Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2009.031415
Kusum Deep, K. Das
Due to their diversity preserving mechanism, real coded genetic algorithms are extremely popular in solving complex non-linear optimisation problems. In recent literature, Deep and Thakur (2007a, 2007b) proved that the new real coded genetic algorithm (called LX-PM that uses Laplace Crossover and Power Mutation) is more efficient than the existing genetic algorithms that use combinations of Heuristic Crossover along with Non-Uniform or Makinen, Periaux and Toivanen Mutation. However, there are some instances where LX-PM needs improvement. Hence, in this paper, an attempt is made to improve the efficiency and reliability of this existing LX-PM by hybridising it with quadratic approximation (called H-LX-PM). To realise the improvement, a set of 22 benchmark test problems and two real world problems, namely: a) system of linear equations; b) frequency modulation parameter identification problem, have been considered. The numerical and graphical results confirm that H-LX-PM really exhibits improvement over LX-PM in terms of efficiency, reliability and stability.
{"title":"Performance improvement of real coded genetic algorithm with Quadratic Approximation based hybridisation","authors":"Kusum Deep, K. Das","doi":"10.1504/IJIDSS.2009.031415","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031415","url":null,"abstract":"Due to their diversity preserving mechanism, real coded genetic algorithms are extremely popular in solving complex non-linear optimisation problems. In recent literature, Deep and Thakur (2007a, 2007b) proved that the new real coded genetic algorithm (called LX-PM that uses Laplace Crossover and Power Mutation) is more efficient than the existing genetic algorithms that use combinations of Heuristic Crossover along with Non-Uniform or Makinen, Periaux and Toivanen Mutation. However, there are some instances where LX-PM needs improvement. Hence, in this paper, an attempt is made to improve the efficiency and reliability of this existing LX-PM by hybridising it with quadratic approximation (called H-LX-PM). To realise the improvement, a set of 22 benchmark test problems and two real world problems, namely: a) system of linear equations; b) frequency modulation parameter identification problem, have been considered. The numerical and graphical results confirm that H-LX-PM really exhibits improvement over LX-PM in terms of efficiency, reliability and stability.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2011.044807
B. Bourgeois, R. Ladner, F. Petry
This paper illustrates use of the Universal Core messaging framework to enable request and return of large environmental data files, specifically meteorological and oceanographic (MetOc) data. The utility of the approach is described by experiments conducted during the Trident Warrior 2010 Naval exercise. We next overview development of a web services broker system for MetOc data. The implementation of this broker system incorporates both automated data discovery and retrieval capabilities. An extension of UCore, C2 (Command and Control) Core is described and an evaluation to assess its effectiveness for the MetOc domain is described.
{"title":"Net-centric issues for large scale tactical data","authors":"B. Bourgeois, R. Ladner, F. Petry","doi":"10.1504/IJIDSS.2011.044807","DOIUrl":"https://doi.org/10.1504/IJIDSS.2011.044807","url":null,"abstract":"This paper illustrates use of the Universal Core messaging framework to enable request and return of large environmental data files, specifically meteorological and oceanographic (MetOc) data. The utility of the approach is described by experiments conducted during the Trident Warrior 2010 Naval exercise. We next overview development of a web services broker system for MetOc data. The implementation of this broker system incorporates both automated data discovery and retrieval capabilities. An extension of UCore, C2 (Command and Control) Core is described and an evaluation to assess its effectiveness for the MetOc domain is described.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2012.053664
M. Grant, M. Stewart
Due to their improvised nature, the variability in the design, manufacture and operation of most improvised explosive devices (IEDs) defy the traditional paradigms used to assess the effectiveness of conventional munitions. Thus, IEDs are complex socio-technical systems to model. To compensate for inadequacies in model design or data deficiencies, expert judgement and subjective probability assignments are often employed. The paper aims to reduce this reliance by developing an IED probabilistic risk assessment model using a systems model for IED attacks based on IED device reliability and characterising the human aspects of IED attack operational effectiveness from existing terrorism databases. This model can then be used to develop an automated model for IED probabilistic risk assessment that can be used towards informing military applications such as operations planning and war-gaming, and civil applications such as security risk management (including event planning), protective construction requirements, and insurance assessments. It was found that the risk of loss (fatalities, property damage) is influenced more by operational aspects (such as target selection, IED placement and attack timing) than the technical aspects of the device design and manufacture.
{"title":"A systems model for probabilistic risk assessment of improvised explosive device attacks","authors":"M. Grant, M. Stewart","doi":"10.1504/IJIDSS.2012.053664","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053664","url":null,"abstract":"Due to their improvised nature, the variability in the design, manufacture and operation of most improvised explosive devices (IEDs) defy the traditional paradigms used to assess the effectiveness of conventional munitions. Thus, IEDs are complex socio-technical systems to model. To compensate for inadequacies in model design or data deficiencies, expert judgement and subjective probability assignments are often employed. The paper aims to reduce this reliance by developing an IED probabilistic risk assessment model using a systems model for IED attacks based on IED device reliability and characterising the human aspects of IED attack operational effectiveness from existing terrorism databases. This model can then be used to develop an automated model for IED probabilistic risk assessment that can be used towards informing military applications such as operations planning and war-gaming, and civil applications such as security risk management (including event planning), protective construction requirements, and insurance assessments. It was found that the risk of loss (fatalities, property damage) is influenced more by operational aspects (such as target selection, IED placement and attack timing) than the technical aspects of the device design and manufacture.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133637312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2012.053648
Daniel Finkenstadt, S. Lambrakos, N. Bernstein, V. Jacobs, Lulu Huang, L. Massa, A. Shabaev
We review a framework for the prediction of explosive molecular spectra, namely, for the common explosives found in improvised explosive devices, e.g., β-HMX. Through the use of excitation by incident electromagnetic waves in the THz frequency range, molecular signatures of these explosives may be detected, identified and perhaps neutralised remotely. A central component of this framework is an S-matrix representation of multilayered composite materials. The individual molecules are first simulated using first-principles density functional theory (DFT). An effective electric permittivity function is then constructed, which yields reflectivity and transmissivity functions of frequency and of angle of incident radiation. The input for this component would be a parameterised analytic-function representation of the electric permittivity as a function of frequency, which is provided by another component model of the framework. The permittivity function is constructed by fitting response spectra calculated usin...
{"title":"Construction of permittivity functions for high-explosives using density functional theory","authors":"Daniel Finkenstadt, S. Lambrakos, N. Bernstein, V. Jacobs, Lulu Huang, L. Massa, A. Shabaev","doi":"10.1504/IJIDSS.2012.053648","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053648","url":null,"abstract":"We review a framework for the prediction of explosive molecular spectra, namely, for the common explosives found in improvised explosive devices, e.g., β-HMX. Through the use of excitation by incident electromagnetic waves in the THz frequency range, molecular signatures of these explosives may be detected, identified and perhaps neutralised remotely. A central component of this framework is an S-matrix representation of multilayered composite materials. The individual molecules are first simulated using first-principles density functional theory (DFT). An effective electric permittivity function is then constructed, which yields reflectivity and transmissivity functions of frequency and of angle of incident radiation. The input for this component would be a parameterised analytic-function representation of the electric permittivity as a function of frequency, which is provided by another component model of the framework. The permittivity function is constructed by fitting response spectra calculated usin...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116134447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2015.075483
B. P. Mishra, Eui-Whan Kim, Guck-Cheol Bang, Satchidananda Dehuri, Sung-Bae Cho
In this paper, a static weapon target assignment problem is studied by optimising the conflicting criteria like shooting failure and number of weapons used to destroy the targets. The inherent intractability and conflicting objectives of this problem motivated us to use multi-objective particle swarm optimisation (MOPSO) to uncover the true Pareto front. We first employ the MOPSO to uncover the Pareto front. Secondly, a ranking method called techniques for order preference by similarity to ideal solution (TOPSIS) is used to sort the non-dominated solutions by the preference of decision maker (DM). A numerical experiment on two test cases has been conducted to realise the efficacy of the method. The experimental work is offering large number of solutions in the Pareto front, which may create problem to DM for effective decision. Therefore, by TOPSIS a prioritised set of non-dominated solutions is provided to DM, which fits the preference under different situations.
{"title":"Weapon target assignment problem: multi-objective formulation, optimisation using MOPSO and TOPSIS","authors":"B. P. Mishra, Eui-Whan Kim, Guck-Cheol Bang, Satchidananda Dehuri, Sung-Bae Cho","doi":"10.1504/IJIDSS.2015.075483","DOIUrl":"https://doi.org/10.1504/IJIDSS.2015.075483","url":null,"abstract":"In this paper, a static weapon target assignment problem is studied by optimising the conflicting criteria like shooting failure and number of weapons used to destroy the targets. The inherent intractability and conflicting objectives of this problem motivated us to use multi-objective particle swarm optimisation (MOPSO) to uncover the true Pareto front. We first employ the MOPSO to uncover the Pareto front. Secondly, a ranking method called techniques for order preference by similarity to ideal solution (TOPSIS) is used to sort the non-dominated solutions by the preference of decision maker (DM). A numerical experiment on two test cases has been conducted to realise the efficacy of the method. The experimental work is offering large number of solutions in the Pareto front, which may create problem to DM for effective decision. Therefore, by TOPSIS a prioritised set of non-dominated solutions is provided to DM, which fits the preference under different situations.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114801013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.023007
D. Maiti, Mithun Chakraborty, A. Konar
System identification is important in science and engineering. This contribution proposes a simple yet elegant scheme for identifying a fractional order dynamic system based on its observed response to a standard excitation. Our approach consists in obtaining and solving a set of simultaneous linear equations connecting the parameters to yield the desired estimates. To minimise the effect of noise, we have performed an in-depth analysis of the Grunwald-Letnikov definition and, as far as we know, are the first ones to do so. Results show that the proposed method offers a very high degree of accuracy even for erroneous data.
{"title":"Complete identification of dynamic physical systems using a five parameter model","authors":"D. Maiti, Mithun Chakraborty, A. Konar","doi":"10.1504/IJIDSS.2008.023007","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.023007","url":null,"abstract":"System identification is important in science and engineering. This contribution proposes a simple yet elegant scheme for identifying a fractional order dynamic system based on its observed response to a standard excitation. Our approach consists in obtaining and solving a set of simultaneous linear equations connecting the parameters to yield the desired estimates. To minimise the effect of noise, we have performed an in-depth analysis of the Grunwald-Letnikov definition and, as far as we know, are the first ones to do so. Results show that the proposed method offers a very high degree of accuracy even for erroneous data.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116751824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.025019
P. Fitch
This paper describes a digital model of intrapulse effects generated from a library of source characteristics, together with the noise. The model provides simulation for amplitude, frequency and Phase Modulation (PM) effects within a pulse. Multiple modulations can occur within the same pulse. An Expert System is described which identifies and demodulates the intrapulse modulation and the results from an implementation of such a system are compared with the source data. The intrapulse model is intended for use in the evaluation of algorithms utilising traditional Digital Signal Processing (DSP) and artificial intelligent techniques associated with Electronic Support (ES) and Radar Warning Receiver (RWR) systems.
{"title":"A model of intrapulse effects for pulse sources above 100 MHz and their measurement by an Expert System","authors":"P. Fitch","doi":"10.1504/IJIDSS.2008.025019","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025019","url":null,"abstract":"This paper describes a digital model of intrapulse effects generated from a library of source characteristics, together with the noise. The model provides simulation for amplitude, frequency and Phase Modulation (PM) effects within a pulse. Multiple modulations can occur within the same pulse. An Expert System is described which identifies and demodulates the intrapulse modulation and the results from an implementation of such a system are compared with the source data. The intrapulse model is intended for use in the evaluation of algorithms utilising traditional Digital Signal Processing (DSP) and artificial intelligent techniques associated with Electronic Support (ES) and Radar Warning Receiver (RWR) systems.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"347 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122327645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2009.031414
Subba Rao Amada, P. Vundavilli, D. K. Pratihar
Adaptive Potential Field Methods (APFMs) have been proposed in this paper and their performances have been compared among them and with that of Conventional Potential Field Method (CPFM) to solve navigation problems of the mobile robot. The performance of a potential field method (PFM) depends on its chosen attractive and repulsive potential functions and the constant terms associated with them. Robots that navigate using the CPFM may not find time-optimal path and may suffer from the deadlock situations. APFM could solve the said problems by changing the constant terms associated with the potential functions to cope with the varying situations of the environment. The performances of the proposed adaptive and CPFMs have been tested through computer simulations and on a real car-like wheeled robot. The proposed PFM is found to perform better than the conventional one.
{"title":"Adaptive vs. conventional potential field approaches for solving navigation problems of a real car-like wheeled robot","authors":"Subba Rao Amada, P. Vundavilli, D. K. Pratihar","doi":"10.1504/IJIDSS.2009.031414","DOIUrl":"https://doi.org/10.1504/IJIDSS.2009.031414","url":null,"abstract":"Adaptive Potential Field Methods (APFMs) have been proposed in this paper and their performances have been compared among them and with that of Conventional Potential Field Method (CPFM) to solve navigation problems of the mobile robot. The performance of a potential field method (PFM) depends on its chosen attractive and repulsive potential functions and the constant terms associated with them. Robots that navigate using the CPFM may not find time-optimal path and may suffer from the deadlock situations. APFM could solve the said problems by changing the constant terms associated with the potential functions to cope with the varying situations of the environment. The performances of the proposed adaptive and CPFMs have been tested through computer simulations and on a real car-like wheeled robot. The proposed PFM is found to perform better than the conventional one.","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132732061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2008.025018
F. Camastra
This paper presents a handwritten Greek character recogniser based on Support Vector Machines (SVMs). The recogniser is composed of two modules: the first one is a feature extractor, the second one, the classifier, is performed by means of SVMs. The recogniser, tested on a database of more than 22000 handwritten Greek characters, has shown satisfactory performances. SVMs compare notably better, in terms of recognition rates, with popular neural classifiers, such as Learning Vector Quantisation (LVQ) and Multi-layer Perceptron (MLP).
{"title":"A SVM Greek character recogniser","authors":"F. Camastra","doi":"10.1504/IJIDSS.2008.025018","DOIUrl":"https://doi.org/10.1504/IJIDSS.2008.025018","url":null,"abstract":"This paper presents a handwritten Greek character recogniser based on Support Vector Machines (SVMs). The recogniser is composed of two modules: the first one is a feature extractor, the second one, the classifier, is performed by means of SVMs. The recogniser, tested on a database of more than 22000 handwritten Greek characters, has shown satisfactory performances. SVMs compare notably better, in terms of recognition rates, with popular neural classifiers, such as Learning Vector Quantisation (LVQ) and Multi-layer Perceptron (MLP).","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121418381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1504/IJIDSS.2012.053665
K. Usbeck, J. Cleveland, W. Regli
As methods for detecting improvised explosive devices (IEDs) continue to diversify, it becomes increasingly important to establish a framework for coordinating distributed IED monitoring resources to best protect a designated area. The purpose of this paper is to establish the beginnings of such a framework in a distributed plan execution context. The first contribution of this paper is defining an automated planning domain for distributed IED detection. In doing so, we investigate approaches for coordinating distributed plan execution resources. Whereas many existing multi-agent system (MAS) frameworks abstract network information from agent decision-making processes, we instead propose that MAS frameworks consider network properties to improve effectiveness. The second contribution of the paper is the description of several types of network-aware planning, execution, and monitoring agents and a comparison of their performance and effectiveness in an IED monitoring scenario. The results of this research ...
{"title":"Network-centric IED detection planning","authors":"K. Usbeck, J. Cleveland, W. Regli","doi":"10.1504/IJIDSS.2012.053665","DOIUrl":"https://doi.org/10.1504/IJIDSS.2012.053665","url":null,"abstract":"As methods for detecting improvised explosive devices (IEDs) continue to diversify, it becomes increasingly important to establish a framework for coordinating distributed IED monitoring resources to best protect a designated area. The purpose of this paper is to establish the beginnings of such a framework in a distributed plan execution context. The first contribution of this paper is defining an automated planning domain for distributed IED detection. In doing so, we investigate approaches for coordinating distributed plan execution resources. Whereas many existing multi-agent system (MAS) frameworks abstract network information from agent decision-making processes, we instead propose that MAS frameworks consider network properties to improve effectiveness. The second contribution of the paper is the description of several types of network-aware planning, execution, and monitoring agents and a comparison of their performance and effectiveness in an IED monitoring scenario. The results of this research ...","PeriodicalId":311979,"journal":{"name":"Int. J. Intell. Def. Support Syst.","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133176582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}