Results 1 to 10 of about 54,649 (166)
Cryptographically Strong Elliptic Curves of Prime Order [PDF]
The purpose of this paper is to generate cryptographically strong elliptic curves over prime fields Fp, where p is a Mersenne prime, one of the special primes or a random prime. We search for elliptic curves which orders are also prime numbers.
Marcin Barański +2 more
doaj +1 more source
5G and Beyond Private Military Communication: Trend, Requirements, Challenges and Enablers
Communication networks are becoming increasingly important in military operations, with task fields like time-critical targeting, covert special operations, command and control, training, and logistics, all relying heavily on the communication network ...
Rojeena Bajracharya +4 more
doaj +1 more source
Linguistic and Communicative Practices in the US Military’s Response to the COVID-19 Emergency
There has been debate on the language used by the media and the government in communicating about the pandemic emergency (Kranert et al. 2020; Cardinale 2021; Kalkman 2021).
Roxanne Barbara Doerr
doaj +1 more source
Antijamming Improvement for Frequency Hopping Using Noise-Jammer Power Estimator
In frequency-hopping spread-spectrum (FHSS) systems, jammer detection and mitigation are important but difficult. Each slot of the FHSS experiences frequency-selective fading and unequal transceiver-frequency gains that hinder the detection of jammed ...
Hojun Lee +3 more
doaj +1 more source
In this paper, we present the dependency between density of a sensor network and map quality in the radio environment map (REM) concept. The architecture of REM supporting military communications systems is described.
Marek Suchański +4 more
doaj +1 more source
Development and Potential of Terahertz Technology in Military Applications [PDF]
Terahertz technology, as an advanced frontier technology, is both an opportunity and a challenge for military development. This paper discusses the terahertz technology, the generation and detection of terahertz and the physical properties of terahertz ...
Zhang Bohuai, Guo Kai
doaj +1 more source
Research on evaluation index system of information system equipment system contribution rate [PDF]
The construction of index system is the basis of equipment system contribution rate evaluation, and is also one of the main contents of equipment test and appraisal. This paper discusses the concept of systems contribution rate, introduces the evaluation
Hou Jian +3 more
doaj +1 more source
In tactical mobile ad hoc networks, unmanned vehicles such as ground maneuvering nodes or aircraft, are increasingly expected to be exploited for information collection in battlefields or dangerous areas on behalf of soldiers in consideration of their ...
Dabin Kim, Jaebeom Kim, Young-Bae Ko
doaj +1 more source
An important issue in the protection of information against electromagnetic penetration is the possibility of its non-invasive acquisition. In many cases, getting hold of protected information involves recreating and presenting it in a readable and ...
Ireneusz Kubiak +2 more
doaj +1 more source
Application of multigraph sampling method in network traffic design of simulation model of integrated telecommunication and computer network [PDF]
Designing an integrated telecommunications and computer network using a simulation model requires defining all the network and communication elements that make up the network and network communication.
Miletić Slobodan +2 more
doaj +1 more source

