$0.00

Models

Filter by Community
Filter by Title
Version: 
7.4
Airborne Radar Detection Model AIRADE Input Parameters Screen Capture AIRADE is an interactive computer program for evaluating airborne radar performance. It is used as a tool for design, analysis,...
Version: 
2.49
The Advanced Joint Effectiveness Model, or AJEM, is a survivability, lethality, and vulnerability (SLV) computer simulation code capable of analyzing one or more threats attacking a one or more...
Version: 
5.4
Advanced Low Altitude Radar Model ALARM is a generic digital computer simulation designed to evaluate the performance of a ground-based radar system attempting to detect low-altitude aircraft. The...
Version: 
2
BlueMax6 Model Screen Capture Aircraft Flight Dynamics, Flight Path Generator, Maneuver, Mission and Aero-Performance Evaluation Model BlueMax6 provides high-fidelity air-vehicle dynamics and Time...
Version: 
8.3
Tactical Air Combat Simulation BRAWLER simulates air-to-air combat between multiple flights of aircraft in both the visual and beyond-visual-range (BVR) arenas. This simulation of flight-vs.-flight...
Version: 
5.3
Enhanced Surface-to-Air Missile Simulation ESAMS is a computer program used to model the interaction between an airborne target and a surface-to-air Missile (SAM) air defense system. Detailed data...
Version: 
1.1.0
Graphical User Interface for Output Simulation RADGUNS Results Viewed with IVIEW 2000 IVIEW 2000 is a post-processing graphical presentation package, for various computer simulations modeling...
Version: 
2.4.3
Radar-Directed Gun System Simulation RADGUNS Model Screen Capture RADGUNS is used to evaluate the effectiveness of Air Defense Artillery (ADA) gun systems against penetrating aerial targets. It is...
Version: 
6.9
The Vulnerability Toolkit (VTK) is a suite of software tools that support the performance of ballistic vulnerability and lethality studies involving military systems. The primary purpose for the...
Version: 
3.8.2
Typical FPM Simulation WINFIRE with the Fire Prediction Model (FPM v3.8.2) integrated simulates events that accompany a single threat penetrating through a vehicle and impacting a container of...