The Journal of Defense Modeling and Simulation
2018 - 2025
Bibliographic data for series maintained by SAGE Publications ().
Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.
Volume 19, issue 4, 2022
- A tutorial on cooperative non-orthogonal multiple access networks pp. 563-573

- Bhanu Pratap Chaudhary, Ravi Shankar and Ritesh Kumar Mishra
- AFSIM’s pseudo-realtime hybrid simulation software design pp. 575-587

- J Scott Thompson and Douglas D Hodson
- Siting strategy for co-locating windfarms and radars considering interference constraints pp. 589-600

- Ashish Sharma, Ajay Kumar and Sushabhan Choudhury
- Application of a terminal-ballistics model for estimating munition lethal radius on mortar projectiles and rocket warheads pp. 601-612

- Catovic Alan and Kljuno Elvedin
- Military scientism and its discontents pp. 613-623

- Rodrick Wallace
- Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria pp. 625-635

- Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau and Faruk Usman Maiyaki
- Numerical study of the anti-penetration performance of sandwich composite armor containing ceramic honeycomb structures filled with aluminum alloy pp. 637-647

- Hongwei Zhu and Changfang Zhao
- Radiological urban threat due to special protective actions from security forces pp. 649-657

- Mariana SC Castro, André Luiz Q Reis, Ricardo M Stenders, Isabela Santos Alves, Jose Carlos C Amorim, Ademir Xavier da Silva and Edson R Andrade
- Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions pp. 659-677

- Morten Rikard Jensen, Wilford Smith and Kshitiz Khanna
- Designing hierarchical networks to improve patient access to care: a case study in veteran eye care pp. 679-689

- Adam VanDeusen, Amy Cohn and April Maa
- Optimizing fire allocation in a Network Centric Warfare-type model pp. 691-701

- Nam H Nguyen, My A Vu, Anh N Ta, Dinh V Bui and Manh D Hy
- Space to Air High-Altitude Region Adjoint Neutron Transport pp. 703-712

- Zachary W LaMere, Darren E Holland, Whitman T Dailey and John W McClory
- Shipborne moving target indicator radar versus incoming sea-skimming missile mathematical modeling and simulation pp. 713-722

- Theodoros G. Kostis
- Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions pp. 723-737

- Sharnil Pandya, Patteti Krishna, Ravi Shankar and Ankur Singh Bist
- Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform pp. 739-746

- Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, Rahul B R and Arvind Kumar
- Real-time calculation of the initial angle of projection for fragments in cylindrical warheads pp. 747-757

- David Felix, Ian Colwill and Paul Harris
- Sum rate capacity of non-orthogonal multiple access scheme with optimal power allocation pp. 759-769

- Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
- Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information pp. 771-781

- Ravi Shankar, Shovon Nandi and Ajay Rupani
- Real-time simulation of a fragmenting explosion for cylindrical warheads pp. 783-797

- David Felix, Ian Colwill and Paul Harris
- Analysis of NOMA-OFDM 5G wireless system using deep neural network pp. 799-806

- Sharnil Pandya, Manoj Ashok Wakchaure, Ravi Shankar and Jagadeeswara Rao Annam
- Design and simulation research of the double-spin folding mechanism based on a suspended missile pp. 807-820

- Yuan Zh, Guo Sy, Zhang Sn, Zhao Jq, Lu Wj and Zhao Hz
- Analysis of the energy harvesting non-orthogonal multiple access technique for defense applications over Rayleigh fading channel conditions pp. 821-828

- Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
- Investigation of the fifth generation non-orthogonal multiple access technique for defense applications using deep learning pp. 829-838

- Ravisankar Malladi, Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
- RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security pp. 839-854

- Prashnatita Pal, Bikash Chandra Sahana and Jayanta Poray
- Evaluation of unmanned aerial vehicle tactics through the metrics of survivability pp. 855-864

- Ian Lunsford and Thomas H Bradley
Volume 19, issue 3, 2022
- Command and its discontents: Instabilities of institutional anytime algorithms on a Clausewitz landscape pp. 239-244

- Rodrick Wallace
- Methodology for analysis of heavy vehicle trafficability in deformable soils pp. 245-253

- Elias Dias Rossi Lopes, André Flora Alves Pinto, Moisés Xavier Guimarães Valentim, Pedro Siciliano Peixoto, Gustavo Simão Rodrigues and Ricardo Teixeira da Costa Neto
- Model of an alternative navigation system for high-precision weapons pp. 255-262

- Vitalii Savchenko, Volodymyr Tolubko, Liubov Berkman, Anatolii Syrotenko, Pavlo Shchypanskyi, Oleksander Matsko, Vitalii Tiurin and Pavlo Open’ko
- A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints pp. 263-286

- Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook and Jason RC Nurse
- LVC Allocator: Aligning training value with scenario design for envisioned LVC training of fast-jet pilots pp. 287-298

- Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
- Engineering resilient systems cloud computing architecture (ECCA): a collaborative and secure analysis framework pp. 299-311

- Collin T Blakley, Letitia W Li, Greg Eakman and Brent C Baker
- Methods to measure and track population perception and support within a manual wargame pp. 313-324

- Jeremy Smith and Stephen Barker
- A multiresolution simulation system and simulation development processes pp. 325-338

- Young-Jun Jee, Tae-Gyung Lee, Sang-Ho Park, Jun-Ho Cho, Hee-Soo Kim and Tae-Eog Lee
- White noise jammer mathematical modelling and simulation pp. 339-345

- Theodoros G Kostis
- RETRACTED: Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstan pp. 347-353

- Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Arman T Abdykalykov and Rashid V Ibrayev
- RETRACTED: Integrated methodology for substantiation of the rational district placement of the evacuated population pp. 355-361

- Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Aleksandr I Mazanik and Asylbek T Abildin
- Modeling fast jet infrared countermeasures: Pseudo-imaging seekers with an ultraviolet guard band pp. 363-373

- A Glover, M A Richardson and N Barlow
- End-to-end improved convolutional neural network model for breast cancer detection using mammographic data pp. 375-384

- Pradeep Kumar, Subodh Srivastava, Ritesh Kumar Mishra and Y Padma Sai
- Simplified reliability-based load design factors for explosive blast loading, weapons effects, and its application to collateral damage estimation pp. 385-401

- Mark G Stewart
- Using Monte Carlo simulations to translate military and law enforcement training results to operational metrics pp. 403-415

- Adam T. Biggs and Dale A. Hirsch
- Size and History Combine in Allometry Relation of Technology Systems pp. 417-422

- Bruce J. West, Damien West and Alexander Kott
- RETRACTED: Multicriteria analysis of firefighter routes in buildings in the case of a fire pp. 423-432

- Hai T Nguyen, Nikolay G Topolsky, Denis V Tarakanov and Alexander V Mokshantsev
- Virtual testbed for monocular visual navigation of small unmanned aircraft systems pp. 433-451

- Kyung Kim, Robert C Leishman and Scott L Nykl
- Examination of a non-orthogonal multiple access scheme for next generation wireless networks pp. 453-465

- Ravi Shankar
- Actor–critic-based decision-making method for the artificial intelligence commander in tactical wargames pp. 467-480

- Junfeng Zhang and Qing Xue
- An agent-based modeling approach for simulating the impact of small unmanned aircraft systems on future battlefields pp. 481-500

- Carsten Christensen and John Salmon
- Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy pp. 501-517

- Dave Archer, Michael A August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra, Gerome Miklau, Alisa Pankova, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang and Roberto Yus
- How AI founders on adversarial landscapes of fog and friction pp. 519-538

- Rodrick Wallace
- Investigation of low-density parity check codes concatenated multi-user massive multiple-input multiple-output systems with imperfect channel state information pp. 539-550

- Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
- Modeling the effect of skidded timber bunches on forest soil compaction pp. 551-559

- Igor Grigorev, Olga Kunickaya, Albert Burgonutdinov, Olga Burmistrova, Varvara Druzyanova, Nikolay Dolmatov, Anna Voronova and Alexey Kotov
Volume 19, issue 2, 2022
- The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training pp. 125-126

- Joseph Cohn, Eric Vorm and Erin Baker
- The applications of artificial intelligence to education and training pp. 127-128

- Michael van Lent and Dylan Schmorrow
- Modeling what matters: AI and the future of defense learning pp. 129-131

- Sae Schatz and Walcutt Jj
- Explainable artificial intelligence for education and training pp. 133-144

- Krzysztof Fiok, Farzad V Farahani, Waldemar Karwowski and Tareq Ahram
- Can machine learning be used to forecast the future uncertainty of military teams? pp. 145-158

- Ronald H Stevens and Trysha L Galloway
- Deep neural networks for the assessment of surgical skills: A systematic review pp. 159-171

- Erim Yanik, Xavier Intes, Uwe Kruger, Pingkun Yan, David Diller, Brian Van Voorst, Basiel Makled, Jack Norfleet and Suvranu De
- A reinforcement learning approach to adaptive remediation in online training pp. 173-193

- Randall Spain, Jonathan Rowe, Andy Smith, Benjamin Goldberg, Robert Pokorny, Bradford Mott and James Lester
- Performance gains from adaptive eXtended Reality training fueled by artificial intelligence pp. 195-218

- Kay M Stanney, JoAnn Archer, Anna Skinner, Charis Horner, Claire Hughes, Nicholas P Brawand, Eric Martin, Stacey Sanchez, Larry Moralez, Cali M Fidopiastis and Ray S Perez
- Challenges and opportunities for artificial intelligence in surgery pp. 219-227

- Pamela Andreatta, Christopher S. Smith, John Christopher Graybill, Mark Bowyer and Eric Elster
- The importance of identifying the dimensionality of constructs employed in simulation and training for AI pp. 229-236

- Michael D Coovert and Winston Bennett
Volume 19, issue 1, 2022
- Cyber risk and vulnerability estimation pp. 3-4

- Hasan Cam
- Complexity and mission computability of adaptive computing systems pp. 5-11

- Venkat R Dasari, Mee Seong Im and Billy Geerhart
- Vulnerability Selection for Remediation: An Empirical Analysis pp. 13-22

- Ankit Shah, Katheryn A. Farris, Rajesh Ganesan and Sushil Jajodia
- Cybersecurity threats and experimental testbed for a generator system pp. 23-35

- Aaron W Werth, SueAnne N Griffith, Jesse R Hairston and Thomas H Morris
- Estimation of cyber network risk using rare event simulation pp. 37-55

- Alexander L Krall, Michael E Kuhl and Shanchieh J Yang
- Machine learning in cybersecurity: a comprehensive survey pp. 57-106

- Dipankar Dasgupta, Zahid Akhtar and Sajib Sen
- Agent-based target evaluation and fire doctrine: an aspect-oriented programming view pp. 107-121

- Mehmet Fatih HocaoÄŸlu
| |