Results 71 to 80 of about 393,145 (302)

RPKI Defense Capability Simulation Method Based on Container Virtualization

open access: yesApplied Sciences
As the main inter-domain routing protocol in today’s internet, the Border Gateway Protocol (BGP) faces serious security risks during actual usage. Research on BGP malicious attack methods requires a realistic network environment, and evaluation methods ...
Bo Yu, Xingyuan Liu, Xiaofeng Wang
doaj   +1 more source

SDIO robotics in space applications [PDF]

open access: yes
Robotics in space supporting the Strategic Defense System (SDS) program is discussed. Ongoing initiatives which are intended to establish an initial Robotics in Space capability are addressed.
Iliff, Richard
core   +1 more source

The impact of Singapore’s military development on Malaysia’s security [PDF]

open access: yes, 2009
In this intense era of military and defense development in South East Asia, Singapore has emergence as the fastest country in the development of military capabilities.The rapid military development that started in 1965 has made Singapore become the ...
Ajis, Mohd Na'eim   +2 more
core   +1 more source

Evaluating a Pragmatic Strength Alternative for Frailty Measurement and Assessing Its Predictive Capacity Against Established Frailty Instruments in Rheumatoid Arthritis

open access: yesArthritis Care &Research, EarlyView.
Objective Frailty occurs prematurely in rheumatoid arthritis (RA) and is associated with poor health outcomes. We compared the performance of four frailty instruments, including a pragmatic alternative measure using chair sit‐to‐stand (STS), and evaluated their abilities to predict poor health outcomes.
Kylie E. Riggles   +14 more
wiley   +1 more source

THE IDENTIFICATION OF ENEMY INTENTIONS THROUGH OBSERVATION OF LONG LEAD-TIME MILITARY PREPARATIONS [PDF]

open access: yes
Intuitively, we would expect that an increase in the military preparations of potential enemies imply that the rival perceives an increase in the likelihood of future conflict.
Lipow, Jonathan, Plessner, Yakir
core   +1 more source

The American Aircraft Industrial Base: On the Brink [PDF]

open access: yes, 2006
An article reviewing the decline in the American aircraft industrial ...
King, David R.
core   +1 more source

“Super-sizing” the DPRK threat : Japan’s evolving military posture and North Korea [PDF]

open access: yes, 2009
Japan's reemergence as a "normal" military power has been accelerated by the "super-sizing" of North Korea: a product of the North's extant military threat, multiplied exponentially by its undermining of U.S.-Japan alliance solidarity, views of the North
Hughes, Christopher W.
core   +1 more source

Thermoreflectance Detection of Point Defects Resulting from Focused Ion Beam Milling

open access: yesAdvanced Engineering Materials, EarlyView.
Focused ion beam (FIB) milling is a common tool for nanoscale material processing, however irradiation damage, redeposition, and contamination can occur. We use several characterization tools to show FIB‐induced effects beyond 1 mm from the milled area.
Thomas W. Pfeifer   +3 more
wiley   +1 more source

Optimum response scheme of intrusion detection based on information theory

open access: yesTongxin xuebao, 2020
Intrusion detection system (IDS) often inevitably presents major security risks caused by FPs and FNs.However,at present,an effective solution has not been found.In order to solve this problem,an optimal response model of intrusion detection based on ...
Youliang TIAN, Yulong WU, Qiuxian LI
doaj   +2 more sources

Securing guarantees : how nuclear proliferation can strengthen great power commitments [PDF]

open access: yes, 2018
The number of states with nuclear weapons has grown at a much slower rate than many predicted during the early years of the Cold War. Yet the reasons for this slow rate of proliferation are not well understood.
Phillips, Julianne Nicole
core   +1 more source

Home - About - Disclaimer - Privacy