Results 21 to 30 of about 484,458 (146)

Penetrating missile injuries during asymmetric warfare in the 2003 Gulf conflict

open access: yesBritish Journal of Surgery, 2005
Abstract Background War wounds produce a significant burden on medical facilities in wartime. Workload from the recent conflict was documented in order to guide future medical needs. Methods All data on war injuries were collected ...
D E Hinsley   +3 more
openaire   +2 more sources

Recent developments on oximes to improve the blood brain barrier penetration for the treatment of organophosphorus poisoning: a review

open access: yesRSC Advances, 2020
Organophosphorus (OP) compounds are highly toxic synthetic compounds which have been used as pesticides and developed as warfare nerve agents. They represent a threat to both military and civilian populations.
Mohd Nor Faiz Norrrahim   +11 more
semanticscholar   +1 more source

Analytical Comparison of Espionage Methods in Seven Historical Literary Stories [PDF]

open access: yesفصلنامه نقد ادبی, 2023
Criticism of methodology and analysis of literary works is one of the important topics in the field of scientific and research works, which can shed light on the intertextual influence of literary texts, especially in fiction.
elham arabshahi kashi, Reza Shajari
doaj  

Electronic Warfare Methods Combatting UAVs

open access: yes, 2020
Article history: Received: 27 August, 2020 Accepted: 15 October, 2020 Online: 20 November, 2020 This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) nondestructively, using Electronic Warfare Methods. The aim is to introduce certain
M. Kratky   +3 more
semanticscholar   +1 more source

'Close but no Cigar’: Hamas’s psychological warfare against Israel between 2014 and 2023

open access: yesMiddle Eastern Studies
This essay represents the continuation of my research, on the Hamas Organization’s novel methods of psychological warfare against Israel. The previous article, which covered the period between 2007 and 2014, demonstrated the relative clumsiness of Hamas ...
Nesya Rubinstein-Shemer
semanticscholar   +1 more source

Experimental and numerical investigation on penetration of clay masonry by small high-speed projectile

open access: yesDefence Technology, 2020
Masonry is one of the most common building materials, which is used due to low cost, good sound and heat insulation properties, easy availability and locally available material [1].
C. Wang   +5 more
semanticscholar   +1 more source

Feasibility of Anti-Submarine Buried Target Destruction Technologies

open access: yes水下无人系统学报
This paper discussed the technologies and methods for the effective destruction of submarine buried targets in modern warfare and maritime security. As these targets are highly concealed and difficult to destroy, they are mainly dealt with by kinetic ...
Weichen LI   +4 more
doaj   +1 more source

PentHack: AI-Enabled Penetration Testing Platform for Knowledge Development

open access: yesEuropean Conference on Cyber Warfare and Security
The process of conducting and executing penetration testing within the pedagogical paradigm often requires complex and arduous processes. This is especially daunting for beginners who often struggle with the complexities of penetration processes ...
Meera Alaryani,   +3 more
semanticscholar   +1 more source

Study on the Washing of CBRN Protective Clothing and Its Penetration Performancea

open access: yesJournal of the Korea Institute of Military Science and Technology
This study analyzed the penetration performance characteristics of activated carbon-based CBRN protective clothing before and after washing. Experiments were conducted applying various washing conditions, including types of washing machines, washing mode,
Beomseok Oh   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy