Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2009.031417
G. V. Doorn, B. Richardson, M. Symmons, Jonathan R. Wells
Although simulated environments are improved by adding sensory information, temperature is one input that has rarely featured in them. Here we report findings from experiments that examine the efficacy of adding temperature information to the multimodal complex known to be of benefit in simulations. In the first experiment, Peltier tiles added thermal information to the kinesthetic feedback given by a hand-worn exoskeletal device and this increased ratings for 'presence' during interactions with simulated objects. In an experiment in which exploratory movements across surfaces of differing temperatures were either active or passive-guided, the degree of 'coldness' felt at the fingertip was reported as less intense when movement was active, suggesting that intentionality of movement plays a role in the attenuation of the thermal stimulus. Other work reported here suggests that the perception of temperature is not influenced by a simultaneously presented colour. For example, the perception of coldness is not enhanced when it is processed in conjunction with a blue colour. We discuss the potential value of thermal information within the context of the hypothesis that presence in simulated environments is enhanced by multisensory inputs that include redundant information.
{"title":"Adding thermal information to multisensory inputs in simulated environments","authors":"G. V. Doorn, B. Richardson, M. Symmons, Jonathan R. Wells","doi":"10.1504/IJIDSS.2009.031417","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031417","url":null,"abstract":"Although simulated environments are improved by adding sensory information, temperature is one input that has rarely featured in them. Here we report findings from experiments that examine the efficacy of adding temperature information to the multimodal complex known to be of benefit in simulations. In the first experiment, Peltier tiles added thermal information to the kinesthetic feedback given by a hand-worn exoskeletal device and this increased ratings for 'presence' during interactions with simulated objects. In an experiment in which exploratory movements across surfaces of differing temperatures were either active or passive-guided, the degree of 'coldness' felt at the fingertip was reported as less intense when movement was active, suggesting that intentionality of movement plays a role in the attenuation of the thermal stimulus. Other work reported here suggests that the perception of temperature is not influenced by a simultaneously presented colour. For example, the perception of coldness is not enhanced when it is processed in conjunction with a blue colour. We discuss the potential value of thermal information within the context of the hypothesis that presence in simulated environments is enhanced by multisensory inputs that include redundant information.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125060270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2018.099897
François-Alex Bourque, R. Grasso, R. Vicen-Bueno, G. Cimino, P. Braca, J. Osler
The rise of piracy in the Gulf of Aden and off the coast of Somalia prompted several nations to direct their navies to conduct counter-piracy operations in that region of the world. A major challenge with such operations is the sheer size of the area to patrol. One way to address this problem is by noting that pirates are more likely to operate under favourable environmental conditions and to focus patrols in areas where such conditions prevail by generating maps of piracy risk based on environmental forecast. This contribution presents a system that invokes a multi-objective optimiser with each new forecast to help the decision makers plan operations over the course of days, weeks or months. Implemented using web-based technologies to mitigate for potential resource limitations at the client site, the resulting decision support system is demonstrated for a counter-piracy operation conducted off the coast of Somalia.
{"title":"A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates","authors":"François-Alex Bourque, R. Grasso, R. Vicen-Bueno, G. Cimino, P. Braca, J. Osler","doi":"10.1504/IJIDSS.2018.099897","DOIUrl":"https://doi.org/10.1504/IJIDSS.2018.099897","url":null,"abstract":"The rise of piracy in the Gulf of Aden and off the coast of Somalia prompted several nations to direct their navies to conduct counter-piracy operations in that region of the world. A major challenge with such operations is the sheer size of the area to patrol. One way to address this problem is by noting that pirates are more likely to operate under favourable environmental conditions and to focus patrols in areas where such conditions prevail by generating maps of piracy risk based on environmental forecast. This contribution presents a system that invokes a multi-objective optimiser with each new forecast to help the decision makers plan operations over the course of days, weeks or months. Implemented using web-based technologies to mitigate for potential resource limitations at the client site, the resulting decision support system is demonstrated for a counter-piracy operation conducted off the coast of Somalia.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133345942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.025020
A. Acharya, A. Banerjee, A. Konar, L. Jain
The paper extends the classical Ant System (AS) algorithms by proposing a novel approach of exponential pheromone deposition by artificial ants ensuring a concentration gradient along solution paths. The stability analysis with a deterministic mathematical model based on differential equation yields the proper range of the parameters. A roadmap of connected cities, where the shortest path between a source-destination pair is to be determined, is taken as a problem environment. Exhaustive simulations confirm that the proposed deposition rule, with properly chosen parameter values, outperforms the traditional one with large margin both in terms of solution quality and algorithm convergence.
{"title":"Extension of Ant System algorithms with exponential pheromone deposition rule for improved performance","authors":"A. Acharya, A. Banerjee, A. Konar, L. Jain","doi":"10.1504/IJIDSS.2008.025020","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025020","url":null,"abstract":"The paper extends the classical Ant System (AS) algorithms by proposing a novel approach of exponential pheromone deposition by artificial ants ensuring a concentration gradient along solution paths. The stability analysis with a deterministic mathematical model based on differential equation yields the proper range of the parameters. A roadmap of connected cities, where the shortest path between a source-destination pair is to be determined, is taken as a problem environment. Exhaustive simulations confirm that the proposed deposition rule, with properly chosen parameter values, outperforms the traditional one with large margin both in terms of solution quality and algorithm convergence.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2021.115236
Kim Mathiassen, F. Schneider, Paul Bounker, A. Tiderko, G. D. Cubber, Magnus Baksaas, Jakub Glówka, R. Kozik, T. Nussbaumer, J. Röning, J. Pellenz, André Volk
This paper describes the research and experiment efforts of the NATO STO group IST-149-RTG capability concept demonstrator for interoperability within unmanned ground systems and C2 and the NAAG team of experts on UGV. The main purpose of the group was to investigate possible standards for controlling UGVs and tests them in a real world scenario. The efforts have been two folded, where the first effort was two NATO groups having an experiment demonstrating interoperability between the UGVs and OCUs available within the group. The Belgium contribution is done in the EU project ICARUS. Both efforts used the Joint Architecture for Unmanned Systems (JAUS) with the interoperability profile (IOP) to successfully enable interoperability between the systems. The trials showed that it is possible to extend the systems quite easily and achieve compliance with parts of the standard in a relatively short time.
{"title":"Demonstrating interoperability between unmanned ground systems and command and control systems","authors":"Kim Mathiassen, F. Schneider, Paul Bounker, A. Tiderko, G. D. Cubber, Magnus Baksaas, Jakub Glówka, R. Kozik, T. Nussbaumer, J. Röning, J. Pellenz, André Volk","doi":"10.1504/IJIDSS.2021.115236","DOIUrl":"https://doi.org/10.1504/IJIDSS.2021.115236","url":null,"abstract":"This paper describes the research and experiment efforts of the NATO STO group IST-149-RTG capability concept demonstrator for interoperability within unmanned ground systems and C2 and the NAAG team of experts on UGV. The main purpose of the group was to investigate possible standards for controlling UGVs and tests them in a real world scenario. The efforts have been two folded, where the first effort was two NATO groups having an experiment demonstrating interoperability between the UGVs and OCUs available within the group. The Belgium contribution is done in the EU project ICARUS. Both efforts used the Joint Architecture for Unmanned Systems (JAUS) with the interoperability profile (IOP) to successfully enable interoperability between the systems. The trials showed that it is possible to extend the systems quite easily and achieve compliance with parts of the standard in a relatively short time.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"01 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131319157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2009.031416
M. Quirk
Modern decision making challenges the human capacity to reason in an environment of uncertainty, imprecision, and incompleteness of information. Atop the uncertainty, ranking in the presence of multiple criteria, multiple agents, and heterogeneous sources of information is often the main task to accomplish by the analysts in the Intelligence Community (IC). Soft metrics are attributes of decision criteria that cannot be expressed numerically. These metrics are at the core of a computational engine that is perception-based, with computational 'atoms' expressed in natural language (NL). The soft metrics approach as a basis for natural language-based computing contributes to fast analyses and an efficient use of human resources in contemporary decision making such as: intelligence data analysis, the Global Strike (target pairing), risk analysis, threat assessment, strategic interactions, conflict analysis, and the strategic deterrence assessment.
{"title":"Soft metrics: What are they and what use are they for the Intelligence Community?","authors":"M. Quirk","doi":"10.1504/IJIDSS.2009.031416","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031416","url":null,"abstract":"Modern decision making challenges the human capacity to reason in an environment of uncertainty, imprecision, and incompleteness of information. Atop the uncertainty, ranking in the presence of multiple criteria, multiple agents, and heterogeneous sources of information is often the main task to accomplish by the analysts in the Intelligence Community (IC). Soft metrics are attributes of decision criteria that cannot be expressed numerically. These metrics are at the core of a computational engine that is perception-based, with computational 'atoms' expressed in natural language (NL). The soft metrics approach as a basis for natural language-based computing contributes to fast analyses and an efficient use of human resources in contemporary decision making such as: intelligence data analysis, the Global Strike (target pairing), risk analysis, threat assessment, strategic interactions, conflict analysis, and the strategic deterrence assessment.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.025021
A. Acharya, K. Chattopadhyay, A. Banerjee, A. Konar
This contribution demonstrates how artificial ants can extract regular geometric shapes from grey scale images. We propose here two methods the first of which is a modified version of existing Ant System algorithm. The second method proposed is Ant Regeneration and Recombination System (ARRS). Our schemes comprise of three steps. Firstly, MATLAB edge detection operator converts a grey scale image into a binary one. Our schemes are then applied on this binary image to detect closed loops. Finally, these closed loops are tested for different geometric shapes. The schemes with incredible time and memory efficiency can detect both intersecting and non intersecting regular shapes.
{"title":"Novel and improved methods of regular geometric shape recognition from digital image using artificial ants","authors":"A. Acharya, K. Chattopadhyay, A. Banerjee, A. Konar","doi":"10.1504/IJIDSS.2008.025021","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025021","url":null,"abstract":"This contribution demonstrates how artificial ants can extract regular geometric shapes from grey scale images. We propose here two methods the first of which is a modified version of existing Ant System algorithm. The second method proposed is Ant Regeneration and Recombination System (ARRS). Our schemes comprise of three steps. Firstly, MATLAB edge detection operator converts a grey scale image into a binary one. Our schemes are then applied on this binary image to detect closed loops. Finally, these closed loops are tested for different geometric shapes. The schemes with incredible time and memory efficiency can detect both intersecting and non intersecting regular shapes.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2012.053676
Lora Weiss, E. Briscoe, E. Whitaker, E. Trewhitt, Heather Hayes, J. Horgan
Modelling behaviour related to the perpetration of improvised explosive devices is extremely complex. Behavioural aspects range from those who create a plan to those who gather supplies for developing the devices to those who passively look the other way. Developing computational approaches to understanding such behaviour necessitates either a decomposition of behavioural activity into smaller, manageable behaviours or generalising larger, group behaviour where gross trends are observed. This may suffice for particular applications; however, additional consideration can be given to developing more comprehensive approaches. Specifically, for those seeking to understand terrorism, a number of social, cultural and behavioural perspectives are being developed by experts worldwide. These perspectives may complement each other or they may be in conflict, but they equally contribute to a broader understanding. Our research is developing computational methods to analyse and experiment with differing views and perspectives of potential influences on adversarial behaviour at this system-level.
{"title":"A systems-level understanding of adversarial behaviour","authors":"Lora Weiss, E. Briscoe, E. Whitaker, E. Trewhitt, Heather Hayes, J. Horgan","doi":"10.1504/IJIDSS.2012.053676","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053676","url":null,"abstract":"Modelling behaviour related to the perpetration of improvised explosive devices is extremely complex. Behavioural aspects range from those who create a plan to those who gather supplies for developing the devices to those who passively look the other way. Developing computational approaches to understanding such behaviour necessitates either a decomposition of behavioural activity into smaller, manageable behaviours or generalising larger, group behaviour where gross trends are observed. This may suffice for particular applications; however, additional consideration can be given to developing more comprehensive approaches. Specifically, for those seeking to understand terrorism, a number of social, cultural and behavioural perspectives are being developed by experts worldwide. These perspectives may complement each other or they may be in conflict, but they equally contribute to a broader understanding. Our research is developing computational methods to analyse and experiment with differing views and perspectives of potential influences on adversarial behaviour at this system-level.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2015.075475
T. Au
The Coalition Attack Guidance Experiment (CAGE) aims to assess potential joint fires capabilities and operational impacts, which can be effective to meet challenges from new and evolving threats. An important objective is digital targeting focusing on target development and timely prosecution. The need to coordinate geographically distributed assets and personnel throughout a theatre of combat is constantly in tension with the need to prosecute quickly. This study provides an empirical comparison of digital targeting using baseline and potential future Command and Control (C2) systems as two experimental conditions. While CAGE IIIA demonstrated the benefits of a coalition human-in-the-loop experiment across multiple sites, we learned valuable lessons to improve this scientific endeavour. Technical failures and confounding factors have threatened the validity of this complex experiment, inevitably weakening our understanding of potential capabilities. For future work, we identify the need to consider the human dimension and extant processes for effective system integration.
{"title":"Evaluating digital targeting in a joint fires experiment","authors":"T. Au","doi":"10.1504/IJIDSS.2015.075475","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075475","url":null,"abstract":"The Coalition Attack Guidance Experiment (CAGE) aims to assess potential joint fires capabilities and operational impacts, which can be effective to meet challenges from new and evolving threats. An important objective is digital targeting focusing on target development and timely prosecution. The need to coordinate geographically distributed assets and personnel throughout a theatre of combat is constantly in tension with the need to prosecute quickly. This study provides an empirical comparison of digital targeting using baseline and potential future Command and Control (C2) systems as two experimental conditions. While CAGE IIIA demonstrated the benefits of a coalition human-in-the-loop experiment across multiple sites, we learned valuable lessons to improve this scientific endeavour. Technical failures and confounding factors have threatened the validity of this complex experiment, inevitably weakening our understanding of potential capabilities. For future work, we identify the need to consider the human dimension and extant processes for effective system integration.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127814240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.023009
D. Acharya, Vijay Kumar, G. Gaddis, N. Garvin
In this paper we focus on management of auto accidents involving Emergency Medical Services (EMS) where the incident has left passengers incapacitated to summon help using communication devices. Almost all available systems require human intervention, and do not analyse environmental conditions inside the vehicle to summon most appropriate medical help. Our work in this paper aimed to create SAVE – an automatic vehicular accident reporting system that can be fitted to any vehicle, requires no human intervention and, in the event of an accident, sends necessary data to the EMS so that appropriate medical assistance can be dispatched to victims promptly.
{"title":"SAVE: a wireless Java enabled automobile accident reporting system","authors":"D. Acharya, Vijay Kumar, G. Gaddis, N. Garvin","doi":"10.1504/IJIDSS.2008.023009","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.023009","url":null,"abstract":"In this paper we focus on management of auto accidents involving Emergency Medical Services (EMS) where the incident has left passengers incapacitated to summon help using communication devices. Almost all available systems require human intervention, and do not analyse environmental conditions inside the vehicle to summon most appropriate medical help. Our work in this paper aimed to create SAVE – an automatic vehicular accident reporting system that can be fitted to any vehicle, requires no human intervention and, in the event of an accident, sends necessary data to the EMS so that appropriate medical assistance can be dispatched to victims promptly.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}