Academic literature on the topic 'Identification of weapon'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Identification of weapon.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Identification of weapon"

1

Bogićević, Dušan, Ivan Tot, Radomir Prodanović, and Bojan Todorović. "Identification of soldiers and weapons in military armory based on comparison image processing and RFID tag." Vojnotehnicki glasnik 69, no. 1 (2021): 179–95. http://dx.doi.org/10.5937/vojtehg69-28114.

Full text
Abstract:
Introduction/purpose: The process of issuing and retrieving weapons in the military should be fast enough and should provide immediate availability of accurate information on the status of weapons. Methods: This paper deals with the problem of digitizing the recording of issuing and returning weapons through the use of modern Edge computing technology. The problem is presented through two approaches. The first approach is based on the application of machine learning algorithms for recognizing the serial number of a weapon based on the camera image, while the second approach concerns the applic
APA, Harvard, Vancouver, ISO, and other styles
2

Reddy A, Divyamsh, M. Poojitha, G. Puspalalitha, M. Vishnu Vardhan Reddy, K. Ashok Kumar, and G. Nithya Sree. "Weapon Identification using YOLO V5 Algorithm." International Journal of Science and Research (IJSR) 12, no. 11 (2023): 550–64. http://dx.doi.org/10.21275/sr23827102656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anderson, Craig A., Arlin J. Benjamin, and Bruce D. Bartholow. "Does the Gun Pull the Trigger? Automatic Priming Effects of Weapon Pictures and Weapon Names." Psychological Science 9, no. 4 (1998): 308–14. http://dx.doi.org/10.1111/1467-9280.00061.

Full text
Abstract:
More than 30 years ago, Berkowitz and LePage (1967) published the first study demonstrating that the mere presence of a weapon increases aggressive behavior. These results have been replicated in several contexts by several research teams. The standard explanation of this weapons effect on aggressive behavior involves priming; identification of a weapon is believed to automatically increase the accessibility of aggression-related thoughts. Two experiments using a word pronunciation task tested this hypothesis. Both experiments consisted of multiple trials in which a prime stimulus (weapon or n
APA, Harvard, Vancouver, ISO, and other styles
4

KOSMACZ-CHODOROWSKA, Anna. "PROBLEMS AND SOLUTIONS ON IDENTIFICATION OF WEAPONS." PROBLEMY TECHNIKI UZBROJENIA 144, no. 4 (2018): 31–53. http://dx.doi.org/10.5604/01.3001.0011.5822.

Full text
Abstract:
An introduction of new electronic management tools such as Automatic Data Capture systems (ADC) and Electronic Data Interchange systems (EDI) is needed to upgrade the Polish Armed Forces. ADC systems, presently under implementation in the Polish Armed Forces, require identification of all resources and deliveries received by the army, including pieces of weaponry, in accordance with GS1 global standards and solutions (Global System 1). The identification of weapons along with their attributes and global, international and national brand identifiers in databases, and also through their physical
APA, Harvard, Vancouver, ISO, and other styles
5

Talib, Moahaimen, and Jamila H. Saud. "A Multi-Weapon Detection Using Deep Learning." Iraqi Journal of Information and Communication Technology 7, no. 1 (2024): 11–22. http://dx.doi.org/10.31987/ijict.7.1.242.

Full text
Abstract:
The escalating usage of light weapons in criminal and terrorist activities has necessitated the development of advanced weapon detection systems. This study centers on the application of the high-speed deep learning detection model, You Only Look Once version 7 (YOLOv7), to address the need for efficient and swift threat identification. The proposed system, trained on a self-curated dataset rich in images of various dangerous light weapons, is designed to recognize and distinguish multiple weapons simultaneously. The unique value of YOLOv7 in object and specifically weapon detection lies in it
APA, Harvard, Vancouver, ISO, and other styles
6

Rana Mohtasham Aftab. "An Expert System for Weapon Identification and Categorization Using Machine Learning Technique to Retrieve Appropriate Response." Lahore Garrison University Research Journal of Computer Science and Information Technology 5, no. 4 (2021): 27–35. http://dx.doi.org/10.54692/lgurjcsit.2021.0504248.

Full text
Abstract:
In response to any terrorist attack on hospitals, airports, shopping malls, schools, universities, colleges, railway stations, passport offices, bus stands, dry ports and the other important private and public places, a proper plan will need to be developed effective response. In normal moments, security guards are deployed to prevent criminals from doing anything wrong. For example, someone is moving around with a weapon, and security guards are watching its movement through closed circuit television (CCTV). Meanwhile, they are trying to identify his weapon in order to plan an appropriate res
APA, Harvard, Vancouver, ISO, and other styles
7

Kavitha Soppari, Muhammad Abul Kalam, SriSudha Garugu, Dinesh Mannem, Aravind Pagidimari, and Poojitha Aluvala. "Intelligent systems for arms base identification: A survey on YOLOv3 and deep learning approaches for real-time weapon detection." World Journal of Advanced Research and Reviews 25, no. 1 (2025): 2058–66. https://doi.org/10.30574/wjarr.2025.25.1.0202.

Full text
Abstract:
Weapon detection using computer vision is a crucial component of modern security systems, ensuring the safety of public spaces by identifying dangerous objects like firearms and knives. With advancements in artificial intelligence, particularly in deep learning, weapon detection systems can now operate in real-time, providing faster and more accurate results than ever before. In this work, we propose the development of a cloud-based weapon detection system that leverages deep learning techniques, such as YOLO (You Only Look Once), to detect weapons in images and video streams. The system is de
APA, Harvard, Vancouver, ISO, and other styles
8

Vladimirov, Vladimir Yu, and Elena I. Ermolova. "Non-lethal weapon and special tools differentiation issues (Forensic and medico-legal points of view)." Izvestiya of Saratov University. Economics. Management. Law 22, no. 2 (2022): 178–83. http://dx.doi.org/10.18500/1994-2540-2022-22-2-178-183.

Full text
Abstract:
Introduction. The article touches upon the topical issues of forensic weapon study connected to the necessity for differentiating so called non-lethal weapon and law enforcement services special tools as well. Theoretical analysis. The lack of any criteria for group pertaining identification of such articles, devices or substances creates many legal conflicts. These collisions, in their turn, hamper adequate criminal evaluation and regulation of their circulation in civil, military and law enforcement realms and development of the schemes and requirements for measuring the optimality of non-le
APA, Harvard, Vancouver, ISO, and other styles
9

Sirakov, Nikolay Metodiev, Sang C. Suh, and Salvatore Attardo. "AUTOMATIC OBJECT IDENTIFICATION USING VISUAL LOW LEVEL FEATURE EXTRACTION AND ONTOLOGICAL KNOWLEDGE." Journal of Integrated Design and Process Science: Transactions of the SDPS, Official Journal of the Society for Design and Process Science 14, no. 2 (2010): 13–26. http://dx.doi.org/10.3233/jid-2010-14202.

Full text
Abstract:
The present work is a part of research study aiming to develop an algorithm and a software system capable of quick identification of weapons and relations between human and a weapon in a scene. Bridging the semantic gap between the low level knowledge extracted from an image and the high level semantics needed to negotiate the weapon domain ontology is connected to the features extraction algorithms. Also, the ontology is anticipated to help facilitate the recognition part of the work. To accelerate the search process a hierarchy of attributes and concepts will be applied to cluster the ontolo
APA, Harvard, Vancouver, ISO, and other styles
10

Maass, Anne, and Günther Köhnken. "Eyewitness identification: Simulating the "weapon effect."." Law and Human Behavior 13, no. 4 (1989): 397–408. http://dx.doi.org/10.1007/bf01056411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Identification of weapon"

1

Jameson, Molly M. "The effect of a weapon on children's and adult's eyewitness memory." Virtual Press, 2005. http://liblink.bsu.edu/uhtbin/catkey/1318617.

Full text
Abstract:
The effect of a weapon on memory accuracy for children and adults was examined. One-hundred eighty-six participants (87 7- and 8-year-old children and 99 college undergraduates) viewed one of four videotaped scenes in which a target individual committed a crime while carrying either a weapon that was consistent or inconsistent with his schema role or a neutral non-weapon that was consistent with his role. Participants were individually interviewed about the target's physical appearance. The results indicated that participants of both age groups were less accurate when the target individual car
APA, Harvard, Vancouver, ISO, and other styles
2

Lenhardt, Thomas T. "An investigation of weapon focus : the influence of schema roles on children's and adults' eyewitness memory." Virtual Press, 2005. http://liblink.bsu.edu/uhtbin/catkey/1313637.

Full text
Abstract:
Previous research on the weapon focus effect indicates that schematic knowledge plays a large role in adult witnesses' ability to recall details of a crime. This study investigated whether the weapon focus effect would be found in young children (4- and 5- year-olds), whose schemas are less developed than those of adults. An experiment was conducted in which adults and children viewed a videotape depicting a male target stealing money from a woman's purse. In the four conditions, the target's apparent occupation and the objects that he held were manipulated, so that only one condition depicted
APA, Harvard, Vancouver, ISO, and other styles
3

Lien, Tord Hjalmar. "Automatic identification technology tracking weapons and ammunition for the Norwegian Armed Forces." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5715.

Full text
Abstract:
Approved for public release; distribution is unlimited.<br>The purpose of this study is to recommend technology and solutions that improve the accountability and accuracy of small arms and ammunition inventories in the Norwegian Armed Forces (NAF). Radio Frequency Identification (RFID) and Item Unique Identification (IUID) are described, and challenges and benefits of these two major automatic identification technologies are discussed. A case study for the NAF is conducted where processes and objectives that are important for the inventory system are presented. Based on the specific requirem
APA, Harvard, Vancouver, ISO, and other styles
4

Harris, Rico R., Luke R. Wright, and Dale F. Locklar. "Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System." Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10305.

Full text
Abstract:
MBA Professional Report<br>The purpose of this MBA project is to determine how effective the use of RFID and IUID can be in Marine Corps armories based on operating procedures, support of key organizations within the Departments of the Navy and the Marine Corps, and current research. This project's first objective is to examine the involvement, progress and procedures of organizations that are involved in supporting and improving the Marine Corps' armory processes. The second objective is to explore the feasibility of implementing RFID and/or UID technology into the current Marine Corps s
APA, Harvard, Vancouver, ISO, and other styles
5

Harris, Rico R. Locklar Dale F. Wright Luke R. "Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2008/Dec/08Dec%5FHarris%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2008."<br>Advisor(s): Ferrer, Geraldo ; Heath, Susan. "December 2008." "MBA professional report"--Cover. Description based on title screen as viewed on January 28, 2009. Includes bibliographical references (p. 89-93). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
6

French, Tricia A. "The effect of a weapon's presence on witnesses' memory for auditory information." Virtual Press, 2001. http://liblink.bsu.edu/uhtbin/catkey/1221315.

Full text
Abstract:
Research supports the notion that weapons impair eyewitnesses' memory for visual information (weapon focus effect). Pickel and Betts (1999) found that the presence of a weapon can also interfere with witnesses' memory for auditory information. The primary objective of the current study was to replicate Pickel and Betts's (1999) findings, to extend their findings by implementing different methodological procedures, and to control for a confound associated with their study. A secondary goal was to further investigate the impact that arousal and novelty have on the weapon focus effect. Participan
APA, Harvard, Vancouver, ISO, and other styles
7

Abbasi, Zubair Hussain. "Identification and calculation of activity of unknown isotope from spectral analysis in a radiological dispersion device (RDD) incident." Thesis, Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14057.

Full text
Abstract:
In an event of a radiological dispersion device (RDD) detonated by terrorists in a high population density area, the hospitals and other medical facilities will be overwhelmed by people who may or may not have been contaminated by radioactivity. Under such circumstances, it would be desirable to identify people who have inhaled radioactive particles and direct them immediately for further treatment. A portable 3 by 3 NaI detector, which is widely available at most universities, was studied as a tool to identify and calculate the activity of unknown radioisotopes for such an RDD event.
APA, Harvard, Vancouver, ISO, and other styles
8

Bergman-Claeson, Görel. "Vi svenskar, vi människor och bomben : En semantisk analys av identifikationsramar och fiendebilder i pressdebatten om svenskt atomvapen 1952-1959." Doctoral thesis, Uppsala universitet, Institutionen för nordiska språk, 1994. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chang, Cheng-Te, and 張承德. "Extensible Decision Analysis: Selecting Weapon Systems Using Extensible Evaluation and Identification Method." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/00722840705903111938.

Full text
Abstract:
碩士<br>國防管理學院<br>資源管理研究所<br>87<br>In general, each individual subject has its own procedure and method in the application of classification and ranking, which are separately proceeded. Therefore, in this paper, we will propose extensible evaluation and identification method and its application in selecting weapon systems. i.e., we will modify Xia''s (1997) identification model and generalize the concept of distance to combine the classification and ranking of weapon system. In this way, we can simultaneously classify and rank the orderings of weapon systems in same class. Due to, the
APA, Harvard, Vancouver, ISO, and other styles
10

Ferreira, Maria Inês Lopes. "Linking rumination and proactive control in reducing implicit racial bias." Master's thesis, 2021. http://hdl.handle.net/10773/32882.

Full text
Abstract:
Implicit racial bias continues to be a central research topic in psychology given its individual and social impact. Interventions designed to reduce bias, namely, the implementation of counter stereotypical intentions (cued proactive control), have shown to be effective. Rumination has been documented as a negative output arising from one’s awareness of the discrepancy between explicit and implicit attitudes. However, the literature is inconsistent regarding the social cognitive theories of rumination. One of the main goals of this study was to deepen our knowledge about the role o
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Identification of weapon"

1

Copyright Paperback Collection (Library of Congress), ed. Secret weapon. Signet, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nowicki, Ed. Street weapons: An identification manual for improvised, unconventional, unusual, homemade, disguised, and exotic personal weapons. Performance Dimensions Pub., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pleskachevskiĭ, V. M. Oruzhie v kriminalistike: Poni︠a︡tie i klassifikat︠s︡ii︠a︡. Spark, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

V, Tarasova E., ed. Kriminalisticheskoe oruzhievedenie: Problemy teorii i praktiki : sbornik. MosU MVD Rossii, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Owens, Ken. Arrowheads: Early man projectile points of North America, identification & values. Collector Books, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kokin, Andrey, I. V. Latyshov, and P. Giverc. The current state and problems of identification in forensic ballistics. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1873043.

Full text
Abstract:
The monograph presents the modern concept of identification of firearms. The processes of weapons production necessitated adjustments to the traditional foundations of forensic ballistic identification, and a third group, subclass (subgroup) signs, is included in the binary system of general and particular signs of traces. An analysis of the modern practice of identifying firearms shows that the main obstacles in this process are subclass characteristics and prejudice. The first are related to the manufacture of parts and parts of weapons, and prejudice is associated with the subjective interp
APA, Harvard, Vancouver, ISO, and other styles
7

Podshibi͡akin, A. S. Kholodnoe oruzhie: Kriminalisticheskoe uchenie. Uchebno-konsulʹtat͡sionnyĭ t͡sentr "I͡UrInfoR", 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. Congress. Senate. Committee on Governmental Affairs. Interstate identification index: Is it an effective weapon in the war against violent crime? Is it interstate, does it identify, and is it an index? : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Third Congress, second session, December 6, 1994. U.S. G.P.O., 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stewart, Ron. Big book of pocket knives: Identification & values. 2nd ed. Collector Books, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stewart, Ron. Big book of pocket knives: Identification & values. Collector Books, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Identification of weapon"

1

Volk, Kaitlin M., and Trajan J. Gering. "Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons." In NATO Science for Peace and Security Series C: Environmental Security. Springer Netherlands, 2021. http://dx.doi.org/10.1007/978-94-024-2086-9_13.

Full text
Abstract:
AbstractUnderstanding what kinds of biological weapons can be made with what sort of technology and by whom is an important component of biosecurity. An equally important component is understanding the different potential targets a biological weapon could be designed to attack, how the weapon would be deployed against these targets, and the available strategies to detect the creation and deployment of an illegal biological weapon. Understanding how a weapon could be deployed against specific targets affords decision makers a better picture of the current state and capabilities of biowarfare an
APA, Harvard, Vancouver, ISO, and other styles
2

Ceronmani Sharmila, V., A. Vishnudev, and S. Gautham. "Criminal Prevision with Weapon Identification and Forewarning Software in Military Base." In Advances in Data and Information Sciences. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-6906-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Copeland, Damian, Philip Sammons, and Lauren Sanders. "An Approach to the Legal Review of Autonomous Swarms." In Thinking Swarms. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-82790-7_10.

Full text
Abstract:
Abstract Autonomous weapon systems (AWS), employed in swarms, promise enhanced military effectiveness. However, with that efficiency comes complexity in understanding how those swarms operate and how their use might comply with international law. States have agreed that the use of AWS must conform with international law and, more relevantly, the laws of armed conflict. Prior to the use of weapons, means and methods of war, States must ensure whether as a legal obligation under Additional Protocol I or as a matter of practicality that new weapons, means and methods of war are capable of complyi
APA, Harvard, Vancouver, ISO, and other styles
4

Simeoni, Eva, and O. Grüner. "Identification of blood group substances of fingerprints on the murder weapon by means of the adhesive strip method." In Advances in Forensic Haemogenetics. Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-73330-7_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Jina. "Negative Identification." In The North Korean Nuclear Weapons Crisis. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137386069_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Henchal, Erik A., and George V. Ludwig. "Requirements for Biological Threat Identification Systems." In Biological Weapons Defense. Humana Press, 2005. http://dx.doi.org/10.1385/1-59259-764-5:509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lindler, Luther E., David Norwood, Michael Dobson, and Ted L. Hadfield. "DNA-Based Diagnostic Tests for Detection and Identification of Biological Weapons." In Biological Weapons Defense. Humana Press, 2005. http://dx.doi.org/10.1385/1-59259-764-5:525.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eon, Claude, and Henri Garrigue. "Verification Technologies: Sampling and Identification." In Verification of the Biological and Toxin Weapons Convention. Springer Netherlands, 2000. http://dx.doi.org/10.1007/978-94-017-3643-5_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tu, Anthony. "Detection and Identification of Chemical and Biological Weapons." In Chemical and Biological Weapons and Terrorism. CRC Press, 2017. http://dx.doi.org/10.1201/9781315305516-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Marcus, and Seumas Miller. "Biometric and Non-biometric Integration: Dual Use Dilemmas." In Biometric Identification, Law and Ethics. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90256-8_4.

Full text
Abstract:
AbstractBiometric identification is now closely integrated with other forms of data, data systems and communications technologies, such as smartphones, metadata and social media, and as the key security feature on smartphones, and by extension, social media accounts, online profiles and identity. For this reason, we consider the interaction between biometric and other forms of identification data, and data systems, building upon the consideration of the main biometrics in the first three chapters. We begin with a general discussion of data systems and integration. This is followed by a discuss
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Identification of weapon"

1

Kumar, J. Ashok, G. Dhivya, P. Selvaraj, et al. "Weapon Detection Identification and Classification for DCNN and YOLO-V5 Techniques." In 2024 International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS). IEEE, 2024. https://doi.org/10.1109/icicnis64247.2024.10823365.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jyothsna, V., Chamundi Alle, Ragavendra Kurnutala, Ganesh K. N, KushalKarthik K. R, and Bhasha Pydala. "YOLOv8-Based Person Detection, Distance Monitoring, Speech Alerts, and Weapon Identification with Email Notifications." In 2024 International Conference on Expert Clouds and Applications (ICOECA). IEEE, 2024. http://dx.doi.org/10.1109/icoeca62351.2024.00059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Stein, Arthur, Chad Felch, and Edward F. Doyle. "Material Selection for Hydrothermal Oxidation Processes for the Disposal of Chemical Demilitarization Hazardous Waste." In CORROSION 2006. NACE International, 2006. https://doi.org/10.5006/c2006-06455.

Full text
Abstract:
Abstract For the past few years, the United States Army has been aggressively engaged in investigating alternate technologies for the destruction of chemical demilitarization waste in compliance with the Chemical Weapons Convention Treaty. Substantial efforts have been expended to identify an environmentally friendly process that could be used to destroy these materials. In virtually all the destruction processes investigated, the one significant impediment has been the selection of the materials of construction that could be used to contain the wide range of environments that can exist due to
APA, Harvard, Vancouver, ISO, and other styles
4

Slamani, Mohamed-Adel, and David D. Ferris, Jr. "Identification of weapons in concealed weapon detection data." In Enabling Technologies for Law Enforcement, edited by Simon K. Bramble, Edward M. Carapezza, and Lenny I. Rudin. SPIE, 2001. http://dx.doi.org/10.1117/12.417528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sheen, David M., Douglas L. McMakin, H. D. Collins, and Thomas E. Hall. "Weapon detection using a wideband millimeter-wave linear array imaging technique." In Substance Identification Technologies, edited by Geoffrey L. Harding, Richard C. Lanza, Lawrence J. Myers, and Peter A. Young. SPIE, 1994. http://dx.doi.org/10.1117/12.171271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jacobs, Eddie L., Steve Moyer, Charmaine C. Franck, et al. "Concealed weapon identification using terahertz imaging sensors." In Defense and Security Symposium, edited by Dwight L. Woolard, R. Jennifer Hwu, Mark J. Rosker, and James O. Jensen. SPIE, 2006. http://dx.doi.org/10.1117/12.666597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khan, Saad, Ajay Divakaran, and Harpreet S. Sawhney. "Weapon identification using hierarchical classification of acoustic signatures." In SPIE Defense, Security, and Sensing, edited by Edward M. Carapezza. SPIE, 2009. http://dx.doi.org/10.1117/12.818375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jacobs, Eddie, Ronald G. Driggers, Keith A. Krapels, Frank C. De Lucia, and Douglas T. Petkie. "Terahertz imaging performance model for concealed weapon identification." In European Symposium on Optics and Photonics for Defence and Security, edited by Roger Appleby, J. Martyn Chamberlain, and Keith A. Krapels. SPIE, 2004. http://dx.doi.org/10.1117/12.579768.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nikkath Bushra, S., G. Shobana, K. Uma Maheswari, and Nalini Subramanian. "Smart Video Survillance Based Weapon Identification Using Yolov5." In 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). IEEE, 2022. http://dx.doi.org/10.1109/icesic53714.2022.9783499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Murrill, Steven R., Eddie L. Jacobs, Steven K. Moyer, et al. "Terahertz imaging system performance model for concealed weapon identification." In European Symposium on Optics and Photonics for Defence and Security, edited by David H. Titterton, Sean M. Kirkpatrick, Razvan Stoian, Roger Appleby, J. Martyn Chamberlain, and Keith A. Krapels. SPIE, 2005. http://dx.doi.org/10.1117/12.630877.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Identification of weapon"

1

Gosnell, T. B. ,. LLNL, J. M. Hall, C. L. Jam, et al. Gamma-ray identification of nuclear weapon materials. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/16135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Johnson, J. A., and A. E. Lipska-Quinn. Identification and evaluation of the nonradioactive toxic components in LLNL weapon designs, Phase 1. Office of Scientific and Technical Information (OSTI), 1994. http://dx.doi.org/10.2172/10133758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

mattingly, j. k., j. t. mihalczo, j. a. mullens, r. b. perez, and t. e. valentine. Estimating Attributes of Nuclear Weapon and Other Fissile Material Configuration Using Features Of Nuclear Materials Identification Signatures. Office of Scientific and Technical Information (OSTI), 1999. http://dx.doi.org/10.2172/12462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grand-Clément, Sarah. Assessing Technologies to Counter the Diversion of Small Arms and Light Weapons. UNIDIR, 2024. http://dx.doi.org/10.37559/caap/24/erc/09.

Full text
Abstract:
Countering the Diversion of arms using TEChnology Tools (D-TECT) is a joint project by the Flemish Peace Institute (FPI) and the United Nations Institute for Disarmament Research (UNIDIR). The aim of Project D-TECT is to develop and test an approach to identifying and assessing the utility and feasibility of using specific technologies that could be used to support or strengthen existing initiatives aimed at detecting, preventing, and mitigating the diversion of conventional weapons. Project D-TECT consists of two consecutive phases. The first phase was to identify existing technologies that c
APA, Harvard, Vancouver, ISO, and other styles
5

Mihalczo, J. T., P. E. Koehler, T. E. Valentine, and L. D. Phillips. Source options for nuclear weapons identification system. Office of Scientific and Technical Information (OSTI), 1995. http://dx.doi.org/10.2172/135006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mattingly, J. K., J. T. Mihalczo, J. A. Mullens, and T. E. Valentine. Physical and Mathematical Description of Nuclear Weapons Identification System (NWIS) Signatures. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/1878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mihalczo, J. T., T. E. Valentine, J. A. Mullens, and J. K. Mattingly. Physical and mathematical description of Nuclear Weapons Identification System (NWIS) signatures. Office of Scientific and Technical Information (OSTI), 1997. http://dx.doi.org/10.2172/665856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harris, Rico R., Dale F. Locklar, and Luke R. Wright. Feasibility of Radio Frequency Identification (RFID) and Item Unique Identification (IUID) in the Marine Corps Small Arms Weapons Tracking System. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada494078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gresenz, Carole Roan, Jean M. Mitchell, Belicia Rodriguez, and Wilbert van der Klaauw. The Financial Consequences of Undiagnosed Memory Disorders. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1106.

Full text
Abstract:
We examine the effect of undiagnosed memory disorders on credit outcomes using nationally representative credit reporting data merged with Medicare data. Years prior to eventual diagnosis, average credit scores begin to weaken and payment delinquency begins to increase, overall and for mortgage and credit card accounts specifically. Credit outcomes consistently deteriorate over the quarters leading up to diagnosis. The harmful financial effects of undiagnosed memory disorders exacerbate the already substantial financial pressure households face upon diagnosis of a memory disorder. Our findings
APA, Harvard, Vancouver, ISO, and other styles
10

Malaret Baldo, Alfredo, and Francesca Batault. Second Menu of Indicators to Measure the Reverberating Effects on Civilians from the Use of Explosive Weapons in Populated Areas. UNIDIR, 2022. http://dx.doi.org/10.37559/caap/22/pacav/02.

Full text
Abstract:
Building on UNIDIR's First Menu of Indicators, this publication expands its focus areas to include impacts on water, sanitation and hygiene (WASH); food security; environmental degradation; and economic opportunity, with specific quantitative indicators presented for each of these four areas. These indicators can be used to capture, measure, compare and understand how the use of EWIPA impacts the survival, well-being and dignity of civilians in ways that are often overlooked or underestimated. These indicators are designed to help researchers document the broad range and scale of impacts and t
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!