defense and Military Modeling
and Simulation Symposium (DMMS), 2012 Autumn Simulation Multicon- ference,
San Diego, CA, October 28–31, 2012
[36]. Cramer MA, Beach JE, Mazzuchi TA and Sarkani S. Understanding information
uncertainty within the context of a net-centric data model: a mine warfare example.
Int C2 J 2009; 3: 1–55.
[37]. Manclark J. Air Force test and evaluation presentation. U.S. Air Force T&E Days.
Albuquerque, NM, February 2009.
[39] McGraw RM and MacDonald RA. Abstract modeling for engineering and
engagement level simulations. In: Procee- dings of the 2000 Winter Simulation
Conference, Orlando, FL, 2000, pp.326–334.
[40]. Zeigler BP, Praehofer H and Kim TG. Theory of modeling and simulation. 2nd ed.
Orlando, FL: Academic Press, 2000.
[41]. Committee on Technology for Future Naval Forces, National Research Council.
Creating and improving intellectual and technological infrastructure for M&S.
Technology for the United States Navy Corps, 2000-2035: becoming a 21st-
century force: volume 9: modeling and simulation. National Academy of Sciences,
Washington, D.C. USA 1997, Chapter 6, pp.70–90.
[41]. Department of the Navy (US). Naval command and control. Naval doctrine
publication 6. Norfolk, VA: Naval Doctrine Command, 1995.
[42]. Carley KM and Lin Z. Organizational designs suited to high performance under
stress. IEEE Trans Syst Man Cybern 1995; 25: 221–230. 12. Liebhaber MJ and
Smith CAP. Naval air defense threat assessment: cognitive factors and model. In:
Command and Control Research and Technology Symposium, Monterey, CA: June
2000.