Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Requirements Documentation Select a system you are familiar with, for example are MEADS, PAC-3, cell phone, or THAAD. Unclassified! Not proprietary Locate this projects needs

Requirements Documentation

Select a system you are familiar with, for example are MEADS, PAC-3, cell phone, or THAAD.

Unclassified!

Not proprietary

Locate this projects needs and/or requirements documentation (e.g.,Operational Requirements Document (ORD), Capability Development Document(CDD), System Requirements Document (SRD), Functional RequirementsDocument (FRD)) (hint: usually has lots of "shall" statements in it)

Review the Needs/Requirements Documentation

Describe:

1.What appear to be the goals of the project?

2.What is the viewpoint(s) taken by the documents authors (whosperspective are they representing? the user, the developer, the buyer?)

3.How is the requirements document structured?

4.Do you have any issues with the way the authors present theinformation?

5.What sort of requirements errors do you see?

You do not need to submit the document you reviewed. .

-Insightful analysis-Relating what you see to systems thinking, lifecycle orientation, and the role of requirements in the Systems Engineering process.

JTT FRD:

The purpose of this Functional Requirements Document (FRD) is to establish the functional requirements for the Joint Targeting Toolbox (JTT) and provides a brief justification for the need of the JTT. In addition, it specifically outlines functional requirements needed to perform and support joint targeting and does not provide detailed information on system interfaces, environment, and configuration management. The functional requirements listed are all-inclusive and represent current requirements generated by the Commands, Services, Agencies and Allies. The requirements within this FRD are included in the GCCS Requirements Database (GRiD) and support the GCCS COPWG validated requirements. This JTT FRD is intended to be a living document, with changes, additions, deletions, etc., subject to review and approval by the Joint Targeting Automation Steering Group (JTASG)[1]. Nominations should be forwarded to the JTT Executive Agent (AC2ISRC/A2).

1.3 Application Overview

The JTT will be a set of software applications and/or segments specifically engineered to optimize joint targeting throughout the full spectrum of conflict. Outside of unique requirements necessary to support and perform joint targeting, the JTT will leverage off existing and planned applications/segments that provide DoD standard functionalities conducive to joint targeting (e.g., Imagery, Mapping, General Military Intelligence databases, weaponeering, message handling, etc.). Under this vision, the JTT will not grow into a giant software package that is constrained by numerous configuration challenges and incompatibilities. Instead, the JTT will allow easier placement into targeting architectures and will greatly reduce costs in site installations, upgrades, and software maintenance.

[1] JTASG is a forum under the Military Target Intelligence Committee (MTIC). The JTASG is the validation authority via the GCCS IFWG for all joint-targeting requirements incorporated into GCCS. It is chartered to manage DoD-wide targeting automation requirements and provide oversight to development, configuration control, training procedures, operational implementation, and overall life-cycle support to developing automated targeting applications. The JTASG also has Configuration Management (CM) authority and responsibility for all Joint Targeting (IAW CJCSI 6271.01).

3.2.a Requirements Matrix (Table 1)

FRD Paragraph Numbers

Planned/Current REQUIREMENT DESCRIPTION

ORD

Paragraph

3.2.1

JTT Architecture

3.2.1.1

UNIX Platform

4.2.6.32

3.2.1.2

Migration to NT Platform

4.2.6.32

3.2.1.3

Migration to Web-Based Architecture

4.2.6.28

3.2.1.4

JTT Preferences

4.2.6.32

3.2.2

Target Database Management Interface

3.2.2.1

Data Base Capabilities

4.2.6.1

3.2.2.2

Remote Data Base Capabilities

4.2.6.1

3.2.2.3

Standard Tables

4.2.6.1

3.2.2.4

Unit/Facility Database Create

4.2.6.39

3.2.2.5

Database/Records Classification Marking Capability

4.2.6.45

3.2.2.6

Database Import Tool

4.2.6.38

3.2.2.7

Target Numbering

4.2.6.2

3.2.3

Objectives and Guidance

4.2.6.15

3.2.3.1

Objectives and Guidance Insertion and Tracking

3.2.3.2

Strategy-to-Task Data Reviewing and Editing

3.2.3.3

Data Manipulation Display

3.2.3.4

Measures of Merit Establishment and Handling

3.2.3.5

Objective Status Tracking

3.2.3.6

Universal Task List

3.2.3.7

Tools Interface

3.2.4

Target Development

4.2.6.10

3.2.4.1

Creation and Storage of Desired Mean Points of Impact (DMPIs) and Aimpoints

3.2.4.2

Free Text Remarks

3.2.4.3

Target Planning Worksheets

3.2.5

Digital Target Materials

3.2.5.1

Automated Target Folder (ATF) Development

4.2.6.36

4.2.6.38

3.2.5.2

Imagery Retrieval and Storage

4.2.6.38

3.2.5.4

Joint Digital Target Materials (JDTM) Storage and Utilization

4.2.6.32

3.2.6

Target Systems Analysis

4.2.6.6

3.2.6.1

Target System Construction and Display

3.2.6.2

TSA Model Template Construction

3.2.6.3

Links and Nodes Analysis

3.2.6.4

Target Value Analysis

3.2.7

Distributed Collaborative Targeting

3.2.7.1

Interface to Collaboration Tools (IWS)

4.2.6.3

3.2.7.2

Chat and Voice Capability

4.2.6.3

3.2.7.3

JTT Products Posting

4.2.6.30

3.2.7.4

Web Access to JTT Products

4.2.6.36

3.2.8.

Interactive Map Display Processing

4.2.6.8

3.2.8.1

Interface to NIMA Standard Mapping Tool

3.2.8.2

Targets Display

3.2.8.3

Area Overlays Display

3.2.9

Precise Coordinate Mensuration

4.2.6.4

3.2.9.1

Joint Standard Mensuration Tools Interface

3.2.9.2

Request, Import and Storage of Precise Coordinates

3.2.10

Weaponeering

3.2.10.1

Weaponeering Support to Target List Generation

4.2.6.17

3.2.10.2

Weaponeering Solutions Creation and Storage

4.2.6.17

3.2.10.3

Target Weapon Pairing Prioritization

4.2.6.17

3.2.10.4

Weaponeering Analysis Against Complex Targets

4.2.6.17

3.2.10.5

Weaponeering Results Validation

4.2.6.17

3.2.10.6

Joint Meteorological Tools Interface

4.2.6.37

3.2.10.7

Weather-Based Weaponeering Recommendations

4.2.6.17

4.2.6.37

3.2.10.8

ROE/LOAC Compliance

4.2.6.17

3.2.10.9

JMEM/JAWS Automated Interface

4.2.6.17

3.2.10.10

JMEM Surface-to-Surface Weaponeering Interface

4.2.6.17

3.2.11

Target List Management (Joint Integrated Prioritized Target List [JIPTL] Generation)

4.2.6.7

3.2.11.1

Creation and Storage of All Target List Types

3.2.11.2

Database Query

3.2.11.3

Target List Validation

3.2.11.4

Target Prioritization

3.2.11.5

Import and Export Capabilities

3.2.11.6

DMPI and Weaponeering Nomination for ATO

3.2.12

Mission Planning and Operational Support

3.2.12.1

Mission Support Applications Interface

4.2.6.29

3.2.12.2

Mission Rehearsal

4.2.6.27

3.2.12.3

Aircraft Status and Availability Query

4.2.6.34

3.2.12.4

Weapons Recommendation

4.2.6.34

3.2.12.5

ATF to Navy Strike Planning Folder Interface

4.2.6.34

3.2.12.6

Target Complex Capability (TARCOM) Interface

4.2.6.34

3.2.12.7

Cruise Missile Application Interface

4.2.6.13

3.2.12.8

Portable Flight Planning System (PFPS)

4.2.6.44

3.2.13

Situation/Threat Assessment Capabilities

4.2.6.26

3.2.13.1

Decision Aid and Enemy Course of Action Tools

3.2.14

Mobile and Time Critical Targeting (TCT)

3.2.14.1

Theater Target Status Maintenance

4.2.6.23

3.2.14.2

COP/CTP Display.

4.2.6.33

3.2.14.3

COP/CTP Objects Query

4.2.6.33

3.2.14.4

NSFS Display

4.2.6.33

3.2.14.5

IPB Products Overlay

4.2.6.33

3.2.14.6

ISR Collection Plan Overlay

4.2.6.33

3.2.14.7

Fire and Maneuver Control Overlay

4.2.6.33

3.2.14.8

GCCS Map

4.2.6.33

3.2.14.9

Track Elements

4.2.6.33

3.2.14.10

Real-Time Weapon Monitoring

4.2.6.33

3.2.14.11

Real-Time Target/Weapon Pairing

4.2.6.33

3.2.14.12

Automated Target Prioritization

4.2.6.33

3.2.14.13

Airspace Deconfliction

4.2.6.33

3.2.14.14

Dynamic Retasking of Assets

4.2.6.33

3.2.15

Target Management (Tracking ATO Process)

3.2.15.1

Air Tasking Order Execution Monitoring

4.2.6.12

3.2.15.2

Air Task Order (ATO) Data

4.2.6.41

3.2.15.3

Target Validation (4 and 8 hr Confirmation)

4.2.6.42

3.2.15.4

Targets Nominated Status

4.2.6.42

3.2.15.5

SPINS Input and Storage

4.2.6.41

3.2.16

Operational Assessment

4.2.6.25

3.2.16.1

Assessment Reporting Capabilities

3.2.16.2

Re-Strike Recommendations

3.2.17

Combat/Battle Damage Assessment (C/BDA)

3.2.17.1

Generate BDA Reports

4.2.6.5

3.2.17.2

Populate/Update CDA Data

4.2.6.5

3.2.17.3

Weapon Derived BDA Feedback

4.2.6.16

3.2.17.4

Target Strike History

4.2.6.19

3.2.17.5

Collateral and Additional Damage Assessment

4.2.6.20

3.2.17.6

Mission Report (MISREP) Utilization

4.2.6.43

3.2.17.7

Target Status Query

4.2.6.40

3.2.18

Report Generation

3.2.18.1

Formatted Reports

4.2.6.11

3.2.18.2

Briefing Slides Generation

4.2.6.24

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Privacy In Statistical Databases International Conference Psd 2022 Paris France September 21 23 2022 Proceedings Lncs 13463

Authors: Josep Domingo-Ferrer ,Maryline Laurent

1st Edition

3031139445, 978-3031139444

Students also viewed these Databases questions

Question

2. Describe why we form relationships

Answered: 1 week ago

Question

5. Outline the predictable stages of most relationships

Answered: 1 week ago