opération passive

  • 1Passive radar — systems (also referred to as passive coherent location and passive covert radar) encompass a class of radar systems that detect and track objects by processing reflections from non cooperative sources of illumination in the environment, such as… …

    Wikipedia

  • 2Passive nuclear safety — describes a safety feature of a nuclear reactor that does not require operator action or electronic feedback in order to shut down safely in the event of a particular type of emergency (usually overheating resulting from a loss of coolant or loss …

    Wikipedia

  • 3Passive fire protection — (PFP) is an integral component of the three components of structural fire protection and fire safety in a building. PFP attempts to contain fires or slow the spread, through use of fire resistant walls, floors, and doors (amongst other examples) …

    Wikipedia

  • 4Passive cooling — refers to technologies or design features used to cool buildings without power consumption, such as those technologies discussed in the Passive house project.Passive coolingThe term passive implies that energy consuming mechanical components like …

    Wikipedia

  • 5Operation Cedar Falls — Part of the Vietnam War Operation Cedar Falls …

    Wikipedia

  • 6Operation Igloo White — Part of the Vietnam War Date 1968–1973 Location Southern Laos Result …

    Wikipedia

  • 7Operation Crusader — Part of Western Desert Campaign A Crusader mk.I passes a burning German Panzer IV …

    Wikipedia

  • 8Operation Alpha Centauri — (1986) was a military operation by the South African Defence Force during the South African Border War and Angolan Civil War. This aim of this operation was to stop a FAPLA advance on the UNITA capital of Jamba; this was achieved in and around… …

    Wikipedia

  • 9Operation True Promise — Libanonkrieg 2006 Teil von: Nahostkonflikt Nach einem Luftangriff auf Tyros …

    Deutsch Wikipedia

  • 10Passive Probe — Overview = Passive probing is the process of acquiring control or data from a telecommunication or data network without disturbing the network being monitored. This ensures that applications using the probed data can do so without any threat to… …

    Wikipedia