Searched for: subject%3A%22Military%255C%2Boperations%22
(1 - 20 of 127)

Pages

document
Veraar, R.G. (author), Oosthuisen, R. (author), Andersson, K. (author)
Ramjet propulsion for gun-launched projectiles has received substantial attention since the invention of the ramjet engine concept in 1913. After the second World War, projectiles using solid fuel gained interest due to their inherent simplicity and robustness. Throughout the world, research and development programs have been and still are being...
article 2022
document
Stensrud, R. (author), Valaker, S. (author), Eikelboom, A.R. (author), Mikkelsen, B. (author)
In this paper, we discuss principles for designing collaboration among human and future non-human intelligent collaborators (NICs), focusing on interdependence and emergent dynamics of work flow. We discuss a dynamic coordination concept, where multiple military teams collaborate in support of Joint targeting, (JT) partly (and in some of the...
conference paper 2021
document
Toet, A. (author), Hoogervorst, M.A. (author)
In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...
article 2020
document
Maathuis, C. (author)
doctoral thesis 2020
document
de Heer, P.B.U.L. (author), de Reus, N.M. (author), Tealdi, L. (author), Kerbusch, P.J.M. (author)
The density, diversity, connectedness and scale of urban environments make military operations challenging. This paper shows that different artificial intelligence techniques can be combined to provide the commander with various form of intelligence augmentation and to support the decision making process. A warfare model has been developed where...
conference paper 2019
document
van Beurden, M. (author), Roijendijk, L. (author)
Physical load experienced by dismounted military has already been studied extensively. Few studies, however, have focused on the cognitive load of dismounted soldiers during military operations in the field. In this project, a cognitive task analysis (CTA) was performed to study the cognitive workload of a troop commander during troop hasty...
conference paper 2019
document
Swuste, P. (author), Zwaard, W. (author), Groeneweg, J. (author), Guldenmund, F. (author)
The origin of occupational safety, as an area of main interest of the government, the industry, the unions, and scientists starts in the Netherlands at the end of the 19th century. Roughly in the same period occupational medicine becomes a separate domain. Only just after World War II are safety professionals organised in associations. Starting...
article 2019
document
Toet, A. (author), Hogervorst, M.A. (author)
In military operations signature reduction techniques such as camouflage nets, low-emissive paints, and camouflage patterns are typically deployed to optimize the survivability of high value assets by minimizing their detectability. Various methods have been developed to assess the effectiveness of these camouflage measures. There are three main...
article 2019
document
Toet, A. (author), Hogervorst, M.A. (author)
public lecture 2019
document
Shandilya, N. (author), Ligthart, T. (author), van Voorde, I. (author), Stahlmecke, B. (author), Clavaguera, S. (author), Philippot, C. (author), Goede, H. (author)
The shredding of waste of electrical and electronic equipment (WEEE) and other products, incorporated with nanomaterials, can lead to a substantial release of nanomaterials. Considering the uncertainty, complexity, and scarcity of experimental data on release, we present the development of a Bayesian belief network (BBN) model. This baseline...
article 2018
document
Bowman, E.K. (author), Burghouts, G. (author), Overlier, L. (author), Kase, S.E. (author), Zimmerman, R.J. (author), Oggero, S. (author)
The US and nations of the NATO Alliance are increasingly threatened by the global spread of terrorism, humanitarian crises/disaster response, and public health emergencies. These threats are influenced by the unprecedented rise of information sharing technologies and practices, where mobile access to social networking sites is ubiquitous. In...
conference paper 2018
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Müller, W. (author), Kuwertz, A. (author), Grönwall, C. (author), Petersson, H. (author), Dekker, R. (author), Reinert, F. (author), Ditzel, M. (author)
Experiences from recent conflicts show the strong need for smart sensor suites comprising different multi-spectral imaging sensors as core elements as well as additional non-imaging sensors. Smart sensor suites should be part of a smart sensor network - A network of sensors, databases, evaluation stations and user terminals. Its goal is to...
conference paper 2017
document
Pinto, M.J. (author), Barros, A.I. (author), Noomen, R. (author), van Gelder, P.H.A.J.M. (author), Lamballais Tessensohn, T. (author)
The operational use of satellite systems has been increasing due to technological advances and the reduced costs of satellites and their launching. As such it has become more relevant to determine how to better use these new capabilities which is reflected in an increase in application studies in this area. This work focuses on the problem of...
conference paper 2017
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Lamballais Tessensohnt, T. (author)
Het verwerken van e-commerce bestellingen stelt magazijnen voor grote uitdagingen. Het assortiment aan producten is vaak groot, waarmee de afstanden in het magazijn ook groot worden. Daarnaast bestaan de bestellingen meestal uit één eenheid, in plaats van uit complete dozen of pallets die kostenefficiënt te verplaatsen zijn. Daarbovenop komt dat...
article 2017
document
Mente, R. (author), van de Kuijt, J.T. (author)
Tijdens het Oekraïne-referendum in 2016 werd in Nederland een opvallend en overduidelijk nepfilmpje verspreid van zogenaamde soldaten uit de Oekraïne. Bedoeld om verwarring te zaaien en discussies te verstoren. Waarschijnlijk kwam deze uit de nepnieuwsfabriek uit Sint Petersburg welke ook op Nederland is gericht. Daarnaast bracht de NRC een...
article 2017
document
van der Vecht, B. (author), van Wermeskerken, F.P.J. (author), Smit, S.K. (author)
article 2017
document
Laan, C.M. (author), van der Mijden, T. (author), Martins Botto de Barros, A.I. (author), Boucherie, R.J. (author)
article 2017
document
Veldhuis, G.A. (author), Korzilius, H. (author)
Research has shown that many individuals have difficulties solving tasks that involve a principal component of dynamic systems: accumulation. They incorrectly assume that the behavioural pattern of a stock resembles that of its flows and vice versa. This has become known as correlation heuristic reasoning.Much less is known about the underlying...
article 2016
Searched for: subject%3A%22Military%255C%2Boperations%22
(1 - 20 of 127)

Pages