Pub Date : 2021-05-21DOI: 10.1504/IJIDSS.2021.115226
Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep
Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.
{"title":"Deep learning-based approach for malware classification","authors":"Harisha Airbail, G. Mamatha, Rahul V. Hedge, P. R. Sushmika, Reshma Kumari, K. Sandeep","doi":"10.1504/IJIDSS.2021.115226","DOIUrl":"https://doi.org/10.1504/IJIDSS.2021.115226","url":null,"abstract":"Any program that exhibit furtive demonstrations against the interests of the PC client can be considered as a malware. These baleful programs can play out varieties of different capacities, for example, taking, encoding, or erasing dainty information, changing or commandeering centre processing capacities, and examining clients' computer action without their consent. Today, malware is utilised by both governments and black hat hackers, to take individual, financial, or business data. In this paper, put forward a strategy for arranging malware utilising profound learning procedures. Malware binaries are pictured as greyscale pictures, with the perception that for some malware families, the pictures having a place with a similar family show up fundamentally the same as in surface and design. A standard picture highlights grouping strategy is proposed. The exploratory outcomes give 97.45% arrangement classification on a malware database of 9,339 examples with 25 diverse malware families.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127165713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-19DOI: 10.1504/ijidss.2020.10031440
E. H. Lo, N. Tay, G. Bulluss
The recent first principles review (FPR) has clearly highlighted further need for improvements in defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program viewer is one such tool that leverages and aggregates actual stakeholder data to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include: 1) fusing disparate and unexploited defence enterprise data for analysis; 2) producing a range of tailorable and informative views of cost, schedule and capability from actual defence data; 3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, program viewer offers a new approach to aggregating and analysing defence capabilities, and has been used to support the current and previous force structure reviews (FSRs). This paper's target audience includes ADO and international military systems architects.
{"title":"Program viewer - a defence portfolio capability management system","authors":"E. H. Lo, N. Tay, G. Bulluss","doi":"10.1504/ijidss.2020.10031440","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031440","url":null,"abstract":"The recent first principles review (FPR) has clearly highlighted further need for improvements in defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program viewer is one such tool that leverages and aggregates actual stakeholder data to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include: 1) fusing disparate and unexploited defence enterprise data for analysis; 2) producing a range of tailorable and informative views of cost, schedule and capability from actual defence data; 3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, program viewer offers a new approach to aggregating and analysing defence capabilities, and has been used to support the current and previous force structure reviews (FSRs). This paper's target audience includes ADO and international military systems architects.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-19DOI: 10.1504/ijidss.2020.10031443
Neelamadhab Padhy, R. Mishra, Samaresh Mishra
The application programming interface (API) as a means of communication to establish a connection with the cloud, which allows storing the vast amounts of heterogeneous data. Data has been steadily growing over the past several years. Software developers can use different data from cloud as convenient ecosystems for developing, deploying, testing and maintaining their software. API provides the archival solution and storing the data in the cloud. This platform also plays an essential role in managing them effectively with improved transfer rates. API is becoming increasingly dynamic and complex day by day. One of the significant challenges faced by us is to develop appropriate individual API and extensible mechanisms for managing and storing the data in the cloud. The objective of this paper is to utilize the storage efficiently based on API capability and analysis of (extreme amounts of) raw heterogeneous data.
{"title":"Archival solution API to upload bulk file and managing the data in cloud storage","authors":"Neelamadhab Padhy, R. Mishra, Samaresh Mishra","doi":"10.1504/ijidss.2020.10031443","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031443","url":null,"abstract":"The application programming interface (API) as a means of communication to establish a connection with the cloud, which allows storing the vast amounts of heterogeneous data. Data has been steadily growing over the past several years. Software developers can use different data from cloud as convenient ecosystems for developing, deploying, testing and maintaining their software. API provides the archival solution and storing the data in the cloud. This platform also plays an essential role in managing them effectively with improved transfer rates. API is becoming increasingly dynamic and complex day by day. One of the significant challenges faced by us is to develop appropriate individual API and extensible mechanisms for managing and storing the data in the cloud. The objective of this paper is to utilize the storage efficiently based on API capability and analysis of (extreme amounts of) raw heterogeneous data.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129512350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-19DOI: 10.1504/ijidss.2020.10031441
Suraj Pattanaik
A low power area reduced clock pulse generator and a modified clock sense pulse latch is proposed for conventional shift register. The proposed clock pulse generator basically based on the inverted inverter delay circuit and a pass transistor logic AND gate circuit. This clock pulse generator and modified clock sense pulse latch consumes low power and low area than other conventional clock pulse generator. Here the clock pulse generator consist of five number of back to back cascaded clock pulse circuit. The pulse generated from the proposed clock pulse generator helps to increase the speed, reduces the area and power of conventional shift register. The clock pulse generator and the modified clock sense pulse latch is designed and tested by the Cadence Virtuoso 180 nm technology. The power consumption for 16-bit shift register is 0.705 mW at 500 MHz clock frequency and 0.395 mW at 100 MHz frequency. The proposed shift register saved 12% area and 19.50% power rather than other conventional shift register.
{"title":"A novel approach to design a digital clock triggered modified pulse latch for 16-bit shift register","authors":"Suraj Pattanaik","doi":"10.1504/ijidss.2020.10031441","DOIUrl":"https://doi.org/10.1504/ijidss.2020.10031441","url":null,"abstract":"A low power area reduced clock pulse generator and a modified clock sense pulse latch is proposed for conventional shift register. The proposed clock pulse generator basically based on the inverted inverter delay circuit and a pass transistor logic AND gate circuit. This clock pulse generator and modified clock sense pulse latch consumes low power and low area than other conventional clock pulse generator. Here the clock pulse generator consist of five number of back to back cascaded clock pulse circuit. The pulse generated from the proposed clock pulse generator helps to increase the speed, reduces the area and power of conventional shift register. The clock pulse generator and the modified clock sense pulse latch is designed and tested by the Cadence Virtuoso 180 nm technology. The power consumption for 16-bit shift register is 0.705 mW at 500 MHz clock frequency and 0.395 mW at 100 MHz frequency. The proposed shift register saved 12% area and 19.50% power rather than other conventional shift register.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114678202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1504/IJIDSS.2018.099889
Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray
This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.
{"title":"Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments","authors":"Niloofar Tavakolian, A. Nazemi, Z. Azimifar, I. Murray","doi":"10.1504/IJIDSS.2018.099889","DOIUrl":"https://doi.org/10.1504/IJIDSS.2018.099889","url":null,"abstract":"This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128032438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-04DOI: 10.1504/IJIDSS.2015.075474
L. Ingber
Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. It seems appropriate to base an approach for propagation of ideas on the only system so far demonstrated to develop and nurture ideas, i.e., the neocortical brain. The issue here is whether such biological intelligence is a valid application to military intelligence, or is it simply a metaphor?
{"title":"Biological impact on military intelligence: application or metaphor?","authors":"L. Ingber","doi":"10.1504/IJIDSS.2015.075474","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075474","url":null,"abstract":"Ideas by Statistical Mechanics (ISM) is a generic program to model evolution and propagation of ideas/patterns throughout populations subjected to endogenous and exogenous interactions. The program is based on the author's work in Statistical Mechanics of Neocortical Interactions (SMNI). This product can be used for decision support for projects ranging from diplomatic, information, military, and economic (DIME) factors of propagation/evolution of ideas, to commercial sales, trading indicators across sectors of financial markets, advertising and political campaigns, etc. It seems appropriate to base an approach for propagation of ideas on the only system so far demonstrated to develop and nurture ideas, i.e., the neocortical brain. The issue here is whether such biological intelligence is a valid application to military intelligence, or is it simply a metaphor?","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-24DOI: 10.1504/IJIDSS.2014.059959
P. Ryan, P. Ross, Will Oliver
Distributed interactive simulation (DIS) is a widely-used networking protocol standard that provides a method of communicating entity information among simulators and simulations to create a synthetic environment. The IEEE DIS standard is being revised with balloting expected to be completed in 2012. The proposed new standard includes an extensive revision, clearing up ambiguities present in the existing 1998 version, and adding additional capabilities that reflect changes in military equipment and doctrine, and also advances in technology such as the internet, mobile telephony, and the widespread use of the global positioning system for positional and time data. Five new protocol data units have been added to include information operations capability, enhanced warfare support, and the ability to communicate information about individual attributes for a particular entity, object, or event. In this paper we review these new capabilities in detail, and explore what this will mean for the Australian simulati...
{"title":"High fidelity simulation using the updated distributed interactive simulation standard","authors":"P. Ryan, P. Ross, Will Oliver","doi":"10.1504/IJIDSS.2014.059959","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059959","url":null,"abstract":"Distributed interactive simulation (DIS) is a widely-used networking protocol standard that provides a method of communicating entity information among simulators and simulations to create a synthetic environment. The IEEE DIS standard is being revised with balloting expected to be completed in 2012. The proposed new standard includes an extensive revision, clearing up ambiguities present in the existing 1998 version, and adding additional capabilities that reflect changes in military equipment and doctrine, and also advances in technology such as the internet, mobile telephony, and the widespread use of the global positioning system for positional and time data. Five new protocol data units have been added to include information operations capability, enhanced warfare support, and the ability to communicate information about individual attributes for a particular entity, object, or event. In this paper we review these new capabilities in detail, and explore what this will mean for the Australian simulati...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114958396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-24DOI: 10.1504/IJIDSS.2014.059965
A. Vermeulen, R. Savelsberg
Traditional missile guidance laws are designed against fighter aircraft, with a much lower velocity (600–800 m/s) than ballistic missiles. To see whether intercepting a theatre ballistic missile inside the atmosphere is difficult in terms of missile guidance, trajectories of two different re-entry vehicles and the terminal phase of their interception, while the interceptor is guided by its own sensors, are simulated using MATLAB/Simulink. The interception is always successful if the inherent delay of the missile guidance system is small (below 0.5 seconds). The re-entry vehicles follow weaving trajectories, but the amplitude of the weave is small and does not pose problems for the interceptor. Neither does the high velocity of the missile (2,600 m/s), provided that the interceptor is near the inverse trajectory at the start of the terminal phase. Consequently, current missile guidance technology seems to be sufficient against aerodynamically stable missiles, but early detection and tracking are essential for success.
{"title":"Interception of an aerodynamically stable weaving re-entry vehicle","authors":"A. Vermeulen, R. Savelsberg","doi":"10.1504/IJIDSS.2014.059965","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059965","url":null,"abstract":"Traditional missile guidance laws are designed against fighter aircraft, with a much lower velocity (600–800 m/s) than ballistic missiles. To see whether intercepting a theatre ballistic missile inside the atmosphere is difficult in terms of missile guidance, trajectories of two different re-entry vehicles and the terminal phase of their interception, while the interceptor is guided by its own sensors, are simulated using MATLAB/Simulink. The interception is always successful if the inherent delay of the missile guidance system is small (below 0.5 seconds). The re-entry vehicles follow weaving trajectories, but the amplitude of the weave is small and does not pose problems for the interceptor. Neither does the high velocity of the missile (2,600 m/s), provided that the interceptor is near the inverse trajectory at the start of the terminal phase. Consequently, current missile guidance technology seems to be sufficient against aerodynamically stable missiles, but early detection and tracking are essential for success.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129651610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-24DOI: 10.1504/IJIDSS.2014.059960
E. El-Mahassni
Sensor fusion is the notion of combining the data from two or more sensors in order to enhance performance compared with that of individual sensors. The most common method for fusing sensors is through Bayesian methods. However, these cannot easily take into account unknown uncertainty or imprecision. A relatively new method is subjective logic. Although similar to Dempster-Shafer theory, it is unique in that it allows us to collapse the frame of discernment into a binary frame, thereby reducing the complexity. In this paper, we show two novel methods for employing subjective logic: 1) it can be used for target identification (and we show some examples for surveillance in the airborne environment); 2) given some knowledge about the performance of a suite of sensors, we might be able to select the best sensor for a given task. This is achieved through the use of the expected decision formula.
{"title":"Sensor selection and fusion using subjective logic","authors":"E. El-Mahassni","doi":"10.1504/IJIDSS.2014.059960","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059960","url":null,"abstract":"Sensor fusion is the notion of combining the data from two or more sensors in order to enhance performance compared with that of individual sensors. The most common method for fusing sensors is through Bayesian methods. However, these cannot easily take into account unknown uncertainty or imprecision. A relatively new method is subjective logic. Although similar to Dempster-Shafer theory, it is unique in that it allows us to collapse the frame of discernment into a binary frame, thereby reducing the complexity. In this paper, we show two novel methods for employing subjective logic: 1) it can be used for target identification (and we show some examples for surveillance in the airborne environment); 2) given some knowledge about the performance of a suite of sensors, we might be able to select the best sensor for a given task. This is achieved through the use of the expected decision formula.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-03-24DOI: 10.1504/IJIDSS.2014.059976
G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu
This paper presents a computational approach to intelligence analysis and its current implementation into a cognitive assistant called Disciple-CD. Intelligence analysis is viewed as ceaseless discovery of evidence, hypotheses, and arguments in a non-stationary world, involving cooperative processes of evidence in search of hypotheses, hypotheses in search of evidence, and evidentiary tests of hypotheses. Disciple-CD helps intelligence analysts formulate hypotheses, develop arguments that reduce complex hypotheses to simpler and simpler ones, collect evidence to evaluate the simplest hypotheses, assess the relevance, believability, and inferential force of evidence, and finally the likeliness of the hypotheses.
{"title":"Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis","authors":"G. Tecuci, D. Schum, Dorin Marcu, Mihai Boicu","doi":"10.1504/IJIDSS.2014.059976","DOIUrl":"https://doi.org/10.1504/IJIDSS.2014.059976","url":null,"abstract":"This paper presents a computational approach to intelligence analysis and its current implementation into a cognitive assistant called Disciple-CD. Intelligence analysis is viewed as ceaseless discovery of evidence, hypotheses, and arguments in a non-stationary world, involving cooperative processes of evidence in search of hypotheses, hypotheses in search of evidence, and evidentiary tests of hypotheses. Disciple-CD helps intelligence analysts formulate hypotheses, develop arguments that reduce complex hypotheses to simpler and simpler ones, collect evidence to evaluate the simplest hypotheses, assess the relevance, believability, and inferential force of evidence, and finally the likeliness of the hypotheses.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132250476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}