Browsing Articles by Title
Now showing items 757-776 of 843
-
Thugs or Terrorists? A Typology of Right-Wing Terrorism in Western Europe
(2015)Despite Western Europe’s extensive history of right-wing terrorism, a systematic categorization of key actors and events is lacking. This article aims to narrow this gap by proposing the first empirically derived typology ... -
Tiered Modelling - A Solution to Hyper-Coherent Morphological Models?
(2017)Morphological models that comprise few constraints between parameter values are considered hyper-coherent. A high degree of coherence in a model can be a problem if it results in a large and unwieldy solution space. This ... -
Time-lapse imaging of human heart motion with switched array UWB radar
(2014)Radar systems for detection of human heartbeats have mostly been single-channel systems with limited spatial resolution. In this paper, a radar system for ultra-wideband (UWB) imaging of the human heart is presented. To ... -
To Learn or not to Learn: On the Importance of Mode Switching in Educational Wargames
(2022-09-19)Conventional wisdom holds that educational wargames come with certain challenges – factors that can potentially hinder, rather than increase, learning – and that these must be mitigated. In this article, we argue that ... -
Toward an architecture and data model to enable interoperability between federated mission networks and IoT-enabled smart city environments
(2018)The emergence of smart city initiatives in many areas of the world has led to rapid development and proliferation of Internet of Things (IoT) technologies. Successful deployments of IoT have resulted in the military looking ... -
Toward federated mission networking in the tactical domain
(2015)NATO is currently working on the Federated Mission Networking (FMN) concept, which will become the foundation for establishing mission networks in the future. The realization of the FMN concept is described in the NATO FMN ... -
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
(2022-11-28)Unmanned vehicles with varying degrees of autonomy will likely change the way military operations can be conducted, but they also introduce risks that require new ways of thinking security. In particular, the safety ... -
Towards friendly force tracking with MQTT over LoRa
(2019-11-25)With the steady growth of the Internet of Things (IoT) in the civilian commercial sector, the question arises as to whether such IoT concepts can also be used for defense purposes. Military needs, especially those that ... -
Towards simulation-based verification of autonomous navigation systems
(2020-09)Autonomous ships are expected to change water-based transport of both cargo and people, and large investments are being made internationally. There are many reasons for such transformation and interest, including shifting ... -
Towards Using Reinforcement Learning for Autonomous Docking of Unmanned Surface Vehicles
(2022-06-10)Providing full autonomy to Unmanned Surface Vehicles (USV) is a challenging goal to achieve. Autonomous docking is a subtask that is particularly difficult. The vessel has to distinguish between obstacles and the dock, and ... -
Towards XAI in the SOC – a user centric study of explainable alerts with SHAP and LIME
(2023-01-26)Many studies of the adoption of machine learning (ML) in Security Operation Centres (SOCs) have pointed to a lack of transparency and explanation – and thus trust – as a barrier to ML adoption, and have suggested ... -
Toxic effects of gunshot fumes from different ammunitions for small arms on lung cells exposed at the air liquid interface
(2021-01-14)Concerns have been raised as to whether gunshot fumes induce prolonged reduced lung capacity or even cancer due to inhalation. Gunshot fumes from three different types of ammunition calibre 5.56 mm × 45 NATO were investigated. ... -
Trace determination of primary nerve agent degradation products in aqueous soil extracts by on-line solid phase extraction-liquid chromatography-mass spectrometry using ZrO2 for enrichment
(2014)A method for determination of the primary nerve agent degradation products ethyl-, isopropyl-, isobutyl-, cyclohexyl- and pinacolyl methylphosphonic acid in aqueous soil extracts has been developed utilizing on-line solid ... -
Trace determination of sulphur mustard and related compounds in water by headspace-trap gas chromatography-mass spectrometry
(2010)A method for trace determination of sulphur mustard (HD) and some of its cyclic decomposition compounds in water samples has been developed using headspace-trap in combination with gas chromatography-mass spectrometry ... -
Tracking airborne Legionella and Legionella pneumophila at a biological treatment plant
(2008)Biological treatment plants are frequently used to degrade organic substances in wastewater from wood refinement processes. Aeration ponds in such plants provide an optimal growth environment for many microorganisms, ... -
Traffic flow confidentiality in federated networks - Multi-topology routing and security options
(2014)Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the ... -
Training of Neural Network Target Detectors Mentored by SO-CFAR
(2020)A desirable objective in radar detection theory is the ability to detect and recognize targets in intricate scenarios such as in the presence of clutter or multiple closely spaced targets. Herein we propose the use of ... -
Training videos to prevent cold weather injuries
(2023-03-29)Cold weather injuries (CWIs) are a challenge during military training, exercises and operations in Arctic conditions. Soldier performance in these challenging conditions depends on protective equipment, knowledge, personal ... -
Tribal engagement strategies in the Islamic Emirate of Azawad
(2022-09-02)The Tuareg uprising in northern Mali in 2012 culminated in the establishment of the Islamic Emirate of Azawad, a proto-state run jointly by Tuareg Islamists in Ansar Dine and foreign jihadists with connections to al-Qaida ... -
Trust Management in Cross Domain Operations
(2015)Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have ...