Entity

Time filter

Source Type


Chattopadhyay A.,Indian School of Mines | Kumari P.,Jaypee Institute of Information Technology | Sharma V.K.,Institute for Systems Studies and Analyses
International Journal of Geomechanics | Year: 2014

This paper discusses reflection and transmission phenomena of a three-dimensional (3D) plane quasi-P (qP) wave incident at a triclinic half-space superimposed by a fluid layer underneath another distinct triclinic half-space. The closed-form expressions are obtained for reflection and transmission coefficients of corresponding reflected and transmitted waves. These reflection and transmission coefficients are computed numerically and shown graphically for fixed values of relevant parameters. Certain problems have been discussed as special cases to the present problem. The findings of the current study can be used to analyze problems with similar geometry in different elastic mediums, such as monoclinic, transversely isotropic, and isotropic. DOI: 10.1061/(ASCE)GM.1943-5622.0000311. © 2014 American Society of Civil Engineers. Source


Das S.K.,Institute for Systems Studies and Analyses
IEEE Intelligent Systems | Year: 2014

The article is halfway between agent technology and the mathematical reasoning needed to model tactical decision-making tasks. These models are applied to the air defense domain for command and control (C2). The article also addresses the issues related to evaluating agents, which are designed and implemented using the agent-programming paradigm. The agents are deployed in a simulated environment for performing C2 tasks, such as electronic counter-countermeasures, threat assessment, and weapon allocation. The simulated defense system runs without any human intervention and represents a state-of-the-art model for C2 autonomy. The use of agents as autonomous decision-making entities is particularly useful in view of futuristic network-centric warfare. © 2001-2011 IEEE. Source


Saha B.,Institute for Systems Studies and Analyses | Sharma S.,Jaipur Institute of Engineering and Technology
Defence Science Journal | Year: 2012

Steganography is an art that involves communication of secret data in an appropriate carrier, e.g., image, audio, video or TCP/IP header file. Steganography's goal is to hide the very existence of embedded data so as not to arouse an eavesdropper's suspicion. For hiding secret data in digital images, large varieties of steganographic techniques are available, some are more complex than others, and all of them have their respective pros and cons. Steganography has various useful applications and the technique employed depends on the requirements of the application to be designed for. For instance. applications may require absolute invisibility of the secret data, larger secret data to be hidden or high degree of robustness of the carrier. This paper intends to give thorough understanding and evolution of different existing digital image steganography techniques of data hiding in spatial, transform and compression domains. It covers and integrates recent research work without going in to much detail of steganalysis, which is the art and science of defeating steganography. © 2012, DESIDOC. Source


Vijay Rao D.,Institute for Systems Studies and Analyses | Iliadis L.,Democritus University of Thrace | Papaleonidas A.,Democritus University of Thrace | Spartalis S.,Democritus University of Thrace
International Journal of Artificial Intelligence | Year: 2012

Environmental effects of military training, live exercises and missile tests pose a major threat to the ecosystem and have a long term impact on bio-diversity. Military simulators and Virtual Warfare Analyses constitute an important and inexpensive tool that is really important for military analysts, safe alternate to live training exercises. A major impediment encountered is to replicate real-world scenarios considering effects of Weather and Terrain on military operations and assessing the damage caused due to the weapons employed for achieving a military objective in training. We propose a multi-agent based approach for the design of simulators where a neuro-fuzzy hybridization technique is applied to model the terrain and weather operations and predict its impact on the effectiveness of air tasking operations and missions. Spatial Terrain and Spatio-temporal weather data from meteorological sources were used as input to a neural network and the predicted weather conditions at a given place were classified with fuzzy logic. © 2012 by IJAI (CESER Publications). Source


Vijay Rao D.,Institute for Systems Studies and Analyses
Studies in Computational Intelligence | Year: 2015

Today’s military teams are required to operate in environments that are increasingly complex. Such settings are characterized by the presence of ill-structured problems, uncertain dynamics, shifting and ill-defined or competing goals, action/feedback loops, time constraints, high stakes, multiple players and roles, and organizational goals and norms. Warfare scenarios are real world systems that typically exhibit such characteristics and are classified as Complex Adaptive Systems. To remain effective in such demanding environments, defence teams must undergo training that targets a range of knowledge, skills and abilities. Thus oftentimes, as the complexity of the transfer domain increases, so, too, should the complexity of the training intervention. The design and development of such complex, large scale training simulator systems demands a formal architecture and development of a military simulation framework that is often based upon the needs, goals of training. In order to design and develop intelligent military training systems of this scale and fidelity to match the real world operations, and be considered as a worthwhile alternative for replacement of field exercises, appropriate Computational Intelligence (CI) paradigms are the only means of development. A common strategy for tackling this goal is incorporating CI techniques into the larger training initiatives and designing intelligent military training systems and wargames. In this chapter, we describe an architectural approach for designing composable, multi-service and joint wargames that can meet the requirements of several military establishments using product-line architectures. This architecture is realized by the design and development of common components that are reused across applications and variable components that are customizable to different training establishments’ training simulators. Some of the important CI techniques that are used to design these wargame components are explained swith suitable examples, followed by their applications to two specific cases of Joint Warfare Simulation System and an Integrated Air Defence Simulation System for air-land battles is explained. © Springer International Publishing Switzerland 2016. Source

Discover hidden collaborations