EconPapers    
Economics at your fingertips  
 

The Journal of Defense Modeling and Simulation

2018 - 2025


Bibliographic data for series maintained by SAGE Publications ().

Access Statistics for this journal.
Is something missing from the series or not right? See the RePEc data check for the archive and series.


Volume 19, issue 4, 2022

A tutorial on cooperative non-orthogonal multiple access networks pp. 563-573 Downloads
Bhanu Pratap Chaudhary, Ravi Shankar and Ritesh Kumar Mishra
AFSIM’s pseudo-realtime hybrid simulation software design pp. 575-587 Downloads
J Scott Thompson and Douglas D Hodson
Siting strategy for co-locating windfarms and radars considering interference constraints pp. 589-600 Downloads
Ashish Sharma, Ajay Kumar and Sushabhan Choudhury
Application of a terminal-ballistics model for estimating munition lethal radius on mortar projectiles and rocket warheads pp. 601-612 Downloads
Catovic Alan and Kljuno Elvedin
Military scientism and its discontents pp. 613-623 Downloads
Rodrick Wallace
Tracking and modeling public perceptions toward the reality of COVID-19 pandemic in Nigeria pp. 625-635 Downloads
Abdullahi Yusuf, Nasiru Ibrahim Tambuwal, Hadiza Ahmad Gusau and Faruk Usman Maiyaki
Numerical study of the anti-penetration performance of sandwich composite armor containing ceramic honeycomb structures filled with aluminum alloy pp. 637-647 Downloads
Hongwei Zhu and Changfang Zhao
Radiological urban threat due to special protective actions from security forces pp. 649-657 Downloads
Mariana SC Castro, André Luiz Q Reis, Ricardo M Stenders, Isabela Santos Alves, Jose Carlos C Amorim, Ademir Xavier da Silva and Edson R Andrade
Parameter characterization of a buried mine blast event with further emphasis on sympathetic detonation and layered soil bed conditions pp. 659-677 Downloads
Morten Rikard Jensen, Wilford Smith and Kshitiz Khanna
Designing hierarchical networks to improve patient access to care: a case study in veteran eye care pp. 679-689 Downloads
Adam VanDeusen, Amy Cohn and April Maa
Optimizing fire allocation in a Network Centric Warfare-type model pp. 691-701 Downloads
Nam H Nguyen, My A Vu, Anh N Ta, Dinh V Bui and Manh D Hy
Space to Air High-Altitude Region Adjoint Neutron Transport pp. 703-712 Downloads
Zachary W LaMere, Darren E Holland, Whitman T Dailey and John W McClory
Shipborne moving target indicator radar versus incoming sea-skimming missile mathematical modeling and simulation pp. 713-722 Downloads
Theodoros G. Kostis
Examination of the fifth-generation vehicular simultaneous wireless information and power transfer cooperative non-orthogonal multiple access network in military scenarios considering time-varying and imperfect channel state information conditions pp. 723-737 Downloads
Sharnil Pandya, Patteti Krishna, Ravi Shankar and Ankur Singh Bist
Marine seismic signal denoising using VMD with Hausdorff distance and wavelet transform pp. 739-746 Downloads
Abhishek Kesharwani, Vaibhav Aggarwal, Shubham Singh, Rahul B R and Arvind Kumar
Real-time calculation of the initial angle of projection for fragments in cylindrical warheads pp. 747-757 Downloads
David Felix, Ian Colwill and Paul Harris
Sum rate capacity of non-orthogonal multiple access scheme with optimal power allocation pp. 759-769 Downloads
Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
Channel capacity analysis of non-orthogonal multiple access and massive multiple-input multiple-output wireless communication networks considering perfect and imperfect channel state information pp. 771-781 Downloads
Ravi Shankar, Shovon Nandi and Ajay Rupani
Real-time simulation of a fragmenting explosion for cylindrical warheads pp. 783-797 Downloads
David Felix, Ian Colwill and Paul Harris
Analysis of NOMA-OFDM 5G wireless system using deep neural network pp. 799-806 Downloads
Sharnil Pandya, Manoj Ashok Wakchaure, Ravi Shankar and Jagadeeswara Rao Annam
Design and simulation research of the double-spin folding mechanism based on a suspended missile pp. 807-820 Downloads
Yuan Zh, Guo Sy, Zhang Sn, Zhao Jq, Lu Wj and Zhao Hz
Analysis of the energy harvesting non-orthogonal multiple access technique for defense applications over Rayleigh fading channel conditions pp. 821-828 Downloads
Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
Investigation of the fifth generation non-orthogonal multiple access technique for defense applications using deep learning pp. 829-838 Downloads
Ravisankar Malladi, Manoj Kumar Beuria, Ravi Shankar and Sudhansu Sekhar Singh
RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security pp. 839-854 Downloads
Prashnatita Pal, Bikash Chandra Sahana and Jayanta Poray
Evaluation of unmanned aerial vehicle tactics through the metrics of survivability pp. 855-864 Downloads
Ian Lunsford and Thomas H Bradley

Volume 19, issue 3, 2022

Command and its discontents: Instabilities of institutional anytime algorithms on a Clausewitz landscape pp. 239-244 Downloads
Rodrick Wallace
Methodology for analysis of heavy vehicle trafficability in deformable soils pp. 245-253 Downloads
Elias Dias Rossi Lopes, André Flora Alves Pinto, Moisés Xavier Guimarães Valentim, Pedro Siciliano Peixoto, Gustavo Simão Rodrigues and Ricardo Teixeira da Costa Neto
Model of an alternative navigation system for high-precision weapons pp. 255-262 Downloads
Vitalii Savchenko, Volodymyr Tolubko, Liubov Berkman, Anatolii Syrotenko, Pavlo Shchypanskyi, Oleksander Matsko, Vitalii Tiurin and Pavlo Open’ko
A review of the use and utility of industrial network-based open source simulators: functionality, security, and policy viewpoints pp. 263-286 Downloads
Uchenna Daniel Ani, Jeremy McKendrick Watson, Madeline Carr, Al Cook and Jason RC Nurse
LVC Allocator: Aligning training value with scenario design for envisioned LVC training of fast-jet pilots pp. 287-298 Downloads
Sanna Aronsson, Henrik Artman, Mikael Mitchell, Robert Ramberg and Rogier Woltjer
Engineering resilient systems cloud computing architecture (ECCA): a collaborative and secure analysis framework pp. 299-311 Downloads
Collin T Blakley, Letitia W Li, Greg Eakman and Brent C Baker
Methods to measure and track population perception and support within a manual wargame pp. 313-324 Downloads
Jeremy Smith and Stephen Barker
A multiresolution simulation system and simulation development processes pp. 325-338 Downloads
Young-Jun Jee, Tae-Gyung Lee, Sang-Ho Park, Jun-Ho Cho, Hee-Soo Kim and Tae-Eog Lee
White noise jammer mathematical modelling and simulation pp. 339-345 Downloads
Theodoros G Kostis
RETRACTED: Determination of integral indicators characterizing the possibility of accommodating the evacuated population in the territory of the Republic of Kazakhstan pp. 347-353 Downloads
Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Arman T Abdykalykov and Rashid V Ibrayev
RETRACTED: Integrated methodology for substantiation of the rational district placement of the evacuated population pp. 355-361 Downloads
Yernar Zh Akimbayev, Zhumabek Kh Akhmetov, Murat S Kuanyshbaev, Aleksandr I Mazanik and Asylbek T Abildin
Modeling fast jet infrared countermeasures: Pseudo-imaging seekers with an ultraviolet guard band pp. 363-373 Downloads
A Glover, M A Richardson and N Barlow
End-to-end improved convolutional neural network model for breast cancer detection using mammographic data pp. 375-384 Downloads
Pradeep Kumar, Subodh Srivastava, Ritesh Kumar Mishra and Y Padma Sai
Simplified reliability-based load design factors for explosive blast loading, weapons effects, and its application to collateral damage estimation pp. 385-401 Downloads
Mark G Stewart
Using Monte Carlo simulations to translate military and law enforcement training results to operational metrics pp. 403-415 Downloads
Adam T. Biggs and Dale A. Hirsch
Size and History Combine in Allometry Relation of Technology Systems pp. 417-422 Downloads
Bruce J. West, Damien West and Alexander Kott
RETRACTED: Multicriteria analysis of firefighter routes in buildings in the case of a fire pp. 423-432 Downloads
Hai T Nguyen, Nikolay G Topolsky, Denis V Tarakanov and Alexander V Mokshantsev
Virtual testbed for monocular visual navigation of small unmanned aircraft systems pp. 433-451 Downloads
Kyung Kim, Robert C Leishman and Scott L Nykl
Examination of a non-orthogonal multiple access scheme for next generation wireless networks pp. 453-465 Downloads
Ravi Shankar
Actor–critic-based decision-making method for the artificial intelligence commander in tactical wargames pp. 467-480 Downloads
Junfeng Zhang and Qing Xue
An agent-based modeling approach for simulating the impact of small unmanned aircraft systems on future battlefields pp. 481-500 Downloads
Carsten Christensen and John Salmon
Transitioning from testbeds to ships: an experience study in deploying the TIPPERS Internet of Things platform to the US Navy pp. 501-517 Downloads
Dave Archer, Michael A August, Georgios Bouloukakis, Christopher Davison, Mamadou H Diallo, Dhrubajyoti Ghosh, Christopher T Graves, Michael Hay, Xi He, Peeter Laud, Steve Lu, Ashwin Machanavajjhala, Sharad Mehrotra, Gerome Miklau, Alisa Pankova, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang and Roberto Yus
How AI founders on adversarial landscapes of fog and friction pp. 519-538 Downloads
Rodrick Wallace
Investigation of low-density parity check codes concatenated multi-user massive multiple-input multiple-output systems with imperfect channel state information pp. 539-550 Downloads
Lokesh Bhardwaj, Ritesh Kumar Mishra and Ravi Shankar
Modeling the effect of skidded timber bunches on forest soil compaction pp. 551-559 Downloads
Igor Grigorev, Olga Kunickaya, Albert Burgonutdinov, Olga Burmistrova, Varvara Druzyanova, Nikolay Dolmatov, Anna Voronova and Alexey Kotov

Volume 19, issue 2, 2022

The whole is greater than the sum of its parts: possibility and potential at the intersection between artificial intelligence and education & training pp. 125-126 Downloads
Joseph Cohn, Eric Vorm and Erin Baker
The applications of artificial intelligence to education and training pp. 127-128 Downloads
Michael van Lent and Dylan Schmorrow
Modeling what matters: AI and the future of defense learning pp. 129-131 Downloads
Sae Schatz and Walcutt Jj
Explainable artificial intelligence for education and training pp. 133-144 Downloads
Krzysztof Fiok, Farzad V Farahani, Waldemar Karwowski and Tareq Ahram
Can machine learning be used to forecast the future uncertainty of military teams? pp. 145-158 Downloads
Ronald H Stevens and Trysha L Galloway
Deep neural networks for the assessment of surgical skills: A systematic review pp. 159-171 Downloads
Erim Yanik, Xavier Intes, Uwe Kruger, Pingkun Yan, David Diller, Brian Van Voorst, Basiel Makled, Jack Norfleet and Suvranu De
A reinforcement learning approach to adaptive remediation in online training pp. 173-193 Downloads
Randall Spain, Jonathan Rowe, Andy Smith, Benjamin Goldberg, Robert Pokorny, Bradford Mott and James Lester
Performance gains from adaptive eXtended Reality training fueled by artificial intelligence pp. 195-218 Downloads
Kay M Stanney, JoAnn Archer, Anna Skinner, Charis Horner, Claire Hughes, Nicholas P Brawand, Eric Martin, Stacey Sanchez, Larry Moralez, Cali M Fidopiastis and Ray S Perez
Challenges and opportunities for artificial intelligence in surgery pp. 219-227 Downloads
Pamela Andreatta, Christopher S. Smith, John Christopher Graybill, Mark Bowyer and Eric Elster
The importance of identifying the dimensionality of constructs employed in simulation and training for AI pp. 229-236 Downloads
Michael D Coovert and Winston Bennett

Volume 19, issue 1, 2022

Cyber risk and vulnerability estimation pp. 3-4 Downloads
Hasan Cam
Complexity and mission computability of adaptive computing systems pp. 5-11 Downloads
Venkat R Dasari, Mee Seong Im and Billy Geerhart
Vulnerability Selection for Remediation: An Empirical Analysis pp. 13-22 Downloads
Ankit Shah, Katheryn A. Farris, Rajesh Ganesan and Sushil Jajodia
Cybersecurity threats and experimental testbed for a generator system pp. 23-35 Downloads
Aaron W Werth, SueAnne N Griffith, Jesse R Hairston and Thomas H Morris
Estimation of cyber network risk using rare event simulation pp. 37-55 Downloads
Alexander L Krall, Michael E Kuhl and Shanchieh J Yang
Machine learning in cybersecurity: a comprehensive survey pp. 57-106 Downloads
Dipankar Dasgupta, Zahid Akhtar and Sajib Sen
Agent-based target evaluation and fire doctrine: an aspect-oriented programming view pp. 107-121 Downloads
Mehmet Fatih HocaoÄŸlu
Page updated 2025-03-22