Results 1 to 10 of about 9,314 (164)
Assessment of Numerical Captive Model Tests for Underwater Vehicles: The DARPA SUB-OFF Test Case
During the early design stage of an underwater vehicle, the correct assessment of its manoeuvrability is a crucial task. Conducting experimental tests still has high costs, especially when dealing with small vehicles characterized by low available budget.
Vito Vasilis Zheku +2 more
exaly +3 more sources
Numerical Self-Propulsion Assessment of a Generic Submarine Model at Various Forward Speeds
In this study, we use computational fluid dynamics (CFD) to investigate the self-propulsion characteristics of a submarine model. Predicting a marine vehicle’s self-propulsion features, and as a result, determining the thrust force required to drive the ...
Taner Çoşgun
doaj +1 more source
Cybersecurity attacks: Which dataset should be used to evaluate an intrusion detection system?
Introduction: Analyzing the high-dimensional datasets used for intrusion detection becomes a challenge for researchers. This paper presents the most often used data sets. ADFA contains two data sets containing records from Linux/Unix.
Danijela D. Protić +1 more
doaj +1 more source
XAITK: The explainable AI toolkit
Recent advances in artificial intelligence (AI), driven mainly by deep neural networks, have yielded remarkable progress in fields, such as computer vision, natural language processing, and reinforcement learning.
Brian Hu +5 more
doaj +1 more source
The DARPA Explainable Artificial Intelligence (AI) (XAI) Program focused on generating explanations for AI programs that use machine learning techniques. This article highlights progress during the DARPA Program (2017‐2021) relative to research since the
William J. Clancey, Robert R. Hoffman
doaj +1 more source
Complications following Encephalo-Duro-Arterio-Myo-Synangiosis in a case of Moyamoya disease
We report a case of an 18-year-old girl diagnosed to have Moyamoya disease (MMD), who underwent bilateral encephalo-duro-arterio-myo-synangiosis. Literature search has clearly inferred that in comparison to an adult patient, children with MMD can have a ...
Darpa Narayan Hazra, Amit Kumar Ghosh
doaj +1 more source
One of the most dangerous kinds of attacks affecting computers is a distributed denial of services (DDoS) attack. The main goal of this attack is to bring the targeted machine down and make their services unavailable to legal users.
Basheer Husham Ali +5 more
doaj +1 more source
This comment paper refers to the article published by Gauvreau et al. in Engineering Biology in 2018. Gauvreau et al. discussed various civilian models in the private and public sectors that could boost R&D plus Innovation (R&D&I) progress in the ...
Ilya Klabukov, Olga Krasilnikova
doaj +1 more source
Forming the Research Component of the U.S. Defense Budget Policy
The authors examine the structure and principles of the defense spending for research and development in the U.S., as well as the main agencies and contractors involved.
A. V. Balyshev, V. I. Konnov
doaj +1 more source
Hydrodynamics of DARPA SUBOFF Submarine at Shallowly Immersion Conditions [PDF]
Recently, the submarine missions are often evolving into operating to littoral areas, which require operating in shallow water. Such shallow water operations strongly contrast with the traditional ones due to the effect of a close to free water surface ...
Dobrin Efremov, Evgeni Milanov
doaj +1 more source

