Results 31 to 40 of about 45,472 (162)
Smart Structures. La arquitectura inteligente de José Miguel de Prada Poole [PDF]
En 1968, el arquitecto español José Miguel de Prada Poole (Valladolid 1938) inicia sus investigaciones sobre Estructuras Pneumáticas de Respuesta Variable, influido por la cibernética y las incipientes técnologías de computación.
Cobo Arévalo, Antonio
core +1 more source
Evaluating cryptographic vulnerabilities created by quantum computing in industrial control systems
Abstract Quantum computing is expected to eventually be able to break the public‐key cryptography algorithms currently used throughout information technology (IT) infrastructure, undermining foundational tools used to maintain information security across the country's critical infrastructure.
Michael J. D. Vermeer +5 more
wiley +1 more source
Predicting Thalasso Tourist Delight: A Hybrid SEM—Artificial Intelligence Analysis
This study focuses on the influence of the quality of services received by thalassotherapy customers on their global satisfaction and the relationship between this and the word of mouth. This study uses a hybrid SEM—classification tree analysis. The empirical findings reveal a significant relationship between the quality of each offered service and ...
Agustín J. Sánchez-Medina +4 more
wiley +1 more source
Cyber risk management approach from the high business management [PDF]
El mundo actual se encuentra creciendo bajo un marco de globalización aspectos como el internet, las redes sociales, y la evolución tecnológica hacen que la teoría del profesor y filósofo canadiense Marshall Mc Luhan cobre mayor importancia sobre su
Riveros Cardenas, Fredy Orlando
core
Técnica, posthumanismo, experiencia [PDF]
El presente trabajo propone una reflexión sobre la técnica y sobre las condiciones de una crítica de la técnica en el horizonte contemporáneo del agotamiento de los paradigmas humanistas desde los que tradicionalmente se pensó esa crítica. Se plantea que
Garcia Garcia, Luis Ignacio
core +2 more sources
Core concerns: The need for a governance framework to protect global Internet infrastructure
Abstract The war in Ukraine has underscored the risks and threats to global Internet infrastructure from geopolitically motivated cyber operations. The Domain Name System and core protocols responsible for the routing, forwarding, and security of Internet traffic have been exploited by actors in Russia and Ukraine for denial‐of‐service attacks ...
Dennis Broeders, Arun Sukumar
wiley +1 more source
Activity of Antimicrobial Silver Polystyrene Nanocomposites
A simple technique based on doping polymers with in situ generated silver nanoparticles (Ag/PS films) has been developed. In particular, an antiseptic material has been prepared by dissolving silver 1,5‐cyclooctadiene‐hexafluoroacetylacetonate in amorphous polystyrene, and the obtained solid solution has been heated for ca.
M. Palomba +6 more
wiley +1 more source
Design, Prototyping and Stratospheric Launch of CubeSats for University Competition
This work presents the design and prototyping of two 1U standard CubeSats for the First Brazilian MCTI Satellite Olympiad, launching one in a stratospheric helium-filled balloon.
Diego Anestor Coutinho +6 more
doaj
De la seguridad cibernética a la resiliencia cibernética aplicada a la protección de datos personales (Tema Central) [PDF]
Information and communication technologies allows us to live in a network society, however there are several risks of a hyperconectivity, one of them is the safety of the information; some of these information is personal data. This challenge was assumed
Orellana Robalino, Claudia
core +1 more source
Abstract The military now views cyberspace as a new warfare domain, with constant cyber operations potentially causing significant consequences. Internationally, countries are heavily involved in cyberspace, but international law lags behind this evolution, raising questions about its application and retaliation measures.
Sam Maesschalck
wiley +1 more source

