نتایج جستجو برای: weapon

تعداد نتایج: 4713  

2010
Fredrik Johansson Lars Niklasson

It is in military engagements the task of the air defense to protect valuable assets such as air bases from being destroyed by hostile aircrafts and missiles. In order to fulfill this mission, the defenders are equipped with sensors and firing units. To infer whether a target is hostile and threatening or not is far from a trivial task. This is dealt with in a threat evaluation process, in whic...

2012
Changzhu Wei Yi Shen Xiaoxiao Ma Naigang Cui Jifeng Guo

In traditional engagement model, there is only one single weapon or platform which resists to another single one, and the connections between members are few, so the complete and global information in engagement space can’t be utilized sufficiently, which directly results in traditional model is confronting with more and more disadvantages especially as the high-tech and information-tech are de...

Journal: :JOURNAL OF CLINICAL AND DIAGNOSTIC RESEARCH 2015

2013
Sudha Srinivasan

The failure of safety critical embedded software is unacceptable be it for safety, security or economic reasons. The risk of software failure in complex embedded systems is overcome by using the Independent Verification and Validation (IV&V) technique. The process of IV&V and its planning needs to be initiated early in the development life cycle of the weapon management system for a high perfor...

2010
Stelios Petrakis Anastasios Tefas

First person shooters is probably the most well known genre of the whole gaming industry. Bots in those games must think and act fast in order to be competitive and fun to play with. Key part of the action in a first person shooter is the choice of the right weapon according to the situation. In this paper, we propose a weapon selection technique in order to produce competent agents in the firs...

2010
Fredrik Johansson Göran Falkman

The problem of allocating defensive weapon resources to hostile targets is an optimization problem of high military relevance. The need for obtaining the solutions in real-time is often overlooked in existing literature. Moreover, there does not exist much research aimed at comparing the performance of different algorithms for weapon-target allocation. We have implemented a suite of metaheurist...

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2014
Erin L McCullough Bret W Tobalske Douglas J Emlen

The shapes of sexually selected weapons differ widely among species, but the drivers of this diversity remain poorly understood. Existing explanations suggest weapon shapes reflect structural adaptations to different fighting styles, yet explicit tests of this hypothesis are lacking. We constructed finite element models of the horns of different rhinoceros beetle species to test whether functio...

Journal: :Medicine, conflict, and survival 2007
Bill Williams Tilman A Ruff

Abolishing the threat of nuclear war requires the outlawing of nuclear weapons and dismantling current nuclear weapon stockpiles, but also depends on eliminating access to fissile material (nuclear weapon fuel). The near-universal use of weapons-grade, highly enriched uranium (HEU) to produce radiopharmaceuticals is a significant proliferation hazard. Health professionals have a strategic oppor...

2016
Percival Mackie

v practice and, whilst going at a gallop, dropped his weapon. The horse stepped on the butt end and the point flew up, penetrated his saddle wallet and entered his abdomen just above the pubes, the weapon breaking off about eighteen inches down. The broken shaft and steel portion was withdrawn from abdomen, and the patient sent in to hospital at once. An hour after the accident his condition wa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید