Academic literature on the topic 'Threats to environment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats to environment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Threats to environment"

1

Yao, Min, and Min Zhao. "Unmanned aerial vehicle dynamic path planning in an uncertain environment." Robotica 33, no. 3 (2014): 611–21. http://dx.doi.org/10.1017/s0263574714000514.

Full text
Abstract:
SUMMARYAn unmanned aerial vehicle (UAV) dynamic path planning method is proposed to avoid not only static threats but also mobile threats. The path of a UAV is planned or modified by the potential trajectory of the mobile threat, which is predicted by its current position, velocity, and direction angle, because the positions of the UAV and mobile threat are dynamically changing. In each UAV planning path, the UAV incurs some costs, including control costs to change the direction angle, route costs to bypass the threats, and threat costs to acquire some probability to be destroyed by threats. T
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Iris M., and Joshua M. Ackerman. "The Infectiousness of Crowds: Crowding Experiences Are Amplified by Pathogen Threats." Personality and Social Psychology Bulletin 45, no. 1 (2018): 120–32. http://dx.doi.org/10.1177/0146167218780735.

Full text
Abstract:
People sometimes perceive social environments as unpleasantly crowded. Previous work has linked these experiences to incidental factors such as being hungry or hot and to the relevance of the social environment for an individual’s current goals. Here, we demonstrate that crowding perceptions and evaluations also depend on specific, active threats for perceivers. Eight studies test whether infectious disease threats, which are associated with crowded conditions, increase such reactions. Across studies, pathogen threat made dense social environments seem more crowded and generated more negative
APA, Harvard, Vancouver, ISO, and other styles
3

PASTOR, Viliam. "CURRENT THREATS TO WORLD SECURITY." STRATEGIES XXI - Command and Staff College 17, no. 1 (2021): 183–89. http://dx.doi.org/10.53477/2668-2028-21-22.

Full text
Abstract:
Abstract: Each historical era corresponded to a certain type of technological revolution that produced transformations both in terms of the theory of military science and in the field of strategies, techniques, tactics and procedures for preparing and conducting the phenomenon of war. Thus, the beginning of the 21st century has been marked by major transformations of the global security environment, an environment conducive to hybrid dangers and threats that can seriously affect contemporary human society. Moreover, migration, terrorism, organized crime, the nuclear threat and pandemics are an
APA, Harvard, Vancouver, ISO, and other styles
4

D'yakonova, Iryna, Alina Nikitina, and Natalja Gurvits. "Improvement of the enterprise economic security management in global environment." Geopolitics under Globalization 2, no. 1 (2018): 19–26. http://dx.doi.org/10.21511/gg.02(1).2018.03.

Full text
Abstract:
The basic features of enterprise economic security management are determined. It is proved that the system of enterprise economic security should be considered from the point of view of the impact on it of a multitude of various threats which ensure this system functioning and entering into contradiction with other elements of the system. An improved approach to the management of enterprise economic security is proposed in the global environment. The necessity of further and deeper study of the flow of such destructive and destabilizing phenomena is substantiated because such threats can cause
APA, Harvard, Vancouver, ISO, and other styles
5

Smolders, A. J. P., E. C. H. E. T. Lucassen, and J. G. M. Roelofs. "The isoetid environment: biogeochemistry and threats." Aquatic Botany 73, no. 4 (2002): 325–50. http://dx.doi.org/10.1016/s0304-3770(02)00029-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Tsymbrivskyy, Taras. "Cyber threats and global business environment." Law Review 16, no. 2 (2017): 17–33. http://dx.doi.org/10.7220/2029-4239.16.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Theron, Julien. "Networks of Threats: Interconnection, Interaction, Intermediation." Journal of Strategic Security 14, no. 3 (2021): 45–69. http://dx.doi.org/10.5038/1944-0472.14.3.1942.

Full text
Abstract:
The rapidly changing global security environment requires to constantly adapt our understanding of threats. The findings of this paper confirm that threats interact with each other on three levels. Security, conflict, war, and strategic studies converge to build a new qualitative theoretical framework for threat analysis. Shaping the global security environment, threats communicate on three levels. Firstly, the interconnection of agents with similar ideological and/or strategic motivations connects threats. Secondly, interaction exacerbates incidental threats through cooperation, competition,
APA, Harvard, Vancouver, ISO, and other styles
8

Ji, Wan Feng, Hai Feng Xu, Guang Yuan Wang, and Xiang Hong Yang. "Path Planning under Dynamic Threat Environment." Applied Mechanics and Materials 543-547 (March 2014): 1790–94. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.1790.

Full text
Abstract:
This paper studies the solution to combat aircrafts path planning problem in confrontational battle space. First of all, according to the dynamic movement characteristics of emergent threats, a path planning target function model is built based on dynamic threat; then based on the defects of basic genetic algorithm, a kind of improved genetic algorithm based on predatory search strategies is further designed; finally the model and the algorithm are tested effective by simulation verification.
APA, Harvard, Vancouver, ISO, and other styles
9

Vidalis, Stilianos, Andy Jones, and Andrew Blyth. "Assessing cyber-threats in the information environment." Network Security 2004, no. 11 (2004): 10–16. http://dx.doi.org/10.1016/s1353-4858(04)00156-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rowe, Paul. "VOIP - extra threats in the converged environment." Network Security 2005, no. 7 (2005): 12–16. http://dx.doi.org/10.1016/s1353-4858(05)70260-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Threats to environment"

1

Zahedi, Saed. "Virtualization Security Threat Forensic and Environment Safeguarding." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-32144.

Full text
Abstract:
The advent of virtualization technologies has evolved the IT infrastructure and organizations are migrating to virtual platforms. Virtualization is also the foundation for cloud platform services. Virtualization is known to provide more security into the infrastructure apart from agility and flexibility. However security aspects of virtualization are often overlooked. Various attacks to the virtualization hypervisor and its administration component are desirable for adversaries. The threats to virtualization must be rigorously scrutinized to realize common breaches and knowing what is more att
APA, Harvard, Vancouver, ISO, and other styles
2

Black, Brian C., Laura H. Bollock, Sinene Bouabid, et al. "Sea TENTACLE: Track, Engage, & Neutralize Threats - Asymmetric & Conventional - in the Littoral Environment." Thesis, Monterey, California : U.S. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/7275.

Full text
Abstract:
Includes supplementary material.<br>Sea TENTACLE is a proposed afloat platform whose primary mission is to utilize the state-of-the-art technology of unmanned vehicles to monitor and neutralize all subsurface enemy threats in the littorals. This mission can be specified further as anti-submarine warfare, mine warfare and maritime surveillance. The design philosophy of Sea TENTACLE embodies the ideal of providing a multi-mission capable sea frame extending network-centric warfare into the littorals. The design goals of the TSSE team were first to develop a platform to deploy, recover, and mai
APA, Harvard, Vancouver, ISO, and other styles
3

Campos, Ana Paula da Silveira Serra. "Impacte ambiental do Desporto. Estudo de caso : Impacte ambiental de um evento de orientação - Portugal 'O' Meeting' 2001." Master's thesis, Instituições portuguesas -- UP-Universidade do Porto -- -Faculdade de Ciências do Desporto e de Educação Física, 2001. http://dited.bn.pt:80/29481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Christiansen, Allen. "Modeling sensors and threats in a three-dimensional real-time simulation of a seaport environment." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Spring2009/a_christiansen_042309.pdf.

Full text
Abstract:
Thesis (M.S. in computer science)--Washington State University, May 2009.<br>Title from PDF title page (viewed on May 29, 2009). "Department of Electrical Engineering and Computer Science." Includes bibliographical references (p. 56-57).
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Jillian. "Bacterial community composition, TCE degradation, isotopic fractionation and toxicity of a TCE contaminated aquifer." Thesis, Available from the University of Aberdeen Library and Historic Collections Digital Resources, 2009. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=33520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bergvall, Ricardo. "Secure remote access to a work environment." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45124.

Full text
Abstract:
This project is about how free, open-source tools can create reasonable, secure and flexible remote access solutions for smaller companies with a limited budget.  Secure remote access to a working environment is a solution for its time, as last year Covid-19 change the working environment for millions of employers and employees. The importance of secure remote access to a working environment became noticeable as offices closed down and employers started working from home. Still, the need for secure access to the company's infrastructure remains. This is where Virtual Private Networks (VPNs) en
APA, Harvard, Vancouver, ISO, and other styles
7

Andersson, Frida Maria. "Våld och hot om våld inom socialt arbete : - en studie om fem socialarbetares upplevelser och förståelse av våld och hot om våld från brukare." Thesis, Linnéuniversitetet, Institutionen för socialt arbete, SA, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-18049.

Full text
Abstract:
The aim of this study was to understand how social workers perceive and understand violence and threats of violence from clients, and how it effect their working environment. It seems that the respondents understand the violence and threats of violence from clients as a result of the clients background problems, vulnerability, dependency and from “the reason" that the client is currently in the contact with the organization. How respondents interpret the client´s behaviour based on the above-mentioned factors, seem to determine how the respondents perceive and define the violence and threats o
APA, Harvard, Vancouver, ISO, and other styles
8

Stokes, Shereitte C. IV. "An analysis of the associations between chemical threats in the physical environment and human health outcomes in Soweto,South Africa." DigitalCommons@Robert W. Woodruff Library, Atlanta University Center, 2004. http://digitalcommons.auctr.edu/dissertations/1552.

Full text
Abstract:
The purpose of this study was to investigate the associations between chemical threats in the physical environment and adverse health conditions among the residents of Soweto, South Africa. The chemical threats that were used in the analysis included lead, nitrogen oxides (NOx), sulfur dioxide (S02), and a chemical compound composed of silicon, oxygen, hydrogen, and various metal cations (asbestos). The adverse health outcomes and symptoms included heart attack or angina, stroke, emphysema/bronchitis, asthma, tuberculosis, cancer, less breath, short of breath, wheezing or tightness of chest, w
APA, Harvard, Vancouver, ISO, and other styles
9

Cedlund, Fia. "Hot och våld på jobbet : En studie om arbetsgivarens skyldighet att motverka hot och våld inom vård och omsorg." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-78900.

Full text
Abstract:
In Sweden, threats and violence has become a serious psychosocial work environment problem within the workplaces of health and social care. Several studies show the need to pay attention to how the workers psychosocial work environment is affected by the risk of threats and violence. Women are more exposed of threats and violence because the professions were most women work, the threats and violence occur. The purpose of this study is to investigate what legal obligations the employer holds to prevent threats and violence in the working environment and what consequences it can have if the empl
APA, Harvard, Vancouver, ISO, and other styles
10

Berrisch, Georg Matthias. "The application of the concept of "common heritage of humankind" to the protection of the global environment : our response of public international law to global environmental threats." Thesis, McGill University, 1991. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=60445.

Full text
Abstract:
The world faces an environmental crisis which can only be resolved through global co-operation and solidarity. Traditional international environmental law, based on the positivist notion of sovereignty, cannot offer adequate solutions. International environmental law must be based on a global approach founded on the notion of a common concern of humankind. This global approach has to provide a legal framework for the protection of the global environment. But it also must take into account the diverging needs and expectations of the different states. Furthermore, it must be realistic and cannot
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Threats to environment"

1

Nordic Council of Ministers. Nordic Environment Report Group., ed. The Nordic environment: Present state, trends and threats. Nordic Council of Ministers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

name, No. Tactical nuclear weapons: Emergent threats in an evolving security environment. Brassey's Inc., 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meško, Gorazd, Dejana Dimitrijević, and Charles B. Fields, eds. Understanding and Managing Threats to the Environment in South Eastern Europe. Springer Netherlands, 2011. http://dx.doi.org/10.1007/978-94-007-0611-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gerstein, Daniel M. Bioterror in the 21st century: Emerging threats in a new global environment. Naval Institute Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

1949-, Kelly Mick, ed. Winds of change: Living in the global greenhouse. Headway, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kumpu, Ville. Ympäristö, politiikka ja julkisuus: Kolme tapaustutkimusta journalistisen julkisuuden rakentumisesta ja merkityksestä ympäristöpolitiikassa. Tampere University Press, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Holappa, Jarkko. Security threats and requirements for Java-based applications in the networked home environment. Technical Research Centre of Finland, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Defense: Protection against chemical, biological, radiological and nuclear threats in a changing security environment. Frankfurter Allgemeine Buch, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Threats to environment"

1

Kolomeets, Maxim, Ksenia Zhernova, and Andrey Chechulin. "Unmanned Transport Environment Threats." In Proceedings of 15th International Conference on Electromechanics and Robotics "Zavalishin's Readings". Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5580-0_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mathieu, Charlotte, Pierre Potin, Josef Aschbacher, and Jérôme Lafeuille. "Environment." In Threats, Risks and Sustainability — Answers by Space. Springer Vienna, 2009. http://dx.doi.org/10.1007/978-3-211-87450-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Senta, Tarcisio Della, and Jacob Park. "Global Threats and Opportunities." In World Forests, Society and Environment. Springer Netherlands, 1999. http://dx.doi.org/10.1007/978-94-011-4746-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clark, Jonathan B. "Major Threats Within the Space Environment." In Handbook of Bioastronautics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-10152-1_91-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Idahosa-Taylor, Ehi, and Samuel Collins. "CHAPTER 2. Chemical Regulation at the European Level: Safeguarding Consumer Health and Protecting the Environment." In Chemical Health Threats. Royal Society of Chemistry, 2018. http://dx.doi.org/10.1039/9781782623687-00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Torosyan, G., and S. Harutyunyan. "Removing Chlorine-Containing Organic Compounds in the Environment After Floods." In Threats to Global Water Security. Springer Netherlands, 2009. http://dx.doi.org/10.1007/978-90-481-2344-5_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guan, Hui, Weiru Chen, Lin Liu, and Hongji Yang. "Environment-Driven Threats Elicitation for Web Applications." In Agent and Multi-Agent Systems: Technologies and Applications. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22000-5_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tiwari, Ashish. "Modern Threats and Concerns of Environment Pollution." In Handbook of Environmental Materials Management. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-58538-3_191-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bartoszcze, M., and J. Mierzejewski. "Some Problems Concerning Biological Threats." In Rapid Methods for Analysis of Biological Materials in the Environment. Springer Netherlands, 2000. http://dx.doi.org/10.1007/978-94-015-9534-6_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaffka, Alexander V. "Threats to Security: Environmental Degradation in the Former Soviet Union." In Conflict and the Environment. Springer Netherlands, 1997. http://dx.doi.org/10.1007/978-94-015-8947-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Threats to environment"

1

boukoftane, Abderrahmane. "Plant Threats management." In SPE International Conference on Health, Safety, and Environment in Oil and Gas Exploration and Production. Society of Petroleum Engineers, 2008. http://dx.doi.org/10.2118/111543-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alnaim, Abdulrahman K., Ahmed M. Alwakeel, and Eduardo B. Fernandez. "Threats Against the Virtual Machine Environment of NFV." In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2019. http://dx.doi.org/10.1109/cais.2019.8769561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Youssef, Tarek A., Mohamad El Hariri, Nicole Bugay, and O. A. Mohammed. "IEC 61850: Technology standards and cyber-threats." In 2016 IEEE 16th International Conference on Environment and Electrical Engineering (EEEIC). IEEE, 2016. http://dx.doi.org/10.1109/eeeic.2016.7555647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vishal, Bikrampal Kaur, and Surender Jangra. "Comparative Analysis of Security Threats in Mobile Cloud Computing Environment." In 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO). IEEE, 2018. http://dx.doi.org/10.1109/icrito.2018.8748761.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saadi, Chaimae, and Habiba Chaoui. "A new approach to mitigate security threats in cloud environment." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. ACM, 2017. http://dx.doi.org/10.1145/3018896.3018911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kolowrocki, K., and J. Soszynska-Budny. "Analysis of critical infrastructure operation process including operating environment threats." In 2016 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM). IEEE, 2016. http://dx.doi.org/10.1109/ieem.2016.7798168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, S. M. Suhail, Taha Selim Ustun, and Akhtar Kalam. "Security threats and possible safeguard mechanisms under IEC 61850 environment." In 2020 International Conference on Smart Grids and Energy Systems (SGES). IEEE, 2020. http://dx.doi.org/10.1109/sges51519.2020.00142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Manohar, Gautam, and Conrad Tucker. "A Privacy Preserving Data Mining Methodology for Dynamically Predicting Emerging Human Threats." In ASME 2013 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/detc2013-13155.

Full text
Abstract:
This paper proposes a privacy preserving data mining driven methodology for predicting emerging human threats in a public space by capturing large scale, real time body movement data (spatial data represented in X, Y, Z coordinate space) using Red-Green-Blue (RGB) image, infrared depth and skeletal image sensing technology. Unlike traditional passive surveillance systems (e.g., CCTV video surveillance systems), multimodal surveillance technologies have the ability to capture multiple data streams in a real time dynamic manner. However, mathematical models based on machine learning principles a
APA, Harvard, Vancouver, ISO, and other styles
9

Sirka, S., J. Erdelyi, P. Cicak, and K. Jelemenska. "Survey on Security Threats and Algorithms in Internet of Things Environment." In 2019 17th International Conference on Emerging eLearning Technologies and Applications (ICETA). IEEE, 2019. http://dx.doi.org/10.1109/iceta48886.2019.9039994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Botheju, Deshai, and Kumuduni Abeysinghe. "Safety and Environment Management Under Cost Pressure: Threats, Challenges, and Solutions." In SPE International Conference and Exhibition on Health, Safety, Security, Environment, and Social Responsibility. Society of Petroleum Engineers, 2016. http://dx.doi.org/10.2118/179467-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Threats to environment"

1

Duelley, Benjamin P. Defeating Asymmetric Threats in the Littoral Environment. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada525224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Melander, B. G., and W. W. Cooley. Atmospheric Electricity Hazards Threat Environment Definition. Defense Technical Information Center, 1985. http://dx.doi.org/10.21236/ada159739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Carlson, Jeffrey J. Vision-based threat detection in dynamic environments. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/913218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Butts, David Joshua. Agent Based Modeling for Multi-threat Environments. Office of Scientific and Technical Information (OSTI), 2018. http://dx.doi.org/10.2172/1477601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DEPARTMENT OF THE ARMY WASHINGTON DC. Force Health Protection (FHP): Occupational and Environmental Health (OEH) Threats. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada402362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pence, James B. Military Engineer Contribution to Operational Art: The Hybrid Threat Environment. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1001763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Thomas, G. T. Flight Simulation Trainer Threat Environment Request for Proposal Requirements Report. Defense Technical Information Center, 1990. http://dx.doi.org/10.21236/ada246881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kirby, Samuel A. Ship-to-Objective Maneuver (STOM) in a Chinese Threat Environment. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada476521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Spoors, F., C. D. B. Leakey, and M. A. James. Coast to ocean: a Fife-eye view: ocean literacy in Fife, Scotland. Scottish Oceans Institute, 2021. http://dx.doi.org/10.15664/10023.23981.

Full text
Abstract:
[Extract from Executive Summary] Ocean Literacy (OL), or Ocean Citizenship, is the basis of a movement to sway positive, lasting change in communities that will benefit the sea, coast and climate. An ocean literate person is understanding of the ocean’s influence on their own lives, as well as the way that their behaviours influence the ocean and is knowledgeable concerning ocean threats. A degree of informed-ness (or ‘literacy’) is thought to inspire effective communication and allow for impactful decision-making regarding personal lifestyle and behaviours, which are subsequently beneficial t
APA, Harvard, Vancouver, ISO, and other styles
10

Michelletti, Lynn, Lynn H. Huntt, Steve Ashburnllbaum, and Steve A. Huntt. V-22 Operational Testing: Immersion of V-22 Aircraft into Simulated Threat Environment. Defense Technical Information Center, 1999. http://dx.doi.org/10.21236/ada368639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!