scispace - formally typeset
Search or ask a question
Institution

National Defence University, Pakistan

EducationIslamabad, Pakistan
About: National Defence University, Pakistan is a education organization based out in Islamabad, Pakistan. It is known for research contribution in the topics: Context (language use) & Decision support system. The organization has 802 authors who have published 816 publications receiving 3701 citations. The organization is also known as: National Defence University of Pakistan & National Defence University Islamabad.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors take into account the nature of armed conflict which has potential to be converted into an international armed conflict from a non-international armed conflict (NIAC), and suggest a collaborative effort by considering other social, political and economic factors to minimize the violation of International Humanitarian Law.
Abstract: While assessing the legality of the US drone strikes in Pakistan, this article takes into account the nature of armed conflict which has potential to be converted into an international armed conflict (IAC) from a non-international armed conflict (NIAC). The growing trust-deficit between Pakistan and the US is catalyst for determination of nature of armed conflict. The arguments based on tacit consent of Pakistan no longer stands valid after a clear protest by Pakistani officials at national, bilateral and international level. It also examines the observance of the rules of International Humanitarian Law (IHL) in comparison with official US statements. Continued drone strikes are now being considered as counter-productive and resulting in increased suicide bombing in various cities of Pakistan. The author suggests a collaborative effort by considering other social, political and economic factors to minimize the violation of IHL for desired results.

1 citations

Journal ArticleDOI
TL;DR: In this article, the authors used the laser BR-guidance method to guide the classic tank ammunition with a diameter of 155 mm in order to give the tank a precision strike capacity.
Abstract: On the battlefield of today, it has become an important requirement to hit moving or fixed targets by using tank or artillery ammunition with high precision. However, while there are many articles on guiding tactical missiles, it cannot found sufficient scientific study for guiding tank ammunition in the related literature. In this study, the laser BR-guidance method is offered to the classic tank ammunition with a diameter of 155 mm in order to give the tank a precision strike capacity, as different from the literature. First of all, an ammunition model is created with coefficients of the mass, inertia, and surface area and friction. In addition, an autopilot dynamic is modeled for the pitch and roll axes of the ammunition. Also, the atmosphere model and environmental factors are added to the model. In order to control this nonlinear model, a lead-compensator and a PD-controller are designed. In order for the results to be transferred to a real application, the accelerations obtained must basically be produced by the electric motors that will drive the control surfaces to be designed. At the end of the study, it is seen that both controllers can produce lateral accelerations within limits without reaching high saturation.

1 citations

Proceedings ArticleDOI
03 Oct 2017
TL;DR: The main purpose of this research is to construction a new modified Euler scheme that improve accuracy of Polygon scheme in various step size and can produce much better accuracy result.
Abstract: There are many benefits to improve Euler scheme for solving the Ordinary Differential Equation Problems. Among the benefits are simple implementation and low-cost computational. However, the problem of accuracy in Euler scheme persuade scholar to use complex method. Therefore, the main purpose of this research are show the construction a new modified Euler scheme that improve accuracy of Polygon scheme in various step size. The implementing of new scheme are used Polygon scheme and Harmonic mean concept that called as Harmonic-Polygon scheme. This Harmonic-Polygon can provide new advantages that Euler scheme could offer by solving Ordinary Differential Equation problem. Four set of problems are solved via Harmonic-Polygon. Findings show that new scheme or Harmonic-Polygon scheme can produce much better accuracy result.

1 citations

Journal ArticleDOI
TL;DR: Thematic and content analysis is used to identify the dominant themes discussed in the selected videos and also to identify sentiments expressed by viewers in the comments posted by as discussed by the authors, finding that the themes and the sentiments reflect the dominance of pessimistic and optimistic perspectives on the Africa-China relationship.
Abstract: The issue of ‘China colonizing Africa’ received significant attention in both traditional and social media in the periods before, during and after the Forum on China Africa Cooperation (FOCAC) 2018 meeting. This study traces these discourses on YouTube, which is one of the social media platforms widely used to raise awareness and also influence public opinion on various issues. Thematic and content analysis are used to identify the dominant themes discussed in the selected videos and also to identify the sentiments expressed by viewers in the comments posted. The issue activation and response model is used to create meaning from the data. The study finds that the themes and the sentiments reflect the dominance of pessimistic and optimistic perspectives on the Africa–China relationship. Furthermore, the study shows that the themes discussed have not offered new perspectives but instead the discussions have repackaged old narratives as part of agenda building efforts by the protagonists. The study, therefore argues that social media have become important platforms for activation of issues on the Africa–China relationship, hence the persistence of these old narratives is attributed to lack of effective responses to issues on social media by both African countries and Chinese officials.

1 citations

Journal ArticleDOI
TL;DR: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity, taking into account the behavior of agents of security systems and the main solutions obtained as a result of using the corresponding models are determined.
Abstract: A game-theoretic approach is presented, which claims to be a universal method for solving most problems in the field of cybersecurity. As arguments to confirm the superiority of game theory, mathematical validity and provability of the optimality of decisions made, unlike the widely used heuristics, the possibility of developing reliable protection based on analytical results, ensuring a timely response to cyberattacks in conditions of limited resources, as well as distributed nature of decision making are highlighted. The definitions of the basic concepts used in security tasks based on game-theoretic models are introduced. The features of the application of game theory methods in the field of cybersecurity are listed and the limitations of research in this area are formulated, namely: a restriction on game strategies, simultaneous moves of players in the behavior patterns of security system agents, uncertainty in the time the players take the move, uncertainty in the final goal of the enemy, unpredictability of further player moves, lack of players’ assessment of enemy resources. as well as its ultimate goals, the inability to timely assess the current state of the game. The game-theoretic models are aligned with the listed security problems, and the main solutions obtained as a result of using the corresponding models are also determined. Many methods of game theory have been formed, for each of which a relationship is determined between the game model, its scope, simulation result and security services that the method under consideration supports. The limitations of the classical representation of game theory models are determined, the need to overcome which follows from the requirements for providing basic security services. Such limitations include: the ability of the defender to detect attacks, the certainty of the probabilities of a change of state before the start of the game, the synchronism of the players’ moves, the inability to scale the model due to the size and complexity of the system under consideration. Models of the main tasks of the interaction of antagonistic agents of security systems have been developed. The resulting models made it possible to obtain solutions to two of the most common tasks in the field of cybersecurity, namely, the interaction of the system administrator and the attacker in organizing the protection of information resources. The tasks are solved for various conditions – the game matrix contains cost estimates of resources and the matrix reflects the probability of threat realization. Pure and mixed strategies are defined for various initial conditions, which allows to exclude from the consideration strategies that are not included in the solution. A synergistic approach to the use of game-theoretic modeling was formed taking into account the behavior of agents of security systems, based on an analysis of the diversity and characteristics of game-theoretic models, their inherent limitations and scope

1 citations


Authors

Showing all 806 results

NameH-indexPapersCitations
Ozlem Kaya128116884212
Xiang Li97147242301
Heikki Kyröläinen492258303
Wan Md Zin Wan Yunus412235571
Wen-Min Lu311163591
Muhammad Zia-ur-Rehman271154347
Mohd Fadhil Md Din261542802
Mainul Haque232512406
Yi-Lin Chan23421359
Kamsiah Jaarin23621411
Muhd Zu Azhan Yahya201931910
Kaharudin Dimyati202001728
Azrul Azlan Hamzah191671016
K.Y. Leong18333020
Azman Ismail171921436
Network Information
Related Institutions (5)
National University of Malaysia
41.2K papers, 552.6K citations

76% related

Jiangsu University
43.8K papers, 569K citations

75% related

Universiti Putra Malaysia
36.7K papers, 647.6K citations

74% related

University of Electronic Science and Technology of China
58.5K papers, 711.1K citations

73% related

University of Malaya
51.4K papers, 1M citations

73% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20224
202189
2020122
201995
201899
201777