14 research outputs found

    Aeronautical engineering, a continuing bibliography with indexes

    Get PDF
    This bibliography lists 567 reports, articles and other documents introduced into the NASA scientific and technical information system in January 1984

    Simultaneous measurements of room-acoustic parameters using different measuring equipment?

    Get PDF

    Compromises in orchestra pit design: A ten-year trench war in The Royal Theatre, Copenhagen

    Get PDF

    Maritime airborne intelligence, surveillance and reconnaissance in the High North - The role of anti-submarine warfare - 1945 to the present

    Get PDF
    There is mounting consensus among NATO allies that the resurgent Russian naval and submarine activity in the High North needs to be closely monitored and kept in check. And in spite of the rise of satellite technology and unmanned aircraft, the key instrument in that effort, at least for now, remains the Maritime Patrol Aircraft (MPA) with its Anti-Submarine Warfare (ASW) capabilities. However, after three decades of focus on expeditionary and counterinsurgency (COIN) warfare, there has taken place an atrophy within the MPA community of knowledge, resources, experience and practice when it comes to the ASW aspects of maritime surveillance. This atrophy occurred just as the concept of intelligence, surveillance and reconnaissance (ISR) came to play an increasingly important role in operational planning. The concept of ISR, however, is linked to expeditionary and COIN warfare, and it pays insufficient attention to the challenges of maritime airborne surveillance and the specific challenges of ASW. This thesis seeks to address this gap. It does so by analysing the past in order to find solutions for the future. The thesis examines the entwined evolution of airborne maritime surveillance by MPA and ASW in the High North, both during and after the Cold War, and focuses on the key NATO allies of Norway, the US, and the UK. The thesis further seeks to identify the fundamental building blocks’ and tenets of these historical surveillance operations that are then used to craft a novel theoretical framework for understanding the nature and function of maritime airborne ISR and its relationship to ASW. That framework is then applied to make recommendations for the future for maritime surveillance in the High North. The thesis’s key findings of this thesis are that: • Russian submarines as the capital ships of the Russia Navy. They have morphed from noisy, predictable vessels operating in known patrol areas, to superbly silent vessels operating in unpredictable patterns, carrying world-leading cruise missiles technology that constitute a renewed threat to both European and American targets; • the traditional airborne tool to meet the submarine threat, the MPA, is crucial but not adequate in a modern context. A multi-layered, international approach is required, which will benefit from utilizing artificial intelligence for complex acoustic sensor processing

    Aeronautical engineering: A continuing bibliography with indexes (supplement 284)

    Get PDF
    This bibliography lists 974 reports, articles, and other documents introduced into the NASA scientific and technical information system in Oct. 1992. The coverage includes documents on design, construction, evaluation, testing, operation, and performance of aircraft (including aircraft engines) and associated components, equipment, and systems. It also includes research and development in aerodynamics, aeronautics, and ground support equipment for aeronautical vehicles

    Scattering by two spheres: Theory and experiment

    Get PDF

    Ray tracing in a turbulent, shallow-water channel

    Get PDF

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Investigating the build-up of precedence effect using reflection masking

    Get PDF
    The auditory processing level involved in the build‐up of precedence [Freyman et al., J. Acoust. Soc. Am. 90, 874–884 (1991)] has been investigated here by employing reflection masked threshold (RMT) techniques. Given that RMT techniques are generally assumed to address lower levels of the auditory signal processing, such an approach represents a bottom‐up approach to the buildup of precedence. Three conditioner configurations measuring a possible buildup of reflection suppression were compared to the baseline RMT for four reflection delays ranging from 2.5–15 ms. No buildup of reflection suppression was observed for any of the conditioner configurations. Buildup of template (decrease in RMT for two of the conditioners), on the other hand, was found to be delay dependent. For five of six listeners, with reflection delay=2.5 and 15 ms, RMT decreased relative to the baseline. For 5‐ and 10‐ms delay, no change in threshold was observed. It is concluded that the low‐level auditory processing involved in RMT is not sufficient to realize a buildup of reflection suppression. This confirms suggestions that higher level processing is involved in PE buildup. The observed enhancement of reflection detection (RMT) may contribute to active suppression at higher processing levels

    Scattering by two spheres: Theory and experiment

    Get PDF
    corecore