AJEM requires the following data input for execution and analysis:
AJEM determines the outcome of threat and target interactions in terms of vulnerable area, probability of kill (Pk), probability of damage, number of hits, and number of perforations to components, sub-systems, or systems as defined by the user. The data can be output in tabular format or in a graphical display plot (Cell-by-Cell Pk Plot).
Distribution Statement A: Approved for public release by ARL – 23 October 2017; distribution is unlimited.
DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government Agencies and their contractors. Critical Technology. October 12, 2017. Other request for this document shall be referred to U.S. Army Research Laboratory.
Requests from non-U.S. Agencies must be forwarded to their country’s U.S. embassy.
*If you are requesting the AJEM model via the button below, on the next page in the Additional Details box, please be sure to include which branch of service (Army, Navy, Air Force, or other) you are requesting for.*
|Archived Versions Available|| |
2.49, 2.53, 2.54, 2.55, 2.56, 2.57, 2.58, 2.59, 4.20.1, 188.8.131.52
|Host Systems|| |
UNIX, Windows, LINUX
|Program Language|| |
Red Hat Enterprise Linux (RHEL) 6 and CentOS Linux 6 for 64-bit with GCC 4.4.7, Windows 7
|Software Change Request Database|| |
https://ajem.arl.army.mil/ **This can only be reached from a government-based network using a CAC card. Contractors not operating on a government system will need to have their government contract POC submit the SCR on their behalf.**