Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS最新文献

筛选
英文 中文
Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions 埋地矿井爆炸事件参数表征,进一步强调交感爆轰和层状土床条件
IF 0.8
Morten Rikard Jensen, Wilford Smith, Kshitiz Khanna
{"title":"Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions","authors":"Morten Rikard Jensen, Wilford Smith, Kshitiz Khanna","doi":"10.1177/15485129211021169","DOIUrl":"https://doi.org/10.1177/15485129211021169","url":null,"abstract":"The presented work documents the results of a comprehensive sensitivity study of the structural response of a military vehicle subjected to the impulse from a buried charge using the discrete particle method (DPM) to model the soil and high explosive (HE) coupled to a finite-element solver for the structure. Eighteen different process and numerical parameters were studied. Each of the numerical results was compared with a base model to see the influence of the considered parameter. The structure in the base model was the TARDEC Generic Vehicle Hull and the response parameter was chosen to be the total blast impulse (TBI) on the structure. The non-linear transient dynamic explicit finite-element solver used for the analysis was the IMPETUS Afea Solver®. The study includes soil characteristics and charge related parameters, such as size, type, geometry, and location. The depth of burial (DOB) and number of discrete particles were also considered in the study. Further, different numerical parameters were included. The results provide a good understanding of process and numerical parameters when modeling buried charges with a coupled finite-element model (FEM) and DPM approach. As a natural extension of the sensitivity study the effect of a layered soil bed is investigated, the topsoil either being dry or wet soil. Further, it is illustrated how to model a sympathetic detonation where the detonation of one improvised explosive device (IED) generates a pressure that results in the detonation of a second IED.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84064365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing hierarchical networks to improve patient access to care: a case study in veteran eye care 设计分层网络以改善患者获得护理的机会:退伍军人眼科护理的案例研究
IF 0.8
Adam VanDeusen, Amy E. M. Cohn, April Y. Maa
{"title":"Designing hierarchical networks to improve patient access to care: a case study in veteran eye care","authors":"Adam VanDeusen, Amy E. M. Cohn, April Y. Maa","doi":"10.1177/15485129211021167","DOIUrl":"https://doi.org/10.1177/15485129211021167","url":null,"abstract":"Across the United States, many patients, including veteran patients, face barriers in accessing appropriate, timely, and affordable healthcare. When developing or modifying healthcare systems to improve patient access, we can consider strategies (e.g., telehealth) in which lower-cost, more abundant resources are used for services often performed with more constrained and/or more expensive, specialized resources. We propose a framework in which hierarchical care networks allow patients to receive frontline care from lower cost, more accessible alternatives, while specialized resources are reserved for more complex care. We use operations research tools, including mixed-integer programming and facility location models, to design and analyze these networks. We present a case study applying these methods to improve veterans’ access to eye care screenings. The case study results demonstrate that using different providers in locations throughout the system can increase the number of patients screened by nearly four times the number currently screened while increasing the budget by only 2.5%. When designing healthcare networks to improve access, decision makers must consider several trade-offs, including how resources are distributed. Operations research tools are effective methods for understanding, designing, and evaluating these trade-offs to best understand the wide-ranging impacts of resource (re)distribution.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79091674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Radiological urban threat due to special protective actions from security forces 由于安全部队采取的特殊保护行动,城市受到放射性威胁
IF 0.8
Mariana S. C. Castro, A. L. Q. Reis, R. Stenders, I. S. Alves, J. Amorim, A. Silva, E. Andrade
{"title":"Radiological urban threat due to special protective actions from security forces","authors":"Mariana S. C. Castro, A. L. Q. Reis, R. Stenders, I. S. Alves, J. Amorim, A. Silva, E. Andrade","doi":"10.1177/15485129211016539","DOIUrl":"https://doi.org/10.1177/15485129211016539","url":null,"abstract":"The neutralization of suspicious objects by a conventional explosion in public places seems to be an option often considered by security forces. A radiological dispersive device (RDD) uses a radioactive material coupled to an amount of conventional explosive in order to contaminate an area. Extremist groups may take advantage of such protocol by leaving the radioactive material in public places to provoke suspicion, thus leading to the neutralization by an explosion, which in turn creates a RDD event. This work aims to discuss the influence of such a protocol in the radiological threat by means of computational simulation. The total maximum effective dose equivalent (TEDE Max), the Pasquill–Gifford atmospheric stability classes (PG classes), and the potentially affected population size were evaluated. The results consider two radionuclides Cs-137 and Sr-90. The findings allow us to infer that TEDE Max and surface contamination are strongly dependent on the PG classes. In addition, the affected population size depends on the plume size, which seems to be independent of the radionuclide, but not of the PG classes. Therefore, PG classes play a key role in the radiological threat. The findings may be of value to support decisions when facing an event.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90352058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria 跟踪和模拟公众对尼日利亚COVID-19大流行现实的看法
IF 0.8
Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau, Faruk Usman Maiyaki
{"title":"Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria","authors":"Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau, Faruk Usman Maiyaki","doi":"10.1177/15485129211016543","DOIUrl":"https://doi.org/10.1177/15485129211016543","url":null,"abstract":"The study tracked and modeled public perceptions toward the reality of COVID-19 pandemic in Nigeria over a 3 month period (10 May to 10 August 2020); 2580 Nigerians across the six geopolitical zones were selected to participate in the study. These participants were selected from various social media platforms and were requested to complete an online survey over a 3-month period. Data were analyzed in three phases: tracking, modeling, and forecasting. We first tracked the respondents’ perceptions in the form of a qualitative response, where seven thematic constructs emerged from content analysis. These constructs were confirmed in the modeling phase, using structural equation modeling after data transformation. The themes were forecast as a single construct to predict possible trends and patterns over the next 3 month period using an autoregressive integrated moving average. Our findings revealed that public perceptions toward the reality of COVID-19 pandemic in Nigeria fall into seven thematic constructs: “scam,” “fake,” “politics,” “business venture,” “exaggeration,” “real,” and “real but manipulated.” These constructs show a steady trend with a random walk pattern, suggesting that perceptions toward the reality of COVID-19 in Nigeria will remain relatively unchanged over the next 3 month period. We recommend, among other things, that massive and intensive sensitization and awareness programs are needed to change the public mindset concerning the reality of the pandemic in Nigeria.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81007541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Military scientism and its discontents 军事科学主义及其不满
IF 0.8
R. Wallace
{"title":"Military scientism and its discontents","authors":"R. Wallace","doi":"10.1177/15485129211014281","DOIUrl":"https://doi.org/10.1177/15485129211014281","url":null,"abstract":"The asymptotic limit theorems of control and information theories allow the examination of systemic failures afflicting “scientific” approaches to armed conflict such as reflexive control, the OODA loop, and East Asian alternatives. Large-scale combat, like other major human enterprise, is a form of dialog between cognitive institutional entities only loosely following shifting “laws” that most often express a path-dependent historical trajectory constrained by powerful cultural riverbanks. Such “conversations,” while having their own grammar and syntax, can involve matters of science, engineering, and technology, but they are not, of themselves, scientific in the Western sense. They may, however, be studied using the methodologies of historiography, social science, human ecology, and the like. Moving much beyond this is to invoke an alternate reality.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84694950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimating the tactical impact of robot swarms using a semi-automated forces system and design of experiments methods 利用半自动化部队系统估计机器人群的战术影响并设计实验方法
IF 0.8
Kevin L Foster, Mikel D. Petty
{"title":"Estimating the tactical impact of robot swarms using a semi-automated forces system and design of experiments methods","authors":"Kevin L Foster, Mikel D. Petty","doi":"10.1177/15485129211008532","DOIUrl":"https://doi.org/10.1177/15485129211008532","url":null,"abstract":"Militaries are developing autonomous robots to conduct missions such as reconnaissance and surveillance. Some of those robots are intended to operate in swarms. Because operational robot swarms are not yet available, doctrine developers will initially use constructive entity-level combat models to develop and test tactics for robot swarms. Design of experiments methods and retrodiction of the 1991 Battle of 73 Easting between US and Iraqi forces were used to calibrate a semi-automated forces system. The calibrated combat model was then used to estimate the tactical impact of a notional Iraqi robot swarm conducting reconnaissance and surveillance in that battle. The calibration ensured that the model’s parameters were accurate, enabling a reliable estimate of the swarm’s tactical impact. Additionally, the design of experiments methods produced estimates of the interaction of the robot swarm’s effect with the technologies of the combatants’ weapon systems. Simulation trials and statistical analysis showed that the tactical benefits of an Iraqi robot swarm were overshadowed by the advantage provided by the US forces’ thermal sights. However, additional trials indicated that if both sides had been equipped with optical sights only, the early warning provided to the Iraqi forces by a robot swarm could have had a significant effect on the battle’s outcome.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77401682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wargaming the use of intermediate force capabilities in the gray zone wg在灰色地带使用中间力量能力
IF 0.8
Kyle D Christensen, P. Dobias
{"title":"Wargaming the use of intermediate force capabilities in the gray zone","authors":"Kyle D Christensen, P. Dobias","doi":"10.1177/15485129211010227","DOIUrl":"https://doi.org/10.1177/15485129211010227","url":null,"abstract":"This work reviews the development and tests of an intermediate force capability (IFC) concept development hybrid wargame aimed at examining a maritime task force’s ability to counter hybrid threats in the gray zone. IFCs offer a class of response between doing nothing and using lethal force in a situation that would be politically unpalatable. Thus, the aim of the wargame is to evaluate whether IFCs can make a difference to mission success against hybrid threats in the gray zone. This wargame series was particularly important because it used traditional game mechanics in a unique and innovative way to evaluate and assess IFCs. The results of the wargame demonstrated that IFCs have a high probability of filling the gap between doing nothing and using lethal force. The presence of IFCs provided engagement time and space for the maritime task force commander. It also identified that development of robust IFC capabilities, not only against personnel, but against systems (trucks, cars, UAVs, etc.), can also effectively counter undesirable adversarial behavior","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82451163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Can machine learning be used to forecast the future uncertainty of military teams? 机器学习可以用来预测军队未来的不确定性吗?
IF 0.8
Ronald H. Stevens, Trysha Galloway
{"title":"Can machine learning be used to forecast the future uncertainty of military teams?","authors":"Ronald H. Stevens, Trysha Galloway","doi":"10.1177/1548512921999112","DOIUrl":"https://doi.org/10.1177/1548512921999112","url":null,"abstract":"Uncertainty is a fundamental property of neural computation that becomes amplified when sensory information does not match a person’s expectations of the world. Uncertainty and hesitation are often early indicators of potential disruption, and the ability to rapidly measure uncertainty would have implications for future educational and training efforts by targeting reflective discussions about past actions, supporting in-progress corrections, and generating forecasts about future disruptions. An approach is described combining neurodynamics and machine learning to provide quantitative measures of uncertainty. Models of neurodynamic information derived from electroencephalogram (EEG) brainwaves have provided detailed neurodynamic histories of US Navy submarine navigation team members. Persistent periods (25–30 s) of neurodynamic information were seen as discrete peaks when establishing the submarine’s position and were identified as periods of uncertainty by an artificial intelligence (AI) system previously trained to recognize the frequency, magnitude, and duration of different patterns of uncertainty in healthcare and student teams. Transition matrices of neural network states closely predicted the future uncertainty of the navigation team during the three minutes prior to a grounding event. These studies suggest that the dynamics of uncertainty may have common characteristics across teams and tasks and that forecasts of their short-term evolution can be estimated.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of NOMA-OFDM 5G wireless system using deep neural network 基于深度神经网络的NOMA-OFDM 5G无线系统分析
IF 0.8
Sharnil Pandya, M. Wakchaure, Ravi Shankar, J. R. Annam
{"title":"Analysis of NOMA-OFDM 5G wireless system using deep neural network","authors":"Sharnil Pandya, M. Wakchaure, Ravi Shankar, J. R. Annam","doi":"10.1177/1548512921999108","DOIUrl":"https://doi.org/10.1177/1548512921999108","url":null,"abstract":"In this work, a multiple user deep neural network-based non-orthogonal multiple access (NOMA) receiver is investigated considering channel estimation error. The decoding of the symbol in the case of the NOMA system follows the sequential order and decoding accuracy depends on the detection of the previous user. Without estimating the throughput, a deep neural network-based NOMA orthogonal frequency division multiplexing (OFDM) system is proposed to decode the symbols from the users. Firstly, the deep neural network is trained. Secondly, the data are trained and lastly, the data are tested for various users. In this work, for various values of signal to noise ratio, the performance of the deep neural network is investigated, and the bit error rate (BER) is calculated on a per subcarrier basis. The simulation results show that the deep neural network is more robust to symbol distortion due to inter-symbol information and will obtain knowledge of the channel state information using data testing.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86213331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information 考虑信道状态信息完备与不完备的非正交多址海量多输入多输出无线通信网络信道容量分析
IF 0.8
Ravi Shankar, S. Nandi, A. Rupani
{"title":"Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information","authors":"Ravi Shankar, S. Nandi, A. Rupani","doi":"10.1177/15485129211000139","DOIUrl":"https://doi.org/10.1177/15485129211000139","url":null,"abstract":"In this paper, we investigate the non-orthogonal multiple access (NOMA) and massive multiple-input multiple-output (M-MIMO) techniques and through simulation, and a comparison is given between the NOMA and orthogonal multiple access techniques. Integrating NOMA with M-MIMO is a very challenging task. In this paper, for a single-cell system, NOMA is integrated with a M-MIMO system for better spectral and energy efficiency. Investigation of the multiple user gain is the focus of this work because the multiple user gain supports simultaneous transmission of multiple users in the case of the M-MIMO system. In this way, the M-MIMO will provide a 100 times channel capacity increase, which results in very high data transmission rate. In the modern communication system, achieving multiple user gain is a very difficult task when channel estimation error is present. The performance of the orthogonal multiple access as well as NOMA system significantly reduced in the presence of channel estimation error. However, most of the current schemes do not work well with imperfect perfect channel state information conditions. Simulation results closely agree with the theoretical outcomes.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78336426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信