Open Access
Issue
MATEC Web Conf.
Volume 68, 2016
2016 The 3rd International Conference on Industrial Engineering and Applications (ICIEA 2016)
Article Number 02006
Number of page(s) 7
Section Mechanical Engineering
DOI https://doi.org/10.1051/matecconf/20166802006
Published online 01 August 2016
  1. Department of Homeland Security (2015, Jun. 15). IED Attack Improvised Explosive Devices [Online]. Available: https://www.dhs.gov/xlibrary/assets/prep_ied_fact_sheet.pdf. [Google Scholar]
  2. A. Farazmand, Handbook of crisis and emergency management. CRC Press, 2001. [Google Scholar]
  3. V. Smirnov, “Possibilities of Creating Improvised Explosives and Explosive Devices,” in Detection and disposal of improvised explosives, Springer, 2006, pp. 217–221. [Google Scholar]
  4. S. Mallonee, S. Shariat, G. Stennies, R. Waxweiler, D. Hogan, and F. Jordan, “Physical injuries and fatalities resulting from the Oklahoma City bombing,” Jama, vol. 276, no. 5, pp. 382–387, 1996. [CrossRef] [Google Scholar]
  5. F. Craig (2015 Jun. 15) Anatomy of an IED. [Online]. Available http://science.howstuffworks.com/ied1.htm [Google Scholar]
  6. D. Tran (2015 May. 23) Aperio by eternallite, 3D Interactive Tool for Revealing Occlusions in Models [Online] Available http://eternallite.github.io/Aperio/ [Google Scholar]
  7. A. Ferworn, S. Herman, C. Kong, A. Ufkes, and J. Tran, “Interacting with a virtual Destroyed Environment constructed from real disaster data,” in Safety, Security, and Rescue Robotics (SSRR), 2014 IEEE International Symposium on, 2014, pp. 1–6. [CrossRef] [Google Scholar]
  8. A. Ferworn, S. Herman, J. Tran, A. Ufkes, and R. Mcdonald, “Disaster scene reconstruction: Modeling and simulating urban building collapse rubble within a game engine,” in Proceedings of the 2013 Summer Computer Simulation Conference, 2013, p. 18. [Google Scholar]
  9. M. Coatsworth, J. Tran, and A. Ferworn, “A hybrid lossless and lossy compression scheme for streaming RGB-D data in real time,” in Safety, Security, and Rescue Robotics (SSRR), 2014 IEEE International Symposium on, 2014, pp. 1–6. [CrossRef] [Google Scholar]
  10. Bureau of Alcohol, Tobacco, Firearms and Explosives (2015 Jun 3) ATF Explosives Handling Handbook [Online] Available https://www.atf.gov/file/58741/download [Google Scholar]
  11. Arson. Enforcement (2015 Jun 15) Arson Explosives Enforcement [Online] Available https://www.atf.gov/content/Arson/arsonexplosives-enforcement [Google Scholar]
  12. Scanna (2015 Jun 15) Scanna portable x-ray and postal x-ray systems. [Online] Available http://www.scanna-msc.com/uk/aboutscanna/ [Google Scholar]
  13. Proparms (2015 Jun 16) EOD Tools, Waterjet Disrupters and Forced Entry Tools - Proparms Ltd. [Online] Available http://www.proparms.com/site/product_10.html [Google Scholar]
  14. R. Ratan and U. Ritterfeld, “Classifying serious games,” Serious games: Mechanisms and effects, pp. 10–24, 2009. [Google Scholar]
  15. C. C. Abt, Serious games. University Press of America, 1987. [Google Scholar]
  16. M. Zyda, “From visual simulation to virtual reality to games,” Computer, vol. 38, no. 9, pp. 25–32, 2005. [CrossRef] [Google Scholar]
  17. P. Rego, P. M. Moreira, and L. P. Reis, “Serious games for rehabilitation: A survey and a classification towards a taxonomy,” in Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on, 2010, pp. 1–6. [Google Scholar]
  18. A. Seugling and M. Rölin, “Evaluation of physics engines and implementation of a physics module in a 3d-authoring tool,” Umea University, 2, 2006. [Google Scholar]
  19. A. Boeing and T. Bräunl, “Evaluation of real-time physics simulation systems,” in Proceedings of the 5th international conference on Computer graphics and interactive techniques in Australia and Southeast Asia, 2007, pp. 281–288. [Google Scholar]
  20. W. B. Stafford, “Sequential pattern detection and time series models for predicting IED attacks,” Monterey, California. Naval Postgraduate School, 2009. [Google Scholar]
  21. D. E. Brown and M. Smith, “Terrorist Threat Prediction in Urban Environments.” [Google Scholar]
  22. L. Nilsen-Nygaard and C. W. Johnson, “Using mathematical models to guide the simulation of improvised explosive devices in public spaces,” in System Safety, 2008 3rd IET International Conference on, 2008, pp. 1–6. [Google Scholar]
  23. M. C. Association (2015 Jun 16) sCounter-IED. [Online] Available https://www.mca-marines.org/gazette/2014/05/counter-ied [Google Scholar]
  24. A. Shankar, “Spatial and Temporal Modeling of IED Emplacements against Dismounted Patrols,” George Mason University, 2014. [Google Scholar]
  25. S. Carpin, M. Lewis, J. Wang, S. Balakirsky, and C. Scrapper, “USARSim: a robot simulator for research and education,” in Robotics and Automation, 2007 IEEE International Conference on, 2007, pp. 1400–1405. [CrossRef] [Google Scholar]
  26. A. Fedorov, R. Beichel, J. Kalpathy-Cramer, J. Finet, J.-C. Fillion- Robin, S. Pujol, C. Bauer, D. Jennings, F. Fennessy, M. Sonka, and others, “3D Slicer as an image computing platform for the Quantitative Imaging Network,” Magnetic resonance imaging, 30, no. 9, pp. 1323–1341, 2012. [Google Scholar]
  27. B.O. Community, Blender - a 3D modelling and rendering package. Blender Institute, Amsterdam: Blender Foundation. [Google Scholar]
  28. Unity Technologies. (2014, Jul. 18). Unity Game Engine-Official Site [Online]. Available: http://unity3d.com [Google Scholar]
  29. Epic Games. (2014, Jul. 18). Unreal Development Kit (UDK) [Online]. Available: https://www.unrealengine.com/products/udk/ [Google Scholar]
  30. D. Group, “Defense and Security Speciality Equipement.”. [Google Scholar]
  31. R. R. Edelman and S. Warach, “Magnetic resonance imaging,” New England Journal of Medicine, 328, no. 10, pp. 708–716, 1993. [CrossRef] [Google Scholar]
  32. “MRI artifacts | Radiology Reference Article | Radiopaedia.org.”. [Google Scholar]
  33. E. M. Bellon, E. Haacke, P. Coleman, D. Sacco, D. Steiger, and R. Gangarosa, “MR artifacts: a review,” American Journal of Roentgenology, 147, no. 6, pp. 1271–1281, 1986. [CrossRef] [Google Scholar]
  34. T. Ju, F. Losasso, S. Schaefer, and J. Warren, “Dual contouring of hermite data,” ACM Transactions on Graphics (TOG), 21, no. 3, pp. 339–346, 2002. [Google Scholar]
  35. W. McDermott (2015 Jun 28) Distance Tool. [Online] Available https://www.assetstore.unity3d.com/en/#!/content/307 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.