EconPapers    
Economics at your fingertips  
 

The Journal of Defense Modeling and Simulation

2018 - 2025


Bibliographic data for series maintained by SAGE Publications ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 20, issue 4, 2023

Growth directions for the JDMS community pp. 425-427 Downloads
Harrison Schramm
Making simulations future proof pp. 429-430 Downloads
George Stone
Epidemic Attack on the Aircraft Carrier Theodore Roosevelt: Bridging the Gaps in Emergency Management pp. 431-446 Downloads
Kenneth Lai, Svetlana N Yanushkevich and Vlad P Shmerko
A live mindset in Live Virtual Constructive simulations: a spin-up for future LVC air combat training pp. 447-465 Downloads
Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
Using cognitive models to design dynamic task allocation systems pp. 467-480 Downloads
Christopher R Fisher, Mary E Frame and Christopher Stevens
Multiple maneuver model of cooperating ground combat troops pp. 481-493 Downloads
Jan Nohel, Petr Stodola, Zdeněk Flasar and Marian Rybanský
On games and simulators as a platform for development of artificial intelligence for command and control pp. 495-508 Downloads
Vinicius G Goecks, Nicholas Waytowich, Derrik E Asher, Song Jun Park, Mark Mittrick, John Richardson, Manuel Vindiola, Anne Logie, Mark Dennison, Theron Trout, Priya Narayanan and Alexander Kott
Strategic maneuver and disruption with reinforcement learning approaches for multi-agent coordination pp. 509-526 Downloads
Derrik E Asher, Anjon Basak, Rolando Fernandez, Piyush K Sharma, Erin G Zaroukian, Christopher D Hsu, Michael R Dorothy, Thomas Mahre, Gerardo Galindo, Luke Frerichs, John Rogers and John Fossaceca
Open-set low-shot classification leveraging the power of instance discrimination pp. 527-539 Downloads
Spiridon Kasapis, Geng Zhang, Jonathon M Smereka and Nickolas Vlahopoulos
Fast procedure for vulnerability simulation of armored vehicles pp. 541-551 Downloads
Morten Rikard Jensen, Steven Grate and Kshitiz Khanna
Performance analysis of cooperative NOMA system for defense application with relay selection in a hostile environment pp. 553-561 Downloads
Indrajeet Kumar, Aman Kumar and Ritesh Kumar Mishra
NER-based military simulation scenario development process pp. 563-575 Downloads
Junhua Zhou, Xiaoqing Li, Shaoping Wang and Xiao Song
Machine learning to combat cyberattack: a survey of datasets and challenges pp. 577-588 Downloads
Arvind Prasad and Shalini Chandra

Volume 20, issue 3, 2023

Who hacked my holodeck? pp. 285-288 Downloads
Katherine L Morse
Where is the SIMNET for cyberspace? pp. 289-294 Downloads
Scott D Lathrop
Life-shortening effects of radiological weapons in military operations pp. 295-301 Downloads
Edson R Andrade, Isabela S Alves, Ana Carolina Lodi Lobato, Ricardo M Stenders, Rodrigo C Curzio and Carlos Eduardo S Bonfim
Analysis of user pairing non-orthogonal multiple access network using deep Q-network algorithm for defense applications pp. 303-316 Downloads
Shankar Ravi, Gopal Ramchandra Kulkarni, Samrat Ray, Malladi Ravisankar, V Gokula Krishnan and D S K Chakravarthy
Simulation of chromatic and achromatic assessments for camouflage textiles and combat background pp. 317-332 Downloads
Md Anowar Hossain
Promises and pitfalls of computational modelling for insurgency conflicts pp. 333-350 Downloads
Koen van der Zwet, Ana I Barros, Tom M van Engers and Peter M A Sloot
Past challenges and the future of discrete event simulation pp. 351-369 Downloads
Andrew J Collins, Farinaz Sabz Ali Pour and Craig A Jordan
Behavior of oil-based modeling clay at medium strain rates pp. 371-381 Downloads
Camilo Hernandez, Mario F Buchely, Juan P Casas-Rodriguez and Alejandro Maranon
Weight and configuration optimization of the launcher pod using finite element analysis pp. 383-389 Downloads
Mithilesh Kumar Dewangan and S K Panigrahi
Landmine detection via multivariate image analysis pp. 391-401 Downloads
Paulo Maranhão, Leandro Andraos, Rodrigo Guedes and Eugenio Epprecht
The department of defense high performance computing modernization program pp. 403-413 Downloads
J Michael Barton
Effect of combat textile cloth on human radar cross section for microwave camouflage applications pp. 415-422 Downloads
Renan Richter, Daniel Gonçalves and Newton A S Gomes

Volume 20, issue 2, 2023

Modeling and simulation in mission assurance pp. 109-110 Downloads
Colonel Eric D Trias
The effects of aircraft use and available repair spares on aircraft sortie generation: a long-duration logistical wargaming simulation tool pp. 111-130 Downloads
Nathaniel Choo, Darryl Ahner and Lance Champagne
Modeling fog of war effects in AFSIM pp. 131-146 Downloads
Dillon Tryhorn, Richard Dill, Douglas D Hodson, Michael R Grimaila and Christopher W Myers
Stochastic preemptive goal programming of Air Force weapon systems mix pp. 147-158 Downloads
Justin L Anderson, Jessica M Astudillo, Zachary E Butcher, Matthew D Cornman, Anthony J Correale, James B Crumpacker, Nathaniel C Dennie, Alex R Gaines, Mark A Gallagher, John C Goodwill, Emily S Graves, Donald B Hale, Kimberly G Holland, Benjamin D Huffman, Michelle McGee, Nicholas A Pollack, Rachel C Ramirez, Camero Song, Emmie K Swize, Erick A Tello, Jesse G Wales, Julius C Walker, Andrew B Wilson, William F Wilson, Kylie E Wooten and Marcelo Zawadzki
Evaluation of Linear Implicit Quantized State System method for analyzing mission performance of power systems pp. 159-170 Downloads
Navid Gholizadeh, Joseph M Hood and Roger A Dougal
On Maskirovka: the dynamics of delay in threat recognition pp. 171-180 Downloads
Rodrick Wallace
Effectiveness evaluation of aerial reconnaissance in battalion force protection operation using the constructive simulation pp. 181-196 Downloads
Jan Drozd, LudÄ›k Rak, Pavel ZahradnÃ­Ä Ek, Petr Stodola and Jan Hodický
Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods pp. 197-212 Downloads
Athanasios Donas, Ioannis Famelis, Peter C Chu and George Galanis
Renewable energy and energy storage to offset diesel generators at expeditionary contingency bases pp. 213-228 Downloads
Scott M Katalenich and Mark Z Jacobson
Investigation of Bi-Directional LSTM deep learning-based ubiquitous MIMO uplink NOMA detection for military application considering Robust channel conditions pp. 229-244 Downloads
Joel Alanya-Beltran, Ravi Shankar, Patteti Krishna and Selva Kumar S
Examination of the multiple-input multiple-output space-time block-code selective decode and forward relaying protocol over non-homogeneous fading channel conditions pp. 245-258 Downloads
Ravi Shankar, Patteti Krishna and Naraiah R
Impact of the learning rate and batch size on NOMA system using LSTM-based deep neural network pp. 259-268 Downloads
Ravi Shankar, B K Sarojini, Haider Mehraj, A Suresh Kumar, Rahul Neware and Ankur Singh Bist
Recasted nonlinear complex diffusion method for removal of Rician noise from breast MRI images pp. 269-282 Downloads
Pradeep Kumar, Subodh Srivastava and Y Padma Sai

Volume 20, issue 1, 2023

Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare pp. 3-37 Downloads
Robert Chandler Swallow
Impact analysis for cyber defense optimization pp. 39-39 Downloads
Steven Noel
Performance impact analysis of services under a time-based moving target defense mechanism pp. 41-56 Downloads
Júlio Mendonça, Jin-Hee Cho, Terrence J Moore, Frederica F Nelson, Hyuk Lim and Dan Dongseong Kim
Optimizing network microsegmentation policy for cyber resilience pp. 57-79 Downloads
Steven Noel, Vipin Swarup and Karin Johnsgard
Graph analytics and visualization for cyber situational understanding pp. 81-95 Downloads
Steven Noel, Stephen Purdy, Annie O’Rourke, Edward Overly, Brianna Chen, Christine DiFonzo, Joseph Chen, George Sakellis, Mandira Hegde, Mano Sapra, Corrine Araki, Jeremy Martin, Ben Koehler, John Keenan, Timothy Coen, William W Watson, Jerry Harper and Kevin Jacobs
Using network digital twins to improve cyber resilience of missions pp. 97-106 Downloads
Rajive Bagrodia

Volume 19, issue 4, 2022

A tutorial on cooperative non-orthogonal multiple access networks pp. 563-573 Downloads
Bhanu Pratap Chaudhary, Ravi Shankar and Ritesh Kumar Mishra
AFSIM’s pseudo-realtime hybrid simulation software design pp. 575-587 Downloads
J Scott Thompson and Douglas D Hodson
Siting strategy for co-locating windfarms and radars considering interference constraints pp. 589-600 Downloads
Ashish Sharma, Ajay Kumar and Sushabhan Choudhury
Application of a terminal-ballistics model for estimating munition lethal radius on mortar projectiles and rocket warheads pp. 601-612 Downloads
Catovic Alan and Kljuno Elvedin
Military scientism and its discontents pp. 613-623 Downloads
Rodrick Wallace
Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria pp. 625-635 Downloads
Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau and Faruk Usman Maiyaki
Numerical study of the anti-penetration performance of sandwich composite armor containing ceramic honeycomb structures filled with aluminum alloy pp. 637-647 Downloads
Hongwei Zhu and Changfang Zhao
Radiological urban threat due to special protective actions from security forces pp. 649-657 Downloads
Mariana SC Castro, André Luiz Q Reis, Ricardo M Stenders, Isabela Santos Alves, Jose Carlos C Amorim, Ademir Xavier da Silva and Edson R Andrade
Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions pp. 659-677 Downloads
Morten Rikard Jensen, Wilford Smith and Kshitiz Khanna
Designing hierarchical networks to improve patient access to care: a case study in veteran eye care pp. 679-689 Downloads
Adam VanDeusen, Amy Cohn and April Maa
Optimizing fire allocation in a Network Centric Warfare-type model pp. 691-701 Downloads
Nam H Nguyen, My A Vu, Anh N Ta, Dinh V Bui and Manh D Hy
Space to Air High-Altitude Region Adjoint Neutron Transport pp. 703-712 Downloads
Zachary W LaMere, Darren E Holland, Whitman T Dailey and John W McClory
Shipborne moving target indicator radar versus incoming sea-skimming missile mathematical modeling and simulation pp. 713-722 Downloads
Theodoros G. Kostis
Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions pp. 723-737 Downloads
Sharnil Pandya, Patteti Krishna, Ravi Shankar and Ankur Singh Bist
Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform pp. 739-746 Downloads
Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, Rahul B R and Arvind Kumar
Real-time calculation of the initial angle of projection for fragments in cylindrical warheads pp. 747-757 Downloads
David Felix, Ian Colwill and Paul Harris
Sum rate capacity of non-orthogonal multiple access scheme with optimal power allocation pp. 759-769 Downloads
Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information pp. 771-781 Downloads
Ravi Shankar, Shovon Nandi and Ajay Rupani
Real-time simulation of a fragmenting explosion for cylindrical warheads pp. 783-797 Downloads
David Felix, Ian Colwill and Paul Harris
Analysis of NOMA-OFDM 5G wireless system using deep neural network pp. 799-806 Downloads
Sharnil Pandya, Manoj Ashok Wakchaure, Ravi Shankar and Jagadeeswara Rao Annam
Design and simulation research of the double-spin folding mechanism based on a suspended missile pp. 807-820 Downloads
Yuan Zh, Guo Sy, Zhang Sn, Zhao Jq, Lu Wj and Zhao Hz
Analysis of the energy harvesting non-orthogonal multiple access technique for defense applications over Rayleigh fading channel conditions pp. 821-828 Downloads
Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
Investigation of the fifth generation non-orthogonal multiple access technique for defense applications using deep learning pp. 829-838 Downloads
Ravisankar Malladi, Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security pp. 839-854 Downloads
Prashnatita Pal, Bikash Chandra Sahana and Jayanta Poray
Evaluation of unmanned aerial vehicle tactics through the metrics of survivability pp. 855-864 Downloads
Ian Lunsford and Thomas H Bradley

Volume 19, issue 3, 2022

Command and its discontents: Instabilities of institutional anytime algorithms on a Clausewitz landscape pp. 239-244 Downloads
Rodrick Wallace
Methodology for analysis of heavy vehicle trafficability in deformable soils pp. 245-253 Downloads
Elias Dias Rossi Lopes, André Flora Alves Pinto, Moisés Xavier Guimarães Valentim, Pedro Siciliano Peixoto, Gustavo Simão Rodrigues and Ricardo Teixeira da Costa Neto
Model of an alternative navigation system for high-precision weapons pp. 255-262 Downloads
Vitalii Savchenko, Volodymyr Tolubko, Liubov Berkman, Anatolii Syrotenko, Pavlo Shchypanskyi, Oleksander Matsko, Vitalii Tiurin and Pavlo Open’ko
A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints pp. 263-286 Downloads
Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook and Jason RC Nurse
LVC Allocator: Aligning training value with scenario design for envisioned LVC training of fast-jet pilots pp. 287-298 Downloads
Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
Engineering resilient systems cloud computing architecture (ECCA): a collaborative and secure analysis framework pp. 299-311 Downloads
Collin T Blakley, Letitia W Li, Greg Eakman and Brent C Baker
Methods to measure and track population perception and support within a manual wargame pp. 313-324 Downloads
Jeremy Smith and Stephen Barker
A multiresolution simulation system and simulation development processes pp. 325-338 Downloads
Young-Jun Jee, Tae-Gyung Lee, Sang-Ho Park, Jun-Ho Cho, Hee-Soo Kim and Tae-Eog Lee
White noise jammer mathematical modelling and simulation pp. 339-345 Downloads
Theodoros G Kostis
RETRACTED: Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstan pp. 347-353 Downloads
Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Arman T Abdykalykov and Rashid V Ibrayev
RETRACTED: Integrated methodology for substantiation of the rational district placement of the evacuated population pp. 355-361 Downloads
Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Aleksandr I Mazanik and Asylbek T Abildin
Modeling fast jet infrared countermeasures: Pseudo-imaging seekers with an ultraviolet guard band pp. 363-373 Downloads
A Glover, M A Richardson and N Barlow
End-to-end improved convolutional neural network model for breast cancer detection using mammographic data pp. 375-384 Downloads
Pradeep Kumar, Subodh Srivastava, Ritesh Kumar Mishra and Y Padma Sai
Simplified reliability-based load design factors for explosive blast loading, weapons effects, and its application to collateral damage estimation pp. 385-401 Downloads
Mark G Stewart
Using Monte Carlo simulations to translate military and law enforcement training results to operational metrics pp. 403-415 Downloads
Adam T. Biggs and Dale A. Hirsch
Size and History Combine in Allometry Relation of Technology Systems pp. 417-422 Downloads
Bruce J. West, Damien West and Alexander Kott
RETRACTED: Multicriteria analysis of firefighter routes in buildings in the case of a fire pp. 423-432 Downloads
Hai T Nguyen, Nikolay G Topolsky, Denis V Tarakanov and Alexander V Mokshantsev
Virtual testbed for monocular visual navigation of small unmanned aircraft systems pp. 433-451 Downloads
Kyung Kim, Robert C Leishman and Scott L Nykl
Examination of a non-orthogonal multiple access scheme for next generation wireless networks pp. 453-465 Downloads
Ravi Shankar
Actor–critic-based decision-making method for the artificial intelligence commander in tactical wargames pp. 467-480 Downloads
Junfeng Zhang and Qing Xue
An agent-based modeling approach for simulating the impact of small unmanned aircraft systems on future battlefields pp. 481-500 Downloads
Carsten Christensen and John Salmon
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy pp. 501-517 Downloads
Dave Archer, Michael A August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra, Gerome Miklau, Alisa Pankova, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang and Roberto Yus
How AI founders on adversarial landscapes of fog and friction pp. 519-538 Downloads
Rodrick Wallace
Investigation of low-density parity check codes concatenated multi-user massive multiple-input multiple-output systems with imperfect channel state information pp. 539-550 Downloads
Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
Modeling the effect of skidded timber bunches on forest soil compaction pp. 551-559 Downloads
Igor Grigorev, Olga Kunickaya, Albert Burgonutdinov, Olga Burmistrova, Varvara Druzyanova, Nikolay Dolmatov, Anna Voronova and Alexey Kotov

Volume 19, issue 2, 2022

The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training pp. 125-126 Downloads
Joseph Cohn, Eric Vorm and Erin Baker
The applications of artificial intelligence to education and training pp. 127-128 Downloads
Michael van Lent and Dylan Schmorrow
Modeling what matters: AI and the future of defense learning pp. 129-131 Downloads
Sae Schatz and Walcutt Jj
Explainable artificial intelligence for education and training pp. 133-144 Downloads
Krzysztof Fiok, Farzad V Farahani, Waldemar Karwowski and Tareq Ahram
Can machine learning be used to forecast the future uncertainty of military teams? pp. 145-158 Downloads
Ronald H Stevens and Trysha L Galloway
Deep neural networks for the assessment of surgical skills: A systematic review pp. 159-171 Downloads
Erim Yanik, Xavier Intes, Uwe Kruger, Pingkun Yan, David Diller, Brian Van Voorst, Basiel Makled, Jack Norfleet and Suvranu De
A reinforcement learning approach to adaptive remediation in online training pp. 173-193 Downloads
Randall Spain, Jonathan Rowe, Andy Smith, Benjamin Goldberg, Robert Pokorny, Bradford Mott and James Lester
Performance gains from adaptive eXtended Reality training fueled by artificial intelligence pp. 195-218 Downloads
Kay M Stanney, JoAnn Archer, Anna Skinner, Charis Horner, Claire Hughes, Nicholas P Brawand, Eric Martin, Stacey Sanchez, Larry Moralez, Cali M Fidopiastis and Ray S Perez
Challenges and opportunities for artificial intelligence in surgery pp. 219-227 Downloads
Pamela Andreatta, Christopher S. Smith, John Christopher Graybill, Mark Bowyer and Eric Elster
The importance of identifying the dimensionality of constructs employed in simulation and training for AI pp. 229-236 Downloads
Michael D Coovert and Winston Bennett

Volume 19, issue 1, 2022

Cyber risk and vulnerability estimation pp. 3-4 Downloads
Hasan Cam
Complexity and mission computability of adaptive computing systems pp. 5-11 Downloads
Venkat R Dasari, Mee Seong Im and Billy Geerhart
Vulnerability Selection for Remediation: An Empirical Analysis pp. 13-22 Downloads
Ankit Shah, Katheryn A. Farris, Rajesh Ganesan and Sushil Jajodia
Cybersecurity threats and experimental testbed for a generator system pp. 23-35 Downloads
Aaron W Werth, SueAnne N Griffith, Jesse R Hairston and Thomas H Morris
Estimation of cyber network risk using rare event simulation pp. 37-55 Downloads
Alexander L Krall, Michael E Kuhl and Shanchieh J Yang
Machine learning in cybersecurity: a comprehensive survey pp. 57-106 Downloads
Dipankar Dasgupta, Zahid Akhtar and Sajib Sen
Agent-based target evaluation and fire doctrine: an aspect-oriented programming view pp. 107-121 Downloads
Mehmet Fatih HocaoÄŸlu
Page updated 2025-04-20