enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Counter-IED efforts - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_efforts

    Counter-IED efforts involve conducting specialized analysis to identify vulnerabilities, inter-dependencies, and cascading effects of the IED threat network Nodal Activity Model. These vulnerability assessments are the foundation of a risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of an IED ...

  3. Joint Improvised-Threat Defeat Organization - Wikipedia

    en.wikipedia.org/wiki/Joint_Improvised-Threat...

    JIDO was born from the Joint IED Defeat Organization (JIEDDO) established in 2006, which focused on IEDs. [3] JIDO's mission is to "enable Department of Defense actions to counter improvised threats with tactical responsiveness and anticipatory acquisition in support of combatant commanders' efforts to prepare for, and adapt to, battlefield ...

  4. Counter-IED equipment - Wikipedia

    en.wikipedia.org/wiki/Counter-IED_equipment

    IED Countermeasure Equipment (ICE): In the fall of 2004, the Army Research Laboratory (ARL) at White Sands Missile Range in New Mexico and New Mexico State University's Physical Science Laboratory developed a jamming system that uses low-power radio frequency energy to block the radio signals that detonate enemy IEDs.

  5. Route clearance (IEDs) - Wikipedia

    en.wikipedia.org/wiki/Route_clearance_(IEDs)

    Although there was fierce fighting such as the Battle of Tora Bora and Operation Anaconda, the IED threat remained generally low until later in the war. Afghanistan is a rural country with rough terrain, most of the roads are unimproved and due to the abundance of rivers many culverts are present. Because of this IED threats are numerous.

  6. Comtrade - Wikipedia

    en.wikipedia.org/wiki/Comtrade

    Viewer/analysis functionality varies. Free COMTRADE viewers and analysis software include advanced functionality (e.g. protection relay behavior analysis (line/transformer differential/impedance protection, fault/harmonic analysis, user-defined mathematical expressions, analysis and plots, COMTRADE file editing and creation, etc..

  7. Improvised explosive device - Wikipedia

    en.wikipedia.org/wiki/Improvised_explosive_device

    An IED has five components: a switch (activator), an initiator (fuse), container (body), charge (explosive), and a power source (battery). An IED designed for use against armoured targets such as personnel carriers or tanks will be designed for armour penetration, by using a shaped charge that creates an explosively formed penetrator. IEDs are ...

  8. Program evaluation and review technique - Wikipedia

    en.wikipedia.org/wiki/Program_Evaluation_and...

    It can be understood as representing the time, effort, and resources required to move from one event to another. A PERT activity cannot be performed until the predecessor event has occurred. PERT sub-activity: a PERT activity can be further decomposed into a set of sub-activities. For example, activity A1 can be decomposed into A1.1, A1.2 and A1.3.

  9. Template:Example - Wikipedia

    en.wikipedia.org/wiki/Template:Example

    Example template that creates a small box saying it is an example. Template parameters [Edit template data] Parameter Description Type Status No parameters specified The above documentation is transcluded from Template:Example/doc. (edit | history) Editors can experiment in this template's sandbox (edit | diff) and testcases (create) pages. Add categories to the /doc subpage. Subpages of this ...