Results 101 to 110 of about 100,068 (284)
Abstract This article examines the first large‐scale attempts to recruit women as soldiers and officers in 1990s Sweden, focusing on the techniques and promises employed by the Swedish Armed Forces (SAF). Building on a wide range of documents and audiovisual sources, we demonstrate how the SAF utilised various marketing techniques, including ...
Sanna Strand, Fia Cottrell‐Sundevall
wiley +1 more source
Electromagnetic (electronic) warfare
Electromagnetic radiation ("spectrum") is essential for modern warfare. What challenges and opportunities does electromagnetic warfare present to the UK?
Stephanie Halwa, Lydia Harriss
openaire +2 more sources
Identification of Sonar Detection Signal Based on Fractional Fourier Transform
Aiming at the source of underwater acoustic emission, in order to identify the enemy emission sonar source accurately. Using the digital watermarking technology and combining with the good time-frequency characteristics of fractional Fourier transform ...
Biao Wang +3 more
doaj +1 more source
21st Century Simulation: Exploiting High Performance Computing and Data Analysis [PDF]
This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis.
Baer, Garth D. +2 more
core
STREETS AS STAGES: Traffic Enforcement and the Competition for Cultural Growth in China
ABSTRACT In keeping with China’s desire to build soft power to parallel its economic growth, the policing of city streets has moved to the forefront as a mechanism for moral regulation and improving urban prestige. Under pressure to civilize their citizenry, many Chinese cities have become entrepreneurial cities within a type of cultural growth ...
Gregory Fayard
wiley +1 more source
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley +1 more source
"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N. +1 more
core
De‐Dollarization Is a Plausible Outcome of the New Washington Consensus
ABSTRACT A trend towards de‐dollarization of the global economy in which the US dollar ceases to be used as the world's reserve currency for international transactions confronts some of the existing structures of international economic law, built upon the rules set out by US‐led organizations like the WTO, the IMF, and the World Bank. This article will
David Collins
wiley +1 more source
Framework for Network Topology Generation and Traffic Prediction Analytics for Cyber Exercises
Today’s cyber-attacks have become increasingly sophisticated and diverse, targeting systems that hold sensitive information, creating the need for continuous cyber exercise and skill development for cyber professionals.
Dong-Wook Kim +6 more
doaj +1 more source
Infertility in science fiction as a consequence of warfare [PDF]
Warfare is an indissoluble aspect of humanity, and is an equally indissoluble part of mythology. Greek mythology is replete with strife between the gods themselves, allegories of human strife, and the most epic aspects were the succession myths, with the
Callus, Ivan +2 more
core

