Results 31 to 40 of about 100,068 (284)

Center for Joint Services Electronic Warfare (CJSEW) (archived) [PDF]

open access: yes, 2015
Includes an image of the main page on this date and compressed file containing additional web pages.The Center for Joint Services Electronic Warfare (CJSEW) is a major focal point for both industrial and Department of Defense electronic warfare research.
Naval Postgraduate School   +1 more
core  

Metal–Organic Frameworks for Gaseous Pollutant Management: From Capture to Neutralization and Reutilization

open access: yesAdvanced Functional Materials, EarlyView.
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian   +8 more
wiley   +1 more source

Assessment the effectiveness of electronic threats on decision making process of the Electronic warfare operations [PDF]

open access: yesعلوم و فنون نظامی, 2020
The use of new technologies has had a tremendous impact on the breadth and variety of weapons and weapons, so that in today's wars, the ultimate winning power is the ability to make more use of information technology and electronic equipment. The purpose
Ali Panahi
doaj   +1 more source

Fuzzy Chance-constrained Programming Based Security Information Optimization for Low Probability of Identification Enhancement in Radar Network Systems [PDF]

open access: yes, 2015
In this paper, the problem of low probability of identification (LPID) improvement for radar network systems is investigated. Firstly, the security information is derived to evaluate the LPID performance for radar network.
Chen, J.   +3 more
core   +2 more sources

Archeo‐Inspiration from the Cultural History of Glass: Historic Accounts, Anecdotes and Hard Facts as Challenges to Modern Material Science

open access: yesAdvanced Materials, EarlyView.
Glass, historically valued for its purity and durability, has long inspired artists and societies. This article introduces the concept of “Archeo‐Inspiration”, drawing on cultural and historical contexts of glass to guide future material innovations.
Eva von Contzen   +3 more
wiley   +1 more source

Deception Jamming Against Doppler Beam Sharpening Radars

open access: yesIEEE Access, 2020
Missile seekers are becoming increasingly more capable of using Doppler Beam Sharpening (DBS) modes as part of the homing cycle, which requires new countermeasures against this mode.
Gareth Frazer   +2 more
doaj   +1 more source

An Investigation of Learning Model Technologies for Network Traffic Classification Design in Cyber Security Exercises

open access: yesIEEE Access, 2023
With the proliferation of network systems, the boundaries between cyber and physical environments are blurring, leading to an increased risk of sophisticated cyber-attacks equipped with advanced technologies.
Younghoan Jang   +6 more
doaj   +1 more source

Pengenalan Peperangan Elektronika (Electronic Warfare) [PDF]

open access: yes, 2008
Pada saat ini di Pusat Penelitian Informatika telah dilaksanakan penelitian dengan topik topik bidang pertahanan dan keamanan, seperti Steganografi,Radio Frequency Hopping,Telepon Scrambler,Scrambler Descrambler Morse, Radio Jamming dan yang lainnya ...
Djaelani, E. (Elan)   +1 more
core  

Formation Control of Multi‐Agent System with Local Interaction and Artificial Potential Field

open access: yesAdvanced Robotics Research, EarlyView.
This article proposes a local interaction‐based formation control method for Multi‐Agent system, integrating consensus and leader‐follower strategies with a stress response mechanism—artificial potential field to reduce communication overhead and enable obstacle avoidance. Experimental results on triangular, square, and hexagonal formations confirm its
Luoyin Zhao   +3 more
wiley   +1 more source

A dsRNA Viral Transcriptional Regulator Evades Innate Immunity by Hijacking Host CoTranscription Factor DHX9

open access: yesAdvanced Science, EarlyView.
This study identifies a new viral mechanism by a viral protein σ3 that functions as a vTR to suppress NF‐κB gene expression via its direct interaction with the host helicase DHX9. Through their interaction, σ3 not only impairs the initial recruitment of Pol II but also affects Pol II pause‐release and ultimately suppresses NF‐κB gene expression ...
Xueyang Pang   +12 more
wiley   +1 more source

Home - About - Disclaimer - Privacy