dismounted infantry aggregation q0 ...combined arms studies and analysis activity acn 59181 attn:...

123
APRIL 1982 TR 1-82 ACN 59181 00 STHE DISMOUNTED INFANTRY AGGREGATION Q0 r4 METHODOLOGY (DIAM] IN THE JIFFY GAME r-.4 Technical- Repirt TR 1-82 UNITED STATES ARMY COM'BINED ARMS CENTER COMBINED ARMS COMBAT DEVELOP" ENT ACTIVITY COMBINED ARMS STUDIES AND ANALYSIS ACTIVITY CMcpy awblo. to Mr. dm ad pemiz KQUy Ikgibles rpwoducg APPROVED FOR PUBLIC RELEASE: DISTRIBUTION UNLIMITED 82 07 06A 82 07 0 ) 0f

Upload: others

Post on 07-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • APRIL 1982 TR 1-82

    ACN 59181

    00

    STHE DISMOUNTED INFANTRY AGGREGATIONQ0r4 METHODOLOGY (DIAM] IN THE JIFFY GAMEr-.4

    Technical- Repirt TR 1-82

    UNITED STATES ARMY

    COM'BINED ARMS CENTERCOMBINED ARMS

    COMBAT DEVELOP" ENT ACTIVITY

    COMBINED ARMS STUDIES AND ANALYSIS ACTIVITY

    CMcpy awblo. to Mr. dm adpemiz KQUy Ikgibles rpwoducg

    APPROVED FOR PUBLIC RELEASE: DISTRIBUTION UNLIMITED

    82 07 06A82 07 0 ) 0f

  • DISCLAIMER NOTICE

    THIS DOCUMENT IS BEST QUALITYPRACTICABLE. THE COPY FURNISHEDTO DTIC CONTAINED A SIGNIFICANTNUMBER OF PAGES WHICH DO NOTREPRODUCE LEGIBLY.

  • SECURITY CLASSIFICATION OF THIS PAGE (When Dota EnO-fd)

    SREPORT DOCUMENTATION PAGE READ -'STRUCTIONSBEFORE COMPLETING FORM

    I. REPORT NUMBER .VT ACCESSION No. 3. RECIPIENT'S.CA, ALOG NUMBERTR 182 1(,____47____

    4. TITLE (and Subtitle) S. TYPE OF REPORT & PERIOD COVERED

    THE DISMOUNTED INFANTRY AGGREGATION METHODOLOGY Final ,S (DIAN) IN THE JIFFY GAME ______________S6. PERFORMING ORG. REPORT NUMBER

    7. AUTHOR(&) 8. CONTRACT OR GRANT NUMBER(&)

    H. Kent Pickett, Stephan A. Arrington,Elizabeth W. Etheridge, Leon D. Godfrey

    9. PERFORMING ORGANIZATION NAME AND ADDRESS 10. PROGRAM ELEMENT. PROJECT, TASK

    AREA & WORK UNIT NUMBERS' ~~~US Army Combined Arms Combat.Developments Activit ! /( AR - , OKUI UBR

    Combined Arms Studies and Analysis Activity ACN 59181ATTN: ATZL-CAS-OA Fort Leavenworth, KS 66027

    11. CONTROLLING OFFICE NAME AND ADDRESS 12. REP'ORT DATEApril 1982

    13. NUMBER OF PAGES

    11914. MONITORING AGENCY NAME & ADDRESS(I1 different from Controlling Office) IS. SECURITY CLASS. (of thl'e report)

    Unclassified

    ISa. DECL ASSIFICATION/ DOWN GRADINGSCHEDULE

    16. DISTRIBUTION STATEMENT (of t'Ilo Report)

    Approved for public release: distribution unlimited

    "17. DISTRIBUTION STATEMENT (of tho ebetract entered In ilock 20, It different from Report)

    IS. SUPPLEMENTARY NOTES

    19. KEY WORDS (Continue on revort& side it neceeesry and identify by block number)

    Dismounted Infantry Combined ArmsInfantry Aggregation MethodologyDivision War GameCorps War Game

    20, ABSTRACT (CoMtinue a mrveree elola it nceseasy otd Identi•y by block number)

    -- Results from low resolution corps and division level war games andsimulations have become increasingly important to decisions involvingweapon system procurement and the force structuring process. In the past,dismounted units have been poorly represented in these models. Games suchas Jiffy and the developmental CORDIVEM did not portray explicitly theattributes of dismounted squads and platoons. These games were usuallyoriented to the armor/antiarmor battle, with end of simulation occurring at-N

    DD FORM 1473 EDITION OF I NOV 65 IS OBSOLETE

    SECURITY CLASSIFICATION OF THIS PAGE (When Data Entered)

    4,

  • SICURITY CLASSiICATION OF THIS PAGKZha Data .nt.. ..

    , •about 500 meters*. Consequently, the effects of dismounted units ir. the corps/division level combined arms battle were not accounted for satisfactorily.This report describes a method for representing such battles in division.orcorps level simulations by aggregating terrain effects and numbers of weaponsystems in order to reduce set up .and run requirements .while.explicitly re-presenting dismounted tactics, weapon lethality, and target vulnerability.The method has general applicability in existing war games. It has been-implemented as a computerized combat model in the Jiffy war.game and used ingaming support for the High Technology Light Division study.

    ST

    ,I

    •'•'i SECURITY CLASSIFICATION OF THIS PAGE(When Det. En*terd)

  • Technical Report TR 1-82April 1982

    Studies and Analysis DirectorateCombined Arms Studies and Analysis Activity

    US Army Combined Arms Combat Developments ActivityFort Leavenworth, Kansas 66027

    THE DISMOUNTED INFANTRY AGGREGATION Acco, ion--orMETHODOLOGY (DIAM) IN THE JIFFY GAME AC• TO.if. Fc

    by -r

    H. Kent Pickett rStephan A. Arrington

    Elizabeth W. EtheridgeLeon D. Godfrey

    ACN 59181 ., ___

    Approved by:

    RONALD G. MAGEEDirector, S&AD

    SARVID E. WEST, JR.Colonel, InfantryDirector, CASAA

  • ACKNOWLEDGEMENT

    The'authors gratefully acknowledge the assistance ofMAJ(P) Richard St. John, CPT(P) Timothy Reischl, Ms JodyShirley, and Ms Annette Ratzenberger. Without their help inthe design and debug phases of DIAM development, this effortwould never have reached completion.

    ii

    4.4 • • • • • • • •

  • ABSTRACT

    Results from lovi rescolution corps and divisio ri level war gannes andsimulations have become - ncreasingly important to, dects ions invvolvingweapon system. procurement and t-e force structurii ng process. I in thepast, dismounted units have been poorly represent1ed in -these mo~dels. Game-such as Jiffy and tlhe developmental CORDIVEM did riot portray ex iplicit ly theattributes of dismounted squads and platoons. Tt--ese garnnes were usual lyoriented to the armnor/antiarmow- battle, with end of sinulation voccurringat about 500 meters . Consequently, the effects co f disnounted u jlts i n thecorps/division level combined a ms battle were nc)t acco unted fo-r sati s-factorily. This report describes a method for represerating suc•i battlesin division or corps level simulations by aqgregating terrain effects,and numbers of weapon systems in order to reduce set up and rutm requ-f re-ments while explici tly r epreseriting dismou nted tactics . weapon lethal ity,and target vulnerability . The method has general appli cability- inexisting war games. It iNas been implemented as a compuAterized combatmodel in the Jiffy war g ame and used in gaming suApport for the HighTechnology Li ght Di visio in study.

    I

    . iii

  • TABLE OF CONTENTS

    ACKNOWLEDGEMENTS ......... ....................... ii

    ABSTRACT ........... ........................... ii i

    LIST OF TABLES ........... ........................ v

    LIST OF FIGURES .......... ... ..................... v

    CHAPTER 1

    'Background and Purpose ...... ................... 1-1

    The DIAM Data/Information Flow Structure ............... 1-2

    Algorithms Used in DIAM ..... ................. .... 1-6

    References ....... ......................... .... 1-13

    CHAPTER 2

    DIAM Internal Data Base ........ .................. 2-1

    File Structure for Ferrain Effects ...... ............. 2-3

    File Structure for Weapon Vulnerability ..... .......... 2-10

    File Structure for Weapon Movement Rates ............... 2-11

    File Structure for Target Acquisition Rates ..... ........ 2-12

    File Structure for Weapons Characteristics ..... ......... 2-14

    CHAPTEr. 3

    Introduction ........... ........................ 3-1

    DIAM Functional Areas .......... .................. 3-1

    Subroutine Summary ....... .................... ... 3-4

    DIAM Self-Documentation Concept ....... .............. 3-4

    L'IAM Code ........ ... ......................... 3-15

    iv

  • LIST OF TABLESPage

    3-1. DIAM Subroutine Sum.mary 3-5

    LIST OF FIGURESPage

    1-1. DIAM data and information flow. 1-3

    1-2. DIAM Logic Flow for Both Attackers and Defenders. 1-7

    2-1. DIAM internal data bases. 2-2

    2-2. Battle site. 2-4

    2-3. Line-of-sight fan for a TOW position. 2-5

    2-4. Line-of-sight fan for a small arms position. 2-6

    3-1. Flow chart of DIAM module. 3-2

    t.

  • CHAPTER I

    MODEL METHODOLOGY

    l.l. BACKGROUND AND PURPOSE.

    a. The role of the Combined Arms Studies and Analysis Activity (CASAA) inthe hierarchy of Army analysis requires the study of corps and division levelproblems. Analyses at this level, including results from corps and divisionlevel war game simulations, have become increasingly important to decisionsinvolving weapon system procurements, force structuring, and scenariogeneration for the TRADOC community.

    b. The armor-antiarmor battle is generally well represented in mostcorps/division models, as are other combined arms aspects such as indirectfire, tactical air, close air support, air defense, and minefields. However,the contributions of small infantry units--especially those involvingdismounted operations--have not been adequately representel. Mostcorps/division level simulations represent closure of the forces to ranges of1000 to 500 meters. At this point the simulated battles are terminatedwithout regard to the closure, assault, and withdrawal phases.

    c. Analysis conducted with these models often fails to give

    decisionmakers a basis for evaluating the effectiveness of dismountedinfantry. Consequently, in February 1980 CASAA was tasked by Commander,Combined Arms Center (CAC) to develop methods for simulating the effectivenessof dismounted infantry in a combined arms corps/division environment. Atwo-phased effort was initiated to address this problem.

    (1) The first phase consisted of the basic research necessary for anycombat model development. During this phase the critical battle activitiesimpacting on division effectiveness were defined through the use of missionprofiles supplied by the US Army Infantry Center (USAIC) and through informaldiscussions with USAIC personnel. A review of the ability of currentlyrunning combat models to represent these activities was also conducted. Thefirst phase of the study was completed by developing a methodology forrepresenting these activities in a low resolution division model. Themethodology included identification of the basic infantry units that must bemodeled, algorithms describing the effectiveness of these units in variousactivities, and data sources to support these algorithms. A complete reporton this phase of the study effort is contained in CASAA TR 6-81, DismountedInfantry Aggregation Methodology Study (DIAMS), August 1981.

    (2) The second phase of the effort was implementation of themethodology; i.e., building the model (the Dismounted Infantry AggregationModel--DIAM), constructing the data bases, validating the model, andexercising it in support of several CAC studies. Model construction wascompleted in September 1981, and interface with the corps/division level JiffyWar Game took place in October 1981. Although DIAM is currently in use as a

    Vm m m m

  • submodule of Jiffy, it can also be used alone to analyze the effectiveness ofa combined arms force as it closes on dismounted infantry positions fromranges of 1000 meters.

    d. The purpose of this report is to provide a documented reference forDIAM. The report is designed to serve two types of readers.

    S(1) Chapter 1 describes the overall methodology used in developingthe computer code. It contains a general discussion of the algorithms used torepresent the dismounted battle and is provided for the use of those readersinterested in "What's going on inside the model."

    (2) Chapters 2 and 3 were developed for those readers who areinterested in executing the model. Chapter 2 describes the model data base.Chapter 3 contains a listing of the model code. DIAM is written in FORTRAN 77using a modular design dictated by standard software engineering practices.The code listed in chapter 3 represents the current Jiffy application of DIAMin subroutine form. The code could easily be modified for use in stand-aloneform.

    1-2. THE DIAM DATA/INFORMATION FLOW STRUCTURE. DIAM is a time stepped,expected value simulation. During each minute of battle, the movement of bothforces, their ammunition expenditures, and losses to both forces arecalculated. The model requires an extensive data base to represent thelethality, vulnerability, and mobility of a dismounted force in a combinedarms battle. Figure 1-1 shows the various types of data bases required by theDIAM attrition model. The figure shows that the model requires data inputsfrom two sources, a host and its own internal data base.

    a. Data Input From Host. Host inputs are used by DIAM to establish abattle scenario. In essence they describe who is fighting, what type ofbattle the user wishes to model, and where (type of terrain) the f 4 ght willoccur. They represent a simplified version of the type of scenario datarequired for a high resolution model. The host may be either a larger modelusing DIAM as a submodule, such as Jiffy, or an analyst/gamer using DIAM inthe stand-alone version. The following data are-required from the host:

    (1) Weapon lists. Complete lists of all weapons to be represented inthe DIAM battle must be provided by the hnst. DIAM currently has a library of25 different weapon types (e.g., Viper, Dragon, IMAWS, M-l, IFV) for Blue and25 types for Red. The user is allowed to select a maximum of 10 Blue typesand 10 Red types for each battle. The number of weapons of each type (e.g.,75 Viper, 5 Dragon, 10 M-l) must also be provided by the user. The modelautomatically positions these weapons on the terrain in response to the user'sselection of battle scenario (see para b(2), Terrain effects, below).

    (2) Artillery firing rates. Artillery firing rates and loss rates toeach weapon type are also required from the host. The version of DIAMdescribed in this report uses the Jiffy artillery module to assure consistency

    1-2

    • A' • m m • m m

  • a 4

    0) 0

    ol E-O=C -0J i1 (n

    0 uO c L 0 0

    '•-00 V> 4- )

    (tA

    4 U ,) S. .

    o €I" di> • •4-1et - .

    4 1•o =£ i -i

    ,,,4-3,. --Mt u r= (U u 0

    4- diSL4 -) di

    L 4 ,4-. ___-_____ 4-

    a.) UWES. 4 Uc a 0) diu~ 0

    4 & 0o > 6- .9- 04) 0 cn C• > 4,

    W-n• (0( c 4

    ____ ___ ___ ___ 41~ 0 *-

    --- h to

    0t•S°.

    #A vi 4C-W -"

    • CnC

    (D 41 .) 41 o)4Wdin Id ) 4..iV) '%U4

    E'a.- 0 d . •M .- M

    4- CW >s( -)d U 4A >0-(n 1J

    4 S- U) 0-.0i~

    .c'. 0di0i a aS-1

    C CMS- 0 -0 00 Q) -

    4- 4- = 4).. 01tito4CC-- U Oa IL. 0 i~ >eC S..( ,-0

    W0 .. W 'U 2-0 WCýfss 0003CU CL. N CL U~ 9 d Z 9LcaC

    di~dU~L~i-41 m S-t i

    ý00

    4-) 0 -I-0 40-

    L0 S- 0 C4-)

    4J S.-. - 3ý 4JCW- m

    Il) 'A di a) >))ý4- >.LI C a i.04.0 M L

    '4- 0t- S-.-0 ." a- 0

    )d

    4-) Q O4 ýC(n U a)L.U0 (n:

    = __ ____ ____ ___ ____ ___1-3_

  • with other Jiffy results. However, DIAM is structured so that lethalarea/target density artillery loss algorithms could easily be implemented inthe module.

    (3) Tactical scenario. Host selection of the tactical scenario isalso required. The DIAM module currently has a library of six terrain areasavailable. The user is required to select a terrain location and denoteeither the Red or the Blue force as attacker. DIAM responds by accessing theproper terrain data base and arraying the user-defined forces on the terrain.The visibility condition (day, night, or obscured) is also required by themodule. Two other host data elements are required to describe the DIAM battleframework. The initial condition of both forces is represented by the percentof basic load available to each weapon type and the opening ranges between theforces. The opening range must be less than 1000 meters. The host dataelement describing disengagement criteria is an optional requirement. TheDIAM structure allows the host to specify attrition thresholds and rangethresholds for each weapon type. These thresholds represent maximum loss2 levels and minimum closure distances to enemy force elements that will besustained by a force prior to its withdrawal. Violation of these thresholdsfor either force will initiate its withdrawal. If the user does not specifyS~these thresholds, they will be specified by the DIAM module.

    b. Internal Data Base. The DIAM module also maintains an extensiveinternal data base. Referring again to figure 1-1, the model has access to acomputerized library describing various terrains and weapon systems. Theselibrary entries are accessed by the module in response to host requirements.The libraries fall into the foltowing categories:

    (1) Weapon system configuration and performance. These data describeweapon system performance under various postures (attack or defend) andenvironmental conditions (day, night, obscured day). They are supplied by theUS Army Materiel Systems Analysis Activity (USAMSAA) and the Night Vision andElectro-optics Laboratory (NV&EOL). The elements of this part of the database are:

    . Single shot kill probabilities for each ammunition against eachplatform type in both defensive and attack postures. Platforms arerepresentative of both vehicles and personnel.

    . Movement rates under day and night conditions by platform type.

    . Time required by sensors to detect a target at various ranges. DIAMdivides its sensors into four categories: unaided eye, opticallyaided eye, generic image intensifier, and generic thermal device.

    . Time required to aim, fire, guide, and reload for each weaponsystem.

    1-4

  • • Principal armaments and basic loads for each platform. Weaponplatforms (personnel, vehicles, crews) can carry multipli weapons inDI NM. For example, an infantry Dragon gunner can also engagepersonnel targets with a rifle.

    (2) Terrain effects on vehicles and personnel.

    (a) The terrain data base contains data representing animportant tactical aspect of the DIPM battle. Each of the weapons selected bythe DIAM user is assigned to one of four general groups:

    . Personnel• Heavy armor vehicles. Light armor vehicles. Systems offset from the battle by more than 1000 meters ',e.g.,

    mortars, TOW).

    These categories are used by DINA to establish movement locations and thetactical geometry of the force structures. The module considers the center ofmass for each group for all calculations involving movement and rangeparameters. The tactical terrain data base contains initial locations for thecenter of mass of each DINM group and is used by the module to deploy weaponsystems in a representative tactical array at the beginning of each battle.

    (b) The terrain effects data base is used by DINM to determinethe percent of each force visible to firers in the opposing force. This database was developed using defensive positions and attacker approach routesresulting from a map analysis conducted by CASAA and the US Army InfantrySchool. The CASAA Battlefield Visualization Graphics computerized terrainsystem was used to analyze the area along the avenues of approach visible toeach defensive position. This provided the percent of the attack corridorvisible in range bands of 200-meter increments to each defensive position. Asthe DIUM attrition module moves the threat forces along the attack corridors,the percent of corridor visible is applied to the force, providing number ofsystems that can be targeted by the defenders. DIAM currently has a libraryof six different terrain tactical situations. Analytical procedures todevelop data bases for new situations require approximately 2 mandays. Adiscussion of these procedures can be found in Chapter 2 of this report.

    (3) Tactical decision criteria.

    (a) The DIAM module simulates tactical responses of bothindividual weapon systems and the force to battle conditions. Individualtactical responses are limited to the following:

    • Personnel riding in light armor vehicles may dismount for an assault.• Dismounted personnel withdrawing from the battle may mount available

    light carriers.. Light armored vehicles may take up overwatch positions.

    1-5

  • FThese tactical responses are triggered by closure distances between thegroups. For example, the Red commander may want 50 percent of all mountedpersonnel to dismount their carriers when they move within 300 meters of theBlue defender's dismounted Viper positions. The tactical data base containsthe desired range at which the tactic must be executed, the percent of thegroup required to perform the tactic, and an identifier of the opposing grouptriggering the tactic. Under conditions requiring a DIAM group to operate intwo tactical modes (in the example, 50 percent personnel mounted, 50 percentdismounted), the module splits the group to represent movement and locationcharacteristics of both groups.

    (b) Force tactical responses are centered around the decision towithdraw from the battle. As mentioned previously, the hosc can optionallyprovide criteria (percent of force lost, range between groups) to triggerwithdrawal. If these are not provided by the host the module defaults to thevalues found in this data base. DIAM's current implementation in Jiffy allowsthe gamer to override the withdrawal criteria (either stay and fight or moveout) following status reports, which are given at selected intervals duringthe DIAM battle.

    1-3. ALGORITHMS USED IN DIAM.

    a. Figure 1-2 presents a generalized logic flow of the processesoccurring in the DIAM module. The purpose of this diagram is to provide aframework for consideration of the attrition algorithms used in the module.The DIAM module is a deterministic model using expected value techniques forcalculating weapon losses to both forces. DIAM first selects the appropriateweapon system data and terrain data for the battle to be played, then locatesthe forces in their tactical positions on the terrain. For each battleminute, DIAM constructs a firing profile for each weapon system. This profileconsists of the number of targets visible and within range that are detectedby the system. On the basis of this profile, the model calculates the roundsfired by each system. Losses to each firer and target are then determi'ed,and force levels are updated. The number of incoming rounds and the lossessustained by the force are used to calculate suppressive effects for the nextminute of battle. Suppression affects rate of fire, movement, andvulnerability. After suppressive effects are calculated, movement rates aredetermined and force weapon positions are updated for the current minute.Tactical thresholds are then compared with current positions and forcelevels. If the-disengagement criteria are satisfied, tactical requirements(for example, mounting of vehicles) are performed and a timer is set for thedisengagement period. Individual tactics also may be altered (dismount,overwatch) in response to tactical thresholds. A new terrain data base isretrieved from the module library to represent reduced visibility conditionsbetween forces during disengagement and pursuit, and the status of affectedgroups is updated. DIAM assumes that disengagement is completed after 10minutes. A final battle report is printed following disengagement.

    1-6

    i:

  • gelect Appro-priate systenTerrain Data

    7or This Battia

    sce rn spnsB

    (dse a ghed et d ont

    Lose andpose

    TDefenders.t1-

  • b. The following paragraphs provide a detailed description of thealgorithms used for calculation of rounds fired, determination of losses,calculation of suppressive effects, and calculation of group movement. Theremaining steps are primarily model bookkeeping and are documented in the DIAMcomputer code found in chapter 3.

    (1) Calculation of rounds fired. The maximum number of rounds firedper minute by weapon i at target j is Rii, which is the reciprocal of thetime required to fire one round at the g ven target; i.e., Rij = l/Tij.

    Tij (Dij/Fij + Aij + Li + Mij) Nij/Ni (1-1)

    where:

    Tij= expected time in minutes for a weapon of type i to fire at atarget of type j, given a uniform distribution of fire at alltargets available.

    Dii = expected number of minutes for a weapon of type i to detect a

    weapon of type j.

    SFu- number of rounds fired by i at j per detection.

    Aij = expected number of minutes required to aim i at j.

    Li = expected number of minutes to reload i.

    Mij = expected number of minutes for projectile from i to reach j.

    Nij = expected number of targets. of type j visible to firer i.

    Ni = expected number of targets of all types visible to firer i.

    (a) This firing rate assumes targets are of equal priority andare allocated uniformly across all targets visible and detected by the firer.If other types of allocations are desired, it is only necessary to change thefraction Nij/Ni to the desired weighting method. The number of targetsvisible Nij is calculated in the following manner:

    S.Nij nj(l-7) vij (1 - .r2) (1-2)

    1-8

  • where:

    nj the total iumber of target weapons of type j in the target force.

    v = the fraction of the terrain corridor containing target weapon system

    j not visible to any of the firing force containing system i.

    vi= the fraction of the terrain corridor containing target systems ofcategory J visible to all firing weapons of category I. Recallthat all weapon systems fall into one of four categories(dismounted personnel, heavy vehicles, light vehicles, me-tars).In this case J is the category containing the target system j andI is the category containing the firing system i. Thesevisibility fractions vary by 200-meter range bands as mea iredbetween weapon systems i and j.

    Sj the fraction of targets of type j suppressed for this minute. The!• Sjfactor S represents DIAM's modeling of one-half of all suppressed

    personnel in a temporary covered position.

    (b) This firing rate (Ri.) is for unsuppressedsituations--suppression will reduce this rate as follows:

    iRRij Rij S it (1-3)

    where:

    Rij = suppressed firing rate of weapons of type i at targets of type j.

    Rij = unsuppressed firing rate of weapons of type i at targets of typej.

    Sit = suppression factor for firing times of weapon i at time t.

    (2) Calculation of loss rates.

    (a) The expected number of weapons (considered as targets) oftype j killed by weapons in the opposing force of type i is determined fromthe following equation:

    IR.. a.iC..

    Kij = Nij (1 - (1 - P ij/Nj) 3 1 13) (1-4)

    where:

    Kij = the expected number of type j weapons killed by type i weapons.

    Nij = the expected number of type j weapons visible to weapons of type1.

    1-9

  • Pij = the single shot kill probability of weapon i against weapon j.

    I

    Rij = suppressed firing rate of weapons of type i at targets of type j(from equation 1-3).

    Cij = number of weapons of type i firing at targets of type j.

    ai = the fraction of aimed rounds fired by weapon system i. Forattackers, ai = 0.30. For defenders ai = 0.60.

    (b) The number of weapons of type i firing at target type j isgiven by:

    S.

    C. = ni vil - L) (1-5)

    where:

    ni = the total number of weapons of type i in the firing force.

    vJi = the fraction of firing positions of weapons in category I visibleto target weapons in category J. Note that the use of vij in thecomputation of the number of targets and vji in computing thenumber of firing weapons causes the following representation inthe model: the number of firers engaging targets j are only thosethat have physical line of sight to j (represented by vjI).Likewise, the number of targets j engageab le by i are only thosethat can be seen by i (represented by vij).

    Si = the fraction of firing systems of type i suppressed for thisminute, Si/2 indicates that one-half of all suppressed weaponsin ýiAM do not fire.

    (c) Equation 1-4 is consistent with the assumption that targetsare selected at random with replacement. Bash and Inselmann (1979) derived theequation. Also developed there is the equation for determining the expectOdnumber of kills when more than one type of weapon is firing at one target typeand all targets can be engaged by all weapons:

    K..Lj = )) -i (1-6) •

    all i ij

    where:

    Li = expected number of losses per minute of weapons of type j.

    Kij = expected number of type j weapons killed by type i weapons (fromequation 1,,4).

    1-10

  • Nij number of weapons of type j in force visible to weapons of type i.

    Equations I-4 and 1-6 produce an approximation to the situation where differentweapons see different subsets of targets.

    (3) Calculation of suppressive effects. The DIAM suppression modulewas taken from the Jiffy war game. This module provides suppression of thefiring rates and movement rates for both dismounted personnel and vehicularmounted armaments. The following four equations are used to calculate thesuppressive effects in DIAM.

    Yi = Wi (2.06 X + 1.54)/100 (1-7)

    Yi = Wi (1.06 X + 0.14)/100 (1-8)

    k Yi = Wi (8 X 1.5 + 3.28)/100 (1-9)

    Yi = Wi (2.5 X 1.5 + 0.5)/100 (1-10)

    where:

    Yi = fraction of weapons of type i that are suppressed.

    X = ratio of total losses suffered by weapons of type i from direct fire,artillery, and mines to total losses inflicted by weapons of type i.

    Wi = l for category 4 (heavy) weapons and 2.86 for all other types ofweapons (from Jiffy).

    Equation 1-7 is for defenders in the engagement phase, 1-8 is for defenders inthe withdrawal phase, 1-9 is for attackers in the engagement phase, and 1-10 isfor attackers in the withdrawal phase. The maximum suppression for firing isset at 0.8 and the maximum for movement is 0.9. Suppressed systems are lesslethal and less vulnerable (see use of Si, Si in equations 1-2, 1-3, and1-5). Lethality and mobility are assumed to be reduced because systems beingsuppressed will seek available cover. This in turn is assumed to make thesystem less vulnerable.

    (4) Calculation of movement rates and tactical locations.

    (a) The movement rate for each weapon is calculated by readingthe unsuppressed rate for this terrain and tactical scenario from the data baseand then applying the suppression factor:

    I

    M it M~ (1O-V it) (1-11)

    where:

    Mit = suppressed movement rate for weapon i at time t.

    1-il

  • ThsMi = unsuppressed movement rate from data base.

    Vit: =fraction of movement suppressed by previous incoming fire.

    These rates are adjusted so that weapons in overwatch positions do not move andany vehicles with dismounted personnel will move at the dismounted rate in themeeting and engagement phase of the battle.

    (b) Tactical geometry is represented by locating the componentsof each force about a central force reference point. Each weapon played in 'hemodel is categorized as belonging to one of four groups (dismounted personnel,heavy armor, light armor, or mortars). The initial locations of the center ofeach group with respect to the force reference point are maintained as part ofthe data base for each tactical scenario available for play in the DIAMsubmodel. Selection by the main program of a particular scenario causes theDIAM submodel to modify the position of each weapon group based on thefollowing formula.

    LRjo = D + Aj (1-12)

    LBio = D + AI (1-13)

    where:

    LRjo = location of all Red weapons of type j at time zero.

    LB1 o = location of all Blue weapons of type i at time zero.

    D = range between center of mass of forces at start of the battle.

    AI, AiJ = the offset distance of one of four weapon categories fromthe center mass of the force. is the offset for all Blueweapons of category I. Likewise, Aj is the offset for allRed weapons of category J.

    (c) Each weapon location is changed each minute based upon asuppressed movement rate such that the location at any time (t + 1) minutesinto the battle is defined by:

    LR j,t+1 : Mt + LRjt (1-14)

    where:

    LRj,t+1 and LRjt = the location at time t+l and t respectively ofweapon j.

    1-12

  • Mjt = the suppression of movement for weapons jduring minute t.

    The DIAM battle begins with the attacking force moving toward the defensivepositions. Losses are assessed to both forces until a tactical threshold isreached. At this point the withdrawal phase of the battle is begun. This issimulated by a change in the percent visible tables (representing a forceminimizing intervisibility with the enemy as it breaks contact). The modelmoves the withdrawing forces out of firing range and then prints the losses toboth Red and Blue forces.

    1-4. REFERENCES.

    Bash, D. and Inselmann, E., 1979, Target Selection Assumptions and Their Effectson an Assessment Equation. Technical Paper 2-79, US Army Combined Arms Center,Fort Leavenworth, K5.

    Godfrey, L., Etheridge, E., Arrington, S., and Pickett, H., 1981, DismountedInfantry Aggregation Methodology (DIAMS). Technical Report 6-81, US ArfCombined Arms Center, Fort Leavenworth, KS.

    1-13

  • CHAPTER 2

    DIAM FILE STRUCTURES

    2-1. DIAM INTERNAL DATA BASE.

    a. The DIAM.internal data bases are used by the model to describe weaponperformance, the terrain effects on the surviving force, and the tacticaldisengagement criteria. The data are stored on five random access files asshown in figure 2-1.

    (1) The Weapon Vulnerability file (Logical Unit 16) containsprobabilities of kill for 25 Blue weapons and 25 Red weapons. Theprobabilities are stored in a range-dependent manner. Two files exist, onerepresenting Blue in prepared defensive positions and the other representingBlue in an attack.

    (2) The Terrain Effects file (Logical Unit 25) contains datadescribing the percentage of the opposing force visible to both attackers anddefenders. The percentages are both weapon and range dependent. Six terrainsites (four in the Mideast and two in Europe) are currently available in theDIAM model.

    (3) The Movement Rates file (Logical Unit 20) contains rates ofadvance for four weapon categories; i.e., dismounted personnel, heavy armoredsystems, light armored systems, and mortars. The movement rates are dependenton terrain type and visibility conditions.

    (4) The Target Acquisition Rate file (Logical Unit 20) providesaverage acquisition times for four sensor types (optical systems .4 p -. 7 ,image intensifier systems .7p -1.L• , far infrared systems 8p -14p , and theunaided eye) detecting four target types (vehicular target fully exposed or inhull defilade and personnel target fully exposed or in foxhole). Theacquisition times are dependent on target range and atmospheric visibility.

    (5) The Weapons Characteristics file (Logical Unit 15) is used todescribe the primary sensor type, movement rate category, and basic load ofthe primary armament for each of the 25 Blue and 25 Red weapons found in theWeapon Vulnerability file. For several weapon systems the DIAM modelconsiders both a primary and secondary armament. For dismounted personnelcarrying a Dragon or Viper, the model also plays rifle fire against opposingpersonnel targets. The basic loads for secondary systems are updated by theDIAM model logic and are not contained in this data base.

    b. It will be noted from figure 2-1 that DIAM uses the random access filein a read only mode. The random access structure provides the user withflexibility in selecting weapon systems, terrain type, and environmentalconditions for play in the dismounted battle. The following paragraphsprovide detailed descriptions of the file structures. To avoid classificationof this report, example data bases are not included. However, example databases can be obtained from the US Army Combined Arms Studies and AnalysisActivity, Fort Leavenworth, KS upon submission of proper clearances.

  • Blue Offensive

    Blue Defensive

    Weapon Vulnerability(Logical Unit 16)

    Probability of killfor 25 Blue and 25Red weapons forengagement atvarious ranges

    Weapons Characteristics (Logical Unit 25)DIAM Force geometry

    Weapon category, Attriton P t ofsfrcAt......o Percent of forces

    basic load, andsensor type for 25 Withdrawal criteriaBlue and 25 Red

    weapons.

    Target Acquisition M)

    Rates (Logical Unit 20 (Logical Unit 20)

    Acquisition rates for Movement rates for

    four sensor categories four weapon

    for various visibility categories onconditionsvarious terrains

    Figure 2-1. DIAM internal data bases.

    2-2

  • 2-2. FILE STRUCTURE FOR TERRAIN EFFECTS.

    a. The terrain effects data are used by the model to represent thepercent of forces visible to both attacker and defender during the battle.This data base is developed using digitized terrain and military judgment inselecting the best approach routes and defensive positions for a particularterrain location. Figure 2-2 shows the first step in developing this database. A piece of digitized terrain has been selected representing the battlesite. The possible approach routes have also been noted on the map.

    b. The second step in data base development is shown in figures 2-3 and2-4. Defensive positions have been selected representing typical positionsfor two of the weapon categories. Line-of-sight fans representing the visibleportions of the advance routes have also been drawn using the digitizedterrain data base.

    c. The final step in data base development is to calculate the percent ofattacker corridor visible by range band for each of the defender positions.The resulting percents are used in the terrain effects data base.

    d. The structure of the random access file is as follows:

    Record I

    Record Data DataWord Type Description

    1-20 Alphanumeric Each word contains four alpha characters.The record contains a description of theterrain; e.g., "GERMANY BLUE ATTACKWOODED AREA".

    Record 2

    Record Data DataWord Type Description

    I Real Percent Red dismounted visible to Bluedismounted, range O-200m.

    2 Real Percent Red mortars visible to Bluedismounted, range O-200m.

    3 Real Percent Red light armor visible to Bluedismounted, range O-200m.

    2-3

  • '(-'

  • e-4000

    4.3

    CL

    000

    110)

    2-5-

  • 4(0c 0-1 r

    4.2

    4.-I00 -Ca

    001

    4)

    2-6

  • Record Data DataWord Type Description

    4 Real Percent Red heavy armor visible to Bluedismounted.

    5-8 Real Percent Red dismounted, mortars, lightarmor, heavy armor visible to Bluemortars.

    9-12 Real Percent Red dismounted, mortars, lightarmor, heavy armor visible to Blue lightarmor at 0-200m.

    13-16 Real Percent Red dismounted mortar, lightarmor, heavy armor visible to Blue heavyarmor at 0-200m.

    Records 3-6

    Contain the same information for Red targets at ranges of 201-400, 401-600,601-800, and 801-1000 meters.

    Records 7-11

    Contain the percent of Blue visible to Red during the engagement phase of thebattle. The structure is similar to that used for records 2-6.

    Records 12-21

    Contain the percent of Red and Blue visible during Blue withdrawal. The

    structure is similar to that used for records 2-6.

    Records 22-31

    Contain the percent of Red and Blue visible during Red withdrawal. Thestructure is similar to that used for records 2-6.

    Record 32

    Contains the tactical offset distance of the centroids of the Blue weaponscategories (dismounted personnel, mortars, light armor, heavy armor) from theBlue force centroid. It also contains similar Red tactical offset distances.

    Record Data DataWord Type Description

    I Real Tactical offset of Blue dismountedpersonnel from Blue force centroid(meters).

    2-7

  • Record Data DataWord Type Description

    2 Real Tactical offset of Blue mortars (meters).

    3 Real Tactical offset of Blue light armor(meters).

    4 Real Tactical offset of Blue heavy armor(meters).

    5 Real Tactical offset of Red dismountedpersonnel from Red force centroid(meters).

    6 Real Tactical offset of Red mortars from Redforce centroid.

    7 Real Tactical offset of Red light armor fromforce centroid (meters).

    8 Real Tactical offset of Red heavy armor from

    force centroid (meters).

    Record 33

    Contains the corridor width (meters) for the attacker.

    Record Data DataWord Type Description

    1 Real Corridor width in meters at ranges of0-200m from force centroid. The corridoris for attacking dismounted personnel.

    2-5 Real Corridor widths for dismounted personnelat ranges of 201-400m, 401-600m,601-800m, 801-1000m.

    6-10 Real Corridor widths for mortars at ranges of0-200m, 201-400m, 601-800m, 801-1000m.

    11-15 Real Corridor widths for light armor at rangeof 0-200m, 201-400m. 601-800m, 801-100Om.

    16-20 Real Corridor widths for heavy armor at rangesof 0-200m, 201-400m, 601-800m, 801-1O00m.

    Record 34

    Contains the corridor widths for the defender withdrawing. The structure isidentical to record 33.

    2-8

  • Record 35

    Contains the corridor widths for the attacker withdrawal routes. Thestructure is identical to record 33.

    Record 36

    Contains the maximum percent of weapons that will be lost before withdrawal.The numbers represent tactical decision thresholds upon which the unitcommander bases the withdrawal decision.

    Record Data DataWord Type Uescription

    Real Maximum percent of Blue dismounted lostbefore Blue withdrawal.

    2 Real Maximum percent of Blue mortars lostbefore Blue withdrawal.

    3 Real Maximum percent of Blue light armor lostbefore Blue withdrawal.

    4 Real Maximum percent of Blue heavy armor lostbefore Blue withdrawal.

    5-8 Real Maximum percent of Red dismounted,mortars, light armor, and heavy armorlost before Red withdrawal.

    2-9

  • 2-3. FILE STRUCTURE FOR WEAPON VULNERABILITY. The Weapon Vulnerability fileis divided into two sections.

    a. The first section contains 125 records describing the ability of 25Blue weapons to kill 25 Red weapons in five range bands O-200m, 201-400m,401-600m, 601-800m, and 801-1OOm. The records are structured as follows:

    Record I

    Record Data Data* Word a Description

    1 Alpha Six-character name for Blue weapon 1.

    2 Real Probability of kill of Red weapon 1 byBlue weapon 1 at a range of O-200m.(Probability of kill represents acatastrophic kill--both mobility andfirepower).

    3 Real Probability of kill of Red weapon 2 byBlue weapon 1 at a range of 0-200m.

    26 Real Probability of kill of Red weapon 25 by

    Blue weapon 1 at a range of O-200m.

    Records 2-5

    Describe the ability of Blue weapon 1 to kill 25 Red weapons in the remaining"four range bands, The first 125 records on the file are required to describeall 25 Blue weapons.

    b. The second section of this file, records 126 through 250, containsprobabilities of kill for Red weapons firing against Blue targets. Theserecords are structured the same as the Blue lethality records. This file isread in DIAM by subroutine PKIN.

    2-10

  • 2-4. FILE STRUCTURE FOR WEAPON MOVEMENT RATES.

    a. Data in the Movement Rates file is used by DIAM to advance fourattacker categories during the engagement phase of the battle and to move thewithdrawing systems during the withdrawal phase of the battle. The ratesrepresent rates of advance achievable under unsuppressed'conditions. Therates are adjusted by DIAM to represent the suppressive effects of personneland vehicular losses. The movement rate data must be described in meters perminute.

    b. The file contains rates for four weapon categories (dismountedpersonnel, mortars, light armor, heavy armor) on two terrains (open andheavily vegetated). The file is structured into three sections keying onthree visibility conditions (clear day, clear night, and heavily obscured day).

    (1) The first section consists of two records describing Blue and Redmovement rates on a clear day (visibility range greater than 15km). Therecords are structured as follows:

    Record 1

    Record Data DataWord Type Description

    1 Real Movement rate of dismounted Blue in openterrain (meters/min).

    2 Real Movement rate of Blue mortars in openterrain (meters/min).

    3 Real Movement rate of Blue light armor inopen terrain (meters/min).

    4 Real Movement rate of Blue heavy armor inopen terrain (meters/min).

    5-8 Real Movement rate of Blue dismounted,mortars, light armor, and heavy armor inclose, heavily vegetated terrain.

    Record 2

    Describes Red's movement in open and close terrain on a clear day.

    (2) The second section contains two records describing Blue and Redmovement rates at night. The form of records 3 and 4 is identical to records1 and 2.

    (3) The third section contains two records describing Blue and Redmovementrates on a heavily obscured day (visibility range of 500 meters).The form of records 5 and 6 is identical to records I and 2.

    2-11

  • 2-5. FILE STRUCTURE FOR TARGET ACQUISITION RATES.

    a. The Target Acquisition file data describe the ability of four genericsensor types to detect four types of targets at various ranges. The genericsensor types are unaided eye, optically aided eye, far infrared thermalimager, and image intensifier device. The targets being detected arepersonnel fully exposed, personnel in foxholes, armored vehicles fullyexposed, and armored vehicles in hull defilade. The data represent averagetimes for each sensor to detect each target at various ranges. The file isdivided into three sections. Each section represents detection capabilitiesunder conditions of clear day, clear night, and obscured night.

    b. The first section, representing clear day, is structured as follows:

    Record 1

    Record' Data DataWord I Description

    1 Real Average time for Blue eye to detect afully exposed vehicle at 0-200m (min/target).

    2-4 Real Average time for Blue eye to detect ahull defilade vehicle, fully exposedsoldier, or soldier in defilade atO-200m.

    5-8 Real Average time for a Blue optical systemto detect four target types at O-200m.

    9-12 Real Average time for a Blue thermal imagerto detect four target types at O-200m.

    13-16 Real Average time for a Blue imageintensifier device to detect four targettypes at O-200m.

    Records 2-5

    Consider Blue's ability to detect four Red targets on a clear day at targetranges of 201-400m, 401-600m, 601-800m, and 801-1000m. Their structure isidentical to record 1.

    Records 6-10

    Contain detection times for four generic Red sensors to acquire four Bluetargets in five equal range bands from 0 to 1000m. The structure of theserecords is ideintical to records 1-5.

    2-12

  • c. The second section contains records 11-20. These records describeBlue and Red ability to detect targets on a clear niqoit. The structure ofthese records is identical to records 1-10.

    d. The third section contains records 21-30. These records describeBlue and Red ability to detect targets on an obscure day (visibility range500m). The structure of these records is identical to records l-iO.

    2-13

  • 2-6. FILE STRUCTURE FOR WEAPONS CHARACTERISTICS.

    a. The Weapons Characteristics file contains data describing thephysical characteristics of 25 Blue systems ana 25 Red systems. The data oneach weapon system are used by the DIAM model to construct firing rates foreach weapon. The file also contains pointers to the Movement Rates file andTarget Acquisition file for each system, allowing DIAM to retrieve the propermovement and detection rates for each system;

    b. The file is structured into two sections. The first section contains25 records describing Blue weapon characteristics. The second sectioncontains 25 records.describing 25 Red weapons. The records have the followingstructure:

    Record Data DataWord T Description

    Alpha Six-character weapon name.

    Integer The type of primary sensor contained on

    this weapon: l=eye, 2=optic, 3=thermal,4=image intensifier.

    3 Real Round flight time of primary armament(seconds/200 meters).

    4 Real Number of rounds (bursts for burst firesystems) carried by this weapon.

    5 Integer Weapon platform movement category:ladismounted personnel, 2=mortars,3=light armor, 4=heavy armor.

    6 Real Weapon firing cycle time. Thisrepresents the average time to aim,fire, and reload the weapon (seconds).Munition guidance time should not beincluded in this value.

    The Blue weapons described in this file must be in the same order as theirprobability of kill records appear on the Weapon Vulnerability file.

    2-14

  • CHAPTER 3

    DIAM PROGRAM CODE

    3-1. INTRODUCTION.

    a. This chapter contains information on the DIAM program code. Thisintroductory paragraph discusses programming philosophy, concepts, andtechniques used in constructing the code for DIAM. The second paragraphdescribes the functional areas of DIAM and presents a system flowchart. Thethird paragraph contains figures and tables that briefly explain thesubroutines called from each functional area and the primary variablesinfluenced by each subroutine. Paragraph 3-4 explains the self-documentingconcept used in DIAM with examples. Paragraph 3-5 contains the DIAM code as asubroutine called by subroutine INFANT of Jiffy.

    b. The following guidelines were used in developing the DIAM code toF allow for easier understanding, maintenance, and modification of the DIAM

    model.

    (1) First, all subroutines are nc *loger than 150 lines and arefunctional in application. Efforts were mace to keep the length around 50lines, and only a few subprograms are over 80 lines. The biggest exception isthe main DIAM subroutine, which is around 500 lines. However, this mainsubroutine consists of functional areas or separate procedures of less than 50lines each.

    (2) Second, the DIAM structure is basically two-level. Only the main4 DIAM subroutine passes control to and from each subroutine in a top-down

    process. (A third level is occasionally used when subroutine INIT is calledto initialize an array.) This design allows for easier understanding ofstructure flow than do higher level structures.

    (3) Third, the DIAM structure includes IF/THEN/ELSE statements, nocommon blocks, and self-documenting code. IF/THEN/ELSE programming avoids "GOTO" programming; with proper indentation this makes the structure flow easierto understand. No common blocks allows better control of debugging andtesting. The self-documenting technique, explained in paragraph 3-4, was usedto facilitate understanding, debugging, and future modification of the DIAMcode. With this technique, each subroutine contains all information and onlythat information needed to understand the function of the subroutine.3-2. DIAM FUNCTIONAL AREAS. This section contains a brief overview of the

    functional areas in DIAM. Figure 3-1 is a functional flow diagram of themodel.

    a. As shown in the figure, the low resolution data are loaded first.Since DIAM's first implementation was in conjunction with the Jiffy Model, thelow resolution data are re:eived from Jiffy. These data could be loaded bysubroutine calls from the ,!in DIAM subroutine if DIAM were used with othermodels or executed indepenG.-,.ntly. The low resolution data include Blue and

  • SLoad Low

    |ResolutionData

    'Load High LodIiilz

    Resolution |Weapon Variables

    Attrition

    LoopF--B egin

    Attrition! Loop

    Calculate Determine

    Rounds RedFired Disengagement

    Calculate DetermineLosses Movement &

    Positions

    Determine Determine

    Tactics Suppression

    Determine Determine END

    Blue End of RunDisengagement

    Figure 3-1. Flow chart of DIAM module.

    3-2

  • Red weapon systems and scenario information. Predetermined artillery lossesfrom Jiffy are also included, but artillery could be modeled differently inDIAM for different applications.

    b. After a gamer selects the type and number of weapon systems and atactical scenario from the DIAM library, the DIAM model selects theappropriate high resolution data and weapon attributes.

    (1) The high resolution data contain terrain information for bothforces, including visibility factors, attacker corridor widths, anddisengagement criteria. This information is contained in a library and isaccessed by the type of tactical scenario. Currently, the library containsterrain data for only a few terrain types. These scenarios require minimalset-up time (approximately 2 days). In the future as many as 30 scenarioswill be available for access.

    (2) The weapon attributes selected are from a data base developed forall possible weapons played in DIN4. DIAM allows a maximum of 10 weapons perside in a run. Weapon attributes include probability of kill, weaponcharacteristics, movement rates, and detection times for all Red and Blueweapon types selected for a given scenario.

    c. The next two functional areas are initialization procedures. Thefirst procedure initializes variables, arrays, indexes, and counters. Thesecond procedure initializes ammunition loads, artillery losses per minutefrom Jiffy, and distances from the force centroid to its weapons for both Redand Blue forces. Defending minefields can then be entered, and the forcevisibility tables are initialized. Both forces are entered as dismountedforces. The attacking force then mounts its vehicles after the number oftroops to mount is determined, and the attrition calculations are ready tobegin.

    d. The attrition loop starts by determining the distance between Red andBlue weapon types and their respective range bands. The range bands are thenused to determine the visibility factors and the probability of kill betweenRed and Blue weapon types during the current minute.

    e. Using this information, the next procedure calculates rounds fired byeach Red and Blue weapon type. The results are calculated by a sequence ofsubroutines that first determines number of engageable targets, time to engagetargets, rounds to kill targets, and time to kill targets. From thisinformation, the projected rounds required to kill all engageable targets foreach weapon type are calculated. These rounds are limited in the finalsubroutine to one-fourth the available ammunition to determine the actualrounds fired.

    f. The next functional area calculates total Red and Blue weapon typelosses during the minute. The primary attrition loss calculation occurs inthe first two subroutines using the equations developed in chapter 1 where

    3-3

  • initial losses, and then total expected losses, are calculated for all weapontypes. Artillery and minefield losses are then determined before the mountedinfantry personnel losses are calculated. Mounted personnel losses aredetermined from the losses of troop carriers and proportioned uniformly acrossthe number of personnel inside the troop carriers. The Red and Blue lossesare tallied, and the remaining Red and Blue weapon types are determined. Thelast subroutine of this procedure generates a killer/victim scoreboard forboth Red and Blue weapon types.

    g. New tactics are determined in the next procedure. Currently, DIAMplays two tactical modes: infantry personnel can dismount troop carriers at achosen distance from the opposing force, and a percentage of armor vehiclescan go into overwatch, also at a chosen distance. After new tactics aredetermined a killer/victim report is generated for the gamer at chosen minuteintervals. The gamer then has the option of continuing the engagement orwithdrawing one of the forces.

    h. The next two procedures determine if Red or Blue forces disengage. Asmentioned previously, the gamer can trigger a withdrawal. If not, attritionlosses are checked every minute, and a force will disengage at a chosenattrition loss level. At this point, the gamer can again override thedisengagement and continue the battle. Hence, in DIAM the gamer can havecomplete control of engaging and withdrawing forces or allow the battle toautomatically disengage forces at chosen attrition levels.

    i. New positions are calculated after disengagement is determined. Theattacker moves forward if engaging or pursuing the withdrawing defender. Thedefender always remains stationary unless withdrawing.

    J. One of the last procedures calculates fire and movement suppressionfor Red and Blue forces. This procedure is processed last since suppressionis calculated as losses received divided by losses inflicted for each weapontype. During the first minute fire suppression is assumed to be 50 percent.Currently, suppression in DIAM is consistent with the method of suppressionplay in Jiffy where firepower ratios are used.

    k. Finally, the last procedure determines if the attrition loop continuesor ends. Currently, 1000 minutes is the limit during Red and Blueengagement. When either force is withdrawing the battle continues 10 minutesbefore ending.

    3-3. SUBROUTINE SUMMARY. Table 3-1 provides a cross-referenced summary ofthe DIAt4 subroutines and their primary variables. Subroutines called by eachfunctional area are shown, and the function of each subroutine is described.The primary variables for each subroutine are listed and described.

    3-4. DIM SELF-DOCU ENTATION CONCEPT. This paragraph explains theself-documenting technique and variable name convention used in DIAM.

    3-4

  • u WCS-u CL

    4-o 0•

    30 3- 0•0 oS- ()

    W- 4) S- CO) L (= 4-4-2 ý U o• (ao~ >,' 1

    M- -.,- 4-0 0 M IA -

    ' m OD 39-J'- W 0 C- -1"0" ."0 ur o •" 1 -C a) (AV) '0

    - o) - )•>U 0 4J*.'- 0.) (0 (0 ) 0)

    0~ 4-) C) -V'r- $--4 J S- M) 4.M 0)

    "Cc C" , '" .0a '0 S- S.-U 4)

    tm 0.)1 o. ae*~ a3 0C u.t mm= 000I

    -, 00,•CO> > > 4J .4" 4J 4 4J 0. 4. O

    xf 4.-.L' 4.) 4-)C.f >1 U 4.9

    w o-Q ) 01.•. 0 j 0) W S.-

    50) 1,. -),,- J) 1--O .4- . -. 1.J 0 0. 41 W

    41 0)4 -CU C 0C X L) 0 0) 0 4) CO00)

    06 -0 (.)A 4. J 41 4-L4-'- 4UJ 0.SV0 f 4" 4-

    (A 44 0) t1 fu >)0)to S-0S9 t 4-)

    >1 > 0P > "-- 4J4 - J a C 4

    0 4-1 -- A(0 4J W 1 .. MJ' 0' 0J_ =. -0•.e u 4

    W• 4" W "- C " 0 -, Q) Q -,-" (D c W 40) S- Q " 40 -0r- L. W. (1 (,) ") t C : c3"0 0 a 01 ' 4-iv0 C- (L S- u• g u 5 O1) L- s- s- Fn toE- M ) 1

    0 .,- 0J' tA .U C• 0 Cn C0 C•0 W• C U0 ) 4 Ca

    0) L. .10 4- 1 ",- L.w -• t- l: l "wr "L S- 4-m S S .0 LC

    . "- (a 0- ., )l = q) 0 US- w-- 0 1-3 w = c . ou ILSo to' U. C.< U UUU UU . CdW 0 OW

    1..EU

    CL-,'- I-- C -m I- CL a .0 L L- 1 i c cc.c c d0 c

    * *0

    u toU)1 C000

    0 L. (f0 0 O41~ "0o >03.e 04 aU u W 4)

    to. 0 J c CO 00 .- 0U c:~~~~~~ 06 MUU UllU U E4-) 0) LA.) 3C0'~ U L-.) fO. 4JWS Aw cm

    0 >so - Swr04- to U 4)'a 4j C00 'u 1.. 0)00 0uL 4-4 0S-.. )9

    404)S1 'o)u "a~U ~f04 4U.))O 4US* C1 0) 1 4.)= 0)to.( f). 'U (D 4J -W U 1 (0

    U- o9 4j)0 L -0 () t 0 1-- -0C 40 u4)4 'U -'1u 1-C 049-0 C C

    o 'U 0L -Ov $- () o. o00)0 54.0)A1 4-~ 09 0 t7)0 MO. 0. 'AC-

    V)( .0 >1- ' .i4- t LU0- Q)>1> t r , 4J

    'U (A.4-U L.4>030.03 .j.'' S..JC>4J 4 V-'00 0 r

    04 . 1 w E400)l W L

    0 0j

    .0. 0 I-xV

    4.)

    0 0 >0

    to 0 0 Ca.0WC_ 3: - cm.- (0 4.) 4.)

    0. 001)j4-3()0 - . S.-01 - -ao (0 0'D t 1-0Cc (0 0 4-) (0 0 4-) (0 4-)

    0 () Cc 0 0) M 0 4-i

    3-5

  • 4-

    L >14J $-4-a 4.. L.x (0 .a d) Q)

    * x-, to- m 4..-f" ~ 14) x f_K u~ r_ a s

    "°4 4m • JXI .)X•U.., •a - .'.. N c O 0 0 S a, N.a ) fuI• .,te W -r- II , €J.-,€ 0 0 C:• i~. 1-.-., 0e,0 S- ) X 0.- 34I- C f - -4 V ()(r 0 S 1. 1-'0~ (1 Vfl0L NS-) 1

    C6 diU. III) S. I-x S.03C -4- t-xr E 4-IOO (Alo 4 O

    .0 c .i "ll t'v iv "0 (a:: I- C' .f F o -A - N" i,S- U Ms Ill dj= • •. u u 'r- to S,..-,--0 C,-L 0 C$ -. E 00e0*,CC 4 U,( -

    ~~0)4- oIII~I~4.

    3I- f9 -

    o) C4 )00 )V a~ a)I- $-- 4 UUt ~~~(1 f.- - A -0 0

    U C

    0'4- X 39 *r° tA>0 1>Jw )t -0"

    04- N 4

    ., 4 C,- C 00-- W W-• o M ) d 0 -) t ,o, I

    u5-

    L. 4- ZV§0 " ZV=' a- 0C " ' S-

    .0w whwu coww mmwwm

    0 23 0-V*,'- z c -j.,)4-) Uu1

    d,, .- '9-

    0

    .I-

    o '*.0- (~.

    4 Nd ro4

    c 05-

    0. (L) 4l

  • _________ ... Q

    •U)S-

    0, qJ >1 0 .n 4) 0 0>~ 4---

    a 4- "-, OJ (A. c Q-

    4 - . 4 -4 - Q ) a) . ,- ; ) S

    -4 f- () (U (An%- S-. (2) CL

    S - L. 0 . *,'- .U 0 4- S.- ) .

    0 0. 02 4. C ) i- .n 1 .

    c C U 0 4-- W 1o

    4-o 4 t u 4.)t * C - o

    ,,> to C u'o • 'o •

    ~~~~~1 (a >j un 0 4-' Q '- Q . . ::k : .- u "0 0 • "U) u.

    a) tA

    S- . 04- s 4-) 0 M 4) ' 0

    Uo 0 m a LCO O (0 c 0- C L

    ,_.,-. S. . 4-" U) C•O ne 0 4. iU) 2.

    1- (A "0 0O a o. C Q) -. x .4. .

    C- S ".. 0 4- -fl0 o a) OL 0 x 0 W 0

    0 0 0 r-U)--.0 0 0 0 S.

    S4- 4- ut I (A W 4) U) 0 2" 0

    (0) 0"

    *r) 0 (0 0A U)A -0 SL r4 - 4-

    1- 0 (U (A a~ 1I S-U U) ) *r

    (A 0 A 0 o> fu'O n-. ~ U -? .

    o O u co 3 CL a wo

    n •- - U 0 C- ,,-- 0n s- W 4 -s.

    . ,- •,->~~~U)~t WU SCr44 - S..-~ SOS

    0 >, C- ' - 4- 0 0 0 S- 4-

    S -S. 0 0j 41 s. 0 0U 0 ) r O 0 -

    a-. 4-- O S- o~ to? - ( 0 :0

    >1 N N4-- 0 0 4-)- 4-U "

    0 1-0 - OU) 0)U 0 u (-)? U)S u.. 0 4G-

    , , ,3 C L- 0.0 t - E " 0 ""

    o ) o f-f a C M4 0. 0 O ZCU) ) p0 0 U) U04) . - U)tor

    4 ..• W- ' tL3 0 S --0S

    iS -4 - 4 -C 4.. 4J Co cecu

    S 0 ,- "a O 0 0. l .,

    cc z 4 .O

    to C ~ co

    0 0

    0o to ca-"

    o r

    U) w 4- C- 0 ZC-

    S.2:K X --U (U w~ ccn 4 r. c ))-

    V) 4- 4-)

    0 Nr_

    C 4 a

    10 rd 4-3

    4J-( 04

    ILL. ~ .3-7

  • (A

    0 4-.

    -U a) 03 41f0 l 4-0W0 -4-4'a)w 4J a)

    (V .4) >a)a)c o 4 J a . 4 J W 0 o M . CL

    cc co 0- a 0) >) Wa

    4-)~~ ~ ~ ~ a) 4-a)( 4) 4 -)LCa)~a (A 0.0m.1>1>

    4J -0 W s- S- a

    a) V3 a)0 >f CL> > 43 43An a) () - 1 4

    3, m) a) 4- t

    a)-W (A(.a

    4c >1 aa))0 :3 4)c '~l 0

    0. '- >) 0.3> 0 ~ (a to 0

    (a- C L 4 - > 0 co 5o a )m .41) 4 -', 0-4 4 -3 4

    M~~~W 0W > in -

    c : ) 4-)C) 0) 0 .4 0 (A 00 r- a0 W

    0 a) V)(a 4 S-~L cm CU a1-.(4- .4-0- (1C) , S-I3 (a M - ' 0 0

    4JW :3 )I 'fl> co w 0 . ~ a) CL M 0 0c.o> 4)IU~0 -o cý

    (A 0 W5 ) 4Ll- aCL W-4,4-

    ~ 0 00 0 .c 0.)0 4- 00 CC ) c~ :3C' a) -s-.a.4~ 'a Q~~)W UWU' (I r->

    a) c W

    I- R)if3C C C CL~Ic 4.0 04)J- ~0 4-)4) CY > 4)

    >1 ' >' 1 V) >) a)>1V 0 a .

    V c0_ 0m 0 CU E E Cý V). 4-I/ a)--- c ~ z

    I-. .=. A .0 0 J30 -J 3N 4-CD o0

    .4 .4 w D

    to 5' o 9- cc (a 'E , 0) m vw = e 4-) S-~ W S 4-

    V, 3. V) 3C C 3: c c c~ 0.0 s-c:$-cI-0 4 -3 4-) 03 00 4J 4 =

    (0 (a- cc V) V)c U 00 (v--

    CLI-I

    m- 0. 0 0 cc: ce 0L 0. V) V F- 1-- 03cc: ca w c

    a) Cm 0 0 cc0

    :3 (0 a ) a) a)

    co c >o r_> 4- 4-3

    *0 S. W~0 00 a a)W . co

    0 to 0) 5o I-) OW r

    0) C -W0) V) Ce- 4--a) Wa ev

    CM0.a

    "0 Ua"0 0 0 4-) Co 0) M) 400.4.) 3C a~a 0.a4 cc

    0 Q - (

    U 4.u' V'0 M0. 4J rOW 4- CLJa

    I- c c 0)4- C>). 4-3 .4/) 4-)O IW 4) 54-) >

    U 4J- 00. m u-. a') Wr *-0d W0 (1)4) a

    cL (Au 4£ /) 4- >1 CL) 0 .)0 CM5. E .5.-

    4.-)

    = a) CC ) Ca) S-43V 0 C M (M r-a

    aU 0 CL0 n00 C t0C ma 0() 0 mW 4-3.) 4-)4)

    to3

    C a) >) m0.>1 W 06 0 c a) a)

    a)4J

    'a 0). C 4-) Cr -0 c4-)0 ca) 4-)WQ 41)

    41) *- 4-) a) Wa C

    to0 0o E~ E

    ~;

    Wa06d) ()a) r-. a W 0i ua> a) W u

    04.-' occc "04. -'0 Q.4-

    a-)

    CoC

    to 0- 2! .4

    - 0

    0 -

    0*ato 4.)

    W.a C" 0-L. 0 00-U-~. caC--

    3-8

  • 0 c >) CL0. 0 4. -) En

    0n (O a . .4 1 0) 0a) (A a) to c Q.())m. Q W 0 0 a 0. a-

    >,O V) •. CL . ,-- CL 0= 41 O > --t•(n n 0. W 0).0a)(a 4-) 0m C

    .n .. 4 (A >4 .-) ) to0. .a a) 0 0 .1

    WO 0- ) 0.En40) o V 0)E C" 3 o)E- >n•0. Q) 0 a>$ 0. ,.-- a= W) 0 c 0.) 4.) 4->)0m >-j0 4-CLC > CO 3: 0.0 >0.4-)>- 4,-" Q. ) 04) 0) O -0. 4--" n " -

    (0 C -. 4-)0 - 4- 4-. a) 0--- 4-) ( 0 0 0c COJO 0 ( C 0 0 aO W0 w CLO 0.Q.

    0 r_-0 3- -C ) 0w 0 a 0 (A (a0. 0 0. (a 0 030. 0 (n 0 0 (A 0 Q)- -(00. D-. ( 0) 0) 4- 4- fu ( L 0 3 30) (a 10-0 w .n V- 0 0 W W (0 a) E ,

    •o (1)- 3: ce 0• 0n (A 0 3: CL (L) O "" -

    "3a) S- a,)3 •! - ) ,L 4-, 0.0)o 3a : 4 04 0 0) (gA0 0 0 3 'a J

    (1) 00 0) Ca () C 0 cy 1 At -4- - Q) 43 'r-~ .

    4.3 cm "w",3 03 e O 4) 0 0 ca -- > >50)( 4-40-4 4-),4'~ 4- 0 (A cLE~ >- ~

    >) 4.- W0 0)0) 0 00 0 a ) 0 " ao

    "0 (A. 0 'Aa )( -4

    -- .- n " _ 4:) 4-) 0 0 . W CO "*", a) aCOaCuu (0 .. ,A EU - .,- "I C C C SS . "00) a) a) (D 0)a) EUEU 0 - 0-

    (a- o- 0-0 0 J ca M >.) 0 A o0 "L. 0 (0 Q) to'

    E 0) 4-• - ,. 4-.4- a _0)4. ) - &• ) "C 0) >,--) 4- --

    EU 00 4-t 0 X X 00 Q) ) ( -0 0 0) 00 .- 0)

    S.-. (A.- 'A 4-- El) 4- 4- a) 4• E El) ' ,-.- (n El) El)0) :(00 o Cc CL A 0. (v U) -Is 0J

    C_ r_ S. C C ZC 0) >.) a) .-I)..0 (a W Ia) .to-to U.J0 0

    S- = = M = 4-3 0 4- C r W - -P = . 'a -

    (a o V 0 0 C "0 (4- " EvV) LIO V) V) V) n :- O

    EU *--C-n00

    " ad -. ) O -0 -J V 4- L (n --. L. t- LL 4.. 00. 0)- _ )<

    0)".) 0)-e-EU C-

    0- 0 m X- a c"m- CW

    4- . o) C o0 0 t L WV EW 00J co co- EU +J EU aW En (x ca)l c

    .,- O,-- 4. ,--4-. +.E ')3 C } 00 i-.4

    u. (.Vt.. 0)0 o -Jo)

    E

    fo .".I - (A -0 -0(CU0 - U -0

    0~- (A 0V~ co r E -~ -0 ~S.. (v (V) 0 0 0) 4- c. 05 0.

    .0 aV EnE (a -V >V -V -n ca .,-OdU4

    o EU (MW EUEU EU UC (0) EU0CL EU" Q) (A 000"I'

    El1 Q) M (t uo0 4-J EU a E )V L) 3 L C... En

    0) )0 3r U 0()V

    a) C) #A (A) S-04)C A ElA)) 0 A-0 00C (V a 4)alý ) El) co a) 39 ) (A> 1 El)S-

    4-- C. 4J~ r- 41 41 1J El4J.(..J 4El0) 44-) C a 0 to toj io to CA 4.) (a 0

    =) 0 42 La..= ýM

    SAL u uJ CU aC Q L- u ' . -C

    -0 0 Ca 0 A( - - a ý0 t

    0 0 (1) (0to (a )( a (EUCUr oW ou aV).E ru -4En)W iM . W Ut ~ 3 )3

    = )0) m0 'I ) V0S. 0C) 0 OH z A( U ) )

    S- S..

    to (A04-(40aU.. " OC-.) 4

    0 to C t3-9

  • 0 6r-S.-

    4-) C-

    4-) (1) U Q)(U 4-)x (l cu

    x x Q) x L. u )X 1)x () x -o0 a) 40 &.- 0V x a• "D a)o ax C- 04-• 0 S-

    -0 Q" a. .. - a o(0) (A)4.U 0S . 'm- , ,-' 0 0 0)

    0 4-) OC O 3 '',- 0 > ,- 4.-) 0)>C- C4- 4-) U M0)0cc C3W3-

    4-J m4 a (04-) tm o 5-0 --"m" 0 ("30 C'a- 5 0 a C 0 _c'r- 5 3c ("- aO- 02.0 ',.m 0) 0S. (A () 0S- "r Q) 4.- .m 41 -- . 0 w O0

    L *'AI >0() 6-u V) (A 4-.2''** 4J)' 30)3(U :(In " 0 > " ,-" 30 ." IA 4.) 4-. 3 40W

    >•) "1 0 D m 30 a 0) 0)3S- • c ) 0) () 0) 0O. o0 .00).0r0o u 0 L) 0 a) u 13 0) 0.0 ' "050() S-0 U S- L -u S-. Uý ua(a0. (1) ) 4)o•• S-• 0 S- 0 S- 0 0 S-• • (L 0 WO

    .3 4- 0 4- 0 4- 0 4- 00 300 C_ CC1 to 4.. 4- 4-. 4- .C 3 -0"4 0'

    a.- 0) 0 00 0 .a+-) C --.)C"" XO }" "0"0 :3"0 ="a = 1

    O ,-- ,j 0 -) 0 -) (- - 01) 0 0) ''" "-ýw co W ca ol co o oWci i cc: 0m m

    (InV)

    S-n V) '/) c 0. C.

    r . -- - X . , Ln ) a-. 0m 0 z. 0 w ."a S. ro n' 0 0 Q3 (m• 3" =• "3 -=, z • 3: c oW

    a)1 41) a):)0 _Eoo S

    u • . 0 0 - 0 0 0 00 0 a

    S,;,-, s - . I- V S - 4 O (n -- 4 ) (A - .- J .,- 0 V) r- ..J 4l- tioo 0 (A• 0• 0) 1 4J 0) (a 4- -3 (L) (0,I (14-. - =. u . 0 u - 0 a U a a " c 0- 0

    4-) V. 4- S -Q),-.r 0 0O (2) 0)-m cm m C o u- 1 40 . - )-).r- 4-0 0)0 - 0 )4

    c U 0 0 o- 0••) 0 (0 0r, t 4- 0 .(M} 4-J t0 E 39 4- S- s. &- o u S-- S (0

    c 1- 5-C U L4-)( In0 -IF- 4J 4-0C L-..4J 4-. 4 '0

    0 t Uo .0 ) to -- )I)-- 4 .2) 0 4"-$. .•) 1--.)-0 Z 4-k 0)-4 4J 4 4/ > .r 0 a :3 (AXCC - "0 4- C I(MI. ,o

    '0 4-) 4J 4-) tO ý 0 ( m ý . 0 ,-" LL • --- 01"0: • • E (0

    4.. 5-I to 4 S- -V-6'. 0J caI'. w zwm Q aaW 0 a)) ID n(

    c- • C S-- a : V) r- 4-. 0) (V N ) V)I O N Q > 3') U1-Q"" 4-. 4- Q) 0 -" : 3 0 _4- 5-5Q= r- .- 40 U- C.." 0 (0 S-W U C E 4-) - C 0 ' 4O -- to .r . 0 4 r-") ( E. 0

    0 •) *0",U "0 0 S-.. 4.0 I- 00 Z-0--- C: 4- CO(A 4A- 4.) Ad4. 4J>6 c o 0 n~ V) "-o ý 00 4-I .!E'±( * 0)0 4A'

    o) 0 .4) .),0 .,.-t a .0) 4.,- 1 %V . 4-3 tO w a tor_,. (- 41 C- 4 (A (A E D 0) (m • -• r- c- ,(.m (mo C}•" , c 4-4.J C, '.3 >4 -S .- = o - (a e- 0 ,0r O c -0 '0 to 0

    0- C 5- W-E~" 4/-0 CW W~0 C0) 43 30r D -- J 4J t0 -- - '4 Or-0) 0v 1 46V. $,. S- '4-'0t r_, "- 0 0)5-

    S- 0- 'U ( .'- -. 4- f 0) w V) 0 fO n0 * ww0 a) o. 0) u 0) ,o 3 w.0 .4-) V 4J 0 V)' u tv s- 4- -v) o o--- 4- r- + V) 0 -(A O) C 4J ,O-- 4- M

    CU 0 . o) 0 0 *,-- C 0 0 0 .,(V -i- 0 .- J ' Q VI = ',- 0 - .U = a) 0 1c (0 a .V) 0" 'Q ( >0) ý-- 4- '0M.'01 C O - - C 0-' '0 C O -4- bCc: U 04Sr"• • • (:•-. 0)' •.- 0 " 0)C- •... v4w. r"C' )r-- J 4.)_ W' : (.. n:4

    4.3 .0 a) VC >. '-)

    Cý 0'-00 *.COO cm (m.--uU.) V)0)>o/ o 0 00s 0-.4 0' O0''4 0r---.-"- 0 U 0--

    t .o ... V .)00) W. - --- m-

    * 0 u r_ 0 W a/ 0"0S-U a) . u D -- 4 - -

    4-3 4-) 0 C 4JS C

    '0 ") (U tr- ' 0 '0 WonCu C= M- C01 C - -0- .6- Q n *6,' 0 a)' a0 0" 'A0,,u S- 0) Z 4- Q) ca) Q: ) (Dc < 4. u 4-) (n 4-) In 4. 4J 0

    S" a ) 4- co ( 4-- ,,0 0 00 • . 0

    3-10

  • tA 0 0 c-U• Ua) "- " 0 r a) (

    (1n 4) U(3 4-) 0 C- (. )r" alI) -: CL (o--

    (nO 0 SC a) (AQ

    > ~ ~ ~ CLS v 1S-fto .)U ) *o 6 C L 4 )(1)f(l cn Si- 0. m

    - ~ V ) to=0.~

    (A -) 4-.,-3 U:0 0 a) U)L-,'. . >,).0V 0. 0. 4. Lw

    S•- -0 CA 0.- 0 0 4. >4- a) (a a) 4- o 0 0

    C- a) 4-4-O •••

    S- CL CL > 6S

    . 4-) " 0 : "'"04-) "• 4 '0 C -' >

    V tn 4-) W 4 0 - 1 0 4J -

    -) a) r_ r U), --U o 4 - a - ,) - 4 0, C=

    "- "a 0" o C(a 0 comr 0 o 0 "0 u-

    *.- OU)L U ,-- 4 ... *'- - .'.- S

    E Qo Mo 4-C - ( 0C- o- L-

    4. U 40 o 0 ( -- cu 0-0 3 . 1 ( >) 3 L. a) L. &- U) ) -a -)0L (a --- - ". U t) 0 . -:- 4- 4-U

    0 • C C-C U)U

    - 0- 0 .- 00 'a

    m M: ca e- ca w-

    >)U m C CD UrC COC5=0 V) (n c 04J4 -cm

    *'- C -U,- I--: U)"UO --"SS O Q. 0 CL V C-(U3 I-• 0 V) U) "-)' _

    o w co w~

    U)•

    _ a 0-10 tou 4.) V (1)

    I-V (A 0O(/) UCr 4---

    4- S-. V0S- .1

    V VU) IU - 4)(U)) U)V tn ) =.I

    C V 0 a 0 U 0 4-'- (U)0 r- 4- C ."- UC (0 E

    u(U W1 Q) (UU C(A ((A =i S- ~ Q) S- >~4- . DL4 U 0 o . S- a) Cý aC S-.

    U U) 0 w)U Q) 0 S-4-).c CU)>, Uý ) U004-) "0(0 (

    4J~ to5a) 4J4) (a _00 S -4JCC:3. (UU)U) - 41) s-Q 5= -0 '- = ~E 04 -3 -S-U 0. 0U W4J U) 4-) a) u

    fl r4. 0. - >0 U C CA (/4. C

    to (AUU (..)54- E 50.Cu..

    (U

    4a.3

    0 a) CL I

    : -(0 w .ul u

  • a. The main program is sectioned into functional areas or procedures and,with comment statements, is self-explanatory. The main program's primaryfunction is to call subroutines. Each subroutine begins with a briefdescription of the purpose. When a subroutine is called from the mainprogram, the parameters in the calling statement are listed so that returningvariables are at the end of the argument list. All parameters are explainedin the subroutine called.

    b. The following variable name convention was adopted for single and dualpurpose subroutines. Single purpose subroutines are those that receive onlyone set of parameters from the call statements of the main program. Forsingle purpose subroutines, the parameters match the calling parameters of themain program. Dual purpose subroutines are those that receive two sets ofparameters from the main program. In the first case, the set of parameterswill be Blue force variables that contain Blue force information in relationto Red. In the second case, the set of parameters will be Red force variablesthat contain Red force information in relation to Blue. To represent bothcases the variable name convention in the subroutines results in "X" forcevariables that contain "X" force information in relation to "Y" forceinformation.

    c. Figures 3-2 and 3-3 show subroutines INDX2 and RNDKLL, a singlepurpose subroutine and a dual purpose subroutine, respectively, being calledfrom the main program. The dual purpose subroutine RNDKLL is called twice,once to determine Blue rounds to kill Red targets and again to determine Redrounds to kill Blue targets. The first time the main program passes Blue andRed arrays to interpret "X" force for Blue force and "Y" force for Red forcevariables. The second time the main program passes Blue and Red arrays tointerpret "X1 force for Red force and "Y" force for Blue force variables.

    d. A knowledge of the tactics currently played in DIAM is required tounderstand most variable names and array variables. All weapons played inDIAM are categorized in one of four groups: dismounted infantry, mortars,light armor, and heavy armor. Two tactical modes are played by the weapons:mounted/dismounted for troops and carriers, and heavy annoi in overwatch.Table 3-2 shows the tactical modes for weapons in each weapon category.

    3-12

  • C INITIALIZE ARRAYS AND VARIABLESCC DETERMINE INDEXES FOR BLUE AND RED FORCES

    CALL IND)I IDFýCB0FATRDFA7 vBFRCTP*8DMMAX9RDMMAX,! BWDRW tRWDRW tBDOHiV 1DMV/B OVWIHqROVWT IH)

    CALL INDX2 KNTMNTIKWDMNI FPFTMtBDSN&,RDSNGtAMFLD,I BDFAT ,BFI.SFRRF LSFRIBHOLDStRHOLOS I

    C******************** SUBROUTINE INDX2 ********************CCC

    SUBROUTINE INDX2 4KN7MNTKWDMNTtFPFTMq3DSNG6RDSNGAMFLD,1 BDFA7tBFLSFR9RFLSFRAtHOLDSARHOLDSI

    CC THIS SUBROUTINE INI1IALIZES THE FOLLOWING VARIABLES ANDC INDEXESC,

    C H1,HMNT MINUTE COUNTER FOR DIAM BAITLEC KWDMNT MINUIE COUNTER DURING WITHDRAWAL IN DIAMC FPFIM MINUTE COUNTER FOR FINAL PROTECIIVE FIRESC BD)SNG INDEX FOR X FORCE: I:ENGA(x]NG, ?:DISENGAGINGC RbSNG INDEX FOR Y FORCE: I:ENGAbING, 2:DISENGAGINGC AMFLDI)I INDEX FOR MINES IN USE: O:NO, I=YESC AMFLU(2) MINEFIELD WIDTHC AMFLDI31 MINEFIELD FRACTION NOT BYPASSEDI " APFLDI4I FRACTION OF ATTACKING FORCE ENTERIN6 MINEFIELDC EFLSFR FALSE FIRING FACTOR FOR BLUE FORCEC kFLSFR FALSE FIRING FACIOR FOR RED FORCEC BODFAT INDEX FOR BLUE FORCE: I:=DFENDING, 2:A7TACKINGC 8HOLDS INDEX FOR BLUE FORCE: I:BLUE FORCE HOLDS POSITION=C 27BLUE IS ALLOWED T0 WITHDRAWC RHOLDS INDEX FOR gED FORCE: ]:RE0 FORCE HOLDS POSITIONtC 2:RED IS ALLOWED T0 I]THDRAW

    IlIMENSION AMFLO44iC INITIALIZE VARIABLES:

    KNIMN1:)KWDMNT:0FPFTM:lBDSNG:RDSNG:IBHOLO01:2PO-OLDS:e

    DO 1D 1:I,4AMFLD II) C

    IC CONTINUEC

    IF1BDFA ,E Q,1) THENBFLSFR : 0,8ftFLSFR 094

    LL SEBFLSFR : 094fFLSFR - 0.8

    V.O IF

    RE TURN

    Figure 3-2. Single purpose subroutine

    3-13

  • C CALCULATE ROUNDS (0 KILL RED TARGET TVPESC FOR BLUE UEAPON IYPES

    CALL RN1)KLLiOrPh1eJtD9LL)CC CALCULATE ROUNDS 10 AILL BLUE 1ARGET TYPESC FOR RED WEAPON IVPES

    CALL RNWDLL 4RBPH W 9 F1d)LL

    ýUjBRU~IIN[ RNDKLL *********CC

    SUBROUT INE RNORLEAI.X 'I PIKW HRUKLL ICC THIS SUBROUflE CALCU!LATES XRDKLLI9M9J)o ROUNDS TO KILLC FOr X FORCC WEAPON TVPL I IN TACTICAL MODE J=i12C AGAINST Y ,JCL VARGEI IYPES M OF WHICH M:11,20C ARE IN TACI.CAL hOiiL 2cC XVPKWII (,1 J? PROBABILITY OF MILL $S$PKI FOR X FORCEC 4.APON 11PES I IN TACTICAL MODE J:,2• C AGAINST V FORCE TARGET TYPE M. OFC UJH1C0i 1-lI•2C APE IN TACTICAL MODE 2CC

    DIMENSIOh X P Id, 2U•2 2 RD|LL.10,20,21CC100 00 10 J=1 •2

    DO 2t, I- I 1• f

    hDO•t L :flVD i'"

    C'IC CONT INUf30 CON I ]NUC.

    20 CONTINUE.1O CONTINUEC

    Rf TURNLiLBUG SUB~CH6•A1 IUO

    Figure 3-3. Dual purpose subroutine

    3-14

    40xNIIU

  • Table 3-2. Tactical modes for each weapon category

    Weapon Category Tactical Mode (1) Tactical Mode (2)

    Dismounted Infantry Mounted in troop carriers Not in troop carriers

    Light/Troop Carriers Troop carriers mounted Troop carriers dis-mounted

    Light/Non-Troop Carriers (Engaging) -999 as non-troopcarrier flag

    Heavy Not in overwatch In overwatch

    Mortars (Engaging) N/A

    3-5. DIAM CODE. This section contains the DIAM code interfaced with Jiffy.Some features of this DIAM version are unique to Jiffy. For example, most ofthe low resolution data or gamer input for DIAM is implemented by thesubroutine Jiffy before DIAM is called by INFANT. Blue and Red weapons fromthe Jiffy element array are chosen. The arrays IBNFID and IRDFID contain theJiffy weapon pointers, a mounted or dismounted flag, a non-carrier flag, and asecondary weapon flag for each of the weapon types chosen. Artillery lossesfrom Jiffy are added back to the weapons played in DIAM. Then DIAMreapportions the artillery losses each minute of battle. The DIAM code asshown has been tested and is currently being used to support war game studieswith good results.

    I1-1

  • OIAP4PUBLISH.DIAMMAINRI u'.1019 82-10:33 IG )

    100. cý****I~~IBROUTINE DIAMMAIN **~******~

    32". C13c, C

    I's' SUB ROUT I N 0 AM(8KV KWS5H SIIRPT 8ATK! K11A0 2 7V e IOB S gTRNTP 9 F PC ,AVR C s PN ,RW PN 9BAR TJF

    ]fe.I RAR~jFARPAMBNUMiRNUM,I8U, IRDJENFliJI1I1Me I IRNF 10 v 1UjOSIBR Ilet's c

    200. COMHOWRIG. :oV1 0IX 14 Is ICARD (201 91H INN 4IH8*1HVES j INN210. C22~.~230. DIMENS ION 11P~ 10 , 3 ) WPN4 10, 31 9UMAT1I ( 42 SBARTJF (10,'4124130 1 *NARTJF 00-L IAPPAM 1, AMF LDI 4 1,AMLSR 4 11AWOTH 44jS I250o 2 98WOTI45 )DTHIR 4riv4)b)SHOTS1~109 2) PREP4 2 1 9 UI IC)2(00 3,1R~ilaO~fBAf,'04 1(J2,ohAMHeI(,i2),INF1D425,tebIRNFIDt?5ii4I

    Mo0 2 ,CE.,CRs'',,PCRCRWVS41tCV~i4ss)t~%W84,'4,),1PCl3VREE4 4,4,15

    2591CI 3 $PCBI3 14 (I1 o IPCBWVR 4414 9b$,Of CWC44921300. C310.i 4 ,8lP 11 () S10%,$ 19RBPR I 10i101 5 1oBCHR 110, !)) 914CHR 4 10,5)J32C. 5 8MVR ri f 1 RHR1;4'4 ,2 16BTC T1 4,1451,RUTC1O'414 9 5 1,1ACA I i31331 C3140a 6,8EA~E10,~23ofRCA0~10,2),B$PF0GIIO,2JRSPF06(10,2)350. 7,IBSPMLC,1f,2)RSPtI0G4'A0,2) BMNLSSII~o,21RMNLSSIIO,Ž136Co 8 ,ORMSU14 \' 10l t2I oRRDSUM f 10, 2)

    380. 5,U13rUP 610c. (JPuRWP(10 s2) , P PevC f14 145 1 PCRVBC4414 45)

    14006 1 ,OBWR14P 110Us2ll RRGBD 1 0, 20s 2 1RBR68O 1109 20 s211410. 2 PCB 8lC 2(J.i2 IPCRUB2I 10,20,2 ),BRPKei 10,20,2)

    47 C a 3 914 bPhWI Ci(. 20 J2I AU8t16P( 101,20s,2)143n,. C

    94400 4 ,1O0TR fG I C 2,1 YOT87 G'1 10,2 1

    d46re 6,4iR0KLL410,12C,2bBTHKLL4 10,20,21,RTHKLLfl0,20,2110.7 o B R0F R f 10 -a 9 2) o R RD F R(10 92 0 92)

    1480. C

    500. 9 5, mg ( olWPHU~iW~~ R 410,21,BARILS 101,i I RARTLS 41012 1511's 1 ,1Afl1SP(IJ.I2!,RiARISPI10,2) ,BRKVLSI12,13),RB4(VLS112,13)5(04 C

    5866. c59f, C LOAD L~w RLSOLU11ON DAIA

    61 ft C I 1 71 rAL 17! 1 HE RE SI OF L Ow RE SOLU1ION D Al620. 1 CALL L.JIIbF RCI 1P F RCTP, UPS TO TACA I63C. C

    66 V, C LOAD HIG~H RESOLUTION DAIA61Z,. C6ECO C LOAV FP[CE10 t'1~itLE IAI3LES, DISlANCES, AND CORRIDOR WOIHiS

    690. CA~LL IE1, 1iilýrA1 ,I25,PCRVBE,fPCRVBW,PCRWVB ,PCf3REPC!3VRWI7(0. 1 PCBu~~1CW 9 0HWTii,0H,6A1

    72 Us1 C 3-16

  • SIFIED

    730. C74 r. C LOAt WEAPON A71RIBUTES75r, C7f, C LOAD PRObABILlTN OF HILL AND WEAPON CHARACTERISTICS TABLES77".s NUMB : SNUP78 f'o NUMR : RNUM79L), CALL PKINIBRPK•RBPXBCHRRCHRIDUIRD1 KI5,KI6tNUMPNUHRI

    810. C

    82"o C LOAD BLUE AND RED MOVEMENT RATES AND UETECTION DATA830o ITRNTP iRNIP84 1, CALL MO¶]N$IOu'SI1iRNTPtK27oK20]BMVRItRMVRTt8DTCTIROTCTI

    86'o CV7'. C861. C INITIALIZE ARRAYS AND VARIABLES9 0, c C DEIERMINE INDEXES FOR BLUE AND RED FORCES

    9]0, CALL lIDXI IDF •C BDFA tRDFA~i BFRCIPiBDMMAX tRDMAX t1;2, Do BWDRW ,RWORW ,BDMY s RD MY, BOY WIHROVW TH 1

    93'*, CALL INO0X2(KNTMNT,KIDMNTITFPFIMBDSNGRDSNGtAMFLD,4. r BDFA ,BFLSF RRFLSFR BHOLDS , PHOLDS I

    Y:., 0

    q7", C ZERO-OUT CUMULATIVE KILLS FOR BLUE WEAPON TYPES98C, CALL ]NI 1IBDEADVAR13S10 C

    I Oo. C !ERO-OLT CUMULATIVE KILLS FOR RED WEAPON 71PES1{'I. CALL INITI4R[EADVAR)102C,Ili(f C 'ERO-OUT BLUE ARTILLERY'LOSSES112.C CALL IN1I1 4BARTLSVARI1 I 70. c114-s C IERO-OUT RED ARTILLERY LOSSES

    f 115 • CALL INITIIRARTLS,VAR)Ilec.: C117 :', C tERO-OU7 BLUE ROUNDS FIRED SUM1MATIONI1•O, CALL IN]ITIIBRDSUMVAkI11I'C C12 t. C ZERO-OUT RED ROUNDS FIREU SUMMATION1210,, CALL TNI71 IRRDSUMjVAf|1272 * C12!(.ou l 0.S120o, C ZERO-Ot!l BLUE SUPPRESSION FIkL DEGRADATION

    ' 1 1250,. CALL INITI 4BSFFDG.VAR)12f , C127"a C ZERO-OUT RED SUPPRESSION FIRE bEGRADA7ION128C, CALL INI14 IRSPFDG0VARI

    I ('C.• V AR :coo131', C ZERO-OUT BLUE SUPPRESSION MOVEMENT DEGRADATION1 321. CALL INIII 4BSPMDGVAR)

    134 , C iERO-OUT RED SUPPRESSION MOVEMENT DEGRADATION135(.4 CALL INII4IRSPMDGVAR)1 4. [is C

    1 '41 , C142' C INIIIALIZE ATTRITION LOOP1 43fl, Cl144C* C iNITIALIZE AMMUNITION LOADS FOR bLUE WEAPONS

    SIFIE[" 3-17

  • SIFIED~50:BStD= I@

    OSLDR:1.O

    CALL BSETLDO8NUK, 18(18510 ,SLDRoBCNRIBNFZD,8AMQj14sce C1500. C INITIALIZE AMMUNITION LOADS FOR RED WEAPONS41150 1IIAIE RILEY OSE RO 1F 511 CALL RSETLDiRNUM, IROBSLOBSLDRoRCHRIRNFIDRAMO)1530s IFC:160(1. C NTALLZ ARTDT(ILLRY LOSSESPNFROM JIFFY

    15610. C15700 C INITIALIZE DISTANCE FROM BLED FORCE CENTROID1630. V C TO BLED WEAPON TYPES15900 IERC:21650.1 CALL INTDST IIFRCRCHRRMPNDFCWCORVRWPI1660. C167'.e C INITEIAL1E DISTANIELD RO C REDCTERSTCS ~T0

    1680. CALL MXNCHR#AWMLD ,FMNFLO ,8MNFLO .DFCWC ,DFRC, AMLSR I1690. CiirCO9 C DETERMINE THE VISIBLITY TABLES 10 USE IN LOOP1710. CALL PCTBLIBUDRWRWDRWOFRCPCRVBEPCRVBWPCRWVB,1720. 1 PCBVREPCBVRWPCBWVRPCRVDCPCBVRCI1730. C174 " C DETERMINE NUMBER OF TROOPS TO MOUNT FOR ATTACKING F0RC'"1750. lFfBDFAT*EQ*2 *AN~o BOMVsEQe2l THEN1760. CALL Dll.ROf8CNR9BWPNBDMRTOl117r.. CALL REMNTIBCHRBWPNS0MMA~sBDMVBDMRTOSNUMDMoh~er. I DBVBWPI179 Vo ELSE IFIRDFAT.EQt? *AND. RDM~eEOo2l THEN1800. CALL OmRTqO(RCHRRWPNqRD14RTOlleifls CALL PEMNT4RCHRRWPN.RDMMA~,RDMVRDkRTOtNUMDMi182110 1 DRFRWPI

    41832.a EL$E18~C, END IF18Sf.s C189fl. C191CD0. C1931.s C BEGIN ATTRITION LOOP192110 C1931's C DETERMINE DISTANCE FROM BLUE WEAPON TYPES19400 C 10 RED WEAPON TYPES195 Vie 10 CALL biPNDS IID BFBWP,DRF RWP DSI BF% qBWPk RWPN OBWRWP qDS IMIN)1960. C1971f. C OLIERMINE RANGE BANDS FOR BLUE. WEAPON TYPES1980. C 10 RED WEAPON TYPES1599 r CALL RNGBNDIDBWRWP,BRRGBDI2VOO. C'2 f-10. C OE.1ERMINE DISTANCE AND RANGE B3ANDS FOR RED WEAPON2c20a C TYPES TO BLUE WEAPCN TYPES2 C3 0, CALL RNGOS1 I8HR6BDRBRGBD ,DBWRWPDRiaBUPI

    4204C, C2050. C DETERMINE FRACTION OF BLUE WEAPON TYPES VISIBLE2060. C 10 PED WEAPON TYPES20700 CALL PCWPVSIBCHR,RCHR,PCBYRCBRRGBOPCBVRZI2CS0. C2rý90o C D1EREMINE FRACTION Of RED kEAPON IYPES VISIBIL2100.o C 10 BLUE WEAPON TYPES

    3-18

  • S I F IrcC

    211(' CALL PC~.pvSIRCHIwBCHRPCRWBCRdRPGBD ,PCRVB212120. CZ13,. C DETERMINE SINGLE SHOT PROBA8IL17Y OF AILL2 1 4,i C FOR BLUE WEAPONS AGAINST RED TARGETS

    21scsCALL PPKWPIBRPKiSBRRBDlBRPKWI21~00 C21?'. C EIJEERMINE SINGLE SHOT PROBABILITY OF i~1LL218"'s C FOR RED WEAPONS AGAINST t6LUE IMAR7E2190s CALL PkPIRBPKgRBRGbORBPKWI

    *22!'.o C226.s C CALCULATION OF ROUNDS FIREU BY WEAPON TYPE227n, C22EV c C ALCULATE TOTAL NUMBLA OF LNGAGAI3LE RLD TARGET TYPES2250. C FOR BLUE loFAPON TYPES2 3'Go CALL INI 11ITORIRG IVAR 123)0. CALL NUVl1fB4RPKW,AhPN,PCRVB2,RSPFDG,7TO~aT&1

    233-. C LALCULATE TOTAL NUMCLS OF ENGAGABLE BLUE TARGET TYPES23'. o C FOR RED 'WEAPON TYPES

    2 35 f'sCALL INITIIITOTBTGtVAR)236Co CALL NUMTGTIRBPKWobWPNIPCBVR2,ýSPFDb.TOTdTGI

    23? * C L..LCULATE TIME TO ENGAGE ALL RED TARGLT TYPES23SCe c FOR BLUE WoEAPON TYPES2 Vc CALL TIMEN61 98OWWTNeRPKWsBRR&bL0,BCHRPCHRB0VAT,24ICo I BDICI oBTMENGI

    2 4. C' CA243.* C CALCULATE TIME TO ENGAGE ALL BLUE TARbE7 TVPLSZ'a'ce C FOR REU 6EAPON TYPES

    24!.I~oCALL TIWENGIROVWTM,9RBPKWRBRGBDRCHRBCHRsRIJFAT,2'4E.Lo 1 QOTCTqRTM4ENCJ24e7Co c24V 0. C LALCULATE ROUNDS TO KILL RU) TAFtV'T TIPES

    24* C FOR BLUE 6EAPON TYPESz 5' ce CALI fNVALLfbPZPKW$8kOKLL 1

    252. a C CALCULATE ROUNDS TO KILL BLUE 1AR6ET TYPES2 53C* c. FOR RILU 6EAPON TYPES2!4d CALL RN0MLL#R8P'KWsf.IiKLL)

    25c C CALCULATE TIME 10 KILL RED TARGET TYPES2 571. C FOR BLUf WEAPON TPES

    2 ZS25P CALL. TMNLLIBTMENGiaCHRl3RDKLLeaPRGB.uB1MKLLI2 59 Ca C2 tYC. C CALCULATE TIME 10 KILL BLUE TARGEI TYPES2610* C FOR REU i-EAPON TYPES

    2 62:,oCALL TMMLL4RTMENGIJRCHRRROKLLR8RGBLJsRTPIKLLI

    2U (4* C CALCULAIE PROJECTED WOUNDS TO FIRE. BY BLUE WEAPONSSt 5( c4 C AGAINSI RED TARGET TYPES2ck-e CALL iRNOFWDtBTMMLL,TOTfdG~iiWPNRWPNIPCtbVRZPCRVBi 92t1 1 BDFAI BW.IORW,BRDKLLtB$PFDGSRSPFDG,bRDFRI

    27EU) C CALCULATE PROJECTED ROUNUS 1t) FIRE BY RED W*EAPONSi 71Ce C AGA INS I BLUE TARGE IT TYPE$272 ClaALL i6NDFRD IR IKL L I10T8T16,R WP N biPNsp CRV 8 1P CBV RZ.

    Z73L. 1 9 DF ATIRwDRW iRRDKL L tRSPF DGs8 SPFDG 9 RDFR I

    217606. CALCULATE ACIUAL ROUNDS FIRED BY BLUE WEAPONS

    Sif !f.0 3 -19

  • SIF lED

    2 77U.e CALL RNDCK IBWPNBCI!RRCHRBNUM,RNUMSBRDFH ,BAMOBýDISI!HJ2 81 4k C2 82 's* C CALCULATE ACTUAL ROUNDS FIRED BV RED wEAPONS2830. CALL iRNDCKIRWPNRCHRBCHRRNUMBNUMRRDVR,RAMO,RHf)SUMI

    29(0.s C291c* C292' o C CALCU'LATIO)N OF TOTAL LLuSSES

    ~2 I93;"o C294!'. C CALCULATE EXPECTED BLUE COMMITTEE LOSS6ES

    2 9 5 c C AL L ECL OS SI ABPKW tbWPN tPC BVRZ 9RROFR qRFL SFR IU SPF U6 ILE CL $ S

    2'97 "a C CALCULATE LXPECTED RED COMMIIlTEE LOSSLS2980, CALL ECLO5SIPRPMWFýWPNPCRVB2,bRDFRBFLSFRIHSPVDb,ERCL~SS2 ",9t014 C,3r00, C CALCULATE TOTAL EXPECTED DIRECT FIRE bLUL LOSSES3,'10* CALL ETLOSSIOWPNELCLSSlL81LSS3

    "320, C313 04 C CALCULATE TOTAL EXPELIED DIRECT FIRE )kED LOSSES3 0140o CAL.L ETLOSS IR PNEhCLSS*ERTLSs)3CE04. c3:E6O. C CALCULATE BLUE ARIILLERV LOSSES307G. CALL ARTLSSIKNIMNTARPAMBARIJF,8WPNBCHRBARTLSI30FCv C3"90., C CALCULATE RED AR'TILLERV LOSSES31CO, CALL AkTLSSIKNIMNTARPANIiARTJFRWPNRCHHRAHILSI

    73110. C312'. C CALCULATE ATTACHENI MINE LOSSES3131. IF480FAT.EQe2) THEN3!4i04 CALL MNL5S IAMFLDAMLSHAWOTHDSTBRFMNVLDBMNFLL,315C, I BCHRPPNqObFBkPvbMkLSSl31C'e ELSE317t. CALL MkLESIAMFLDAMLSRAWOTNDSTBhFMNFLD1 BMNFL!',3180. I RCH~,RUPhvDRFR6PqRMNL~SI31504 END IF

    321'. C CALCULATE hOUNIEL) INFANTRV LOSSLS3221.* IFIBDMV*LO.33 THEN323L0. CALL OSMLSS f8NUt4DMsBlPN ,bCHR,E8TLSS)324L'. CALL D$MLSS l8NUMC)M,8wPNv8CNRaBARTLS)325(4. CALL D$MLSS WNUMDMsBmdPNbCHRoBMNL!IS)3260a E'JD IF3270.o IFIRDMV.EQo3) THEN3280. CALL DSMLSS lRUDsw~RHsRL~329c, CALL D$MLSS 4RNUMDNRvlPNRCHRRARlLSl33C-04 CALL D!MLSS lRNUMDhRWPNRCHRRMNLSSl331;* END IF332(.3330. c CUMULATE TOTAL LOSSES FOR BLUE 19EAPON TYPES3340. CALL TALLYIBWPNsEBTLSSBARILStbMNLSSBDEAO)33!0, C336fle C CUMULATE TOTAL LOSSES FOk RLU WEAPON TYPES

    3 ý7 *'*CALL TALLY IRhPNERTLSSRARTLS ,RMNLSSRDEADI333C'. C3.gW. C CALCULATE BLUE TO RED M(ILLER VICTIM SCORE:BOARD3400o CALL JFL¶S IRCI ,4 RWPNqE RCLSS IR ILSS sHARTLS*RMNLS5 ,PHK YLS I34:0. c342 'a C LALCULATE RED TO OLLIE KILLER VICTIM SCOREBOARD343-t. CALL JFL IS BCI',RsDWPNEaCLSSEAJTLSSBARTLS ,BMNLSS ,PbsiýLý)3 '44 0 C34EP. C 3-20

    SIF lED

  • [ SIFIED3 4 9 . C350C. C DEIE;.MINE NEb IACIICS351C9 C3 52. C DETERMINE NE6 TACTICAL MODE FOR BLUE FORCE35 3 C' IFIBDFAJ.EQ*2 oAND. BWORW.EQe13 THEN3540o IF18DMV.EQ.I) THEN355ce CALL TACOSM(BOtIWBCHRRCHPBWPN ,DBFB.P,35C

  • SIF JED

    '1120. IFfBQV6)HoEr.a.21 THEN413"s bOvwTh'4 1 's7 END IF4 1 Isr ELSE416(. IbHGLDý 34170a silbR~ Iit)ece 60SNG~ 14 150, END IFW42oe END IF

    '421 !l. END IF'4221. C'42 3 C'424. C4 426v C DETIER F4'INE I F RED F ORC E OiSE NG AGE S'427'. C'42 8 C CHECK F0~ RED DISENGAGEMENT429i's IF4BWORW*EQeI sAND. RhWDRWEQoIl THENE'4 30C. I FR C z'431 Ov CALL DSNGIR HOLDS *RDSNG lRWPN IRCHR 9RDEAD 0IFA ClUGMAITI RbiDRWI'432r'. C'433 V. C WHEN RED WITHURAWS, THEN INITIALIsE NEto WISIB1LTl'Y'43400 C TABLES, REMOUNT FORCE, AND RELEASE OVERWATCH STATUSis3500 TFIRWDSWoEQ*21 THEN'436(. PRINT *911 RED TO wITHDRAW AT IONTRNT,' MINUIES'

    '437!.s PRINT *to MINIMUM DISTANICE 7O BLUE FORCE IS ',DSIHIN4 3f,. PRINT 491 DO VOU WISH 10 W17HURAW RED FOHCLS-if4e3900 CALL REEDAIIANSI044006 If IIANS .EQo.iH~I IHLN4415a NWDMNI : KNTMN74'41ft. CALL PCISLfbWORWqRWDf4WqDFRC qPCNVBE*PCR~bWPCkWY(ft'4420. 1 PciaVREPCBVRWIsPC8WVRPCRVdCsPCESVRC I4e'43D* IFfRDHV.EQ.R- THEN4'4'4 u CALL OMNROIRCHRRWPNODMRIO)'4415v. CALL REMNTIRCHRRWPNRDWMA's¼ROMVshD44RIfjRNiUMU)M,'446C.o I DPFRWP34410. END If

    4'48C.IFIROVWTH*LQ*21 THEN

    441 ROWH : 1'4Scoo EN'D IF'451 k EL SE'452 0 i'HOLD 1'4530. RWDRW I

    '4554'. E'DS I'456'. LD) IF%Site END , If

    4(2(o C

    '46'4C. C DETERMINE MOVEMEN7 RATES AND NEW POSITIONS4i5' C'466Ce C DETERhiINE MOVEMENT RATES FOR EACH BLUL WEAPON TYPE'4670. CALL MVRII TOVWTHBVFAT,~WIiW, T1RNTPEbCHRlBdPNI

    *4fefH. 1 BmvRT IEWPMYfRI* 46910 C

    47V(Go C CALCULATE NEW DIS lANCE FRiOM bLUE FORCL CENTROID'4710. C '0 BLUE WEAPON TYPES'4720.s CALL NDiISI tDS~bHB6PNi3CHR,8WPMVRBýPMUGDbFBWP)a4