Hybrid journal (It can contain Open Access articles) ISSN (Print) 1755-1587 - ISSN (Online) 1755-1595 Published by Inderscience Publishers[450 journals]
Authors:Graeme Anderson, David Reed, Simon Di Nucci, Anthony Kwong, Janet Wilson Pages: 253 - 276 Abstract: Weapon effect modelling has many applications, but in this paper we focus on how advanced computer models can be used to assess the effectiveness of blast shielding structures and materials, for example to improve the safety of weapons production. Safety laws are changing from prescriptive, solution-based regulations to a risk-management-based approach, so being able to estimate the performance of protective measures allows us to produce directly-relevant safety evidence. Such an approach can be used to show that risks are reduced so far as is reasonably practicable (SFAIRP) in order to demonstrate compliance with the WHS Act, 2011. This paper first describes how a variety of computer-based models for the prediction of the development and propagation of blast pressures can be used to provide a detailed assessment of the risks associated with explosions in complex environments, with particular reference to injury assessment - something that is sometimes impractical with simpler techniques. We then show how some of these techniques have been used in two real-world examples to successfully support safety case development. Finally, we extrapolate from the examples, showing how these techniques could be applied to assess weapons safety in different environments, or for risk assessment in defensive or offensive scenarios. Keywords: blast; fragment; structural response; injury; safety applications; risk-based management; so far as is reasonably practicable; SFAIRP Citation: International Journal of Intelligent Defence Support Systems, Vol. 5, No. 4 (2018) pp. 253 - 276 PubDate: 2019-05-26T23:20:50-05:00 DOI: 10.1504/IJIDSS.2018.099878 Issue No:Vol. 5, No. 4 (2019)
Authors:Niloofar Tavakolian, Azadeh Nazemi, Zohreh Azimifar, Iain Murray Pages: 277 - 297 Abstract: This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average. Keywords: face recognition; machine learning; occlusion; illumination multi-factor authentication; remote assessment; identification; verification; expression; face detection; deep learning Citation: International Journal of Intelligent Defence Support Systems, Vol. 5, No. 4 (2018) pp. 277 - 297 PubDate: 2019-05-26T23:20:50-05:00 DOI: 10.1504/IJIDSS.2018.099889 Issue No:Vol. 5, No. 4 (2019)
Authors:G.R. Sinha, K. Srujan Raju, Raj Kumar Patra, Daw Win Aye, Daw Thuzar Khin Pages: 298 - 304 Abstract: Research on cognitive ability of human brain can be seen now in literature that substantiates research scope and future directions in the field of human brain and its cognitive ability. This paper studies on research articles and work that highlighted various studies; surveys; and comparison on human brain research and its impact on cognitive ability for various artificial intelligence (AI) based applications. The research studies result several important questions on machine learning and impact of cognitive ability. Keywords: cognitive ability; CA; human brain; machine learning; ML; artificial intelligence; AI; deep learning; DL Citation: International Journal of Intelligent Defence Support Systems, Vol. 5, No. 4 (2018) pp. 298 - 304 PubDate: 2019-05-26T23:20:50-05:00 DOI: 10.1504/IJIDSS.2018.099891 Issue No:Vol. 5, No. 4 (2019)
Authors:Mishra Jyoti Prakash, Mishra Sambit Kumar, Mishra Anil Kumar Pages: 305 - 313 Abstract: The concept of virtualisation along with the physical objects and IP address for internet connectivity may be a big challenge in the present society. It may refer to the numerous physical devices around the world connected with internet for collecting and sharing data. Specifically, the technology associated with internet of things (IoT) may be viewed as the network of physical objects embedded along with connectivity to share and exchange data linked among the physical and cyber space. Sometimes also it may create opportunities for direct integration between the physical world and computer- based systems and leads to economic benefits. It may be thought of connected devices to transfer data among one another in order to optimise the performance automatically and quite a major challenge. It has been proposed to analyse the opportunities and performance associated with virtualised data to simplify and strengthen human activities as well as expertise. Keywords: big data; internet of things; IoT; virtualisation; sensor; actuator; data centre; cluster Citation: International Journal of Intelligent Defence Support Systems, Vol. 5, No. 4 (2018) pp. 305 - 313 PubDate: 2019-05-26T23:20:50-05:00 DOI: 10.1504/IJIDSS.2018.099892 Issue No:Vol. 5, No. 4 (2019)
Authors:François-Alex Bourque, Raffaele Grasso, Raúl Vicen-Bueno, Giampaolo Cimino, Paolo Braca, John Osler Pages: 314 - 331 Abstract: The rise of piracy in the Gulf of Aden and off the coast of Somalia prompted several nations to direct their navies to conduct counter-piracy operations in that region of the world. A major challenge with such operations is the sheer size of the area to patrol. One way to address this problem is by noting that pirates are more likely to operate under favourable environmental conditions and to focus patrols in areas where such conditions prevail by generating maps of piracy risk based on environmental forecast. This contribution presents a system that invokes a multi-objective optimiser with each new forecast to help the decision makers plan operations over the course of days, weeks or months. Implemented using web-based technologies to mitigate for potential resource limitations at the client site, the resulting decision support system is demonstrated for a counter-piracy operation conducted off the coast of Somalia. Keywords: decision support system; asset allocation; counter-piracy; environmental forecast; METOC; optimisation; web service Citation: International Journal of Intelligent Defence Support Systems, Vol. 5, No. 4 (2018) pp. 314 - 331 PubDate: 2019-05-26T23:20:50-05:00 DOI: 10.1504/IJIDSS.2018.099897 Issue No:Vol. 5, No. 4 (2019)