Search
Now showing items 81-90 of 641
The final destination: building test bed apps for DIL environments
(2015)
Recent years have seen a massive growth in the everyday use of smartphones and tablet (here called smart mobile devices or SMDs) and a turn towards app based software to connect to cloud based services. This has had a huge ...
Comparison of two methods for automatic range alignment in ISAR imaging
(2011)
A maximum likelihood algorithm for translational motion estimation (TME) in ISAR imaging is described and compared with prominent point processing (PPP). It is suggested that the kurtosis (fourth order central moment) of ...
Is established knowledge about cross-cultural differences in individualism–collectivism not applicable to the military? A multi-method study of cross-cultural differences in behavior.
(2017)
Preparing for international military collaboration includes raising knowledge about cultural differences. The differences in individualism–collectivism between countries are among the most central aspects likely to impact ...
Challenges in Seafloor Imaging and Mapping With Synthetic Aperture Sonar
(2011)
Synthetic aperture sonar (SAS) is emerging as an imaging technology that can provide centimeter resolution over hundreds-of-meter range on the seafloor. Although the principle of SAS has been known for more than 30 years, ...
Mid-infrared source with 0.2 J pulse energy based on nonlinear conversion of Q-switched pulses in ZnGeP2
(2014)
Mid-infrared (3–5 μm) pulses with high energy are produced using nonlinear conversion in a ZnGeP2-based master oscillator-power amplifier, pumped by a Q-switched cryogenic Ho:YLF oscillator. The master oscillator is based ...
Exploring Network Organization in Military Contexts: Effects of Flatter Structure and More Decentralized Processes
(2011)
Changes in the tasks and responsibilities of military organizations in recent decades have prompted new organizational solutions collectively known as network organization. Network organization includes changes to central ...
Traffic flow confidentiality in federated networks - Multi-topology routing and security options
(2014)
Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the ...
'Abdallah 'Azzam and Palestine
(2013)
ʿAbdallāh ʿAzzām (1941–1989) helped make jihadism more transnational by spearheading the effort to bring Muslim foreign fighters to Afghanistan in the 1980s. But why would a West Bank native devote himself to a war in ...
Mathematical modelling of the oxygen uptake kinetics during whole-body endurance exercise and recovery
(2017)
In this study, we elucidate four different mathematical models of the kinetics of oxygen uptake during whole-body endurance exercise at different intensities and throughout the subsequent recovery periods. We employ the ...