Results 1 to 10 of about 146,034 (294)
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia+5 more
doaj +1 more source
Organized violence 1989–2021 and drone warfare
This article reports on trends in organized violence, building on new data by the Uppsala Conflict Data Program (UCDP). The falling trend in fatalities stemming from organized violence in the world, observed between 2014 and 2019, was decisively reversed
Shawn Davies+2 more
semanticscholar +1 more source
This paper develops and applies a numerical optimization procedure to compute broadband noise-adaptive weights for delay and sum beamforming that are conditioned to maximize the deflection coefficient at the output of a square law detector for a given ...
Kaushallya Adhikari+4 more
doaj +1 more source
In this paper, we present the dependency between density of a sensor network and map quality in the radio environment map (REM) concept. The architecture of REM supporting military communications systems is described.
Marek Suchański+4 more
doaj +1 more source
Sidelobe Suppression Techniques for Near-Field Multistatic SAR
Multirotor Unmanned Air Systems (UAS) represent a significant improvement in capability for Synthetic Aperture Radar (SAR) imaging when compared to traditional, fixed-wing, platforms.
George A. J. Price+3 more
doaj +1 more source
This is the second paper in a set of five papers devoted to business strategy. This paper deals with military strategy as an origin for all kinds of business strategy.
Lisse Stanislav P.
doaj +1 more source
Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web [PDF]
Over the past couple of years, anecdotal evidence has emerged linking coordinated campaigns by state-sponsored actors with efforts to manipulate public opinion on the Web, often around major political events, through dedicated accounts, or “trolls ...
Savvas Zannettou+5 more
semanticscholar +1 more source
Optimal Configuration Planning for Sensor Network Serviceability Under a System Coverage Constraint
We develop an optimization approach for the planning problem of configuring the positions of sensors within a sensor network for minimization of the travel length required to service the sensor locations.
Thomas A. Wettergren, Russell Costa
doaj +1 more source
Development of Flat Panel Active Phased Array Antennas Using 5G Silicon RFICs at
This article presents the design and development of two all flat panel phased array antennas (PAA) by using emerging 5G Silicon radio frequency integrated circuits (RFICs) at Ku- and Ka-bands.
Jia-Chi Samuel Chieh+7 more
doaj +1 more source
Aims: The dosages and efficacy of 14 ultraviolet (UV) decontamination technologies were measured against a SARS-CoV-2 surrogate virus that was dried onto different materials for laboratory and field testing.Methods and results: A live enveloped ...
Tony L. Buhr+15 more
doaj +1 more source