Military ML
Military ML
Military ML
Article
Military Applications of Machine Learning:
A Bibliometric Perspective
José Javier Galán 1, *, Ramón Alberto Carrasco 2 and Antonio LaTorre 3
Abstract: The military environment generates a large amount of data of great importance, which
makes necessary the use of machine learning for its processing. Its ability to learn and predict possible
scenarios by analyzing the huge volume of information generated provides automatic learning and
decision support. This paper aims to present a model of a machine learning architecture applied to a
military organization, carried out and supported by a bibliometric study applied to an architecture
model of a nonmilitary organization. For this purpose, a bibliometric analysis up to the year 2021
was carried out, making a strategic diagram and interpreting the results. The information used
has been extracted from one of the main databases widely accepted by the scientific community,
ISI WoS. No direct military sources were used. This work is divided into five parts: the study of
previous research related to machine learning in the military world; the explanation of our research
methodology using the SciMat, Excel and VosViewer tools; the use of this methodology based on data
mining, preprocessing, cluster normalization, a strategic diagram and the analysis of its results to
investigate machine learning in the military context; based on these results, a conceptual architecture
of the practical use of ML in the military context is drawn up; and, finally, we present the conclusions,
Citation: Galán, J.J.; Carrasco, R.A.; where we will see the most important areas and the latest advances in machine learning applied, in
LaTorre, A. Military Applications of
this case, to a military environment, to analyze a large set of data, providing utility, machine learning
Machine Learning: A Bibliometric
and decision support.
Perspective. Mathematics 2022, 10,
1397. https://doi.org/10.3390/
Keywords: machine learning; military; artificial intelligence; bibliometric analysis
math10091397
While carrying out this work, as we will see in Section 2, we study related work, noting
that there are few review works in this emerging topic, which has aroused our interest in
performing a bibliometric analysis on one of the main scientific databases, Web of Science,
up to and including the year 2021. In the same section, we also present a conceptual
architecture for the application of ML in a practical way in a nonmilitary organization,
since there are no works reflecting such an architecture in the military domain.
The bibliometric methodology used in this work is explained in Section 3, and we will
mainly make use of the SciMat bibliometric analysis tool, capable of performing a scientific
mapping analysis in a longitudinal framework [5]. With this analysis we build a strategic
diagram in which we identify the main areas of ML applied to the military field.
In Section 4, we apply the described methodology to perform an analysis according
to origin: we see the main scientific areas in which ML is applied to the military world;
author and citation: we determine who are the most active authors in this subject; country:
we analyze how the countries that generate more scientific documentation in this sense
are usually the ones that have fewer citations; and we distinguish two periods: before
2015 and after 2016, after which the increase in publications on ML in the military world
rapidly ascends.
In Section 5, once this bibliometric analysis is completed, we are now in a position to
redefine the conceptual architecture presented in Section 2 specifically for military organizations.
Finally, we come to some conclusions in which we expose the results obtained related
to the main thematic areas found and the conclusions.
2. Related Work
First, in Section 2.1, we searched for bibliometric or review articles related to the
application of ML in the military world, and we did not find relevant information. Then,
in Section 2.2, we searched for a data-driven architecture for nonmilitary organizations
to serve as a basis for establishing a new model oriented to the military world, which we
complement with the present bibliometric study.
Due to its interest, we will analyze this last group in more detail. Firstly, we have found
recent review works on specific optimization techniques, such as dynamic programming
and its application to the military field [34].
We have also found a review on AI and its applications in the military field [35]. This
review describes three main military applications:
• Military AI overview. The main AI projects and milestones carried out by the Defense
Advanced Research Projects Agency (DARPA) are examined. In June 2016, the Alpha
AI air combat simulation opponent pilot developed by the U.S. University of Cincinnati
scored a victory over famed Air Force tactical instructor Colonel Gene Lee. As of 2018,
the AI Next project included five directions: new AI capability; robust AI; anti-AI;
high-performance AI and next-generation AI;
• Observation, orientation, decision and action approaches. The authors explore this
approach based primarily on data and AI in the military field:
# Information fusion. In the military field, merging heterogeneous information
from different sources is essential;
# Situation awareness. The perception of the existing elements in the volume of the
time and space of an environment, understanding its meaning, intention with
other agents and its future;
# Decision support system. Requires the participation of hybrid decision makers:
humans and computers;
# Path planning. Used to avoid threats or obstacles to help commanders choose the
appropriate path;
# Human–machine interface. Interrelating a mechanical element with an assistant
in an ideal environment.
• Challenges and solutions of AI in a military context. The main ones found by the
authors are as follows:
# Modeling of complex systems. A large amount of information is generated in
a war environment. The level of intelligence can be verified and evaluated by
means of a simulation system, which is quite reduced;
# Imperfect information environment. In a combat situation, the information ob-
tained is always limited, and the authenticity of the information is not guaranteed.
AI technology is not omnipotent; it must be combined with traditional technolo-
gies, such as knowledge reasoning and search and solution, in which the role of
domain knowledge is indispensable.
This work, while interesting, is not specifically oriented to ML, and also focuses almost
exclusively on U.S. applications. In this respect, it cannot be considered a global survey of
the field.
There are other, less important NATO (North Atlantic Treaty Organization) papers
that are coincident with the military applications of AI [31].
It can be seen that the existing scientific literature does not reflect specific and com-
prehensive studies on ML applied to the military environment. Therefore, we see the
need to carry out this novel study, which provides the scientific community with updated
data on the scientific interest of ML applied to the military environment, explaining the
identified areas and making a categorization of them, and showing the existing interest in
decision making based on data in such a military environment. In Section 3 we explain the
methodology used for this study, which aims to be more objective than most of the related
works by using a bibliometric study as a basis.
The
Thecomponents
componentsof ofthe
theconceptual
conceptualarchitecture
architectureare areasasfollows:
follows:
o# Data management solutions for business analytics
Data management solutions for business analytics (DMSBA). (DMSBA). Data
Dataareare
thethe
essential
essential
raw materials for data-driven decision making. From
raw materials for data-driven decision making. From them, ML algorithms them, ML algorithms will be be
will
able to find the desired knowledge in the form of patterns. In
able to find the desired knowledge in the form of patterns. In this way, we should this way, we should
have
haveaccess
accesstoto both
bothinternal andand
internal external datadata
external considered
considered important
importantfor decision
for decision
making.
making.The The format
format of ofthese data
these cancan
data be structured
be structured (typically tables
(typically of relational
tables of relational
databases
databasesthat thatare
aremanipulated
manipulated with
withSQL),
SQL), semi-structured
semi-structured (with
(with structure
structurebutbutnotnot
tables,
tables,including
includingNoSQLNoSQLdatabases)
databases)ororunstructured
unstructured(without
(withoutaadefineddefinedformat,
format, such
such as natural
as natural language,
language, images,
images, video,
video, etc.)[37,39].
etc.) [37,39]. AA conventional organization
organization is
ismainly
mainlycharacterized
characterizedby bystructured
structuredinternal
internal datadata from
from its its operational
operational systems:
systems: ERP
ERP (enterprise
(enterprise resource
resource planning)
planning) and and
CRM CRM (customer
(customer relational
relational management).
management). Prior to
Prior
theirtoanalysis,
their analysis,
these data these databemust
must be stored.
stored. For thisFor this purpose,
purpose, there arethere
twoare twotypes
main
main types ofa systems:
of systems: a data warehouse,
data warehouse, mainly fordata,
mainly for structured structured data,lake,
and a data and for
a data
all other
cases.
lake, forData provided
all other cases.byData
experts shouldby
provided also be considered
experts should also in this layer, since in
be considered thisthis
type
of knowledge should be systematized in organizations [40];
layer, since this type of knowledge should be systematized in organizations [40];
o# Insight
Insightgeneration
generationfor for business.
business. This
This is the
is the tasktask performed
performed by data
by data scientists
scientists withwith
MLMLalgorithms
algorithmsatat itsits core.
core. MLML algorithms
algorithms areare classified
classified intointo
threethree
main main categories:
categories:
supervised learning, unsupervised learning and reinforcement learning. Supervised
ML uses labeled data in a certain target class, which must be learned by the algorithm.
If this target variable is continuous, we would be in a case of regression, as would be
the case if it is discrete in classification. Unsupervised ML works with unlabeled data
by obtaining groupings of the data, association rules, dimensionality reduction, etc.
supervised learning, unsupervised learning and reinforcement learning. Supervised
ML uses labeled data in a certain target class, which must be learned by the algo-
Mathematics 2022, 10, 1397 rithm. If this target variable is continuous, we would be in a case of regression,5 of as27
would be the case if it is discrete in classification. Unsupervised ML works with
unlabeled data by obtaining groupings of the data, association rules, dimensionality
reduction, etc. Reinforcement ML considers the problem of a computational agent
Reinforcement ML considers the problem of a computational agent learning to make
learning to make decisions by a trial-and-error method [39];
decisions by a trial-and-error method [39];
o Business Application. This is the task performed by data scientists with ML algo-
# Business Application. This is the task performed by data scientists with ML algo-
rithms at its core. Using the knowledge extracted in the previous layer, the appro-
rithms at its core. Using the knowledge extracted in the previous layer, the appropriate
priate business decisions are made in this layer. Although there are many business
business decisions are made in this layer. Although there are many business applica-
applications,
tions, the mostthe most important
important ones haveones
beenhave been identified
identified in shown
in [38], as [38], as in
shown
Figurein1.Fig-
A
ure 1. A preliminary view is that many of these applications could be
preliminary view is that many of these applications could be applicable in military applicable in
military
fields, fields,
such such as predictive
as predictive analytics
analytics and and intelligent
intelligent decision
decision making, making, cyber-
cybersecurity and
threat intelligence, healthcare, image, speech and pattern recognition, etc.recognition,
security and threat intelligence, healthcare, image, speech and pattern In this layer
etc. In
there is this layer there
a constant taskisofa monitoring
constant task of monitoring
and and permanent
permanent learning about the learning
decisions
about the decisions taken, in order to contrast them
taken, in order to contrast them with the business objectives. with the business objectives.
3.3.Research
ResearchMethodology
Methodology
InInthis
thissection
Sectionwewe explain
explain thethe methodology
methodology used,
used, which
which wewe will
will later
later apply
apply in Section
in Section 4.
4. The
The methodology
methodology usedused is based
is based on scheme
on the the scheme presented
presented in Figure
in Figure 2. 2.
Figure2.2.Steps
Figure Stepsused
usedininthe
theresearch
researchmethodology.
methodology.
3.1.
3.1.Set
Setthe
theObjectives
Objectivesofofthe
theAnalysis
Analysis
At
At this stage, the researchquestions
this stage, the research questionsshould
shouldbebeclearly
clearlyformulated.
formulated.
The research topic, the period to be investigated,
The research topic, the period to be investigated, the the sources
sourcestotobe
beused,
used,etc.,
etc.,must
mustbe
bedelimited.
delimited.
The
Theobjective
objectiveisistotoconduct
conducta acomprehensive
comprehensivestudy studyofofthe
therelationship
relationshipbetween
betweenthe the
military and ML, following on from the proposal of conceptual military
military and ML, following on from the proposal of conceptual military architecture.architecture.
We
Wewant
wanttotoknow
knowwhatwhatisisbeing
beingresearched,
researched,bybywhom,
whom, in in which
which countries and organ-
countries and orga-
nizations and how it is developing over time. We want to draw conclusions about where
izations and how it is developing over time. We want to draw conclusions about where
specific research topics could be focused. Finally, our objective is to present the main areas
identified that relate ML to the military environment, to group these areas into categories
that we will explain one by one in Section 4 and, finally, to comment on the dimensions
detected in relation to these topics.
Mathematics 2022, 10, 1397 6 of 27
Moreover, in this type of study, we can add temporal dimensions. Depending on the
type of analysis, we use the following bibliographic relations:
• Co-authorship analysis: The relatedness of items is determined based on their number
of co-authored documents;
• Citation analysis: The relatedness of items is determined based on the number of
times they cite each other;
• Bibliographic coupling analysis: The relatedness of items is determined based on the
number of references they share;
• Co-citation analysis: The relatedness of items is determined based on the number of
times they are cited together;
• Co-occurrence analysis: The relatedness of keywords is determined on the number
of documents in which they occur together. In this sense, the equivalence index is
usually used [41]:
c2ij
eij = (1)
ci · c j
where cij is the number of documents in which keywords i and j co-occur; ci and cj represent
the number of documents in which each appears.
𝑐2𝑖𝑗
𝑒𝑖𝑗 = (1)
𝑐𝑖 ∙ 𝑐𝑗
Mathematics 2022, 10, 1397 where cij is the number of documents in which keywords i and j co-occur; ci and cj 7repre-
of 27
3.5.Network
3.5. NetworkExtraction
Extractionand
andClustering
Clustering
Basedon
Based on the
the aforementioned
aforementioned relationship
relationshipmeasures
measures(Table
(Table2)2)different networks
different networks are
are constructed,
constructed, depending
depending on theon type
the type of analysis.
of analysis. After After this construction,
this construction, a process
a process of clus-
oftering
clustering or grouping
or grouping of theof the items
items that are that are considered
considered similarsimilar is usually
is usually carriedcarried out.
out. There-
Therefore, we cluster
fore, we cluster thosethose
nodes nodes
that arethatsufficiently
are sufficiently
closeclose to each
to each otherother and sufficiently
and sufficiently sepa-
separated
rated from from
the the
restrest of the
of the clusters.
clusters.
InInthis work for co-occurrence
this work for co-occurrence analysis, analysis, we we use
usethe
thesingle-link
single-linkhierarchical
hierarchicalclustering
cluster-
ing algorithm Agnes, with a network size between 3 and 12. This
algorithm Agnes, with a network size between 3 and 12. This algorithm [42] is an agglom- algorithm [42] is an
agglomerative
erative clustering clustering algorithm,
algorithm, i.e., it considers
i.e., it considers at the beginning
at the beginning that eachthat
itemeach
is a item is ain
cluster
cluster in itself,
itself, and, and,step,
in each in each step,
it tries to it tries the
group to group
nearestthe nearestorclusters
clusters or items.
items. Using the Using the
single-link
single-link
option, theoption,
distancethebetween
distancetwo between
groupstwo groups
is the is thebetween
distance distancethe between
closest the closest
individuals
individuals
in each group. in each
Othergroup.
options,Othersuchoptions, such as complete-link,
as complete-link, have been
have been discarded discarded
as they tend to
asgenerate
they tend to generate very large clusters and do not allow the identification
very large clusters and do not allow the identification of certain thematic of certain
inter-
thematic interesting areas.
esting areas.
3.6. Building of the Strategy Diagram
3.6. Building of the Strategy Diagram
The strategy diagram, Figure 3, can help to better profile the importance of each cluster
The strategy diagram, Figure 3, can help to better profile the importance of each clus-
in the co-occurrence analysis. It is based on two measures: centrality and density.
ter in the co-occurrence analysis. It is based on two measures: centrality and density.
Figure3.3.Strategy
Figure Strategydiagram.
diagram.
Theobject
The object of
of centrality will
will be
betotomeasure
measurehow
howthe networks
the networks relate to the
relate other
to the net-
other
works. This
networks. value
This valuecancanbebeunderstood
understoodasasaameasure
measure of of the importance of of an
an item
itemininthe
the
developmentofofthe
development theentire
entireresearch
researchfield
fieldanalyzed.
analyzed.ItItisisdefined
definedasasfollows
follows[41]:
[41]:
c𝑐==1010 ∑𝑒
· ∑∙ekh (2)
(2)
where ekh has been defined in Equation (1); k and h are keywords, where k is related to the
main cluster and h to other clusters.
The density can assess the internal strength of the network or of the item. This value
can be considered as a measure of the degree of the development of the item. It is defined
as follows:
∑ eij
d = 100· (3)
w
The density can assess the internal strength of the network or of the item. This value
can be considered as a measure of the degree of the development of the item. It is defined
as follows:
∑𝑒
𝑑 = 100 ∙ (3)
Mathematics 2022, 10, 1397
𝑤 8 of 27
where ekh has been defined in Equation (1); i and j are member elements of the set; and w
indicates the number of such elements within the group.
ekh has
whereOnce been
these defined in
measures Equation
have (1); i and jfor
been calculated areeach
member elements
cluster, of the
they are set; andinwa
presented
indicates
strategic the number
diagram of classifies
that such elements withininto
the themes the group.
four groups: highly developed and iso-
latedOnce theseemerging
themes; measuresorhave been calculated
declining for each
themes; basic and cluster, they themes;
transversal are presented in a
and motor
strategic
themes. diagram that classifies the themes into four groups: highly developed and isolated
themes; emerging or declining themes; basic and transversal themes; and motor themes.
3.7. Building of the Evolution and Overlapping Diagrams
3.7. Building of the Evolution and Overlapping Diagrams
We will divide the analysis into two periods: before 2016, and that year plus those
We will divide the analysis into two periods: before 2016, and that year plus those
years after it. In this way we obtain the evolution and overlapping diagram.
years after it. In this way we obtain the evolution and overlapping diagram.
For the evolution diagram we use the Inclusion Index, and for the overlapping map
For the evolution diagram we use the Inclusion Index, and for the overlapping map
we use the Jaccard Index.
we use the Jaccard Index.
In Figures 4 and 5 we can see the evolution diagram where the Inclusion Index,
In Figures 4 and 5 we can see the evolution diagram where the Inclusion Index, widely
widely used in financial analysis, is applied [43]. Figures 3 and 4 are based on the many
used in financial analysis, is applied [43]. Figures 3 and 4 are based on the many examples
examples that exist [5] about it versus others [44]. In Figure 3 there are two different evo-
that exist [5] about it versus others [44]. In Figure 3 there are two different evolution zones
lution zones separated by a line. In one is cluster A1 and cluster A2, and in the other are
separated by a line. In one is cluster A1 and cluster A2, and in the other are clusters B1, B2
clusters
and B1, solid
C2. The B2 and C2.mean
lines The solid lines
that the meanclusters
linked that theshare
linked
theclusters share the
main element. Themain ele-
dotted
ment. The dotted line means that the themes share nonmain elements. The
line means that the themes share nonmain elements. The size of the borders indicatessize of the bor-
ders
the indicatesIndex,
Inclusion the Inclusion
and the Index,
size ofand
the the size of
spheres the spheres
represents the represents
number ofthe number of
publications
publications associated
associated with the cluster.with the cluster.
Figure4.4.Example
Figure Exampleof
ofevolution
evolutionareas.
areas.
Figure 4 shows the stability measures between consecutive periods (or how much
they overlap). The circles are the periods, and the numbers inside are the keywords for
each period. The horizontal arrow is the keywords shared between two consecutive peri-
ods, and the number in parentheses is the similarity index. The down arrow is the number
of outgoing keywords, and the up arrow is the number of incoming keywords in the pe-
riod.
Figure 7 establishes a clear distinction between two periods; the one prior to 2016
where publications related to ML and the military environment were limited in scope. On
the other hand, since 2016, the number of publications has increased until 2021, coinciding
with the pandemic. However, the number of citations on this topic continues to rise, which
shows that it is a topic of scientific interest. As can be seen in the section for period one,
there is hardly any distinction between the areas; however, in period two, many interesting
areas emerge.
10 of 28
Mathematics 2022, 10, 1397 10 of 27
(a)
(b)
(c)
Figure 7. Periods of analysis (a) and evolution (b) and overlay diagram (c).
Figure 7. Periods of analysis (a) and evolution (b) and overlay diagram (c).
Period to 2015
Focusing on the area of ML, in Figure 8, and always in relation to the military envi-
ronment, we can see a network by co-occurrence where different dimensions, such as AI,
security or intelligent systems acquire special interest in the ‘to 2015’ period.
(c)
Mathematics 2022, 10, 1397 11 of 27
Figure 7. Periods of analysis (a) and evolution (b) and overlay diagram (c).
Period to 2015
Period to 2015
Focusing on the area of ML, in Figure 8, and always in relation to the military envi-
Focusing on the area of ML, in Figure 8, and always in relation to the military envi-
ronment, we can see a network by co-occurrence where different dimensions, such as AI,
ronment, we can see a network by co-occurrence where different dimensions, such as AI,
security or
security or intelligent
intelligent systems
systems acquire
acquire special
special interest
interest in
in the
the ‘to
‘to 2015’
2015’period.
period.
Figure 8.
Figure 8. Network
Network by
by co-occurrence;
co-occurrence; ML;
ML; Period
Period to
to 2015.
2015.
Period fromfrom
Period 20162016
In the period since 2016, more categories have emerged around ML applied to the
Mathematics 2022, 10, x FOR PEER REVIEW In the period since 2016, more categories have emerged around 12 ML applied to the
of 28
military world. As we can see in Figure 9, there are different areas that can be divided into
military world. As we can see in Figure 9, there are different areas that can be divided into
five categories.
five categories.
Figure
Figure 9. Strategy
9. Strategy map;map; Categories
Categories from 2016.
from 2016.
Because of their interest, we proceed to study each of these categories in more detail:
Because of their interest, we proceed to study each of these categories in more detail:
Psychological and Behavioral Disorders
In this category we include the themes Iraq, post-traumatic stress disorder and trauma.
We analyze one of the main topics, Iraq, in Figure 10, which we call Iraq and the war
Mathematics 2022, 10, x FOR PEER REVIEW 13 of 28
in Afghanistan. Within this category, the use of data will address these disorders in relation
to the military world.
Figure10.
Figure 10. Category:
Category:Psychological andand
Psychological behavioral disorders;
behavioral FromFrom
disorders; 2016; 2016;
Theme:Theme:
Iraq andIraq
Afghan-
and
istan wars.
Afghanistan wars.
Another major
Psychological theme within
disorders: Combat thisand
category is post-traumatic
war conflicts cause stress stress
and disorder, a fre-
mental health
quent symptom
problems in veterans
in civilians, military[47]. In general,
personnel andthere are studies
veterans, whichapplying ML toinpredict
are analyzed this
different
symptomatology,
studies some ofreviews
through literature these studies
and data in analysis
Danish soldiers who participated
[45]. Behavioral disorders:inThrough
Iraq [48]
related
data to psychological
analysis, studies aredisorders.
conductedItto is determine
also easy towhich
find studies
proposedapplying analytical
solutions are thestudies
most
on prostatic stress in Afghanistan veterans related to conduct
effective for these pathologies related to the military experience [46]. disorders [49].
Finally, major
Another we discuss
themetrauma in the
within this military
category environment and
is post-traumatic how
stress there are
disorder, studies
a frequent
[50] in which
symptom ML is applied.
in veterans Some trauma
[47]. In general, data
there are analysis
studies techniques
applying ML to are more this
predict focused
symp- on
mortality [51],
tomatology, some while others
of these focus in
studies onDanish
mentalsoldiers
problems, who such as shock or
participated in stress [52].
Iraq [48] related
to psychological disorders. It is also easy to find studies applying analytical studies on
Soldier Analytics
prostatic stress in Afghanistan veterans related to conduct disorders [49].
Finally,
In this we discuss
category wetrauma
include inthe
thesoldier
military environment
theme, which inand how
itself hasthere
enoughare weight
studies to[50]
be
ina category.
which ML is applied. Some trauma data analysis techniques are more focused on
mortality
The [51],
soldierwhile
is a others focus
figure on on mental
which a largeproblems,
amount ofsuch dataasareshock or stress
analyzed, [52]. 11, and
Figure
Soldier Analytics
whose work is also facilitated by ML [53], providing an advantage, in many cases a stra-
tegicInadvantage,
this category wethe
over include
enemy, soldier
the in theme,
addition to which
creatingin itself hasenvironment
in their enough weight to be
different
aareas
category.
of study. Applications in these areas, such as resilience, prevention, diagnosis, de-
The soldier
pression, AI orisML a figure on which
can help to save;a large amount
currently, thereof are
dataalready
are analyzed,
studies Figure
focused 11,inand
this
whose worksuch
direction, is also
asfacilitated by ML [53],
clinical decision providing
support systems an advantage,
to focused,indetailed
many cases a strategicof
assessments
advantage,
suicide riskover the enemy,
in patients in addition
considered to creating
as being at highinrisk
their environment different areas of
[54].
study. Applications in these areas, such as resilience, prevention, diagnosis, depression,
Mathematics 2022, 10, 1397 13 of 27
AI or ML can help to save; currently, there are already studies focused in this direction,
Mathematics 2022, 10, x FOR PEER REVIEW 14 of 28
such as clinical decision support systems to focused, detailed assessments of suicide risk in
patients considered as being at high risk [54].
Figure11.
Figure 11.Category:
Category:Soldier
Soldieranalytics;
analytics;From
From2016;
2016;Theme:
Theme:Soldiers.
Soldiers.
Figure 12. Category: ML and Opt techniques; From 2016; Theme: Deep learning.
Figure 12. Category: ML and Opt techniques; From 2016; Theme: Deep learning.
WeRobotics
AI, see within andthe sameDevices
Smart category the boosted regression tree analysis, related to link
adaptation and K-nearest
In this category neighbors,
we include which
the themes AI,belongs to the scenario of
electroencephalogram, highly algorithm,
security, developed
and isolated topics, being a
object detection, model and big data. category of little relevance.
AIThe
is genetic
an area algorithm also belongs
of high demand in the to usetheofsame category,
data in relationand we military
to the see its relationship
world, as
with optimization, reinforced learning and clustering algorithms.
seen in this category, Figure 13. This is largely due to the increase in military It can be investment
seen how mil-
in
AIitary applications
research advances produce a large amount
[58]. It highlights the useofofdata collected
drones and theinIoT,
the tobattlefield, as well
such an extent as
that
how these
military datainare
drones someamenable
cases aretomixed
processing by genetic ones
with commercial algorithms,
[59], andusing
how crossover and
AI influences
mutation
military probabilities
strategy [60]. that are automatically adjusted at each generation [45].
Adversarial
The example ML isisarelated
electroencephalogram research to area
datawithin this category,
processing whichits
[61], although focuses on the
presence in
design of strongly developed ML algorithms
the military world is still of little significance. in adversarial environments [57].
ML algorithms collaborate with cybersecurity and, in turn, can be affected by cy-
AI, Robotics
berattacks, soand
thereSmart Devices
are more and more studies on them [62]. Technological security and
protecting data are vital in
In this category we includethe military
the environment.
themes AI, electroencephalogram, security, algo-
The need for algorithms in
rithm, object detection, model and big ML related
data. to the military world is a fact and is present in
the interpretation of the data obtained [63].
AI is an area of high demand in the use of data in relation to the military world, as
seenUnmanned aerialFigure
in this category, vehicles13.are
Thisa isreality
largely anddueinclude object detection
to the increase in militarybyinvestment
means of
algorithms;
in AI researchsome complex[58].
advances onesIt are also using
highlights the deep
use oflearning
drones and[64].the IoT, to such an extent
The model
that military drones in some cases are mixed with commercial onesarea
theme, supported primarily by design, is an emerging that
[59], andis how
beginning
AI in-
tofluences
have value with other areas,
military strategy [60]. such as trauma [51], within this category.
The military experience provides a large amount of data, big data, which need to be
analyzed by ML and is already being completed in many cases for medical purposes [65].
We can see how this area relates to data mining in the military environment in scientific
studies [66].
Military Medical Studies
In this category, we include the themes body negative pressure and training.
Mathematics 2022,10,
Mathematics2022, 10,1397
x FOR PEER REVIEW 15 of
16 of 27
28
Figure13.
Figure 13.Category:
Category:AI,
AI,robotics
roboticsand
andsmart
smartdevices;
devices;From
From2016;
2016;Theme:
Theme:Artificial
Artificialintelligence.
intelligence.
The
In electroencephalogram
relation to body negativeispressure,
related towedata processing
found evidence[61],
from although its presence in
algorithm-supported
the military
studies world data
on military
Mathematics 2022, 10, x FOR PEER REVIEW
is still of little
that focussignificance.
on military medical studies [67]. 17 of 28
ML models
The algorithms
used collaborate with cybersecurity
in military training and, processing
are based on data in turn, canandbeareaffected
becomingby
cyberattacks,common
increasingly so therein are more and
military more[68].
training studies on them [62]. Technological security and
protecting data are vital in the military environment.
4.2. Source 4.2. Source Analysis
Analysis
The need for algorithms in ML related to the military world is a fact and is present in
We can observe in Figure 14 how the number of publications related to ML applied
We can observe
the interpretation ofin
theFigure 14 how the
data obtained number of publications related to ML applied to
[63].
to the military world has clearly been increasing since 2015, although during the pandemic
the military
Unmanned worldaerial
has clearly
vehicles been
are increasing since
a reality and 2015, object
include although duringby
detection themeans
pandemic
of al-
years, it suffered a slight decline at the same time that citations continued to rise.
years,
gorithms;it suffered a slight decline
some complex ones are at also
the same
usingtime
deepthat citations
learning [64].continued to rise.
The model theme, supported primarily by design, is an emerging area that is begin-
ning to have value with other areas, such as trauma [51], within this category.
The military experience provides a large amount of data, big data, which need to be
analyzed by ML and is already being completed in many cases for medical purposes [65].
We can see how this area relates to data mining in the military environment in scientific
studies [66].
Figure
Figure 14. Trend and 14. Trend
citation and citation structure.
structure.
In Figure 16, we can see in general terms the relationship between different countries
in terms of joint participation in the writing of scientific papers on ML applied to the world
of work, and therefore the relationship of the co-authorship of researchers from different
countries in the writing of these papers. The size of each circuit is proportional to the
number of papers, and subsequently we will identify the main countries in the production
of scientific material in this topic during the period of highest productivity: 2016–2019.
The USA co-author network has been changing in recent years, starting in 2016 with a
collaboration network mostly with France and the Netherlands, followed in 2017 and 2018
mainly with England, Australia, Greece and continuing with the Netherlands, until finally
in 2019 the main relationship is with China, India and Taiwan. We can see how England
centered in 2016 its network of co-authors in France and the Netherlands, collaborating in
2017 and 2018 with the USA, Australia, Israel, Iran and Turkey to finally establish stronger
co-authorship with China, India or Saudi Arabia, starting in 2019. China shares co-author-
ship in ML scientific publications in the military world with Norway in 2016, evolving
with the USA, Australia and England during 2017 and 2018 until 2019, when the relation-
ship with India, Canada, Saudi Arabia or Turkey is strengthened.
Figure 16.
Figure 16. Network
Network by
by co-authorship.
co-authorship.
4.4.
4.4. Organization
Organization Analysis
Analysis
In
In Figure 17, we
Figure 17, we normalize
normalize by by organization
organization thethe number
number ofof scientific
scientific papers
papers onon ML
ML
applied to the military world in relation to different organizations.
applied to the military world in relation to different organizations.
It
It is
is striking
striking to
to see
see how
how few
few citations
citations the
the US
US army
army organization
organization hashas in
in relation
relation to
to the
the
number
number of of publications
publications itit generates;
generates; the
the same
same happens
happens with
with the
the Korea
Korea Advanced
Advanced Institute
Institute
of
of Science
Science and and Technology,
Technology, the the Pennsylvania
Pennsylvania State
State University,
University, Sejong
Sejong University,
University, Florida
Florida
State University, Georgia Institute of Technology and Korea
State University, Georgia Institute of Technology and Korea University.University.
On the other hand, we can see the high number of citations of organizations that have
published to a lesser extent, which means that these publications are of high quality, such
as the Uniformed Services University of the Health Sciences, Harvard Medical School, the
University of Pittsburgh, Boston University, VA San Diego Healthcare System, the Uni-
versity of California San Diego and the University of Michigan.
of Science and Technology, the Pennsylvania State University, Sejong University, Florida
State University, Georgia Institute of Technology and Korea University.
On the other hand, we can see the high number of citations of organizations that have
published to a lesser extent, which means that these publications are of high quality, such
as the Uniformed Services University of the Health Sciences, Harvard Medical School, the
Mathematics 2022, 10, 1397 18 of 27
University of Pittsburgh, Boston University, VA San Diego Healthcare System, the Uni-
versity of California San Diego and the University of Michigan.
Figure
Figure 17.
17. Org
Org analysis;
analysis; Most
Most important by documents
important by documents and
and citations.
citations.
On the other hand, we can see the high number of citations of organizations that have
published
Mathematics 2022, 10, x FOR PEER REVIEW
to a lesser extent, which means that these publications are of high quality, such
20 of 28
as the Uniformed Services University of the Health Sciences, Harvard Medical School,
the University of Pittsburgh, Boston University, VA San Diego Healthcare System, the
University of California San Diego and the University of Michigan.
Wepresent
We presentininFigure
Figure1818the
the co-authorship
co-authorship network
network between
between the the different
different organiza-
organizations
tions in the most significant period, between 2018 and 2019. First, we present
in the most significant period, between 2018 and 2019. First, we present where the most where the
most significant organizations are: The US Army establishes a relationship
significant organizations are: The US Army establishes a relationship in 2018 with the in 2018 with
the Uniformed
Uniformed Services
Services University
University of of
thethe Health
Health Sciences,the
Sciences, theUniversity
Universityof ofCalifornia
California San
San
Diego and the University of Virginia to to generate
generate scientific
scientific articles on ML applied
applied to the
the
military world. This relationship continues with the University of Colorado and Harvard
University, ending
University, ending with
with Emory
Emory University
University inin 2019;
2019; the
the Uniformed
Uniformed Services
Services University
University of
the Health
the Health Sciences
Sciences begins
begins its co-authorship
co-authorship in 2018 with several organizations, but, before
long, in 2019 it focuses its relationships primarily on the Johns Hopkins University,
long, in this
University, in
being their
case being their only
only relationship
relationship byby mid-2019
mid-2019 (Figure
(Figure 19).
19).
Figure
Figure19.
19.Network
Networkby
bycitation.
citation.
Bibliographic
Bibliographiccollaboration
collaborationbetween
betweendifferent
differentorganizations
organizationswas
wasvery
verystrong
strongatat the
the
atics 2022, 10, x FOR PEER REVIEW beginning of 2018, and a decrease is seen at the beginning of 2019, as can
21 of be
28 seen
beginning of 2018, and a decrease is seen at the beginning of 2019, as can be seen in in Figure
20.
Figure 20.
5. Discussion
Based on the bibliometric analysis performed, in this section, we redefine the concep-
tual architecture presented in Section 2.2. by adapting it to the military context, as shown
in Figure 22.
The components of each layer are explained below:
– Data management solutions for military analytics (DMSMA). In general terms, it can
be said that the data that predominate in the military context are more complex to
process than those in a conventional organization. In the study we have carried out,
the main sources found are biometric data, e.g., from electroencephalograms [70]; data
from military experts and commanders (e.g., field assessments and weaponry needed
in that particular field), which should be used in conjunction with the other data to
build decision systems [35]; the Internet of things, smart and connected devices widely
used by the military, generating large volumes of information over time [71], e.g., those
provided by radars [72]; the Internet of battlefield things, which connects soldiers
with smart technology in weapons and other objects to give troops “extra sensory
powers” [73]; military personnel data, e.g., those obtained in screening interviews [74];
Mathematics 2022, 10, 1397 21 of 27
The
Thecomponents
componentsofofeach
eachlayer
layerare
areexplained
explainedbelow:
below:
- Data management solutions for military analytics (DMSMA). In general terms, it can
be said that the data that predominate in the military context are more complex to
process than those in a conventional organization. In the study we have carried out,
the main sources found are biometric data, e.g., from electroencephalograms [70];
Mathematics 2022, 10, 1397 22 of 27
– Data management solutions for military analytics (DMSMA). In general terms, it can
be said that the data that predominate in the military context are more complex to
process than those in a conventional organization. In the study we have carried out,
the main sources found are biometric data, e.g., from electroencephalograms [70]; data
from military experts and commanders (e.g., field assessments and weaponry needed
in that particular field), which should be used in conjunction with the other data to
build decision systems [35]; the Internet of things, smart and connected devices widely
used by the military, generating large volumes of information over time [71], e.g., those
provided by radars [72]; the Internet of battlefield things, which connects soldiers
with smart technology in weapons and other objects to give troops “extra sensory
powers” [73]; military personnel data, e.g., those obtained in screening interviews [74];
military veterans’ data obtained, e.g., from their administrative personal files [75];
and other data, both internal and open in any format (including videos, images and
speeches), e.g., those coming from unmanned aerial vehicles [76], videos for facial
recognition [77,78], data from the Internet, etc.;
– Insight generation for military. The predominant ML algorithms in this layer are the
so-called deep ML algorithms, since these algorithms give better results with a large
volume of data and/or unstructured data [69]. These algorithms are based on neural
networks [79]. If the number of layers of such a network is high, they are called deep
learning, e.g., these algorithms are applied to military subjects in [72,80,81]. Deep
adversarial algorithms are often used to attack other ML models and cause their failure,
e.g., [82]. Another deep variant is the long short-term memory (LSTM) algorithms,
which are specialized in the treatment of large-scale time series, e.g., [83]. Another type
of deep network is the convolutional neural networks (CNNs) that are often used for
object detection [82]. In contrast to deep algorithms, there are shallow algorithms [83];
application examples can be found in [84]. We can also find examples of clustering [85],
the detection of outliers [86], optimization [87], reinforcement learning [88], etc.;
– Military application. Several of these applications have already been discussed in
Section 4.1. The following is a list of the most important ones: cybersecurity and threat
intelligence [88]; image, speech and pattern recognition [89]; the mental health of sol-
diers and veterans [74]; military ethics [90]; military personnel behavior analytics and
management [91,92]; military robotics and smart devices [63]; and the physical health
of soldiers and veterans, etc. It is remarkable that several of these ML applications in
the military field have not been identified in previous works [36].
Author Contributions: Conceptualization, J.J.G. and R.A.C.; methodology, J.J.G. and R.A.C.; software,
J.J.G. and R.A.C.; validation, J.J.G., R.A.C. and A.L.; formal analysis, J.J.G. and R.A.C.; investigation,
J.J.G.; resources, J.J.G., R.A.C. and A.L.; data curation, J.J.G. and R.A.C.; writing—original draft prepa-
ration, J.J.G.; writing—review and editing, J.J.G., R.A.C. and A.L.; visualization, J.J.G.; supervision,
A.L. and R.A.C.; project administration, J.J.G. and R.A.C. All authors have read and agreed to the
published version of the manuscript.
Funding: This research has been partially supported support from the FEDER funds provided by the
National Spanish project PGC2018-096509-B-I00.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Acknowledgments: The authors would like to acknowledge the financial support from the FEDER
funds provided by the National Spanish project PGC2018-096509-B-I00 and the DATA SCIENCE AND
SOFT COMPUTING FOR SOCIAL ANALYTICS AND DECISION AID Research Group. LaTorre
thanks the Spanish Ministry of Science (grant PID2020-113013RB-C22). Carrasco thanks the Spanish
Ministry of Science (grant PID2019-103880RB-I00).
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Zhang, Y.; Dai, Z.; Zhang, L.; Wang, Z.; Chen, L.; Zhou, Y. Application of Artificial Intelligence in Military: From Projects View.
In Proceedings of the 2020 6th International Conference on Big Data and Information Analytics (BigDIA), Shenzhen, China,
4–6 December 2020; pp. 113–116. [CrossRef]
2. Pan, J.; Yi, K.; Fang, H.; Zhao, Y.; Du, K.; Liu, W. Analysis of Military Information Construction under the Background of Artificial
Intelligence. E3S Web Conf. 2021, 235, 03046. [CrossRef]
3. Cho, S.; Shin, W.; Kim, N.; Jeong, J.; In, H.P. Priority Determination to Apply Artificial Intelligence Technology in Military
Intelligence Areas. Electronics 2020, 9, 2187. [CrossRef]
4. Ajakwe, S.O.; Nwakanma, C.I.; Lee, J.M.; Kim, D.S. Machine Learning Algorithm for Intelligent Prediction for Military Logistics
and Planning. In Proceedings of the 2020 International Conference on Information and Communication Technology Convergence
(ICTC), Jeju, Korea, 21–23 October 2020; pp. 417–419. [CrossRef]
5. Cobo, M.J.; López-Herrera, A.G.; Herrera-Viedma, E.; Herrera, F. SciMAT: A new science mapping analysis software tool. J. Am.
Soc. Inf. Sci. Technol. 2012, 63, 1609–1630. [CrossRef]
6. Azar, A.T.; Koubaa, A.; Mohamed, N.A.; Ibrahim, H.A.; Ibrahim, Z.F.; Kazim, M.; Ammar, A.; Benjdira, B.; Khamis, A.M.;
Hameed, I.A.; et al. Drone Deep Reinforcement Learning: A Review. Electronics 2021, 10, 999. [CrossRef]
7. Pundir, M.; Sandhu, J.K. A Systematic Review of Quality of Service in Wireless Sensor Networks using Machine Learning: Recent
Trend and Future Vision. J. Netw. Comput. Appl. 2021, 188, 103084. [CrossRef]
8. Liu, H.; Meng, G.; Deng, Z.; Li, M.; Chang, J.; Dai, T.; Fang, X. Progress in Research on VOC Molecule Recognition by
Semiconductor Sensors. Acta Physico-Chim. Sin. 2020, 38, 2008018. [CrossRef]
9. Mellit, A.; Kalogirou, S.A. MPPT-based artificial intelligence techniques for photovoltaic systems and its implementation into
field programmable gate array chips: Review of current status and future perspectives. Energy 2014, 70, 1–21. [CrossRef]
10. Wilson, A.N.; Kumar, A.; Jha, A.; Cenkeramaddi, L.R. Embedded Sensors, Communication Technologies, Computing Platforms
and Machine Learning for UAVs: A Review. IEEE Sens. J. 2021, 22, 1807–1826. [CrossRef]
11. Al-Kaff, A.; Martín, D.; García, F.; de la Escalera, A.; Armingol, J.M. Survey of computer vision algorithms and applications for
unmanned aerial vehicles. Expert Syst. Appl. 2018, 92, 447–463. [CrossRef]
12. Li, Y.; Zhang, H.; Xue, X.; Jiang, Y.; Shen, Q. Deep learning for remote sensing image classification: A survey. WIREs Data Min.
Knowl. Discov. 2018, 8, 1264. [CrossRef]
Mathematics 2022, 10, 1397 24 of 27
13. Zhang, Y.; Xin, J. Survivable Deployments of Optical Sensor Networks against Multiple Failures and Disasters: A Survey. Sensors
2019, 19, 4790. [CrossRef] [PubMed]
14. Convertino, V.A.; Schauer, S.G.; Weitzel, E.K.; Cardin, S.; Stackle, M.E.; Talley, M.J.; Sawka, M.N.; Inan, O.T. Wearable Sensors
Incorporating Compensatory Reserve Measurement for Advancing Physiological Monitoring in Critically Injured Trauma Patients.
Sensors 2020, 20, 6413. [CrossRef] [PubMed]
15. Martins, O.; Adekunle, A.A.; Adejuyigbe, S.B.; Adeyemi, H.O. Quantitative Performance Review of Wheeled Mobile Robot Path
Planning Algorithms. GAZI Univ. J. Sci. 2021, 34, 765–784. [CrossRef]
16. Banerjee, A.; Maity, S.; Mastrangelo, C.H. Nanostructures for Biosensing, with a Brief Overview on Cancer Detection, IoT, and the
Role of Machine Learning in Smart Biosensors. Sensors 2021, 21, 1253. [CrossRef]
17. Tian, Y.; Lan, L.; Guo, H. A review on the wavelet methods for sonar image segmentation. Int. J. Adv. Robot. Syst. 2020, 17,
1729881420936091. [CrossRef]
18. Aziz, L.; Salam, M.S.B.H.; Sheikh, U.U.; Ayub, S. Exploring Deep Learning-Based Architecture, Strategies, Applications and
Current Trends in Generic Object Detection: A Comprehensive Review. IEEE Access 2020, 8, 170461–170495. [CrossRef]
19. Nampoothiri, M.G.; Vinayakumar, B.; Sunny, Y.; Antony, R. Recent developments in terrain identification, classification, parameter
estimation for the navigation of autonomous robots. SN Appl. Sci. 2021, 3, 480. [CrossRef]
20. Zhang, H.; Xin, B.; Dou, L.-H.; Chen, J.; Hirota, K. A review of cooperative path planning of an unmanned aerial vehicle group.
Front. Inf. Technol. Electron. Eng. 2020, 21, 1671–1694. [CrossRef]
21. Hu, W.-D.; Li, Q.; Chen, X.-S.; Lu, W. Recent progress on advanced infrared photodetectors. Acta Phys. Sin. 2019, 68, 20190281.
[CrossRef]
22. Degenstein, L.M.; Sameoto, D.; Hogan, J.D.; Asad, A.; Dolez, P.I. Smart Textiles for Visible and IR Camouflage Application:
State-of-the-Art and Microfabrication Path Forward. Micromachines 2021, 12, 773. [CrossRef]
23. de Neufville, R.; Baum, S.D. Collective action on artificial intelligence: A primer and review. Technol. Soc. 2021, 66, 101649.
[CrossRef]
24. Amalina, F.; Hashem, I.A.T.; Azizul, Z.H.; Fong, A.T.; Firdaus, A.; Imran, M.; Anuar, N.B. Blending Big Data Analytics: Review on
Challenges and a Recent Study. IEEE Access 2019, 8, 3629–3645. [CrossRef]
25. Evangelista, J.R.G.; Sassi, R.J.; Romero, M.; Napolitano, D. Systematic Literature Review to Investigate the Application of Open
Source Intelligence (OSINT) with Artificial Intelligence. J. Appl. Secur. Res. 2021, 16, 345–369. [CrossRef]
26. De las Heras-Rosas, C.D.L.; Herrera, J. Innovation and Competitive Intelligence in Business. A Bibliometric Analysis. Int. J.
Financ. Stud. 2021, 9, 31. [CrossRef]
27. Dodge, J.; Khanna, R.; Irvine, J.; Lam, K.-H.; Mai, T.; Lin, Z.; Kiddle, N.; Newman, E.; Anderson, A.; Raja, S.; et al. After-Action
Review for AI (AAR/AI). ACM Trans. Interact. Intell. Syst. 2021, 11, 1–35. [CrossRef]
28. Samarasinghe, D.; Barlow, M.; Lakshika, E.; Lynar, T.; Moustafa, N.; Townsend, T.; Turnbull, B. A Data Driven Review of Board
Game Design and Interactions of Their Mechanics. IEEE Access 2021, 9, 114051–114069. [CrossRef]
29. Khan, M.J.; Khan, H.S.; Yousaf, A.; Khurshid, K.; Abbas, A. Modern Trends in Hyperspectral Image Analysis: A Review. IEEE
Access 2018, 6, 14118–14129. [CrossRef]
30. Small, S.G.; Medsker, L. Review of information extraction technologies and applications. Neural Comput. Appl. 2014, 25, 533–548.
[CrossRef]
31. López-Robles, J.R.; Otegi-Olaso, J.R.; Gómez, I.P.; Cobo, M.J. 30 years of intelligence models in management and business: A
bibliometric review. Int. J. Inf. Manag. 2019, 48, 22–38. [CrossRef]
32. Miller, D.J.; Xiang, Z.; Kesidis, G. Adversarial Learning Targeting Deep Neural Network Classification: A Comprehensive Review
of Defenses Against Attacks. Proc. IEEE 2020, 108, 402–433. [CrossRef]
33. Gomes, G.F.; Mendéz, Y.A.D.; Alexandrino, P.D.S.L.; da Cunha, S.S., Jr.; Ancelotti, A.C., Jr. The use of intelligent computational
tools for damage detection and identification with an emphasis on composites–A review. Compos. Struct. 2018, 196, 44–54.
[CrossRef]
34. Rempel, M.; Cai, J. A review of approximate dynamic programming applications within military operations research. Oper. Res.
Perspect. 2021, 8, 100204. [CrossRef]
35. Wang, W.; Liu, H.; Lin, W.; Chen, Y.; Yang, J.-A. Investigation on Works and Military Applications of Artificial Intelligence. IEEE
Access 2020, 8, 131614–131625. [CrossRef]
36. Svenmarck, P.; Luotsinen, L.; Nilsson, M.; Schubert, J. Possibilities and challenges for artificial intelligence in military applications.
In Proceedings of the NATO Big Data and Artificial Intelligence for Military Decision Making Specialists’ Meeting, Bordeaux,
France, 30 May–1 June 2018; pp. 1–16.
37. Moreno, C.; Carrasco, R.A.; Herrera-Viedma, E. Data and Artificial Intelligence Strategy: A Conceptual Enterprise Big Data Cloud
Architecture to Enable Market-Oriented Organisations. Int. J. Interact. Multimed. Artif. Intell. 2019, 5, 6. [CrossRef]
38. Xu, Y.; Zhou, Y.; Sekula, P.; Ding, L. Machine learning in construction: From shallow to deep learning. Dev. Built Environ. 2021, 6,
100045. [CrossRef]
39. Sarker, I.H. Machine Learning: Algorithms, Real-World Applications and Research Directions. SN Comput. Sci. 2021, 2, 160.
[CrossRef] [PubMed]
40. Cid-López, A.; Hornos, M.J.; Carrasco, R.A.; Herrera-Viedma, E. A hybrid model for decision-making in the Information and
Communications Technology sector. Technol. Econ. Dev. Econ. 2015, 21, 720–737. [CrossRef]
Mathematics 2022, 10, 1397 25 of 27
41. Cobo, M.J.; Jürgens, B.; Herrero-Solana, V.; Martínez, M.A.; Herrera-Viedma, E. Industry 4.0: A perspective based on bibliometric
analysis. Procedia Comput. Sci. 2018, 139, 364–371. [CrossRef]
42. Huang, W.-Q.; Ding, C.; Wang, S.-Y.; Hu, S. An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based
on the Improved AGNES. IEEE 2015, 1, 1318–1323. [CrossRef]
43. Cámara, N.; Tuesta, D. Measuring financial inclusion: A muldimensional index. BBVA Res. Pap. 2014, 14, 26. [CrossRef]
44. Verma, V.; Aggarwal, R.K. A comparative analysis of similarity measures akin to the Jaccard index in collaborative recommenda-
tions: Empirical and theoretical perspective. Soc. Netw. Anal. Min. 2020, 10, 1–16. [CrossRef]
45. Kehle-Forbes, S.M.; Campbell, E.H.; Taylor, B.C.; Scholten, J.; Sayer, N. Does Co-Occurring Traumatic Brain Injury Affect VHA
Outpatient Health Service Utilization and Associated Costs Among Veterans with Posttraumatic Stress Disorder? An Examination
Based on VHA Administrative Data. J. Head Trauma Rehabil. 2017, 32, E16–E23. [CrossRef] [PubMed]
46. Adamowski, T.; Kiejna, A. Mental Disorders Between Military Conflict’s Veterans. Adv. Clin. Exp. Med. 2006, 15, 355–360.
47. Kang, B.; Karel, M.J.; Corazzini, K.N.; McConnell, E.S. A mixed methods study on the manifestations of behavioural symptoms of
dementia among veterans with and without posttraumatic stress disorder. J. Adv. Nurs. 2021, 77, 3176–3188. [CrossRef] [PubMed]
48. Goderez, B.I. The survivor syndrome. Massive psychic trauma and posttraumatic stress disorder. Bull. Menn. Clin. 1987, 51, 96.
49. Karstoft, K.-I.; Statnikov, A.; Andersen, S.B.; Madsen, T.; Galatzer-Levy, I.R. Early identification of posttraumatic stress following
military deployment: Application of machine learning methods to a prospective study of Danish soldiers. J. Affect. Disord. 2015,
184, 170–175. [CrossRef]
50. Pietrzak, R.H.; Tsai, J.; Harpaz-Rotem, I.; Whealin, J.M.; Southwick, S.M. Support for a novel five-factor model of posttraumatic
stress symptoms in three independent samples of Iraq/Afghanistan veterans: A confirmatory factor analytic study. J. Psychiatr.
Res. 2012, 46, 317–322. [CrossRef]
51. Lammers, D.; Marenco, C.; Morte, K.; Conner, J.; Williams, J.; Bax, T.; Martin, M.; Eckert, M.; Bingham, J. Machine Learning for
Military Trauma: Novel Massive Transfusion Predictive Models in Combat Zones. J. Surg. Res. 2022, 270, 369–375. [CrossRef]
52. Bickel, K.E.; Kennedy, R.; Levy, C.; Burgio, K.L.; Bailey, F.A. The Relationship of Post-traumatic Stress Disorder to End-of-life Care
Received by Dying Veterans: A Secondary Data Analysis. J. Gen. Intern. Med. 2020, 35, 505–513. [CrossRef]
53. Lance, B.J.; Larkin, G.B.; Touryan, J.O.; Rexwinkle, J.T.; Gutstein, S.M.; Gordon, S.M.; Toulson, O.; Choi, J.; Mahdi, A.;
Hung, C.P.; et al. Minimizing data requirements for soldier-interactive AI/ML applications through opportunistic sensing.
Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications II. Int. Soc. Opt. Photonics 2020, 11413,
1141306. [CrossRef]
54. Zuromski, K.L.; Bernecker, S.L.; Gutierrez, P.M.; Joiner, T.E.; King, A.J.; Liu, H.; Naifeh, J.A.; Nock, M.K.; Sampson, N.A.;
Zaslavsky, A.M.; et al. Assessment of a Risk Index for Suicide Attempts Among US Army Soldiers with Suicide Ideation: Analysis
of Data From the Army Study to Assess Risk and Resilience in Servicemembers (Army STARRS). JAMA Netw. Open 2019, 2,
e190766. [CrossRef] [PubMed]
55. Bekesiene, S.; Smaliukiene, R.; Vaicaitiene, R. Using Artificial Neural Networks in Predicting the Level of Stress among Military
Conscripts. Mathmatics 2021, 9, 626. [CrossRef]
56. Aouto, A.; Huynh-The, T.; Lee, J.-M.; Kim, D.-S. Pose-Based Identification Using Deep Learning for Military Surveillance Systems.
In Proceedings of the 2019 International Conference on Information and Communication Technology Convergence (ICTC), Jeju
Island, Korea, 16–18 October 2019; pp. 626–629.
57. Duddu, V. A survey of adversarial machine learning in cyber warfare. Def. Sci. J. 2018, 68, 356. [CrossRef]
58. Fazekas, F. AI and Military Operations’ Planning. In Artificial Intelligence and Its Contexts; Springer: Berlin/Heidelberg, Germany,
2021; pp. 79–91.
59. Restituyo, R.; Hayajneh, T. Vulnerabilities and Attacks Analysis for Military and Commercial IoT Drones. In Proceedings of the
2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY,
USA, 8–10 November 2018; pp. 26–32.
60. Ploumis, M. AI weapon systems in future war operations; strategy, operations and tactics. Comp. Strat. 2022, 41, 1–18. [CrossRef]
61. Srinath, R.; Gayathri, R. Detection and classification of electroencephalogram signals for epilepsy disease using machine learning
methods. Int. J. Imaging Syst. Technol. 2021, 31, 729–740. [CrossRef]
62. Chukhnov, A.P.; Ivanov, Y.S. Algorithms for Detecting and Preventing Attacks on Machine Learning Models in Cyber-Security
Problems. J. Phys. Conf. Ser. 2021, 2096, 012099. [CrossRef]
63. Kang, J.J. A Military Human Performance Management System Design using Machine Learning Algorithms. In Proceedings
of the 2021 31st International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia, 24–26
November 2021; pp. 13–18. [CrossRef]
64. Escobar-Flores, J.G.; Sandoval, S.; Gámiz-Romero, E. Unmanned aerial vehicle images in the machine learning for agave detection.
Environ. Sci. Pollut. Res. 2022, 1–12. [CrossRef]
65. Berry, D. Application of big data in healthcare: Examination of the military experience. Health Technol. 2021, 11, 251–256.
[CrossRef]
66. Ren, L.; Chen, Y. Research on the Application of Data Mining Technology in Military Audit. In Proceedings of the 2021
International Conference on Education, Information Management and Service Science (EIMSS), Xi’an, China, 16–18 July 2021;
pp. 277–283.
Mathematics 2022, 10, 1397 26 of 27
67. Walker, P.B.; Norris, J.N.; Tschiffely, A.E.; Mehalick, M.L.; Cunningham, C.A.; Davidson, I.N.; Tshiffiley, A.E. Applications of
Transductive Spectral Clustering Methods in a Military Medical Concussion Database. IEEE/ACM Trans. Comput. Biol. Bioinform.
2016, 14, 534–544. [CrossRef]
68. Zheng, Y.; Li, W.; Dong, X.; Zhou, M.; Xu, L. Application Research on Big Data of Military Training in Military Academy Teaching.
In Proceedings of the 2020 International Conference on Modern Education and Information Management (ICMEIM), Dalian,
China, 25–27 September 2020; pp. 357–361.
69. Talbot, L.A.; Haffner, W.H.J.; Rice, C.L.; Rothwell, S.W. COVID-19 Pandemic: A Collection of Relevant Publications from Military
Medicine. Mil. Med. 2020, 185, e1364–e1365. [CrossRef]
70. Zhang, Y.; Xu, P.; Li, P.; Duan, K.; Wen, Y.; Yang, Q.; Zhang, T.; Yao, D. Noise-assisted multivariate empirical mode decomposition
for multichannel EMG signals. Biomed. Eng. Online 2017, 16, 107. [CrossRef] [PubMed]
71. Hanson, P.; Truax, L.; Saranchak, D.D. IOT honeynet for military deception and indications and warnings. In Autonomous
Systems: Sensors, Vehicles, Security, and the Internet of Everything. Int. Soc. Opt. Photonics 2018, 10643, 106431A. [CrossRef]
72. Soldin, R.J. SAR Target Recognition with Deep Learning. In Proceedings of the 2018 IEEE Applied Imagery Pattern Recognition
Workshop (AIPR), Washington, DC, USA, 9–11 October 2018; pp. 1–8.
73. Shahid, H.; Shah, M.A.; Almogren, A.; Khattak, H.A.; Din, I.U.; Kumar, N.; Maple, C. Machine Learning-based Mist Computing
Enabled Internet of Battlefield Things. ACM Trans. Internet Technol. 2021, 21, 1–26. [CrossRef]
74. Rosellini, A.J.; Stein, M.B.; Benedek, D.M.; Bliese, P.; Chiu, W.T.; Hwang, I.; Monahan, J.; Nock, M.K.; Sampson, N.A.;
Street, A.E.; et al. Predeployment predictors of psychiatric disorder-symptoms and interpersonal violence during combat
deployment. Depress. Anxiety 2018, 35, 1073–1080. [CrossRef]
75. Rosellini, A.J.; Monahan, J.; Street, A.E.; Heeringa, S.G.; Hill, E.D.; Petukhova, M.; Reis, B.Y.; Sampson, N.A.; Bliese, P.;
Schoenbaum, M.; et al. Predicting non-familial major physical violent crime perpetration in the US Army from administrative
data. Psychol. Med. 2016, 46, 303–316. [CrossRef]
76. Oh, D.; Han, J. Fisheye-Based Smart Control System for Autonomous UAV Operation. Sensors 2020, 20, 7321. [CrossRef]
77. Sharma, S.; Bhatt, M.; Sharma, P. Face recognition system using machine learning algorithm. In Proceedings of the 2020 5th
International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 10–12 June 2020; pp. 1162–1168.
78. Privett, G.J.; Harvey, P.R.W.; Booth, D.M.; Kent, P.J.; Redding, N.J.; Evans, D.; Jones, K.L. Software tools for assisting the
multisource imagery analyst. In Proceedings of the Applications of Digital Image Processing XXVI, San Diego, CA, USA,
5–8 August 2003; Volume 5203, pp. 163–176. [CrossRef]
79. Martinez, J.; MacAllister, A.; Dominguez, E.; Mahlmann, C.; Quinlan, G.; McKee, M. Applying Neural Networks to the F-35 Seam
Validation Process. In Proceedings of the 2021 IEEE Aerospace Conference (50100), Big Sky, MT, USA, 6–13 March 2021; Volume
50100, pp. 1–11.
80. Jahromi, A.N.; Hashemi, S.; Dehghantanha, A.; Parizi, R.M.; Choo, K.-K.R. An Enhanced Stacked LSTM Method with No Random
Initialization for Malware Threat Hunting in Safety and Time-Critical Systems. IEEE Trans. Emerg. Top. Comput. Intell. 2020, 4,
630–640. [CrossRef]
81. Wang, X.; Cheng, P.; Liu, X.; Uzochukwu, B. Fast and Accurate, Convolutional Neural Network Based Approach for Object
Detection from UAV. In Proceedings of the IECON 2018—44th Annual Conference of the IEEE Industrial Electronics Society,
Washington, DC, USA, 21–23 October 2018; pp. 3171–3175.
82. Alfandi, O.; Khanji, S.; Ahmad, L.; Khattak, A. A survey on boosting IoT security and privacy through blockchain. Clust. Comput.
2021, 24, 37–55. [CrossRef]
83. Zhong, G.; Ling, X.; Wang, L. From shallow feature learning to deep learning: Benefits from the width and depth of deep
architectures. WIREs Data Min. Knowl. Discov. 2018, 9, 1255. [CrossRef]
84. Graham, K.; Dipnall, J.; Van Hooff, M.; Lawrence-Wood, E.; Searle, A.; Ao, A.M. Identifying clusters of health symptoms in
deployed military personnel and their relationship with probable PTSD. J. Psychosom. Res. 2019, 127, 109838. [CrossRef]
85. Dwivedi, R.K.; Pandey, S.; Kumar, R. A Study on Machine Learning Approaches for Outlier Detection in Wireless Sensor Network.
In Proceedings of the 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida,
India, 11–12 January 2018; pp. 189–192.
86. Arnous, F.I.; Narayanan, R.M.; Li, B. Artificial intelligence implementation for multi-domain sensor suite optimization. In
Proceedings of the Radar Sensor Technology XXIV International Society for Optics and Photonics, Bellingham, WA, USA, 27
April–8 May 2020; Volume 11408, p. 1140818. [CrossRef]
87. Zuluaga, J.G.C.; Leidig, J.P.; Trefftz, C.; Wolffe, G. Deep Reinforcement Learning for Autonomous Search and Rescue. In
Proceedings of the NAECON 2018—IEEE National Aerospace and Electronics Conference, Dayton, OH, USA, 23–26 July 2018;
pp. 521–524.
88. Shin, G.; Yooun, H.; Shin, D.; Shin, D. Incremental learning method for cyber intelligence, surveillance, and reconnaissance in
closed military network using converged IT techniques. Soft Comput. 2018, 22, 6835–6844. [CrossRef]
89. Zheng, Y.; Song, Q.; Liu, J.; Song, Q.; Yue, Q. Research on motion pattern recognition of exoskeleton robot based on multimodal
machine learning model. Neural Comput. Appl. 2020, 32, 1869–1877. [CrossRef]
90. Iftimie, I.A.; Wilson, R.L. The Use of Signals Intelligence in Offensive Cyberspace Operations: An Anticipatory Ethical Analysis.
In Proceedings of the International Conference on Cyber Warfare and Security, Norfolk, VA, USA, 12–13 March 2020; p. 262-XVIII.
[CrossRef]
Mathematics 2022, 10, 1397 27 of 27
91. Zuromski, K.L.; Bernecker, S.L.; Chu, C.; Wilks, C.R.; Gutierrez, P.M.; Joiner, T.E.; Liu, H.; Naifeh, J.A.; Nock, M.K.;
Sampson, N.A.; et al. Pre-deployment predictors of suicide attempt during and after combat deployment: Results from the Army
Study to Assess Risk and Resilience in Servicemembers. J. Psychiatr. Res. 2020, 121, 214–221. [CrossRef] [PubMed]
92. Morse, S.; Talty, K.; Kuiper, P.; Scioletti, M.; Heymsfield, S.B.; Atkinson, R.L.; Thomas, D.M. Machine learning prediction of
combat basic training injury from 3D body shape images. PLoS ONE 2020, 15, e0235017. [CrossRef]
93. Tursunbayeva, A.; Di Lauro, S.; Pagliari, C. People analytics—A scoping review of conceptual boundaries and value propositions.
Int. J. Inf. Manag. 2018, 43, 224–247. [CrossRef]