Hybrid in vitro diffusion cell for simultaneous evaluation of hair and skin decontamination: temporal distribution of chemical contaminants [PDF]
Most casualty or personnel decontamination studies have focused on removing contaminants from the skin. However, scalp hair and underlying skin are the most likely areas of contamination following airborne exposure to chemicals. The aim of this study was
A Roul+21 more
core +3 more sources
'Close but no Cigar’: Hamas’s psychological warfare against Israel between 2014 and 2023
This essay represents the continuation of my research, on the Hamas Organization’s novel methods of psychological warfare against Israel. The previous article, which covered the period between 2007 and 2014, demonstrated the relative clumsiness of Hamas ...
Nesya Rubinstein-Shemer
semanticscholar +1 more source
Electronic Warfare Methods Combatting UAVs
Article history: Received: 27 August, 2020 Accepted: 15 October, 2020 Online: 20 November, 2020 This paper describes methods of eliminating Unmanned Aerial Vehicles (UAV) nondestructively, using Electronic Warfare Methods. The aim is to introduce certain
M. Kratky+3 more
semanticscholar +1 more source
The Central Intelligence Agency’s armed Remotely Piloted Vehicle-supported counter-insurgency campaign in Pakistan – a mission undermined by unintended consequences? [PDF]
This paper views America's 'drones-first' counter-insurgency effort in Pakistan through the lens of Merton's theory of the unintended consequences of purposive action.
Bennett, Simon
core +2 more sources
Feasibility of Anti-Submarine Buried Target Destruction Technologies
This paper discussed the technologies and methods for the effective destruction of submarine buried targets in modern warfare and maritime security. As these targets are highly concealed and difficult to destroy, they are mainly dealt with by kinetic ...
Weichen LI+4 more
doaj +1 more source
Masonry is one of the most common building materials, which is used due to low cost, good sound and heat insulation properties, easy availability and locally available material [1].
C. Wang+5 more
semanticscholar +1 more source
PentHack: AI-Enabled Penetration Testing Platform for Knowledge Development
The process of conducting and executing penetration testing within the pedagogical paradigm often requires complex and arduous processes. This is especially daunting for beginners who often struggle with the complexities of penetration processes ...
Meera Alaryani,+3 more
semanticscholar +1 more source
Sand Penetration: A Near Nose Investigation of a Sand Penetration Event [PDF]
This paper presents experimental and computational results of a long-rod penetrating dry granular sand at velocities near 100 m/s. The objective of this work is to develop a fundamental understanding of the formation and transmission of dynamic force ...
Borg, John+2 more
core +1 more source
Refining the PoinTER “human firewall” pentesting framework [PDF]
PurposePenetration tests have become a valuable tool in the cyber security defence strategy, in terms of detecting vulnerabilities. Although penetration testing has traditionally focused on technical aspects, the field has started to realise the ...
Archibald, Jacqueline M., Renaud, Karen
core +2 more sources
Synthetic Aspects and Characterization Needs in MOF Chemistry – from Discovery to Applications
Overcoming the challenges of phase discovery, synthesis optimization and scale‐up, characterization, and computational studies is essential to accelerate the large‐scale application of MOFs. Life‐cycle analyses and techno‐economic analyses need to be performed to realistically assess their potential for industrial relevance.
Bastian Achenbach+4 more
wiley +1 more source