Results 101 to 110 of about 2,457,982 (249)
One of the threats to industrial unmanned aerial vehicles (UAVs), which require a high level of safety, is the degradation of control wireless communication performance due to electromagnetic interference.
Koh Watanabe +8 more
semanticscholar +1 more source
ABSTRACT Sleep loss and low‐grade inflammation are common stressors that affect behaviour and recovery needs. To examine their separate and combined effects on motivation for everyday behaviours, we developed a two‐hit experimental model. Participants (N = 56, 31 women) completed three experimental visits: sleep saturation (two nights, 9 h in bed/night)
John Axelsson +6 more
wiley +1 more source
Platform echo and cross‐eye jamming against active‐passive composite monopulse radars
Active‐passive composite monopulse radar (APCMR) enhances the anti‐jamming capability by combing the advantages of active radars and passive radars. Previous studies have discussed the effectiveness of cross‐eye jamming against APCMR in a simplified ...
Dong Li +4 more
doaj +1 more source
The European Security Industry: A Research Agenda [PDF]
The security industry can be defined, in the first instance, as the industry that produces the goods and services required to protect citizens from insecurity. Yet, this industry, as opposed to defence, has not been an area of intense research.
Carlos Martí Sempere
core
Expanding alliance: ANZUS cooperation and Asia–Pacific security [PDF]
Is an alliance conceived as a bulwark against a resurgence of Japanese militarism and which cut its military and intelligence teeth in the Cold War is still relevant to today’s strategic concerns?
Andrew Davies +3 more
core
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
Tolerance Analysis and Robustness of Phase Conjugating Cross‐Eye Jamming
In the context of electronic warfare, cross‐eye jamming is a powerful technique designed to induce angular error in radar systems. This study explores the potential of phase‐conjugating (PC) arrays as novel and effective alternative to the traditional ...
Vittorio Calligaris +1 more
doaj +1 more source
Space life sciences: A status report [PDF]
The scientific research and supporting technology development conducted in the Space Life Sciences Program is described. Accomplishments of the past year are highlighted. Plans for future activities are outlined.
core +1 more source
The research utilized a case–control approach to contrast patients experiencing unscheduled readmissions with those undergoing planned readmissions due to staged surgery. Findings indicated a 3.88% rate of unscheduled readmissions, mainly linked to adjacent segment disease, with 3.35% necessitating reoperation.
Wangmi Liu +5 more
wiley +1 more source
The interrupted‐sampling repeater jamming (ISRJ) is an effective kind of intro‐pulse coherent jamming based on digital radio frequency memory. It appears as a group of false targets that are difficult to distinguish on the range profile after pulse ...
Yunhao Ji +3 more
doaj +1 more source

