Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-3583-7.ch012
C. Lewis
In the United States, there are over one million military spouses. Frequent geographical relocations, the psychological stress and anxiety associated with spousal deployments, and supporting their children as the only parent while their active duty spouse is away leave military spouses disproportionately accountable for all family obligations. Ultimately, these inequities create barriers for military spouses and their employment and educational pursuits. Despite similarities in lifestyle to active duty service members, military spouses are not categorized as an at-risk population and have not been studied in depth. This chapter utilized the source, survey, synthesize method to address the literature gap surrounding the barriers to military spouse education and employment. Findings from the existing literature were synthesized to present the key themes for studies that investigated the military culture, barriers to military spouses' pursuits of higher education, employment, and career advancement and earnings.
{"title":"A Critical Review of Barriers to United States Military Spouse Education and Employment","authors":"C. Lewis","doi":"10.4018/978-1-7998-3583-7.ch012","DOIUrl":"https://doi.org/10.4018/978-1-7998-3583-7.ch012","url":null,"abstract":"In the United States, there are over one million military spouses. Frequent geographical relocations, the psychological stress and anxiety associated with spousal deployments, and supporting their children as the only parent while their active duty spouse is away leave military spouses disproportionately accountable for all family obligations. Ultimately, these inequities create barriers for military spouses and their employment and educational pursuits. Despite similarities in lifestyle to active duty service members, military spouses are not categorized as an at-risk population and have not been studied in depth. This chapter utilized the source, survey, synthesize method to address the literature gap surrounding the barriers to military spouse education and employment. Findings from the existing literature were synthesized to present the key themes for studies that investigated the military culture, barriers to military spouses' pursuits of higher education, employment, and career advancement and earnings.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114870568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7832-1.CH017
Jowati Juhary
This chapter argues for the importance of equipping academics with the knowledge and impact of IR4.0 and beyond for future graduates. Particularly to prepare for military leaders for Malaysia at the National Defense University of Malaysia (NDUM), a new learning model may be apt and urgently needed. The objectives of the chapter are twofold: firstly, to gauge the readiness and awareness level of academics on implementing IR4.0 during their classroom teaching, and secondly, to investigate academics' views on their own teaching practices. The methodology for this chapter is quantitative in nature, where an online survey was used to collect data from the academics. It is found that, first, there are mixed reactions from academics on their readiness and awareness of IR4.0 and its impacts, and second, should the existing curriculum be revamped to serve students' needs on IR4.0, academics opined that the delivery methods must change too.
{"title":"IR4.0 Ready and Aware Academics at the National Defence University of Malaysia","authors":"Jowati Juhary","doi":"10.4018/978-1-5225-7832-1.CH017","DOIUrl":"https://doi.org/10.4018/978-1-5225-7832-1.CH017","url":null,"abstract":"This chapter argues for the importance of equipping academics with the knowledge and impact of IR4.0 and beyond for future graduates. Particularly to prepare for military leaders for Malaysia at the National Defense University of Malaysia (NDUM), a new learning model may be apt and urgently needed. The objectives of the chapter are twofold: firstly, to gauge the readiness and awareness level of academics on implementing IR4.0 during their classroom teaching, and secondly, to investigate academics' views on their own teaching practices. The methodology for this chapter is quantitative in nature, where an online survey was used to collect data from the academics. It is found that, first, there are mixed reactions from academics on their readiness and awareness of IR4.0 and its impacts, and second, should the existing curriculum be revamped to serve students' needs on IR4.0, academics opined that the delivery methods must change too.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-7838-3.CH011
E. Sadiku, O. Agboola, M. Mochane, V. Fasiku, S. J. Owonubi, I. Ibrahim, B. Abbavaram, W. Kupolati, T. Jayaramudu, C. A. Uwa, O. Daramola, N. Iheaturu, C. Nkuna, S. Sanni, O. F. Biotidara, A. Eze, K. Varaprasad, O. A. Adeyeye, K. Selatile, A. Ndamase
Previously, applications of composites were limited to the military aerospace. This is because civilian aircraft with composites inclusions was considered to be too expensive. The use of composite in aircrafts, instead of steel, has resulted in lightweight aircraft structures and has consequently reduced the level of fuel consumption and costs of fuel, thereby reducing CO2 emissions. Undoubtedly, nanocomposites applications abound in several aspects of human life and the use of nanoparticle in materials dates back to the understanding of the nature of these materials. This chapter will focus on the use of nanopolymers in the aerospace and in the military. Particular attention will be given to nano military weapons, nanocoating for military applications, nanotechnology for military drones, nanotechnology in military suits, gloves, boots and nanotechnology in armored military vehicles, aircraft, and military ships and in military medicine.
{"title":"The Use of Polymer Nanocomposites in the Aerospace and the Military/Defence Industries","authors":"E. Sadiku, O. Agboola, M. Mochane, V. Fasiku, S. J. Owonubi, I. Ibrahim, B. Abbavaram, W. Kupolati, T. Jayaramudu, C. A. Uwa, O. Daramola, N. Iheaturu, C. Nkuna, S. Sanni, O. F. Biotidara, A. Eze, K. Varaprasad, O. A. Adeyeye, K. Selatile, A. Ndamase","doi":"10.4018/978-1-5225-7838-3.CH011","DOIUrl":"https://doi.org/10.4018/978-1-5225-7838-3.CH011","url":null,"abstract":"Previously, applications of composites were limited to the military aerospace. This is because civilian aircraft with composites inclusions was considered to be too expensive. The use of composite in aircrafts, instead of steel, has resulted in lightweight aircraft structures and has consequently reduced the level of fuel consumption and costs of fuel, thereby reducing CO2 emissions. Undoubtedly, nanocomposites applications abound in several aspects of human life and the use of nanoparticle in materials dates back to the understanding of the nature of these materials. This chapter will focus on the use of nanopolymers in the aerospace and in the military. Particular attention will be given to nano military weapons, nanocoating for military applications, nanotechnology for military drones, nanotechnology in military suits, gloves, boots and nanotechnology in armored military vehicles, aircraft, and military ships and in military medicine.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-9029-4.ch001
Benjamin J. Knox, R. Lugo, Kirsi Helkala, Stefan Sütterlin
Governance of cyberpower from a military perspective are focused on the efforts to control and influence events occurring in cyberspace. For the Norwegian Defence, this means educating cyber engineers, responsible for governing cyberpower effects, beyond technical skills and competencies. To match the complexity of modern warfighting necessitates adaptive high-order thinking skills. Building on earlier cognitive engineering and human factors research in cyber defence this article suggests how Slow Education has the potential to improve cognitive performance among cyber cadets. Slow techniques were applied to 37 cyber cadets during a three-year bachelor programme at the Norwegian Defence Cyber Academy. The quantitative data for this study was gathered during a two-week Cyber Defence Exercise. Combining and applying a novel pedagogic method with psychological techniques suggests reflective pondering, self-regulation and metacognition as being associated with cognitive agility. This study helps develop and make metrics available that are suitable to evaluate human performance in cyber defence.
{"title":"Slow Education and Cognitive Agility","authors":"Benjamin J. Knox, R. Lugo, Kirsi Helkala, Stefan Sütterlin","doi":"10.4018/978-1-7998-9029-4.ch001","DOIUrl":"https://doi.org/10.4018/978-1-7998-9029-4.ch001","url":null,"abstract":"Governance of cyberpower from a military perspective are focused on the efforts to control and influence events occurring in cyberspace. For the Norwegian Defence, this means educating cyber engineers, responsible for governing cyberpower effects, beyond technical skills and competencies. To match the complexity of modern warfighting necessitates adaptive high-order thinking skills. Building on earlier cognitive engineering and human factors research in cyber defence this article suggests how Slow Education has the potential to improve cognitive performance among cyber cadets. Slow techniques were applied to 37 cyber cadets during a three-year bachelor programme at the Norwegian Defence Cyber Academy. The quantitative data for this study was gathered during a two-week Cyber Defence Exercise. Combining and applying a novel pedagogic method with psychological techniques suggests reflective pondering, self-regulation and metacognition as being associated with cognitive agility. This study helps develop and make metrics available that are suitable to evaluate human performance in cyber defence.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122689488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-2901-0.ch003
R. Baumann, H. Rensburg
Australian Defence Force (ADF) members' children present as a unique subpopulation of students. These students often experience schooling interruption as a result of posting (relocation) mobility inherent within the service requirements of their ADF parents. This chapter explores the impact of such mobility and interrupted schooling on educational achievement. Educational achievement consists of two key aspects: Social-emotional outcomes and Academic outcomes. Social-emotional outcomes are currently supported through the Defence Support Mentor (DSM) program. Academic outcomes are examined through the lens of Reading/Literacy testing results and Mathematics testing results. Academic achievement for ADF children impacted by mobility and schooling interruption remains largely unexplored within the Australian context. A conceptual framework is presented, which identifies potential causes of negative impacts upon ADF students' academic achievement.
{"title":"Inclusivity and the Education of Children of Defence Forces Personnel","authors":"R. Baumann, H. Rensburg","doi":"10.4018/978-1-7998-2901-0.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-2901-0.ch003","url":null,"abstract":"Australian Defence Force (ADF) members' children present as a unique subpopulation of students. These students often experience schooling interruption as a result of posting (relocation) mobility inherent within the service requirements of their ADF parents. This chapter explores the impact of such mobility and interrupted schooling on educational achievement. Educational achievement consists of two key aspects: Social-emotional outcomes and Academic outcomes. Social-emotional outcomes are currently supported through the Defence Support Mentor (DSM) program. Academic outcomes are examined through the lens of Reading/Literacy testing results and Mathematics testing results. Academic achievement for ADF children impacted by mobility and schooling interruption remains largely unexplored within the Australian context. A conceptual framework is presented, which identifies potential causes of negative impacts upon ADF students' academic achievement.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-9029-4.ch003
Steven W. Schmidt
Training in the U.S. military has evolved, and it has taken on new significance and priority as key in helping the military move forward. While the topic of training in the military has been discussed extensively in many different publications, there has not been as much discussion regarding those who are actually involved in that training, including curriculum designers and trainers. This chapter focuses on the experiences and identities of those who do that training. It discusses the experiences of civilian (non-enlisted) Army trainers (or educators), including how they got involved with training in the Army, their experiences in learning how to be a trainer, and their professional identities as trainers for the Army.
{"title":"U.S. Army Trainers","authors":"Steven W. Schmidt","doi":"10.4018/978-1-7998-9029-4.ch003","DOIUrl":"https://doi.org/10.4018/978-1-7998-9029-4.ch003","url":null,"abstract":"Training in the U.S. military has evolved, and it has taken on new significance and priority as key in helping the military move forward. While the topic of training in the military has been discussed extensively in many different publications, there has not been as much discussion regarding those who are actually involved in that training, including curriculum designers and trainers. This chapter focuses on the experiences and identities of those who do that training. It discusses the experiences of civilian (non-enlisted) Army trainers (or educators), including how they got involved with training in the Army, their experiences in learning how to be a trainer, and their professional identities as trainers for the Army.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124393224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5094-5.CH008
Jai C. Galliott
Technology has always allowed agents of war to separate themselves from the harm that they or their armed forces inflict with spears, bows and arrows, trebuchets, cannons, firearms, and other modern weaponry, all serving as examples of technologies that have increased the distance between belligerents and supposedly made warfare less sickening than the close-quarters combat of the past. This chapter calls into question the claims of some proponents of a ban moratorium on lethal autonomous weapons systems regarding a responsibility gap and contends that most implications associated with the introduction of autonomous technologies can be resolved by recognizing that autonomy does not mean the elimination of a human influence on the battlefield and advocates for a black-box-type recorder to ensure compliance with just war theory and the laws of war.
{"title":"Humans, Autonomous Systems, and Killing in War","authors":"Jai C. Galliott","doi":"10.4018/978-1-5225-5094-5.CH008","DOIUrl":"https://doi.org/10.4018/978-1-5225-5094-5.CH008","url":null,"abstract":"Technology has always allowed agents of war to separate themselves from the harm that they or their armed forces inflict with spears, bows and arrows, trebuchets, cannons, firearms, and other modern weaponry, all serving as examples of technologies that have increased the distance between belligerents and supposedly made warfare less sickening than the close-quarters combat of the past. This chapter calls into question the claims of some proponents of a ban moratorium on lethal autonomous weapons systems regarding a responsibility gap and contends that most implications associated with the introduction of autonomous technologies can be resolved by recognizing that autonomy does not mean the elimination of a human influence on the battlefield and advocates for a black-box-type recorder to ensure compliance with just war theory and the laws of war.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-9029-4.ch033
Ik-Whan G. Kwon, Sung-Ho Kim
Between the years 2000 and 2012, natural disasters caused $1.7 trillion in damage and affected 2.9 billion people (dosomething.org). The military has been active in participating in many disaster areas using their unique assets. Although military involvement in relief operations is welcome, their participation has been perceived by some part of NGOs as suspicious and incongruent with relief missions practiced by NGOs. This article attempts to outline a framework with two relief organizations working together to provide comprehensive relief strategies.
{"title":"Roles of NGOs and Military in Humanitarian Supply Chain","authors":"Ik-Whan G. Kwon, Sung-Ho Kim","doi":"10.4018/978-1-7998-9029-4.ch033","DOIUrl":"https://doi.org/10.4018/978-1-7998-9029-4.ch033","url":null,"abstract":"Between the years 2000 and 2012, natural disasters caused $1.7 trillion in damage and affected 2.9 billion people (dosomething.org). The military has been active in participating in many disaster areas using their unique assets. Although military involvement in relief operations is welcome, their participation has been perceived by some part of NGOs as suspicious and incongruent with relief missions practiced by NGOs. This article attempts to outline a framework with two relief organizations working together to provide comprehensive relief strategies.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-9023-1.CH014
M. Chakravarthy, E. Kannan, M. Belinda
Having understood the strategic significance of the flourishing cloud idea, enterprises across the globe are keenly strategizing and executing to embark on the cloud journey with all the clarity and confidence. There are product vendors bringing forth additional capabilities to easily and quickly setup and sustain competent cloud environments, which are being positioned as the one-stop IT solution for worldwide business organizations. The business domains such as governments, retail stores, healthcare providers, telecommunication service providers, supply chain and logistics, utilities, homeland security, etc. are keenly embracing the cloud idea to be ahead of their competitors in their operations, outputs, and offerings. However, there are some critical challenges and concerns being associated with the cloud paradigm. The widely quoted non-functional requirements (NFRs) and the quality of service (QoS) attributes such as security, performance, reliability, modifiability, and availability have to be fulfilled by cloud software, platform and infrastructures in order to boost the confidence level of business executives and institutions. There are mission-critical and emergency services, which are finding their residence in cloud environments (private, public, and hybrid). Their requirements are quite unique and hence researchers across the globe are striving hard and stretching further to bring forth innovative, disruptive, and transformation technology solutions to fulfill the various needs. This chapter proposes a cloud-based network architecture that contributes a consistent and ubiquitous internet connection. The mesh topology is recommended here to ensure that the connectivity is available all the time without any fail and slowdown. The security of data when it gets transmitted over channels, persisted in data stores, and used by applications, has to be ensured in order to boost the confidence of data owners and users. Hence, this chapter proposes a secure cloud-based heterogeneous network using a novel routing protocol.
{"title":"A Hybrid Routing Protocol Towards Secure and Smart Military Applications in Cloud Environments","authors":"M. Chakravarthy, E. Kannan, M. Belinda","doi":"10.4018/978-1-5225-9023-1.CH014","DOIUrl":"https://doi.org/10.4018/978-1-5225-9023-1.CH014","url":null,"abstract":"Having understood the strategic significance of the flourishing cloud idea, enterprises across the globe are keenly strategizing and executing to embark on the cloud journey with all the clarity and confidence. There are product vendors bringing forth additional capabilities to easily and quickly setup and sustain competent cloud environments, which are being positioned as the one-stop IT solution for worldwide business organizations. The business domains such as governments, retail stores, healthcare providers, telecommunication service providers, supply chain and logistics, utilities, homeland security, etc. are keenly embracing the cloud idea to be ahead of their competitors in their operations, outputs, and offerings. However, there are some critical challenges and concerns being associated with the cloud paradigm. The widely quoted non-functional requirements (NFRs) and the quality of service (QoS) attributes such as security, performance, reliability, modifiability, and availability have to be fulfilled by cloud software, platform and infrastructures in order to boost the confidence level of business executives and institutions. There are mission-critical and emergency services, which are finding their residence in cloud environments (private, public, and hybrid). Their requirements are quite unique and hence researchers across the globe are striving hard and stretching further to bring forth innovative, disruptive, and transformation technology solutions to fulfill the various needs. This chapter proposes a cloud-based network architecture that contributes a consistent and ubiquitous internet connection. The mesh topology is recommended here to ensure that the connectivity is available all the time without any fail and slowdown. The security of data when it gets transmitted over channels, persisted in data stores, and used by applications, has to be ensured in order to boost the confidence of data owners and users. Hence, this chapter proposes a secure cloud-based heterogeneous network using a novel routing protocol.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134466997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-7998-9029-4.ch010
P. S., P. V, A. B.
Health monitoring plays a vital role to overcome the health issues of the patients. According to research, approximately 2000 people die due to carelessness of monitoring their health. Wearable monitoring systems record the activities of daily life. A 24-hour wearable monitoring system was developed and changes were identified. This project is designed for helping the soldiers to maintain their health conditions and to identify their health issues at war's end. Different health parameters are monitored using sensors, and the data are transmitted through GSM to the receiver, and the received data are analyzed using convolutional neural networks, which is performed in cloud IoT. If any abnormalities are found during the analyzing process, the message is sent to military personnel and the doctor at the camp so that they could take necessary actions to recover the ill soldier from the war field and provide emergency assistance on time. The location of the soldier is also shared using the input from GPS modem in the smart jacket.
{"title":"Smart Healthcare Monitoring System for War-End Soldiers Using CNN","authors":"P. S., P. V, A. B.","doi":"10.4018/978-1-7998-9029-4.ch010","DOIUrl":"https://doi.org/10.4018/978-1-7998-9029-4.ch010","url":null,"abstract":"Health monitoring plays a vital role to overcome the health issues of the patients. According to research, approximately 2000 people die due to carelessness of monitoring their health. Wearable monitoring systems record the activities of daily life. A 24-hour wearable monitoring system was developed and changes were identified. This project is designed for helping the soldiers to maintain their health conditions and to identify their health issues at war's end. Different health parameters are monitored using sensors, and the data are transmitted through GSM to the receiver, and the received data are analyzed using convolutional neural networks, which is performed in cloud IoT. If any abnormalities are found during the analyzing process, the message is sent to military personnel and the doctor at the camp so that they could take necessary actions to recover the ill soldier from the war field and provide emergency assistance on time. The location of the soldier is also shared using the input from GPS modem in the smart jacket.","PeriodicalId":187292,"journal":{"name":"Research Anthology on Military and Defense Applications, Utilization, Education, and Ethics","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130510106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}