DOD lauds smart simulation and modeling efforts

DOD lauds smart simulation and modeling efforts

The Defense Department next month will honor four programs for excellence in modeling and simulation.

DOD, which chose the winners from 68 nominees, will present the awards at an Oct. 15 Pentagon ceremony.

Ronald Sega, director of Defense research and engineering and chairman of the DOD Executive Council, will hand out the honors in four categories:

  • Acquisition: The Simulation and Analysis Facility Joint Unmanned Combat Air System Simulation Team in the Advanced Computational Analysis Directorate at Wright-Patterson Air Force Base, Ohio. Defense said the team demonstrated exceptional technical innovation in the development and integration of the simulations for unmanned combat craft.

  • Analysis: The Integrated Intelligence, Surveillance and Reconnaissance Architecture Development Team for DOD's National Security Space Office. The team did groundbreaking work in assessing intelligence architectures for military, homeland security and counterterrorism needs, DOD said.

  • Cross-Function: The Simulation Testing Operations Rehearsal Model Team for the Army Operational Test Command at Fort Hood, Texas. The team created new weapons and information systems while also supplying cost-effective battle command and control training, DOD said.

  • Training: The Battle Command Training Branch's Live, Virtual and Constructive Team for the 3rd Corps at Fort Hood, Texas. DOD lauded the team for creating the Warrior Skills Trainer that helps prepare soldiers for deployment.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected