Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...mplexity class that represents problems that are easy to solve for quantum computers. ...try of Defence (Vietnam)]], a government agency of Vietnam responsible for military issues ...
    714 bytes (105 words) - 23:22, 5 December 2023
  • Manual TMA methods involve computation executed by humans instead of computers. There exist several manual TMA methods such as: Ekelund Ranging, 1934 Rule Automated TMA methods involve computations executed by computers. This allows for the simultaneous tracking of multiple targets. There exis ...
    3 KB (513 words) - 18:05, 10 December 2021
  • ==Military Versus Commercial== ...e philosophy.png|thumb|Military maintenance philosophy versus commercial.]]Military systems and large commercial systems share reliability constraints. ...
    18 KB (2,604 words) - 16:57, 29 April 2024
  • The initial requirement began with military combat systems during World War I. The approach used for survivability was All modern computers provide the following when an existing feature is enabled via [[fault repor ...
    6 KB (789 words) - 14:10, 15 September 2023
  • ...] during World War II.<ref name=computermuseum>{{cite web | title = Analog Computers | work = Lexikon's History of Computing | year = 1995 | url = http://www.co The problem of aiming a [[torpedo]] has occupied military engineers since [[Robert Whitehead]] developed the modern torpedo in the 18 ...
    30 KB (4,470 words) - 23:36, 6 February 2025
  • ...used with radar data to aim guns, missiles, and torpedoes associated with military air traffic control and waterway management. Track algorithms were migrated from analog equipment to digital computers from the 1950s through the 1980s. This was necessary to eliminate limitatio ...
    18 KB (2,833 words) - 00:28, 29 December 2024
  • ...sampling theorem]] and poor-quality outputs. In some applications, such as military radars and medical images, we are eager to have highly precise and accurate ...ers]] is required in some circumstances, e.g., [[weather forecasting]] and military radars. Nevertheless, using supercomputers designated to simply perform DSP ...
    21 KB (3,037 words) - 00:31, 21 July 2024
  • ...nar, passive sonar does not emit its own signal, which is an advantage for military vessels. But passive sonar cannot measure the range of an object unless it In modern world, digital computers do contribute a lot to higher speed and efficiency in data analysis. Thus, ...
    9 KB (1,443 words) - 21:15, 28 May 2024
  • These antennas have been used for telemetry applications at military test ranges, including those supporting [[Inter-Range Instrumentation Group An R-shaped dual-band PIFA has been proposed for use on military vehicles. The bands to be covered are 225&nbsp;MHz and 450&nbsp;MHz. Thes ...
    14 KB (2,148 words) - 18:05, 31 August 2024
  • ...ops to Test Augmented Reality By 2019|url=https://www.popularmechanics.com/military/a19635016/us-troops-to-test-augmented-reality-by-2019/|access-date=2020-11- ...ops to Test Augmented Reality By 2019|url=https://www.popularmechanics.com/military/a19635016/us-troops-to-test-augmented-reality-by-2019/|access-date=2020-11- ...
    19 KB (2,730 words) - 06:21, 1 November 2024
  • ..."test out" of some training to ensure they engage with novel instruction. Computers adapt the presentation of educational material according to students' learn ...the user. Back in the 70's the main barrier was the cost and size of the computers, rendering the widespread application impractical. Another hurdle in the a ...
    17 KB (2,456 words) - 07:32, 29 October 2024
  • ...book | title = A Course of Mathematics: Composed for the Use of the Royal Military Academy | author = Charles Hutton | url = https://books.google.com/books?id However, not all computers agree with this.<ref>{{cite web | author = Stein, Philip | title = The Squa ...
    11 KB (1,589 words) - 13:36, 26 February 2025
  • ...um (online exhibit)]].</ref> They were made obsolete by digital electronic computers that can be programmed to carry out similar computations, but the tide-pred ...i=10.1016/0898-1221(83)90064-0|page=507|year=1983|volume=9|issue=3|journal=Computers & Mathematics with Applications|accessdate=27 July 2023}}</ref> ...
    26 KB (3,912 words) - 19:22, 26 February 2025
  • ...fter-the-fact or statistical methodology.<ref>J. Spiegel and E.M. Bennett, Military System Reliability: Department of Defense Contributions, IRE Transactions o ...In addition, some companies have so many use environments (think personal computers) that performing a PoF assessment for each potential combination of tempera ...
    15 KB (2,256 words) - 22:21, 30 July 2024
  • ...e=Securing military GPS from spoofing and jamming vulnerabilities | work = Military Embedded Systems|language=en|access-date=30 July 2018}}</ref> In 2012, the ...t wanted to insulate itself against over-dependency on the German team for military applications, including the development of a fully domestic missile guidanc ...
    47 KB (6,922 words) - 21:21, 13 February 2025
  • ...haplygin among others, supervised the creation of many dozens of models of military and civilian aircraft and founded a number of ''KBs'' (''Construction Burea ...n Il-2]] bomber remains the [[List of most produced aircraft|most produced military aircraft in history]]. The [[Polikarpov Po-2]] ''Kukuruznik'' is the world' ...
    35 KB (4,793 words) - 01:13, 7 November 2024
  • ...irst= John Y |year=1848|title= Register of All Officers and Agents, Civil, Military, and Naval in the Service of the United States on September 13, 1847 |locat ...e book |last= Homans |first= Benjamin |author-link= |date= 1835 |title=The Military and Naval Magazine of the United States from March to September 1835 Volume ...
    26 KB (3,825 words) - 18:31, 18 September 2024
  • ...b>M</sub>(''a'',''b'') for Real-Order ''M'' with Applications. ''2008 IEEE Military Communications Conference'', San Diego, CA, USA</ref> ...mptotic and numerical aspects of the noncentral chi-square distribution. ''Computers Math. Applic.'', 25(5), 55-63.</ref> ...
    29 KB (4,889 words) - 10:14, 10 January 2025
  • ...ary, the encryption technology (techniques as well as equipment and, after computers became important, crypto software) was included as a Category XIII item int ...ce, a split personality when it came to encryption; policy was made by the military cryptanalysts, who were solely concerned with preventing their 'enemies' ac ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • ...number (2002). He described several [[Microbotics#History|microrobots for military applications]] (1996b). ===Advanced computers=== ...
    31 KB (4,025 words) - 18:22, 15 January 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)