cover
Contact Name
Muhamad Syazali
Contact Email
app.sci.def@gmail.com
Phone
+628984369924
Journal Mail Official
app.sci.def@gmail.com
Editorial Address
Foundation of Advanced Education (FoundAE) Jl. Pramuka Gg. Darfa LK. II, Kel. Langkapura, Kec. Langkapura, Kota Bandar Lampung.
Location
Kota bandar lampung,
Lampung
INDONESIA
International Journal of Applied Mathematics, Sciences, and Technology for National Defense
ISSN : 29860776     EISSN : 29859352     DOI : https://doi.org/10.58524/app.sci.def
Core Subject : Science, Education,
International Journal of Applied Mathematics, Sciences, and Technology for National Defense (App.Sci.Def) [e-ISSN: 2985-9352, p_ISSN: 2986-0776] is a journal published by the Foundation of Advanced Education. International Journal of Applied Mathematics, Sciences and Technology for National Defense (App.Sci.Def) is an Applied Mathematics, Science, and Technology in National Defense is an international journal dedicated to the publication of high quality, peer-reviewed articles on all aspects of mathematics in defense, complex strategy, modeling, optimization, cybersecurity, and special issues on topics of current interest. The scope of the journal is very broad and interdisciplinary with an integrated, qualitative and quantitative approach. Review papers with insightful, integrative, applicable and up-to-date major topic progress are also welcome. Authors are invited to submit defense-related articles that have not been previously published and are not being considered elsewhere. In addition, the App.Sci.Def editorial board is strongly committed to promoting current advances and interdisciplinary research in defense mathematics, Science, and Technology.
Arjuna Subject : Umum - Umum
Articles 45 Documents
Approximation of BPS Skyrme model using modified Lagrangian Skyrmion Oktaviana, Aditya Tri; Rahman Alfarasyi, Abdul; Gia Huy, Truong; Fahmi, Khazali
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 1 No. 3 (2023): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v1i3.302

Abstract

One of the nuclear atomic models represented by Skyrmion was the Skyrme model. This model was a modified nonlinear sigma model with a Skyrme field where the classical solution use generalized sixth order terms and potential terms. The binding energy that will be studied in the Skyrme SU(2) model is to generalize the second order nonlinear sigma model terms with sixth order derivative terms. The Lagrangian will be obtained for these two terms to find the BPS (Bogomolny Prasad Sommerfield) solution for the profile function numerically. The result of numerical calculation will be used to calculate static energy and rotational energy, where the characteristic of the nucleus can be observed from these two energies. Furthermore, the value of the coupling constant in the Lagrangian Skyrmion will be calculated from the static energy and rotational energy obtained previously. These values are expected to help in the application of Skyrme model for many research physics field.
Prototype smart integrated fire detection based on deep learning YOLO v8 and IoT (internet of things) to improve early fire detection Firdaus, Muhammad Azka; Dahlan, Iqbal Ahmad; Rimbawa, H A Danang; Versantariqh, Muhammad Azka; Prakosa, Setya Widyawan
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 2 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v2i2.437

Abstract

The high incidence of fires in Indonesia in 2018-2023 is 5,336 fire incidents have caused many deaths and enormous material losses. This system is designed to identify early signs of fire through object detection and sensor technology, which is integrated with the Blynk IoT platform for real-time sensor monitoring and Telegram for instant notifications to users. The waterfall prototype method was designed through observation, system design, program code creation, tool testing, and tool implementation. This research uses Deep Learning YOLOv8 technology and IoT using ESP 32 as a microcontroller. Based on the training datasets, it produces precision=0.95872; recall=0.91; mAP50=0.97; mAP50-95 =0.66. The system uses the integration of a multisensor KY-026 flame sensor, DHT 22 temperature and humidity sensor, and MQ-2 sensors can detect CO, LPG, and smoke gas. All these multisensors can be monitored on Blynk IoT and Telegrambot in real time.
Using 3D design technology and a combination of carbon fiber and 16% HGM epoxy resin, female troops are wearing bulletproof vests Lubis, Agnes Sprakezia; Aritonang, Sovian; Faradina, Raditya; Panse, Vishal R
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 1 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v2i1.329

Abstract

Women are becoming more active in the defense industry. Since the morphology of the female body differs from that of the male during military activities, it is required to modify personal protection equipment to accommodate the female body shape. According to a literature review, a survey of a sample of female soldiers from different nations revealed that they felt the impacts of breast soreness when running, as well as a sense of "distorted breasts" and breathing difficulties. The woman's petite frame and the bulky, hefty bulletproof jacket both draw criticism for their respective dimensions. Using 3D design technology, a female mannequin with a 95B breast size was scanned in order to create a bullet-proof vest that is tailored to the contour of a woman's body. Changes in the breast's contour, which affect changes in the surface point parameters, result in adaptive breasts. Utilizing a combination of carbon fiber and 16 percent HGM epoxy, bullet-proof vests can be modified to provide lightweight dimensions and have the benefit of good ballistic resistance. This results in a material that is 20 mm for thick, 1,348 kg in weight, and capable of absorbing 348.27 Joules of energy from bullets. The results of this research are not optimal, so developments are needed in further research.
A review of polymer composite materials in bulletproof vest to defense sector Cahayaputri, Olivia Thresnayu; Murniati, Riri; Aritonang, Sovian; Tri Oktaviana, Aditya
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 1 No. 3 (2023): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v1i3.296

Abstract

Personal protection, especially in the context of military protection and security, became a major focus in the development of bulletproof vests. Polymer composite materials offer a wide range of advantages in terms of strength, density, and ability to reduce the kinetic energy of projectiles, making them an attractive choice for such protection applications. This study examines the different types of polymers and composite technologies used in the manufacture of bulletproof vests. This study examines the use of polymer composite materials in the manufacture of bulletproof vests used in the defense sector. We evaluate the mechanical, thermal, and ballistic properties of these materials and investigate the design approaches applied to improve the performance of these protectors. The research proved that the composite was efficient enough to be used as a bulletproof vest material because it was light, flexible and strong.
Clinical cases of paronychia infection: A narrative review Jusivani, Sadina Tahara; Wardani, Indah Kusuma; Rahayu, Tiara; Sari, Nastiti Intan Permata; Maruyama, Fumito
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 2 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v2i2.355

Abstract

Paronychia is an infection that occurs in the nail fold and the barrier between the nail and cuticle, is usually caused by penetrating trauma, which allows pathogens to infect and cause damage. The infection is caused by chemical factors, such as fungi, viruses, and bacteria, and risk factors, such as occupation, allergies, and finger-biting habits. Paronychia is a common nail infection that can significantly impact quality of life and work productivity, especially in certain occupations. Paronychia infection was differentiated by two categories, acute and chronic infection. The lack of knowledge regarding the prevention, cure, and rehabilitation of paronychia infection in Indonesia is the cause of the increasing cases of this infection. This review aims to provide knowledge for the Indonesian public and an opportunity for health workers to explore paronychia cases in Indonesia. The data in this paper were retrieved from 32 articles from 2014 - 2024 from PubMed, Cochrane, and Scopus. Articles were selected based on relevance to clinical cases of paronychia in humans, focusing on diagnosis, treatment and outcomes. Then, evaluate the causes, diagnosis, and treatment of paronychia using narrative review. Found that acute paronychia results from trauma or infection, while chronic cases are often caused by fungi. Treatment in acute paronychia is done with warm soaks and oral antibiotics, while chronic requires long-term topical corticosteroids and antifungal treatments. This review analyzes clinical cases of acute and chronic paronychia to evaluate their causes, diagnosis, and treatment. Further research is needed to advance the knowledge and treatment of paronychia infections.
Bibliometrix research of noise removal techniques in digital images for defense Al Husein, Fulkan Kafilah; Al Habsy, Muhammad Yusuf; Christi, Damaris Nugrahita; Hutagaol, Agnes Emanuela; Junoh, Ahmad Kadri bin
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 3 No. 1 (2025): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v3i1.463

Abstract

In modern defense applications, the accuracy and clarity of digital images are crucial, especially for tasks like surveillance, reconnaissance, and intelligence gathering. However, noise introduced during image acquisition or transmission significantly degrades image quality. This paper presents a comprehensive review of various noise removal techniques employed in digital image processing for defense systems. The review focuses on both linear and non-linear methods, including matrix decomposition, hybrid deep learning, Generative Adversarial Networks (GANs), and trimming filters. Emphasis is placed on the effectiveness of each technique in enhancing image quality while preserving critical details. The use of linear and non-linear methods such as deep learning-based approaches is shown to outperform traditional linear filters in handling complex noise patterns, particularly in scenarios requiring precise object detection and image restoration. The paper highlights a comprehensive overview of the researched literature and shows the latest trends and developments in the field. Finally, recommendations for future research and the development of more robust noise reduction methods are provided, aiming to improve operational effectiveness in defense applications.
Unmanned aerial vehicle classification and detection system based on deep learning, internet of military things, and PID control system Lesmana, Azka Versantariqh; Dahlan, Iqbal Ahmad; Tjahjadi, Hendrana; Prakosa, Setya Widyawan; Firdaus, Muhammad Azka
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 3 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def..v2i3.439

Abstract

Indonesia is an archipelagic country situated between two continents and two oceans. With numerous islands, it is rich in natural resources but faces various military and non-military threats. One significant threat to maritime nations like Indonesia is from the air, which includes direct attacks from manned and unmanned aircraft and using aerial vehicles for intelligence and surveillance. The primary weapon system is crucial for national defense against such threats. Therefore, developing defense equipment in Indonesia must align with technological advancements to ensure quick and efficient operation. This research focuses on creating a classification and reconnaissance system for flying vehicles to enhance air defense capabilities. In the surveillance system, two servos are used for yaw and pitch axes, controlled by a Proportional, Integrative, and Derivative (PID) system. This PID control significantly improves servo movement both dynamically and statically. The system sends notifications via Telegram for monitoring, with an average FPS of 9.6. Flask is used for the website interface, averaging 6.8 FPS, and MIT App Inventor is used for the smartphone interface, averaging 7.6 FPS. This flying vehicle classification and reconnaissance system enhances Indonesia's air defense, utilizing YOLOv8 for classification, PID control for servo movements, and integrated notifications and interfaces for both web and smartphones.
Enhancing digital resilience through GEN-AI driven video content moderation and copyright protection K, Muthumanickam; T, Kathirvel; K, Harish Vishnu; N, Mukesh Rajan
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 3 No. 1 (2025): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v3i1.640

Abstract

In the digital era, ensuring digital resilience in video content moderation and copyright enforcement is crucial due to the vast volume of uploads. Traditional manual review methods are inefficient, necessitating AI-driven automation. This paper presents an AI-powered system integrating computer vision, deep learning, and NLP for real-time video analysis. The system detects inappropriate content using CLIP for visual moderation and Whisper for speech analysis, ensuring high-precision filtering with human oversight. A copyright protection mechanism employs watermarking and fingerprinting to generate unique digital signatures, preventing unauthorized content usage. A React-based UI with Vite framework provides an interactive reviewer experience. By combining automation with human intervention, this approach enhances moderation accuracy, copyright enforcement, and compliance with global content standards, fostering a more secure and resilient digital ecosystem. This system enhances digital resilience and security, making it applicable for defense and national security in protecting sensitive content.
Anti-kyphosis smart bag detection of overweight bag load and improper spinal posture in army members when using work bags Hirawan, Agung; Renoult, Muhammad Rey; Parwatiningtyas, Diyan; Dahlan, Iqbal Ahmad; Kusumadjati, Adhi; Napitupulu, Jofim Yordaniel
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 2 No. 3 (2024): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def..v2i3.410

Abstract

Heavy field equipment owned by soldiers such as backpacks unknowingly makes soldiers move with the wrong body posture when in the field. Carrying a bag with a heavy load and the wrong posture (slouching), can cause abnormalities in the spine, such as slouching (kyphosis). Therefore, a posture therapy is needed with the method of habituation using a work bag with a load not exceeding 15 percent of the user's body weight and using it with the correct posture. This therapy / habituation is of course carried out outside of field training hours that do not ignore the use of heavy loads, for example in the office or anywhere else when carrying a bag. Seeing this, researchers are trying to create and develop an anti-kyphosis smart bag that can prevent and treat spinal deformities. After making the system, this smart bag was then tested quantitatively with the aim of seeing the qualification of the system's ability to detect excess bag weight, if the weight of the bag exceeds 15 percent of the user's body weight and the ability of the system to detect improper posture seen from the sensitivity level of the load cell sensor based on its placement position in the back area. The test was conducted on three respondents who were selected based on their height, namely 170 cm, 175 cm, and 182cm. The system calibration results show that the system works accurately, with a measuring error of 0% and effective sensor placement between the thoracic kyphosis and lumbar lordosis areas of the back, with the ability to detect a bend angle of at least 24.7°. Seeing the effectiveness of this anti-kyphosis smart bag, it is hoped that it can be a smart solution for TNI members in maintaining spinal posture to avoid kyphosis due to the habit of carrying excessive loads with the wrong body posture.
Zero trust framework for protecting federal networks and cloud services Kotilingala, Sudheer
International Journal of Applied Mathematics, Sciences, and Technology for National Defense Vol. 3 No. 1 (2025): International Journal of Applied Mathematics, Sciences, and Technology for Nati
Publisher : FoundAE

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58524/app.sci.def.v3i1.669

Abstract

There has been a rapid uptake of cloud technologies in public sectors due to increased efficiency across operations while increasing the complexity of cyber threats. This paper analyses the original Zero Trust Architecture (ZTA) concept as a security concept applicable to federal networks and cloud services protection. It mainly involves linking ZTA principles with FedRAMP regulations and insists on constant validation, minimisation of rights, and breach presumption. The study outlines guidelines for ZTA implementations for compliance and readiness in the cloud environments.