Naval CMS quality review — duplicate EW requirements, degraded mode gaps, and missing verification coverage

System

{{entity:Naval Combat Management System}} ({{hex:51FD7959}}), project se-naval-cms. This is the QC review session following first-pass completion of all 10 subsystems across 58 components. The project entered this session with 185 requirements, 184 trace links, and 15 diagrams across 8 baselines.

Findings

Duplicate requirements (4 instances). The {{entity:Electronic Warfare Subsystem}} decomposition contains textual duplicates: {{sub:SUB-SUBSYSTEMREQUIREMENTS-053}} duplicates {{sub:SUB-SUBSYSTEMREQUIREMENTS-049}} ({{entity:Electronic Attack Controller}} jamming initiation), {{sub:SUB-SUBSYSTEMREQUIREMENTS-054}} duplicates {{sub:SUB-SUBSYSTEMREQUIREMENTS-050}} (simultaneous jamming capacity), {{sub:SUB-SUBSYSTEMREQUIREMENTS-055}} duplicates {{sub:SUB-SUBSYSTEMREQUIREMENTS-051}} ({{entity:EW Threat Library}} database capacity), and {{sub:SUB-SUBSYSTEMREQUIREMENTS-056}} duplicates {{sub:SUB-SUBSYSTEMREQUIREMENTS-052}} (field-programmable updates). These were created across different decomposition sessions and flagged in {{arc:ARC-ARCHITECTUREDECISIONS-001}} for consolidation.

Degraded mode requirements lack measurable criteria (4 instances). {{stk:STK-STAKEHOLDERNEEDS-005}} establishes the need for degraded operation but specifies no acceptance thresholds. {{sub:SUB-SUBSYSTEMREQUIREMENTS-009}} ({{entity:Threat Evaluation Engine}} degraded priority) and {{sub:SUB-SUBSYSTEMREQUIREMENTS-092}} ({{entity:Common Operating Picture Generator}} degraded refresh) specify behavior but not measurable pass/fail values. {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-014}} partially addresses this with 500-track capacity and 500ms latency thresholds but lacks warfare domain engagement criteria.

Ontological mismatch (2 high-severity). UHT classifies both the system ({{hex:51FD7959}}) and {{entity:Electronic Attack Controller}} ({{hex:51F77A39}}) without the {{trait:Physical Object}} trait, but requirements impose physical/environmental constraints on both. This is ontologically correct — these are abstract system concepts with physical packaging requirements — but flags a gap in physical embodiment specification at subsystem level.

Verification coverage thin. Only 11 verification entries covered 185 functional requirements before this session. Safety-critical functions (EMCON compliance, cybersecurity, degraded mode operation) had no verification approach defined.

Structural. Verification requirements are co-mingled with functional requirements by AIRGen document structure, not a real quality issue.

flowchart TB
  CMS["Naval Combat Management System"]
  SM["Sensor Management"]
  TM["Track Management"]
  TEWA["TEWA"]
  WC["Weapon Control"]
  EW["Electronic Warfare"]
  CM["Communications Management"]
  TD["Tactical Display"]
  NP["Navigation and Platform"]
  DPI["Data Processing Infrastructure"]
  TS["Training and Simulation"]

  SM -->|Sensor reports| TM
  TM -->|Correlated tracks| TEWA
  TEWA -->|Engagement orders| WC
  EW -->|ESM bearings| TM
  CM -->|Data link tracks| TM
  TM -->|Tactical picture| TD
  NP -->|Own-ship data| TM
  TS -->|Simulated sensor data| SM
  WC -->|Weapon status| TEWA
  TEWA -->|Decision displays| TD

Corrections

Added {{sub:SUB-SUBSYSTEMREQUIREMENTS-105}} — physical embodiment requirement for {{entity:Electronic Attack Controller}}: 6U VME LRU with MIL-STD-461G EMI shielding and 5000-hour MTBF. Traced to {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-012}}.

Added {{sub:SUB-SUBSYSTEMREQUIREMENTS-107}} — measurable degraded mode criteria for {{entity:Threat Evaluation Engine}}: 3-second evaluation cycle for top 50 tracks, weapon assignment for top 10 threats within 5 seconds at 70% capacity. Traced to {{sys:SYS-SYSTEM-LEVELREQUIREMENTS-014}}.

Added 3 verification entries. {{ver:VER-VERIFICATIONMETHODS-012}} (degraded mode progressive node disabling test), {{ver:VER-VERIFICATIONMETHODS-013}} (EMCON RF monitoring test with 30-minute compliance period), {{ver:VER-VERIFICATIONMETHODS-014}} (cybersecurity red-team penetration test). All traced to parent requirements.

Created SYS→VER linkset to enable system-level requirements to trace directly to verification entries.

Resolved 2 orphaned requirements (SUB-104, SUB-106) created by failed jq parsing during the session — traced to their parent system requirements.

Cross-domain check. {{entity:Weapon Safety Interlock Manager}} ({{hex:44B57871}}) shares 84% Jaccard similarity with {{entity:firing interlock}} ({{hex:C4A53859}}) — the safety interlock pattern is consistent across weapon system domains. No missing requirements identified from the analog.

Residual

The 4 duplicate EW requirements (SUB-053 through SUB-056) remain in place per the no-silent-overwrites rule. They are documented in {{arc:ARC-ARCHITECTUREDECISIONS-001}} for consolidation by an operator session. The degraded mode findings on original requirements (STK-005, SUB-009, SUB-092) persist because companion requirements were added rather than modifying originals. The 2 HIGH ontological mismatch findings are accepted as correct UHT classification — the entities are abstract systems with physical packaging constraints, not physical objects per se.

Next

The project is ready for validation (Flow D). The validation session should focus on: (1) whether the 10-subsystem decomposition with 58 components accurately represents a real naval CMS architecture; (2) whether interface protocols and data rates are realistic for military shipboard systems; (3) whether safety-critical requirements (weapon interlocks, EMCON, training mode isolation) meet the standards expected for a defence system at this criticality level; and (4) consolidating the 4 duplicate EW requirements.

← all entries