Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS最新文献

筛选
英文 中文
Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform 基于Hausdorff距离和小波变换的VMD方法对海洋地震信号进行降噪
IF 0.8
Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, R. B R, Arvind Kumar
{"title":"Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform","authors":"Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, R. B R, Arvind Kumar","doi":"10.1177/15485129211036044","DOIUrl":"https://doi.org/10.1177/15485129211036044","url":null,"abstract":"In marine seismic acquisitions, signal interference remains a major menace. In this paper, a denoising approach based on the Variational Mode Decomposition (VMD) combined with the Hausdorff distance (HD) and Wavelet transform (WT) is proposed. There has been substantial research in this field over the years. However, traditional denoising methods fall short of achieving satisfactory results in an extremely low signal to noise ratio (SNR) environment. The feasibility, and stability of the proposed method was validated by performing simulations in MATLAB on both a synthetic signal and a seismic signal generated using real dataset. It was found that the proposed method does well in preserving marine signals in low SNR environments, and has a superior output SNR.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82590239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions 考虑时变和不完全信道状态信息条件的军用第五代车载同步无线信息与功率传输协同非正交多址网络研究
IF 0.8
Sharnil Pandya, Patteti Krishna, Ravi Shankar, Ankur Singh Bist
{"title":"Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions","authors":"Sharnil Pandya, Patteti Krishna, Ravi Shankar, Ankur Singh Bist","doi":"10.1177/15485129211033040","DOIUrl":"https://doi.org/10.1177/15485129211033040","url":null,"abstract":"In a defense scenario, the communicating nodes are mobile and, due to this, the fading channel links become time selective in nature. Non-orthogonal multiple access (NOMA) is a promising technique in modern wireless communication systems, and it is employed in a variety of defense ad hoc wireless communication scenarios where nodes are mobile and it is difficult to estimate the channel coefficients perfectly. NOMA contributes to increased spectral efficiency (SE), firstly by enabling fifth-generation new radio deployment in the 3.5 GHz frequency range, and secondly by employing a simultaneous wireless information and power transfer (SWIPT) time switching and power splitting-based cooperative NOMA (C-NOMA) network where simple radio frequency circuitry is used for energy harvesting. NOMA together with the selective decode-and-forward (S-DF) protocol will increase the SE and energy efficiency simultaneously. The outage probability performance is evaluated for various values of the fading severity parameter and node velocity forming the channel error. It is significant to note that digital S-DF-based SWIPT C-NOMA performs much better than an analog amplify-and-forward-based C-NOMA SWIPT system.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85232028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Space surveillance architecture: issues and challenges – an integrated approach 空间监视体系结构:问题和挑战——一种综合方法
IF 0.8
Dionysios Tompros
{"title":"Space surveillance architecture: issues and challenges – an integrated approach","authors":"Dionysios Tompros","doi":"10.1177/15485129211031673","DOIUrl":"https://doi.org/10.1177/15485129211031673","url":null,"abstract":"The object of this study is space surveillance activity and the information systems involved for actors and national security organizations. Near and Deep Space Surveillance areas are presented, the former dealing with artificial objects and the latter the inner planetary system, including asteroids and its exploration and exploitation. (Near Space includes the upper layers of the atmosphere (thermosphere, exosphere) and the magnetosphere up to the limits of the magnetopause (6–15 RE). Deep Space refers to the space after the magnetopause and practically up to the limits of the Kuiper belt, about 50 A.U.) Due to the different matter of each area, the two sectors cannot have a common system for surveillance. The ever-increasing interest in natural resource extraction from the asteroid belt, the Moon, and Near-Earth Objects, combined with the explosive growth of the number of satellite commercial applications, makes the development and interconnection of the two distinct sector systems a necessity. This study describes the surveillance systems, the available technologies and methods, and develops a comprehensive oversight proposal.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79711377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Optics Radar Cross Section predictions for an anti-ship cruise missile 反舰巡航导弹的物理光学雷达截面预测
IF 0.8
Panagiotis Touzopoulos, K. Zikidis
{"title":"Physical Optics Radar Cross Section predictions for an anti-ship cruise missile","authors":"Panagiotis Touzopoulos, K. Zikidis","doi":"10.1177/15485129211033039","DOIUrl":"https://doi.org/10.1177/15485129211033039","url":null,"abstract":"The capability of the first strike is crucial in the modern battlefield. An important parameter is the radar signature or Radar Cross Section (RCS) of a weapon system, such as a fighter aircraft, a warship, or a missile, affecting the range at which this weapon system would be detected as a target by an enemy radar. If the attacker is detected too late, there will be minimal time for the defender to react, possibly not sufficient to counter the threat. The RCS of a weapon system is considered generally as classified information. However, it can be measured at a suitable measurement test range, if that weapon system is available. Otherwise, it can be predicted with the help of computational electromagnetics. Concerning the second approach, the following procedure was recently proposed: construction of a three-dimensional model of a target, based on available images and any relevant data, and then computation of the target RCS, with the Physical Optics approximative method. In the present approach, this procedure is applied to an anti-ship cruise missile in order to compute its RCS. Finally, the expected detection range for various naval radars is calculated.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78379484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A reinforcement learning approach to adaptive remediation in online training 在线培训中自适应修复的强化学习方法
IF 0.8
Randall D. Spain, Jonathan P. Rowe, A. Smith, B. Goldberg, R. Pokorny, Bradford W. Mott, James C. Lester
{"title":"A reinforcement learning approach to adaptive remediation in online training","authors":"Randall D. Spain, Jonathan P. Rowe, A. Smith, B. Goldberg, R. Pokorny, Bradford W. Mott, James C. Lester","doi":"10.1177/15485129211028317","DOIUrl":"https://doi.org/10.1177/15485129211028317","url":null,"abstract":"Advances in artificial intelligence (AI) and machine learning can be leveraged to tailor training based on the goals, learning needs, and preferences of learners. A key component of adaptive training systems is tutorial planning, which controls how scaffolding is structured and delivered to learners to create dynamically personalized learning experiences. The goal of this study was to induce data-driven policies for tutorial planning using reinforcement learning (RL) to provide adaptive scaffolding based on the Interactive, Constructive, Active, Passive framework for cognitive engagement. We describe a dataset that was collected to induce RL-based scaffolding policies, and we present the results of our policy analyses. Results showed that the best performing policies optimized learning gains by inducing an adaptive fading approach in which learners received less cognitively engaging forms of remediation as they advanced through the training course. This policy was consistent with preliminary analyses that showed constructive remediation became less effective as learners progressed through the training session. Results also showed that learners’ prior knowledge impacted the type of scaffold that was recommended, thus showing evidence of an aptitude–treatment interaction. We conclude with a discussion of how AI-based training can be leveraged to enhance training effectiveness as well as directions for future research.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89015035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods 采用高阶数值方法优化海军三维水雷冲击埋藏预测仿真模型Impact35
IF 0.8
A. Donas, I. Famelis, P. Chu, G. Galanis
{"title":"Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods","authors":"A. Donas, I. Famelis, P. Chu, G. Galanis","doi":"10.1177/15485129211028661","DOIUrl":"https://doi.org/10.1177/15485129211028661","url":null,"abstract":"The aim of this paper is to present an application of high-order numerical analysis methods to a simulation system that models the movement of a cylindrical-shaped object (mine, projectile, etc.) in a marine environment and in general in fluids with important applications in Naval operations. More specifically, an alternative methodology is proposed for the dynamics of the Navy’s three-dimensional mine impact burial prediction model, Impact35/vortex, based on the Dormand–Prince Runge–Kutta fifth-order and the singly diagonally implicit Runge–Kutta fifth-order methods. The main aim is to improve the time efficiency of the system, while keeping the deviation levels of the final results, derived from the standard and the proposed methodology, low.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76603055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Space to Air High-Altitude Region Adjoint Neutron Transport 空间到空气高海拔区域伴随中子传输
IF 0.8
Zachary W LaMere, D. Holland, W. Dailey, J. McClory
{"title":"Space to Air High-Altitude Region Adjoint Neutron Transport","authors":"Zachary W LaMere, D. Holland, W. Dailey, J. McClory","doi":"10.1177/15485129211031669","DOIUrl":"https://doi.org/10.1177/15485129211031669","url":null,"abstract":"Neutrons from an atmospheric nuclear explosion can be detected by sensors in orbit. Current tools for characterizing the neutron energy spectrum assume a known source and use forward transport to recreate the detector response. In realistic scenarios the true source is unknown, making this an inefficient, iterative approach. In contrast, the adjoint approach directly solves for the source spectrum, enabling source reconstruction. The time–energy fluence at the satellite and adjoint transport equation allow a Monte Carlo method to characterize the neutron source’s energy spectrum directly in a new model: the Space to High-Altitude Region Adjoint (SAHARA) model. A new adjoint source event estimator was developed in SAHARA to find feasible solutions to the neutron transport problem given the constraints of the adjoint environment. This work explores SAHARA’s development and performance for mono-energetic and continuous neutron energy sources. In general, the identified spectra were shifted towards energies approximately 5% lower than the true source spectra, but SAHARA was able to capture the correct spectral shapes. Continuous energy sources, including real-world sources Fat Man and Little Boy, resulted in identifiable spectra that could have been produced by the same distribution as the true sources as demonstrated by two-dimensional (2D) Kolmogorov–Smirnov tests.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73937268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of unmanned aerial vehicle tactics through the metrics of survivability 基于生存性指标的无人机战术评价
IF 0.8
Ian Lunsford, Thomas H. Bradley
{"title":"Evaluation of unmanned aerial vehicle tactics through the metrics of survivability","authors":"Ian Lunsford, Thomas H. Bradley","doi":"10.1177/15485129211031672","DOIUrl":"https://doi.org/10.1177/15485129211031672","url":null,"abstract":"Aircraft survivability is a classical consideration of combat aircraft design and tactical development, but the fundamental model of aircraft survivability must be updated to be able to consider modern tactical scenarios that are applicable to unmanned aircraft. This paper seeks therefore to define the set of design tradeoffs and an evaluation of the tactical effectiveness for unmanned aircraft survivability. Traditional and modern survivability evaluation methods are presented and integrated into a computational simulation to create a probabilistic evaluation of unmanned aircraft survivability. The results demonstrate the development of design tradeoffs for a hypothetical unmanned C-130J Hercules against a single man-portable air defense system. The discussion focuses on the demonstration of the utility of this survivability evaluation framework for consideration of survivability in unmanned aerial vehicle (UAV) design, the utility of considering survivability in the design of multi-UAV configurations (including the loyal wingman and swarms), and the value of the probabilistic survivability model for multi-aircraft simulations.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83486089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond 无人机在军事通信中的作用:应用场景,当前趋势,以及未来
IF 0.8
M. Gargalakos
{"title":"The role of unmanned aerial vehicles in military communications: application scenarios, current trends, and beyond","authors":"M. Gargalakos","doi":"10.1177/15485129211031668","DOIUrl":"https://doi.org/10.1177/15485129211031668","url":null,"abstract":"The role of unmanned aerial vehicles (UAVs) is becoming increasingly important for military conflicts. UAVs are more and more strongly considered as a force multiplier that could play a decisive role for the final outcome of an ambiguous battle. While the role of UAVs for Identification/Surveillance/Reconnaissance missions has been well established within many modern armies, their contribution to the upgrade or the restoration of military communications is still vague. In the current paper we review the current situation in military communications utilizing UAV platforms, and we also explore its future trends and capabilities taking into consideration the parallel developments in the civil UAV manufacturing sector involving UAV swarms and fifth-generation networks. Furthermore, a set of realistic combat scenarios involving the utilization of UAVs as a multipurpose communication node is presented and discussed, highlighting its critical role as a catalyst for the successful accomplishment of diverse military missions.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79214348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
The wargame commodity course of action automated analysis method 兵棋商品行动过程自动分析方法
IF 0.8
William T. DeBerry, Richard Dill, K. Hopkinson, D. Hodson, M. Grimaila
{"title":"The wargame commodity course of action automated analysis method","authors":"William T. DeBerry, Richard Dill, K. Hopkinson, D. Hodson, M. Grimaila","doi":"10.1177/15485129211028318","DOIUrl":"https://doi.org/10.1177/15485129211028318","url":null,"abstract":"This research presents the wargaming commodity course of action automated analysis method (WCCAAM) – a novel approach to assist wargame commanders in developing and analyzing courses of action (COAs) through semi-automation of the military decision making process (MDMP). MDMP is a seven-step iterative method that commanders and mission partners follow to build an operational course of action to achieve strategic objectives. MDMP requires time, resources, and coordination – all competing items the commander weighs to make the optimal decision. WCCAAM receives the MDMP’s Mission Analysis phase as input, converts the wargame into a directed graph, processes a multi-commodity flow algorithm on the nodes and edges, where the commodities represent units, and the nodes represent blue bases and red threats, and then programmatically processes the MDMP steps to output the recommended COA. To demonstrate its use, a military scenario developed in the Advanced Framework for Simulation, Integration, and Modeling (AFSIM) processes the various factors through WCCAAM and produces an optimal, minimal risk COA.","PeriodicalId":44661,"journal":{"name":"Journal of Defense Modeling and Simulation-Applications Methodology Technology-JDMS","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2021-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84861398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信