Most Read Articles
Most read articles are listed by the number of read for the previous three months.
An Assessment Model for Defense Cybersecurity Capability
J. Def. Acquis. Technol. 2020;2(2):39-43.
https://doi.org/10.33530/jdaat.2020.2.2.39
HTML
PDF
PubReader
Last 3 months views: 609
https://doi.org/10.33530/jdaat.2020.2.2.39
Key Point Localization Based on Intersecting Circle for Palmprint Preprocessing in Public Security
J. Def. Acquis. Technol. 2019;1(2):24-31.
https://doi.org/10.33530/jdaat.2019.1.2.24
HTML
PDF
PubReader
Last 3 months views: 589
https://doi.org/10.33530/jdaat.2019.1.2.24
Real-time Facial Expression Recognition using 3D Appearance and Geometric Network for Public Security
J. Def. Acquis. Technol. 2020;2(1):33-37.
https://doi.org/10.33530/jdaat.2020.2.1.33
HTML
PDF
PubReader
Last 3 months views: 453
https://doi.org/10.33530/jdaat.2020.2.1.33
Numerical Experience with Variable-fidelity Metamodeling for Aerodynamic Data Fusion Problems
J. Def. Acquis. Technol. 2019;1(1):1-8.
https://doi.org/10.33530/jdaat.2019.1.1.1
HTML
PDF
PubReader
Last 3 months views: 187
https://doi.org/10.33530/jdaat.2019.1.1.1
Optimal Weapons System Maintenance Using Prognostics and the Interface between an S1000D-based Interactive Electronic Technical Publication and Condition-based Maintenance
J. Def. Acquis. Technol. 2019;1(2):17-23.
https://doi.org/10.33530/jdaat.2019.1.2.17
HTML
PDF
PubReader
Last 3 months views: 177
https://doi.org/10.33530/jdaat.2019.1.2.17
Experimental Consideration of Projectile Density and Hardness Effect on Its Penetration Ability in Alumina Target
J. Def. Acquis. Technol. 2019;1(1):9-15.
https://doi.org/10.33530/jdaat.2019.1.1.9
HTML
PDF
PubReader
Last 3 months views: 165
https://doi.org/10.33530/jdaat.2019.1.1.9