Time filter

Source Type

Chattopadhyay A.,Indian School of Mines | Kumari P.,Jaypee Institute of Information Technology | Sharma V.K.,Institute for Systems Studies and Analyses
International Journal of Geomechanics | Year: 2014

This paper discusses reflection and transmission phenomena of a three-dimensional (3D) plane quasi-P (qP) wave incident at a triclinic half-space superimposed by a fluid layer underneath another distinct triclinic half-space. The closed-form expressions are obtained for reflection and transmission coefficients of corresponding reflected and transmitted waves. These reflection and transmission coefficients are computed numerically and shown graphically for fixed values of relevant parameters. Certain problems have been discussed as special cases to the present problem. The findings of the current study can be used to analyze problems with similar geometry in different elastic mediums, such as monoclinic, transversely isotropic, and isotropic. DOI: 10.1061/(ASCE)GM.1943-5622.0000311. © 2014 American Society of Civil Engineers.

Kumari P.,Jaypee Institute of Information Technology | Sharma V.K.,Institute for Systems Studies and Analyses
Acta Mechanica | Year: 2014

This paper presents a theoretical study on propagation of torsional surface waves in a homogeneous viscoelastic isotropic layer with Voigt type viscosity over an inhomogeneous isotropic infinite half space. The non-homogeneity in half space is assumed to arise due to exponential variation in shear modulus and density. A closed-form solution has been obtained for the displacement in the layer as well as for a infinite half space. The dispersion and absorption relations for an torsional wave under the assumed geometry have been found. Numerical results are presented for propagation characteristics in terms of a number of non-dimensionalized parameters and have been produced graphically. This study investigates the effect of various parameters, namely non-homogeneity parameter, internal friction, the layer width and complex wave number on dissipation function and phase velocity of the torsional wave. Results in some special cases are also compared with existing solutions available from analytical methods, which show a close agreement. © 2013 Springer-Verlag Wien.

Vijay Rao D.,Institute for Systems Studies and Analyses | Iliadis L.,Democritus University of Thrace | Papaleonidas A.,Democritus University of Thrace | Spartalis S.,Democritus University of Thrace
International Journal of Artificial Intelligence | Year: 2012

Environmental effects of military training, live exercises and missile tests pose a major threat to the ecosystem and have a long term impact on bio-diversity. Military simulators and Virtual Warfare Analyses constitute an important and inexpensive tool that is really important for military analysts, safe alternate to live training exercises. A major impediment encountered is to replicate real-world scenarios considering effects of Weather and Terrain on military operations and assessing the damage caused due to the weapons employed for achieving a military objective in training. We propose a multi-agent based approach for the design of simulators where a neuro-fuzzy hybridization technique is applied to model the terrain and weather operations and predict its impact on the effectiveness of air tasking operations and missions. Spatial Terrain and Spatio-temporal weather data from meteorological sources were used as input to a neural network and the predicted weather conditions at a given place were classified with fuzzy logic. © 2012 by IJAI (CESER Publications).

Chandra B.,Indian Institute of Technology Delhi | Gupta M.,Institute for Systems Studies and Analyses
Expert Systems with Applications | Year: 2011

Naïve-Bayes Classifier (NBC) is widely used for classification in machine learning. It is considered as the first choice for many classification problems because of its simplicity and classification accuracy as compared to other supervised learning methods. However, for high dimensional data like gene expression data, it does not perform well due to two major limitations i.e. underflow and overfitting. In order to address the problem of underflow, the existing approach adopted is to add the logarithms of probabilities rather than multiplying probabilities and the estimate approach is used for providing solution to overfitting problem. However, in practice for gene expression data, these approaches do not perform well. In this paper, a novel approach has been proposed to overcome the limitations using a robust function for estimating probabilities in Naïve-Bayes Classifier. The proposed method not only resolves the limitation of NBC but also improves the classification accuracy for gene expression data. The method has been tested over several benchmark gene expression datasets of high dimension. Comparative results of proposed Robust Naïve-Bayes Classifier (R-NBC) and existing NBC for gene expression data have also been illustrated to highlight the effectiveness of the R-NBC. Simulation study has also been performed to depict the robustness of the R-NBC over the existing approaches. © 2010 Elsevier Ltd. All rights reserved.

Iyer S.,Institute for Systems Studies and Analyses | Rao D.V.,Institute for Systems Studies and Analyses
2015 IEEE Underwater Technology, UT 2015 | Year: 2015

Underwater acoustic sensor networks (UWSNs) are crucial for a multitude of underwater applications that require wireless operation. The deployment of sensor nodes in an optimal arrangement while overcoming the unique challenges posed by the surrounding medium and energy constraints on the sensors is a non-trivial task for real-world applications. As these characteristics are anisotropic with respect to change in temperature, salinity, depth, pH, and transmission frequency, they need to be accounted for in a dynamic simulation to preconfigure a stable physical network layout of nodes. A strategy based on computational intelligence techniques that takes into consideration these factors to achieve a viable configuration with the available resources is of prime importance. The proposed methodology uses a genetic algorithm (GA) based optimization technique for the positioning and deployment of UWSN nodes to maximize the coverage provided to protect a high-value asset (HVA) in a military application. In the case of a civil application for ocean monitoring, the proposed technique is used to identify the minimum number of nodes required and their positions for effective communication. © 2015 IEEE.

Das S.K.,Institute for Systems Studies and Analyses
IEEE Intelligent Systems | Year: 2014

The article is halfway between agent technology and the mathematical reasoning needed to model tactical decision-making tasks. These models are applied to the air defense domain for command and control (C2). The article also addresses the issues related to evaluating agents, which are designed and implemented using the agent-programming paradigm. The agents are deployed in a simulated environment for performing C2 tasks, such as electronic counter-countermeasures, threat assessment, and weapon allocation. The simulated defense system runs without any human intervention and represents a state-of-the-art model for C2 autonomy. The use of agents as autonomous decision-making entities is particularly useful in view of futuristic network-centric warfare. © 2001-2011 IEEE.

Singh S.,Institute for Systems Studies and Analyses | Rao D.V.,Institute for Systems Studies and Analyses
2013 4th National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics, NCVPRIPG 2013 | Year: 2013

With the introduction of unmanned air vehicles as force multipliers in the defense services worldwide, automatic recognition and identification of ground based targets has become an important area of research in the defense community. Due to inherent instabilities in smaller unmanned platforms, image blurredness and distortion need to be addressed for the successful recognition of the target. In this paper, an image enhancement technique that can improve images' quality acquired by an unmanned system is proposed. An image de-blurring technique based on blind de-convolution algorithm which adaptively enhances the edges of characters and wipes off blurredness effectively is proposed. A content-based image retrieval technique based on features extraction to generate an image description and a compact feature vector that represents the visual information, color, texture and shape is used with a minimum distance algorithm to effectively retrieve the plausible target images from a library of images stored in a target folder. This methodology was implemented for planning and gaming the UAV/UCAV missions in the Air Warfare Simulation System. © 2013 IEEE.

Dutta D.,Institute for Systems Studies and Analyses
Defence Science Journal | Year: 2014

Effective missile defence systems are primary requirement for naval ships to counter lethal anti-ship cruise missile attacks in today's naval warfare scenario. Anti-ship ballistic missiles would further add worry to ship missile defence. The paper discusses a probabilistic analysis of missile defence system effectiveness by considering a simple scenario of a single ship defence with multiple interceptors against a single non-maneuvering missile attack. The ship's interceptor hard kill lethality is taken as the measures of effectiveness in the analysis. The paper discusses effect of different firing policies, multi-sensor and layered defence to achieve maximum ship survivability. © 2014, DESIDOC.

Saha B.,Institute for Systems Studies and Analyses | Sharma S.,Jaipur Institute of Engineering and Technology
Defence Science Journal | Year: 2012

Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography. © 2012, DESIDOC.

Vijay Rao D.,Institute for Systems Studies and Analyses
Studies in Computational Intelligence | Year: 2015

Today’s military teams are required to operate in environments that are increasingly complex. Such settings are characterized by the presence of ill-structured problems, uncertain dynamics, shifting and ill-defined or competing goals, action/feedback loops, time constraints, high stakes, multiple players and roles, and organizational goals and norms. Warfare scenarios are real world systems that typically exhibit such characteristics and are classified as Complex Adaptive Systems. To remain effective in such demanding environments, defence teams must undergo training that targets a range of knowledge, skills and abilities. Thus oftentimes, as the complexity of the transfer domain increases, so, too, should the complexity of the training intervention. The design and development of such complex, large scale training simulator systems demands a formal architecture and development of a military simulation framework that is often based upon the needs, goals of training. In order to design and develop intelligent military training systems of this scale and fidelity to match the real world operations, and be considered as a worthwhile alternative for replacement of field exercises, appropriate Computational Intelligence (CI) paradigms are the only means of development. A common strategy for tackling this goal is incorporating CI techniques into the larger training initiatives and designing intelligent military training systems and wargames. In this chapter, we describe an architectural approach for designing composable, multi-service and joint wargames that can meet the requirements of several military establishments using product-line architectures. This architecture is realized by the design and development of common components that are reused across applications and variable components that are customizable to different training establishments’ training simulators. Some of the important CI techniques that are used to design these wargame components are explained swith suitable examples, followed by their applications to two specific cases of Joint Warfare Simulation System and an Integrated Air Defence Simulation System for air-land battles is explained. © Springer International Publishing Switzerland 2016.

Loading Institute for Systems Studies and Analyses collaborators
Loading Institute for Systems Studies and Analyses collaborators