Search Results - "interception"

Refine Results
  1. 1

    ELINT the interception and analysis of radar signals by Wiley

    Published 2006
    Book
  2. 2

    Detecting and classifying low probability of intercept radar by Pace, Phillip E.

    Published 2009
    Subjects: “…Low probability of intercept radar.…”
    Book
  3. 3

    Electronic warfare receivers and receiving systems by Poisel, Richard A.

    Published 2014
    Table of Contents: “…Receiving Systems and Receiving System Architectures; Signals and Modulation Systems; RF Stage; Bandwidth Expansion for Small Signal Amplifiers; RF Mixers and Mixing; IF Amplifiers; IF Filters; Narrowband Receivers; Compressive Receivers; Digital Receivers Overview; Sampling and Analog to Digital Converters; Digital Filtering; Digital Demodulation; Digital to Analog Converters; Direct Digital Converter; Spread Spectrum Techniques; Receivers for DSSS Intercept; Receivers for FHSS Intercept; Receivers for THSS Intercept; DF Receivers…”
    Book
  4. 4

    Hydrology principles and processes by Robinson, M., Ward, R. C.

    Published 2017
    Table of Contents: “…Introduction -- precipitation -- Interception -- Evaporation -- Groundwater -- Soil water -- Streamflow -- Water quality -- Hydrology in a changing world…”
    Book
  5. 5

    A gift of fire social, legal, and ethical issues for computers and the internet by Baase, Sara

    Published 2003
    Table of Contents: “…Unwrapping the gift -- Privacy and personal information -- Encryption and interception of communications -- Can we trust the computer? …”
    Book
  6. 6

    Hacking exposed unified communications & VoIP security secrets & solutions by Collier, Mark D., Endler, David

    Published 2014
    Table of Contents: “…VoIP Components & Targets -- Footprinting -- Scanning & Enumeration -- Toll Fraud & service Abuse -- Harassing Callers & TdoS -- Social Engineering & Information Harvesting -- Voice Spam & Phishing -- Infastructure Denial of Service -- Network Eavesdropping -- Interception -- Cisco Unified Cisco Call Manager -- Avaya Communication Manager -- Microsoft Lync -- Cloud, Emerging, and other Technologies -- Fuzzing & Disrupting of Service -- VoIP Signaling Manipulation -- Audio & Video Manipulation.…”
    Book
  7. 7

    San Remo manual on international law applicable to armed conflicts at sea

    Published 1995
    Table of Contents: “…Measures Short of Attack: Interception, Visit, Search, Diversion, and Capture: 1. …”
    Book
  8. 8

    The story of codebreaking from ancient ciphers to quantum cryptography by Cimino, Al

    Published 2017
    Book
  9. 9

    Most secret and confidential intelligence in the Age of Nelson by Maffeo, Steven E.

    Published 2000
    Table of Contents: “…British Government Key Officials, 1793-1815 -- App.3. Secret Interceptions Distribution List, c. 1775 -- App.4. British Naval Administration, c. 1800 -- App.5. …”
    Book
  10. 10

    Missile defence international, regional and national implications

    Published 2005
    Table of Contents: “…Pre-empt, balance, or intercept? : the evolution of strategies for coping with the threat from weapons of mass destruction / Wilhelm Agrell -- US missile defence : technological primacy in action / Tarja Cronberg -- Missile defence in the United States / Bertel Heurlin -- Roads not (yet) taken : Russian approaches to cooperation in missile defence / Alla Kassianova -- Reluctant allies? …”
    Book
  11. 11

    Perception, cognition, and decision training the quiet eye in action by Vickers, Joan N. 1945-

    Published 2007
    Table of Contents: “…Introduction to the theoretical foundations -- Part I : Visual perception, cognition, and action -- 1 Visual system, motor control, and the changing brain -- 2 Measuring what athletes see -- 3 Visual attention and gaze control -- Part II: Gaze control and the quiet eye in sport -- 4 Gaze control framework -- 5 Gaze control to a single fixed target -- 6 Gaze control in abstract-target and moving-target tasks -- 7 Gaze control in interceptive timing tasks -- 8 Gaze control in tactical tasks -- Part III: Decision training in sport -- 9 Decision-training model -- 10 Designing practices with a decision-training focus -- 11 Providing feedback with a decision-training focus -- 12 Providing instruction with a decision-training focus…”
    Book
  12. 12

    SuperSelf doubling your personal effectiveness by Givens, Charles J

    Published 1993
    Table of Contents: “…Eliminating Interruptions. 16. Intercepting Office Interruptions. 17. Handling Talkers and Dumpers. 18. …”
    Book
  13. 13

    The basics of digital privacy simple tools to protect your personal your information and your identity online by Cherry, Denny

    Published 2014
    Table of Contents: “…; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet. …”
    Book
  14. 14

    Critical perspectives on counter-terrorism

    Published 2015
    Table of Contents: “…Prosecuting Suspected Terrorists: Precursor Crimes, Intercept Evidence and the Priority of Security / Stuart MacDonald -- 8. …”
    Book
  15. 15
  16. 16

    Spread spectrum systems with commercial applications by Dixon, Robert C. (Robert Clyde)

    Published 1994
    Book
  17. 17

    Longitudinal data analysis by Hedeker, Donald R.

    Published 2006
    Table of Contents: “…. -- 4.2 A Simple Linear Regression Model. -- 4.3 Random Intercept MRM. -- 4.4 Random Intercept and Trend MRM. -- 4.5 Matrix Formulation. -- 4.6 Estimation . -- 4.7 Summary. -- 5. …”
    Book
  18. 18

    Introduction to modern EW systems by De Martino, Andrea

    Published 2012
    Table of Contents: “…Chapter 1 Introduction to Electronic Warfare Scenarios; 1.1 Definitions and EW Role in the Military Field; 1.2 Main Weapons Systems of Interest to EW; 1.2.1 Artillery Systems; 1.2.2 Missile Systems; 1.2.3 Active Homing Missiles; 1.2.4 Track via Missile Systems; 1.2.5 Passive IR-Guided Missiles; 1.2.6 Sea-Skimming Missiles; 1.2.7 Antiradiation Missiles; 1.3 EW in Symmetric Conflicts; 1.4 EW in Asymmetric Conflicts; References; Chapter 2 Evolution of Signal Emitters and Sensors; 2.1 Introduction. 2.2 Sensor Electromagnetic Spectrum and Atmospheric Propagation2.3 Radar Principles and Types; 2.3.1 Radar Equation; 2.3.2 Radar Structure; 2.3.3 Radar Signal Processing Fundamentals; 2.3.4 Automatic Detection; 2.3.5 Pulse Compression; 2.3.6 Surveillance Radars; 2.3.7 LPI Radars; 2.3.8 Pulse Doppler Radars; 2.3.9 Tracking Radars; 2.3.10 Synthetic Aperture Radars; 2.3.11 Bistatic Radars; 2.4 Communications; 2.4.1 Access Methods; 2.4.2 Digital Signaling; 2.4.3 Secure Communications; 2.4.4 Coding of Communication Signals; 2.4.5 Typical Military Communication Systems. 2.5 Satellite Navigation Systems2.6 Electro-Optical Thermal Imagers; 2.6.1 Minimum Resolvable Temperature; 2.6.2 IR Missile Seekers; 2.6.3 Missile Approach Warner; 2.7 Laser Radar Systems; 2.7.1 Laser Target Designation and Ranging; 2.7.2 Laser Radar Receivers; 2.7.3 Laser Radar Range Equation; 2.7.4 Target Detection; References; Chapter 3 Electronic Warfare RF Band Sensor Systems; 3.1 Introduction; 3.2 EW Radar Band Sensors; 3.2.1 RWR Architecture; 3.2.2 ESM Architecture; 3.2.3 ELINT Architecture; 3.3 EW Sensor Sensitivity; 3.3.1 Conclusions; 3.4 Probability of Interception. 3.5 EW Radar Band Sensor Architectures3.5.1 Architecture of Past Generation Intercept Receivers; 3.5.2 Architecture of New EW radar Band Sensors; 3.5.3 DSP Technologies; 3.6 Detection and Classification of LPI Radars; 3.7 Emitter Deinterleaving and Sorting; 3.8 Emitter Identification; 3.9 Communications ESM; 3.9.1 CESM; 3.9.2 COMINT; 3.10 SIGINT; 3.11 Conclusion; References; Chapter 4 RF Direction-Finding and Emitter Location Techniques; 4.1 Introduction; 4.2 Amplitude Comparison DF Methods; 4.3 Phase Comparison Monopulse DF Measurement Methods; 4.3.1 Correlative Phase DF. 4.4 Time-Difference DF4.5 Emitter Location; 4.5.1 Triangulation; 4.5.2 Trilateration; 4.5.3 Frequency Difference on Arrival Passive Location Technique; 4.5.4 Inverse Passive Location; 4.6 Conclusion; References; Chapter 5 Electronic Countermeasure Systems; 5.1 Introduction; 5.1.1 Typical RECM Requirements and Missions; 5.1.2 EW Radar Jamming Equation; 5.2 Radar ECM Architecture; 5.3 Digital Radio-Frequency Memory; 5.3.1 Phase-Sampled DRFMs; 5.4 Radar ECM Transmitters; 5.5 Chaff; 5.6 Communication ECM Systems; 5.7 Infrared ECM Systems; 5.7.1 Flares; 5.8 Conclusion…”
    Book
  19. 19

    Intelligent robotics systems: inspiring the NEXT 16th FIRA RoboWorld Congress, FIRA 2013, Kuala Lumpur, Malaysia, August 24-29, 2013 : proceedings

    Published 2013
    Table of Contents: “…Ramón Cerritos-Jasso -- Programming the Goalkeeper of 20 DOF for FIRA Cup / Mauro Santoyo-Mora -- Options and Pitfalls in Embedded Systems Development for Intelligent Humanoid Robots / Jacky Baltes, Kuo-Yang Tu -- Error Analysis in Applying Fuzzy Logic Based Obstacle Avoidance Algorithm for Robot Soccer / Jinjuli Jameson -- Efficient Face Recognition Technique with Aid of Active Appearance Model / Mohammed Hasan -- Teaching Basic Probability Concept Using SocSim Robot Soccer Simulator: An Approach / Yoong Chow Ho -- Set of Fuzzy Systems for Computation of Pass Optimality in Robot Soccer Strategy / Alexey Kachalov -- Novice Learning in Robot Soccer Calibration / Maryam Jaafar -- Grammatical Evolution Algorithm for Position Prediction of the Ball in Robot-Soccer Goal Keeper Optimization / Aulia El Hakim, Dadan Nur Ramdan -- Client Server System for MiroSot Robot Soccer / Dadan Nur Ramadan, Aulia El Hakim -- Image Classification Using Optimized Synergetic Neural Network / Ghazaleh Taherzadeh, Chu Kiong Loo -- Characteristics of Student Engagement in Robotics / Igor Verner -- Portable and Fast Vision System Implementation Using LabVIEW / Dinna Fitriyana, Priadi Teguh Wibowo -- UAV Dynamic Path Planning for Intercepting of a Moving Target: A Review / Hendri Himawan Triharminto -- Anomaly Detection Using Cooperative Fuzzy Logic Controller / Ali Feizollah, Shahaboddin Shamshirband -- Formations Strategies for Obstacle Avoidance with Multi Agent Robotic System / M. …”
    Conference Proceeding Book
  20. 20

    Unmanned aircraft systems UAVs design, development and deployment by Austin, Reg

    Published 2010
    Table of Contents: “…Part 3 THE DEPLOYMENT OF UAV SYSTEMS. 21 Operational Trials and Full Certification. 21.1 Company Trials. 21.2 Customer Trials and Sales Demonstrations. 22 UAV System Deployment. 22.1 Introduction. 22.2 Network-centric Operations (NCO). 22.3 Teaming with Manned and Other Unmanned Systems. 23 Naval Roles. 23.1 Fleet Detection and Shadowing. 23.2 Radar Confusion. 23.3 Missile Decoy. 23.4 Anti-submarine Warfare. 23.5 Radio Relay. 23.6 Port Protection. 23.7 Over-beach Reconnaissance. 23.8 Fisheries Protection. 23.9 Detection of Illegal Imports. 23.10 Electronic Intelligence. 23.11 Maritime Surveillance. 23.12 Summary. 24 Army Roles. 24.1 Covert Reconnaissance and Surveillance. 24.2 Fall-of-shot Plotting. 24.3 Target Designation by Laser. 24.4 NBC Contamination Monitoring. 24.5 IED and Landmine Detection and Destruction. 24.6 Electronic Intelligence. 24.7 Teaming of Manned and Unmanned Systems. 24.8 System Mobility. 24.9 Persistent Urban Surveillance. 25 Air Force Roles. 25.1 Long-range Reconnaissance and Strike. 25.2 Airborne Early Warning. 25.3 Electronic Intelligence. 25.4 Pre-strike Radar and Anti-aircraft Systems Counter. 25.5 Interception. 25.6 Airfield Security. 26 Civilian, Paramilitary and Commercial Roles. 26.1 Aerial Photography.* 26.2 Agriculture. 26.3 Coastguard and Lifeboat Institutions. 26.4 Customs and Excise. 26.5 Conservation. 26.6 Electricity Companies. 26.7 Fire Services. 26.8 Fisheries. 26.9 Gas and Oil Supply Companies. 26.10 Information Services. 26.11 Local Civic Authorities. 26.12 Meteorological Services.* 26.13 Traffic Agencies. 26.14 Ordnance Survey. 26.15 Police Authorities.* 26.16 Rivers Authorities and Water Boards. 26.17 Survey Organisations. 26.18 Communications Relay. 26.19 Landmine Detection and Destruction. 26.20 Other Applications. …”
    Book