Cranfield Defence and Security Doctoral Symposia
Permanent URI for this community
The CDS Doctoral Symposia is the only UK conference to provide research students and early career researchers in defence and security with an opportunity to present their work to a sector-wide audience. Covering both technology and social sciences research, contributions include paper presentations, a 3MT (three-minute thesis) competition, digital images and posters.
In addition, there are plenary talks from thought-leaders, as well as opportunities to interact with industry, publishers and other employers of defence and security researchers.
Browse
Browsing Cranfield Defence and Security Doctoral Symposia by Type "Presentation"
Now showing 1 - 20 of 81
Results Per Page
Sort Options
Item Open Access 4D printing of Magnetic Shape Memory Alloys(Cranfield University, 2022-01-14T15:44:56Z) Milleret, AnastassiaMagnetic shape memory alloys (MSMA) are ferromagnetic materials exhibiting a plastic reversible transformation when subjected to a magnetic field. This transformation occurs within few milliseconds, making them good candidates for ultra-fast actuators. Previous studies have reported an increase of the shape memory effect in bamboo-like Ni-Mn-Ga structures. Thus, 3D Printing, using Laser Powder Bed Fusion (l-PBF), is a potential manufacturing approach to fabricate near-net-shape textured MSMAs structures. This study investigates the influence of l-PBF process parameters (laser power, scan speed, hatch spacing and scanning strategy) on the relative density and the microstructure of bulk and lattice specimens made from a gas atomised Ni-Mn-Ga powder doped with excess Mn. The as-built bulk samples showed a high relative density, up to 98% with a homogenous 14M structure and a ferromagnetic behaviour. The residual porosity in the bulk material is mainly due to gas voids, lack of fusion and cracking. Fabrication of lattice structures at a low laser power (70W) and scan speed (450 mm/s) resulted in a significant decrease in cracking. The effect of process parameters on the strut’s geometry was also investigated, in addition the influence of the lattice geometries on the magnetic properties. Microstructural analysis revealed a layered microstructure with a stripe-like surface relief that originated from the presence of martensitic twins within the sample. Further work will focus on developing a new design to enhance the magnetic properties.Item Open Access 4D Printing of Magnetic Shape Memory Alloys(Cranfield University, 2020-12-02 11:40) Milleret, AnastassiaMagnetic shape memory alloys (MSMA) are ferromagnetic materials exhibiting a plastic reversible transformation. Compared to thermally activated shape memory alloys, such as NiTi, the response of MSMA is much faster (less than a millisecond), making them good candidates for actuators, sensors, micro pumps and energy harvesters. To date, the Ni-Mn-Ga system is the most studied MSMA, and is the focus of this study. The shape memory effect in MSMA is driven by a phase transformation from a high ordered austenitic Heusler phase to a lower symmetry martensitic phase. The change in the shape occurs within the martensitic phase in the presence of a magnetic field. This is due to the reorientation of the twin variants. The best magnetic shape memory effect was reported in single crystalline Ni-Mn-Ga exhibiting up to 10% strain. However, in the polycrystalline form, grain boundaries create obstacles for twin boundary motion and thus the shape memory effect is reduced. Nevertheless, recent studies show a high magnetic-field induced strain, up to 8.7%, in polycrystalline Ni-Mn-Ga foams. Increasing porosity and grain size decreases the grain boundary constraint. MSMAs foams can be made using ceramic space holders, by binder-jetting or by ink-printing. However, these techniques create random distribution and/or size porosity. Further investigations are required to control porosity and grain morphology to enhance the shape memory effect. In addition, magnetic properties are orientation-dependant. Previous studies have reported the possibility to control the grain orientation via laser-powder bed fusion (l-PBF) additive manufacturing technique by tuning the printing parameters and the scanning strategy. Thus, l-PBF appears to be a potential approach to create near-net shape oligocrystalline and foam-structure Ni-Mn-Ga.Item Open Access A Standard European Tank? Technology Transfer and the Quest since 1945 for a Joint International Main Battle Tank within Europe and NATO(Cranfield University, 2017-11-15 12:02) Cubbin, Mike3MT presented at the 2017 Defence and Security Doctoral Symposium.International cooperation in defence has long been a feature of diplomacy, and there are many theoretical advantages to both international technology transfer and standardisation within military alliances, from military organisation and logistics to political consolidation, and on to economic savings in both development and production. International collaboration in the defence industry has produced many successful weapon systems, from technologically advanced fighter aircraft to anti-tank missiles. Given the success of many joint defence projects such as the Tornado and Eurofighter aircraft, and the Roland and Brimstone missile systems, the question emerges as to why there have been no successful collaborative international main battle tank projects. The quest for a standard tank design within NATO began with the Franco-German ‘standard European tank’ project in 1956, and NATO countries have since made several further attempts towards a joint Main Battle Tank (MBT) design. At the time of writing there is talk of yet another potential joint European tank project, this time between France, Germany and possibly Poland. An important question that arises from the many works on armoured warfare, armoured vehicle technology and military technology transfer then is, why has NATO yet to agree and produce a standard tank despite several attempts since 1945? To date, there has been only one successful truly collaborative main battle tank design, and that was the Anglo-American Mark VIII ‘International’ in 1917.Item Open Access Adaptations to unaccustomed resistance training for women in physically demanding occupations(Cranfield University, 2020-01-09 15:41) McGuire, StephenImprovements in maximal strength may reduce injury risk and improve occupational performance. Women’s naturally lower muscular strength compared to men, can be offset through resistance training (RT), but research into its implementation has been limited. Therefore, the time-course of muscular adaptations is of interest, with evidence suggesting adaptations in size and strength are detectable as early as 3-4 weeks, concomitant with an attenuation of RT induced muscle damage. This evidence offers a reduction in the time commitment of RT that may enhance readiness for physically demanding activity, but functional adaptations have yet to be explored. The purpose of this thesis is to explore measurement techniques, moderators of baseline variation and responses to unaccustomed heavy-load RT in civilian women representative of individuals entering physically demanding occupations. Specifically, high reliability and acceptable validity as a measure of maximal strength was established for the isometric mid-thigh pull, now a UK Armed Forces entrance test, in non-athlete females. Next, the influence of physical characteristics, previous sporting activity, and single nucleotide polymorphisms on variation in strength was assessed. The ongoing final study aims to assess the efficacy of a 4-week heavy compound RT program on improving performance and biochemical adaptations.Item Open Access Additively Manufactured (3DP) thermite structures vs conventionally manufactured equivalents(Cranfield University, 2020-01-09 10:23) McGee, ChristineResearch into additive manufacturing (AM) has been steadily expanding over the past five decades. Where once only polymeric materials could be reliably printed, AM has been adapted to print with a range of materials such as biological, metallic, ceramic and even foodstuffs. The advantages of manufacturing in an additive manner include; a) a layer-by-layer approach allows the creation of architecturally complex structures, b) a reduction in weight, c) lessening of waste and d) the ability to create parts that are otherwise difficult or too costly to produce. Pyrotechnic materials, including thermite, are used in a wide range of commercial and defence applications. However, hazards present during manufacturing and storage have resulted in major accidents around the world, with subsequent loss of life and in some cases loss of public infrastructure. AM, using a dry powder printing technique means that parts can be manufactured on demand, reducing the need for storage of large volumes of fully formed products or mixes, thus increasing the safety over lifetime of a product.The performance of pyrotechnics materials is dependent on a number of properties, including chemical composition, thermodynamic properties and physical form. In combination with composition, architecture could be utilised to understand and control these properties. A bespoke printer capable of additively manufacturing pyrotechnic materials has been constructed with the aim to explore this research area. In this paper, we discuss the development of the AM technique and methodology for the burn test experiments. We conclude with the results from the burning of AM thermite structures and compare their performance with conventionally prepared equivalent thermite examples.Item Open Access Assessing the pressure losses during hydrogen transport in the current natural gas infrastructure using numerical modelling(Cranfield University, 2024-01-29T10:38:57Z) Thawani, BonnyThe UK government aims to transition its modern natural gas infrastructure towards Hydrogen by 2035. Since hydrogen is a much lighter gas than methane, it is important to understand the change in parameters when transporting it. While most modern work in this topic looks at the transport of hydrogen-methane mixtures, this work focuses on pure hydrogen transport. The aim of this paper is to highlight the change in gas distribution parameters when natural gas is replaced by hydrogen in the existing infrastructure. This study uses analytical models and computational models to compare the flow of hydrogen and methane in a pipe based on pressure loss. The Darcy-Weisbach and Colebrook-White equations were used for the analytical models, and the k- ε model was used for the computational approach. The variables considered in the comparison were the pipe material (X52 Steel and MDPE) and pipe diameters (0.01me1m). It was observed that hydrogen had to be transported 250e270% the velocity of methane to replicate flow for a fixed length of pipe. Furthermore, it was noted that MDPE pipes has 2e31% lower pressure losses compared to X52 steel for all diameters when transporting hydrogen at a high velocity.Item Open Access Assessment of the Conceptual and Moral Factors on the Outcome of Wars: An AI Perspective(Cranfield University, 2024-01-18T11:06:10Z) Yesilyurt, Gurkan3MT contribution to the Defence and Security Doctoral Symposium 2023Item Open Access Board Games as a Behavioural Collection Method(Cranfield University, 2020-11-27 12:18) Sidorenko, TatjanaTraditionally, games have been viewed as a form of entertainment. Yet, given how engaging games can be their effects can be beneficial in many domains. This paper explores the use of games as a methodology of exploring the decision-making processes demonstrated by a group of information security specialists when role-playing as malicious actors.To achieve this a board game has been designed which enables players to impersonate different types of attackers each with different motivations and goals. Each player is given a set of tools, techniques and procedures (TTPs) in form of cards and a set of end goals which need to be achieved in order to ‘win’ the game. By interacting with the facilitator, who is also representing the defending organisation or location, they voice out their intended actions and decisions and play a TTP card of their choice. By adopting a persona in an engaging fictional setting players are freed from concerns associated with self-image maintenance and concerns about reputational damage and ultimately, are better able to construct creative and malicious attacks. The game methodology also provides a less limited framework for the data gathering, and with suitable facilitation allows the capture of a very diverse set of attacks.By using this methodology, it is possible to gather a more diverse set of both decision-making behaviour and attacks, improving our understanding of offensive actors. This understanding will then be used to influence the creation of an agent-based simulation of these actors and scenarios.Item Open Access Bohmian Molecular Dynamics Simulations of Warm Dense Matter(Cranfield University, 2020-12-07 14:23) Campbell, ThomasThe computational demands of modelling large numbers of coupled electrons and ions have long been considered insurmountable, despite advances and refinements in density functional theory (DFT) calculations. However, a different approach to modelling quantum interactions, via application of the Bohmian trajectories formalism, can overcome this hurdle. We present further results from a new Bohm - molecular dynamics approach (Bohm MD). The static results of our simulations are validated by DFT results – our static ion-ion structure factor of aluminium at 5.2 g cm-3and 3.5 eV shows excellent agreement with both orbital free and Kohn Sham DFT. We then use Bohm MD to extract dynamic results, not only the ion-ion dynamic structure factor which provides a direct link to experimental observables, but also, unprecedentedly, the ion-electron and electron-electron dynamic structure factors.Thus Bohm MD provides a self-consistent approach to non-adiabatic investigation of dynamic modes in systems of thousands of particles.Item Open Access Bone Disease: The Integration of Nano- and Macro-Scale Studies(Cranfield University, 2020-01-09 11:44) Arnold, EmilyBone is a hierarchical structure that provides support and protection to a body. In the macro-structure of bone, geometry affects it ability to perform these functions, while in the micro-structure the material properties dictate changes. The easy substitution of atoms into the crystal, as well as the binding of extraneous proteins to the surface, have been found to alter many material properties.This research aims to develop a greater understanding of the fundamental properties and behaviours of the mineral component of bone (biological Hydroxyapatite or HA) through several techniques, some that are well documented within the field of research and some that are not. While X-Ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FTIR) are often used in the study of HAp, this research aims to expand the lesser-used methods used to include X-Ray PDF Studies with the use of Synchrotron Radiation, as well as Differential Scanning Calorimetry (DSC), and Thermogravimetric Analysis (TGA).By building a cohesive model one step at a time we can begin to understand fundamental material characteristics of this fascinating building block of life.Item Open Access Breast microcalcifications as biomarkers of tissue pathology(Cranfield University, 2020-01-09 11:31) Gosling, SarahBreast cancer is the most commonly diagnosed cancer in women in the UK, accounting for 31% of all cases. Some breast malignancies, known as in-situ cancers, have the potential to form invasive cancer, but this is not true in all cases. There is significant overtreatment of in-situ cancers, which can be a traumatic process for patients. Therefore, a robust method to determine which of these malignancies will develop into clinically significant invasive cancer is required. Ductal carcinoma in-situ (DCIS), the most common in-situ breast cancer, has associated calcium deposits (microcalcifications) in 80-90% of cases. Microcalcifications are therefore an important diagnostic indicator of DCIS. These microcalcifications are composed of hydroxyapatite, a nano-crystalline calcium phosphate, with the potential for high levels of ion substitution.The crystalline nature of hydroxyapatite permits the use of X-ray diffraction to investigate the microstructure of microcalcifications found in breast tissue. X-ray diffraction patterns can be used to determine properties such as crystallite size, irregularities in the crystal lattice and give indications about the ions present. Together, differences in these parameters may permit the development of a novel prognostic marker for different breast tissue pathologies.Item Open Access Building Management Systems: Context, Collaboration and Organisational Security(Cranfield University, 2020-01-09 09:37) Boakes, EmmaPhysical assets are increasingly connected to organisations’ networks, exposing organisations to the risk of cyber threats that could have a physical impact. There are several instances where this has already happened, and industry reports show that the number of groups interested in targeting such systems, and the number of cyber incidents on physical systems, is increasing. A Building Management Systems (BMS) is one such connected system. A cyber-attack targeting a BMS could disrupt heating, ventilation or power, or could undermine physical security operations which increasingly rely on internet-enabled devices, such as CCTV cameras and access control. In addition, these systems could be used as a gateway into the organisation’s network if not properly secured. It is increasingly important to consider a BMS within the context of an organisation’s overall protective security posture. Inclusion of a BMS on an organisation’s network not only increases the attack surface but also places a greater load on security staff, potentially leading to vulnerabilities. Additionally, a BMS spans the boundaries of cyber and physical security, so cyber, personnel and physical security teams need to work together to identify, understand and mitigate vulnerabilities.This research argues that current guidance fails to address the challenges of integrating cyber, personnel and physical security to protect a BMS. Guidance focuses on securing the attack surface with technological solutions and a ‘defence in depth’ approach but overlooks the impact this will have on staff managing the system. Increased system complexity puts yet more load on staff, further reducing their capacity, which in itself could create further vulnerabilities.Furthermore, guidance does not adequately address how separate security teams should collaborate to ensure effective solutions are implemented. The formal collaboration between security teams through a converged security approach has, however, been advocated by industry practitioners and the benefits of such an approach have been highlighted. Despite this, there is little evidence for the approach, and little detail about the type or level of convergence required to achieve the specified benefits. Moreover, there is no indication of how organisations might overcome the challenges of adopting such an approach.This research seeks to explore the context in which a BMS is implemented to inform organisations of the broader system implications around converged security. Initial research explores how separate security teams within organisations collaborate or converge. This presentation will outline the preliminary findings and highlight areas where future research is needed.Item Open Access Conceptualising, Defining and Remodelling Supply Chain Management; An Objective-Oriented Grounded Theory Approach(Cranfield University, 2018-11-15 09:23) Alkebaisi, HussainTechnical paper presented at the 2018 Defence and Security Doctoral Symposium.Although it has been more than three decades since the concept of Supply Chain Management (SCM) was first introduced, there are still significant attempts at, and a call for conceptualising, defining, remodelling and identifying the theory behind it. There is no consensus in the literature on a concise and precise definition of SCM. A rigorous theoretical framework has not yet been developed; the existing models like Supply Chain Operations Reference (SCOR) and the Global Supply Chain Forum (GSCF) models lack the details called for in a holistic model that encompasses the essence of SCM and integrates the best features of the existing models and covers their shortcomings.The argument in the literature is that: “research and practice would be improved if a single definition were adopted” (Mentzer et al., 2001); “closing the gap between SCM theory and actual practice would be the development of a single, unifying SCM framework that both incorporates the best aspects of the existing, widely used frameworks and addresses their current limitations” (Moberg et al., 2008).The literature has shown that most of the research methods and approaches which were used to solve these issues were process-oriented or business functions-oriented (Object-Oriented), that is, the focus was on what firms and organisations are doing, where they do it, or how they do it. However, there is no evidence in the literature that an Objective-Oriented approach has been investigated in resolving those theoretical issues, nor the Grounded Theory research methodology has been applied to that end. Some research papers, for instance, recommended the use of the Grounded Theory research methodology as it could lead to theorising SCM. Therefore, this research focuses on the application of the Grounded Theory research method through an Objective-Oriented line-by-line coding system which will employ multiple data resources including the literature, websites, recorded lectures and recorded interviews.This paper/presentation aims to introduce the gap identified in the literature as reported above to study to what extent the novel approach (Objective-Oriented Grounded Theory Approach) could contribute to resolving the use of a single framework approach that can be applied to multiple sectors. Through this approach, the researcher will be able to: conceptualise SCM, identify the theory behind it, define the concept precisely and concisely and develop a unified model that visualises SCM.Keywords – Supply chain management, Constructivist Grounded Theory, Objective-Oriented approach, Supply chain Management Conceptual Model.ReferencesMentzer, et al. (2001) ‘Defining Supply Chain Management’, Journal of Business Logistics, 22(2), pp. 1–25. doi: 10.1002/j.2158-1592.2001.tb00001.x.Moberg, et al. (2008) Time to Remodel, CSCMP’s Supply Chain Quarterly. Available at: http://www.supplychainquarterly.com/print/scq200803scmmodel/ (Accessed: 15 November 2017).Item Open Access Critical Incident Decision-Making: A systematic review of the barriers, processes and frameworks(Cranfield University, 2020-11-27 14:00) May, BrandonCritical incidents are environments that can be characterised by complexity, high-stakes, ambiguity, time-urgency and uncertainty, and often involve a multi-agency response (e.g. Fire and Rescue, Police, and the Military); for example, in terror attacks (e.g. Manchester bombings, London Bridge), fire disasters (e.g. California wildfires, Grenfell Towers), and the 2020 COVID-19 pandemic. In this respect, critical incidents are distinctive, dynamic events in which multi-agency systems lack the situational awareness and operational experience to make effective strategic and tactical decisions. Whilst research has begun to understand and explore decision-making in complex environments, there is limited research that focuses on understanding the processes used to coordinate effective responses in situ within critical incident environments; specifically, critical incident decision-making. This review sought to (i) identify relevant studies, (ii) critically appraise concepts that relate to the central theme of critical incident decision-making in-situ, and (iii) examine the barriers that compound effective strategic and tactical decision-making. The research identified numerous factors that affect the decision-making process (e.g. political agendas, disparity between operational objectives, and intra-and-inter agency collaboration). Additionally, several theoretical and applied decision-making frameworks were identified (e.g. Joint Decision Model; JESIP), that to date, have not factored in how complex, high-stake multi-agency decisions are made under conditions of uncertainty and time-urgency. This presentation will discuss the theoretical implications across security, defence, and law enforcement contexts and present pathways for future research.Item Open Access De-sovereignisation as an instrument of Russia’s coercive diplomacy in the context of post-Soviet de facto states. A comparative study of Moldova and Ukraine (2014–2021).(Cranfield University, 2022-01-13T17:44:17Z) Barbieri, JaroslavaThis project examines the de-sovereignisation processes occurring in Moldova and Ukraine as a result of Russian-instigated activities in the breakaway territories of the Pridnestrovian Moldavian Republic (PMR) and the Donetsk and Luhansk Peoples’ Republics (DNR/LNR). De-sovereignisation is defined as the process(es) whereby a state selectively facilitates state- and nation-building activities that interfere with another state’s ability to exercise control and authority over portions of its territory and population. By strengthening various attributes of sovereignty and statehood in de facto states (i.e. territories having de facto yet lacking de jure sovereignty), Russia automatically weakens those of their respective parent states, thereby making them more vulnerable to its influence. With this in mind, this thesis addresses the following research questions: How does Russia’s role in supporting the viability of post-Soviet de facto states affect reintegration prospects into their parent states? How does Russia’s involvement in the DNR/LNR compare to that in the PMR? To guide empirical research, this thesis relies on a refined version of coercive diplomacy theory, which implies the use of (verbal and non-verbal) threats and incentives to instigate behavioural change in a target state to the coercer’s advantage. Thus, this project looks at how Russian state and non-state actors have been instrumentally promoting state- and nation-building activities in the PMR and the DNR/LNR with the aim to pressurise their respective parent states into complying with Russia’s shifting demands. Critically, this project provides the first comparative study of such activities, operationalised into five domains: 1) political-diplomatic; 2) economic-financial; 3) military-security; 4) educational-cultural; 5) socio-legal. At the same time, this study distances itself from the conventional way of treating political and military leaders in de facto states as mere Russian proxies deprived of independent agency. Rather, it interrogates the extent to which local state- and nation-building initiatives are coordinated with Russia’s ruling elite and examines whether these may generate policy dilemmas for Russia. There has been a tendency to emphasise the causes of Russia’s military incursions into neighbouring countries, with little empirical analysis of the long-term consequences of such incursions on the ground. By contrast, this project acknowledges the complex and ‘messy’ realities of Russia-backed de facto states and uses apparent similarities as a starting point to examine in comparative terms idiosyncratic local developments and the ensuing challenges for reintegration prospects. This study relies on case-study analysis and draws on sources such as state documents and public statements issued by the de facto authorities and the Russian leadership, local newspaper releases, videos from state-controlled media outlets as well as semi-structured interviews with officials and experts from the countries under study.Item Open Access Deceptive Autonomous Agents(Cranfield University, 2020-01-09 10:31) Sarkadi, StefanRecent advances in Artificial Intelligence (AI) along with recent events revolving around the problem of fake news indicate new and critical potential threats to intelligence analysis, defence, security, and, by extension, to modern society in general. One such threat that we can derive from the development of AI is the emergence of malicious autonomous artificial agents that could develop their own reasons and strategies to act dishonestly. In order to be able to prevent or mitigate the malicious behaviour of deceptive artificial and autonomous agents, we must first understand how they might be designed, modelled, or engineered. In this work, we aim to model and study how artificial agents that deceive and detect deception can be engineered, as well as how such agents might impact the common good.Item Open Access Deep Learning Techniques for Missile Seeker Automatic Target Recognition(Cranfield University, 2020-01-15 15:30) Westlake, SamuelModern infrared missiles use sophisticated computer vision techniques, in conjunction with imaging seekers, to automatically detect and localise targets. However, simulations show that soft-kill countermeasures remain an effective defence against such systems. This research explores the feasibility of deep learning algorithms for Automatic Target Recognition (ATR) and aim to significantly improve seeker performance in the presence of soft-kill countermeasures and clutter. State-of-the-art neural network architectures were benchmarked using both simulated and real-world infrared data. Their performance was also analysed to inform tailored and novel developments. In addition to this improvement to existing capabilities, these algorithms established additional capabilities of target recognition and identification. This effectively enables target prioritisation and safeguarding of friendly assetsItem Open Access Defence and Security Doctoral Symposium 2022 (DSDS22) Flyer(Cranfield University, 2022-08-30T11:41:27Z) Cranfield UniversityFlyer for the Defence and Security Doctoral Symposium (DSDS22) taking place 9-10 November 2022Item Open Access Defence and Security Doctoral Symposium 2023 (DSDS23) Flyer(Cranfield University, 2023-07-05T08:48:26Z) Cranfield UniversityFlyer for the Defence and Security Doctoral Symposium (DSDS22) taking place 8-9 November 2023Item Open Access Designing 3D Printed Horn Antennas for Landmine Detection(Cranfield University, 2018-01-03 15:24) Wirth, Sebastian3MT presented at the 2017 Defence and Security Doctoral Symposium.This work presents the novel design and manufacture of a 3D-printed X-band horn antenna as a single part . This design considerably reduces manufacturing and assembly costs, is sixty percent lighter than an equivalent commercial antennas and offers similar performance. The antennas are particularly suitable for operational scenarios were weight is a key system requirement such as UAVs or as intended in this research for near field ground penetrating radar applications.