Results 51 to 60 of about 580,616 (200)
Understanding digital intelligence and the norms that might govern it [PDF]
: This paper describes the nature of digital intelligence and provides context for the material published as a result of the actions of National Security Agency contractor Edward Snowden.
David Omand
core
Global intelligence, co-operation versus accountability: new facets to an old problem [PDF]
The most important recent change within the realm of intelligence and security services has been the expansion of intelligence co-operation. The growing connectivity between both foreign intelligence services and also domestic security services means ...
Aldrich, Richard J.
core +1 more source
Pixel-Level and DNA-Level Image Encryption Method Based on Five-Dimensional Hyperchaotic System
Images, as carriers of rich information, are generated, stored, and transmitted in various forms across diverse scenarios. It has become an important issue in the field of information security today to encrypt images to ensure information security.
Min Zhou +4 more
doaj +1 more source
Double stator cylindrical linear oscillating generators (DSCLOGs) have been widely used in renewable energy power generation systems due to their higher power density, higher reliability, and low-noise characteristics.
Anjun Liu +4 more
doaj +1 more source
Leadership: The Tabletop Concept [PDF]
Applying the analogy of the four supporting pillars of support for a table — and thus, in similar fashion with a true and lasting, moral leader — Hagelberg discusses how four leadership principles in particular – integrity, competence, emotional ...
Hagelberg, Travis M
core +1 more source
Espionnnage in and around Gibraltar (1936-1945) [PDF]
El artículo realiza una exploración por los servicios de inteligencia más relevantes en Gibraltar y su Campo entre los años 1936 y 1945. En este aspecto, la guerra civil sirvió de banco de pruebas en el que alemanes e italianos ensayaron diversos ...
Ponce Alberca, Julio
core
Joint Extraction of Hazard Source Knowledge in Integrated Utility Corridor Based on Knowledge Graph
The current knowledge graph-based joint extraction method for hazard source identification in integrated utility tunnels has been applied to emergency response management, assisting personnel in making rapid and accurate decisions.
Shanshan Wan +3 more
doaj +1 more source
The management of intelligence-assisted finite element analysis technology [PDF]
Artificial Intelligence (AI) approaches to Finite Element Analysis (FEA), have had tentative degrees of success over the last few years and some authors have argued that effective FEA can help in the manufacture reliability and safety aspects of ...
Sharif, AM
core
In large-scale e-learning learning platforms, precisely assessing learners’ knowledge states is crucial for achieving personalized exercise recommendation. However, most existing studies only rely on answer accuracy to evaluate knowledge states, ignoring
Shanshan Wan, Zebin Fu, Chuyuan Wei
doaj +1 more source
Employees\u27 Emotional Intelligence Determinants in Handling Dengue Fever (Case Study: Jember Regency, East Java Province, Indonesia) [PDF]
— Dengue fever is one of endemic diseases in Jember regency. The research observes and analyzes the effect of working motivation, compensation, working satisfaction, and working climate towards emotional intelligence of employees.
Gumanti, T. A. (T) +3 more
core

