Int. J. Intell. Def. Support Syst.最新文献

筛选
英文 中文
Adding thermal information to multisensory inputs in simulated environments 在模拟环境中为多感官输入添加热信息
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2009.031417
G. V. Doorn, B. Richardson, M. Symmons, Jonathan R. Wells
{"title":"Adding thermal information to multisensory inputs in simulated environments","authors":"G. V. Doorn, B. Richardson, M. Symmons, Jonathan R. Wells","doi":"10.1504/IJIDSS.2009.031417","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031417","url":null,"abstract":"Although simulated environments are improved by adding sensory information, temperature is one input that has rarely featured in them. Here we report findings from experiments that examine the efficacy of adding temperature information to the multimodal complex known to be of benefit in simulations. In the first experiment, Peltier tiles added thermal information to the kinesthetic feedback given by a hand-worn exoskeletal device and this increased ratings for 'presence' during interactions with simulated objects. In an experiment in which exploratory movements across surfaces of differing temperatures were either active or passive-guided, the degree of 'coldness' felt at the fingertip was reported as less intense when movement was active, suggesting that intentionality of movement plays a role in the attenuation of the thermal stimulus. Other work reported here suggests that the perception of temperature is not influenced by a simultaneously presented colour. For example, the perception of coldness is not enhanced when it is processed in conjunction with a blue colour. We discuss the potential value of thermal information within the context of the hypothesis that presence in simulated environments is enhanced by multisensory inputs that include redundant information.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates 一个决策支持网络服务,在定期更新环境预报的情况下,为反海盗行动分配资产
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2018.099897
François-Alex Bourque, R. Grasso, R. Vicen-Bueno, G. Cimino, P. Braca, J. Osler
{"title":"A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates","authors":"François-Alex Bourque, R. Grasso, R. Vicen-Bueno, G. Cimino, P. Braca, J. Osler","doi":"10.1504/IJIDSS.2018.099897","DOIUrl":"https://doi.org/10.1504/IJIDSS.2018.099897","url":null,"abstract":"The rise of piracy in the Gulf of Aden and off the coast of Somalia prompted several nations to direct their navies to conduct counter-piracy operations in that region of the world. A major challenge with such operations is the sheer size of the area to patrol. One way to address this problem is by noting that pirates are more likely to operate under favourable environmental conditions and to focus patrols in areas where such conditions prevail by generating maps of piracy risk based on environmental forecast. This contribution presents a system that invokes a multi-objective optimiser with each new forecast to help the decision makers plan operations over the course of days, weeks or months. Implemented using web-based technologies to mitigate for potential resource limitations at the client site, the resulting decision support system is demonstrated for a counter-piracy operation conducted off the coast of Somalia.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133345942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extension of Ant System algorithms with exponential pheromone deposition rule for improved performance 基于指数信息素沉积规则的蚂蚁系统算法扩展
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.025020
A. Acharya, A. Banerjee, A. Konar, L. Jain
{"title":"Extension of Ant System algorithms with exponential pheromone deposition rule for improved performance","authors":"A. Acharya, A. Banerjee, A. Konar, L. Jain","doi":"10.1504/IJIDSS.2008.025020","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025020","url":null,"abstract":"The paper extends the classical Ant System (AS) algorithms by proposing a novel approach of exponential pheromone deposition by artificial ants ensuring a concentration gradient along solution paths. The stability analysis with a deterministic mathematical model based on differential equation yields the proper range of the parameters. A roadmap of connected cities, where the shortest path between a source-destination pair is to be determined, is taken as a problem environment. Exhaustive simulations confirm that the proposed deposition rule, with properly chosen parameter values, outperforms the traditional one with large margin both in terms of solution quality and algorithm convergence.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demonstrating interoperability between unmanned ground systems and command and control systems 演示无人地面系统和指挥控制系统之间的互操作性
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2021.115236
Kim Mathiassen, F. Schneider, Paul Bounker, A. Tiderko, G. D. Cubber, Magnus Baksaas, Jakub Glówka, R. Kozik, T. Nussbaumer, J. Röning, J. Pellenz, André Volk
{"title":"Demonstrating interoperability between unmanned ground systems and command and control systems","authors":"Kim Mathiassen, F. Schneider, Paul Bounker, A. Tiderko, G. D. Cubber, Magnus Baksaas, Jakub Glówka, R. Kozik, T. Nussbaumer, J. Röning, J. Pellenz, André Volk","doi":"10.1504/IJIDSS.2021.115236","DOIUrl":"https://doi.org/10.1504/IJIDSS.2021.115236","url":null,"abstract":"This paper describes the research and experiment efforts of the NATO STO group IST-149-RTG capability concept demonstrator for interoperability within unmanned ground systems and C2 and the NAAG team of experts on UGV. The main purpose of the group was to investigate possible standards for controlling UGVs and tests them in a real world scenario. The efforts have been two folded, where the first effort was two NATO groups having an experiment demonstrating interoperability between the UGVs and OCUs available within the group. The Belgium contribution is done in the EU project ICARUS. Both efforts used the Joint Architecture for Unmanned Systems (JAUS) with the interoperability profile (IOP) to successfully enable interoperability between the systems. The trials showed that it is possible to extend the systems quite easily and achieve compliance with parts of the standard in a relatively short time.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Soft metrics: What are they and what use are they for the Intelligence Community? 软指标:它们是什么,它们对情报界有什么用处?
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2009.031416
M. Quirk
{"title":"Soft metrics: What are they and what use are they for the Intelligence Community?","authors":"M. Quirk","doi":"10.1504/IJIDSS.2009.031416","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031416","url":null,"abstract":"Modern decision making challenges the human capacity to reason in an environment of uncertainty, imprecision, and incompleteness of information. Atop the uncertainty, ranking in the presence of multiple criteria, multiple agents, and heterogeneous sources of information is often the main task to accomplish by the analysts in the Intelligence Community (IC). Soft metrics are attributes of decision criteria that cannot be expressed numerically. These metrics are at the core of a computational engine that is perception-based, with computational 'atoms' expressed in natural language (NL). The soft metrics approach as a basis for natural language-based computing contributes to fast analyses and an efficient use of human resources in contemporary decision making such as: intelligence data analysis, the Global Strike (target pairing), risk analysis, threat assessment, strategic interactions, conflict analysis, and the strategic deterrence assessment.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel and improved methods of regular geometric shape recognition from digital image using artificial ants 基于人工蚂蚁的数字图像规则几何形状识别新方法
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.025021
A. Acharya, K. Chattopadhyay, A. Banerjee, A. Konar
{"title":"Novel and improved methods of regular geometric shape recognition from digital image using artificial ants","authors":"A. Acharya, K. Chattopadhyay, A. Banerjee, A. Konar","doi":"10.1504/IJIDSS.2008.025021","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025021","url":null,"abstract":"This contribution demonstrates how artificial ants can extract regular geometric shapes from grey scale images. We propose here two methods the first of which is a modified version of existing Ant System algorithm. The second method proposed is Ant Regeneration and Recombination System (ARRS). Our schemes comprise of three steps. Firstly, MATLAB edge detection operator converts a grey scale image into a binary one. Our schemes are then applied on this binary image to detect closed loops. Finally, these closed loops are tested for different geometric shapes. The schemes with incredible time and memory efficiency can detect both intersecting and non intersecting regular shapes.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A systems-level understanding of adversarial behaviour 对对抗行为的系统级理解
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2012.053676
Lora Weiss, E. Briscoe, E. Whitaker, E. Trewhitt, Heather Hayes, J. Horgan
{"title":"A systems-level understanding of adversarial behaviour","authors":"Lora Weiss, E. Briscoe, E. Whitaker, E. Trewhitt, Heather Hayes, J. Horgan","doi":"10.1504/IJIDSS.2012.053676","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053676","url":null,"abstract":"Modelling behaviour related to the perpetration of improvised explosive devices is extremely complex. Behavioural aspects range from those who create a plan to those who gather supplies for developing the devices to those who passively look the other way. Developing computational approaches to understanding such behaviour necessitates either a decomposition of behavioural activity into smaller, manageable behaviours or generalising larger, group behaviour where gross trends are observed. This may suffice for particular applications; however, additional consideration can be given to developing more comprehensive approaches. Specifically, for those seeking to understand terrorism, a number of social, cultural and behavioural perspectives are being developed by experts worldwide. These perspectives may complement each other or they may be in conflict, but they equally contribute to a broader understanding. Our research is developing computational methods to analyse and experiment with differing views and perspectives of potential influences on adversarial behaviour at this system-level.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating digital targeting in a joint fires experiment 联合火力试验中的数字瞄准评估
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2015.075475
T. Au
{"title":"Evaluating digital targeting in a joint fires experiment","authors":"T. Au","doi":"10.1504/IJIDSS.2015.075475","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075475","url":null,"abstract":"The Coalition Attack Guidance Experiment (CAGE) aims to assess potential joint fires capabilities and operational impacts, which can be effective to meet challenges from new and evolving threats. An important objective is digital targeting focusing on target development and timely prosecution. The need to coordinate geographically distributed assets and personnel throughout a theatre of combat is constantly in tension with the need to prosecute quickly. This study provides an empirical comparison of digital targeting using baseline and potential future Command and Control (C2) systems as two experimental conditions. While CAGE IIIA demonstrated the benefits of a coalition human-in-the-loop experiment across multiple sites, we learned valuable lessons to improve this scientific endeavour. Technical failures and confounding factors have threatened the validity of this complex experiment, inevitably weakening our understanding of potential capabilities. For future work, we identify the need to consider the human dimension and extant processes for effective system integration.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127814240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAVE: a wireless Java enabled automobile accident reporting system SAVE:一个支持Java的无线汽车事故报告系统
Int. J. Intell. Def. Support Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJIDSS.2008.023009
D. Acharya, Vijay Kumar, G. Gaddis, N. Garvin
{"title":"SAVE: a wireless Java enabled automobile accident reporting system","authors":"D. Acharya, Vijay Kumar, G. Gaddis, N. Garvin","doi":"10.1504/IJIDSS.2008.023009","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.023009","url":null,"abstract":"In this paper we focus on management of auto accidents involving Emergency Medical Services (EMS) where the incident has left passengers incapacitated to summon help using communication devices. Almost all available systems require human intervention, and do not analyse environmental conditions inside the vehicle to summon most appropriate medical help. Our work in this paper aimed to create SAVE – an automatic vehicular accident reporting system that can be fitted to any vehicle, requires no human intervention and, in the event of an accident, sends necessary data to the EMS so that appropriate medical assistance can be dispatched to victims promptly.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信