Content
October 2024, Volume 21, Issue 4
- 359-362 The need for cooperation between wargaming and modeling & simulation for examining Cyber, Space, Electronic Warfare, and other topics
by Phillip Pournelle - 363-380 A decision support system for multi-stakeholder exploration of the airship design space
by DC Richards & John L Salmon & Tevin J Dickerson & Christopher A Mattson & William J Neff - 381-394 Modeling of Russian–Ukrainian war based on fuzzy cognitive map with genetic tuning
by Alexander Rotshtein & Brian A Polin & Denys I Katielnikov & Neskorodieva Tetiana - 395-404 Use of agent-based modeling to model intermediate force capabilities in (counter)mobility crowd scenarios
by Jessica Afara & Victoria Ajila & Hannah Macdonell & Peter Dobias - 405-420 Development and assessment of a resilient telecoms system
by George Gallarno & Jeremy Muniz & Gregory S Parnell & Edward A Pohl & Jingxian Wu - 421-440 Accelerated point set registration method
by Ryan M Raettig & James D Anderson & Scott L Nykl & Laurence D Merkle - 441-452 Modeling efficiency and safety on an aircraft carrier flight deck
by Mary L Cummings & Songpo Li & Hong Han & Carlos Aguilar - 453-462 Numerical investigation of modern threats for ground vehicles with emphasis on fragmentation behavior during hard kill scenario
by Morten Rikard Jensen & Philip Mulligan & Kshitiz Khanna - 463-486 Simulating quantum key distribution in fiber-based quantum networks
by Dashiell LP Vitullo & Trevor Cook & Daniel E Jones & Lisa M Scott & Andrew Toth & Brian T Kirby
July 2024, Volume 21, Issue 3
- 267-268 Cutting edge technologies for future military applications: trends and challenges
by Michael Gargalakos - 269-281 Autonomous underwater vehicle challenge: design and construction of a medium-sized, AI-enabled low-cost prototype
by Dimitrios Paraschos & Nikolaos K. Papadakis - 283-291 Space environment effects on equipment and structures—current and future technologies
by Dionysios Tompros & Dionysios E Mouzakis - 293-300 Space surveillance architecture: issues and challenges – an integrated approach
by Dionysios Tompros - 301-312 Physical Optics Radar Cross Section predictions for an anti-ship cruise missile
by Panagiotis Touzopoulos & Konstantinos C Zikidis - 313-321 The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond
by Michael Gargalakos - 323-340 Effects of datalink target data on air-to-air missile performance
by John Öström & Timo Sailaranta & Kai Virtanen - 341-355 Statistical modeling of cargo securing on selected military trucks and road surfaces
by Jiri Neubauer & Martin Vlkovsky & Jaroslav Michalek
April 2024, Volume 21, Issue 2
- 119-125 A look back at the past 44 years of live virtual and constructive (LVC) simulation and lessons for cyberspace LVC
by Michael G. Lilienthal - 127-140 Wargaming the use of intermediate force capabilities in the gray zone
by Kyle D Christensen & Peter Dobias - 141-147 Fog, friction, and control in organized conflict: punctuated transitions to instability
by Rodrick Wallace - 149-170 Supporting shipboard helicopter flight testing with simulation and metrics for predicting pilot workload
by Perry Comeau & Alanna Wall & Eric Thornhill & Sean McTavish & Richard Lee - 171-179 An experimental intervention to investigate user perceptions of computer versus manual board wargame
by Jeremy Smith & Trevor Ringrose & Stephen Barker - 181-203 Detection and defense of cyberattacks on the machine learning control of robotic systems
by George W Clark Jr & Todd R Andel & J Todd McDonald & Tom Johnsten & Tom Thomas - 205-227 Verification, validation, and accreditation for models and simulations in the Australian defence context: a review
by Kerryn R Owen & Ripon K Chakrabortty - 229-243 Simulation analysis of applicant scheduling and processing alternatives at a military entrance processing station
by Phillip M LaCasse & Lance E Champagne & Jonathan M Escamilla - 245-258 Simulation of the attack helicopter Mil Mi-24 conducting anti-surface air operations in support of a battalion task group
by ZbyÅ¡ek Korecki & Tomas Hoika & Jiřà Ulvr & Miroslav JanoÅ¡ek & MatuÅ¡ Grega - 259-259 RETRACTED: “Integrated methodology for substantiation of the rational district placement of the evacuated populationâ€
by N/A - 261-261 RETRACTED: “Multicriteria analysis of firefighter routes in buildings in the case of a fireâ€
by N/A - 263-263 RETRACTED: “Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstanâ€
by N/A
January 2024, Volume 21, Issue 1
- 3-4 Modeling and simulation in graduate military education
by Michael R Grimaila - 5-15 A metric for quantifying nonlinearity in k-dimensional complex-valued functions
by Larry C Llewellyn & Michael R Grimaila & Douglas D Hodson & Scott Graham - 17-29 The wargame commodity course of action automated analysis method
by William T. DeBerry & Richard Dill & Kenneth Hopkinson & Douglas D. Hodson & Michael Grimaila - 31-45 Modeling a high-speed pin-on-disk experiment
by Aron Wing & Tony Liu & Anthony Palazotto - 47-64 Structure from motion with planar homography estimation: a real-time low-bandwidth, high-resolution variant for aerial reconnaissance
by Christian Arnold & Scott Nykl & Scott Graham & Robert Leishman - 65-73 Traumatic brain injury risk assessment with smart technology
by Chiming Huang & Rosa H Huang & Bani Yaghoub Majid - 75-86 “Neuroscience†models of institutional conflict under fog, friction, and adversarial intent
by Rodrick Wallace - 87-102 Network characterization and simulation via mixed properties of the Barabási–Albert and Erdös–Rényi degree distribution
by Fairul Mohd-Zaid & Christine Schubert Kabban & Richard F Deckro & Wright Shamp - 103-116 Interoperability analysis via agent-based simulation
by Melissa Pescatore & Paul Beery
October 2023, Volume 20, Issue 4
- 425-427 Growth directions for the JDMS community
by Harrison Schramm - 429-430 Making simulations future proof
by George Stone - 431-446 Epidemic Attack on the Aircraft Carrier Theodore Roosevelt: Bridging the Gaps in Emergency Management
by Kenneth Lai & Svetlana N Yanushkevich & Vlad P Shmerko - 447-465 A live mindset in Live Virtual Constructive simulations: a spin-up for future LVC air combat training
by Sanna Aronsson & Henrik Artman & Mikael Mitchell & Robert Ramberg & Rogier Woltjer - 467-480 Using cognitive models to design dynamic task allocation systems
by Christopher R Fisher & Mary E Frame & Christopher Stevens - 481-493 Multiple maneuver model of cooperating ground combat troops
by Jan Nohel & Petr Stodola & Zdeněk Flasar & Marian Rybanský - 495-508 On games and simulators as a platform for development of artificial intelligence for command and control
by Vinicius G Goecks & Nicholas Waytowich & Derrik E Asher & Song Jun Park & Mark Mittrick & John Richardson & Manuel Vindiola & Anne Logie & Mark Dennison & Theron Trout & Priya Narayanan & Alexander Kott - 509-526 Strategic maneuver and disruption with reinforcement learning approaches for multi-agent coordination
by Derrik E Asher & Anjon Basak & Rolando Fernandez & Piyush K Sharma & Erin G Zaroukian & Christopher D Hsu & Michael R Dorothy & Thomas Mahre & Gerardo Galindo & Luke Frerichs & John Rogers & John Fossaceca - 527-539 Open-set low-shot classification leveraging the power of instance discrimination
by Spiridon Kasapis & Geng Zhang & Jonathon M Smereka & Nickolas Vlahopoulos - 541-551 Fast procedure for vulnerability simulation of armored vehicles
by Morten Rikard Jensen & Steven Grate & Kshitiz Khanna - 553-561 Performance analysis of cooperative NOMA system for defense application with relay selection in a hostile environment
by Indrajeet Kumar & Aman Kumar & Ritesh Kumar Mishra - 563-575 NER-based military simulation scenario development process
by Junhua Zhou & Xiaoqing Li & Shaoping Wang & Xiao Song - 577-588 Machine learning to combat cyberattack: a survey of datasets and challenges
by Arvind Prasad & Shalini Chandra
July 2023, Volume 20, Issue 3
- 285-288 Who hacked my holodeck?
by Katherine L Morse - 289-294 Where is the SIMNET for cyberspace?
by Scott D Lathrop - 295-301 Life-shortening effects of radiological weapons in military operations
by Edson R Andrade & Isabela S Alves & Ana Carolina Lodi Lobato & Ricardo M Stenders & Rodrigo C Curzio & Carlos Eduardo S Bonfim - 303-316 Analysis of user pairing non-orthogonal multiple access network using deep Q-network algorithm for defense applications
by Shankar Ravi & Gopal Ramchandra Kulkarni & Samrat Ray & Malladi Ravisankar & V Gokula krishnan & D S K Chakravarthy - 317-332 Simulation of chromatic and achromatic assessments for camouflage textiles and combat background
by Md Anowar Hossain - 333-350 Promises and pitfalls of computational modelling for insurgency conflicts
by Koen van der Zwet & Ana I Barros & Tom M van Engers & Peter M A Sloot - 351-369 Past challenges and the future of discrete event simulation
by Andrew J Collins & Farinaz Sabz Ali Pour & Craig A Jordan - 371-381 Behavior of oil-based modeling clay at medium strain rates
by Camilo Hernandez & Mario F Buchely & Juan P Casas-Rodriguez & Alejandro Maranon - 383-389 Weight and configuration optimization of the launcher pod using finite element analysis
by Mithilesh Kumar Dewangan & S K Panigrahi - 391-401 Landmine detection via multivariate image analysis
by Paulo Maranhão & Leandro Andraos & Rodrigo Guedes & Eugenio Epprecht - 403-413 The department of defense high performance computing modernization program
by J Michael Barton - 415-422 Effect of combat textile cloth on human radar cross section for microwave camouflage applications
by Renan Richter & Daniel Gonçalves & Newton A S Gomes
April 2023, Volume 20, Issue 2
- 109-110 Modeling and simulation in mission assurance
by Colonel Eric D Trias - 111-130 The effects of aircraft use and available repair spares on aircraft sortie generation: a long-duration logistical wargaming simulation tool
by Nathaniel Choo & Darryl Ahner & Lance Champagne - 131-146 Modeling fog of war effects in AFSIM
by Dillon Tryhorn & Richard Dill & Douglas D Hodson & Michael R Grimaila & Christopher W Myers - 147-158 Stochastic preemptive goal programming of Air Force weapon systems mix
by Justin L Anderson & Jessica M Astudillo & Zachary E Butcher & Matthew D Cornman & Anthony J Correale & James B Crumpacker & Nathaniel C Dennie & Alex R Gaines & Mark A Gallagher & John C Goodwill & Emily S Graves & Donald B Hale & Kimberly G Holland & Benjamin D Huffman & Michelle McGee & Nicholas A Pollack & Rachel C Ramirez & Camero Song & Emmie K Swize & Erick A Tello & Jesse G Wales & Julius C Walker & Andrew B Wilson & William F Wilson & Kylie E Wooten & Marcelo Zawadzki - 159-170 Evaluation of Linear Implicit Quantized State System method for analyzing mission performance of power systems
by Navid Gholizadeh & Joseph M Hood & Roger A Dougal - 171-180 On Maskirovka: the dynamics of delay in threat recognition
by Rodrick Wallace - 181-196 Effectiveness evaluation of aerial reconnaissance in battalion force protection operation using the constructive simulation
by Jan Drozd & LudÄ›k Rak & Pavel ZahradnÃÄ ek & Petr Stodola & Jan Hodický - 197-212 Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods
by Athanasios Donas & Ioannis Famelis & Peter C Chu & George Galanis - 213-228 Renewable energy and energy storage to offset diesel generators at expeditionary contingency bases
by Scott M Katalenich & Mark Z Jacobson - 229-244 Investigation of Bi-Directional LSTM deep learning-based ubiquitous MIMO uplink NOMA detection for military application considering Robust channel conditions
by Joel Alanya-Beltran & Ravi Shankar & Patteti Krishna & Selva Kumar S - 245-258 Examination of the multiple-input multiple-output space-time block-code selective decode and forward relaying protocol over non-homogeneous fading channel conditions
by Ravi Shankar & Patteti Krishna & Naraiah R - 259-268 Impact of the learning rate and batch size on NOMA system using LSTM-based deep neural network
by Ravi Shankar & B K Sarojini & Haider Mehraj & A Suresh Kumar & Rahul Neware & Ankur Singh Bist - 269-282 Recasted nonlinear complex diffusion method for removal of Rician noise from breast MRI images
by Pradeep Kumar & Subodh Srivastava & Y Padma Sai
January 2023, Volume 20, Issue 1
- 3-37 Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare
by Robert Chandler Swallow - 39-39 Impact analysis for cyber defense optimization
by Steven Noel - 41-56 Performance impact analysis of services under a time-based moving target defense mechanism
by Júlio Mendonça & Jin-Hee Cho & Terrence J Moore & Frederica F Nelson & Hyuk Lim & Dan Dongseong Kim - 57-79 Optimizing network microsegmentation policy for cyber resilience
by Steven Noel & Vipin Swarup & Karin Johnsgard - 81-95 Graph analytics and visualization for cyber situational understanding
by Steven Noel & Stephen Purdy & Annie O’Rourke & Edward Overly & Brianna Chen & Christine DiFonzo & Joseph Chen & George Sakellis & Mandira Hegde & Mano Sapra & Corrine Araki & Jeremy Martin & Ben Koehler & John Keenan & Timothy Coen & William W Watson & Jerry Harper & Kevin Jacobs - 97-106 Using network digital twins to improve cyber resilience of missions
by Rajive Bagrodia
October 2022, Volume 19, Issue 4
- 563-573 A tutorial on cooperative non-orthogonal multiple access networks
by Bhanu Pratap Chaudhary & Ravi Shankar & Ritesh Kumar Mishra - 575-587 AFSIM’s pseudo-realtime hybrid simulation software design
by J Scott Thompson & Douglas D Hodson - 589-600 Siting strategy for co-locating windfarms and radars considering interference constraints
by Ashish Sharma & Ajay Kumar & Sushabhan Choudhury - 601-612 Application of a terminal-ballistics model for estimating munition lethal radius on mortar projectiles and rocket warheads
by Catovic Alan & Kljuno Elvedin - 613-623 Military scientism and its discontents
by Rodrick Wallace - 625-635 Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria
by Abdullahi Yusuf & Nasiru Ibrahim Tambuwal & Hadiza Ahmad Gusau & Faruk Usman Maiyaki - 637-647 Numerical study of the anti-penetration performance of sandwich composite armor containing ceramic honeycomb structures filled with aluminum alloy
by Hongwei Zhu & Changfang Zhao - 649-657 Radiological urban threat due to special protective actions from security forces
by Mariana SC Castro & André Luiz Q Reis & Ricardo M Stenders & Isabela Santos Alves & Jose Carlos C Amorim & Ademir Xavier da Silva & Edson R Andrade - 659-677 Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions
by Morten Rikard Jensen & Wilford Smith & Kshitiz Khanna - 679-689 Designing hierarchical networks to improve patient access to care: a case study in veteran eye care
by Adam VanDeusen & Amy Cohn & April Maa - 691-701 Optimizing fire allocation in a Network Centric Warfare-type model
by Nam H Nguyen & My A Vu & Anh N Ta & Dinh V Bui & Manh D Hy - 703-712 Space to Air High-Altitude Region Adjoint Neutron Transport
by Zachary W LaMere & Darren E Holland & Whitman T Dailey & John W McClory - 713-722 Shipborne moving target indicator radar versus incoming sea-skimming missile mathematical modeling and simulation
by Theodoros G. Kostis - 723-737 Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions
by Sharnil Pandya & Patteti Krishna & Ravi Shankar & Ankur Singh Bist - 739-746 Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform
by Abhishek Kesharwani & Vaibhav Aggarwal & Shubham Singh & Rahul B R & Arvind Kumar - 747-757 Real-time calculation of the initial angle of projection for fragments in cylindrical warheads
by David Felix & Ian Colwill & Paul Harris - 759-769 Sum rate capacity of non-orthogonal multiple access scheme with optimal power allocation
by Lokesh Bhardwaj & Ritesh Kumar Mishra & Ravi Shankar - 771-781 Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information
by Ravi Shankar & Shovon Nandi & Ajay Rupani - 783-797 Real-time simulation of a fragmenting explosion for cylindrical warheads
by David Felix & Ian Colwill & Paul Harris - 799-806 Analysis of NOMA-OFDM 5G wireless system using deep neural network
by Sharnil Pandya & Manoj Ashok Wakchaure & Ravi Shankar & Jagadeeswara Rao Annam - 807-820 Design and simulation research of the double-spin folding mechanism based on a suspended missile
by ZH Yuan & SY Guo & SN Zhang & JQ Zhao & WJ Lu & HZ Zhao - 821-828 Analysis of the energy harvesting non-orthogonal multiple access technique for defense applications over Rayleigh fading channel conditions
by Manoj Kumar Beuria & Ravi Shankar & Sudhansu Sekhar Singh - 829-838 Investigation of the fifth generation non-orthogonal multiple access technique for defense applications using deep learning
by Ravisankar Malladi & Manoj Kumar Beuria & Ravi Shankar & Sudhansu Sekhar Singh - 839-854 RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security
by Prashnatita Pal & Bikash Chandra Sahana & Jayanta Poray - 855-864 Evaluation of unmanned aerial vehicle tactics through the metrics of survivability
by Ian Lunsford & Thomas H Bradley
July 2022, Volume 19, Issue 3
- 239-244 Command and its discontents: Instabilities of institutional anytime algorithms on a Clausewitz landscape
by Rodrick Wallace - 245-253 Methodology for analysis of heavy vehicle trafficability in deformable soils
by Elias Dias Rossi Lopes & André Flora Alves Pinto & Moisés Xavier Guimarães Valentim & Pedro Siciliano Peixoto & Gustavo Simão Rodrigues & Ricardo Teixeira da Costa Neto - 255-262 Model of an alternative navigation system for high-precision weapons
by Vitalii Savchenko & Volodymyr Tolubko & Liubov Berkman & Anatolii Syrotenko & Pavlo Shchypanskyi & Oleksander Matsko & Vitalii Tiurin & Pavlo Open’ko - 263-286 A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints
by Uchenna Daniel Ani & Jeremy McKendrick Watson & Madeline Carr & Al Cook & Jason RC Nurse - 287-298 LVC Allocator: Aligning training value with scenario design for envisioned LVC training of fast-jet pilots
by Sanna Aronsson & Henrik Artman & Mikael Mitchell & Robert Ramberg & Rogier Woltjer - 299-311 Engineering resilient systems cloud computing architecture (ECCA): a collaborative and secure analysis framework
by Collin T Blakley & Letitia W Li & Greg Eakman & Brent C Baker - 313-324 Methods to measure and track population perception and support within a manual wargame
by Jeremy Smith & Stephen Barker - 325-338 A multiresolution simulation system and simulation development processes
by Young-Jun Jee & Tae-Gyung Lee & Sang-Ho Park & Jun-Ho Cho & Hee-Soo Kim & Tae-Eog Lee - 339-345 White noise jammer mathematical modelling and simulation
by Theodoros G Kostis - 347-353 RETRACTED: Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstan
by Yernar Zh Akimbayev & Zhumabek Kh Akhmetov & Murat S Kuanyshbaev & Arman T Abdykalykov & Rashid V Ibrayev - 355-361 RETRACTED: Integrated methodology for substantiation of the rational district placement of the evacuated population
by Yernar Zh Akimbayev & Zhumabek Kh Akhmetov & Murat S Kuanyshbaev & Aleksandr I Mazanik & Asylbek T Abildin - 363-373 Modeling fast jet infrared countermeasures: Pseudo-imaging seekers with an ultraviolet guard band
by A Glover & M A Richardson & N Barlow - 375-384 End-to-end improved convolutional neural network model for breast cancer detection using mammographic data
by Pradeep Kumar & Subodh Srivastava & Ritesh Kumar Mishra & Y Padma Sai - 385-401 Simplified reliability-based load design factors for explosive blast loading, weapons effects, and its application to collateral damage estimation
by Mark G Stewart - 403-415 Using Monte Carlo simulations to translate military and law enforcement training results to operational metrics
by Adam T. Biggs & Dale A. Hirsch - 417-422 Size and History Combine in Allometry Relation of Technology Systems
by Bruce J. West & Damien West & Alexander Kott - 423-432 RETRACTED: Multicriteria analysis of firefighter routes in buildings in the case of a fire
by Hai T Nguyen & Nikolay G Topolsky & Denis V Tarakanov & Alexander V Mokshantsev - 433-451 Virtual testbed for monocular visual navigation of small unmanned aircraft systems
by Kyung Kim & Robert C Leishman & Scott L Nykl - 453-465 Examination of a non-orthogonal multiple access scheme for next generation wireless networks
by Ravi Shankar - 467-480 Actor–critic-based decision-making method for the artificial intelligence commander in tactical wargames
by Junfeng Zhang & Qing Xue - 481-500 An agent-based modeling approach for simulating the impact of small unmanned aircraft systems on future battlefields
by Carsten Christensen & John Salmon - 501-517 Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy
by Dave Archer & Michael A August & Georgios Bouloukakis & Christopher Davison & Mamadou H Diallo & Dhrubajyoti Ghosh & Christopher T Graves & Michael Hay & Xi He & Peeter Laud & Steve Lu & Ashwin Machanavajjhala & Sharad Mehrotra & Gerome Miklau & Alisa Pankova & Shantanu Sharma & Nalini Venkatasubramanian & Guoxi Wang & Roberto Yus - 519-538 How AI founders on adversarial landscapes of fog and friction
by Rodrick Wallace - 539-550 Investigation of low-density parity check codes concatenated multi-user massive multiple-input multiple-output systems with imperfect channel state information
by Lokesh Bhardwaj & Ritesh Kumar Mishra & Ravi Shankar - 551-559 Modeling the effect of skidded timber bunches on forest soil compaction
by Igor Grigorev & Olga Kunickaya & Albert Burgonutdinov & Olga Burmistrova & Varvara Druzyanova & Nikolay Dolmatov & Anna Voronova & Alexey Kotov
April 2022, Volume 19, Issue 2
- 125-126 The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training
by Joseph Cohn & Eric Vorm & Erin Baker - 127-128 The applications of artificial intelligence to education and training
by Michael van Lent & Dylan Schmorrow - 129-131 Modeling what matters: AI and the future of defense learning
by Sae Schatz & JJ Walcutt - 133-144 Explainable artificial intelligence for education and training
by Krzysztof Fiok & Farzad V Farahani & Waldemar Karwowski & Tareq Ahram - 145-158 Can machine learning be used to forecast the future uncertainty of military teams?
by Ronald H Stevens & Trysha L Galloway - 159-171 Deep neural networks for the assessment of surgical skills: A systematic review
by Erim Yanik & Xavier Intes & Uwe Kruger & Pingkun Yan & David Diller & Brian Van Voorst & Basiel Makled & Jack Norfleet & Suvranu De - 173-193 A reinforcement learning approach to adaptive remediation in online training
by Randall Spain & Jonathan Rowe & Andy Smith & Benjamin Goldberg & Robert Pokorny & Bradford Mott & James Lester - 195-218 Performance gains from adaptive eXtended Reality training fueled by artificial intelligence
by Kay M Stanney & JoAnn Archer & Anna Skinner & Charis Horner & Claire Hughes & Nicholas P Brawand & Eric Martin & Stacey Sanchez & Larry Moralez & Cali M Fidopiastis & Ray S Perez - 219-227 Challenges and opportunities for artificial intelligence in surgery
by Pamela Andreatta & Christopher S. Smith & John Christopher Graybill & Mark Bowyer & Eric Elster - 229-236 The importance of identifying the dimensionality of constructs employed in simulation and training for AI
by Michael D Coovert & Winston Bennett Jr
January 2022, Volume 19, Issue 1
- 3-4 Cyber risk and vulnerability estimation
by Hasan Cam - 5-11 Complexity and mission computability of adaptive computing systems
by Venkat R Dasari & Mee Seong Im & Billy Geerhart - 13-22 Vulnerability Selection for Remediation: An Empirical Analysis
by Ankit Shah & Katheryn A. Farris & Rajesh Ganesan & Sushil Jajodia - 23-35 Cybersecurity threats and experimental testbed for a generator system
by Aaron W Werth & SueAnne N Griffith & Jesse R Hairston & Thomas H Morris - 37-55 Estimation of cyber network risk using rare event simulation
by Alexander L Krall & Michael E Kuhl & Shanchieh J Yang - 57-106 Machine learning in cybersecurity: a comprehensive survey
by Dipankar Dasgupta & Zahid Akhtar & Sajib Sen - 107-121 Agent-based target evaluation and fire doctrine: an aspect-oriented programming view
by Mehmet Fatih HocaoÄŸlu
October 2021, Volume 18, Issue 4
- 273-284 Creating surrogate models for an air and missile defense simulation using design of experiments and neural networks
by Brian M Wade - 285-293 Live–virtual–constructive simulation for testing and evaluation of air combat tactics, techniques, and procedures, Part 1: assessment framework
by Heikki Mansikka & Kai Virtanen & Don Harris & Jaakko Salomäki - 295-308 Live–virtual–constructive simulation for testing and evaluation of air combat tactics, techniques, and procedures, Part 2: demonstration of the framework
by Heikki Mansikka & Kai Virtanen & Don Harris & Jaakko Salomäki - 309-315 A dynamic weighted algorithm for multiple radar fusion in an active protection system
by Jinli Wang & Haiping Song & Riming Chen & Yaning Zhang - 317-332 Mean wind model for direct fire ballistics
by Tomas Bober & Thomas Recchia - 333-348 Atmospheric turbulence model for direct fire ballistics
by Tomas Bober & Thomas Recchia - 349-363 How the enemy gets a vote: Fog-of-war, friction, and the cultural riverbanks of the Clausewitz landscape
by Rodrick Wallace - 365-373 Immediate decisions based on long-term consequence evaluation for a radiological event
by Tercio Brum & Sergio X Lima & José Carlos C Amorim & Ricardo M Stenders & Matjaž Prah & Helio C Vital & Edson R Andrade - 375-394 Adaptive leader election for control of tactical microgrids
by Robert S Jane & Steven Y Goldsmith & Gordon G Parker & Wayne W Weaver & Denise M Rizzo - 395-406 The virtual infantry soldier: integrating physical and cognitive digital human simulation in a street battle scenario
by Dan Wang & Shi Cao & Xingguo Liu & Tang Tang & Haixiao Liu & Linghua Ran & Xiai Wang & Jianwei Niu - 407-416 Modeling and simulation of future capabilities with an automated computer-aided wargame
by John Langreck & Hermann Wong & Alejandro Hernandez & Stephen Upton & Mary McDonald & Anthony Pollman & William Hatch - 417-428 Effective sweep-width for barrier missions against an evasive target
by Steven J Rowling - 429-439 On integer linear programming formulations of a patrol boat scheduling problem with complete coverage requirements
by Paul A Chircop & Timothy J Surendonk - 441-451 Assessment of a coupled approach to determine the stress caused by gun blast loads
by Emiliano Costa - 453-468 Emerging approaches to support dynamic mission planning: survey and recommendations for future research
by Matthew Henchey & Scott Rosen - 469-483 Modelling militarized interstate disputes using data mining techniques: Prevention and prediction of conflicts
by Petr Stodola & Jozef Vojtek & Libor Kutěj & Jiřà Neubauer - 485-493 Layout optimization of a military operations center using a genetic algorithm
by Wenbi Wang - 495-504 An Analytic Hierarchy Process approach using multiple raters for the selection of complex technologies
by James B Wood & Jessica L Mason & Alessandra Bianchini - 505-514 Research on the digital modeling method of the blast-fragmentation warhead with preformed fragments
by Hongzhi Zhao & Jian Zhang & Zhengang Liang & Zhihua Yuan & Shuang Zhao & Lei Zhang & Lingna Zhang
July 2021, Volume 18, Issue 3
- 173-174 Artificial intelligence for defense applications
by Nathaniel D Bastian - 175-192 Stacked generalizations in imbalanced fraud data sets using resampling methods
by Kathleen R Kerwin & Nathaniel D Bastian - 193-205 A dual U-Net algorithm for automating feature extraction from satellite imagery
by Samuel Humphries & Trevor Parker & Bryan Jonas & Bryan Adams & Nicholas J Clark - 207-215 The Situation Awareness Window: a Hidden Markov Model for analyzing Maritime Surveillance missions
by Terry Caelli & Joyanto Mukerjee & Andy McCabe & David Kirszenblat - 217-237 Training data augmentation for deep learning radio frequency systems
by William H Clark IV & Steven Hauser & William C Headley & Alan J Michaels - 239-246 Joint sparsity-biased variational graph autoencoders
by Lane Lawley & Will Frey & Patrick Mullen & Alexander D Wissner-Gross - 247-269 Estimating the tactical impact of robot swarms using a semi-automated forces system and design of experiments methods
by Kevin L Foster & Mikel D Petty
April 2021, Volume 18, Issue 2
- 61-85 Adaptation by intelligent adversaries to defensive measures: framing adaptation options and demonstrating assessment of attacker preferences using proxy intelligence data
by Brian A Jackson & David R Frelinger & Jennifer Kavanagh & Brett A Wallace - 87-103 Research on detection mission scheduling strategy for the LEO constellation to multiple targets
by Fuyu Sun & Hua Wang - 105-124 SwarmSim: a framework for modeling swarming unmanned aerial vehicles using Hardware-in-the-Loop
by Derek B Worth & Brian G Woolley & Douglas D Hodson - 125-134 Prospect theory and its implications for adversarial decision-making
by Adam T Biggs & Kyle A Pettijohn - 135-156 Assessing uncertainty and risk in an expeditionary military logistics network
by Brandon M McConnell & Thom J Hodgson & Michael G Kay & Russell E King & Yunan Liu & Greg H Parlier & Kristin Thoney-Barletta & James R Wilson - 157-170 Building and sustaining the defense simulation training workforce
by Karen Louise Blackmore & Evan William Henry Allitt
January 2021, Volume 18, Issue 1
- 3-3 Modeling and Simulation as a Service
by Robert Siegfried - 5-28 Modeling and Simulation as a Service infrastructure capabilities for discovery, composition and execution of simulation services
by Jo Erskine Hannay & Tom van den Berg & Scott Gallant & Kevin Gupton - 29-38 Modeling and Simulation as a Service for joint military space operations simulation
by Başar Kasım & Ahmet Birol Çavdar & Mehmet Akif Nacar & Erdal Çayırcı - 39-58 Towards cloud-native simulations – lessons learned from the front-line of cloud computing
by Nane Kratzke & Robert Siegfried
October 2020, Volume 17, Issue 4
- 327-338 Adaptability of modular vehicle fleets to changing supply route characteristics
by M Mert Egilmez & Jong Min Park & Alparslan Emrah Bayrak & Bogdan I Epureanu & Panos Y Papalambros - 339-355 Demonstrating set-based design techniques: an unmanned aerial vehicle case study
by Colin Small & Gregory S Parnell & Ed Pohl & Simon R Goerger & Matthew Cilli & Eric Specking - 357-371 A decomposition solution approach to the troops-to-tasks assignment in military peacekeeping operations
by Nadia Chaudry & Ingunn Vermedal & Kjetil Fagerholt & Maria Fleischer Fauske & Magnus Stålhane - 373-388 Toward universal laws of technology evolution: modeling multi-century advances in mobile direct-fire systems
by Alexander Kott - 389-397 Path and policy analyses: a sustainability study of military workforce supply chains
by Jun Wang - 399-408 Modeling of the exploding foil initiator and related circuitry for the variable mode of operation
by A J Borman & C F Dowding & D Seddon - 409-418 Using the entropy weighting scheme in military decision making
by William P Fox & Gregory Spence & Reed Kitchen & Steven Powell - 419-434 Optimal deployment for anti-submarine operations with time-dependent strategies
by Corine M Laan & Ana Isabel Barros & Richard J Boucherie & Herman Monsuur & Wouter Noordkamp - 435-446 Resilience in engineered resilient systems
by Randy K Buchanan & Simon R Goerger & Christina H Rinaudo & Greg Parnell & Adam Ross & Valerie Sitterle - 447-456 Use of an aerial reconnaissance model during the movement of oversized loads
by Jan Drozd & Jiřà Neubauer
July 2020, Volume 17, Issue 3
- 231-233 Introduction to special issue on forecasting in the social sciences for national security
by Ryan G Baird - 235-242 A Bayesian forecasting model of international conflict
by George W Williford & Douglas B Atkinson - 243-267 Predictive models of world conflict: accounting for regional and conflict-state differences
by Nicholas J Shallcross & Darryl K Ahner - 269-283 Forecasting violent events in the Middle East and North Africa using the Hidden Markov Model and regularized autoregressive models
by KSM Tozammel Hossain & Shuyang Gao & Brendan Kennedy & Aram Galstyan & Prem Natarajan