• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,480
Next 10 →

of Military Application

by Manish R Tiwari
"... Wireless Sensors Networks has a broad view of deployable application in military and other organizations that considerably depend upon the sensed information in any emergency situation. One of the main designs issues of the wireless sensor network (WSN) is optimized routing which is a process of tra ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Wireless Sensors Networks has a broad view of deployable application in military and other organizations that considerably depend upon the sensed information in any emergency situation. One of the main designs issues of the wireless sensor network (WSN) is optimized routing which is a process

and Military Applications

by Stabilization In Agricultural
"... Abstract: Three relatively new applications for controlling wind and water erosion using polyacrylamide copolymers arc described that take advantage of their ability to stabilize and add structure to soil. In the first application, low concentrations of anionic, high purity polyacrylamide (PAM) elim ..."
Abstract - Add to MetaCart
Abstract: Three relatively new applications for controlling wind and water erosion using polyacrylamide copolymers arc described that take advantage of their ability to stabilize and add structure to soil. In the first application, low concentrations of anionic, high purity polyacrylamide (PAM

Ontology Development for Military Applications

by Michael Bowman , Antonio M. Lopez, Jr., Gheorghe Tecuci , 2001
"... In order for Artificial Intelligence (AI) to become truly useful in high-level military applications it is necessary to identify, document, and integrate into automated systems the human knowledge that senior military professionals use to solve high-level problems. The skeletal structure for this wo ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
In order for Artificial Intelligence (AI) to become truly useful in high-level military applications it is necessary to identify, document, and integrate into automated systems the human knowledge that senior military professionals use to solve high-level problems. The skeletal structure

Query Processing for Sensor Networks

by Yong Yao, Johannes Gehrke , 2003
"... Hardware for sensor nodes that combine physical sensors, actuators, embedded processors, and communication components has advanced significantly over the last decade, and made the large-scale deployment of such sensors a reality. Applications range from monitoring applications such as inventory main ..."
Abstract - Cited by 447 (4 self) - Add to MetaCart
maintenance over health care to military applications.

Energy-efficient communication protocol for wireless microsensor networks

by Wendi Rabiner Heinzelman, Anantha Chandrakasan, Hari Balakrishnan , 2000
"... Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our f ..."
Abstract - Cited by 2103 (10 self) - Add to MetaCart
Wireless distributed microsensor systems will enable the reliable monitoring of a variety of environments for both civil and military applications. In this paper, we look at communication protocols, which can have significant impact on the overall energy dissipation of these networks. Based on our

Role-Based Access Control

by David Ferraiolo, Richard Kuhn - In 15th NIST-NCSC National Computer Security Conference , 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract - Cited by 477 (6 self) - Add to MetaCart
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method

MILITARY APPLICATIONS OF TIME AND FREQUENCY

by R. L. Beard, J. D. White, J A. Murray
"... The introduction of the NAVSTAR Global Positioning Systm (GPS) to the milby community is having an lesser known, but highly signifccant, impact on those systems requiring dissemination of precise time and frequenq. Precise timelfrequency and their uses could have a wider ranging influence on militar ..."
Abstract - Add to MetaCart
lakr as a operational problem area. The wide spectrum of applications and uses for timing devices within military systems mn be categorized into different system types: ( I) ~v igat ion, ( 2) communications, (3) identification, (4) remote sensing, (5) intelligence, and (6) weapons. In addition

Mechanisms and Military Applications for Synthetic

by H. Van, Dyke Parunak, Sven Brueckner
"... Agents guided by synthetic pheromones can imitate the stigmergetic dynamics of insects. The resulting software architecture is well suited to problems such as the control of unmanned robotic vehicles. We introduce the approach, describe the mechanisms we have developed, and summarize the technology’ ..."
Abstract - Add to MetaCart
’s performance in a series of scenarios reflecting military command and control.

Military Applications of Sensor Networks

by Kristofer S. J. Pister - of Institute for Defense Analyses Paper P-3531, Defense Science Study Group , 2000
"... this document in itspaper or digitalfor so long as it is not sold for prb or usedfor commer58b advantage, and that it is r81b/ whole and unalterb/ cralt to thesour is given, and thiscopyr15 notice isrb251b Themater7 may ber100b/3 byor for the U.S.Gover25b purer to thecopyr881 lice ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
this document in itspaper or digitalfor so long as it is not sold for prb or usedfor commer58b advantage, and that it is r81b/ whole and unalterb/ cralt to thesour is given, and thiscopyr15 notice isrb251b Themater7 may ber100b/3 byor for the U.S.Gover25b purer to thecopyr881 license under the clause at DFARS 252.227-7013(10/88). This document may not be posted on any web, ftp,or similar site without the per811b/ of the Institutefor Defense Analyses

Terahertz Technology for Military Applications

by Salih Ergün, Selçuk Sönmez
"... Abstract- The ability to detect and identify objects hidden behind barriers is one of the core features THz technology can offer. In today’s security environments the ability to identify threats like hidden weapons, body-worn explosives are a strong operational need. Also detecting these threats at ..."
Abstract - Add to MetaCart
Abstract- The ability to detect and identify objects hidden behind barriers is one of the core features THz technology can offer. In today’s security environments the ability to identify threats like hidden weapons, body-worn explosives are a strong operational need. Also detecting these threats at longer ranges are more crucial in security portals. With its capacity in penetrating on a lot of dielectric material and non-polar liquids THz technology can offer cross-barrier vision ability. THz spectral imaging technology is also offering a fingerprint characteristics by identifying the composition of objects. By being non-ionizing THz technology does not represent health hazards for living tissue or humans as X-rays do.
Next 10 →
Results 1 - 10 of 5,480
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University