Results 31 to 40 of about 484,458 (146)

A cooperative jamming resource allocation method based on PSO-SSNOA

open access: yesAIP Advances
A critical challenge degrading the survival probability of penetrators in air penetration missions against networked radar systems stems from inefficient jamming resource allocation, particularly in decision-making quality and real-time responsiveness ...
Wei Liu   +4 more
doaj   +1 more source

Comparison of the adhesion performances of traditional and new generation adhesives used in the making of Turkish bows

open access: yesTurkish Journal of Forestry
From primitive societies to today's modern armies, mankind has engaged in competition and warfare since its existence, developing various weapon systems for prevailing in these conflicts.
Oktay Gönültaş, Salih Parlak
doaj   +1 more source

Polymer of intrinsic microporosity (PIM) based fibrous mat: combining particle filtration and rapid catalytic hydrolysis of chemical warfare agent simulants into a highly sorptive, breathable, and mechanically robust fiber matrix

open access: yesMaterials Today Advances, 2020
Highly selective and lightweight protective suits featuring excellent breathability, mechanical robustness, and catalytic degradation performance toward chemical warfare agents (CWAs) are highly desirable for first responders and the military.
S. Wang   +7 more
doaj  

Reward shaping based reinforcement learning for intelligent missile penetration attack strategy planning

open access: yes智能科学与技术学报
Facing the future requirements of distributed warfare at sea, the strategic planning of missile penetration is firstly analyzed based on the background of intelligent missile salvo penetration against surface ships in distributed warfare scenario ...
LUO Junren   +4 more
doaj  

Cyber-Energy Infrastructure Vulnerabilities in the Hybrid Warfare Environment: Some DoD Mitigation Efforts

open access: yes, 2018
The energy sector has long been recognized as critical infrastructure, particularly vulnerable to external penetration and manipulation by hostile elements. The cyber-energy nexus was chosen as the case study for this article.
Arnold C. Dupuy
semanticscholar   +1 more source

Application, development, and challenges of stealth materials/structures in next-generation aviation equipment

open access: yesApplied Surface Science Advances
Accessing the electromagnetic spectrum is the essence of modern warfare, which is determined by the detection direction, the airframe structure, and the material.
Li Jin   +8 more
doaj  

Analysis on Penetration of Ballistic Missile and Detection in Reentry Phase

open access: yes, 2017
Ballistic missile is becoming secret weapon of modern warfare because of its long distance attacks, low radar cross section, high speed and high accuracy with flexibility with nuclear warheads.
Jun-Chao Yuan, Xiao-Kuan Zhang, Mao Liu
semanticscholar   +1 more source

Mechanical response identification of local interconnections in board-level packaging structures under projectile penetration using Bayesian regularization

open access: yesDefence Technology
Modern warfare demands weapons capable of penetrating substantial structures, which presents significant challenges to the reliability of the electronic devices that are crucial to the weapon's performance. Due to miniaturization of electronic components,
Xu Long, Yuntao Hu, Irfan Ali
doaj  

Ophthalmic manifestations and management considerations for emerging chemical threats. [PDF]

open access: yesFront Toxicol, 2023
Menke BA   +6 more
europepmc   +1 more source

U.S. strategy of damage limitation vis-à-vis China: long-term programs and effects

open access: yesChina International Strategy Review
A number of U.S. military programs, if successfully developed and deployed, could undermine China's nuclear retaliatory capabilities, thereby enhancing U.S. damage limitation capabilities vis-à-vis China.
Bin Li, Riqiang Wu
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy