4th ACDT Cosponsors · 6 Program Committee Dr. Kyungho Park, USA Prof. Hong Hao, Australia Prof....

70

Transcript of 4th ACDT Cosponsors · 6 Program Committee Dr. Kyungho Park, USA Prof. Hong Hao, Australia Prof....

1

4th ACDT Cosponsors

防衛装備庁

ATLA

Acquisition, Technology & Logistics Agency

2

Exhibition List

Booth No. Company 1 Axelspace Corporation 2 Explosion Research Institute Inc. 3 Capricorn Defense Systems Limited 4 FLE Co. Ltd. 5 Goiku Battery Co., Ltd. 6 Marubeni Itochu Sumisho Techno Steel Inc. 7 Kozo Keikaku Engineering Inc. 10 Mitsubishi Electric Corporation 11 Taiyo Kogyo Corporation 12 THK Co., Ltd. 13 T-Net Co. Ltd. 14 TOKYO GAS Co. Ltd. 15 HYTEC INTER Co., Ltd.

16, 17 DILON CO., LTD., BANGKOK SANYO SPRING CO., LTD.,

OHMI PRESS WORKS AND FORGING CO., LTD. Ohmura Manufacturing Co., Ltd.

Layout Plan (Room Shirakaba, 2F)

900cm

音響

出入口

3,000cm

180cm

60cm

高さ70㎝白クロス付

テーブルサイズ

200m 200m 200m 200m 200m 200m

200m200m

200m 200m

200m 200m

① ② ③ ④ ⑤ ⑥ ⑦

⑩⑪⑫⑬⑭⑮

平成29年11月29日(水)9:00~16:00

東館2階 白樺の間 天井3m 縦9m×横30m

3

Welcome Message from Honorary Chair

It is my privilege to welcome you to the Fourth Asian Conference on Defense Technology (ACDT). This event is held following the success of the past ACDT. The past conferences were organized by Defense Technology Association (DEFTA) of Thailand and held in Thailand. The ACDT aims to be an international forum for interested persons from academic, military, and industrial sectors to present their research works and exchange information and knowledge, and discuss on a wide range of basic research topics related defense, national security, and disaster relief technology. More challenging is the pace of technological changes. Many of us are familiar with Moore’s law or the law of accelerating returns. We have never seen technology moves faster than it is moving right now, and that is because of the supercomputer in 1990 in our pockets as Smartphones. Recognized need is the key to technological innovation, but to recognize need we have to have detailed knowledge of specific domains so that the critical problems can be properly addressed. Security issues are not amenable to single discipline investigation. They often require many types of expertise, and defense technology favors of interdisciplinary research. In this sense, the academic conference on defense technology will provide opportunity to exchange our idea and get knowledge on cutting-edge and game-changing technologies in near future. After the successful events, ACDT has been received much attention from many Asian countries. I would like to thank Defense Technology Institute (DTI), Thailand for the initiation of the very important event. I strongly hope that many countries join in the ACDT and they take turn to organize this conference in their country. It will strengthen the community and network and enhance more research collaboration. Finally, I would like to express my gratitude to all participants from many countries (Australia, Bangladesh, Canada, China, Egypt, Korea, Indonesia, Japan, Malaysia, Singapore, Taiwan, Thailand, USA, Vietnam), distinguished plenary speakers, invited speakers, authors, and the showcases from the industry. I would like specially to thank Acquisition, Technology & Logistics Agency (ATLA), Japan Ministry of Defense, for the financial support. I wish you all fruitful discussion and knowledge sharing in the 4th ACDT. Honorary chair of the 4-th ACDT Akira Namatame, Ph.D Professor Emeritus of National Defense Academy, Japan

4

Welcome Message from Program Chairs

It is our great honor to welcome you to the Fourth Asian Conference on Defense Technology (ACDT). The program spans over three days and consists of plenary speaker sessions, parallel sessions, poster sessions and an exhibition. The 4-th ACDT received 96 paper submissions. 21 papers have accepted as invited papers, 30 papers have been accepted as a regular paper and 15 papers have been accepted as a short paper. Among them 40 papers will be published from IEEE Xplore (acceptance rate: 40%). The reviewers consist 30 experts from academic and research institutions. The review process was a blind review where the authors and their affiliations were hidden to the reviewers. At least two independent reviewers were assigned to each paper. The success of the 4-th ACDT would not be possible without contributions many people who are involved. We wish to thanks all authors for ensuring a high quality of the 4-th ACDT. We deeply appreciate to all members of the program committee and reviewers for their very careful review and voluntary service. The 4-th ACDT Program Chairs Masao Kubo, Ph.D Associate Professor, National Defense Academy, Japan Jiradett Kerdsri, Ph. D Defense Technology Institute (DTI), Thailand

5

Organizing Committees The Fourth Asian Conference on Derence Technology is organized by the following institutes and committee. Organizers National Defense Academy, Japan (NDA) Acquisition, Technology & Logistics Agency, Japan (ATLA) Defence Technology Association, Thailand (DEFTA) Defence Technology Institute, Thailand (DTI) Technical Sponsor The Institute of Electrical and Electronics Engineerins, Inc. (IEEE) Honorary Chairs Akira Namatame, Prof. Emeritus, National Defense Academy (NDA), Japan Tomonori Ohno, Prof. Emeritus, NDA, Japan General Chair Junya Yamakawa, NDA, Japan Local Organizing Chair Masuhiro Beppu, NDA, Japan Program Chairs Masao Kubo, NDA, Japan Dr. Jiradett Kerdsri, DTI, Thailand Publicity Chairs Hiroshi Sato, NDA, Japan Dr. Pawat Chusilp, DTI, Thailand Financial Chairs Yutaka Sakuma, NDA, Japan Masuhiro Beppu, NDA, Japan Special Session and Exhibition Chairs Masanori Harada, NDA, Japan Teppei Tsujita, NDA, Japan Saori Iwanaga, Japan Coast Guard Academy, Japan Takahiro Majima, National Maritime Research Institute, Japan Asao Kobayashi, Aeromedical Laboratory, JASDF, Japan

6

Program Committee Dr. Kyungho Park, USA Prof. Hong Hao, Australia Prof. Sung-Bae Cho, Korea Dr. Komain Pibulyarojana, Thailand Dr. Jiradett Kerdsri, Thailand Dr. Pawat Chusilp, Thailand Prof. Thanaruk Theeramunkong, Thailand Dr. Thepchai Supnithi, Thailand Dr. Ganchai Tanapornraweekit, Thailand Dr. Thanan Yomchinda, Thailand Dr. Augie Widyotriatmo, Indonesia Dr. Arwin D. W. Sumari, Indonesia Prof. Lam Thu BUI, Vietnam Dr. NGUYEN Thi Thuy, Vietnam Dr. Thuy Nguyen, Vietnam Dr. Halimahtun Mohd Khalid, Malaysia Dr. Tan Peng Yam, Singapore Dr. Cheong, Singapore Dr. Seongil Kim, Korea Dr. George Leu, Australia Prof. Hussein Abbass, Australia Prof. Shu Cheng, Taiwan Prof. Mamoru Mimura, NDA, Japan Guest Reviewers Prof. Takashi Matsubara, NDA, Japan Prof. Munetoshi Iwakiri, NDA, Japan

7

Plenary Talk Human Performance Prediction: Basic Mechanisms and Exploratory Applications Dr. Kevin Gluck US Air Force Research Laboratory, USA Abstract It is standard practice worldwide to train based on one-time task checklists and fixed calendar-based refresher training intervals. These antiquated approaches make invalid assumptions about the dynamics of human learning and memory, ignoring most of what we have learned on those topics in the last century. These are risky, costly, and frustrating practices that should be discarded in favor of new methods informed by state of the art cognitive science and technology. At the U.S. Air Force Research Laboratory we have been pushing the boundaries of cognitive science and technology to improve our ability to make evidence-based predictions of human performance. This resulted in a new patented technology called the Predictive Performance Optimizer (PPO). A key application of this technology is in the scheduling of learning events, for instance to acquire initial proficiency, to maximize retention, or to enhance relearning and maintain proficiency at a minimum required level. In this presentation I will describe key phenomena from the relevant empirical literature, criteria for the application of models of learning and memory, and initial results from a field study evaluating the use of PPO in training cardiopulmonary resuscitation (CPR), basic lifesaving skills relevant to military operations and more generally to medical and civilian communities worldwide.

8

Plenary Talk Discussion and improvement of concrete constitutive models for high-rate response predictions of RC structures Prof. Hong Hao Curtin University, Australia Abstract With the development of computer hardware and computational mechanics techniques, numerical predictions of responses of reinforced concrete structures subjected to blast and impact loads have been becoming more and more popular for structural response analysis. The accuracy of the numerical simulations depends on the accurate representations of the structural material properties. A few concrete material models are available in literature, and are commonly used in simulation of structural responses. These models however differ from each other because they were developed by different researchers with respective available testing data. This paper compares these widely used concrete constitutive models. Discussions on their similarity, differences, and suitability in predicting the structural responses to blast and impact loadings are given. All these models assume concrete material is homogeneous and isotropic. To examine the influences of these assumptions, a series of uniaxial and triaxial tests have been performed. Experimental results indicate that concrete suffers obvious damage if the applied hydrostatic pressure is higher than the uniaxial compressive strength of concrete. This is a damage state overlooked by all the major concrete constitutive models. A mesoscale concrete model with the consideration of randomly distributed aggregates and pores is developed to explore concrete damage mechanism under hydrostatic pressure. The simulation results show that the stresses inside the concrete specimen are not evenly distributed under hydrostatic pressure, and existence of the deviatoric stresses is the primary cause of the concrete damage under high hydrostatic pressure. Discussions on the possible improvement on the current concrete material constitutive models by taking into consideration the concrete material behaviours under complex stress states are provided.

9

Plenary Talk Exploiting Machine Learning for Malicious Attack Detection in Cyber Security Prof. Sung-Bae Cho Yonsei University, Korea Abstract Cybersecurity is defined by the technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. One of the most problematic elements of cybersecurity is the quickly and constantly evolving nature of security risks in many organizations. They can share or release their data to third parties or even through the Internet; this can attract attention from malicious entities inside and outside the organization and pose serious threats on privacy and confidentiality. Access control mechanisms are not enough to mitigate and defend from malicious attacks, and an intrusion detection system has been an active area of research in fields such as host and network systems, such setups have been found to be inadequate, ineffective, and unsuitable in detecting attacks. There is also the danger posed by insider threats. A legitimate user with malicious intent is a more serious threat than a user with limited privileges. For this attack detection task, we exploit machine learning techniques to detect the malicious attacks. Machine learning methods are not only suitable in modeling normal behaviors, but also effectively minimize false-positive and false-negative rates. We present three methods such as random forest, learning classifier system, and evolutionary reinforcement learning that can accurately detect the attacks compared to other state-of-the-art techniques in machine learning, even on very skewed data. We will show the experimental results on the role intrusions against which the databases are operated with a role-based access control model.

10

Plenary Talk How SME company can be involved in the game changing technology of research and development in Defense Technology Dr. Komain Pibulyarojana T-Net, Thailand Abstract In the present world, there are many terrorist risks, unexpect war, cyber attack which can identify or unidentified. The rapid change of technology, the speed of information disseminated on social network make us need to speed up of research and development in order to keep up with incident response and risk. One incident in one country can be happened as the same incident in every counties by the usage of social media. Because of the game changing technology, cyber security, national security and defense technology are now concerned as the same issue. The start-up company, spin-off company and SME will have chance to solve or response for threats. The author had experience in information security more than 15 years. He worked as a leader of Information Security researcher in government agency. He founded ThaiCERT (Thai Computer Emergency Response team) and was the founded member of APCERT. He set up spin-off company(T-NET Co.,Ltd.) from research unit to have services in IT security and Defense Technology. He will share how SME can have fast services and set up the linkage between the Cyber Threat, National Security Threat and Fast research for in time product. The research and development’s roadmap was started with mobile telephone Jammer, remote control’s frequency Jammer step to Drone Jammer which prepare for the drones are in widespread use, more and more both in beneficial and malicious purposes. Violation of liberty and rights, espionage, spying, terrorism, etc are a few examples of malicious uses. The example research of Drone Jammer will help protect community from abusing drones and show how SME have chance to be involved in the game changing technology.

11

Plenary Talk Guidance Law for Multiple Aircraft Based on Optimal Control Theory Prof. Seiya Ueno Yokohama National University, Japan Abstract Necessity of guidance law for multiple aircraft has been increasing in the recent years. For example, guidance law of multiple missiles attacking one target simultaneously increases the success rate of mission, or air traffic management of multiple aircraft approaching one runway decreases the delay of schedule with high safety. Optimal control theory can be applied to such type of problems and many papers have been written by many researchers. The results of papers, however, have not applied to the actual systems, because the computational load for multiple aircraft is very high and the stability on convergence speed of iterative calculation is poor due to the nonlinearity of problems. Such disadvantages are hard wall for application of optimal control theory to the real guidance systems. The author has focused on the application of optimal control theory for many years. The results of recent researches on development of real-time optimization techniques are presented in this paper. The first example is utilization of a universal chart, which is calculated prior the mission and provides the optimal trajectories for arbitrary initial condition without iterative calculation. The examples of simultaneous attack by multiple missiles are shown. The next example treats the minimum time problem for reconfiguration of formation flight by multiple aircraft. The calculation technique in this example is based on the feature that the necessary conditions of minimum tine problem with specified position is the same as the necessary conditions of maximum or minimum range problem with specified terminal time. Thus the reachable area of aircraft can be calculated prior the flight, and the terminal time is searched during flight. The searching procedure can be executed by each aircraft, thus the total calculation time is short. The examples of reconfiguration of multiple aircraft are shown.

12

Plenary Talk Scope of Blast Injuries Dr. Michael J. Leggieri, Jr. United States Department of Defense, USA Abstract Explosive weapons remain the weapons of choice by our adversaries. The injuries these weapons cause span a broad spectrum of blast injury types based on injury mechanisms from primary through quinary, and severities from mild to severe. Blast injuries are typically complex, with more than one type of injury occurring at the same time. Injury data from recent conflicts confirms the diversity, complexity, and severity of blast injuries. Medical research programs which focus on blast injury prevention and treatment are equally diverse, cutting across research organizations and scientific disciplines. In 2006, the US Congress addressed the need for a more coordinated approach to addressing complex blast injury issues by directing the establishment of a DoD Executive Agent (EA) who would be responsible for developing a coordinated and responsive DoD blast injury research program capable of delivering timely and effective blast injury prevention, mitigation, and treatment strategies. This presentation will describe the EA’s blast injury research coordination efforts within the context of the types and complexity of blast injuries observed in recent conflicts. It will highlight the challenges in coordinating efforts across research organizations and diverse medical and non-medical communities. It will also describe the EA’s key research coordination initiatives which are focused on advancing our understanding of blast injuries, and accelerating the development and fielding of effective blast injury prevention and treatment strategies to better protect Service Members from blast injuries, and care for those who are injured.

13

Venue HOTEL GRAND HILL ICHIGAYA 4-1 Ichigaya Honmuracho, Shinjuku-Ku, Tokyo, Japan, 162-0845 Tel: +81-3-3268-0111, Fax: +81-3-3235-4585 From Haneda Airport (HND) By train: 50 minutes by monorail and train to Ichigaya station, Haneda Airport (Monorail) - Hamamatsucho (JR Keihin Tohoku Line) - Akihabara (JR Sobu Line) - Ichigaya By taxi: 40 minutes, Metropolitan Expressway (Route No.4 Shinjuku) - Gaien Exit - Hotel From Narita International Airport (NRT) By train: 90 minutes by Keisei Skyliner and train to Ichigaya station, Narita International Airport (Keisei Skyliner) - Nippori (JR Yamanote Line) - Akihabara (JR Sobu Line) - Ichigaya - Hotel By taxi: 70 minutes, Higashi Kanto Expressway - Metropolitan Expressway (Route No.4 Shinjuku) - Gaien Exit - Hotel

14

Local Information From “Tokyo Sightseeing Map” https://www.jreast.co.jp/e/downloads/pdf/tokyo_map_e.pdf

15

Floor Plan …Conference, Poster … Exhibition, Reception, Banquet

East Building

16

Agenda of 4th ACDT

Date, Time Room

Ruri West (3F)

Room Sango (3F)

Room Hisui (3F)

Room Shinju (3F)

29, Nov. (Wed.)

09:00-12:00 (180 min.)

09:00-09:20 Opening Dr. Hokazono 09:20-12:00 Plenary Talks (1) Dr. Gluck (2) Prof. Ueno (3) Prof. Hao

12:00-13:00 Lunch: Room Ruri-Center

13:00-14:50 (110 min.)

Session 1 Coast Guard Technology (R: 10, 18, 22, 53, 54) Total: 100 min.

Session 2 High-Performance Materials (L: 5, 47 S: 7, 40, 43, 70) Total: 110 min.

14:50-15:20 Break

15:20-17:40 (140 min.)

Session 3 Autonomous Systems, Robotics and Mechanical Engineering (L: 8 R: 30, 55 S: 38, 76, 77) Total: 110 min.

Session 4 Human Engineering and Technology for Safe Guard (L: 52, 58 R: 28, 57, 78 S: 50, 62) Total: 140 min.

18:00-19:30 Welcome PartyRoom Shirakaba

17

30, Nov. (Thu.)

09:00-12:00 (180 min.)

09:00-11:20 Plenary Talks (1) Prof. Cho (2) Dr. Komain (3) Dr. Leggieri 11:20-12:00 ATLA Presentation (1) Dr. Kaneko (2) Dr. Mine

12:00-13:00 Lunch

13:00-14:55 (115 min.)

Session 5 Sensor Network (L: 74 R: 32 S: 6, 60, 66, 75) Total: 105 min.

Session 6 Artificial Intelligence and Cognitive Science I (L: 25, 79, 82 R: 4, 16) Total: 115 min.

14:55-15:20 (35 min.) Poster

Session (12, 29, 36, 42, 44, 46, 49, 56, 63, 64, 69, 71, 72, 73)

15:20-17:40 (140 min.)

Session 7 Operations Research (R: 3, 19, 37, 51 S: 11, 15, 41, 68) Total: 140 min.

Session 8 Artificial Intelligence and Cognitive Science II (L: 83, 88 R: 59, 65, 84, 85) Total: 130 min.

18:00-20:00 Banquet Room Shirakaba

18

1, Dec. (Fri.)

09:00-12:30 (210 min.)

Session 9 Human Performance and Aviation Safety (L: 9, 21, 24, 39, 45, 48 R: 14, 20, 27) Total: 210 min.

Session 10 Computer Science and Applications (L: 26, 67, 80, 89 S: 34, 35, 61) Total: 145 min.

Session 11 Blast & Injury (R: 90, 91, 92, 93, 94, 95, 96) Total: 140 min

* L (Long) = 25 min., R (Regular) = 20 min., S (Short) = 15 min. * Numbers after L, R, S are Paper IDs. * Exhibition: 29, Nov. (Wed.) 09:00-16:00, Room Shirakaba (2F)

19

Conference Program 29th, November (Wednesday) 09:00-09:20 Opening (Room Ruri West) Chair: Prof. Junya Yamakawa, NDA, Japan Welcome speech Dr. Hirokazu Hokazono, Deputy Commissioner and Chief Defense Scientist, Acquisition, Technology & Logistics Agency, Ministry of Defense, Japan 09:00-16:00 Exhibition (Room Shirakaba) 09:20-12:00 Plenary Talks (Room Ruri) 1. Dr. Kevin Gluck (US Air Force Research Laboratory, USA); Human Performance Prediction: Basic Mechanisms and Exploratory Applications (Chair: Prof. Namatame) 2. Prof. Seiya Ueno (Yokohama National University, Japan); Guidance Law for Multiple Aircraft Based on Optimal Control Theory (Chair: Prof. Harada) 3. Prof. Hong Hao (Curtin University, Australia), Discussion and improvement of concrete constitutive models for high-rate response predictions of RC structures (Chair: Prof. Beppu) 12:00-13:00 Lunch (Room Ruri-Center) 13:00-14:50 Session 1: Coast Guard Technology (Room Ruri-West) Chair: Prof. Majima and Prof. Iwanaga Regular: S1-1, #10, Takahiro Majima and Taro Aratani; Evaluation of Logistics System with Small Ships under Disaster Situations S1-2, #18, Shigenori Kinjo and Shuichi Ohno; A Single User MIMO System using Tomlinson-Harashima Precoding with Adaptive Bit Allocation S1-3, #22, Masaaki Yamanaka, Daiki Hashimoto, Yasuhiro Sato and Yoshinori Matsuura; A Ray-Tracing Analysis of the Radio Propagation on the Maritime Radar Systems S1-4, #53, Rina Miyake, Hiroko Itoh, Chihiro Nishizaki and Junji Fukuto; Safety Assessment for Establishing Ships’ Routeing - Recommended Route Off the Western Coast of Izu O Shima Island - S1-5, #54, Daisuke Watanabe and Richard Church; Optimal Location Model for Counter-Piracy Surveillance System

20

13:00-14:50 Session 2: High-Performance Chemicals and Materials (Room Sango) Chair: Prof. Tanapornraweekit and Prof. Beppu Long: S2-1, #5, Thimira M. Abeysinghe, Ganchai Tanapornraweekit, Somnuk Tangtermsirikul, Withit Pansuk and Nuthaporn Nuttayasakul; Performance of Aramid Fiber Reinforced Concrete Panels under Blast Loads S2-2, #47, Weerawut Charubhun and Pawat Chusilp; Application of Thermal-Solid Interface CFD on Thermal Protection Study for Rocket Warhead Short: S2-3, #7, Phimraphas Ngamsantivongsa, Suriyawate Boonthalarath, Bongkochtorn Wong-ek, Suchuchchai Nuanklai and Thanachai Kanasittiboon; Ablative properties of different phenolic resin composites: A comparative study S2-4, #40, Chidchanok Chaichuenchob Nattawat Winya and Suwicha Chankapoe; The Investigation of Phenolic Resin Thermal Stability under High Temperature S2-5, #43, Nattawat Winya and Nanthiya Hansupalak; Effect of Silica on Mechanical and Ablation Properties of HNBR/NR Rubber blend S2-6, #70, Jirasak Jewmaidang and Panatat Sinhaseni; The effective process alignment for multinational defence project in Government Budgeting framework 14:50-15:20 Break 15:20-17:40 Session 3: Autonomous Systems, Robotics and Mechanical Engineering (Room Ruri-West) Chair: Prof. Harada and Prof. Tsujita Long: S3-1, #8, Azka Burohman, Endra Joelianto and Augie Widyotriatmo; On the Guaranteeing Safety of Multi Wheeled-Robots Flocking in Collision-Risky Area Regular: S3-2, #30, Soichiro Watanabe and Masanori Harada; Clock-Based Real-Time Optimal Control of a Skid-Steered Vehicle S3-3, #55, Santana Burintramart and Akkarat Boonpoonga; Underground radar target classification based on Matrix Pencil Method Short: S3-4, #38, Matthew Depetro, Byungjun You and Matthew Ragozzino; A New Approach to Anti-Submarine Warfare Using an Unmanned Surface Vehicle (SHARC) S3-5, #76, Akihiko Shimura and Yoshihiro Inoue; Development and Tests of Type 10 Tank -From viewpoint of Slalom Shooting- S3-6, #77, Hidetaka Taira and Akihiko Shimura; Development of Tracked Hybrid Electric Demonstorator (T-HED)

21

15:20-17:40 Session 4: Human Engineering and Technology for Safe Guard (Room Sango) Chair: Prof. Kerdsri and Prof. Chuslip Long: S4-1, #52, Halimahtun Mohd Khalid, Bin Sheng Voong, Liew Wei Shiung, Wei Hong Chin and Martin Helander; Trust of Assistive Humanoid Robots in Service Tasks; A Comparison between Scenarios S4-2, #58, Arwin Datumaya Wahyudi Sumari and Adang Suwandi Ahmad; The Application of Cognitive Artificial Intelligence within C4ISR Framework for National Resilience Regular: S4-3, #28, Santita Rattanaphan; Effect of Fiberglass on the Molten Salt Electrolyte Characteristics in Thermal Battery S4-4, #57, Mahasak Ketcham, Apichat Silsanpisut, Narumol Chumuang, Pisit Chansuek, Thittaporn Ganokratanaa and Pol.Lt.Col.Peerapol Selarat; Analysis Of X-ray For Locating The Weapon In The Vehicle By Using Scale-Invariant Features Transform S4-5, #78, Takenori Nomiyama, Masashi Arake and Aki Tsuruhara; EEG Measurements for Evaluation of Man-Machine Interface Short: S4-6, #50, Halimahtun Mohd Khalid, Wei Shiung Liew, Bin Sheng Voong, Martin Helander and Chu Kiong Loo; Technology for Estimating Trust in Human-Robot Interaction S4-7, #62, Roongtawan Laimek and Natsuda Kaothanthong; A Study of ATM Fraud Detection Techniques 18:00-19:30 Welcome Party (Room Shirakaba) 30th, November (Thursday) 09:00-11:20 Plenary Talks (Room Ruri-West) 1. Prof. Sung-Bae Cho (Yonsei University, Korea), Exploiting Machine Learning for Malicious Attack Detection in Cyber Security (Chair: Prof. Sato) 2. Dr. Komain Pibulyarojana (T-Net, Thailand), How SME company can be involved in the game changing technology of research and development in Defense Technology (Chair: Prof. Kerdsri) 3. Dr. Michael J. Leggieri, Jr. (US Department of Defense, USA), Scope of Blast Injuries (Chair: Prof. Park)

22

11:20-12:00 ATLA Presentation (Room Ruri-West) Chair: Prof. Yamakawa 1. Manabu Kaneko (International Cooperation Division, ATLA), Defense Equipment and Technology Cooperation 2. Yasuharu Mine (Director, Technology Strategy Division, ATLA), Defense Technology Strategy 12:00-13:00 Lunch 13:00-14:55 Session 5: Sensor Network (Room Ruri-West) Chair: Prof. Harada and Prof. Kubo Long: S5-1, #74, Thuy Nguyen Thi, Viet Sang Dinh, Quang Nguyen Tien and Thi Thanh Binh Huynh; Semantic Segmentation of Objects from Airborne Imagery Regular: S5-2, #32, Kwon Ohjun, Kim Myounghun and Bongwan Choi; A Study of Methodology for Mine Counter-measure(MCM) Capability Analysis Short: S5-3, #6, Peeramed Chodkaveekityada and Paramote Wardkien; Development of an Intelligent Air Observation System for Military Mission: Concept and Test Procedure S5-4, #60, Pakamaj Wongsai and Wichai Pawgasame; Discrete Choice Modeling for Criminal Escape Path Analysis S5-5, #66, Chanatip Chuenmanus; A Review of License Plate Recognition (LPR) S5-6, #75, Tetsuya Kimata, Yukinori Fuse, Hirotomo Nakajima and Takamitsu Kunikata; Stand-off IED/mine Detection by Log-periodic Dipole Antennas -Imaging of the surface and buried objects- 13:00-14:55 Session 6: Artificial Intelligence and Cognitive Science I (Room Sango) Chair: Prof. Sato and Prof. Tharunakk Long: S6-1, #25, George Leu, Jiangjun Tang, Erandi Lakshika, Kathryn Merrick and Michael Barlow; Curriculum optimisation via evolutionary computation, for a neural learner robust to categorical adversarial samples S6-2, #79, Nurfadhlina Mohd Sharef, Nor Azura Husin, Khairul Azhar Kasmiran and Mohd Izuan Ninggal; Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion Threats Severity Prediction Accuracy S6-3, #82, Ha Le Thanh; From Human Machine Interaction to Human Machine Integration Regular: S6-4, #4, Kenji Hamano, Yoshinobu Hata and Shintaro Taira; Target Classification of

23

MSTAR SAR Images Taken From 30 ̊ Depression Angle Using Deep Learning S6-5, #16, Junhoo Cho and Changook Park; Additional Feature CNN Based Automatic Target Recognition in SAR image 14:55-17:40 Poster Session (Room Hisui) P-1, #12, Septafiansyah Dwi Putra, Adang Suwandi Ahmad, Sarwono Sutikno, Yusuf Kurniawan and Arwin Datumaya Wahyudi Sumari; Attacking AES Encryption Device with Differential Power Analysis P-2, #29, Augie Widyotriatmo and Maristya Rahmadiansyah; Evaluation of Equipment Dispatching on Container Terminal Operations using Multi-Agent-Based Simulation P-3, #36, Muhamad Affin Bahtiar and Arwin Datumaya Wahyudi Sumari; The Implementation of The Deradicalization Program in Indonesia: A Case Study of Counterterrorism in Indonesia P-4, #42, Noor Hafizah Abdul Aziz and Syarafuddin Zainodin; RCS Estimation on Ground Moving Target using LTE Signal P-5, #44, Idham Wahyudi, Arwin Datumaya Wahyudi Sumari and Haryo B. Rahmadi; War Game Simulation As Media Learning for Defense And Security: Economic Warfare Simulation in Indonesia Context P-6, #46, Alan Blattler, Amornphun Phunopas, Wisanu Jitviriya, Sho Yamana and Saji Keita; The Tracked Robot for Explosive Ordanance Disposal (EOD) Mission Performance Test and Navigated Locomotion using IMU and GPS P-7, #49, Yasuhiro Sato, Masaaki Yamanaka, Natsuki Kawai, Seiya Wanibe and Yoshinori Matsuura; Applying RFID System for Maritime Object Management: Design and Its Prototyping P-8, #56, Narumol Chumuang, Pisit Chansuek, Mahasak Ketcham, Apichat Silsanpisut, Thittaporn Ganokratanaa and Pol.Lt.Col.Peerapol Selarat; License Plate Recognition for Tracking Vehicles P-9, #63, Nikhom Koprach; Military Applications of Blockchain Technology for Defence P-10, #64, Vissanu Mungkung; Thailand’s Defence Industry Policies toward practical Thai – Japan Collaboration Effort P-11, #69, Somkheart Kraisin; Car logo detection using sift P-12, #71, Sumeth Yuenyong, Narit Hnoohom and Konlakorn Wongpatikaseree; Automatic detection of knives in infrared images P-13, #72, Yanchao Shi, Zhong-Xian Li and Baisheng Jia; Experimental Study on the RC slab damage under close-in blast loads P-14, #73, Nutthaporn Nutayasakul, Thatchai Thanapisudwong, Chuan Chantawan and Chalit Santitararag; Finite Element Analysis of Al7075 Aluminum Floor Joist for M4 Military Bridge 15:20-17:40 Session 7: Operations Research (Room Ruri-West)

24

Chair: Prof. Sakuma Regular: S7-1, #3, Ryusuke Hohzaki, Luc Faugeras and Tetsuya Ouchi; An Attrition Game with Multiple Start and Destination Points S7-2, #19, Tomohiro Kitagawa, Tetsushi Yuge and Shigeru Yanagi; Three Repair Options Depending on Failure Time for a System with Administrative Delay S7-3, #37, Yutaka Sakuma, Atsushi Inoie and Masahiro Kobayashi; Simple Approximate Analysis for Parallel Queues with Patients‘ Deteriorating Health Conditions S7-4, #51, Yuki Kawauchi, Kohtaro Watanabe, Seiji Kataoka; An Improvement of Decoding Time of Ordered Stastistic Decoding for Midium Length LDPC Codes Short: S7-5, #11, Seksun Moryadee; Optimal Military Unit Location as a Modified Set Covering Problem: Case Study of Pattani Province, Thailand S7-6, #15, Satawat Doungpan, Seksun Moryadee, Chalida U-Tapao and Laemthong Laokhongthavorn; Facility Location for Earthquake Planning as a Set Covering Problem: Case Study of Chiangrai, Thailand S7-7, #41, Jason Noble; A Concept for Applying Linguistic Geometry to Achieve Command and Control Agility S7-8, #68, Semmy Tyar Armandha, Arwin Datumaya Wahyudi Sumari and Haryo B Rahmadi; Technological Parity Awareness Toward International Defense Iron Triangle: A Case from KF-X/IF-X Joint Development 15:20-17:40 Session 8: Artificial Intelligence and Cognitive Science II (Room Sango) Chair: Prof. Kubo and Prof. Sato Long: S8-1, #83, Hien T. Nguyen and Thuan Q. Nguyen; Deep Learning for Entity Recognition: State-of-the-Art Methods S8-2, #88, Masahito Yamamoto, Izuho Suginaka, Wataru Noguchi and Hiroyuki Iizuka; Self-Localization and Spatial Recognition using Recurrent Convolutional Neural Networks Regular: S8-3, #59, Wichai Pawgasame; A Dynamic Spectrum Allocation for the Military Cognitive Radio Network using Evolutionary Algorithm S8-4, #65, Patiyuth Pramkeaw, Mahasak Ketcham, Thaweesak Yingthawornsuk and Peerapol Selarat; Detection of Cocealed Weapon using Image Fusion S8-5, #84, Nhuhai Phung, Masao Kubo and Hiroshi Sato; Emergence metastable swarm behaviors using heterogeneous bias values S8-6, #85, Dao Van Tuan and Hiroshi Sato; Improving distributed representation by Pre-processing method

25

18:00-20:00 Banquet (Room Shirakaba) 1st, December (Friday) 09:00-12:30 Session 9: Human Performance and Aviation Safety (Room Ruri-West) Chair: Prof. Kobayashi Long: S9-1, #9, Bob Cheung; Technology Based Pilot Disorientation Countermeasures S9-2, #21, David Newman; Human Performance Challenges in the Modern High G Flight Environment S9-3, #24, Sheng Tong Lin; Fatigue-Induced Eye Behaviors S9-4, #39, Jiwoon Yeom, Hohyung Kang, Yumi Ha and Solmon Yang; Pilot Selection Analysis in ROKAF during 1-year : Medical Checkup S9-5, #45, Marc Winterbottom, Charles Lloyd, Eleanor O'Keefe, James Gaska, Steve Wright, Tommy Bullock and Steven Hadley; Remote Vision System Air Refueling Visual Performance S9-6, #48, Supachai Sinthavalai; Role of Aviation Medicine in Safety in the Royal Thai Air Force Regular: S9-7, #14, Hiroto Kikuchi; Voice analysis researches and application in the JASDF S9-8, #20, Swee Weng Fan; Aviation Physiology Training in Military Aviation of the Future - Transformation Through Technology S9-9, #27, Masashi Arake, Shunsuke Hayashi, Aki Tsuruhara, Nobuhiro Ohrui, Takenori Nomiyama, Asao Kobayashi, Yusuke Yokota, Yasushi Naruse, Hiroyuki Ohta, Masanori Fujita, Yuji Morimoto and Nariyoshi Shinomiya; Electrophysiological Steady-State Responses in Flight Simulator Trainings. 09:00-12:30 Session 10: Computer Science and Applications (Room Sango) Chair: Prof. Mimura and Prof. Sato Long: S10-1, #26, Ornin Srihakulung, Luckhana Lawtrakul, Pisanu Toochinda, Waree Kongprawechnon, Apichart Intarapanich and Ryo Maezono; Theoretical investigation of molecular calculations on inclusion complexes of plumbagin with β-cyclodextrins S10-2, #67, Thanan Yomchinda; A Method of Multirate Sensor Fusion for Target Tracking and Localization using Extended Kalman Filter S10-3, #80, Ubon Thongsatapornwatana, Woraphon Lilakiatsakun, Akkarach Kawbunjun and Tossapon Boongoen; Analysis of Criminal Behaviors for Suspect Vehicle Detection

26

S10-4, #89, Hsu-Chun Hsiao; On Cyber Attacks against Critical Infrastructures Short: S10-5, #34, Md Abdur Razzak and Muhammad Nazrul Islam; Exploring the Usability Factors of Military Application: A User Study S10-6, #35, Uraiwan Buatoom, Waree Kongprawechnon and Thanaruk Theeramunkong; Constrained Clustering with Feature Weighting Scheme S10-7, #61, Kittichai Phukhan; Visualization of air quality around the coal-fired tapa power plant 09:00-12:30 Session 11: Blast & Injury (Room Shinju) Chair: Prof. Gputa and Prof. Park Regular: S11-1, #90, Atsuhiro Nakagawa, Kiyonobu Ohtani, Atsushi Sakuma, Mao Yagihashi, Chikashi Nakanishi, Hideaki Karasawa, Shinichi Yamashita, Noriko Matsui, Yu Terui, Shiori Kudo, Akane Saito, Shoko Inoue, Keiko Furuya, Teippei Tsujita, Atsushi Konno and Teiji Tominaga; Blast-induced traumatic brain injury: Clinical features, Mechanism, Prevention S11-2, #91, Raj K. Gupta; State-of-the-Art in Blast Induced Brain Injury Understanding S11-3, #92, Shashi P. Karna; Application of Bio-Templated Metal Nanoclusters to Study Blast-Induced Injuries S11-4, #93, Shunichi Sato, Satoko Kawauchi and Izumi Nishidate; Laser-induced shock wave: A new tool for blast injury research S11-5, #94, Masayuki Sakamoto; Vehicle occupant protection against blast induced accelerative loading S11-6, #95, Izumi Nishidate, Afrina Mustaria, Satoko Kawauchi, Shunichi Sato and Manabu Sato; In vivo evaluation of neurovascular functions in rat brain using diffuse reflectance spectroscopy S11-7, #96, Satoko Kawauchi, Michiyo Sakamaki, Yukari Komuta, Chinami Onuma, Izumi Nishidate, Hitoshi Tsuda, Kenichi Kaida and Shunichi Sato; Cortical spreading depolarization, pressure distribution and oxidative stress in a rat brain exposed to a laser-induced shock wave

27

Abstracts Session ID: S1-1 (Paper ID: 10)

Evaluation of Logistics System with Small Ships under Disaster Situations Takahiro Majima, Taro Aratani

Abstract In recent years, the massive earthquakes occurred frequently in Japan and brought the large-scale disasters such as the great Hanshin-Awaji earthquake in 1997, the Niigata Prefecture Chuetsu earthquake in 2004, the great east Japan earthquake in 2011, and the Kumamoto earthquake in 2016. In the all disasters above, logistics system for relief supply collapsed and it is repeated that the supply goods are not delivered to the evacuation refugees properly. One of the reasons repeating this situation is caused by street network damaged. If ships can be utilized as an alterable transportation mode, the logistics system under disaster situation will have more robustness. In this paper, using transportation simulator for disaster situation based on the Multi-Agent System, the performance of logistics system using small ships in disaster situations is evaluated.

Session ID: S1-2 (Paper ID: 18) A Single User MIMO System using Tomlinson-Harashima

Precoding with Adaptive Bit Allocation Shigenori Kinjo, Shuichi Ohno

Abstract To develop reliable communication systems, we pro- pose a single user multiple-input multiple-output communication system using zero-forcing (ZF) Tomlinson-Harashima precoding (THP) with adaptive bit allocation. Eigenbeam space division multiplexing (E-SDM), which utilizes a singular-value decomposition (SVD) and a water filling technique, is known to be an optimal linear precoding MIMO scheme. However, the SVD of a MIMO channel matrix requires a heavy computational cost. On the other hand, the ZF-THP is a non-linear precoding scheme which is computationally efficient while showing allowable bit error rate (BER) performance. In order to improve further in terms of the BER, we propose to allocate bits adaptively to minimize the upper-bound of the theoretical BER for every transmission in a fading environment. Numerical examples provide a comparison with the E-SDM method. Keywords: Tomlinson-Harashima precoding, MIMO systems, Single user MIMO, Zero-Forcing THP

Session ID: S1-3 (Paper ID: 22) A Ray-Tracing Analysis of the Radio Propagation

on the Maritime Radar Systems Masaaki Yamanaka, Daiki Hashimto, Yasuhiro Sato, Yoshinori Matsuura

28

Abstract In this paper, we will analyze the radio propagation by a ray-tracing method on the maritime radar systems to clarify the area where radio waves are not able to reach. In general, radar antennas are set in the highest location from sea level in order to get a line-of-sight view for a wide area. However, there are cases when high islands or hills hamper the line-of-sight. In this case, the system is not able to see the area through the radio waves, which will cause a serious problems for navigation safety. The Main objective described in this paper will specify the area by a ray-tracing method applied in the maritime environment. The procedure of using the Geospatial Information Authority of Japan (GSI)’s topographical data is given, to assess the exact area where the radio waves are unable to reach, through simulation. Session ID: S1-4 (Paper ID: 53)

Safety Assessment for Establishing Ships’ Routeing – Recommended Route Off the Western Coast of Izu O Shima Island –

Rina Miyake, Hiroko Itoh, Chihiro Nishizaki, Junji Fukuto Abstract Collision is the most frequent marine accidents. Safety measures have been implemented mainly in extremely congested harbours and bays. On the other hand, no safety measures have been implemented in coastal sea of the Pacific side of Japan, even though this area is also very busy and has a lot of collision accidents. As a safety measure, a recommended route will be implemented off the western coast of Izu O Shima Island as a part of a 5-year project for improvement of safety of marine traffic that Japan Coast Guard started in 2013. The authors developed a method for design and assessment of a ships’ routeing and the method was applied on the recommended route in the area. In this paper, the method is briefly described and results of evaluation of proposed recommended routes are shown. Keywords: ships’ routing; safety assessment; economic efficiency assessment; AIS; traffic simulation Session ID: S1-5 (Paper ID: 54)

Optimal Location Model for Counter-Piracy Surveillance System Daisuke Watanabe, Richard Church

Abstract A significant number of pirate attacks have occurred off the coast of Somalia. This is a major threat to ships navigating the major sea lane between Asia and Europe. One of the new technologies for counter-piracy surveillance system is the stratospheric sensor and relay platform (SSRP) that is High- Altitude Platform equipped with optical sensors and radars. To analyze the optimal location of counter-piracy surveillance system like SSRP, we need to consider the multi type of service coverage and uncertainty of service based on the Maximal Covering Location Problem (MCLP). In this study, we formulate the

29

optimal location model for Counter-Piracy Surveillance Platform System using Weighted Benefit and Expected Coverage Model based on MCLP. Keywords: Counter-Piracy Surveillance System, High-Altitude Platform, Maximal Covering Location Problem. Session ID: S2-1 (Paper ID: 5)

Performance of Aramid Fiber Reinforced Concrete Panels under Blast Loads Thimira M. Abeysinghe, Ganchai Tanapornraweekit, Somnuk Tangtermsirikul,

Withit Pansuk, Nuthaporn Nuttayasakul Abstract It has been reported that thin concrete panels reinforced with meshed aramid fiber were able to absorb and dissipate energy from impact loads. Therefore, it is likely that internally bonded aramid fibers perform well under blast loads where high strain rates involve with the material level responses similar to that from impact loads. A series of blast tests were conducted to investigate the blast performance of reinforced concrete (RC) panels with and without internal aramid fiber reinforcement. Two steel arrangements (5RB6@225 and 11RB6@90) were selected as reinforcement for the test specimens. With each rebar arrangement, two panels were cast where one with ordinary concrete and another with aramid fiber reinforced concrete. Fiber reinforcing was performed by adding aramid fibers to the fresh concrete during the concrete mixing processes. All the aramid fiber reinforced concrete (AFRC) panels were cast with one percent of fiber volume fraction. Blast tests indicate that AFRC panels outperform RC panels in overall performance. Keywords: aramid fiber, blast tests, reinforced concrete, spalling Session ID: S2-2 (Paper ID: 47)

Application of Thermal-Solid Interface CFD on Thermal Protection Study for Rocket Warhead

Weerawut Charubhun, Pawat Chusilp Abstract When rockets travel at high supersonic speed. Aerodynamic heat becomes more severe especially at a warhead section where TNT explosive is filled up. The heat could melt TNT if the temperature exceeds 80 °C. If the melting runs deep, it could cause dynamic unbalance to rockets. Supersonic rockets usually need insulations to protect it from the aerodynamic heat. Hence, a method to predict skin temperature and TNT temperature inside warhead was developed to help warhead designers to select proper insulation material. This paper presents a method utilizing 2D transient viscous CFD and its fluid-solid interface capability to assist researchers in designing insulator for a warhead. The method was applied to a 122mm unguided rocket that has a maximum speed of 3.5 Mach. Flight profiles of 10 and 45 degree of firing angle were generated using Six-Degree-Of-Freedom (6DOF) code and were fed to CFD solver. Transient CFD was

30

executed in such a way that Mach number, ambient temperature and ambient temperature, changed with flight time. The simulation time step size of 0.02 second was proved to be sufficiently small for the proposed method. The rockets model with and without proposed insulator were investigated. The temperatures were monitored in 3 areas; outer skin, Warhead-TNT connecting surface and TNT solid. The results suggested that the heat load was higher when the rocket was fired at 10 degree. Excessive temperature on TNT was still found even with insulator was in place. The maximum possible melting depth was 10.4 mm without insulator at 10 degree launch. Less than 0.5 mm possible melting depth was found if insulator was used. Hence, better insulation material should be proposed. Keywords: Aerodynamic Heat, Thermal Protection Material, Insulator, Fluid-Solid Interface Session ID: S2-3 (Paper ID: 7)

Ablative properties of different phenolic resin composites: A comparative study Phimraphas Ngamsantivongsa, Suriyawate Boonthalarath, Bongkochtorn Wong-ek,

Suchuchchai Nuanklai, Thanachai Kanasittiboon Abstract In this research, we investigated the ablative properties of three laminated composites, having different kinds of phenolic resins with the same configuration, are appraised and compared. The laminated composites were manufactured with three different phenolic resins reinforced with E-glass fibers by dipping method. There are three phenolic resins in this research, namely, phenolic A, phenolic B and phenolic C. The composites were fabricated by the hot compression molding technique. Ablation characteristics of the ablative composites were investigated according to ASTM E285-08, in which oxy-acetylene torch was used as a high temperature source. The radiographic images were also captured to analyze the void of the laminated specimens from compression molding process. When compared to the phenolic-based counterpart, the results obtained show that the phenolic B-based composites exhibited the lowest ablation rate and the lowest density vice versa the radiographic image of the phenolic C-based composites demonstrated the highest laminate quality. Keywords: ablative properties, laminated composites, phenolic resin (PR), compression molding, oxy-acetylene torch Session ID: S2-4 (Paper ID: 40)

The Investigation of Phenolic Resin Thermal Stability under High Temperature Chidchanok Chaichuenchob, Nattawat Winya, Suwicha Chankapoe

Abstract In this study focuses on the thermal stability of ablative materials. FTIR and 1H-NMR technique were characterized the functional group of phenolic resin. The char yield was measured by TGA at heating rate of 20 °C /min under nitrogen from 100 to 1200 °C.

31

The glass fiber/phenolic resin was prepared by compression molded. The thermal performance of phenolic resin matrix with E-glass fiber and silica fiber fabric reinforced were compared by oxyacetylene torch under high temperature. The results from ablation tests shows ablation rate of Silica/PL002 is lower than E-glass/PL002. The microstructure of char layer on ablated surface were investigated by using scanning electron microscope (SEM). The dense carbonaceous and melted silica layer enhance the ablation performance of composites. Keywords: phenolic, char, ablative Session ID: S2-5 (Paper ID: 43) Effect of Silica on Mechanical and Ablation Properties of HNBR/NR Rubber blend

Nattawat Winya, Nanthiya Hansupalak Abstract This work reported mechanical and ablative properties of hydrogenated nitrile butadiene rubber (HNBR)– natural rubber (NR) composites filled with silica. The mechanical properties of interest were tensile strength, tear strength, elongation, and hardness. The results showed that the maximum torque was dependent on the silica content because silica affected the crosslink density of HNBR/NR rubber blend composite. The tensile strength and tear strength increased with increasing the silica loading. The lowest ablation rate equal to 0.07 mm/s was found for the HNBR/NR rubber blend composite filled with a silica loading of 20 phr. The thermal ablation performance of HNBR/NR rubber blend composite containing silica enhanced as formation of char layer on the surface of the composite. Thus, HNBR/NR blend composite with silica could be used as an ablative material. Keywords: natural rubber, hydrogenated nitrile butadiene rubber, ablation properties, rubber blend, silica Session ID: S2-6 (Paper ID: 70)

The effective process alignment for multinational defence project in Government Budgeting framework

Jirasak Jewmaidang, Panatat Sinhaseni Abstract Defence Capability Development is a critical theme that has been associated in the multinational collaboration with a real political driven to satisfy stakeholders by implementing policy while effectively delivering the benefits of national security. Many initiatives relating to multinational collaboration are generated in the form of project and programs encouraging a variety of project management implementing in the public sector of Ministry of defence. A critical function for public sector, basically deals with all aspects of resource mobilization and expenditure management in government aiming to turn organizational plans and strategic objectives into reality. Budgeting is a process that incorporates all levels of government, and apply in all countries. These budget

32

principles are relevant, and should be applied as appropriate, to all levels of government and related to all local public sectors’ partners and international partners. For the use of ”on-budget” fiscal mechanisms, multinational defence project proposals formulated by public sector together with international partners, is expected to be account comprehensively and correctly, and that no figures should be omitted or hidden (although limited restrictions may apply for certain national security or other legitimate purposes). A key success factor for multinational defence project proposals to be initiated, approved and sponsored for the use of ”on-budget” fiscal mechanisms is the alignment between (1) the multinational collaboration process, (2) project management process, and (3) The fiscal policy budgeting process. This article reports on examination of the multinational defence project formulation in MoD, Thailand with particular reference to The fiscal policy budgeting influences affects the multinational collaboration during the initiating and planning processes and how to delivery of project to time, quality and cost, realizing expected benefits. Keywords: defence project management, multinational collaboration, budgeting framework Session ID: S3-1 (Paper ID: 8)

On the Guaranteeing Safety of Multi Wheeled-Robots Flocking in Collision-Risky Area

Azka Muji Burohman, Endra Joelianto, Augie Widyotriatmo Abstract This paper presents a control design of multi- robot dynamic system. The main scheme of this design consists of trajectory generation and tracking. First, the trajectories of every robot are generated by the merge of smooth and non- smooth potential field. The generation of the trajectories is calculated at real-time. In the next control level, the trajectory control is implemented to each robot. Besides tracking the generated trajectories, every robot in this part is also facilitated with collision avoidance by using a barrier function. This scheme guarantees that the equilibrium of this dynamic multi- agent system is stable and the robot is sent to a safe area. The algorithm is validated by simulating multi robot system in collision-risky area, i.e. narrow space and a case where one member is broken and another member must avoid. Keywords: Formation control, collision avoidance, trajectory generation, trajectory tracking, barrier function Session ID: S3-2 (Paper ID: 30)

Clock-Based Real-Time Optimal Control of a Skid-Steered Vehicle Soichiro Watanabe, Masanori Harada

Abstract This paper investigates a real-time optimal control of a skid-steered vehicle (SSV) using a clock-based algorithm. The optimal control problem is sequentially solved by a pseu-

33

dospectral optimal control theory as a minimum-time relocation maneuver and an obstacle avoidance maneuver. The SSV uses the generated optimal control law for its maneuver. The proposed approach is numerically validated by controlling the SSV. Results demonstrate the feasibility of commanding the SSV with the optimal solutions generated by this method. Session ID: S3-3 (Paper ID: 55)

Underground radar target classification based on Matrix Pencil Method Santana Burintramart, Akkarat Boonpoonga

Abstract This paper presents an application of using ground penetrating radar signals to differentiate radar returns from two targets of interest. The targets are IEDs frequently found to be roadside IEDs in the Southern of Thailand. The Matrix Pencil Method is applied for late-time signals of the radar returns to estimate dominant pole locations. The classification of the detected target is possible by recognizing the pole locations. Keywords: ground penetrating radar, counter-improvised explosive devices, target classification, singularity expansion method, matrix pencil method Session ID: S3-4 (Paper ID: 38)

A New Approach to Anti-Submarine Warfare Using an Unmanned Surface Vehicle (SHARC)

Based on 2017 ROK Navy Demonstration Results Matthew DePetro, Byungjun You, Matthew Ragozzino

Abstract This paper details a 2017 investigative exercise performed in cooperation by the Republic of Korea (ROK) Joint Chiefs of Staff (JCS), Liquid Robotics, Inc., and the Boeing Corporation. The exercise demonstrated to the real-world efficacy of a specially equipped Unmanned Surface Vehicle (USV) known as the SHARC for ASW detection. Results and lessons learned from the experiment are presented in this paper along with an overview of the SHARC-ASW system. Keywords: ASW, Unmanned maritime vehicle, Unmanned Surface Vehicle, SHARC Session ID: S3-5 (Paper ID: 76)

Development and Tests of Type 10 Tank - From viewpoint of Slalom Shooting Akihiko Shimura, Yoshihiro Inoue

Abstract The Acquisition, Technology and Logistics Agency (ATLA) has carried out Full Scale Development and Development Tests (DT) of the Type 10 Tank based on the development request from the Japan Ground Self Defense Force. The Type 10 Tank has extraordinary performance of the slalom shooting. In this report, it is described how slalom shooting was achieved.

34

Keywords: Main Battle Tank, Tank Gun, Transmission, Modeling and Simulation Session ID: S3-6 (Paper ID: 77)

Development of Tracked Hybrid Electric Demonstorator (T-HED) Hidetaka Taira, Akihiko Shimura

Abstract Electric and Hybrid Electric Vehicles are becoming more and more popular in recent decades and lots of relevant research and development activities have been conducted. Military ground vehicles obtain following advantages by implementing hybrid electric drive systems: improved acceleration and fuel economy, silent mobility and silent watch capabilities and significant levels of on-board electric power generation. However, to the best of authors’ knowledge, there are no deployed hybrid military vehicles so far and hardware related papers were very few in spite of these advantages. This paper shows a system design and details of mobility tests of a Tracked Hybrid Electric Demonstrator (T-HED) for the first time. Basic mobility performances for ground combat vehicles such as acceleration, top speed, gradeability and pivot turn capabilities are evaluated and advantages of a hybrid electric system for combat vehicles are discussed. It is found that the effect of additional torque should be considered to design the motor’s torque performance at the 60 percent slope and at the pivot turn. Keywords: Hybrid Electric Vehicle, Tracked Combat Vehicle, Acceleration, Top speed, Gradeability, Pivot turn Session ID: S4-1 (Paper ID: 52)

Trust of Assistive Humanoid Robots in Service Tasks; A Comparison between Scenarios

H. M. Khalid, B.S., Voong, W. S. Liew, W.H. Chin, M.G. Helander Abstract Trust is important when integrating humanoid robots in human teams. Our study investigated the effects of humanoid robots, service scenarios and trust components on subjective trust. Fifteen attributes of Ability, Benevolence and Integrity (ABI) trust components were embedded in interactive dialogs. The dialogs represented service scenarios of Business, Disaster and Healthcare. The subjective measures were mapped to physiology measures of facial expressions, voiced speech and camera-based heart rate. Three humanoids Nao, Reeti and Virtual Avatar were used. Forty-eight subjects participated in the study. The results revealed that all three humanoids were trustworthy to perform different services tasks; Nao and Reeti in Business and Disaster, while the Avatar in Healthcare. The trust attributes of ‘Integrity’ and ‘Ability’ components are important in Business and Disaster scenarios. Nao’s humanlike characteristics of physical presence and visual feedback attributed to trustworthiness. We concluded that these anthropomorphic qualities must be present to gain human trust. Keywords: Assistive humanoids, trust, service scenarios, natural dialogs, human-robot

35

interaction Session ID: S4-2 (Paper ID: 58)

The Application of Cognitive Artificial Intelligence within C4ISR Framework for National Resilience

Arwin Datumaya Wahyudi Sumari, Adang Suwandi Ahmad Abstract Cognitive Artificial Intelligence (CAI) is a new perspective in Artificial Intelligence (AI) which is aimed to emulate how human brain works in generating knowledge. Human becomes intelligent because of knowledge which grows over time in his brain. With comprehensive knowledge, he can understand the world (environment) and is able to make decision and or action on it. On the other hand, strategic decision which impacts to the continuance of having a nation and having state is a critical and crucial matter, and it should be done in precise and quick manner especially in the case of contingency and faced to mutiple-data multiple-decision-alternative problems. The most precise decision has to be based on the knowledge from extracted comprehensive information. In this paper we show you the application of CAI for National Security with Knowledge- Growing System (KGS) as the engine of decision making system. We apply the CAI to a framework called Cognitive Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) with examples taken from a simulated of real-life case in the Defense-Security domain. Keywords: A3S, C4ISR, Cognitive Artificial Intelligence, decision making, Knowledge-Growing System, National Resilience Session ID: S4-3 (Paper ID: 28)

Effect of Fiberglass on the Molten Salt Electrolyte Characteristics in Thermal Battery Santita Rattanaphan

Abstract Abstract— Fiberglass in electrolyte of thermal battery was used to improve safety performance at high temperature operating for thermal battery. Electrolyte-binder (EB) normally consist of mixtures of 65% LiCl-KCl molten salt and 35% MgO binder. In this paper, three fiberglass compositions were studied. These compositions were non-fiberglass, 5 wt% fiberglass and 10 wt% fiberglass in electrolyte binder mixture. The characteristics of the EB/fiberglass powder were analyzed for moisture content, impurity, activated energy and BET surface area. The characteristics of the EB/fiberglass pellet were evaluated for electrolyte leakage at high operating temperature of 400 °C, 500 °C and 600 °C. The result shows that 5%fiber is an appropriate fiberglass composition in molten salt electrolyte. The reduced electrolyte leakage is 2.8387 (73.50%), 2.1690 (52.60%) and 4.2574 (52.25%) mg/cm2 for 400 °C,

36

500 °C and 600 °C respectively. Keywords: Electrolyte binder, Fiberglass, Molten salt Electrolyte, Thermal battery Session ID: S4-4 (Paper ID: 57)

Analysis Of X-ray For Locating The Weapon In The Vehicle By Using Scale-Invariant Features Transform

Mahasak Ketcham, Apichat Silsanpisut, Narumol Chumuang, Pisit Chansuek, Thittaporn Ganokratanaa, Pol.Lt.Col.Peerapol Selarat

Abstract An object recognition system has been developed that uses a new class of local image features. The features are invariant to image scaling, translation, rotation, and partially invariant to illumination change s and affine or 3D projection. These features share similar properties with neurons in inferior temporal cortex that are used for object recognition in primate vision. Features are efficiently detected through a staged filtering approach that identifies stable points in scale space. Image keys are created that allow for local geometric de formations by representing blurred image gradients in multiple orientation planes and at multiple scales. The keys are used as input to a nearest-neighbor indexing method that identifies candidate object matches. Final verification of each match is achieved by finding a low-residual least-squares solution for the unknown model parameters. Experimental results show that robust object re cognition can be achieved in cluttered partially-occlude d images with a computation time of less than two seconds. Keywords: X-ray, Analysis, Locating, Weapon, Vehicle, Scale invariant features transform, SIFT. Image processing Session ID: S4-5 (Paper ID: 78)

EEG Measurements for Evaluation of Man-Machine Interface Takenori Nomiyama, Masashi Arake, Aki Tsuruhara

Abstract Along with the recent sophistication of information devices, the design of man-machine interface has become increasingly important. In order to evaluate the effectiveness of man-machine interface, user's cognitive workload should be considered. As measures of cognitive workload, performance, subjective rating, secondary task, and physiological indices have been used. Recently, the signal analysis of electroencephalography (EEG) has been improved and the application area has been extended. The objective of this study was to measure cognitive workload from EEG signal during the use of a head-mounted display (HMD). Auditory steady-state responses (ASSR) was used to analyze EEG signal. The results showed a tendency that ASSR amplitude change with the cognitive workload in the use of HMD. Advantages of ASSR are discussed compared to other workload measures. Keywords: see-through HMD; cognitive workload; auditory steady-state responses

37

Session ID: S4-6 (Paper ID: 50)

Technology for Estimating Trust in Human-Robot Interaction H. M. Khalid, W. S. Liew, B.S. Voong, M.G. Helander, C.K. Loo

Abstract This paper presents a technology for estimating trust in robots during human-robot interaction. The technology comprised a method for measuring psychological measures of trust, and devices for capture of physiological data of humans as they interact with robots. These are integrated using a systems software, Robot Operating System (ROS). The technology further includes a method for transfer of data for post-hoc analysis using neurofuzzy algorithms and inferential statistics. An experimental study with 48 human subjects was conducted to test the utility and usability of the technology. The technology was validated in a follow-up study and found to be efficient for experimentation and data processing. The estimation of trust is about 88% when using the technology that combined psychophysiological measures of trust. Keywords: Measurement technology, trust, robots, ROS, human-robot interaction Session ID: S4-7 (Paper ID: 62)

A Study of ATM Fraud Detection Techniques Roongtawan Laimek, Natsuda Kaothanthong

Abstract ATM is common financial tools nowadays, however, it does not gain as much attention for fraudulent analysis because it was believed to have lower risk of frauds as compared to other financial tools. Many deceptive activities have increasingly been investigated as ATM frauds in recent years since the fraudulent patterns are changed. In this way, relying on the historically known patterns causes a delay in preventing a fraud. Data mining techniques has been extensively applied for identifying financial fraud cases. However, a few study has considered ATM transactions. This research explores the characteristics of ATM frauds in recent years and reviews the data mining techniques that could be applied to discover the unique characteristics of ATM frauds. Four techniques are applied: Naive Bayes, Decision Tree, Random Forest, and Deep Neural Network. The experiment is conducted using the real ATM transactions from a bank in Thailand. The experimental result shows that the Naive Bayes achieves the highest true positive rate of 93.65%. Keywords: ATM fraud detection, Data mining, Machine Learning Session ID: S5-1 (Paper ID: 74)

Semantic Segmentation of Objects from Airborne Imagery Thuy Thi Nguyen, Sang Viet Dinh, Nguyen Tien Quang, and Huynh Thi Thanh Binh

Abstract

38

Automated extraction of objects from images ac- quired by airborne sensors is the one of the most important topics in Aerial Photograph Interpretation (API). The task is challenging due to the very heterogeneous appearance of man- made and natural objects on the ground, meanwhile images acquired by airborne sensors are very high-resolution data, which requires high computational costs. This paper presents an efficient approach that combines a powerful classifier and an efficient contextual model for the segmentation of objects at pixel level. Multiple image features are used to train the classifier, other ordinary features are used to learn the contextual model. We employ Random forest (RF) as classifier which allows one to learn very fast on big data. The outputs given by RF are then combined with a fully connected conditional random field (CRF) model for improving classification performance. Experiments have been conducted on a challenging aerial image dataset from a recent ISPRS Semantic Labeling Contest. We obtained state-of-the- art performance with a reasonable computational demand. Keywords: Image segmentation, Semantic labeling, Object de- tection, Machine learning, Random forest, Deep learning, Aerial image, Remote sensing. Session ID: S5-2 (Paper ID: 32)

A Study of Methodology for Mine Counter-measure Capability Analysis Kwon Ohjun, Kim Myunghun, Choi Bongwan

Abstract This study classifies the seabed type of sea area considering the marine environment of the Korean peninsula and presents the scale of probability in detecting mines in each sea area. Then, the scale was applied to a mathematical algorithm in concern of mine hunting/ sweeping to yield analysis results. Through this method, effective MCM operations can be executed because it helps effective deployment of sweeping forces to operation area. Keywords: Mine, Detection, Sweeping, MCM, Analysis Session ID: S5-3 (Paper ID: 6)

Development of an Intelligent Air Observation System for Military Mission: Concept and Test Procedure

Peeramed Chodkaveekityada, Paramote Wardkien Abstract Upper and Lower air observation system is quite important for military operations such as survey, cannon, and tank missions. In this work, we developed an air observation system especially for military mission in Thailand with the objectives for it to be portable and to reduce cost and improve efficiency. We designed the transmitter and receiver as well as the test procedure. This project will be complete next year. Keywords: Air observation system, Military mission

39

Session ID: S5-4 (Paper ID: 60) Discrete Choice Modeling for Criminal Escape Path Analysis

Pakamaj Wongsai, Wichai Pawgasame Abstract A Criminal Escape Path is the path that a perpetrator uses to escape from a crime scene. Typically, perpetrators use unidentified vehicles to escape; making it more difficult for law enforcement to pursue. However, spatial-temporal information of perpetrators after committing a crime could be forecasted given that a crime scene’s origin, a road network, path attributes and some perpetrator’s attributes are known. Such predictive analysis requires a model representing the perpetrators’ decision when they have to choose a path among many alternatives. A discrete choice model can describe, explain, and predict choices between two or more discrete alternatives, which could be applied to model perpetrators’ escape path choice decision. Traditional discrete choice models are based on the logit model, and have been extensively applied in the fields of economic and transportation. However, the idea can also be applied to the decision modeling. The success of machine learning in data modeling and forecasting makes it very attractive to the field of discrete choice modeling. This article exploits both traditional approach and machine learning approach of the discrete choice modeling for a criminal escape path analysis. The criminal escape path choice models were developed based on both approaches, and the performance of both approaches was evaluated and compared based on the synthetic data. Based on the result from this study, the logit model can predict the path with the best accuracy of 81.833%. The result can be used as a guideline for criminal escape path modeling, which can be implemented in future decision support systems for tracing criminals. Keywords: discrete choice modeling, machine learning, criminal escape path analysis, decision support system. Session ID: S5-5 (Paper ID: 66)

A Review of License Plate Recognition (LPR) Chanatip Chuenmanus

Abstract License Plate Recognition (LPR) is a process of lo- cating and extracting the license plate information from captured images of a vehicle. The technology is widely used in various applications such as finding stolen vehicles, parking lot access control, toll payment and traffic monitoring system. License Plate Localization is the first phase of LPR to find the location of the license plate from the image. License Plate Character Segmentation and Recognition are two important phase of LPR to extract each character from the license plate and recognize each character. This phase is important for the accuracy of LPR because the performance of the extracting and recognized process is the result of LPR. In this paper, we have categorized existing methods of License Plate Recognition (LPR) based on the applied features. We review the methods in terms of

40

techniques, pros, cons, and limitations. Trends for future development are given at the end. Keywords: License Plate Recognition (LPR), license plate local- ization, license plate character segmentation, license plate character recognition Session ID: S5-6 (Paper ID: 75)

Stand-off IED/mine Detection by Log-periodic Dipole Antennas Imaging of the surface and buried objects

Tetsuya Kimata, Yukinori Fuse, Hirotomo Nakajima, Takamitsu Kunikata Abstract Stand-off detection system for improvised explosive devices (IED) and mines has been required in order to reduce damage caused by IED/mines on conflict areas. We accordingly try to prepare the stand-off detection system consisted of an unmanned aerial vehicle (UAV) and the log- periodic dipole antennas (LPDA). As the first step, we investigated the influence of the depression angle of the antennas and the interval between the transmitting and receiving antennas on the imaging of the surface and buried objects. Keywords: IED, Mine, Ground penetrating radar, Log- periodic dipole antenna, Delay and sum method Session ID: S6-1 (Paper ID: 25)

Curriculum optimisation via evolutionary computation, for a neural learner robust to categorical adversarial samples

George Leu, Jiangjun Tang, Erandi Lakshika, Kathryn Merrick, Michael Barlow Abstract In this paper we evolve curricula for improving the training accuracy of an agent that learns under the influence of adversarial alteration of training data, since adversarial influence is highly likely to be encountered in many defence and security operations. We consider categorical adversarial influence, where a fraction of the training samples is intentionally labelled with erroneous categories in order to misguide the learner towards malicious outcomes that jeopardise the mission success. Thus, we consider a supervised learning agent in the form of a deep convolutional neural network which learns to classify handwritten digits from 0 to 9, and we use a mutation-only genetic algorithm that evolves the sequence of the data samples in the training set (including the adversarial samples) in order to mitigate the influence of the adversarial samples on learning accuracy. We demonstrate that the genetic algorithm is able to obtain optimal curricula that provide the learner with the capability to perform well even when 20% of the training data are erroneously labelled. Keywords: defence and security operation, mission briefing, machine education, trustworthy agents, curriculum learning, adversarial sampling, convolutional neural network, evolutionary computation

41

Session ID: S6-2 (Paper ID: 79)

Temporal Relations Mining Approach to Improve Dengue Outbreak and Intrusion Threats Severity Prediction Accuracy

Nurfadhlina Mohd Sharef, Nor Azura Husin, Khairul Azhar Kasmiran, Mohd Izuan Ninggal

Abstract Time series analysis is one of the major techniques in capturing trends and pattern of the occurrence for future forecasting. Existing but scarce works have developed temporal based techniques which target to either predict movement (increase or decrease) or quantify the possibility of the predicted event to happen. Many of these techniques focus on the values of the time series attribute but there is no available work on dengue or intrusion logs that focus on temporal relationship pattern. In this work the proposed technique utilize the temporal relations patterns of the observational attributes towards the pattern of the target's attribute values. In this work, we propose a new analysis approach that uses temporal relation mining in forecasting dengue outbreak and cyber intrusion. We leverage the temporal abstractions and temporal logic to define patterns with the goal to optimize prediction accuracy. From the experiment conducted, the results showed that the proposed approach has better prediction as compared to the baseline. Keywords: Temporal Relations Mining, Dengue Outbreak Prediction, Intrusion Severity Prediction Session ID: S6-3 (Paper ID: 82)

From Human Machine Interaction to Human Machine Integration Ha, Le Thanh

Abstract The era of human machine interaction is giving way to the era of human machine integration in the broad sense of a partnership relationship between humans and machines. In interaction, humans and machines act with autonomy and give rise to patterns of integrative behaviors that must be considered holistically. This talk gives discussion about the trends of the transformation from Human Machine Interaction to Human Machine Integration at the view of real applications and technologies. Contributing to these transformation trends, emerging machine learning techniques playing vital roles in building core technologies are considered. In addition, from the new view points of human machine integration, designers, developers, and managers can improve human machine interaction. Finally, some of our IT products and research projects which contribute to this transformation will be introduced. Keywords: Human Machine Interaction, Human Machine Integration, Machine Learning

42

Session ID: S6-4 (Paper ID: 4) Target Classification of MSTAR SAR Images Taken From 30 ̊ Depression Angle

Using Deep Learning Kenji Hamano, Yoshinobu Hata, Shintaro Taira

Abstract In this paper, we present experimental results of target classification of synthetic aperture radar (SAR) images using deep learning when two depression angles for training and testing a classifier are more than ten degrees apart each other. Our experiments utilized a commonly used SAR dataset, namely the MSTAR dataset provided by the United States Air Force. Our previous study confirmed the effectiveness of deep learning for the use of SAR target classification by demonstrating that approximately 95% classification accuracy was achieved when the MSTAR SAR images from depression angles of 17 ̊ and 15 ̊ were used for training and testing, respectively. This motivated us to carry out further experiments when the depression angle difference is more than two degrees. When the difference is greater, the classification accuracy was found to decrease. So, two data augmentation methods are considered in this paper: one method is an artificial data augmentation by applying horizontal and vertical image flips to the training SAR images from 17 ̊ depression angle, and the other method is to additionally use real SAR imagery from 15 ̊ depression angle as the training SAR imagery. Although the first one is found to be ineffective, the second one succeeds to achieve approximately 95% classification accuracy for target images from 30 ̊ depression angle. Keywords: MSTAR, deep learning, neural network, target, classification, SAR, depression angle Session ID: S6-5 (Paper ID: 16)

Additional Feature CNN Based Automatic Target Recognition in SAR image Jun Hoo Cho, Chan Gook Park

Abstract In this study, we suggest additional feature based convolutional neural networks (CNN) for synthetic aperture radar automatic target recognition (SAR ATR) performance improvement. Previous SAR ATR researches need preprocessing process or prior information such as pose information due to severe image noise on SAR image. However, since the noise characteristics of the SAR image are different for each acquired image, recognition accuracy may be lowered if the preprocessing process is not performed properly. For this reason, we propose additional feature based CNN architecture which does not need additional preprocessing process or pose information. The proposed method consists of three steps. First, extract more detail information included features and noise reduced features from two CNNs using max-pool and average-pool subsampling operation. Second, the features extracted from the two CNNs are aggregated into a single column vector in order to consider both features in target

43

recognition. Lastly, train proposed CNN architecture using aggregated features and fully-connected layers. MSTAR SAR dataset is used for simulation and confirmed that proposed method can recognize targets more accurately than other methods. Using the proposed method in this study, we can recognize the 10 classes of military targets with accuracy of 94.38% without any additional preprocess or prior information. Keywords: Automatic Target Recognition; Synthetic Aperture Radar; Convolutional Neural Networks Session ID: S7-1 (Paper ID: 3)

An Attrition Game with Multiple Start and Destination Points Ryusuke Hohzaki, Luc Faugeras, Tetsuya Ouchi

Abstract This paper deals with an attrition game on a combat network, where attackers depart from multiple start nodes heading to multiple destination nodes and defenders deploy a limited number of members on arcs to intercept the attackers. Due to conflicts between the attackers and the deployed defenders, both players incur casualties or attrition on arcs. The attackers aim to bring as many members as possible to destination nodes while the defenders desires to minimize the number of surviving attackers. For the two-person zero-sum (TPZS) attrition game, we propose linear programming formulations to derive an optimal attacker’s strategy of their attack paths and an optimal defender’s strategy of deployment on arcs. Keywords: combat theory, game theory, attrition, network Session ID: S7-2 (Paper ID: 19)

Three Repair Options Depending on Failure Time for a System with Administrative Delay

Tomohiro Kitagawa, Tetsushi Yuge, Shigeru Yanagi Abstract A maintenance policy depending on failure occurrence time is proposed. Supposing a system equipped on a vehicle such as a vessel, which conducts a fixed period of mission like a voyage, we propose three options for a failure of a system occurred during the mission: (A) return to the base from which the vehicle departed and repair there, (B) instantaneous repair on-site and (C) to leave the failure and repair it after the end of the mission. Exponential distribution is supposed as the failure occurrence distribution of the system. Our goal is to determine the optimal action depending on the occurrence time of failures, where the optimal policy minimizes the expected cost until the completion of one mission, ensuring a certain mean availability. Keywords: administrative delay, constant-failure-rate system, maintenance policy, downtime Session ID: S7-3 (Paper ID: 37)

44

Simple Approximate Analysis for Parallel Queues with Patients’ Deteriorating Health Conditions

Yutaka Sakuma, Atsushi Inoie, Masahiro Kobayashi Abstract When a mass-causality disaster occurs, triage, i.e., categorization based on patients’ severity, is usually used in disaster and emergency medicine. It is important to plan an efficient allocation of the medical resources taking into account the waiting patients’ deteriorating health conditions. To this end, it is necessary to predict the congestion of patients waiting for their treatments. In this paper, we consider a queueing model with two categorized customers and generally distributed patience times, where the patient times refer to times until the patients’ categories change due to their deteriorating health conditions. For this model, we propose an approximate method to evaluate the system performance. We give some numerical examples of the approximation method, and compare those with simulation results. Those numerical examples indicate the validation of the precision of the proposed approximate method. Keywords: Parallel queues, deteriorating health condition, disaster and emergency medicine, general patience-time distribution, approximate analysis Session ID: S7-4 (Paper ID: 51)

An Improvement of Decoding Time of Ordered Stastistic Decoding for Midium Length LDPC Codes

Yuki Kawauchi, Kohtaro Watanabe, Seiji Kataoka Abstract It is well-known that the Sum-Product Algorithm (SPA) is an efficient algorithm for decoding Low Density Parity Check (LDPC) codes. In spite of this, for LDPC codes with medium length which are now attracting interests for the appli- cation to fifth generation systems, it is known that decoding error rate is much inferior to that of Maximum Likelihood Decoding (MLD). In this paper, we improve bit error rate of SPA with so called Ordered Stastistic Decoding (OSD) method by Fossorier [1].Especially, we improve stopping condition of combinatorial search in OSD method and demonstrate by simulation that the proposal stopping condition is more efficient compared to Fossorier (IEEE J. Sel. Areas Commun., 19, 2001). For that purpose, we introduce a conception “coincidence rate” which plays an important role. Keywords: LDPC code, OSD method Session ID: S7-5 (Paper ID: 11)

Optimal Military Unit Location as a Modified Set Covering Problem: Case Study of Pattani Province, Thailand

Seksun Moryadee Abstract This paper seeks to determine optimal military unit location for The Royal Thai Army

45

to deploy army forces in Southern Thailand by using Pattani province as a case study. The main objective of the Thai Army is to have a suit number of army bases and forces based on historical insurgency incidents and also to cover all districts within 60 kilometers. The paper intends to apply set covering problem from a military resource allocation perspective. Moreover, the paper also discusses literatures related to covering problems. A geographic information system was implemented to obtain parameter input for the model. Using Pattani province as a case study, this technique can find optimal military unit location and number of forces for military decision makers. Keywords: Set Covering, Optimization, Military Allocation Session ID: S7-6 (Paper ID: 15)

Facility Location for Earthquake Planning as a Set Covering Problem: Case Study of Chiangrai, Thailand

Satawat Doungpan, Seksun Moryadee, Chalida U-tapao, Laemthong Laokhongthavorn Abstract Natural disaster is a serious problem that is concerned by all mankind. Recently, the strongest earthquake of a magnitude of 6.3 ever recorded happened in Chiang Rai province, Thailand. It caused damage to number of buildings and infrastructures due to lack of disaster preparedness. The characteristics of earthquake are different by the active fault of area. In this paper, the disaster earthquake at Chang Rai province is investigated. The aim of our paper is to find the least number of emergency service facilities and their optimal locations so that they can cover all demand nodes. The method for finding the location responding to demand node of this work is the optimization modeling using set covering location problem(SCLP). The results are shown that we should set facility at Mueang Chiang Rai, Chiang Khong, Chiang Saen and Mae Suai districts. All districs can be covered by four facilities. Keywords: Natural Disaster, Earthquake, Operations Research, Facility Location Problems, Transportation. Session ID: S7-7 (Paper ID: 41)

A Concept for Applying Linguistic Geometry to Achieve Command and Control Agility

Jason Noble Abstract This paper describes a methodology for estimating command and control information exchange requirements by applying linguistic geometry grammars. The paper demonstrates the link between the actions of maneuver units on the battlefield, command and control processes, and information flow. We propose methods for data analysis of linguistic geometry simulations in order to enhance command and control agility in combined-arms operations at the operational level. Keywords: linguistic geometry, command and control, information management,

46

operations research, battle rhythm, net- centric warfare, operations; combat modeling Session ID: S7-8 (Paper ID: 68)

Technological Parity Awareness Toward International Defense Iron Triangle: A Case from KF-X/IF-X Joint Development

Semmy Tyar Armandha, Arwin Datumaya Wahyudi Sumari, Haryo Budi Rahmadi Abstract The KFX/IFX Joint Development project between Indonesia and South Korea, was built on the desire of both nations to build the self-sufficient defense industry in the middle of developed countries’ pace in the development of the world's main weaponry system. The project is eventually facing technology licensing problem from the United States (US). Notwithstanding the fact that the fighter being developed is Korea’s and Indonesia’s, yet most of the main technologies belongs to the US. This condition makes complexities of the project and promises no easy path ahead, especially related to technological issues in arms production, trade, and collaboration. These issues require the efforts of the developing countries such as Indonesia that involved in the cooperative projects involving developed countries. In terms of technology, the developing countries will never be able to compete with the developed countries. Therefore, the choice is only two namely, strengthen the diplomacy (politics), and strive to balance the technology (technology parity). Keywords: technological parity, international defense iron triangle, KF-X/IF-X joint development Session ID: S8-1 (Paper ID: 83)

Deep Learning for Entity Recognition: State-of-the-Art Methods Hien T. Nguyen, Thuan Q. Nguyen

Abstract Deep learning is a kind of representation learning − a subfield of machine learning. While most machine learning methods work well because of feature engineering, deep learning automatically learns good feature representations of input data at multiple levels. In this paper, we present distributed representations and deep learning models that automatically learn features for coarse- and fine-grained entity recognition. The former recognizes entities with very few types, whereas the latter identifies entities and classifies them into a large number of types. Until now, most of research on entity recognition has focused on the former. However, the latter is more challenging and has attracted much research attention recently. This paper presents state-of-the-art methods for both coarse- and fine-grained entity recognition. Keywords: entity recognition, distributed representation, deep learning, representation learning

47

Session ID: S8-2 (Paper ID: 88) Self-Localization and Spatial Recognition using Recurrent

Convolutional Neural Networks Masahito Yamamoto, Izuho Suginaka, Wataru Noguchi, Hiroyuki Iizuka

Abstract Self-localization and spatial recognition are both crucial abilities for autonomous mobile robots. In this paper, we propose a self-localization method by only using the first-person view captured by the camera on the robot. Convolutional neural network is used for estimating the self-position of the robot. It is shown that our proposed method is effective in the virtual world and can be also applied to the real robot environment. Recurrent convolutional neural network with the sequence of the view images as inputs works well for improving the accuracy of the estimation. Furthermore, we propose a hierarchical recurrent neural network model for the spatial recognition that can be obtained from only visual and motion experiences. Our model is applied a simulated mobile robot and trained to predict future visual and motion experiences and generate goal-directed sequences toward destinations that is indicated by images. Analyzing the internal state of the network, we show that the representation of the internal states corresponding to the robot position is self- organized through the simulations. Keywords: deep learning, recurrent convolutional neural network, self-localization, spatial recognition, autonomous mobile robot Session ID: S8-3 (Paper ID: 59)

A Dynamic Spectrum Allocation for the Military Cognitive Radio Network using Evolutionary Algorithm

Wichai Pawgasame Abstract A cognitive radio network introduces the idea of spectrum sharing among primary users and secondary users in the radio network. A dynamic spectrum access is the core technology of a cognitive radio network; in which unoccupied spectrum resources that are sensed by the cognitive radios can be efficiently utilized without disturbing the primary members. Unlike commercial network, each secondary radio node in military network can be allocated with unfair spectrum resources depending on its priority. This article exploits the cooperative dynamic spectrum allocation that every secondary members in the network can cooperatively allocate the available spectrum resources based on their needs and priorities. The evolutionary algorithm, specifically the particle swarm optimization, is explored and applied to the spectrum allocation such that a secondary member can learn and adapt to the spectrum access to optimize overall reward under the constraints of spectrum resource limitation, system limitation, and quality of services (QoS) of tactical data. The result from the experiment shows that the priority-based evolutionary algorithm yields better reward than the fair-based evolutionary algorithm and the random allocation algorithm.

48

Keywords: dynamic spectrum allocation, particle swarm optimization, cognitive radio network Session ID: S8-4 (Paper ID: 65)

Detection of Cocealed Weapon using Image Fusion Patiyuth Pramkeaw, Mahasak Ketcham, Thaweesak Yingthawornsuk, Peerapol Selarat

Abstract This research aimed to implement the image processing algorithm to develop a human and gun detection system. In order to analyze between normal persons and gunner via CCTV camera system, which received from camera and transforming the RGB colour picture to binary picture (black and white colours) with Adaptive Threshold technique. In order to separate the object picture from its background. And taking in account of analysis the object pictures for detection to match objects with the human. If the system found the human, the system will show a green colour frame around the normal person. Then the system makes segmentation and crops the body from human picture. If it has the gunner with colour filter technique, gunner will replaced by a red colour frame. The accuracy of black box testing has been evaluated within 100 times by dividing in 4 different ways. The result is as following: the accuracy of normal human detection in the standing posture equaling 94%, the accuracy of gunner detection in the standing posture equaling 86%, the accuracy of normal human detection in the sitting posture equaling 78% and the accuracy of gunner detection in the standing posture equaling 70%. In conclusion, this developed system achieved all research objectives and can be used in real world scenario successfully. Keywords: Image processing, Human detection, Threshold, Colour filter Session ID: S8-5 (Paper ID: 84)

Emergence metastable swarm behaviors using heterogeneous bias values Nhuhai Phung, Masao Kubo, Hiroshi Sato

Abstract In a swarm, macro candidate behaviors are created by micro interactions among individuals in which each individual agent has different personal attributes for each macro behavior (bias value). In this paper, we consider how to adjust macro candidate behaviors using heterogeneous bias values in order to obtain new emergence which called metastable swarm behaviors. We examine two methods, which are the homogeneous distribution method and the heterogeneous distribution method. The generation of bias values and the prompt attainment of an agreed behavior was observed when candidates switched behavior and the emergence of an agreement phenomenon occurred at different ratios for each behavior at the swarm level. Session ID: S8-6 (Paper ID: 85)

Improving Distributed Representation by feature selection of Wikipedia

49

Dao Van Tuan, Hiroshi Sato Abstract Distributed representation plays an important role in many application of Natural Language Processing (NLP). Today, Word2Vec model has been getting an attention against the backdrop of the easy access to enormous language data from the Internet such as Wikipedia. For the effective use of Word2Vec, we have to concern not only about the improvement of the method itself but also about the process of making training data. In this paper, we demonstrate that adequate selection of training data can make a great improvement of the performance of Word2Vec compared to existing research. We also confirmed that Wikipedia dump data is not a good source of training data as is. Keywords: Word2Vec, Distributed representation, Wikipedia, Pre-processing, Natural Language Processing Session ID: S9-1 (Paper ID: 9)

Technology Based Pilot Disorientation Countermeasures Bob Cheung

Abstract Spatial disorientation is defined as the failure to perceive, or to perceive incorrectly the position, motion and attitude of the aircraft or oneself within the veridical vertical and the earth horizontal reference. The mechanism of spatial orientation is based on the neural integration of concordant and redundant visual, vestibular and somatosensory inputs and critical interpretation with our internal model established from past experience and training. Unlike G-induced loss of consciousness or hypoxia, SD occurs in less well- defined environments and it is influenced by physiological and perceptual limitations. The complexity of SD in the flight environment demands a “wide-angle” holistic approach that includes research, training and technology advancement. Examples will be provided in this presentation to demonstrate the necessity of a coordinated effort from operators, scientists, engineers and research sponsors to lessen the impact of SD on flight safety. Keywords: pilot disorientation, countermeasures, flight displays Session ID: S9-2 (Paper ID: 21)

Human Performance Challenges in the Modern High G Flight Environment David G Newman

Abstract A modern high performance military fast jet aircraft operates in an extremely fluid three-dimensional flight environment, with a very complex G environment. The task of ensuring optimal performance of the pilot remains a significant challenge. There are a number of human performance issues in the high G flight environment that remain to be either fully understood or managed. These include super agile G tolerance, neck injuries,

50

spatial disorientation and assisted escape. The aim of this paper is to present these issues in order to highlight the research and development work that must be done in order to enhance the safety of those individuals who fly these aircraft. This work will require a multi-disciplinary collaborative effort involving pilots, scientists, aeromedical specialists and engineers. Keywords: acceleration, flight, performance Session ID: S9-3 (Paper ID: 24)

Fatigue-Induced Eye Behaviours Sheng Tong Lin

Abstract Surveillance operators are often exposure to long hours of monitor screen work. This paper presents an experiment that confirmed fatigue-induced ocular behavioral changes during an extended computer screen activity involving demanding visual search tasks that induced fatigue. Linear regression shown that 1) saccadic eye movement velocity consistently degrades (R2=0.58, p <0.01) and 2) pupil diameter gradually decreased (R2=0.79, p <0.01) with increasing fluctuation (R2=0.82, p <0.01) towards the end of the fatiguing experiment. Keywords: fatigue, eye tracking, saccadic velocity, pupil diameter, pupil fluctuation Session ID: S9-4 (Paper ID: 39)

Pilot Selection Analysis in ROKAF during 1-year : Medical Checkup Jiwoon Yeom, Hohyung Kang, Yumi Ha, Solmon Yang

Abstract As aircraft become more sophisticated, the mission of pilots to operate them has become more complex and diverse. As a minimum condition for safety, the physical examination of the pilot is very important. The Air Force Aerospace Medical Center has the task of selecting pilots for the air force and naval and civil aviation universities operating fixed wing aircraft. [Object] To investigate the reason for disqualification by analyzing the results of the physical examination. [Method] We retrospectively analyzed the subjects who received a pilot physical examination at the Air Force Aerospace Medical Center from June 2016 to May 2017. The age range is from 18 to 22 and the sex ratio is about 9:1 for male and female. [Result] 673 (43.2%) out of 1556 were disqualified. Most of them (N=483, 81.6%) were due to visual acuity and refractive errors below selection criteria. 109 had other ophthalmologic problems such as heterophoria or strabismus (N=35), retinal disease (N=33), corneal disease (N=10), color vision deficiency (N=8), and ocular hypertension (N=5). 81 had other causes, including underheight or overweight (N=15), hearing loss (N=12), musculoskeletal diseases (N=11), hematological or endocrine disorders (N=10), orthostatic hypotension (N=6), hypertension (N=7), lung disease (N=5), brain injury (N=3), and psychiatric problems (N=2).

51

Keywords: pilot, physical examination, disqualification Session ID: S9-5 (Paper ID: 45)

Remote Vision System Air Refueling Visual Performance Marc Winterbottom, Charles Lloyd, Eleanor O’Keefe, James Gaska,

Steve Wright, Tommy Bullock, Steven Hadley Abstract The performance and comfort of aircrew using stereoscopic displays viewed at a near distance over long periods of time are now important operational factors to consider with the introduction of air refueling tankers using remote vision system (RVS) technology. Due to concern that the current U.S. Air Force vision standards and test procedures may not be adequate for accurately identifying aircrew medically fit to operate this new technology for long missions, we investigated performance with the use of a simulated RVS and the ability of different vision tests to predict performance and reported discomfort. A second experiment compared stereo acuity using a computer-based stereo acuity test to depth thresholds in a simulated RVS environment. The results showed that individuals with poorer vision test scores performed more poorly and reported greater levels of discomfort. In general, newly developed computer- based vision tests were more predictive of both performance and reported discomfort than standard optometric tests. The results also show that most observers can detect very small changes in depth using the simulated, hyper-stereoscopic RVS, but that the combined effects of crosstalk, image distortion, and edge effects/frame violations can impair performance. Keywords: air refueling, remote vision system, RVS, stereo displays, 3D displays, hyper-stereo, stereo acuity, vision standards Session ID: S9-6 (Paper ID: 48)

Role of Aviation Medicine in Safety in the Royal Thai Air Force Supachai Sinthavalai

Abstract Since the establishment of the Royal Thai Air Force, there was a group of people who used their knowledge in the field of medicine to enhance aviation safety. They took part in caring of pilots from cradle to grave. From the selection to training and at operation units, they were with them. Even when the pilot got aircrash, they were with the team to rescue and recover. They are called the AvMed people. The author will discuss importance of Aviation Medicine in the Royal Thai Air Force in the safety aspect, the safety activity of AvMed people, especially in physiology training. Session ID: S9-7 (Paper ID: 14)

Voice analysis researches and application in the JASDF Hiroto Kikuchi

52

Abstract This paper reviewed voice analysis researches and application in the JASDF, and concludes with a proposal of future research utilizing state of the art analysis method for voice analysis as pilot states estimation and monitoring method, under physiological and psychological workload. Keywords: voice analysis, stressor, workload, monitoring Session ID: S9-8 (Paper ID: 20)

Aviation Physiology Training in Military Aviation of the Future Transformation through Technology

Swee Weng Fan Abstract Aviation Physiology Training continues to play a major role in sustaining the operational readiness and safety of military aviators. Technological advances now enable physiology training and operational flight training to be conducted seamlessly as a single entity. This allows aviators to experience operationally relevant training interlaced with authentic physiological phenomena, producing a multiplicative gain in overall training output. Continuing advances in simulation and computing technologies will continue to bring physiology training and operational training closer in a synergistic relationship, providing the aviator with the most authentic flight simulation environment for effective training. Keywords: aviation physiology training, human centrifuge, high-G training, spatial disorientation, ejection seat training, dynamic flight simulation Session ID: S9-9 (Paper ID: 27)

Electrophysiological Steady-State Responses in Flight Simulator Trainings Masashi Arake, Shunsuke Hayashi, Aki Tsuruhara, Nobuhiro Ohrui, Takenori, Nomiyama Asao Kobayashi, Yusuke Yokota, Yasushi Naruse, Hiroyuki Ohta,

Masanori Fujita, Yuji Morimoto, Nariyoshi Shinomiya Abstract This presentation introduces two experiments of steady-state responses utilization for the flight simulator trainings. In the first experiment, changes of auditory steady state response (ASSR) during a series of flight simulator training were assessed. In the on-going second experiment, we are now trying to capture the course of visual abnormality in high-g training via steady-state visually evoked potential (SSVEP). Keywords: electroencephalography, steady-state responses, improvement in flight simulator training, gray out Session ID: S10-1 (Paper ID: 26)

Theoretical investigation of molecular calculations on inclusion complexes of plumbagin with β-cyclodextrins

53

Ornin Srihakulung, Luckhana Lawtrakul, Pisanu Toochinda, Waree Kongprawechnon, Apichart Intarapanich, Ryo Maezono

Abstract Molecular docking and semi-empirical calculations were used to establish the molecular model of Plumbagin inclusion complex with β-cyclodextrin (BCD) and its two derivatives, Methyl-β-cyclodextrin (MBCD) and Hydroxypropyl-β-cyclodextrin (HPBCD). The electronic structures and the binding energies of 1:1 inclusion complexes of host:guest ratio were calculated by Parametric Method 3 (PM3) calculations both in gas phase and in aqueous phase. Our results indicate the possibility of using BCD and its derivatives to encapsulate Plumbagin to prevent product degradation. MBCD forms the most stable inclusion complex with the binding energy -11.10 kcal/mol and -4.30 kcal/mol in gas and aqueous phase, respectively. Keywords: inclusion complex, molecular modeling, biological security Session ID: S10-2 (Paper ID: 67)

A Method of Multirate Sensor Fusion for Target Tracking and Localization using Extended Kalman Filter

Thanan Yomchinda Abstract This paper presents a method of target tracking and localization for surveillance vehicle with visual-inertia sensor-fusion using extended Kalman Filter (EKF). In this application, the visual information is obtained using rotating camera and laser range finder. The visual used data are to incorporate inertial measuring unit (IMU) in the determination of position and velocity of the surveillance vehicle and also used to determine the position and velocity of the target which is moving with respect to the moving surveillance vehicle. As the camera is rotating, the visual data is available in aperiodic intervals (i.e., the target/landmark is presented in the field of view). Here, an EKF is used as state estimator to describe the position and velocity of the surveillance vehicle from the noisy, multi-rate measurements given by the sensing system. The prediction and measurement models are developed for vehicle and sensing system movement. The numerical simulation is used to investigate the performance of the proposed method. The simulation results show that proposed method is able to improve the localization. Keywords: multirate sensor fusion, tracking and localization, extended Kalman filter Session ID: S10-3 (Paper ID: 80)

Analysis of Criminal Behaviors for Suspect Vehicle Detection Ubon Thongsatapornwatana, Woraphon Lilakiatsakun,

Akkarach Kawbunjun, Tossapon Boongoen Abstract The crime problems become critical issues for na- tional security especially the security

54

of border and intelligent transportation systems (ITSs). These affect the economy, invest- ment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart. Keywords: Suspect Vehicle Detection, Crime Pattern Analysis, Transportation Safety Session ID: S10-4 (Paper ID: 89)

On Cyber Attacks against Critical Infrastructures Hsu-Chun Hsiao

Abstract Critical infrastructures (CIs) are the fundamental sectors (e.g., energy, transportation, government, telecommunication, financial services, and health) for maintaining a nation’s societal functions. As CIs are increasingly connected with public networks, CIs have become an attractive attack target for cyber criminals and cyber warfare. For example, attacks such as Denial-of-Service (DDoS) have demonstrated the capability to cause hours- and even days-long outages, jeopardizing governmental, financial, telecommunications, transportation, and healthcare services. DDoS attacks continue to be a major threat today and have been evolving in both scale and sophistication. With the growing intensity and frequency of DDoS attacks, can CIs provide actionable and meaningful availability guarantees despite active adversaries? In this talk, I will begin with several high-profile incidents and discuss the cyber attack surface of critical infrastructures. I will then introduce two common attack vectors, Distributed Denial-of- Service (DDoS) attacks and zero-day vulnerabilities, and discuss their trends and the state-of-the-art attack and defense techniques. Keywords: critical infrastructures, cyber attacks, distributed denial of service, zero- day vulnerabilities Session ID: S10-5 (Paper ID: 34)

Exploring the Usability Factors of Military Application: A User Study Md Abdur Razzak, Muhammad Nazrul Islam

Abstract

55

Usability is the key quality attribute for any software system. Use of Information Technology (IT) applications in different fields is versatile. Defence forces are also using the IT based tool to enhance the soldiers capacity as IT started shaping all wakes of life. The explicit set of usability factors for developing the military applications are not explored yet. The aim of this paper is to reveal the possible usability factors for developing military application. In other words, this study is carried out to derive the key metrics to measure the usability standard of any military application. The study followed a Focused Group Discussion (FGD) method and replicated with 20 military personnel. The study results provide a list of usability factors that include, for example, ease of use, health hazard, placement and integration of accessories, chain of command supportive, and availability. The results also showed that some of the usability factors (revealed in this study) are more pertinent in military application than other application fields. Keywords: usability, usability evaluation, human-computer interaction, focused group, defence software, military application Session ID: S10-6 (Paper ID: 35)

Constrained Clustering with Feature Weighting Scheme Uraiwan Buatoom, Waree Kongprawechnon, Thanaruk Theeramunkong

Abstract While supervised learning is fully guided, and un- supervised learning is blind, semi-supervised learning is partly guided with a small number of labeled instances and a large number of unlabeled instances. However, most semi-supervised learning, particularly for classification tasks, focuses on a set of pre-defined classes with a aim is to increase the performance of supervised learning (i.e., classification) using unlabeled data. This paper presents a new framework of semi-unsupervised learning, particularly constrained clustering, where the number of classes are unspecified, and the clustering guidance comes from the statistics of a small set of labeled data. In contrast with existing approaches in constrained clustering where binary decision (MUST-LINK vs CANNOT-LINK) are specified, our work investigates how weightings obtained from a training set affect the clustering result. By experiments, three groups of term-weighting statistics; collection, intra-class and inter-class frequencies/distributions, are studied using text datasets, an image dataset, and a transactional dataset. The result depicts that term weighting is a potential means to control/guide the clustering process towards user intentions. Keywords: Semi-unsupervised, Feature weighting, Intra- class and inter-class frequencies/distributions Session ID: S10-7 (Paper ID: 61)

Visualization of Air Quality around the proposed Coal-Fired Thepa Power Plant Kittichai Phukan

56

Abstract Thepa power plant is the proposed power plant construction project in Songkla province, Thailand. The problem of the proposed coal-fired Thepa power plant is that it will releases sulfur dioxide (SO2) into the air as a polluted colorless gas. Sulfur (prune) smell is very poignant and irritating, and dissolve very well in water. Sulfur dioxide, when combined with sulfuric acid, corrodes and destroys buildings. It is a byproduct of coal combustion and sulfur fuel. In this article, we use the Google Earth map and the ALOHA program to analyze the possibility of the distribution of sulfur dioxide (SO2) of the Thepa coal-fired power plant over a period of 3 months. The data used in the analysis includes chimney position, chimney heights, chimney diameter, temperature, the velocity of sulfur dioxide emissions, the speed of sulfur dioxide emissions, altitude from the sea level, and climate. This will give us the possible direction and distribution of the gas zone. The concentration of gas makes it known that the area would be suitable for living. Keywords: geographical information system, air pollution monitoring Session ID: S11-1 (Paper ID: 90)

Blast-induced traumatic brain injury: Clinical features, Mechanism, Prevention Atsuhiro Nakagawa, Kiyonobu Ohtani, Atsushi Sakuma, Mao Yagihashi,

Chikashi Nakanishi, Hideaki Karasawa, Shinichi Yamashita, Noriko Matsui, Yu Terui, Shiori Kudo, Akane Saito, Shoko Inoue, Keiko Furuya,

Teippei Tsujita, Atsushi Konno, Teiji Tominaga Abstract Blast-induced traumatic brain injury (bTBI) have been signature of recent war and conflict. TBI caused by explosive or blast events is traditionally divided into four phases: primary, secondary, tertiary, and quaternary blast injury. These phases of bTBI are biomechanically distinct and can be modeled in both in vivo and in vitro systems. The primary bTBI injury phase represents the response of brain tissue to the initial blast wave. Among the four phases of bTBI, there is a remarkable paucity of information about the mechanism of primary bTBI. On the other hand, 35 years of research on the medical application of shock wave (SW) has given us insight into the mechanisms of tissue in bTBI. In this paper, we will discuss clinical features of bTBI, and also on mechanism of bTBI from the viewpoint of SW research. We would like to emphasize to prepare for this entity due to change of global unstable issue. Keywords: Emergency Medicine, Multidisciplinary approach, Neurocritical care, Terrorism; Session ID: S11-2 (Paper ID: 91)

State-of-the-Art in Blast Induced Brain Injury Understanding Raj K. Gupta

Abstract

57

Despite being one of the most common injuries to military personnel, the actual understanding of the physical, biomechanical, physiological, and biochemical mechanism of blast-induced traumatic brain injury remains a mystery. Over the past decade, several different mechanisms, including the most commonly discussed diffuse axonal mechanism have been proposed in the literature. Recently a new mechanism involving synaptic injury that could lead to temporary disconnect of the neural circuitry and transient loss in communication has also been hypothesized. This talk will provide a detailed overview of our current understanding of the underlying mechanisms of traumatic brain injuries upon blast overpressure exposure and recent efforts through International Collaborations to address some of the issues involved with the difficulties and challenges to gain such understanding. Keywords: Blast over pressure, Traumatic brain injury, blast, axon, synaptic injury Session ID: S11-3 (Paper ID: 92) Application of Bio-Templated Metal Nanoclusters to Study Blast-Induced Injuries

Shashi P. Karna Abstract Understanding the effects of blast overpressure on human tissues is the critical first step toward developing protective and therapeutic measures. A critical challenge in developing an understanding of pressure-injury relationships is the lack of reliable techniques to map the local pressure and the amount of energy transferred to biological tissues under blast conditions. In order to address this technical challenge, we have begun to create nano-scale tool set that can be used to accurately capture the local pressure experience by biological systems at cellular level. The tool set consist of bio-templated metal nanoclusters which exhibit intense photoemission in the visible that is tunable and pressure sensitive. This allows to establish a pressure-fluorescence intensity map, which can be used to quantify the local pressure under blast condition and offer real-time imaging. This talk will present an overview of the chemistry, photo physics, and pressure response of the fluorescent intensity in protein and tissue- templated metal nanoclusters. Keywords: Bio-templated nanoclusters, pressure-sensitive fluorescence emission, blast overpressure Session ID: S11-4 (Paper ID: 93)

Laser-induced shock wave: A new tool for blast injury research Shunichi Sato, Satoko Kawauchi, Izumi Nishidate

Abstract Frequent occurrence of attacks using improvised explosive devices (IEDs) has resulted in an enormous number of victims suffering from blast-induced traumatic brain injury (bTBI). More than 80% of the victims have been diagnosed as having mild bTBI (mbTBI), but many of them show serious higher-order brain dysfunctions. However, the

58

mechanism and pathophysiology of mbTBI are unclear, and no reliable animal model has yet been established for mbTBI. We have been using a laser- induced shock wave (LISW) to investigate blast injury. LISWs are characterized by highly reproducible and controllable shock wave energy, providing unique shock wave irradiation conditions in an animal study. The spatially confined shock wave energy of LISWs enables isolation of the events occurring in a living body. In addition, we can place sensors in close vicinity of the shock wave source, enabling real-time monitoring of the tissue and organs exposed to a shock wave. Furthermore, neither dynamic pressure (jet) nor macroscopic acceleration is generated with an LISW, and we can thus observe pure effects of a shock wave on the living body. An LISW(s) has (have) so far been applied to the brain, lungs and inner ears of rodents, and the tissues have been examined from various points of views. One problem in the use of LISWs is a considerable difference in the pulse duration between LISWs and shock waves caused by actual explosions. The typical duration of LISWs is less than 1 µs, while that of the shock waves caused by IEDs ranges from 250 µs to 700 µs. Although the impulses, which are known to be the most important parameter to determine shock wave injury in tissue, are similar in LISWs and IED shock waves, the large difference in pulse durations may be a problem for LISWs to replicate bTBI. Thus, we have been trying to modify or extend pulse durations of LISWs. We can now control LISW duration in the range of 1 µs ~ 30 ms by changing the conditions of laser irradiation and LISW propagation/interaction. Keywords: blast-induced mild traumatic brain injury (mbTBI), laser-induced shock wave (LISW), controllability, positive pressure duration Session ID: S11-5 (Paper ID: 94)

Vehicle occupant protection against blast induced accelerative loading Masayuki Sakamoto

Session ID: S11-6 (Paper ID: 95)

In vivo evaluation of neurovascular functions in rat brain using diffuse reflectance spectroscopy

Izumi Nishidate, Afrina Mustari, Satoko Kawauchi, Shunichi Sato, and Manabu Sato Abstract We investigated a rapid imaging method to monitor the spatial distribution of total hemoglobin concentration (CHbT), the tissue oxygen saturation (StO2), and the scattering power b in the expression of µs’=aλ-b as the scattering parameters in cerebral cortex using a digital RGB camera. In the method, the RGB-values are converted into the tristimulus values in CIEXYZ color space which is compatible with the common RGB working spaces. Monte Carlo simulation for light transport in tissue is used to specify a relation among the tristimulus XYZ-values and the concentration of oxygenated hemoglobin (CHbO), that of deoxygenated hemoglobin (CHbR), and the scattering power b. In the present study, we performed sequential recordings of RGB

59

images of in vivo exposed rat brain during the cortical spreading depolarization evoked by the topical application of KCl. Changes in CHbT and StO2 imply the temporary change in cerebral hemodynamics during CSD. Decrease in b was observed before the profound increase in CHbT, which is indicative of the reversible morphological changes in brain tissue during CSD. The results in this study indicate potential of the method to evaluate the pathophysiological conditions in brain tissue with a digital RGB camera. Keywords: hemoglobin, tissue oxygen saturation, light scattering parameter, brain function, cortical spreading depolarization, RGB camera, Monte Carlo simulation, multiple regression analysis Session ID: S11-7 (Paper ID: 96)

Cortical spreading depolarization, pressure distribution and oxidative stress in a rat brain exposed to a laser-induced shock wave

Satoko Kawauchi, Michiyo Sakamaki, Yukari Komuta, Chinami Onuma, Izumi Nishidate, Hitoshi Tsuda, Kenichi Kaida, Shunichi Sato

Abstract In recent years, blast-induced mild traumatic brain injury (mild bTBI) has been a serious problem due to frequent attacks using improvised explosive devices (IEDs). Many victims suffer from mental and psychiatric symptoms such as lack of concentration, dizziness and memory deficiency. However, the mechanisms and pathophysiology of mild bTBI have not been fully understood. We have been using a laser-induced shock wave (LISW) to investigate mild bTBI. We previously observed in the rat brain exposed to an LISW that cortical spreading depolarization (CSD) was generated without hemorrhage in the ipsilateral cortex and this was accompanied by long-lasting hypoxemia (S. Sato et al., PLoS ONE, 9, e82891, 2014). We are currently concerned about how such impairment of cerebral oxygen metabolism leads to subsequent histopathology in the brain. In this study, we assessed oxidative stress, which is known to be associated with neuroinflammation and aberrant protein accumulation. Immunohistochemical staining of 4-hydroxynonenal (4-HNE), which is a major by-product of lipid peroxidation, was performed for the rat brain that had been exposed to an LISW. The results showed that at 2 h after LISW application, immunofluorescence associated with 4HNE expression was widely observed in the ipsilateral cortex, and the area showing strong fluorescence was closely coupled with the region where CSD and hypoxemia occurred. In the contralateral cortex, where CSD did not occur, on the other hand, immunofluorescence was relatively weak. These results suggest that oxidative stress in the rat brain exposed to an LISW is strongly associated with CSD and concomitant long-lasting hypoxemia. To better understand the spatial distribution of oxidative stress, we also simulated two- dimensional pressure distributions in the brain on the basis of a finite element method. Keywords: Blast-induced mild traumatic brain injury, oxidative stress, cortical spreading depolarization, long-lasting hypoxemia

60

Poster ID: P-1 (Paper ID: 12)

Attacking AES Encryption Device with Differential Power Analysis Septafiansyah Dwi Putra, Adang S. Ahmad, Sarwono Sutikno,

Yusuf Kurniawan, Arwin D.W. Sumari Abstract Cryptographic algorithm implementations on em- bedded systems is now a challenge not only on design aspects secure cryptographic algorithms alone. Is a big challenge can also be felt on the pattern of passive attacks (SCA). This paper this paper is to investigate the common form of the problem of SCA attack and test one of the SCA’s attacks of differential power analysis (DPA). The implementation form of DPA is by attacking the AES (Advanced Encryption Standard) encryption with DoM(difference of means) techniques. Our attack method obtains all 128-bit AES secret keys from the encryption device with 1050 traces. Keywords: AES, DPA, SCA,Power, Encryption, Attack Poster ID: P-2 (Paper ID: 29)

Evaluation of Equipment Dispatching on Container Terminal Operations using Multi-Agent-Based Simulation

Augie Widyotriatmo, Maristya Rahmadiansyah Abstract This paper presents the multi-agent-based simulation for equipment dispatching on container terminals. The multi-agent-based simulation is developed to perform the terminal operation including loading-unloading-delivering- receiving tasks. The parameters of multi-agent-based simulation is observed at a container terminal and the speed of equipment is investigated. The rules-of-thumb in the container terminal is evaluated whether the optimal solution for normal condition is achieved. The rules-of-thumb is then used as the baseline in the search of optimal solution. The simulation results are consistent with the real situation at that container terminal. The equipment utilization when the equipment is human-operated or is automated system are discussed. Keywords: multi-agent-based simulation, container terminals, equipment dispatching, resource planning, optimization, human- operated, automated system Poster ID: P-3 (Paper ID: 36)

The Implementation of The Deradicalization Program in Indonesia: A Case Study of Counterterrorism in Indonesia

Muhamad Affin Bahtiar, Arwin Datumaya Wahyudi Sumari Abstract Several responses from the government have been done to overcome the act of terrorism,

61

one of the policies made us to implement deradicalization as the Soft Approach policy. Unfortunately, the deradicalization program has not been optimally implemented, which is marked by the existence of terrorist recidivists; yet, one of the aims of deradicalization is to direct perpetrators in order to leave perspective, view, attitude and act of terrorism. This paper aims to describe the implementation of deradicalization program as one of the aspects in defining how success the program applied in Indonesia is. This paper is written using qualitative approach with triangulation technique. The theory used as analysis tool is public policy implementation theory that explains key aspects in the implementation of deradicalization program. The finding in the field indicates that aspects in the public policy implementation theory are not yet implemented well by the related governing agencies. Such aspects include communication, resources, attitude of the organizer, and bureaucracy. The key issue is the absence of clear law. In accordance to such issue, special consideration from the government is required to prioritize the existence of legal protection governing deradicalization program in specific so that Cipinang Prison, National Counterterrorism Agency, and other program implementing agencies can be able to implement the deradicalization program much better. Keywords: deradicalization, public policy, soft approach, terrorism Poster ID: P-4 (Paper ID: 42)

RCS Estimation on Ground Moving Target using LTE Signal Noor Hafizah Binti Abdul Aziz, Syarafuddin Bin Zainodin

Abstract The ground moving target, there are very important to identify the radar cross section for radar detection. This simulation to learn how LTE signal as a source of passive bistatic radar. By using LTE signal as a source in passive forward scatter radar system, ground moving target can be classified in dimensions. This simulation can be performed by using Computer Simulation Technology (CST) Microwave Studio. By this software, the value of radar cross section (RCS) can be calculated very precisely. In this case, three designs for 3D models of cars are designed by using Autodesk Maya software to differentiate each cars. The main differentiate are by the size of each car. There are BMW X4 labeled as the biggest car,BMW 3 series as the medium car and the mini cooper as the smallest car. These values of RSC will be observed between the transmitter and receiver with operating under the frequency 2.6GHz.The simulation result show that the biggest car which is BMW X4 has the largest radar cross section (RCS) value and mini cooper have the smallest. There also have a different pattern of lobe on each car. Keywords: RCS, LTE,passive forward bistatic radar Poster ID: P-5 (Paper ID: 44)

War Game Simulation As Media Learning for Defense And Security:

62

Economic Warfare Simulation in Indonesia Context Idham Wahyudi, Arwin Datumaya Wahyudi Sumari, Haryo Budi Rahmadi

Abstract Simulations are often used as a learning method and one method that can be used is a simulation game. Simulation game has been selected for learning because a certain condition is very difficult if directly carried out in the real world. One form of learning that is difficult to be carried out in the real world is economic warfare. This study focuses on the creation of economic warfare simulation using the game that is easy to be understood and fun. This research was conducted by using System Engineering method combined with interdisciplinary approaches to create an exact model of economic warfare. Once the model is formed, the next step is to create the economic warfare simulation tool with board game method. The patterns of economic warfare that are simulated through the board game is named Datasawala. The game can be played with easy and fun manner. The Datasawala board game is based on the examination of theory and practice that adapted from the real events in the economic warfare, then drafted into game mechanics and components. Game mechanics, components and strategies when played, can create interactions that can be felt in the form of game experience. The prototype has been tested seven times by involving 13 people to play the simulation game. The results show a pattern of economic warfare in the context of Indonesia’s geostrategy Astagatra. In addition, there is also economic weapon used to seize resources and weaken the power of the military. Keywords: economic warfare, simulation, board game, system engineering, defense and security Poster ID: P-6 (Paper ID: 46)

The Tracked Robot for Explosive Ordanance Disposal (EOD) Mission Performance Test and Navigated Locomotion using IMU and GPS

Aran Blattler, Amornphun Phunopas, Wisanu Jitviriya, Sho Yamana, and Saji Keita Abstract Nowadays, a violent attack from a terrorist uses an explosive device to destroy the asset and people. When the explosive device is found, the bomb-defusing mission is very harmful to humans. Using a robot in the bomb-defusing mission is safer than using a human operator. This research describes how to develop the locomotive driving system of the explosive ordnance disposal (EOD) robot, which is improved from the champion of the rescue robot competition in the world RoboCup 2016. The robot's base has a compatible design to install new devices such as a recoilless disruptor and a robot arm. The robot has two caterpillar wheels, which can be driven separately. Each side of the caterpillar wheel works together with the flippers linking the front and rear sprockets to move forward, turn left, and turn right. The flippers are very useful for climbing across the stairway. When the robot stretches its front and rear flippers to a horizontal level, the overall length of the base is 1.05 meters, the width is 0.62 meter, and the height is

63

0.21 meter not including the camera stand and the antenna. The robot has a weight of 57 kilograms and a maximum velocity of one meter per second on the flat plane. The robot can move at an inclined 45-degree angle. The robot can drag 15 kilograms of payload weight. The wireless control area is 100 meters. The continued operation is one hour. The robot has water protection to a certain extent. All mechanical parts are made in Thailand. Finally, the robot is simply tested for the autonomous navigated locomotion from point to point using IMU and GPS. Keywords: Rescue robot, EOD robot, Tracked wheel, Navigated locomotion. Poster ID: P-7 (Paper ID: 49)

Applying RFID System for Maritime Object Management: Design and Its Prototyping

Yasuhiro Sato, Masaaki Yamanka, Natsuki Kawai, Seiya Wanibe, Yoshinori Matsuura Abstract Radio Frequency Identification (RFID) system is widely adopted to identify objects such as passenger identification and container management. The key advantages of RFID system are the ablility to identify objects without physical contact and to write arbitrary information into RFID tag, both may help to improve maritime safety and efficiency in activity on the sea. In this paper, we propose to apply RFID system for maritime activities in identifying floating objects on the sea, and realize a maritime object identification system using RFID as a prototype for our proposal. To achieve our goal, we specifically investigate degradation factors which may influence the performance of RFID system. We measure the received signal strength reflected from RFID tag in various situations (e.g. weather condition) on the sea. Moreover, we designed a maritime object identification system using RFID system for practical use, and implement our system through a smartphone application to reduce initial costs. Keywords: Radiofrequency identification, RFID tags, Marine safety, Marine accidents Poster ID: P-8 (Paper ID: 56)

License Plate Recognition for Tracking Vehicles Narumol Chumuang, Pisit Chansuek, Mahasak Ketcham, Apichat Silsanpisut,

Thittaporn Ganokratanaa, Pol.Lt.Col.Peerapol Selarat Abstract The license plate recognition for tracking stolen vehicles, the system will read the car license plate and compare with the database. Then, the system will send the warming immediately if such car is in the blacklist. The research and de ve lopment te am has de veloped the license plate Re cognition by developing from microsoft visual studio 2015, VB.NET language and EmguCV command. We use the image processing and k- Nearest Neighbor (k-NN) algorithm to recognize numbers on the license plate. The experiment results, shows that the system is able to read the license plate in the middle of the image, at 1- meter distance with 100% accuracy from the samples of 30 images.

64

Moreover, it is able to recognize the license plate from the tilted position at 80 degrees’ angle and 100 degrees’ angle for the distance more than 1 meter with 50% accuracy from the samples of 30 images. Keywords: Component, Vehicle, License Plate, k-Nearest Neighbor, k-NN, recognize, Tracking Poster ID: P-9 (Paper ID: 63)

Military Applications of Blockchain Technology for Defense Nikhom Koprach

Abstract The purpose of this paper is to present blockchain technology and leverage for national defense.Successful cyber attacks can destroy communications systems, military jets, or even public agencies such as hospitals, power plants, and telecom- munications poles in the city, etc. Blockchain is a technology that brings trust credible security. The public ledger technology that underlies the cryptocurrency bitcoins has been hailed as a technological innovation that is predicted to be even more impactful as the Internet. The possible military applications of the blockchain that are defence cyber warfare. The goal is to create tamper-proof military computer systems, including those systems used to control weapons. We should research and develop blockchain technology and leverage it for national defense. Poster ID: P-10 (Paper ID: 64) Thailand’s Defence Industry Policies toward practical Thai – Japan Collaboration

Effort Vissanu Mungkung

Abstract The three principles opens up the opportunities for business in defence sector to operate in Thailand. However, the author recently conducted interviews and surveys executives from major Japanese companies regarding approaching defence related business in Thailand. They find that there are obstacles in the clarification of regulation, policies and authorities in place to enable them to generate practical collaboration and share their expertise. The objective of this paper is to provide an overview of Thailand defence industries strategies, polices to states that wish to collaborate with Thailand. Keywords: Defense Acquisition Poster ID: P-11 (Paper ID: 69)

Car Logo Detection using Sift Somkheart Kraisin

Abstract At present, The number of cars in Thailand is increasing every day. The data management by human is limited due to the difficulties in recording the data or

65

confirming car identity. The computer is necessity in verifying cars. This research used SIFT in verifying car’s brand. The research is divided to two parts that are Query Images and database image.Query Images is a car logo of each brand and Query Images is a car image from CCTV by using SIFT Algorithm in computing similarity distance and comparing with logo in Database Images. Then selecting the most similar image for voting the result by using SiFT algorithm and developing with python. Keywords: Sift, Image Processing, Pattern Matching Poster ID: P-12 (Paper ID: 71)

Automatic detection of knives in infrared images Sumeth Yuenyong, Narit Hnoohom, Konlakorn Wongpatikaseree

Abstract The researchers present an experiment on automatic detection of concealed knives in infrared (IR) images. The researchers generated a dataset, called the IR dataset, which contained 8,527 images. The dataset was divided into two groups of IR images comprised of person without knife and person with a knife. Knives of different shapes and sizes were concealed under normal clothing, then images of person subjects carrying hidden knives were taken with a smartphone IR camera add-on. A deep neural network that was trained on natural image (ImageNet dataset) was fine-tuned to classify the IR images as person, or person carrying hidden knife. The classification accuracy on a separate test set shows that hidden knives can be detected at 97.91% accuracy. Keywords: Infrared images, person, knife, smartphone, IR camera Poster ID: P-13 (Paper ID: 72)

Experimental Study on the RC slab damage under close-in blast loads Yanchao Shi, Zhong-Xian Li, Baisheng Jia

Abstract When the accidental explosion or terrorist explosion occur in the close range of the structural component, the damage modes of the structural member will be different from the case of distance explosions because the blast load. The non-uniform distributed blast load, which is normally of great peak pressure, will cause complicated local damage to the structural members, especially for RC structural members. In order to investigate the damage mechanism of typical RC structural members under close-in blast loads from TNT charge with different charge weight, experimental studies on the RC slab damage are carried out under blast loads from explosions with different scaled distances. The local damage such as crushing and spalling, as well as the overall damage of the RC slabs are to be observed. Comparisons are also made to investigate the relationship between the damage modes and the blast load applied. The characteristics of the local damage and overall damage of the test specimens are also compared and presented. Keywords: experimental study, RC slab, close-in blast loads, damage mode

66

Poster ID: P-14 (Paper ID: 73) Finite Element Analysis of Al7075 Aluminum Floor Joist for M4 Military Bridge

Nutthaporn Nutayasakul, Thatchai Thanapisudwong, Chuan Chantawan, Chalit Santitararag

Abstract The objective of this research is to compare the results between the finite element analysis of aluminum floor joists used for M4 military bridges and the test results. The finite element analysis shows the maximum deflection and Von-Misses stress of simple supported beams subjected to loading of typical joist of the M4 military bridge. Keywords: Floor Joist, Al7075, Military Bridge, M4, Finite Element Analysis

67

Memo

68

Memo

69

Memo