Reviews of Selected System and Software Tools for Strategic Defense Applications

1990 ◽  
Author(s):  
David A. Wheeler ◽  
Dennis W. Fife ◽  
Edgar H. Sibley ◽  
J. B. Michael
Author(s):  
Jose-Maria Carazo ◽  
I. Benavides ◽  
S. Marco ◽  
J.L. Carrascosa ◽  
E.L. Zapata

Obtaining the three-dimensional (3D) structure of negatively stained biological specimens at a resolution of, typically, 2 - 4 nm is becoming a relatively common practice in an increasing number of laboratories. A combination of new conceptual approaches, new software tools, and faster computers have made this situation possible. However, all these 3D reconstruction processes are quite computer intensive, and the middle term future is full of suggestions entailing an even greater need of computing power. Up to now all published 3D reconstructions in this field have been performed on conventional (sequential) computers, but it is a fact that new parallel computer architectures represent the potential of order-of-magnitude increases in computing power and should, therefore, be considered for their possible application in the most computing intensive tasks.We have studied both shared-memory-based computer architectures, like the BBN Butterfly, and local-memory-based architectures, mainly hypercubes implemented on transputers, where we have used the algorithmic mapping method proposed by Zapata el at. In this work we have developed the basic software tools needed to obtain a 3D reconstruction from non-crystalline specimens (“single particles”) using the so-called Random Conical Tilt Series Method. We start from a pair of images presenting the same field, first tilted (by ≃55°) and then untilted. It is then assumed that we can supply the system with the image of the particle we are looking for (ideally, a 2D average from a previous study) and with a matrix describing the geometrical relationships between the tilted and untilted fields (this step is now accomplished by interactively marking a few pairs of corresponding features in the two fields). From here on the 3D reconstruction process may be run automatically.


2016 ◽  
Vol 21 (10) ◽  
pp. 48-49
Author(s):  
Guntram Doelfs
Keyword(s):  

Bei Asklepios wissen Manager und Chefärzte dank eines Software-Tools immer genau, wie es aktuell um die Qualität in allen Kliniken des Konzerns bestellt ist. Im Interview schildert Projektmanager Stefan Kruse die Vorteile der IT-Lösung.


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


2016 ◽  
Vol 9 (1) ◽  
pp. 32-54 ◽  
Author(s):  
Jesse Tumblin

This article examines the way a group of colonies on the far reaches of British power – Australia, New Zealand, Canada, and India, dealt with the imperatives of their own security in the early twentieth century. Each of these evolved into Dominion status and then to sovereign statehood (India lastly and most thoroughly) over the first half of the twentieth century, and their sovereignties evolved amidst a number of related and often countervailing problems of self-defence and cooperative security strategy within the British Empire. The article examines how security – the abstracted political goods of military force – worked alongside race in the greater Pacific to build colonial sovereignties before the First World War. Its first section examines the internal-domestic dimension of sovereignty and its need to secure territory through the issue of imperial naval subsidies. A number of colonies paid subsidies to Britain to support the Royal Navy and thus to contribute in financial terms to their strategic defense. These subsidies provoked increasing opposition after the turn of the twentieth century, and the article exlpores why colonial actors of various types thought financial subsidies threatened their sovereignties in important ways. The second section of the article examines the external-diplomatic dimension of sovereignty by looking at the way colonial actors responded to the Anglo-Japanese Alliance. I argue that colonial actors deployed security as a logic that allowed them to pursue their own bids for sovereignty and autonomy, leverage racial discourses that shaped state-building projects, and ultimately to attempt to nudge the focus of the British Empire's grand strategy away from Europe and into Asia.


Controlling ◽  
2002 ◽  
Vol 14 (1) ◽  
pp. 25-30 ◽  
Author(s):  
Yvette Hahne ◽  
Hans Schmitz ◽  
Andreas Vetter
Keyword(s):  

2018 ◽  
Author(s):  
Yi Chen ◽  
Sagar Manglani ◽  
Roberto Merco ◽  
Drew Bolduc

In this paper, we discuss several of major robot/vehicle platforms available and demonstrate the implementation of autonomous techniques on one such platform, the F1/10. Robot Operating System was chosen for its existing collection of software tools, libraries, and simulation environment. We build on the available information for the F1/10 vehicle and illustrate key tools that will help achieve properly functioning hardware. We provide methods to build algorithms and give examples of deploying these algorithms to complete autonomous driving tasks and build 2D maps using SLAM. Finally, we discuss the results of our findings and how they can be improved.


Sign in / Sign up

Export Citation Format

Share Document