Results 91 to 100 of about 96,539 (341)

Scenarios for the Hybrid war of Israel against the Islamic Republic of Iran in the horizon of 2029 [PDF]

open access: yesعلوم و فنون نظامی
Objective: Since the beginning of the Islamic Revolution, Israel has sought to control and limit Iran's influence and, if possible, to change Iran, and after trying different ways from hard-war to soft influence, it has turned to a new way of war, i.e ...
Khalil Koulivand   +2 more
doaj   +1 more source

Autonomous weapon systems and international humanitarian law: a reply to the critics [PDF]

open access: yes, 2013
In November 2012, Human Rights Watch, in collaboration with the International Human Rights Clinic at Harvard Law School, released Losing Humanity: The Case against Killer Robots.[2] Human Rights Watch is among the most sophisticated of human rights ...
Schmitt, Michael
core  

Implementing Indigenous Data Sovereignty in Australia: A Five‐Phase Framework for Indigenous Data Governance

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn   +4 more
wiley   +1 more source

Magnetic Field‐Modulated Boolean Logic in Proteinoid‐ Fe3 O4 Hybrid Materials

open access: yesAdvanced Physics Research, EarlyView.
Proteinoid‐Fe3O4${\rm Fe}_3{\rm O}_4$. nanoparticle composites exhibit spontaneous electrical oscillations that emulate Boolean logic gates (AND, OR, XOR, NAND, NOR, NOT) under magnetic field modulation. External fields of 65.103 mT tune oscillatory behavior: 84 mT enhances amplitude while 103 mT suppresses it.
Panagiotis Mougkogiannis   +1 more
wiley   +1 more source

Estimation and rapid identification of later stages during embryonic development of the oviparous lizard Sceloporus aeneus (Squamata: Phrynosomatidae)

open access: yesThe Anatomical Record, EarlyView.
Abstract Stages of embryonic development for reptiles have been presented in tables that may include all or part of embryonic development. When oviposition occurs in some lizards, embryos are already in the later stages of development; likewise, the size of the eggs increases as incubation time progresses.
Nivia Rocio Antonio‐Rubio   +3 more
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

Lost learning: Prevalence, inequalities and outcomes of internal exclusion in mainstream secondary schools

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Internal exclusion (isolation) is a behaviour management approach involving the temporary relocation of a pupil from their classroom to a designated isolation space as a consequence of disruptive behaviour. We present the first study of prevalence (i.e., what proportion of young people are isolated?), inequalities (i.e., who is more likely to ...
Emma Thornton   +3 more
wiley   +1 more source

How We Stopped Worrying about Cyber Doom and Started Collecting Data

open access: yesPolitics and Governance, 2018
Moderate and measured takes on cyber security threats are swamped by the recent flood of research and policy positions in the cyber research field offering hyperbolic perspectives based on limited observations.
Brandon Valeriano, Ryan C. Maness
doaj   +1 more source

Home - About - Disclaimer - Privacy