Results 51 to 60 of about 580,616 (200)

Understanding digital intelligence and the norms that might govern it [PDF]

open access: yes
: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden.
David Omand
core  

Global intelligence, co-operation versus accountability: new facets to an old problem [PDF]

open access: yes, 2009
The most important recent change within the realm of intelligence and security services has been the expansion of intelligence co-operation. The growing connectivity between both foreign intelligence services and also domestic security services means ...
Aldrich, Richard J.
core   +1 more source

Pixel-Level and DNA-Level Image Encryption Method Based on Five-Dimensional Hyperchaotic System

open access: yesEntropy
Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security.
Min Zhou   +4 more
doaj   +1 more source

Design and Optimization of Improved Double Stator Cylindrical Linear Oscillating Generator with Curved Tooth Structure

open access: yesApplied Sciences
Double stator cylindrical linear oscillating generators (DSCLOGs) have been widely used in renewable energy power generation systems due to their higher power density, higher reliability, and low-noise characteristics.
Anjun Liu   +4 more
doaj   +1 more source

Leadership: The Tabletop Concept [PDF]

open access: yes, 2012
Applying the analogy of the four supporting pillars of support for a table — and thus, in similar fashion with a true and lasting, moral leader — Hagelberg discusses how four leadership principles in particular – integrity, competence, emotional ...
Hagelberg, Travis M
core   +1 more source

Espionnnage in and around Gibraltar (1936-1945) [PDF]

open access: yes, 2015
El artículo realiza una exploración por los servicios de inteligencia más relevantes en Gibraltar y su Campo entre los años 1936 y 1945. En este aspecto, la guerra civil sirvió de banco de pruebas en el que alemanes e italianos ensayaron diversos ...
Ponce Alberca, Julio
core  

Joint Extraction of Hazard Source Knowledge in Integrated Utility Corridor Based on Knowledge Graph

open access: yesIEEE Access
The current knowledge graph-based joint extraction method for hazard source identification in integrated utility tunnels has been applied to emergency response management, assisting personnel in making rapid and accurate decisions.
Shanshan Wan   +3 more
doaj   +1 more source

The management of intelligence-assisted finite element analysis technology [PDF]

open access: yes, 1997
Artificial Intelligence (AI) approaches to Finite Element Analysis (FEA), have had tentative degrees of success over the last few years and some authors have argued that effective FEA can help in the manufacture reliability and safety aspects of ...
Sharif, AM
core  

An exercise recommendation approach via multi-behavior interactive perception and semantic-enhanced knowledge graph

open access: yesJournal of King Saud University: Computer and Information Sciences
In large-scale e-learning learning platforms, precisely assessing learners’ knowledge states is crucial for achieving personalized exercise recommendation. However, most existing studies only rely on answer accuracy to evaluate knowledge states, ignoring
Shanshan Wan, Zebin Fu, Chuyuan Wei
doaj   +1 more source

Employees\u27 Emotional Intelligence Determinants in Handling Dengue Fever (Case Study: Jember Regency, East Java Province, Indonesia) [PDF]

open access: yes, 2017
— Dengue fever is one of endemic diseases in Jember regency. The research observes and analyzes the effect of working motivation, compensation, working satisfaction, and working climate towards emotional intelligence of employees.
Gumanti, T. A. (T)   +3 more
core  

Home - About - Disclaimer - Privacy