The Journal of Defense Modeling and Simulation
2018 - 2025
Bibliographic data for series maintained by SAGE Publications ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 20, issue 4, 2023
- Growth directions for the JDMS community pp. 425-427

- Harrison Schramm
- Making simulations future proof pp. 429-430

- George Stone
- Epidemic Attack on the Aircraft Carrier Theodore Roosevelt: Bridging the Gaps in Emergency Management pp. 431-446

- Kenneth Lai, Svetlana N Yanushkevich and Vlad P Shmerko
- A live mindset in Live Virtual Constructive simulations: a spin-up for future LVC air combat training pp. 447-465

- Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
- Using cognitive models to design dynamic task allocation systems pp. 467-480

- Christopher R Fisher, Mary E Frame and Christopher Stevens
- Multiple maneuver model of cooperating ground combat troops pp. 481-493

- Jan Nohel, Petr Stodola, Zdeněk Flasar and Marian Rybanský
- On games and simulators as a platform for development of artificial intelligence for command and control pp. 495-508

- Vinicius G Goecks, Nicholas Waytowich, Derrik E Asher, Song Jun Park, Mark Mittrick, John Richardson, Manuel Vindiola, Anne Logie, Mark Dennison, Theron Trout, Priya Narayanan and Alexander Kott
- Strategic maneuver and disruption with reinforcement learning approaches for multi-agent coordination pp. 509-526

- Derrik E Asher, Anjon Basak, Rolando Fernandez, Piyush K Sharma, Erin G Zaroukian, Christopher D Hsu, Michael R Dorothy, Thomas Mahre, Gerardo Galindo, Luke Frerichs, John Rogers and John Fossaceca
- Open-set low-shot classification leveraging the power of instance discrimination pp. 527-539

- Spiridon Kasapis, Geng Zhang, Jonathon M Smereka and Nickolas Vlahopoulos
- Fast procedure for vulnerability simulation of armored vehicles pp. 541-551

- Morten Rikard Jensen, Steven Grate and Kshitiz Khanna
- Performance analysis of cooperative NOMA system for defense application with relay selection in a hostile environment pp. 553-561

- Indrajeet Kumar, Aman Kumar and Ritesh Kumar Mishra
- NER-based military simulation scenario development process pp. 563-575

- Junhua Zhou, Xiaoqing Li, Shaoping Wang and Xiao Song
- Machine learning to combat cyberattack: a survey of datasets and challenges pp. 577-588

- Arvind Prasad and Shalini Chandra
Volume 20, issue 3, 2023
- Who hacked my holodeck? pp. 285-288

- Katherine L Morse
- Where is the SIMNET for cyberspace? pp. 289-294

- Scott D Lathrop
- Life-shortening effects of radiological weapons in military operations pp. 295-301

- Edson R Andrade, Isabela S Alves, Ana Carolina Lodi Lobato, Ricardo M Stenders, Rodrigo C Curzio and Carlos Eduardo S Bonfim
- Analysis of user pairing non-orthogonal multiple access network using deep Q-network algorithm for defense applications pp. 303-316

- Shankar Ravi, Gopal Ramchandra Kulkarni, Samrat Ray, Malladi Ravisankar, V Gokula Krishnan and D S K Chakravarthy
- Simulation of chromatic and achromatic assessments for camouflage textiles and combat background pp. 317-332

- Md Anowar Hossain
- Promises and pitfalls of computational modelling for insurgency conflicts pp. 333-350

- Koen van der Zwet, Ana I Barros, Tom M van Engers and Peter M A Sloot
- Past challenges and the future of discrete event simulation pp. 351-369

- Andrew J Collins, Farinaz Sabz Ali Pour and Craig A Jordan
- Behavior of oil-based modeling clay at medium strain rates pp. 371-381

- Camilo Hernandez, Mario F Buchely, Juan P Casas-Rodriguez and Alejandro Maranon
- Weight and configuration optimization of the launcher pod using finite element analysis pp. 383-389

- Mithilesh Kumar Dewangan and S K Panigrahi
- Landmine detection via multivariate image analysis pp. 391-401

- Paulo Maranhão, Leandro Andraos, Rodrigo Guedes and Eugenio Epprecht
- The department of defense high performance computing modernization program pp. 403-413

- J Michael Barton
- Effect of combat textile cloth on human radar cross section for microwave camouflage applications pp. 415-422

- Renan Richter, Daniel Gonçalves and Newton A S Gomes
Volume 20, issue 2, 2023
- Modeling and simulation in mission assurance pp. 109-110

- Colonel Eric D Trias
- The effects of aircraft use and available repair spares on aircraft sortie generation: a long-duration logistical wargaming simulation tool pp. 111-130

- Nathaniel Choo, Darryl Ahner and Lance Champagne
- Modeling fog of war effects in AFSIM pp. 131-146

- Dillon Tryhorn, Richard Dill, Douglas D Hodson, Michael R Grimaila and Christopher W Myers
- Stochastic preemptive goal programming of Air Force weapon systems mix pp. 147-158

- Justin L Anderson, Jessica M Astudillo, Zachary E Butcher, Matthew D Cornman, Anthony J Correale, James B Crumpacker, Nathaniel C Dennie, Alex R Gaines, Mark A Gallagher, John C Goodwill, Emily S Graves, Donald B Hale, Kimberly G Holland, Benjamin D Huffman, Michelle McGee, Nicholas A Pollack, Rachel C Ramirez, Camero Song, Emmie K Swize, Erick A Tello, Jesse G Wales, Julius C Walker, Andrew B Wilson, William F Wilson, Kylie E Wooten and Marcelo Zawadzki
- Evaluation of Linear Implicit Quantized State System method for analyzing mission performance of power systems pp. 159-170

- Navid Gholizadeh, Joseph M Hood and Roger A Dougal
- On Maskirovka: the dynamics of delay in threat recognition pp. 171-180

- Rodrick Wallace
- Effectiveness evaluation of aerial reconnaissance in battalion force protection operation using the constructive simulation pp. 181-196

- Jan Drozd, LudÄ›k Rak, Pavel ZahradnÃÄ Ek, Petr Stodola and Jan Hodický
- Optimization of the Navy’s three-dimensional mine impact burial prediction simulation model, Impact35, using high-order numerical methods pp. 197-212

- Athanasios Donas, Ioannis Famelis, Peter C Chu and George Galanis
- Renewable energy and energy storage to offset diesel generators at expeditionary contingency bases pp. 213-228

- Scott M Katalenich and Mark Z Jacobson
- Investigation of Bi-Directional LSTM deep learning-based ubiquitous MIMO uplink NOMA detection for military application considering Robust channel conditions pp. 229-244

- Joel Alanya-Beltran, Ravi Shankar, Patteti Krishna and Selva Kumar S
- Examination of the multiple-input multiple-output space-time block-code selective decode and forward relaying protocol over non-homogeneous fading channel conditions pp. 245-258

- Ravi Shankar, Patteti Krishna and Naraiah R
- Impact of the learning rate and batch size on NOMA system using LSTM-based deep neural network pp. 259-268

- Ravi Shankar, B K Sarojini, Haider Mehraj, A Suresh Kumar, Rahul Neware and Ankur Singh Bist
- Recasted nonlinear complex diffusion method for removal of Rician noise from breast MRI images pp. 269-282

- Pradeep Kumar, Subodh Srivastava and Y Padma Sai
Volume 20, issue 1, 2023
- Considering the cost of cyber warfare: advancing cyber warfare analytics to better assess tradeoffs in system destruction warfare pp. 3-37

- Robert Chandler Swallow
- Impact analysis for cyber defense optimization pp. 39-39

- Steven Noel
- Performance impact analysis of services under a time-based moving target defense mechanism pp. 41-56

- Júlio Mendonça, Jin-Hee Cho, Terrence J Moore, Frederica F Nelson, Hyuk Lim and Dan Dongseong Kim
- Optimizing network microsegmentation policy for cyber resilience pp. 57-79

- Steven Noel, Vipin Swarup and Karin Johnsgard
- Graph analytics and visualization for cyber situational understanding pp. 81-95

- Steven Noel, Stephen Purdy, Annie O’Rourke, Edward Overly, Brianna Chen, Christine DiFonzo, Joseph Chen, George Sakellis, Mandira Hegde, Mano Sapra, Corrine Araki, Jeremy Martin, Ben Koehler, John Keenan, Timothy Coen, William W Watson, Jerry Harper and Kevin Jacobs
- Using network digital twins to improve cyber resilience of missions pp. 97-106

- Rajive Bagrodia
Volume 19, issue 4, 2022
- A tutorial on cooperative non-orthogonal multiple access networks pp. 563-573

- Bhanu Pratap Chaudhary, Ravi Shankar and Ritesh Kumar Mishra
- AFSIM’s pseudo-realtime hybrid simulation software design pp. 575-587

- J Scott Thompson and Douglas D Hodson
- Siting strategy for co-locating windfarms and radars considering interference constraints pp. 589-600

- Ashish Sharma, Ajay Kumar and Sushabhan Choudhury
- Application of a terminal-ballistics model for estimating munition lethal radius on mortar projectiles and rocket warheads pp. 601-612

- Catovic Alan and Kljuno Elvedin
- Military scientism and its discontents pp. 613-623

- Rodrick Wallace
- Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria pp. 625-635

- Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau and Faruk Usman Maiyaki
- Numerical study of the anti-penetration performance of sandwich composite armor containing ceramic honeycomb structures filled with aluminum alloy pp. 637-647

- Hongwei Zhu and Changfang Zhao
- Radiological urban threat due to special protective actions from security forces pp. 649-657

- Mariana SC Castro, André Luiz Q Reis, Ricardo M Stenders, Isabela Santos Alves, Jose Carlos C Amorim, Ademir Xavier da Silva and Edson R Andrade
- Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions pp. 659-677

- Morten Rikard Jensen, Wilford Smith and Kshitiz Khanna
- Designing hierarchical networks to improve patient access to care: a case study in veteran eye care pp. 679-689

- Adam VanDeusen, Amy Cohn and April Maa
- Optimizing fire allocation in a Network Centric Warfare-type model pp. 691-701

- Nam H Nguyen, My A Vu, Anh N Ta, Dinh V Bui and Manh D Hy
- Space to Air High-Altitude Region Adjoint Neutron Transport pp. 703-712

- Zachary W LaMere, Darren E Holland, Whitman T Dailey and John W McClory
- Shipborne moving target indicator radar versus incoming sea-skimming missile mathematical modeling and simulation pp. 713-722

- Theodoros G. Kostis
- Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions pp. 723-737

- Sharnil Pandya, Patteti Krishna, Ravi Shankar and Ankur Singh Bist
- Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform pp. 739-746

- Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, Rahul B R and Arvind Kumar
- Real-time calculation of the initial angle of projection for fragments in cylindrical warheads pp. 747-757

- David Felix, Ian Colwill and Paul Harris
- Sum rate capacity of non-orthogonal multiple access scheme with optimal power allocation pp. 759-769

- Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
- Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information pp. 771-781

- Ravi Shankar, Shovon Nandi and Ajay Rupani
- Real-time simulation of a fragmenting explosion for cylindrical warheads pp. 783-797

- David Felix, Ian Colwill and Paul Harris
- Analysis of NOMA-OFDM 5G wireless system using deep neural network pp. 799-806

- Sharnil Pandya, Manoj Ashok Wakchaure, Ravi Shankar and Jagadeeswara Rao Annam
- Design and simulation research of the double-spin folding mechanism based on a suspended missile pp. 807-820

- Yuan Zh, Guo Sy, Zhang Sn, Zhao Jq, Lu Wj and Zhao Hz
- Analysis of the energy harvesting non-orthogonal multiple access technique for defense applications over Rayleigh fading channel conditions pp. 821-828

- Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
- Investigation of the fifth generation non-orthogonal multiple access technique for defense applications using deep learning pp. 829-838

- Ravisankar Malladi, Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
- RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security pp. 839-854

- Prashnatita Pal, Bikash Chandra Sahana and Jayanta Poray
- Evaluation of unmanned aerial vehicle tactics through the metrics of survivability pp. 855-864

- Ian Lunsford and Thomas H Bradley
Volume 19, issue 3, 2022
- Command and its discontents: Instabilities of institutional anytime algorithms on a Clausewitz landscape pp. 239-244

- Rodrick Wallace
- Methodology for analysis of heavy vehicle trafficability in deformable soils pp. 245-253

- Elias Dias Rossi Lopes, André Flora Alves Pinto, Moisés Xavier Guimarães Valentim, Pedro Siciliano Peixoto, Gustavo Simão Rodrigues and Ricardo Teixeira da Costa Neto
- Model of an alternative navigation system for high-precision weapons pp. 255-262

- Vitalii Savchenko, Volodymyr Tolubko, Liubov Berkman, Anatolii Syrotenko, Pavlo Shchypanskyi, Oleksander Matsko, Vitalii Tiurin and Pavlo Open’ko
- A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints pp. 263-286

- Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook and Jason RC Nurse
- LVC Allocator: Aligning training value with scenario design for envisioned LVC training of fast-jet pilots pp. 287-298

- Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
- Engineering resilient systems cloud computing architecture (ECCA): a collaborative and secure analysis framework pp. 299-311

- Collin T Blakley, Letitia W Li, Greg Eakman and Brent C Baker
- Methods to measure and track population perception and support within a manual wargame pp. 313-324

- Jeremy Smith and Stephen Barker
- A multiresolution simulation system and simulation development processes pp. 325-338

- Young-Jun Jee, Tae-Gyung Lee, Sang-Ho Park, Jun-Ho Cho, Hee-Soo Kim and Tae-Eog Lee
- White noise jammer mathematical modelling and simulation pp. 339-345

- Theodoros G Kostis
- RETRACTED: Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstan pp. 347-353

- Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Arman T Abdykalykov and Rashid V Ibrayev
- RETRACTED: Integrated methodology for substantiation of the rational district placement of the evacuated population pp. 355-361

- Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Aleksandr I Mazanik and Asylbek T Abildin
- Modeling fast jet infrared countermeasures: Pseudo-imaging seekers with an ultraviolet guard band pp. 363-373

- A Glover, M A Richardson and N Barlow
- End-to-end improved convolutional neural network model for breast cancer detection using mammographic data pp. 375-384

- Pradeep Kumar, Subodh Srivastava, Ritesh Kumar Mishra and Y Padma Sai
- Simplified reliability-based load design factors for explosive blast loading, weapons effects, and its application to collateral damage estimation pp. 385-401

- Mark G Stewart
- Using Monte Carlo simulations to translate military and law enforcement training results to operational metrics pp. 403-415

- Adam T. Biggs and Dale A. Hirsch
- Size and History Combine in Allometry Relation of Technology Systems pp. 417-422

- Bruce J. West, Damien West and Alexander Kott
- RETRACTED: Multicriteria analysis of firefighter routes in buildings in the case of a fire pp. 423-432

- Hai T Nguyen, Nikolay G Topolsky, Denis V Tarakanov and Alexander V Mokshantsev
- Virtual testbed for monocular visual navigation of small unmanned aircraft systems pp. 433-451

- Kyung Kim, Robert C Leishman and Scott L Nykl
- Examination of a non-orthogonal multiple access scheme for next generation wireless networks pp. 453-465

- Ravi Shankar
- Actor–critic-based decision-making method for the artificial intelligence commander in tactical wargames pp. 467-480

- Junfeng Zhang and Qing Xue
- An agent-based modeling approach for simulating the impact of small unmanned aircraft systems on future battlefields pp. 481-500

- Carsten Christensen and John Salmon
- Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy pp. 501-517

- Dave Archer, Michael A August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra, Gerome Miklau, Alisa Pankova, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang and Roberto Yus
- How AI founders on adversarial landscapes of fog and friction pp. 519-538

- Rodrick Wallace
- Investigation of low-density parity check codes concatenated multi-user massive multiple-input multiple-output systems with imperfect channel state information pp. 539-550

- Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
- Modeling the effect of skidded timber bunches on forest soil compaction pp. 551-559

- Igor Grigorev, Olga Kunickaya, Albert Burgonutdinov, Olga Burmistrova, Varvara Druzyanova, Nikolay Dolmatov, Anna Voronova and Alexey Kotov
Volume 19, issue 2, 2022
- The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training pp. 125-126

- Joseph Cohn, Eric Vorm and Erin Baker
- The applications of artificial intelligence to education and training pp. 127-128

- Michael van Lent and Dylan Schmorrow
- Modeling what matters: AI and the future of defense learning pp. 129-131

- Sae Schatz and Walcutt Jj
- Explainable artificial intelligence for education and training pp. 133-144

- Krzysztof Fiok, Farzad V Farahani, Waldemar Karwowski and Tareq Ahram
- Can machine learning be used to forecast the future uncertainty of military teams? pp. 145-158

- Ronald H Stevens and Trysha L Galloway
- Deep neural networks for the assessment of surgical skills: A systematic review pp. 159-171

- Erim Yanik, Xavier Intes, Uwe Kruger, Pingkun Yan, David Diller, Brian Van Voorst, Basiel Makled, Jack Norfleet and Suvranu De
- A reinforcement learning approach to adaptive remediation in online training pp. 173-193

- Randall Spain, Jonathan Rowe, Andy Smith, Benjamin Goldberg, Robert Pokorny, Bradford Mott and James Lester
- Performance gains from adaptive eXtended Reality training fueled by artificial intelligence pp. 195-218

- Kay M Stanney, JoAnn Archer, Anna Skinner, Charis Horner, Claire Hughes, Nicholas P Brawand, Eric Martin, Stacey Sanchez, Larry Moralez, Cali M Fidopiastis and Ray S Perez
- Challenges and opportunities for artificial intelligence in surgery pp. 219-227

- Pamela Andreatta, Christopher S. Smith, John Christopher Graybill, Mark Bowyer and Eric Elster
- The importance of identifying the dimensionality of constructs employed in simulation and training for AI pp. 229-236

- Michael D Coovert and Winston Bennett
Volume 19, issue 1, 2022
- Cyber risk and vulnerability estimation pp. 3-4

- Hasan Cam
- Complexity and mission computability of adaptive computing systems pp. 5-11

- Venkat R Dasari, Mee Seong Im and Billy Geerhart
- Vulnerability Selection for Remediation: An Empirical Analysis pp. 13-22

- Ankit Shah, Katheryn A. Farris, Rajesh Ganesan and Sushil Jajodia
- Cybersecurity threats and experimental testbed for a generator system pp. 23-35

- Aaron W Werth, SueAnne N Griffith, Jesse R Hairston and Thomas H Morris
- Estimation of cyber network risk using rare event simulation pp. 37-55

- Alexander L Krall, Michael E Kuhl and Shanchieh J Yang
- Machine learning in cybersecurity: a comprehensive survey pp. 57-106

- Dipankar Dasgupta, Zahid Akhtar and Sajib Sen
- Agent-based target evaluation and fire doctrine: an aspect-oriented programming view pp. 107-121

- Mehmet Fatih HocaoÄŸlu
| |