Skip to search formSkip to main contentSkip to account menu

military identification

National Institutes of Health

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2013
Review
2013
During the last decade a notable change of the requirements concerning situational awareness and network centric warfare… 
2012
2012
Abstract : We assessed the completeness and accuracy of beneficiary data contained in the Defense Enrollment Eligibility… 
2008
2008
The image fusion technique is to maximize the information in images at same area or object taken by different sensors. It… 
2007
2007
Secure civilian and military identification protocols are very important and useful cryptographic tool. In computer network… 
2006
2006
How to prove yourself? This is the problem. Secure civilian and military identification protocols are very important and useful… 
Review
2006
Review
2006
In the Air Traffic Control (ATC) environment Secondary Surveillance Radar (SSR), Aircraft Dependent Surveillance Broadcast (ADS-B… 
2004
2004
The Economic Crime Institute of Utica College (www.ecii.edu) supports education and research in economic crime and information… 
1999
1999
Current policy allows the use of identification cards and tags for transfusion purposes during contingency operations. The… 
1984
1984
A flush-mounting antenna is described which could be used, in lieu of present antennas, to provide direction finding and… 
1972
1972
Abstract : The purpose of this study was to systematically investigate and describe the community established as a residence for…