Forthcoming articles

International Journal of Intelligent Defence Support Systems

International Journal of Intelligent Defence Support Systems (IJIDSS)

These articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Register for our alerting service, which notifies you by email when new issues are published online.

Open AccessArticles marked with this Open Access icon are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Intelligent Defence Support Systems (6 papers in press)

Regular Issues

  • Program Viewer A Defence Portfolio Capability Management System   Order a copy of this article
    by Edward Lo, Nicholas Tay, Gary Bulluss 
    Abstract: Information and communications technology (ICT) advancements are modernising Defence, presenting opportunities for improved efficiency and effectiveness in areas including warfighting, logistics and corporate support. With over A$10 billion expended annually by the Australian Defence Organisation (ADO) on major and minor capital acquisitions, small innovations in Defence capability management can reap huge financial benefits. The recent First Principles Review (FPR) has clearly highlighted further need for improvements in Defence capability management. Moreover, improved data management and decision support tools are essential to achieving the efficiencies and realising the opportunities presented. Program Viewer is one such tool that leverages and aggregates actual stakeholder data into a Department of Defense Architecture Framework v2 (DODAF2) / Unified Profile for DoDAF and MODAF (UPDM) compliant data repository to support force posture planning and capability acquisition prioritisation. Key contributions from this paper include (1) fusing disparate and unexploited Defence enterprise data for analysis, (2) producing a range of tailorable and informative views of cost, schedule and capability from actual Defence data, and (3) enabling impact analysis on what-if scenarios. Incorporating numerous stakeholder requested features, Program Viewer offers a new approach to aggregating and analysing Defence capabilities, and has been used to support the current and previous Force Structure Reviews (FSRs). This papers target audience includes ADO and international military systems architects.
    Keywords: Program Viewer; data analytics; data visualisation; dependency analysis; whole-of-portfolio capability management; DODAF2; UPDM; Capability Acquisition and Sustainment Group; Force Structure Review.

  • Weapons effects modelling for safety applications   Order a copy of this article
    by Graeme Anderson, David Reed, Simon Di Nucci, Anthony Kwong, Janet Wilson 
    Abstract: Weapon effect modelling has many applications, but in this paper we focus on how advanced computer models can be used to assess the effectiveness of blast shielding structures and materials, for example to improve the safety of weapons production. Safety laws are changing from prescriptive, solution-based regulations to a risk-management-based approach, so being able to estimate the performance of protective measures allows us to produce directly-relevant safety evidence. Such an approach can be used to show that risks are reduced so far as is reasonably practicable (SFAIRP) in order to demonstrate compliance with the WHS Act, 2011. This paper first describes how a variety of computer-based models for the prediction of the development and propagation of blast pressures can be used to provide a detailed assessment of the risks associated with explosions in complex environments, with particular reference to injury assessment - something that is sometimes impractical with simpler techniques. We then show how some of these techniques have been used in two real-world examples to successfully support safety case development. Finally, we extrapolate from the examples, showing how these techniques could be applied to assess weapons safety in different environments, or for risk assessment in defensive or offensive scenarios.
    Keywords: blast; fragment; structural response; injury; safety applications; risk-based management; so far as is reasonably practicable; SFAIRP.
    DOI: 10.1504/IJIDSS.2018.10021307
     
  • Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments   Order a copy of this article
    by Niloofar Tavakolian, Azadeh Nazemi, Zohreh Azimifar, Iain Murray 
    Abstract: This study focuses on face recognition under uncontrolled conditions as a second biometric factor in order to multi factor authenticate(MFA) in online assessment. Obtained results of this project indicate reasonable accuracy to address the issue of occlusion using AR, MUCT and UMB Datasets, utilizing deep learning and the previous approach based on feature extraction (shallow method). The shallow method accuracy improvement includes HOG by 4%, in comparison to Gabor Sparse Representation based Classification (GSRC) method and by 9% using Gabor. Shallow method can handle occlusion issue in the lack of occlusion dictionaries and sufficient training sample. Modified ResNet as a deep learning method is used to be able to improve accuracy comparing the best member of the SRC family, Structured Sparse Representation based Classification(SSRC) by 3% on average.
    Keywords: face recognition; machine learning; occlusion; illumination multi-factor authentication; remote assessment; identification; verification; expression; face detection; deep learning.
    DOI: 10.1504/IJIDSS.2018.10021346
     
  • Research studies on human cognitive ability   Order a copy of this article
    by G.R. Sinha, K. Srujan Raju, Raj Kumar Patra, Daw Win Aye, Daw Thuzar Khin 
    Abstract: Research on cognitive ability of human brain can be seen now in literature that substantiates research scope and future directions in the field of human brain and its cognitive ability. This paper studies on research articles and work that highlighted various studies; surveys; and comparison on human brain research and its impact on cognitive ability for various artificial intelligence (AI) based applications. The research studies result several important questions on machine learning and impact of cognitive ability.
    Keywords: cognitive ability; CA; human brain; machine learning; ML; artificial intelligence; AI; deep learning; DL.
    DOI: 10.1504/IJIDSS.2018.10021347
     
  • Opportunities with visualisation linked with virtualised data: a case study   Order a copy of this article
    by Mishra Jyoti Prakash, Mishra Sambit Kumar, Mishra Anil Kumar 
    Abstract: The concept of virtualisation along with the physical objects and IP address for internet connectivity may be a big challenge in the present society. It may refer to the numerous physical devices around the world connected with internet for collecting and sharing data. Specifically, the technology associated with internet of things (IoT) may be viewed as the network of physical objects embedded along with connectivity to share and exchange data linked among the physical and cyber space. Sometimes also it may create opportunities for direct integration between the physical world and computer- based systems and leads to economic benefits. It may be thought of connected devices to transfer data among one another in order to optimise the performance automatically and quite a major challenge. It has been proposed to analyse the opportunities and performance associated with virtualised data to simplify and strengthen human activities as well as expertise.
    Keywords: big data; internet of things; IoT; virtualisation; sensor; actuator; data centre; cluster.
    DOI: 10.1504/IJIDSS.2018.10021348
     
  • A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates   Order a copy of this article
    by François-Alex Bourque, Raffaele Grasso, Raúl Vicen-Bueno, Giampaolo Cimino, Paolo Braca, John Osler 
    Abstract: The rise of piracy in the Gulf of Aden and off the coast of Somalia prompted several nations to direct their navies to conduct counter-piracy operations in that region of the world. A major challenge with such operations is the sheer size of the area to patrol. One way to address this problem is by noting that pirates are more likely to operate under favourable environmental conditions and to focus patrols in areas where such conditions prevail by generating maps of piracy risk based on environmental forecast. This contribution presents a system that invokes a multi-objective optimiser with each new forecast to help the decision makers plan operations over the course of days, weeks or months. Implemented using web-based technologies to mitigate for potential resource limitations at the client site, the resulting decision support system is demonstrated for a counter-piracy operation conducted off the coast of Somalia.
    Keywords: decision support system; asset allocation; counter-piracy; environmental forecast; METOC; optimisation; web service.
    DOI: 10.1504/IJIDSS.2018.10021354