{"title":"Ensuring the safety and quality of meals for security forces through the use of irradiation","authors":"S. Jetawattana, Y. Henon","doi":"10.1109/ACDT.2015.7111583","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111583","url":null,"abstract":"This paper provides background information on the irradiation of food for improved safety and quality and the prospective benefits of the technology for meals destined to security forces, disaster relief and humanitarian assistance.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122850579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nithinun Tanvilaipong, Nirut Chalainanont, C. Kumsap
{"title":"Database management to suppport automatic placement of 3D building models to a simulated scene","authors":"Nithinun Tanvilaipong, Nirut Chalainanont, C. Kumsap","doi":"10.1109/ACDT.2015.7111606","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111606","url":null,"abstract":"To create a scene in a virtual world as close as possible to a real world counterpart requires a lot of manual steps and subsequently time. In order to reduce the steps and time above, geo databases with the spatial extension combining with a customized data management application shown here can be used. Combining this application with other applications such as image comparison applications, can help achieve the automation of the process of placing model such as military buildings into a scene. This application was developed as web application using geo spatial open source software and tools such as Openlayer and Geoserver. It operates on vector data stored in PostGIS database. Scene developers can use the application to search for different GIS-layers' data of an area. Search arguments can be a key word or coordinates, which need the spatial processing ability of the PostGIS DBMS to find results. The search results are mapped with the matched models. This helps reducing the scene developing time. In this paper, the focus is on how the aforementioned application and database design help ease the process of automated placing matched 3D models into scenes based on vector data of GIS Layers in the database and how this application is developed. With continual improvement of GIS open source software, a spatial database management program can be easily built. Moreover, the use of these open source software can reduce the cost of virtual world products. DTI as a research organization can and will benefit from this.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129826767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Warut Thammawichai, Navapan Poopakdee, C. Suwanchawalit, Kullatat Suwatpipat
{"title":"Synthesis and characterization of cellulose-microfibril reinforced epoxy composite","authors":"Warut Thammawichai, Navapan Poopakdee, C. Suwanchawalit, Kullatat Suwatpipat","doi":"10.1109/ACDT.2015.7111607","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111607","url":null,"abstract":"Cellulose-microfibril reinforced epoxy composite (CMF/Epoxy) is synthesized and possibly considered as an alternative aircraft material. Specifically, the cellulose microfibrils are successfully prepared from coir by NaOH/H2O2 treatment and characterized by Scanning Electron Microscopy (SEM), X-ray diffraction (XRD), and Fourier-transformed infrared spectroscopy (FTIR). According to the SEM results, the chemical treatment can remove wax residual, hemicellulose, and lignin from the surface of the fibers, yielding the cellulose microfibrils with diameters of 15-20 μm. The XRD spectra show that the crystallinity of the cellulose microfibrils increases. The FTIR spectra suggest that their impurity contents on the surface are chemically reduced. The addition of 2% (w/w) cellulose microfirils into epoxy can dramatically increase the tensile modulus of the CMF/Epoxy by 40%.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Applying multivariate data analysis to identify key parameters of bi-directional attack flows","authors":"Korakoch Wilailux, S. Ngamsuriyaroj","doi":"10.1109/ACDT.2015.7111611","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111611","url":null,"abstract":"Flow export data has been intensively used in anomaly-based intrusion detection systems; however, we have limited understanding of the characteristics of bi-directional flow parameters with respect to the types of network attacks. To recognize the relationship between traffic parameters, we propose an empirical model which analyzes synthetically generated five network attacks within a closed environment, and perform exploratory data analysis using principal component analysis. The experimental results have identified relevant key parameters for selecting good candidates for intrusion detection analysis. The analysis capabilities of bi-directional flow parameters and their characteristics persisting in selected attacks have been diagnosed and revealed.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115424832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of arms race model at fractional order","authors":"Y. Suansook","doi":"10.1109/ACDT.2015.7111603","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111603","url":null,"abstract":"Mathematical theory of fractional calculus has applied to study many fields of physical science recently. In this paper, this theory has applied further to study on mathematical model of arms race proposed by Saperstein. The model is in the discrete form of couple logistic equations. This type of dynamical system may provide key to understand complex behaviors in social and political science in term of nonlinear dynamics. The conflict event that leads to outbreak of war can be identified as the transition to chaotic state in dynamical system. The dynamical behaviors of the arms race model explain by phase space. The numerical calculations of the arms race model have presented their fractional-order state behaviors.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115517052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid approach for linguistic information integration to multi-experts multi-attribute decision-making problem","authors":"N. Pongsathornwiwat, V. Huynh, T. Theeramunkong","doi":"10.1109/ACDT.2015.7111594","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111594","url":null,"abstract":"The decision problem is certainly to deal with multiple dimensions of attribute providing by multiple of sources of information in order to obtain the single solution, so-called multi-experts multi-attribute decision-making. It is quite also that the provided information is usually conflict between not only from multiple dimensions but also from the different sources which cause the uncertain of information. Besides, the most of obtained information is naturally in the linguistic forms that always cause the information loss problem as intensively mentioned in the literature. It is highly necessary to develop the tool in order to deal with linguistic decision making without loss of information. In this study the alternative approach is proposed to overcome such issues by eliminating the linguistic representation and approximation processes of linguistic values in the computational step. To do so, we shall apply the Dempster-Shafer (D-S) theory of evidence as an alternative framework, by first defining experts' preferences on each alternative according to each attribute as randomly linguistic preferences. Then obtaining a collective preference value by making use of Dempster's rule of combination. For decision making purpose, based on pignistic transformation and satisfactory principle, we can provide a rank ordering among the alternatives. A numerical example for tank evaluation problem is used to illuminate the proposed technique.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The damaged analysis from ballistic threats on transparent armor","authors":"Chidchanok Chaichuenchob, S. Sinchai","doi":"10.1109/ACDT.2015.7111575","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111575","url":null,"abstract":"Transparent armor is a group of transparent materials whose main role is providing the protection against high velocity projectile or fragment. It is known that the configuration of transparent armor have a big influence on the ballistic protection. In this study, various thicknesses of soda-lime glass sheets were laminated using PVB films as interlayers. The obtained transparent armor was ballistic tested by 7.62 mm FMJ ammunition at various projectile velocities. In all specimens, the ballistic penetration stopped at the first layer. The intercept counting method was used to determined the damage level appeared on the test specimen. It was found that the number of crack on the 12-mm-thick strike plate was higher than those in 19-mm-thick strike plate. However, the calculated new surface areas of these two specimens were in the same range which implied the similar amount of kinetic energy absorbed in the strike plates having different thickness. The cracks bifurcated were observed when the impact velocity was higher than 838 m/s.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130694408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation on detection accuracy of RFID tags on back-to-back queuing objects","authors":"Choermath Hongakkaraphan, Chutima Beokhaimook, Phalakron Nilkhet","doi":"10.1109/ACDT.2015.7111582","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111582","url":null,"abstract":"While the RFID technology is widely used for object identification, its application to detect sequence of multiple objects located close to each other in a limited area is challenging due to tag identification ambiguity. This paper presents an empirical study of multiple-tag detection accuracy when tags are attached to certificate recipients who make a back-to-back queue on a stage in a graduation ceremony. The investigation is done on three parameters; the distance between an RFID reader and tags, the interval between two consecutive recipients and the walking velocity. The experiment result shows that when the objects to be detected are far from the reader, the detection performance drops, resulting in higher missing rates but lower swapping. A short tag-tag interval triggers a high missing rate and a high swapping rate with a low duplication rate. The high tag velocity induces a high missing rate and a low duplication rate but no trend in the swapping rate.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132855353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internal ballistics simulation based on object oriented programming","authors":"Roongtawan Laimek, Wichai Pawgasame","doi":"10.1109/ACDT.2015.7111587","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111587","url":null,"abstract":"The knowledge of internal ballistics simulation is quite obscure due to security reason related to rocket implementation for national defense. Internal ballistics simulation involves complex calculation of thrust profile generated by burning solid propellant mass. The design of appropriate solid propellant mass for desired thrust profile requires visualization of propellant mass and overlook how it burns from the start to the end. Object-oriented programming has been used as a tool for simulation of complex mathematic algorithms in many fields. This paper introduced object-oriented programming framework and software architecture for solving complex calculation of thrust profile and visualization of burning solid propellant. JAVA programming language is chosen to implement a test program for proving objected-oriented programming based internal ballistics simulation. The result shows the reasonable trend of thrust profile according to the real behavior of thrust generated by solid propellant. This paper gives intuitive idea of implementing simulation tool for designing of solid propellant mass in rocket application.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125127499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of dynamic inversion based outer-loop anti-swing control law for a helicopter slung-load system","authors":"T. Yomchinda","doi":"10.1109/ACDT.2015.7111612","DOIUrl":"https://doi.org/10.1109/ACDT.2015.7111612","url":null,"abstract":"Using helicopters to deliver supplies to forward ground units in high-threat environments can lead to increase in troop mobility and enlarge the area of operation. However, flying a limited aircraft performance due to slung load in a high-threat area could increase the pilots' workload significantly. The goal of the work was to develop an outer-loop control law to help pilot in controlling helicopter slung-load system. The dynamic inversion control scheme was used to develop an outer-loop control assisting system. A mathematical model of generic utility helicopter with externally slung load in vertical-longitudinal axes was developed and accounted for the force and moment interaction between helicopter and load. Numerical results was evaluated and shown to provide improved mission performance.","PeriodicalId":311885,"journal":{"name":"2015 Asian Conference on Defence Technology (ACDT)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114553150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}