Staff publications (CDS)

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 20 of 1268
  • ItemOpen Access
    An empirical method for modelling the secondary shock from high explosives in the far-field
    (Springer, 2025-12-31) Rigby, Sam E.; Mendham, E.; Farrimond, Dain G.; Pickering, Erik G.; Tyas, Andrew; Pezzola, G.
    As the detonation product cloud from a high explosive detonation expands, an arresting flow is generated at the interface between these products and the surrounding air. Eventually this flow forms an inward-travelling shock wave which coalesces at the origin and reflects outwards as a secondary shock. Whilst this feature is well known and often reported, there remains no established method for predicting the form and magnitude of the secondary shock. This paper details an empirical superposition method for modelling the secondary shock, based on the physical analogy of the secondary loading pulse resembling the blast load from a smaller explosive relative to the original. This so-called dummy charge mass is determined from 58 experimental tests using PE4, PE8, and PE10, utilising Monte Carlo sampling to account for experimental uncertainty, and is found to range between 3.2–4.9% of the original charge mass. A further 18 “unseen” datapoints are used to rigorously assess the performance of the new model, and it is found that reductions in mean absolute error of up to 40%, and typically 20%, are achieved compared to the standard model which neglects the secondary shock. Accuracy of the model is demonstrated across a comprehensive range of far-field scaled distances, giving a high degree of confidence in the new empirical method for modelling the secondary shock from high explosives.
  • ItemOpen Access
    Modelling real‐world effects in near‐field SAR collections for compressive sensing
    (Institution of Engineering and Technology (IET), 2025) Price, George A. J.; Andre, Daniel; Moate, Chris; Yuen, Peter; Finnis, Mark
    The ability to control sidelobes in a SAR image is critical to forming images that are useful for interpretation and exploitation. QinetiQ has developed the RIBI sensing system, which utilises a distributed coherent array of sensors to produce multistatic images. These systems require techniques from outside the traditional radar domain to utilise the theoretical resolution possible in synthesising a coherent aperture from multiple disparate collections. This paper develops previously published work on using compressive sensing techniques to suppress sidelobes in SAR images to develop a higher‐fidelity measurement model. Using Cranfield University's GBSAR System a series, experimental measurements are conducted, and image estimation techniques are applied to this real data. It demonstrates an improvement in recovery performance over an isotropic measurement matrix, and discusses areas which require further development.
  • ItemOpen Access
    Innovative clearance data model for demining operational data collection: insights from field trials in Zimbabwe
    (Elsevier, 2024-12-15) Evans, Roly; Bold, Mikael; Nelson, Liz; Temple, Tracey
    From September 2023 to March 2024 a field trial on a live manual demining site was conducted to test a new and innovative approach for the collection and analysis of operational data. The approach, titled the Clearance Data Model, involved the collection of sixty-six data attributes for each mine found. For the first time the mine itself would become the accountable unit of demining data, against which an expanded range of relevant attributes particular to that specific mine would be recorded. This novel approach represented a considerable expansion to the operational data collected concerning Victim Operated Explosive Devices such as mines, booby-traps and victim operated Improvised Explosive Devices from the field. Previously few if any details about individual accountable mines were collected. The trial proved that is it entirely practical to collect such levels of data without impeding operational efficiency. It also showed that such data has significant benefits for quantitative operational risk management, as well as overall operations and quality management. For example, the recording of mine depth alongside excavation times enables oversight of individual excavation speed and management of any risk identified.
  • ItemOpen Access
    Past, present, and future of battlefield forensics - Presentation
    (The NATO Cooperative Cyber Defence Centre of Excellence, 2024-05-08) Rietveld, Rikke
  • ItemOpen Access
    Introducing the combustion continuum to define the transition points between burning, deflagration, and detonation regimes of energetic materials
    (Taylor and Francis, 2024-12-28) Alford, Roland; Hazael, Rachael; Critchley, Richard
    This paper introduces what the authors term Combustion Continuum which treats oxidation reactions of energetic materials as lying on a continuum in which the variable is the speed of reaction. It divides the continuum into three regions, burning, deflagration, and detonation (BDD) and defines the transition points between each region and describes various observable effects that allow definitive identification of the type of reaction. The transition point between combustion and deflagration is defined as the onset of an atmospheric shock wave, which is the first time deflagration has been defined in such a way that the point of transition can be observed and fixed. The transition point between deflagration and detonation is well defined elsewhere and is the point at which the reaction shocks-up to produce a shock wave driven detonation front. This approach contrasts with most literature that treats burning, deflagration and detonation as interrelated forms of energetic reaction with none giving precise definitions that allow a full understanding of the difference between them and most critically, how to determine whether a reaction is burning or deflagration.
  • ItemUnknown
    As ATMIS looks to withdraw, the risk of large-scale al-Shabaab success in southern Somalia is high
    (The International Peace Institute, 2024-12-10) Robinson, Colin D.
    In March this year, the African Union (AU) expeditionary force in southern Somalia—which started off as AMISOM but is now the African Union Transition Mission in Somalia (ATMIS)—reached its 17th year. The mission will end on December 31, 2024, and it will be replaced by a new African Union Stabilization and Support Mission in Somalia (AUSSOM). United Nations Security Council approval will have to be given this month to meet the changeover deadline. Yet the new force is unlikely to significantly degrade the long-term threat al-Shabaab poses. al-Shabaab is stronger than generally perceived and may be in a position to achieve significant large-scale success.
  • ItemUnknown
    Guest Editorial: Electronic attack and protection for modern radar systems and radar networks
    (Institution of Engineering and Technology (IET), 2024-11-01) Balleri, Alessio; Matthes, Dietmar; Lo Monte, Lorenzo; Kulpa, Krzysztof
    It is our great pleasure to present you with this IET Radar, Sonar and Navigation special issue on “Electronic Attack and Protection for Modern Radar Systems and Radar Networks”. The recent development of fast digital to analogue converters (DACs) and analogue to digital converters (ADCs), field programmable gate arrays (FPGAs) and parallel computing has contributed to the development of modern radars that, at the same time, can also be more easily attacked using digital radio frequency memories (DRFMs). The development of passive and netted multiband, multistatic, multichannel radars has also changed the EW scenario significantly. Classical EA can be less effective against passive, multistatic and multichannel radars and, as a result, new methods and new technologies have to be developed for effective countermeasures. Multichannel and multistatic jammers have also started to play a role in the EW scene. The aim of this special issue was to gather some of the most recent work in this area. The result is a collection of 12 interesting and timely papers aiming to address current technical challenges in electronic warfare. The papers included in this collection covers areas around the more general electronic warfare context as well as address specific challenges of electronic attack and electronic protection as summarised below.
  • ItemUnknown
    Commentary:- Can I use that tool?
    (Elsevier, 2024-12-01) Horsman, Graeme
    The decision as to whether a given tool can be used for the purposes of conducting a digital forensic examination of a device and its data may seem straightforward, but it is not. As part of their work, practitioners must always seek to identify and use tools that are appropriate for their investigative tasks, deploy them reliably within an applicable scenario, and be able to trust and understand the results that they provide. Before they can begin to do this, they must first ask themselves the question - ‘can I use that tool?‘, where this work considers how a practitioner may begin to formulate an answer. By unpacking the hidden complexity of this question, it is suggested that five sub-questions must be explored by any practitioner when seeking to use a tool, namely - (1) ‘what does that tool do?‘; (2) ‘how do I use that tool?‘; (3) ‘how does the tool do it?‘; (4) ‘does the tool do it properly?’ and (5) ‘should I use the tool?‘. This work discusses each in turn and the risks they pose to a practitioner.
  • ItemUnknown
    Angle of attack effects on the induced structural loads of a weapons bay
    (Springer, 2024) Bacci, David; Saddington, Alistair J.
    Aero-acoustic analysis was conducted on a weapons bay numerical model with doors, incorporating radar cross section reduction features. The effect of the angle of attack on the aero-acoustic response of the cavity was analysed at Mach numbers of 0.85 and 1.20. It was found that incidence influenced both mean-flow features and acoustic response. Further, linear and angular accelerations induced by the flow on the bay doors revealed potential adverse fluid–structure coupling when the results were compared with modal analysis. Again, the angle of attack did influence the aeroacoustic effects on the cavity door structure.
  • ItemUnknown
    GAMEPLANS: a template for robust digital evidence strategy development
    (Wiley, 2024-12-31) Horsman, Graeme
    Law enforcement officers should now expect to encounter forms of digital evidence at most of their inquiries, and as a result ensure they are prepared to effectively deal with it. This should involve the production of a digital evidence strategy (DES) which describes those actions required of any investigative team to effectively identify, collect, examine, and evaluate any digital devices/data, while also defining the circumstances for when it is appropriate to conduct such tasks. To help officers to produce robust DESs this work provides a DES template which utilizes the “GAMEPLANS” acrostic to identify nine fundamental components that are required of all DESs—“G”–Grounds for investigation; “A”–Authorization; “M”–Method of investigation; “E”–Evaluation of the meaning of any findings; “P”–Proportionality; “L”–Logic; “A”–Agreement; “N”–Necessity; “S”–Scrutiny. Each of these components are described including the sub‐tasks that are contained within each, which any officer constructing a robust and effective DES must address (and provide evidence of having addressed). To support this, a DES template file is also provided, which can be utilized by officers.
  • ItemUnknown
    Comparative analysis of blast prediction software for far-field shock wave effects behind a blast wall
    (SAGE, 2024-12-31) Chester, Alastair; Hazael, Rachael; Critchley, Richard
    This paper investigates a selection of current and emerging software used in the prediction of overpressure generated through the detonation of a high explosive in the far field behind a blast wall. In particular, this paper compares the software Autodyn, blastFoam, ProSAir, Viper::Blast and WALAIR++. These packages are compared by simulating a 100 kg TNT explosive charge at a stand-off distance of 25 m from a complex structure, then reviewing the performance in terms of the overpressure results, speed of each modelling package, the degree of effect from mesh, and domain sizes and ease of use. A live experimental trial representing the simulation was also performed, although it used a similar but different explosive, for a high-level comparison. The live-trial instrumentation design details are reviewed and compared with best practice. The choice of software is found to lead to variations in peak pressure predictions of 28%, specific impulse by 10% and the simulation speed can vary by a factor of up to 1600 for this type of study. This shows that the choice of blast software package can have a significant impact on the accuracy and attainability of blast predictions.
  • ItemUnknown
    Felid scavenging in forensic taphonomic research: an experimental approach
    (Elsevier, 2024-12-01) Errickson, David; Lawrence, L.; Indra, L.; Thompson, Tim J. U.
    Animal scavenging on human remains presents a major challenge at a forensic scene. These lasting changes can influence the interpretation of a post-mortem interval, the overall state of the remains and any associated evidence, impacting the integrity of the scene. Therefore, identifying taphonomic related changes due to animal scavenging is important to understand the post-deposition sequence of events. However, knowing where to look is challenging and animal scavenging studies are difficult to create. Therefore, this study worked in collaboration with zoological institutes in the UK to capture the scavenging changes to horse bone, focussing on the locations of scavenging on bone and the characteristics left. This study focused on large felid (cheetah, lion, tiger, leopard) scavenging, which is less documented in comparison to canine scavenging. This research demonstrated the distribution patterns of tooth activity associated with large felid scavenging is consistent with those reported in the taphonomic literature on lions. Specifically, pits, punctures, scalloping and furrowing were found and characteristics were frequently noted at the borders and flat regions of bones. This study adds to the forensic discussion of scavenging. While focussing on large cats, the work demonstrates anatomical regions that may be affected by scavenging and the visual cues that may help identify animal interaction over human.
  • ItemUnknown
    Detection of flying nano-drone signatures with a K-band FMCW radar
    (IEEE, 2024) Zulkifli, Safiah; Corrias, Alessandro; Balleri, Alessio
    Nano-drones are insect-like drones with a threat capability of intrusion to provide intelligence and potentially violate secure establishments and public privacy rights. They are an existing technology which is becoming increasingly more available, portable, affordable and easy to operate. As such, they represent a plausible defence and security threat. In this paper, an FMCW radar prototype operating in K-band is presented which was used to detect signatures of a flying nano drone characterised by Radar Cross Section (RCS) values below -25 dB. Results show the radar prototype was capable of successfully detecting the nano drone in flight and collecting its micro-Doppler signatures in various flying trajectories.
  • ItemUnknown
    Using horizon scanning to build policy resilience: case of waste crime
    (Wiley, 2024) Garnett, Kenisha; Wilson, Alister; Wilkinson, Edith
    Waste crime is a pressing concern for the waste and resource industry as it is undermining investment, growth and jobs within the industry and threatening the natural environment. However, there is little knowledge of the scale of the problem, the types of criminality and motivations involved, and the precise nature of crime. Environmental regulators are building foresight capabilities to better understand the effect of current and future changes in markets, in technology and in the legislative environment on waste crime and associated behaviours. At the heart of this paper is the question: how can horizon scanning be adopted by environmental regulators to shape decision processes and build resilience to waste crime? We report our efforts to build a toolkit and guidance for conducting horizon scanning, aimed at supporting environmental regulators, investigators and intelligence analysts to build an understanding of—and interpretation of the consequences of—behavioural, market, technological and pollution trends in the waste sector. A review of the academic and grey literature provided insights to organisational approaches and design principles for public sector horizon scanning. Outputs guided discussion at a stakeholder workshop with waste regulators, criminal intelligence and industry professionals to explore institutional challenges and to agree broad design principles for a horizon scanning process. The toolkit supports environmental regulators in applying horizon scanning to policy and wider operational and delivery‐focused challenges; learning how to: (1) spot weak signals and emerging trends quickly, (2) examine the evidence around potential threats and opportunities for the future, and (3) take action on strategically important issues to minimise the impact of crime on the environment, society and business. The paper sets out further research needed to integrate horizon scanning with data analytics (e.g., predictive and hotspot analyses) to challenge assumptions about the patterns of change, based largely on historical trends, and to better manage these so there is greater adaptability to current and future trends.
  • ItemUnknown
    Self-seal laser ablation open cell for trace elements analysis of full-size archaeological artefacts: application on Famille Rose enamel
    (Elsevier, 2024-12) Delbey, Thomas; Norris, Dana; Douglas, David; Shortland, Andrew
    Laser Ablation Inductively Coupled Plasma Mass Spectrometry (LA-ICP-MS) is a technique that is increasingly becoming the standard analytical approach in archaeological science, especially for the analysis of glass, glaze, and metal. Its low detection limits, high precision and wide element range is twinned with a very small sample size, which makes it ideal for culturally valuable objects. However, in the past, the small sample chamber size in commercial laser systems has meant that the size of object that could be analysed is very limited. Ongoing work by various groups has demonstrated the potential of open architecture and portable systems to overcome this issue. This paper reports an example of this − the results of a validation on a self-seal open ablation cell coupled with a very large sample chamber developed by Cranfield University and Elemental Scientific Lasers LLC. Comparison of the analysis of standard reference materials between the self-seal open cell and a conventional closed cell in a two-volume chamber show that, the count rates for most elements drop in the open cell to between 40–70% with our configuration, but precision, accuracy, fractionation, and limits of detection are barely affected. This means that the result outputs of both chambers are very similar and shows that the open cell is a very real solution to the problem of the small sample chambers in conventional LA-ICP-MS facilities. The functionality of the open cell is demonstrated using a case study of two Chinese, polychrome enamelled copperwares dating from the late 18th or early 19th century Qianlong or Jiaqing period, a tray and a writing set. Due to conservation work on the pieces, five small enamel samples were available, which meant that the results derived from these samples in the conventional laser chamber could be compared to results from the objects themselves in the large sample chamber. Time resolved analysis was carried out giving more information on the thickness of enamel layers and variability between colours and across the object demonstrating the usefulness of having large, complete objects in the chamber.
  • ItemUnknown
    Comparative sampling methodologies for detecting and quantifying 2,4,6 trinitrotoluene post-blast traces in water
    (NATO STO Collaboration Support Office and the Applied Vehicle Technology (AVT) Panel, 2024-10-16) Webb, Sally Lynn; Sharma, Bhumika; Temple, Tracey; Coulon, Frederic
    This study addresses the analytical challenges associated with recovering explosive residues, focusing on the identification of 2,4,6-trinitrotoluene (TNT) in water samples. It evaluates the practicality, efficiency, and representativeness of three sampling methodologies: traditional grab sampling (GS), composite sampling (CS), and 3-D multi-increment sampling (3D-MIS). High-Performance Liquid Chromatography (HPLC) was employed for explosive identification. Post-blast sampling of TNT residues from high-order and low-order deflagrations was conducted to assess each method's efficacy and limitations in detecting trace and bulk contaminations. The experiments were conducted at the Alford Technologies Group range in Broadmead, UK, with analysis performed at the Defence Academy in Shrivenham, UK. Key findings highlight the varying effectiveness of each sampling method, with implications for enhancing detection sensitivity and accuracy in post-blast scenarios. This study underscores the importance of selecting appropriate sampling strategies tailored to different contamination scenarios, thereby informing more effective response protocols in CBRNe incidents involving water environments.
  • ItemUnknown
    Autonomy is the answer, but what was the question?
    (The Institute of Marine Engineering, Science and Technology, 2024-10-21) Spayne, Peter; Lacey, Laura; Cahillane, Marie; Saddington, Alistair J.
    In recent years aspirations regarding the implementation of autonomous systems have rapidly matured. Consequently, establishing the assurance and certification processes necessary for ensuring their safe deployment, across various industries, is critical. In the United Kingdom Ministry of Defence distinctive duty holder structures - formed since the publication of the Haddon Cave report in 2009 - are central to risk management. The objective of this research is to evaluate the duty holder constructs suitability to cater for the unique merits of artificial intelligence-based technology that is the beating heart of highly autonomous systems. A comprehensive literature review examined the duty holder structure and underpinning processes that form two established concepts: i) confirming the safety of individual equipment and platforms (safe to operate); and ii)the safe operation of equipment by humans to complete the human-machine team (operate safely). Bothtraditional and emerging autonomous assurance methods from various domains were compared, includingwithin wider fields, such as space, medical technology, automotive, software, and controls engineering. Thesemethods were analysed, adapted, and amalgamated to formulate recommendations for a single militaryapplication. A knowledge gap was identified where autonomous systems were proposed but could not be adequately assured. Exploration of this knowledge gap revealed a notable intersection between the two operating concepts when autonomous systems were considered. This overlap formed the development of a third concept, safe to operate itself safely, envisioned as a novel means to certify the safe usage of autonomous systems within the UK's military operations. A hypothetical through-life assurance model is proposed to underpin the concept of safe to operate itself safely. At the time of writing the proposed model is undergoing validation through a series of qualitative interviews with key stakeholders; duty holders, commanding officers, industry leaders, technology accelerator organisation leaders, requirements managers, system designers, Artificial Intelligence developers and other specialist technical experts from within the Ministry of Defence, academia, and industry. Preliminary analysis queries whether a capability necessitates the use of autonomy at all. Recognising that some autonomous systems will never be certified as safe to operate themselves safely, voiding ambitious development aspirations. This highlights that autonomy is simply one of many tools available to a developer, to be used sparingly alongside traditional technology, and not a panacea to replace human resource as originally thought. This paper provides a comprehensive account of the convergence between safe to operate and operate safely, enabling the creation of the safe to operate itself safely concept for autonomous systems. Furthermore, it outlines the methodology employed to establish this concept and makes recommendations for its integration within the duty holder construct.
  • ItemUnknown
    Bistatic multi‐polarimetric synthetic aperture radar coherence investigation using spatially variant incoherence trimming
    (Institution of Engineering and Technology (IET), 2024-12-31) Hagelberg, Alexander; Andre, Daniel; Finnis, Mark
    Synthetic Aperture Radar (SAR) Coherent Change Detection allows for the detection of very small scene changes. This is particularly useful for Intelligence, Surveillance and Reconnaissance as small changes such as vehicle tracks can be identified. Rapidly collecting repeat pass SAR imagery is important in these applications. For space‐borne platforms, such repeat passes may however have significant differences, or baselines. Coherent Change Detection products are reliant on high coherence for good interpretability. This work investigates the sources and levels of incoherence associated with bistatic SAR imagery for a variety of baselines using simulations and measured laboratory data for two ground types. Additionally, spatially variant incoherence trimming is implemented. The paper shows the importance of angle‐dependant backscatter on the coherence of sub‐resolution cell scatterers.