Search Results - "interception"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 3
- History 3
- Security measures 3
- Computers 2
- Electronics in military engineering 2
- Military intelligence 2
- Radar 2
- Airplanes 1
- Ballistic missile defenses 1
- Business enterprises 1
- Career development 1
- Ciphers 1
- Cold War 1
- Cold war 1
- Communications, Military 1
- Computer crimes 1
- Computer security 1
- Cryptographers 1
- Data Interpretation, Statistical 1
- Drone aircraft 1
- Electronic countermeasures 1
- Electronic surveillance 1
- Flight control 1
- Guidance systems 1
- Guidance systems (Flight) 1
- Guided missiles 1
- History, Military 1
- Hydrology 1
- Information warfare 1
- Internet 1
-
1
-
2
Detecting and classifying low probability of intercept radar
Published 2009Subjects: “…Low probability of intercept radar.…”
Book -
3
Electronic warfare receivers and receiving systems
Published 2014Table of Contents: “…Receiving Systems and Receiving System Architectures; Signals and Modulation Systems; RF Stage; Bandwidth Expansion for Small Signal Amplifiers; RF Mixers and Mixing; IF Amplifiers; IF Filters; Narrowband Receivers; Compressive Receivers; Digital Receivers Overview; Sampling and Analog to Digital Converters; Digital Filtering; Digital Demodulation; Digital to Analog Converters; Direct Digital Converter; Spread Spectrum Techniques; Receivers for DSSS Intercept; Receivers for FHSS Intercept; Receivers for THSS Intercept; DF Receivers…”
Book -
4
Hydrology principles and processes
Published 2017Table of Contents: “…Introduction -- precipitation -- Interception -- Evaporation -- Groundwater -- Soil water -- Streamflow -- Water quality -- Hydrology in a changing world…”
Book -
5
A gift of fire social, legal, and ethical issues for computers and the internet
Published 2003Table of Contents: “…Unwrapping the gift -- Privacy and personal information -- Encryption and interception of communications -- Can we trust the computer? …”
Book -
6
Hacking exposed unified communications & VoIP security secrets & solutions
Published 2014Table of Contents: “…VoIP Components & Targets -- Footprinting -- Scanning & Enumeration -- Toll Fraud & service Abuse -- Harassing Callers & TdoS -- Social Engineering & Information Harvesting -- Voice Spam & Phishing -- Infastructure Denial of Service -- Network Eavesdropping -- Interception -- Cisco Unified Cisco Call Manager -- Avaya Communication Manager -- Microsoft Lync -- Cloud, Emerging, and other Technologies -- Fuzzing & Disrupting of Service -- VoIP Signaling Manipulation -- Audio & Video Manipulation.…”
Book -
7
San Remo manual on international law applicable to armed conflicts at sea
Published 1995Table of Contents: “…Measures Short of Attack: Interception, Visit, Search, Diversion, and Capture: 1. …”
Book -
8
-
9
Most secret and confidential intelligence in the Age of Nelson
Published 2000Table of Contents: “…British Government Key Officials, 1793-1815 -- App.3. Secret Interceptions Distribution List, c. 1775 -- App.4. British Naval Administration, c. 1800 -- App.5. …”
Book -
10
Missile defence international, regional and national implications
Published 2005Table of Contents: “…Pre-empt, balance, or intercept? : the evolution of strategies for coping with the threat from weapons of mass destruction / Wilhelm Agrell -- US missile defence : technological primacy in action / Tarja Cronberg -- Missile defence in the United States / Bertel Heurlin -- Roads not (yet) taken : Russian approaches to cooperation in missile defence / Alla Kassianova -- Reluctant allies? …”
Book -
11
Perception, cognition, and decision training the quiet eye in action
Published 2007Table of Contents: “…Introduction to the theoretical foundations -- Part I : Visual perception, cognition, and action -- 1 Visual system, motor control, and the changing brain -- 2 Measuring what athletes see -- 3 Visual attention and gaze control -- Part II: Gaze control and the quiet eye in sport -- 4 Gaze control framework -- 5 Gaze control to a single fixed target -- 6 Gaze control in abstract-target and moving-target tasks -- 7 Gaze control in interceptive timing tasks -- 8 Gaze control in tactical tasks -- Part III: Decision training in sport -- 9 Decision-training model -- 10 Designing practices with a decision-training focus -- 11 Providing feedback with a decision-training focus -- 12 Providing instruction with a decision-training focus…”
Book -
12
SuperSelf doubling your personal effectiveness
Published 1993Table of Contents: “…Eliminating Interruptions. 16. Intercepting Office Interruptions. 17. Handling Talkers and Dumpers. 18. …”
Book -
13
The basics of digital privacy simple tools to protect your personal your information and your identity online
Published 2014Table of Contents: “…; E-mail; Web browsing traffic; Intercepting traffic directly on your machine; Intercepting traffic on the Internet. …”
Book -
14
Critical perspectives on counter-terrorism
Published 2015Table of Contents: “…Prosecuting Suspected Terrorists: Precursor Crimes, Intercept Evidence and the Priority of Security / Stuart MacDonald -- 8. …”
Book -
15
-
16
-
17
Longitudinal data analysis
Published 2006Table of Contents: “…. -- 4.2 A Simple Linear Regression Model. -- 4.3 Random Intercept MRM. -- 4.4 Random Intercept and Trend MRM. -- 4.5 Matrix Formulation. -- 4.6 Estimation . -- 4.7 Summary. -- 5. …”
Book -
18
Introduction to modern EW systems
Published 2012Table of Contents: “…Chapter 1 Introduction to Electronic Warfare Scenarios; 1.1 Definitions and EW Role in the Military Field; 1.2 Main Weapons Systems of Interest to EW; 1.2.1 Artillery Systems; 1.2.2 Missile Systems; 1.2.3 Active Homing Missiles; 1.2.4 Track via Missile Systems; 1.2.5 Passive IR-Guided Missiles; 1.2.6 Sea-Skimming Missiles; 1.2.7 Antiradiation Missiles; 1.3 EW in Symmetric Conflicts; 1.4 EW in Asymmetric Conflicts; References; Chapter 2 Evolution of Signal Emitters and Sensors; 2.1 Introduction. 2.2 Sensor Electromagnetic Spectrum and Atmospheric Propagation2.3 Radar Principles and Types; 2.3.1 Radar Equation; 2.3.2 Radar Structure; 2.3.3 Radar Signal Processing Fundamentals; 2.3.4 Automatic Detection; 2.3.5 Pulse Compression; 2.3.6 Surveillance Radars; 2.3.7 LPI Radars; 2.3.8 Pulse Doppler Radars; 2.3.9 Tracking Radars; 2.3.10 Synthetic Aperture Radars; 2.3.11 Bistatic Radars; 2.4 Communications; 2.4.1 Access Methods; 2.4.2 Digital Signaling; 2.4.3 Secure Communications; 2.4.4 Coding of Communication Signals; 2.4.5 Typical Military Communication Systems. 2.5 Satellite Navigation Systems2.6 Electro-Optical Thermal Imagers; 2.6.1 Minimum Resolvable Temperature; 2.6.2 IR Missile Seekers; 2.6.3 Missile Approach Warner; 2.7 Laser Radar Systems; 2.7.1 Laser Target Designation and Ranging; 2.7.2 Laser Radar Receivers; 2.7.3 Laser Radar Range Equation; 2.7.4 Target Detection; References; Chapter 3 Electronic Warfare RF Band Sensor Systems; 3.1 Introduction; 3.2 EW Radar Band Sensors; 3.2.1 RWR Architecture; 3.2.2 ESM Architecture; 3.2.3 ELINT Architecture; 3.3 EW Sensor Sensitivity; 3.3.1 Conclusions; 3.4 Probability of Interception. 3.5 EW Radar Band Sensor Architectures3.5.1 Architecture of Past Generation Intercept Receivers; 3.5.2 Architecture of New EW radar Band Sensors; 3.5.3 DSP Technologies; 3.6 Detection and Classification of LPI Radars; 3.7 Emitter Deinterleaving and Sorting; 3.8 Emitter Identification; 3.9 Communications ESM; 3.9.1 CESM; 3.9.2 COMINT; 3.10 SIGINT; 3.11 Conclusion; References; Chapter 4 RF Direction-Finding and Emitter Location Techniques; 4.1 Introduction; 4.2 Amplitude Comparison DF Methods; 4.3 Phase Comparison Monopulse DF Measurement Methods; 4.3.1 Correlative Phase DF. 4.4 Time-Difference DF4.5 Emitter Location; 4.5.1 Triangulation; 4.5.2 Trilateration; 4.5.3 Frequency Difference on Arrival Passive Location Technique; 4.5.4 Inverse Passive Location; 4.6 Conclusion; References; Chapter 5 Electronic Countermeasure Systems; 5.1 Introduction; 5.1.1 Typical RECM Requirements and Missions; 5.1.2 EW Radar Jamming Equation; 5.2 Radar ECM Architecture; 5.3 Digital Radio-Frequency Memory; 5.3.1 Phase-Sampled DRFMs; 5.4 Radar ECM Transmitters; 5.5 Chaff; 5.6 Communication ECM Systems; 5.7 Infrared ECM Systems; 5.7.1 Flares; 5.8 Conclusion…”
Book -
19
Intelligent robotics systems: inspiring the NEXT 16th FIRA RoboWorld Congress, FIRA 2013, Kuala Lumpur, Malaysia, August 24-29, 2013 : proceedings
Published 2013Table of Contents: “…Ramón Cerritos-Jasso -- Programming the Goalkeeper of 20 DOF for FIRA Cup / Mauro Santoyo-Mora -- Options and Pitfalls in Embedded Systems Development for Intelligent Humanoid Robots / Jacky Baltes, Kuo-Yang Tu -- Error Analysis in Applying Fuzzy Logic Based Obstacle Avoidance Algorithm for Robot Soccer / Jinjuli Jameson -- Efficient Face Recognition Technique with Aid of Active Appearance Model / Mohammed Hasan -- Teaching Basic Probability Concept Using SocSim Robot Soccer Simulator: An Approach / Yoong Chow Ho -- Set of Fuzzy Systems for Computation of Pass Optimality in Robot Soccer Strategy / Alexey Kachalov -- Novice Learning in Robot Soccer Calibration / Maryam Jaafar -- Grammatical Evolution Algorithm for Position Prediction of the Ball in Robot-Soccer Goal Keeper Optimization / Aulia El Hakim, Dadan Nur Ramdan -- Client Server System for MiroSot Robot Soccer / Dadan Nur Ramadan, Aulia El Hakim -- Image Classification Using Optimized Synergetic Neural Network / Ghazaleh Taherzadeh, Chu Kiong Loo -- Characteristics of Student Engagement in Robotics / Igor Verner -- Portable and Fast Vision System Implementation Using LabVIEW / Dinna Fitriyana, Priadi Teguh Wibowo -- UAV Dynamic Path Planning for Intercepting of a Moving Target: A Review / Hendri Himawan Triharminto -- Anomaly Detection Using Cooperative Fuzzy Logic Controller / Ali Feizollah, Shahaboddin Shamshirband -- Formations Strategies for Obstacle Avoidance with Multi Agent Robotic System / M. …”
Conference Proceeding Book -
20
Unmanned aircraft systems UAVs design, development and deployment
Published 2010Table of Contents: “…Part 3 THE DEPLOYMENT OF UAV SYSTEMS. 21 Operational Trials and Full Certification. 21.1 Company Trials. 21.2 Customer Trials and Sales Demonstrations. 22 UAV System Deployment. 22.1 Introduction. 22.2 Network-centric Operations (NCO). 22.3 Teaming with Manned and Other Unmanned Systems. 23 Naval Roles. 23.1 Fleet Detection and Shadowing. 23.2 Radar Confusion. 23.3 Missile Decoy. 23.4 Anti-submarine Warfare. 23.5 Radio Relay. 23.6 Port Protection. 23.7 Over-beach Reconnaissance. 23.8 Fisheries Protection. 23.9 Detection of Illegal Imports. 23.10 Electronic Intelligence. 23.11 Maritime Surveillance. 23.12 Summary. 24 Army Roles. 24.1 Covert Reconnaissance and Surveillance. 24.2 Fall-of-shot Plotting. 24.3 Target Designation by Laser. 24.4 NBC Contamination Monitoring. 24.5 IED and Landmine Detection and Destruction. 24.6 Electronic Intelligence. 24.7 Teaming of Manned and Unmanned Systems. 24.8 System Mobility. 24.9 Persistent Urban Surveillance. 25 Air Force Roles. 25.1 Long-range Reconnaissance and Strike. 25.2 Airborne Early Warning. 25.3 Electronic Intelligence. 25.4 Pre-strike Radar and Anti-aircraft Systems Counter. 25.5 Interception. 25.6 Airfield Security. 26 Civilian, Paramilitary and Commercial Roles. 26.1 Aerial Photography.* 26.2 Agriculture. 26.3 Coastguard and Lifeboat Institutions. 26.4 Customs and Excise. 26.5 Conservation. 26.6 Electricity Companies. 26.7 Fire Services. 26.8 Fisheries. 26.9 Gas and Oil Supply Companies. 26.10 Information Services. 26.11 Local Civic Authorities. 26.12 Meteorological Services.* 26.13 Traffic Agencies. 26.14 Ordnance Survey. 26.15 Police Authorities.* 26.16 Rivers Authorities and Water Boards. 26.17 Survey Organisations. 26.18 Communications Relay. 26.19 Landmine Detection and Destruction. 26.20 Other Applications. …”
Book


