Search results
Jump to navigation
Jump to search
Page title matches
- ...ound or inside a building. [[Electronic warfare]] includes a wide range of concealment methods, including [[electronic attack|jamming]] sensors so they cannot de667 bytes (96 words) - 16:17, 8 July 2009
- 167 bytes (18 words) - 16:16, 8 July 2009
- 369 bytes (49 words) - 16:20, 8 July 2009
Page text matches
- ...ound or inside a building. [[Electronic warfare]] includes a wide range of concealment methods, including [[electronic attack|jamming]] sensors so they cannot de667 bytes (96 words) - 16:17, 8 July 2009
- Article normally worn on the face, typically for protection, concealment, performance, or amusement.137 bytes (16 words) - 02:34, 11 September 2009
- ...p://www.mja.com.au/public/issues/182_02_170105/for10877_fm.html Allocation concealment and blinding] * [http://www.bmj.com/cgi/content/full/330/7499/1049 Comparison of allocation concealment]913 bytes (121 words) - 10:18, 14 December 2011
- ...encompassing what the West regards as [[camouflage]], or [[deception]], [[concealment]] and [[counterintelligence]], but going to a conscious plan of convincing308 bytes (41 words) - 06:01, 21 August 2009
- ..., in combination with a cryptographic algorithm, introduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]; [[key management]] is346 bytes (45 words) - 11:07, 30 October 2008
- {{r|Concealment}}444 bytes (56 words) - 09:49, 20 March 2024
- {{r|Concealment}}964 bytes (123 words) - 09:02, 19 April 2024
- {{r|Concealment}}2 KB (199 words) - 14:53, 6 April 2024
- ...tive matters such as weapons of mass destruction; they were the key to the concealment and bluffing operations with United Nations inspectors such as UNSCOM.1 KB (225 words) - 07:36, 18 March 2024
- ...pouch. Besides differing from bristletails in the number of tails and the concealment of the mouthparts, they have shallower bodies and lack compound eyes and sc2 KB (222 words) - 20:10, 14 September 2013
- ...ch shorter than that of most other guns, which allows ease of carrying and concealment, but at the cost of significantly reducing accuracy at long ranges.1 KB (232 words) - 17:09, 13 August 2010
- ...including the enhancement of meanings otherwise difficult to express, the concealment of meanings the author does not wish to make explicit, or providing memorab2 KB (310 words) - 10:35, 27 August 2013
- ...intended for NATO roles where it could be dispersed into forests and other concealment, and then rise to carry out [[close air support]] and [[battlefield air int2 KB (321 words) - 11:02, 8 April 2024
- ...ch shorter than that of most other guns, which allows ease of carrying and concealment, but at the cost of significantly reducing accuracy at long ranges.2 KB (357 words) - 15:44, 17 July 2008
- ===Concealment===8 KB (1,206 words) - 09:52, 20 March 2024
- ..., in combination with a cryptographic algorithm, introduces or removes the concealment applied to [[plaintext]] or taken to [[ciphertext]]. This discussion deals4 KB (564 words) - 23:12, 4 February 2010
- ...well beyond. Their usage include deception, [[counterintelligence]] and [[concealment]], as an integral part of all planning, in which the highest levels of comm4 KB (517 words) - 14:13, 6 April 2024
- ...fle typically undergoes special training, not only in marksmanship, but in concealment.6 KB (769 words) - 21:56, 25 August 2022
- ...o watch and cover, while the bounding element moves with as much cover and concealment as possible.5 KB (841 words) - 12:59, 8 July 2009
- 6) concealment (hiding the very existence of a message)5 KB (822 words) - 02:42, 3 February 2010
- ...rms in the wild<ref name=mitchell>Mitchell, Robert W. (1999) Deception and Concealment as Strategic Script Violation in Great Apes and Humans. In: Parker, ST, Mit ...ue to language.<ref name=mitchell>Mitchell, Robert W. (1999) Deception and Concealment as Strategic Script Violation in Great Apes and Humans. In: Parker, ST, Mit19 KB (2,970 words) - 02:36, 14 February 2010
- The concealment was not always deliberate, but simply because the records were scattered am15 KB (2,157 words) - 12:49, 2 April 2024
- ...complex from west to east rendering the heavy canopy area ineffective for concealment and cover. II Corps intelligence estimated the action of the B-52 airstrike15 KB (2,465 words) - 10:35, 8 September 2020
- ...sive blocks. This sacrificed mobility, flexibility, and the possibility of concealment to maximize striking power and gain mutual protection. In Greek armies 8-ra ...h]] is a long established military tactic in which an ambushing force uses concealment to attack an enemy that passes its position. Ambushers strike from conceale33 KB (5,452 words) - 09:17, 5 April 2024
- ...lied to the HYMSMO desert and forest libraries, and can reveal camouflage, concealment and deception protecting ground military equipment. Other algorithms have b19 KB (2,668 words) - 12:26, 22 March 2024
- ...s of verification. In addition, both countries agree not to use deliberate concealment measures to impede verification." refers to, in part, a technical agreement21 KB (3,064 words) - 05:12, 31 March 2024
- ...can help according to a [[randomized controlled trial]] without allocation concealment.<ref name="pmid11838852">{{cite journal |author=Schlesinger N, Detry MA, Ho24 KB (3,312 words) - 17:35, 10 February 2024
- ...outcomes are more susceptible to bias in trials with inadequate allocation concealment.<ref>{{Cite journal * Inadequate or unclear allocation concealment87 KB (12,105 words) - 14:08, 2 February 2023
- ...outcomes are more susceptible to bias in trials with inadequate allocation concealment.<ref>{{Cite journal ...if any of the first three items are low quality (randomization, allocation concealment before and during enrollment, blinding), the trial may be considered high o79 KB (10,925 words) - 14:12, 2 February 2023
- ...suggests it should be assumed to contain the English words, ''camouflage, concealment, deception, imitation, disinformation, secrecy, security, feints, diversion29 KB (4,252 words) - 07:36, 18 March 2024
- ...umption that if a target can be located, it can be destroyed. As a result, concealment and deception have taken on new criticality. "Stealth" low-observability ai ...precision guided bombs that can attack them. Deep burial, with appropriate concealment during construction, is a way to avoid the opponent's knowing the buried fa75 KB (10,990 words) - 12:11, 31 March 2024
- OPSEC measures may include, but are not limited to, counterimagery, cover, concealment, and deception.33 KB (4,818 words) - 12:10, 20 March 2024
- ...11095250/http://number10.gov.uk/archive/2003/02/iraq-its-infrastructure-of-concealment-deception-and-intimidation-2-1470] ''(this document was removed from the na33 KB (4,932 words) - 16:57, 29 March 2024
- *radio concealment and deception30 KB (4,571 words) - 06:56, 4 April 2024
- ...ny tints may have occurred, yet those races having colour. best adapted to concealment from their enemies would inevitably survive the longest.</blockquote>35 KB (5,496 words) - 21:48, 13 December 2011
- ...ography)|code]]" is often used to mean any method of encryption or meaning-concealment. In cryptography, however, '''code''' is more specific, meaning a linguisti52 KB (8,332 words) - 05:49, 8 April 2024
- ...because it is not possible to un-recruit a man. The two areas of possible concealment which are especially dangerous are prior intelligence ties and side-commo.51 KB (8,128 words) - 04:50, 31 March 2024
- ...a bikini: what they reveal is suggestive, but what they conceal is vital. Concealment, in this case, is more likely to be a lack of needed links, as in [[#orphan52 KB (8,701 words) - 18:02, 1 April 2024
- ...installations with paint, nets, or foliage; also the disguise so applied; concealment by means of disguise; behavior or artifice designed to deceive or hide''63 KB (10,748 words) - 20:33, 4 May 2017
- ....</ref> He was, according to Jenkins, "singularly lacking in inhibition or concealment".<ref>Jenkins 2001, p. xv.</ref> [[Robert Rhodes James]] said he "lacked an171 KB (25,041 words) - 09:26, 5 April 2024