Search Results - "2017 International Conference on Military Technologies (ICMT)"

Refine Results
  1. 1

    Drone detection by Ku-band battlefield radar by Ochodnicky, Jan, Matousek, Zdenek, Babjak, Marian, Kurty, Jan

    “…The intensive research and development efforts in the area of unmanned aerial vehicles (UAV) detection for security applications is observed in the last…”
    Get full text
    Conference Proceeding
  2. 2

    Unmanned ground vehicle simulation with the Virtual Autonomous Navigation Environment by Goodin, Christopher, Carrillo, Justin T., McInnis, David P., Cummins, Christopher L., Durst, Phillip J., Gates, Burhman Q., Newell, Brent S.

    “…Unmanned and autonomous ground vehicles have the potential to revolutionize military and civilian navigation. Military vehicles, however, present unique…”
    Get full text
    Conference Proceeding
  3. 3

    Measuring selected parameters of a workload in a distributed .NET application by performance counters by Kostal, Igor

    “…This paper deals with creating and using performance counters, processor (CPU) utilization and memory utilization in a distributed .NET application. It,…”
    Get full text
    Conference Proceeding
  4. 4

    Wearable systems for monitoring the health condition of soldiers: Review and application by Kutilek, Patrik, Volf, Petr, Viteckova, Slavka, Smrcka, Pavel, Krivanek, Vaclav, Lhotska, Lenka, Hana, Karel, Doskocil, Radek, Navratil, Leos, Hon, Zdenek, Stefek, Alexandr

    “…From the second half of the 1990s, thanks to more affordable and more powerful technology and systems for recording based on miniaturized sensors, we can…”
    Get full text
    Conference Proceeding
  5. 5

    Mathematical model of aircraft ground dynamics by Georgieva, Kristina, Serbezov, Vladimir

    “…This paper presents a mathematical model with 3 degrees of freedom developed in Matlab/Simulink environment for numerical simulation of aircraft ground…”
    Get full text
    Conference Proceeding
  6. 6

    Challenges in the implementation of autonomous systems into the battlefield by Hodicky, Jan, Prochazka, Dalibor

    “…The era of a system with some level of autonomous capacity is here for long time, however the deployment of fully autonomous system in military domain is still…”
    Get full text
    Conference Proceeding
  7. 7

    An exploratory case study on Swedish development of low observable vehicles by Andersson, Kent

    “…A case study approach, based on interviews and document reviews, was used to analyze the systems engineering processes of the SEP (Armored Multirole Vehicle,…”
    Get full text
    Conference Proceeding
  8. 8

    Multi-UAV agent-based coordination for persistent surveillance with dynamic priorities by Batista da Silva, Luis C., Maroquio Bernardo, Ricardo, de Oliveira, Hugo A., Rosa, Paulo F. F.

    “…A system to coordinate a team of unmanned aerial vehicles (UAV) applied for surveillance tasks is presented in this paper. Such scenario demands continuous…”
    Get full text
    Conference Proceeding
  9. 9

    Automatic military passability map generation system by Pokonieczny, Krzysztof

    “…Passability maps are one of the basic elements used in military terrain assessment. The article describes an automating of their development. It performs all…”
    Get full text
    Conference Proceeding
  10. 10

    Binary fuzzy measures and Choquet integration for multi-source fusion by Anderson, Derek T., Islam, Muhammad Aminul, King, Roger, Younan, Nicolas H., Fairley, Joshua R., Howington, Stacy, Petry, Frederick, Elmore, Paul, Zare, Alina

    “…Countless challenges in engineering require the intelligent combining (aka fusion) of data or information from multiple sources. The Choquet integral (ChI), a…”
    Get full text
    Conference Proceeding
  11. 11

    The non-destructive methods of fight against UAVs by Kratky, Miroslav, Minarik, Vaclav

    “…This article deals with the unmanned aerial vehicles elimination issue using non-destructive methods with focus emphasis on possible electronic warfare…”
    Get full text
    Conference Proceeding
  12. 12

    Analysis of signals from the DecaWave TREK1000 wideband positioning system using AKRS system by Haluza, Michal, Vesely, Jiri

    “…Ultra-Wideband (UWB) technology completes available technologies of fast data links on short distances and brings new possibilities, e. g. clear identification…”
    Get full text
    Conference Proceeding
  13. 13

    Use of ultrasound - The ultrasonic pulse velocity method for the diagnosis of protective structures after the load of TNT explosion by Stoller, Jiri, Zezulova, Eva

    “…The article deals with the use of ultrasound traversal methods for the diagnosis of protective structures elements made from the reinforced concrete. The…”
    Get full text
    Conference Proceeding
  14. 14
  15. 15

    Simplification of missile effective coverage zone in air defence simulations by Farlik, Jan, Casar, Josef, Stary, Vadim

    “…Military modelling and simulation plays a key role in troops training as well as in verification of military scenarios. Most of topics in the modelling of…”
    Get full text
    Conference Proceeding
  16. 16

    Indirect method to estimate distance measurement based on single visual cameras by Minh Tuan Bui, Doskocil, Radek, Krivanek, Vaclav, Thi Hien Ha, Bergeon, Yves T., Kutilek, Patrik

    “…In this paper, we proposed an indirect method to measure the distance of an object accurately by single visual cameras using triangulation. The object can be…”
    Get full text
    Conference Proceeding
  17. 17

    Trafficability analysis through vegetation by Rybansky, Marian

    “…Plant cover can affect military tactics, decisions, and operations. Each type of vegetation significantly influences the trafficability in unique ways…”
    Get full text
    Conference Proceeding
  18. 18

    Modelling and simulation as a service and concept development and experimentation by Prochazka, Dalibor, Hodicky, Jan

    “…Recent developments in computing and networking are making it possible for a customer to benefit from the products of computing without the full investment in…”
    Get full text
    Conference Proceeding
  19. 19

    Proposition of a model for risk assessment in the transport of the oversized loads in the army by Ryczynski, Jacek, Smal, Tomasz

    “…Road transport of the oversized loads is a very specific means of transport which requires good organizational skills and specific knowledge of legislation…”
    Get full text
    Conference Proceeding
  20. 20

    Comparison of depth of incomplete penetration for different types of pellets for shooting weapon of category D by Mikulicova, Michaela, Gracla, Michal, Ficek, Martin, Kuncar, Ales

    “…Nowadays, shooting weapons are widely used and highly demanded not only by the state armed forces but also for other civilians who are buying firearms for…”
    Get full text
    Conference Proceeding