NIJ 0115.00 standard for testing stab resistance of body armor
نویسندگان
چکیده
منابع مشابه
Experimental study of thermal comfort on stab resistant body armor
PURPOSE This research aims to investigate the impacts of exercise intensity and sequence on human physiology parameters and subjective thermal sensation when wearing stab resistant body armor under daily working conditions in China [26 and 31 °C, 45-50 % relative humidity (RH)], and to investigate on the relationship between subjective judgments and objective parameters. METHODS Eight male vo...
متن کاملPolice Body Armor Standards and Testing, Vol. I
Foreword For two decades, the number of police officers shot to death each year has been declining while the number of officers shot has been increasing. The decrease in the lethality of shootings is partly attributable to the increase in wearing of bullet-resistant body armor, especially soft, inconspicuous armor designed to be worn full-time. A prospective purchaser can see how much of the bo...
متن کاملBallistic Body Armor
P O L Y M E R S Our goal is to prevent the catastrophic failure of ballistic body armor by developing measurements and predictive models to test and determine the long-term reliability of polymers used in ballistic resistant armor. Our approach, which utilizes conventional analytical techniques in addition to newly developed minimally invasive test methods, seeks to identify the chemical and me...
متن کاملTask-specific effects of modular body armor.
Eleven recreationally active males performed 11 circuits of military work, wearing torso armor on one occasion, and full armor on another. Performance was measured by the time taken to complete individual tasks, and the overall time to completion (TTC) for each circuit. Heart rate, intestinal temperature, ratings of perceived exertion (RPE), and thermal sensation were recorded after each circui...
متن کاملBody Armor for Binaries: Preventing Buffer Overflows Without Recompilation
BinArmor is a novel technique to protect existing C binaries from memory corruption attacks on both control data and non-control data. Without access to source code, non-control data attacks cannot be detected with current techniques. Our approach hardens binaries against both kinds of overflow, without requiring the programs’ source or symbol tables. We show that BinArmor is able to stop real ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vojnotehnicki glasnik
سال: 2008
ISSN: 0042-8469
DOI: 10.5937/vojtehg0802156j