default search action
International Journal of Intelligent Defence Support Systems, Volume 5
Volume 5, Number 1, 2012
- Lora Weiss, Erica Briscoe, Elizabeth T. Whitaker, Ethan Trewhitt, Heather Hayes, John Horgan:
A systems-level understanding of adversarial behaviour. 4-23 - Daniel Finkenstadt, Samuel George Lambrakos, Noam Bernstein, Verne L. Jacobs, Lulu Huang, Lou Massa, Andrew Shabaev:
Construction of permittivity functions for high-explosives using density functional theory. 24-43 - Kyle Usbeck, Jeffrey Cleveland, William C. Regli:
Network-centric IED detection planning. 44-74 - Matthew Grant, Mark G. Stewart:
A systems model for probabilistic risk assessment of improvised explosive device attacks. 75-93
Volume 5, Number 2, 2014
- Edwin El-Mahassni:
Sensor selection and fusion using subjective logic. 95-108 - Peter John Ryan, Peter Ross, William Oliver:
High fidelity simulation using the updated distributed interactive simulation standard. 109-126 - Arthur Vermeulen, Ralph Savelsberg:
Interception of an aerodynamically stable weaving re-entry vehicle. 127-145 - Gheorghe Tecuci, David A. Schum, Dorin Marcu, Mihai Boicu:
Computational approach and cognitive assistant for evidence-based reasoning in intelligence analysis. 146-172
Volume 5, Number 3, 2015
- Lester Ingber:
Biological impact on military intelligence: application or metaphor? 173-185 - T. Andrew Au:
Evaluating digital targeting in a joint fires experiment. 186-204 - Varun Kalyan, Subhashini Ganapathy, S. Narayanan, Raymond R. Hill:
Integrated vehicle routing: a case study of unmanned aerial vehicle decision making. 205-225 - Bhabani Shankar Prasad Mishra, Eui-Whan Kim, Guck-Cheol Bang, Satchidananda Dehuri, Sung-Bae Cho:
Weapon target assignment problem: multi-objective formulation, optimisation using MOPSO and TOPSIS. 226-252
Volume 5, Number 4, 2018
- Graeme Anderson, David Reed, Simon Di Nucci, Anthony Kwong, Janet Wilson:
Weapons effects modelling for safety applications. 253-276 - Niloofar Tavakolian, Azadeh Nazemi, Zohreh Azimifar, Iain Murray:
Face recognition under occlusion for user authentication and invigilation in remotely distributed online assessments. 277-297 - G. R. Sinha, K. Srujan Raju, Raj Kumar Patra, Daw Win Aye, Daw Thuzar Khin:
Research studies on human cognitive ability. 298-304 - Jyoti Prakash Mishra, Sambit Kumar Mishra, Anil Kumar Mishra:
Opportunities with visualisation linked with virtualised data: a case study. 305-313 - François-Alex Bourque, Raffaele Grasso, Raúl Vicen Bueno, Giampaolo Cimino, Paolo Braca, John Osler:
A decision support web service for allocating assets in counter-piracy operations given periodic environmental forecast updates. 314-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.