Browsing Articles by Title
Now showing items 760-779 of 842
-
Toward an architecture and data model to enable interoperability between federated mission networks and IoT-enabled smart city environments
(2018)The emergence of smart city initiatives in many areas of the world has led to rapid development and proliferation of Internet of Things (IoT) technologies. Successful deployments of IoT have resulted in the military looking ... -
Toward federated mission networking in the tactical domain
(2015)NATO is currently working on the Federated Mission Networking (FMN) concept, which will become the foundation for establishing mission networks in the future. The realization of the FMN concept is described in the NATO FMN ... -
Towards data-driven autonomous cyber defence for military unmanned vehicles - threats & attacks
(2022-11-28)Unmanned vehicles with varying degrees of autonomy will likely change the way military operations can be conducted, but they also introduce risks that require new ways of thinking security. In particular, the safety ... -
Towards friendly force tracking with MQTT over LoRa
(2019-11-25)With the steady growth of the Internet of Things (IoT) in the civilian commercial sector, the question arises as to whether such IoT concepts can also be used for defense purposes. Military needs, especially those that ... -
Towards simulation-based verification of autonomous navigation systems
(2020-09)Autonomous ships are expected to change water-based transport of both cargo and people, and large investments are being made internationally. There are many reasons for such transformation and interest, including shifting ... -
Towards Using Reinforcement Learning for Autonomous Docking of Unmanned Surface Vehicles
(2022-06-10)Providing full autonomy to Unmanned Surface Vehicles (USV) is a challenging goal to achieve. Autonomous docking is a subtask that is particularly difficult. The vessel has to distinguish between obstacles and the dock, and ... -
Towards XAI in the SOC – a user centric study of explainable alerts with SHAP and LIME
(2023-01-26)Many studies of the adoption of machine learning (ML) in Security Operation Centres (SOCs) have pointed to a lack of transparency and explanation – and thus trust – as a barrier to ML adoption, and have suggested ... -
Toxic effects of gunshot fumes from different ammunitions for small arms on lung cells exposed at the air liquid interface
(2021-01-14)Concerns have been raised as to whether gunshot fumes induce prolonged reduced lung capacity or even cancer due to inhalation. Gunshot fumes from three different types of ammunition calibre 5.56 mm × 45 NATO were investigated. ... -
Trace determination of primary nerve agent degradation products in aqueous soil extracts by on-line solid phase extraction-liquid chromatography-mass spectrometry using ZrO2 for enrichment
(2014)A method for determination of the primary nerve agent degradation products ethyl-, isopropyl-, isobutyl-, cyclohexyl- and pinacolyl methylphosphonic acid in aqueous soil extracts has been developed utilizing on-line solid ... -
Trace determination of sulphur mustard and related compounds in water by headspace-trap gas chromatography-mass spectrometry
(2010)A method for trace determination of sulphur mustard (HD) and some of its cyclic decomposition compounds in water samples has been developed using headspace-trap in combination with gas chromatography-mass spectrometry ... -
Tracking airborne Legionella and Legionella pneumophila at a biological treatment plant
(2008)Biological treatment plants are frequently used to degrade organic substances in wastewater from wood refinement processes. Aeration ponds in such plants provide an optimal growth environment for many microorganisms, ... -
Traffic flow confidentiality in federated networks - Multi-topology routing and security options
(2014)Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the ... -
Training of Neural Network Target Detectors Mentored by SO-CFAR
(2020)A desirable objective in radar detection theory is the ability to detect and recognize targets in intricate scenarios such as in the presence of clutter or multiple closely spaced targets. Herein we propose the use of ... -
Training videos to prevent cold weather injuries
(2023-03-29)Cold weather injuries (CWIs) are a challenge during military training, exercises and operations in Arctic conditions. Soldier performance in these challenging conditions depends on protective equipment, knowledge, personal ... -
Tribal engagement strategies in the Islamic Emirate of Azawad
(2022-09-02)The Tuareg uprising in northern Mali in 2012 culminated in the establishment of the Islamic Emirate of Azawad, a proto-state run jointly by Tuareg Islamists in Ansar Dine and foreign jihadists with connections to al-Qaida ... -
Trust Management in Cross Domain Operations
(2015)Protocols for communication across security domains need to be evaluated against their architectural properties, not only their security properties. The protocols have connectivity and capacity requirements, they have ... -
Trust, ethnic diversity, and personal contact: A field experiment
(2019-03-22)We study how close personal contact with minorities affects in-group and out-group trust in a field experiment in the armed forces. Soldiers are randomly assigned to rooms with or without ethnic minorities. At the end of ... -
Trusted Service Discovery Through Identity Management
(2013)Service oriented environments face threats from unauthorized clients and fake or compromised services. The threats exist both during service discovery and service invocation, and should be mitigated through the same security ... -
Trusting machine intelligence: artificial intelligence and human-autonomy teaming in military operations
(2023-11-29)Continuous advances in artificial intelligence has enabled higher levels of autonomy in military systems. As the role of machine-intelligence expands, effective co-operation between humans and autonomous systems will become ... -
Tunable holmium-doped fiber laser with multiwatt operation from 2025 nm to 2200 nm
(2019-11-18)The emission band of holmium-doped silica fibers extends beyond 2200 nm, which means these lasers have the potential of covering considerable parts of the atmospheric transmission window between ∼2100 nm and 2250 nm. ...