SlideShare a Scribd company logo
1 of 63
Download to read offline
Introduction to MBSE:
Systems Modeling Expressing
Design Intent With Rigor
Model Based Engineering: Enabling the Vision
Phoenix Integration Virtual Event
June 10, 2021
Michael J.Vinarcik,P.E.,FESD
Chief Systems Engineer
Strategy, Growth, and Innovation Organization (Digital Engineering)
This presentationconsists of SAICgeneral capabilitiesinformationthat does not containcontrolledtechnical data as defined
bythe International Traffic inArms (ITAR) Part 120.10 orExport Administration Regulations (EAR) Part 734.7-11.
2
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Traditional Document-Intensive Systems Engineering (DISE) is undergoing a transformation; the
emergence of Model-Based Systems Engineering (MBSE) is driving fundamental changes to product
development and sustainment processes. However, competent modelers are in short supply and
many stakeholders do not fully understand (or appreciate) the implications and opportunities
inherent in MBSE.
This tutorial will provide an overview of what system modeling is, how it can rigorously express
design intent, and how appreciation for its capabilities can facilitate digital engineering throughout the
enterprise. It will include an overview of fundamental concepts, present detailed examples, discuss
the role of automated validation in driving model quality, and share best practices for identifying and
training system modelers.
Abstract
3
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
An AbstractView of Product Development/Acquisition
Dispose
Concept Development Manufacture
Maintain/
Sustain
4
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Dispose
Concept Development Manufacture
Maintain/
Sustain
Air Gaps
STOP STOP STOP STOP
Fidelity and momentum is lost every time there is a handoff;
this is caused by the “air gaps”
5
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Digital Engineering
Digital Engineering / Digital Thread / Digital Twin
Intended to Eliminate Air Gaps
Dispose
Maintain/
Sustain
Manufacture
Development
Concept
6
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Domain-specific Analysis Tools
Dispose
Model Based Systems Engineering Tools
Maintain/
Sustain
Manufacture
Development
Future State of Digital Engineering
Concept
PLM Tools/Big Data (failure/logistic analysis)
7
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Descriptive Executable
Descriptive vs. Executable Architectures and Models
System Modeling Tools
Modeling & Simulation Tools
8
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Situation – Demands, Risk, Speed, and ChangeThreaten Mission Success
9
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
6,000
5,000
4,000
3,000
2,000
1,000
0
KSLOC
1954 1968 1982 1995 2009 2023
System Complexity Is Growing Exponentially
https://savi.avsi.aero/about-savi/savi-motivation/exponential-system-complexity/
G ROWT H OF S OFT WAR E COMP LE XIT Y
IN MILITARY AIR CR AFT
Thousands of Lines of Code (KSLOC) Used in Specific Aircraft Over Time
F-111 FB-111 F-15A F-16A
F-18A
F-16C F-16Es0
F-15CDs0
F-15Es2
F-15CDs2
F-16C/s0T3
F-15CDs4
F-22
F-16Es4E+
F-16/50m2
JSF CTOL
F-106
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
10
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
The U.S. Department of Defense Recognizes Current Approaches
Cannot Manage this Explosion in Complexity
“
”
— LtGen Robert D. McMurray, AFLCMC/CC
Our current defense acquisition system
applies industrial age processes
to solve information age problems.
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
11
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
The Law of Conservation of Systems Engineering
“
”
— James Long, FINCOSE
T
I
M
E
The amount of systems engineering
required for a given project is fixed.
You don’t get to choose how much
systems engineering you do.
You simply get to choose when you
do it (up front, or during integration
and testing), how much positive
impact it has, and how much it costs.
12
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Systems Architecture: Managing that Complexity
Architecting defines what to design,
while design defines what to build.
“ ”
— Hillary Sillitto, Architecting Systems: Concepts, Principles, and Practice
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
A high-fidelity simulation of the wrong system is wrong.
13
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Digital Engineering Processes (…really,most Systems Engineering processes) are intended for:
• New development
• An older, single-source procurement environment
• Intra- vs Inter-organizational stovepipes leading to unexpected model management problems and costs
• Tailoring…but don’t tell you HOW to tailor effectively
• The pitfalls of frameworks
• Inexperienced practitioners attempting advanced modification
Common Challenges
• Existing system documentation is unavailable or out of date
• Older documentation standards, lack of funding to update CDRLs, old data rights agreements, etc.
• Configuration management of systems in the field has degraded
• Sustainment & Development organizations are stove-piped or firewalled…or not under contract
• Shifting Baselines:Operations can’t stop and wait for DE…which may never catch up
• Lack of DE-capable development environment accessible to all stakeholders
• Lack of available process and tool experts
• “Magic Sauce” expectations for Model Based Systems Engineering (MBSE)
Legacy Systems & Digital Engineering Complexity
13
14
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Digital Twin/Model Based
Product Support
SE Digital Thread
A Big Picture with Fuzzy Boundaries
14
MBSE
Detailed Design, BOM
Specialty Engineering Analysis
Test, Integration,Verification, OA/ATO
Predictive Modeling & Simulation
Cost, Schedule, CM/BM
Problem Reports, Defects,Feedback
Actual System Configurations
Real-time Data, IoT
Recorded Performance
Logistics Databases
= Legacy systems want to live here,but often lack crucial data
from the inner circles
Architecture and Requirements
(Design Intent)
15
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Another (Pessimistic?) View
15
Digital Twin
MBSE
By the time a system is deployed,this
data will be dead…
…and this data will be completely
disconnected from the
engineering data needed to do an
impact analysis and plan an
upgrade.
Digital Thread
16
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
From the Department of Defense Digital Engineering Strategy (2018)
17
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Apply SE to planning DE:Who are your
stakeholders? What are your use cases?
SAIC has developed Program Interviews to
determine Program and Organizational
readiness for MBSE and Digital Engineering
transformation efforts.
Program Interviews help determine where and
what Programs/Organizations need
to address to have the mostly likelihood
of success.
• To evaluate capabilities → assess as-is state
• To refine and build-up capabilities → execute
to-be transition
Where to Start a Digital Transformation?
Aligning Outcomes For a Clear Transformation
17
Integrated Transition & Execution Plan
(1b) Business
Session
People
Process
Tools
As-Is vs To-Be
(1a) Capability
Benchmarking
Session
Key
Milestones
Training Staffing
(2) Staff
Development
Session
Staffing Plans
Training Plans
Integrate Without
Disruption
(3) Ecosystem
Session
Build
Borrow
Bring
Tooling Plan
(4) Execution
Session
Methods
Style
Govern.
Execution Plan
Action Plans
Action Plans
Action Plans
Business Plans
Practices &
Partnerships
Tip For Legacy Programs:
Expect to identify all your existing
system data owners, data rights, data
formats, predicted level of data
accuracy, and names of SMEs
that can fill in gaps
18
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Model-Based Systems Engineering (MBSE) is a component of DE
Often the First Step in Implementing Digital Engineering
18
…to model and integrate data
across full enterprise
lifecycle,…
…and across all engineering
and management
domains…
Create and utilize DE
Ecosystems…
…to inform
decision making
based on
authoritative data
reasoned across all
domains.
Initially, MBSE covers requirements and architecture management
and then extends to cover integration,verification, and validation
Tip For Legacy Programs:
Start with your physical architecture
19
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Digital Engineering Strategy Distilled
Starting with the End in Mind…or Just Starting at the End?
19
1. Model and integrate data across full enterprise lifecycle
2.At each point within the
lifecycle,model and integrate data
across all engineering and
management domains
Digital Twin
(DTw)
Model-Based Product
Support (MBPS)
Digital Mission Engineering
(DME)
Tip For Legacy Programs: When
starting in medias res, consider
reverse engineering strategies
for data capture.
20
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
New Tools:
Languages and Frameworks:
The digital transformation of systems
engineering depends upon the creation
of well-crafted, consistent, and complete
descriptive and executable system models.
Skilled modelers are in short supply
Growing new modelers requires coaching and
guidance
Many ways to build a bad model
Models are huge and complex to review
(manually) (10^5-10^6 elements)
Our semantic broker is a promising technology
that facilitates data interchange
Aras Innovator / Ansys Minerva / PLM vendor
solutions (DS, PTC, Siemens)
Barriers to Building Your First Architecture Model
Skills, Bench Depth,and Recruiting
20
21
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Modeler only directly influences the
methodology
When style guides and ontologies are followed,
queries may be constructed in the model to
return information of interest:
• Properties
• Usages
• Related elements
Unfortunately the style guide and other rules
are not always followed consistently
Building a Better Model
Start with a Solid Model Style & AutomaticValidation
• Efficiency
• Effectiveness
• Elegance
Modeling Effort
Factors
• Language
• Tool
• Methodology
Elegance
Contributors
Constants
(Effectively)
*Warning:
• Frameworks are not languages
• Languages do not dictate methodology
• Tools do not dictate methodology
Tip For Legacy Programs: Know when to cut your
losses when it comes to reusing legacy models
Drawing → Diagram → Data
22
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
SysML provides too many options: a model style selects an optimal set of options an organization
agrees to restrict themselves to.
• Everyoneuses the same options
• Only a portion of the language is used
Engineers new to modeling need to focus representing their technical content in the model, not
selecting the best modeling technique
Training can be shorter and more effective
Model analysis is easier to implement
Model-to-Model compatibility is improved
Integration of the model with external tools is simplified
Why Use a Model Style Guide?
22
A Style Guide is a Key Enabler for MBSE Program Success
23
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
DigitalTransformation
BOM Centric
Lacking
holistic view of
design intent
System Centric
Graphic courtesy of
24
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
DigitalTapestry: Custom and Partial DigitalThreads
Each enterprise/team has custom priorities …
but all data connects through System Architecture
System Model
• Design intent
Manufacturing
• eBOM tomBOM
Verificationand Validation
• Test data management
Detailed Design
• Mechanical
• Electronics
• Electrical
• Software
Digital Twin/MMA
• Assets in the field
Graphic courtesy of
System Architecture
25
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Systems engineering focuses on behaviors, structure, requirements, and relationships related to the
system-of-interest
Traditional, Document-Intensive Systems Engineering (DISE), relies on humans-in-the-loop to read
and understand narrative and graphical content … and to integrate it into a coherent understanding
of the system and its architecture
DISE approaches are inherently“lossy” and labor-intensive and do not scale well to large,
cyberphysical systems
Architecture Is Part of Systems Engineering
26
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Leads to siloed,
disconnected views of system
No guarantee of
consistency between views
Often delivered as PDFs, Excel,
or other disjointed artifacts
Difficult to review thoroughly
Document-Intensive SE
This is NOT a new problem!
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
27
28
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Apollo Experience Report – Guidance and Control Systems
29
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Concluding Remarks and Recommendations, Page 13
30
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Competent Model-Based Systems Engineering (MBSE) is the foundation for the “digital thread” that
is needed to manage the complexities of modern product development
SysML is the dominant language for executing system models in support of MBSE
A well-formed SysML model includes:
• Behavior (what elements do and how they collaborate,including robustinput/outputdefinition)
• Structure (parts/components/assemblies)
• Interfaces (connections/flows)
• Parametrics(equations that govern system behavior or properties)
• Requirements(with automatic conformance assessment)
MBSE and SysML
31
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Recreating traditional artifacts in a more sophisticated tool: Drawing → Diagram
Configuration control was limited or non-existent
MBSE Evolution: MBSE 1.0
32
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
MBSE efforts stall because they fail to grasp the
opportunities inherent in the new approach
• Confounding the outcome with the means
• Excessive focus on diagrams/viewsvs. data
Models can be more consistent and
coherent…but it takes skill and effort to
achieve that end
Our Challenge: MBSE Missteps
33
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Evaluates the use for every potential modeling artifact before creating it:
• What question am I trying to answer?
• What risk/technical debt am I buying down?
• What“bang for the buck” am I getting?
Evaluates the method applied to creating each modeling artifact for elegance, efficiency, and
effectiveness … even at the expense of language purity
• What is the fewest number of clicks I can make to achieve my intended use?
• How can I reuse what is previously created to achieve new uses through inference?
Maximizes reuse to minimize the opportunities for inconsistency
Ensures complete synchronization between structure, behavior, and interfaces
MBSE Evolution: MBSE 2.0
34
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
“…this involves a willingness to trade off theoretical purity
or future perfection in favor of getting things done today.” p. 26
“…a willingness to experiment and be proven wrong.
This means we try stuff. We fail.
Then we use the lessons from that failure
in the next experiment.” p.27
Apprenticeship Patterns:Guidance for the Aspiring Software Craftsman (2009)
David H. Hoover & Adewale Oshineye.O’Reilly Media
MBSE 2.0 and Pragmatism
“I don’t care what anything
was designed to do,
I care about what it can do.”
Gene Kranz, as portrayed by Ed Harris, Apollo 13, 1995
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
36
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Every modeling efforthas several factors that may be used to describe it:
 = Efficiency factor = output/input (0 <  < 1)
 = Effectiveness factor = ability to accomplish intended outcome (0 <  < 1)
 = Elegance value (0 <  < 1)
  = 
The Importance of Elegance in Modeling
37
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Language, tool, and method each have their own contributions to this equation:
language language tool tool method method = 
Once the tool and language are selected, those terms are effectively constants…so any modeler is
only able to directly influence:
method method
The NeMO Orbiter:A Demonstration Hypermodel, Vinarcik, Michael J.,
Ground Vehicle Systems Engineering and Technology Symposium, Novi, 2018
The Importance of Elegance in Modeling
38
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
“One critical,inescapable fact is that every model element has a cost associated
with its elicitation,creation,definition,and maintenance.
Therefore,if a system can be described rigorously and completely
with n elements,
each n + i, where i > 0, element
adds no value and only increases cost.”
The NeMO Orbiter:A Demonstration Hypermodel,Vinarcik, Michael J.,
Ground Vehicle Systems Engineering and Technology Symposium, Novi, 2018
Nothing is Free
39
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
One way to minimize cost is to maximize inference…
• If f(x) = y, then defining x defines y
In a similar way, if style guides and ontologies are followed, queries may be constructed
that follow any number of “hops” in the model to return information of interest:
• Properties
• Usages
• Related elements
If the style guide and other rules are not followed, this breaks down.
Inference Is Key
40
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
System modeling is a skills-based discipline.
Models grow rapidly (105-106 model elements)
Not all model elements may appear on diagrams (diagram-centric review is hopeless)
Reviewing tables and matrices takes time
The need:
• Make it“easy” for modelers to conform to a style guide/ontology/semantics
• Minimize the administrivia in checking/enforcing compliance
The Larger Problem
41
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
MagicDraw and other tools permit the creation of custom validation rules
These may be aggregated into various validation suites and specify:
• Elements to which they apply
• Error message
• Severity
• The rule itself
Rules may be shared in profiles and may be run automatically or upon demand (including
mandatory validation before committing to a collaboration server)
The Solution: Validation Rules andValidation-Driven Metrics
42
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Provided free of charge to the worldwide system modeling community
Intended to improve model quality and accelerate training of competent system modelers
Consists of:
• Validation rules
• Customizations
• Supporting documentation
• How-to videos
Licensed as specified in the model
Supported with a model-based style guide and example model (Ranger lunar probe)
Updated at SAIC’s discretion (in part, based upon feedback from the modeling community)
SAIC Digital Engineering Profile
SupportsSysML in MagicDraw/Cameo System Modeler (Dassault Systèmes) and Rhapsody
43
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Shipshape and Bristol Fashion: Model Documentation and Curation to Facilitate Reuse (Vinarcik/Jugovic,2019
NDIA Systems and Mission Engineering Conference) discussed the use of automated validation in systems
modeling:
“When a model passes validation, you KNOW it is compliant…Validation is fast and consistent, Seconds/Minutes vs. Hours”
SAIC released its Digital EngineeringValidationTool in December 2019:
• V1.0 (December 2019—126 rules):
• Initial customizations
• Videos
• V1.5 (April 2020—153 rules)
• Model-based Style Guide
• Example model (Ranger lunar probe)
• Rhapsody rules
• V1.6 (August 2020—164 rules)
• Classification/Data Rights customization
• V1.7 (January 2020—184 rules)
• FMEA customization
SAIC Digital EngineeringValidationTool
44
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
SysML provides too many options—a model style selects an optimal set of options an organization
agrees to restrict themselves to:
• Everyone uses the same options
• Only a portion of the language is used
Engineers new to modeling need to focus representing their technical content in the model, not
selecting the best modeling technique
Training can be shorter and more effective
Model analysis is easier to implement
Model-to-Model compatibility is improved
Integration of the model with external tools (i.e., a dashboard or PLM tool) is simplified
Why Use a Model Style Guide?
A Style Guide Is a Key Enabler for MBSE Program Success
45
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Automatic validation drives:
• Consistency with a given style (use of relationships,properties,etc.)
• Completeness (required propertiesand usage)
This facilitates mapping of the system model to other data models
WhyValidation Is Important
Without a consistent Rosetta Stone, exposing
information to the enterprise is impossible!
46
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
2020 ASEE Conference Paper:
Treadstone:A Process for Improving Modeling Prowess UsingValidation Rules
47
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Model Info Errors Size Pages
Collection Rover 0 0 25,614 246
Retrieval Lander 0 0 11,259 153
Fetch Rover 0 0 15,343 139
Ascent Rocket 0 0 23,721 301
Return Orbiter 0 0 16,572 117
Mars Expedition Ice Mapper 0 0 24,970 243
Mars NAVCOM 72 167 18,127 262
Mission Control/Deep Space Network 474 0 12,271 148
Integration Model 13 12 5,892 1,651
Mars Octet Model Sizes (3 DEC 2020: 74 Days)
Novices Can Mature ModelsWhen Supported by Automation
https://hypermodeling.systems
48
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Constructed in support of SAIC’s ValidationTool
• Rigorous,well-defined relationshipsenforced with automatic validation
• Example structure:Functions are representedas operations owned by the performing block
Original model is freely available for download:
https://www.saic.com/digital-engineering-validation-tool
Modified for this topic to as proof of concept
SAIC’s Example Model: Ranger Lunar Probe
Source Model Must be Well-Formed to Enable Analysis
All analysis that requires
components & functions should
reference this directly
49
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
SAIC FMEA Profile
50
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
States and Failure Modes
A failure mode is a sub-optimal
state (state customized as Failure)
Transitions that lead to a Failure
are a Cause of Failure
When a component enters a
Failure state, some operations
become unavailable, which are the
local effect of failure
When a component enters a
failure state, additional undesirable
behaviors may occur, which can be
defined as operations customized
as Malfunctions, and contribute to
defining local effects of failure.
Failure
State
Cause
of
Failure
51
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
SAIC FMEA Profile:
State and Mission-Thread Driven Analysis
52
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Use Cases, Hazards, and Final Effect of Failure
• When using a well-formed model,
final effect of failure can be
automatically derived from local
effect of failure through inherent
relationships to supported use
cases (see next chart)
• A Hazard can be represented as
an extension point of a use case,
clarifying what happens when the
use case is compromised
• A Hazard is assigned an coarse
severity
Hazard Hazard
53
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Each Failure state is assigned a severity by an engineer based reviewing the affected use cases,
associated hazards, hazard severity, and owned Malfunctions.
Deriving Final Effect of Failure, Hazards, and Failure Severity
Local
Effects
Final
Effects
54
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Assigning & Calculating Probabilities of Occurrence
Each Cause of Failure is assigned a
Occurrence and Detection
• In this example,we use a scale of 1-10 from
ASQ,but more precise numericalvalues can be
applied (https://asq.org/quality-resources/fmea)
Each Cause of Failure has a Severity which
is pulled from the Severity of the Failure
state (see previous)
Each Cause of Failure has a calculated
Criticality and RPN
55
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Finalizing the Analysis
All Cause of Failure transitions to a Failure state contribute the Criticality and RPN
• Additional calculations can roll up these values to any useful level
• Results can be displayed and manipulated in the model
• Changes to values propagate immediately
• Note the malfunctions that occur in the failure state
(in this case, “Uncontrolled Thrust”)
56
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
By adopting this approach, FMEA/FMECA analysis is embedded into the architecture and uses the
same information (so it is always synchronized).
The hazard/FMEA/FMECA analysis can also be segregated into a higher-level analysis model that uses
the primary architecture model:
• Preventsproliferation of properties/domain-specificadditions into the primaryarchitecturalmodel
• Isolates potentially sensitive/trade secret information
The Hidden Benefit
57
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
From Avoiding Engineering Gaffes:Automated CriticalityAssessment
and Error Detection (Nathan J.Vinarcik,2021 INCOSE Great Lakes Regional
Conference)
Notional analysis of Galileo probe high-gainantenna failure
Retract functionshown as the only recovery from Jam
58
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Own the technical baseline
• Break out of vendor lock
• Apply more modern analytical techniques to solve problems
• Speed capability development and deployment
Join the Internet ofThings (IoT)/Develop a DigitalTwin
• Predict failures in the field
• Dynamic spares management and support
Impact Analysis
• Plan upgrades with more precise cost/time estimating
• Avoid unintended impacts
FederatedArchitecture Participation
• Represent your system in emerging System of Systems architectures
Comply with Initiatives and Policies
• …but do you want to check the box or realize value? (Hint:both cost money)
Legacy Systems & Digital Engineering (DE) Opportunities
59
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
Style Guide Overview
Style Guide Demonstration
FailureAnalysis Demonstration
Moxie Demonstration
Classification Profile Demonstration
Videos
Conclusions
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
61
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
A well-formed system model in SysML provides a rigorous, unambiguous representation of a system’s
architecture at any level of abstraction
Queries, validation rules, and derived work products ensure stakeholders receive valid information
Competent modeling delivers rigor at the speed of relevance
Automatic validation dramatically improves model quality, facilitates other analysis, and enables
information to be encoded properly for sharing throughout the digital thread
Synchronization of federated tools, driven by authoritative information in the system model,
improves collaboration and communication across all disciplines
Competent SysML Modeling
62
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
“We’ll start the war from right here!”
Brigadier General Theodore Roosevelt, Jr.
Utah Beach
06 JUN 1944
Tempo and MomentumAre Key: Get Started!
63
This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
SAIC DE Profile &Validation Rules:
https://www.saic.com/digital-engineering-
validation-tool
SAIC Digital Engineering

More Related Content

Similar to 00-Introduction-to-MBSE-Systems-Modeling-Expressing-Design-Intent-With-Rigor_ITAR-Approved.pdf

Enhancement of ARINC 653 for Multi-core Hardware.pptx
Enhancement of ARINC 653 for Multi-core Hardware.pptxEnhancement of ARINC 653 for Multi-core Hardware.pptx
Enhancement of ARINC 653 for Multi-core Hardware.pptx
Abrar Hafiz
 

Similar to 00-Introduction-to-MBSE-Systems-Modeling-Expressing-Design-Intent-With-Rigor_ITAR-Approved.pdf (20)

Skid fleet brochure
Skid fleet brochure Skid fleet brochure
Skid fleet brochure
 
SkidFleet Brochure, forklift management reporting
SkidFleet Brochure, forklift management reportingSkidFleet Brochure, forklift management reporting
SkidFleet Brochure, forklift management reporting
 
SkidFleet, Lift Truck Fleet Operational Management Information System
SkidFleet, Lift Truck Fleet Operational Management Information SystemSkidFleet, Lift Truck Fleet Operational Management Information System
SkidFleet, Lift Truck Fleet Operational Management Information System
 
SkidFleet from IVDT Inc.
SkidFleet from IVDT Inc.SkidFleet from IVDT Inc.
SkidFleet from IVDT Inc.
 
Manufacturer of onboard lift truck check weighing & operational management in...
Manufacturer of onboard lift truck check weighing & operational management in...Manufacturer of onboard lift truck check weighing & operational management in...
Manufacturer of onboard lift truck check weighing & operational management in...
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
RA TechED 2019 - SY07- Next-Gen Device Library of Preconfigured Objects
RA TechED 2019 - SY07- Next-Gen Device Library of Preconfigured ObjectsRA TechED 2019 - SY07- Next-Gen Device Library of Preconfigured Objects
RA TechED 2019 - SY07- Next-Gen Device Library of Preconfigured Objects
 
Plan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certificationPlan with confidence: Route to a successful Do178c multicore certification
Plan with confidence: Route to a successful Do178c multicore certification
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Interoperability.pptx
Interoperability.pptxInteroperability.pptx
Interoperability.pptx
 
Project design considerations for integration of oem skid equipment with plan...
Project design considerations for integration of oem skid equipment with plan...Project design considerations for integration of oem skid equipment with plan...
Project design considerations for integration of oem skid equipment with plan...
 
Ah+4diac midih webinar 2020 07-08 reference slide deck
Ah+4diac midih webinar 2020 07-08 reference slide deckAh+4diac midih webinar 2020 07-08 reference slide deck
Ah+4diac midih webinar 2020 07-08 reference slide deck
 
IBM Detailed ALM/ELM for Aerospace & Defence overview
IBM Detailed ALM/ELM  for Aerospace & Defence overviewIBM Detailed ALM/ELM  for Aerospace & Defence overview
IBM Detailed ALM/ELM for Aerospace & Defence overview
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
由政府採購體系檢視國內政府與業界有關系統工程之落差
由政府採購體系檢視國內政府與業界有關系統工程之落差由政府採購體系檢視國內政府與業界有關系統工程之落差
由政府採購體系檢視國內政府與業界有關系統工程之落差
 
Enhancement of ARINC 653 for Multi-core Hardware.pptx
Enhancement of ARINC 653 for Multi-core Hardware.pptxEnhancement of ARINC 653 for Multi-core Hardware.pptx
Enhancement of ARINC 653 for Multi-core Hardware.pptx
 
AVEVA World Conference NA - Ryan/Avantsa, CFIHOS Workshop
AVEVA World Conference NA - Ryan/Avantsa, CFIHOS WorkshopAVEVA World Conference NA - Ryan/Avantsa, CFIHOS Workshop
AVEVA World Conference NA - Ryan/Avantsa, CFIHOS Workshop
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
DFARS CMMC SPRS NIST 800-171 Explainer.pdfDFARS CMMC SPRS NIST 800-171 Explainer.pdf
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
 
Security In The Supply Chain
Security In The Supply ChainSecurity In The Supply Chain
Security In The Supply Chain
 

More from miaoli35 (6)

價值工程.pdf
價值工程.pdf價值工程.pdf
價值工程.pdf
 
Lecture 19-Guest Lecture on Project Management Resources.pdf
Lecture 19-Guest Lecture on Project Management Resources.pdfLecture 19-Guest Lecture on Project Management Resources.pdf
Lecture 19-Guest Lecture on Project Management Resources.pdf
 
TRIZ introduction.pdf
TRIZ introduction.pdfTRIZ introduction.pdf
TRIZ introduction.pdf
 
2023年顶级战略技术趋势-Gartner.pdf
2023年顶级战略技术趋势-Gartner.pdf2023年顶级战略技术趋势-Gartner.pdf
2023年顶级战略技术趋势-Gartner.pdf
 
Exposing_Capella_Models_to_OSLC_Consumers.pdf
Exposing_Capella_Models_to_OSLC_Consumers.pdfExposing_Capella_Models_to_OSLC_Consumers.pdf
Exposing_Capella_Models_to_OSLC_Consumers.pdf
 
140910-doverick-agile103.pdf
140910-doverick-agile103.pdf140910-doverick-agile103.pdf
140910-doverick-agile103.pdf
 

Recently uploaded

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

00-Introduction-to-MBSE-Systems-Modeling-Expressing-Design-Intent-With-Rigor_ITAR-Approved.pdf

  • 1. Introduction to MBSE: Systems Modeling Expressing Design Intent With Rigor Model Based Engineering: Enabling the Vision Phoenix Integration Virtual Event June 10, 2021 Michael J.Vinarcik,P.E.,FESD Chief Systems Engineer Strategy, Growth, and Innovation Organization (Digital Engineering) This presentationconsists of SAICgeneral capabilitiesinformationthat does not containcontrolledtechnical data as defined bythe International Traffic inArms (ITAR) Part 120.10 orExport Administration Regulations (EAR) Part 734.7-11.
  • 2. 2 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Traditional Document-Intensive Systems Engineering (DISE) is undergoing a transformation; the emergence of Model-Based Systems Engineering (MBSE) is driving fundamental changes to product development and sustainment processes. However, competent modelers are in short supply and many stakeholders do not fully understand (or appreciate) the implications and opportunities inherent in MBSE. This tutorial will provide an overview of what system modeling is, how it can rigorously express design intent, and how appreciation for its capabilities can facilitate digital engineering throughout the enterprise. It will include an overview of fundamental concepts, present detailed examples, discuss the role of automated validation in driving model quality, and share best practices for identifying and training system modelers. Abstract
  • 3. 3 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I An AbstractView of Product Development/Acquisition Dispose Concept Development Manufacture Maintain/ Sustain
  • 4. 4 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Dispose Concept Development Manufacture Maintain/ Sustain Air Gaps STOP STOP STOP STOP Fidelity and momentum is lost every time there is a handoff; this is caused by the “air gaps”
  • 5. 5 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Digital Engineering Digital Engineering / Digital Thread / Digital Twin Intended to Eliminate Air Gaps Dispose Maintain/ Sustain Manufacture Development Concept
  • 6. 6 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Domain-specific Analysis Tools Dispose Model Based Systems Engineering Tools Maintain/ Sustain Manufacture Development Future State of Digital Engineering Concept PLM Tools/Big Data (failure/logistic analysis)
  • 7. 7 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Descriptive Executable Descriptive vs. Executable Architectures and Models System Modeling Tools Modeling & Simulation Tools
  • 8. 8 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Situation – Demands, Risk, Speed, and ChangeThreaten Mission Success
  • 9. 9 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I 6,000 5,000 4,000 3,000 2,000 1,000 0 KSLOC 1954 1968 1982 1995 2009 2023 System Complexity Is Growing Exponentially https://savi.avsi.aero/about-savi/savi-motivation/exponential-system-complexity/ G ROWT H OF S OFT WAR E COMP LE XIT Y IN MILITARY AIR CR AFT Thousands of Lines of Code (KSLOC) Used in Specific Aircraft Over Time F-111 FB-111 F-15A F-16A F-18A F-16C F-16Es0 F-15CDs0 F-15Es2 F-15CDs2 F-16C/s0T3 F-15CDs4 F-22 F-16Es4E+ F-16/50m2 JSF CTOL F-106 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
  • 10. 10 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I The U.S. Department of Defense Recognizes Current Approaches Cannot Manage this Explosion in Complexity “ ” — LtGen Robert D. McMurray, AFLCMC/CC Our current defense acquisition system applies industrial age processes to solve information age problems. This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
  • 11. 11 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I The Law of Conservation of Systems Engineering “ ” — James Long, FINCOSE T I M E The amount of systems engineering required for a given project is fixed. You don’t get to choose how much systems engineering you do. You simply get to choose when you do it (up front, or during integration and testing), how much positive impact it has, and how much it costs.
  • 12. 12 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Systems Architecture: Managing that Complexity Architecting defines what to design, while design defines what to build. “ ” — Hillary Sillitto, Architecting Systems: Concepts, Principles, and Practice This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I A high-fidelity simulation of the wrong system is wrong.
  • 13. 13 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Digital Engineering Processes (…really,most Systems Engineering processes) are intended for: • New development • An older, single-source procurement environment • Intra- vs Inter-organizational stovepipes leading to unexpected model management problems and costs • Tailoring…but don’t tell you HOW to tailor effectively • The pitfalls of frameworks • Inexperienced practitioners attempting advanced modification Common Challenges • Existing system documentation is unavailable or out of date • Older documentation standards, lack of funding to update CDRLs, old data rights agreements, etc. • Configuration management of systems in the field has degraded • Sustainment & Development organizations are stove-piped or firewalled…or not under contract • Shifting Baselines:Operations can’t stop and wait for DE…which may never catch up • Lack of DE-capable development environment accessible to all stakeholders • Lack of available process and tool experts • “Magic Sauce” expectations for Model Based Systems Engineering (MBSE) Legacy Systems & Digital Engineering Complexity 13
  • 14. 14 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Digital Twin/Model Based Product Support SE Digital Thread A Big Picture with Fuzzy Boundaries 14 MBSE Detailed Design, BOM Specialty Engineering Analysis Test, Integration,Verification, OA/ATO Predictive Modeling & Simulation Cost, Schedule, CM/BM Problem Reports, Defects,Feedback Actual System Configurations Real-time Data, IoT Recorded Performance Logistics Databases = Legacy systems want to live here,but often lack crucial data from the inner circles Architecture and Requirements (Design Intent)
  • 15. 15 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Another (Pessimistic?) View 15 Digital Twin MBSE By the time a system is deployed,this data will be dead… …and this data will be completely disconnected from the engineering data needed to do an impact analysis and plan an upgrade. Digital Thread
  • 16. 16 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I From the Department of Defense Digital Engineering Strategy (2018)
  • 17. 17 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Apply SE to planning DE:Who are your stakeholders? What are your use cases? SAIC has developed Program Interviews to determine Program and Organizational readiness for MBSE and Digital Engineering transformation efforts. Program Interviews help determine where and what Programs/Organizations need to address to have the mostly likelihood of success. • To evaluate capabilities → assess as-is state • To refine and build-up capabilities → execute to-be transition Where to Start a Digital Transformation? Aligning Outcomes For a Clear Transformation 17 Integrated Transition & Execution Plan (1b) Business Session People Process Tools As-Is vs To-Be (1a) Capability Benchmarking Session Key Milestones Training Staffing (2) Staff Development Session Staffing Plans Training Plans Integrate Without Disruption (3) Ecosystem Session Build Borrow Bring Tooling Plan (4) Execution Session Methods Style Govern. Execution Plan Action Plans Action Plans Action Plans Business Plans Practices & Partnerships Tip For Legacy Programs: Expect to identify all your existing system data owners, data rights, data formats, predicted level of data accuracy, and names of SMEs that can fill in gaps
  • 18. 18 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Model-Based Systems Engineering (MBSE) is a component of DE Often the First Step in Implementing Digital Engineering 18 …to model and integrate data across full enterprise lifecycle,… …and across all engineering and management domains… Create and utilize DE Ecosystems… …to inform decision making based on authoritative data reasoned across all domains. Initially, MBSE covers requirements and architecture management and then extends to cover integration,verification, and validation Tip For Legacy Programs: Start with your physical architecture
  • 19. 19 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Digital Engineering Strategy Distilled Starting with the End in Mind…or Just Starting at the End? 19 1. Model and integrate data across full enterprise lifecycle 2.At each point within the lifecycle,model and integrate data across all engineering and management domains Digital Twin (DTw) Model-Based Product Support (MBPS) Digital Mission Engineering (DME) Tip For Legacy Programs: When starting in medias res, consider reverse engineering strategies for data capture.
  • 20. 20 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I New Tools: Languages and Frameworks: The digital transformation of systems engineering depends upon the creation of well-crafted, consistent, and complete descriptive and executable system models. Skilled modelers are in short supply Growing new modelers requires coaching and guidance Many ways to build a bad model Models are huge and complex to review (manually) (10^5-10^6 elements) Our semantic broker is a promising technology that facilitates data interchange Aras Innovator / Ansys Minerva / PLM vendor solutions (DS, PTC, Siemens) Barriers to Building Your First Architecture Model Skills, Bench Depth,and Recruiting 20
  • 21. 21 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Modeler only directly influences the methodology When style guides and ontologies are followed, queries may be constructed in the model to return information of interest: • Properties • Usages • Related elements Unfortunately the style guide and other rules are not always followed consistently Building a Better Model Start with a Solid Model Style & AutomaticValidation • Efficiency • Effectiveness • Elegance Modeling Effort Factors • Language • Tool • Methodology Elegance Contributors Constants (Effectively) *Warning: • Frameworks are not languages • Languages do not dictate methodology • Tools do not dictate methodology Tip For Legacy Programs: Know when to cut your losses when it comes to reusing legacy models Drawing → Diagram → Data
  • 22. 22 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I SysML provides too many options: a model style selects an optimal set of options an organization agrees to restrict themselves to. • Everyoneuses the same options • Only a portion of the language is used Engineers new to modeling need to focus representing their technical content in the model, not selecting the best modeling technique Training can be shorter and more effective Model analysis is easier to implement Model-to-Model compatibility is improved Integration of the model with external tools is simplified Why Use a Model Style Guide? 22 A Style Guide is a Key Enabler for MBSE Program Success
  • 23. 23 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I DigitalTransformation BOM Centric Lacking holistic view of design intent System Centric Graphic courtesy of
  • 24. 24 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I DigitalTapestry: Custom and Partial DigitalThreads Each enterprise/team has custom priorities … but all data connects through System Architecture System Model • Design intent Manufacturing • eBOM tomBOM Verificationand Validation • Test data management Detailed Design • Mechanical • Electronics • Electrical • Software Digital Twin/MMA • Assets in the field Graphic courtesy of System Architecture
  • 25. 25 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Systems engineering focuses on behaviors, structure, requirements, and relationships related to the system-of-interest Traditional, Document-Intensive Systems Engineering (DISE), relies on humans-in-the-loop to read and understand narrative and graphical content … and to integrate it into a coherent understanding of the system and its architecture DISE approaches are inherently“lossy” and labor-intensive and do not scale well to large, cyberphysical systems Architecture Is Part of Systems Engineering
  • 26. 26 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Leads to siloed, disconnected views of system No guarantee of consistency between views Often delivered as PDFs, Excel, or other disjointed artifacts Difficult to review thoroughly Document-Intensive SE This is NOT a new problem! This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
  • 27. 27
  • 28. 28 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Apollo Experience Report – Guidance and Control Systems
  • 29. 29 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Concluding Remarks and Recommendations, Page 13
  • 30. 30 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Competent Model-Based Systems Engineering (MBSE) is the foundation for the “digital thread” that is needed to manage the complexities of modern product development SysML is the dominant language for executing system models in support of MBSE A well-formed SysML model includes: • Behavior (what elements do and how they collaborate,including robustinput/outputdefinition) • Structure (parts/components/assemblies) • Interfaces (connections/flows) • Parametrics(equations that govern system behavior or properties) • Requirements(with automatic conformance assessment) MBSE and SysML
  • 31. 31 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Recreating traditional artifacts in a more sophisticated tool: Drawing → Diagram Configuration control was limited or non-existent MBSE Evolution: MBSE 1.0
  • 32. 32 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I MBSE efforts stall because they fail to grasp the opportunities inherent in the new approach • Confounding the outcome with the means • Excessive focus on diagrams/viewsvs. data Models can be more consistent and coherent…but it takes skill and effort to achieve that end Our Challenge: MBSE Missteps
  • 33. 33 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Evaluates the use for every potential modeling artifact before creating it: • What question am I trying to answer? • What risk/technical debt am I buying down? • What“bang for the buck” am I getting? Evaluates the method applied to creating each modeling artifact for elegance, efficiency, and effectiveness … even at the expense of language purity • What is the fewest number of clicks I can make to achieve my intended use? • How can I reuse what is previously created to achieve new uses through inference? Maximizes reuse to minimize the opportunities for inconsistency Ensures complete synchronization between structure, behavior, and interfaces MBSE Evolution: MBSE 2.0
  • 34. 34 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I “…this involves a willingness to trade off theoretical purity or future perfection in favor of getting things done today.” p. 26 “…a willingness to experiment and be proven wrong. This means we try stuff. We fail. Then we use the lessons from that failure in the next experiment.” p.27 Apprenticeship Patterns:Guidance for the Aspiring Software Craftsman (2009) David H. Hoover & Adewale Oshineye.O’Reilly Media MBSE 2.0 and Pragmatism
  • 35. “I don’t care what anything was designed to do, I care about what it can do.” Gene Kranz, as portrayed by Ed Harris, Apollo 13, 1995 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
  • 36. 36 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Every modeling efforthas several factors that may be used to describe it:  = Efficiency factor = output/input (0 <  < 1)  = Effectiveness factor = ability to accomplish intended outcome (0 <  < 1)  = Elegance value (0 <  < 1)   =  The Importance of Elegance in Modeling
  • 37. 37 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Language, tool, and method each have their own contributions to this equation: language language tool tool method method =  Once the tool and language are selected, those terms are effectively constants…so any modeler is only able to directly influence: method method The NeMO Orbiter:A Demonstration Hypermodel, Vinarcik, Michael J., Ground Vehicle Systems Engineering and Technology Symposium, Novi, 2018 The Importance of Elegance in Modeling
  • 38. 38 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I “One critical,inescapable fact is that every model element has a cost associated with its elicitation,creation,definition,and maintenance. Therefore,if a system can be described rigorously and completely with n elements, each n + i, where i > 0, element adds no value and only increases cost.” The NeMO Orbiter:A Demonstration Hypermodel,Vinarcik, Michael J., Ground Vehicle Systems Engineering and Technology Symposium, Novi, 2018 Nothing is Free
  • 39. 39 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I One way to minimize cost is to maximize inference… • If f(x) = y, then defining x defines y In a similar way, if style guides and ontologies are followed, queries may be constructed that follow any number of “hops” in the model to return information of interest: • Properties • Usages • Related elements If the style guide and other rules are not followed, this breaks down. Inference Is Key
  • 40. 40 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I System modeling is a skills-based discipline. Models grow rapidly (105-106 model elements) Not all model elements may appear on diagrams (diagram-centric review is hopeless) Reviewing tables and matrices takes time The need: • Make it“easy” for modelers to conform to a style guide/ontology/semantics • Minimize the administrivia in checking/enforcing compliance The Larger Problem
  • 41. 41 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I MagicDraw and other tools permit the creation of custom validation rules These may be aggregated into various validation suites and specify: • Elements to which they apply • Error message • Severity • The rule itself Rules may be shared in profiles and may be run automatically or upon demand (including mandatory validation before committing to a collaboration server) The Solution: Validation Rules andValidation-Driven Metrics
  • 42. 42 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Provided free of charge to the worldwide system modeling community Intended to improve model quality and accelerate training of competent system modelers Consists of: • Validation rules • Customizations • Supporting documentation • How-to videos Licensed as specified in the model Supported with a model-based style guide and example model (Ranger lunar probe) Updated at SAIC’s discretion (in part, based upon feedback from the modeling community) SAIC Digital Engineering Profile SupportsSysML in MagicDraw/Cameo System Modeler (Dassault Systèmes) and Rhapsody
  • 43. 43 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Shipshape and Bristol Fashion: Model Documentation and Curation to Facilitate Reuse (Vinarcik/Jugovic,2019 NDIA Systems and Mission Engineering Conference) discussed the use of automated validation in systems modeling: “When a model passes validation, you KNOW it is compliant…Validation is fast and consistent, Seconds/Minutes vs. Hours” SAIC released its Digital EngineeringValidationTool in December 2019: • V1.0 (December 2019—126 rules): • Initial customizations • Videos • V1.5 (April 2020—153 rules) • Model-based Style Guide • Example model (Ranger lunar probe) • Rhapsody rules • V1.6 (August 2020—164 rules) • Classification/Data Rights customization • V1.7 (January 2020—184 rules) • FMEA customization SAIC Digital EngineeringValidationTool
  • 44. 44 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I SysML provides too many options—a model style selects an optimal set of options an organization agrees to restrict themselves to: • Everyone uses the same options • Only a portion of the language is used Engineers new to modeling need to focus representing their technical content in the model, not selecting the best modeling technique Training can be shorter and more effective Model analysis is easier to implement Model-to-Model compatibility is improved Integration of the model with external tools (i.e., a dashboard or PLM tool) is simplified Why Use a Model Style Guide? A Style Guide Is a Key Enabler for MBSE Program Success
  • 45. 45 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Automatic validation drives: • Consistency with a given style (use of relationships,properties,etc.) • Completeness (required propertiesand usage) This facilitates mapping of the system model to other data models WhyValidation Is Important Without a consistent Rosetta Stone, exposing information to the enterprise is impossible!
  • 46. 46 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I 2020 ASEE Conference Paper: Treadstone:A Process for Improving Modeling Prowess UsingValidation Rules
  • 47. 47 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Model Info Errors Size Pages Collection Rover 0 0 25,614 246 Retrieval Lander 0 0 11,259 153 Fetch Rover 0 0 15,343 139 Ascent Rocket 0 0 23,721 301 Return Orbiter 0 0 16,572 117 Mars Expedition Ice Mapper 0 0 24,970 243 Mars NAVCOM 72 167 18,127 262 Mission Control/Deep Space Network 474 0 12,271 148 Integration Model 13 12 5,892 1,651 Mars Octet Model Sizes (3 DEC 2020: 74 Days) Novices Can Mature ModelsWhen Supported by Automation https://hypermodeling.systems
  • 48. 48 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Constructed in support of SAIC’s ValidationTool • Rigorous,well-defined relationshipsenforced with automatic validation • Example structure:Functions are representedas operations owned by the performing block Original model is freely available for download: https://www.saic.com/digital-engineering-validation-tool Modified for this topic to as proof of concept SAIC’s Example Model: Ranger Lunar Probe Source Model Must be Well-Formed to Enable Analysis All analysis that requires components & functions should reference this directly
  • 49. 49 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I SAIC FMEA Profile
  • 50. 50 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I States and Failure Modes A failure mode is a sub-optimal state (state customized as Failure) Transitions that lead to a Failure are a Cause of Failure When a component enters a Failure state, some operations become unavailable, which are the local effect of failure When a component enters a failure state, additional undesirable behaviors may occur, which can be defined as operations customized as Malfunctions, and contribute to defining local effects of failure. Failure State Cause of Failure
  • 51. 51 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I SAIC FMEA Profile: State and Mission-Thread Driven Analysis
  • 52. 52 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Use Cases, Hazards, and Final Effect of Failure • When using a well-formed model, final effect of failure can be automatically derived from local effect of failure through inherent relationships to supported use cases (see next chart) • A Hazard can be represented as an extension point of a use case, clarifying what happens when the use case is compromised • A Hazard is assigned an coarse severity Hazard Hazard
  • 53. 53 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Each Failure state is assigned a severity by an engineer based reviewing the affected use cases, associated hazards, hazard severity, and owned Malfunctions. Deriving Final Effect of Failure, Hazards, and Failure Severity Local Effects Final Effects
  • 54. 54 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Assigning & Calculating Probabilities of Occurrence Each Cause of Failure is assigned a Occurrence and Detection • In this example,we use a scale of 1-10 from ASQ,but more precise numericalvalues can be applied (https://asq.org/quality-resources/fmea) Each Cause of Failure has a Severity which is pulled from the Severity of the Failure state (see previous) Each Cause of Failure has a calculated Criticality and RPN
  • 55. 55 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Finalizing the Analysis All Cause of Failure transitions to a Failure state contribute the Criticality and RPN • Additional calculations can roll up these values to any useful level • Results can be displayed and manipulated in the model • Changes to values propagate immediately • Note the malfunctions that occur in the failure state (in this case, “Uncontrolled Thrust”)
  • 56. 56 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I By adopting this approach, FMEA/FMECA analysis is embedded into the architecture and uses the same information (so it is always synchronized). The hazard/FMEA/FMECA analysis can also be segregated into a higher-level analysis model that uses the primary architecture model: • Preventsproliferation of properties/domain-specificadditions into the primaryarchitecturalmodel • Isolates potentially sensitive/trade secret information The Hidden Benefit
  • 57. 57 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I From Avoiding Engineering Gaffes:Automated CriticalityAssessment and Error Detection (Nathan J.Vinarcik,2021 INCOSE Great Lakes Regional Conference) Notional analysis of Galileo probe high-gainantenna failure Retract functionshown as the only recovery from Jam
  • 58. 58 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Own the technical baseline • Break out of vendor lock • Apply more modern analytical techniques to solve problems • Speed capability development and deployment Join the Internet ofThings (IoT)/Develop a DigitalTwin • Predict failures in the field • Dynamic spares management and support Impact Analysis • Plan upgrades with more precise cost/time estimating • Avoid unintended impacts FederatedArchitecture Participation • Represent your system in emerging System of Systems architectures Comply with Initiatives and Policies • …but do you want to check the box or realize value? (Hint:both cost money) Legacy Systems & Digital Engineering (DE) Opportunities
  • 59. 59 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I Style Guide Overview Style Guide Demonstration FailureAnalysis Demonstration Moxie Demonstration Classification Profile Demonstration Videos
  • 60. Conclusions This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I
  • 61. 61 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I A well-formed system model in SysML provides a rigorous, unambiguous representation of a system’s architecture at any level of abstraction Queries, validation rules, and derived work products ensure stakeholders receive valid information Competent modeling delivers rigor at the speed of relevance Automatic validation dramatically improves model quality, facilitates other analysis, and enables information to be encoded properly for sharing throughout the digital thread Synchronization of federated tools, driven by authoritative information in the system model, improves collaboration and communication across all disciplines Competent SysML Modeling
  • 62. 62 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I “We’ll start the war from right here!” Brigadier General Theodore Roosevelt, Jr. Utah Beach 06 JUN 1944 Tempo and MomentumAre Key: Get Started!
  • 63. 63 This presentation consists of SAIC general capabilities information that does not contain controlled technical data as defined by the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11. I © SAIC. ALL RIGHTS RESERVED I SAIC DE Profile &Validation Rules: https://www.saic.com/digital-engineering- validation-tool SAIC Digital Engineering