Results 161 to 170 of about 18,368 (214)

Understanding the Autonomous Electric Vehicle Cyber Threat Landscape: A Focus on Infrastructure, Threats and Ontology‐Based Modelling

open access: yesEnergy Internet, EarlyView.
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi   +5 more
wiley   +1 more source

Multiterminal High‐Voltage Direct Current Projects: A Comprehensive Assessment and Future Prospects

open access: yesHigh Voltage, EarlyView.
ABSTRACT Multiterminal high‐voltage direct current (MT‐HVDC) systems are an important part of modern power systems, addressing the need for bulk power delivery and efficient renewable energy integration. This paper provides a comprehensive overview of recent advances in MT‐HVDC technology, including launched projects and ongoing initiatives.
Mohammad Hossein Mousavi   +3 more
wiley   +1 more source

Facilitating macrosystem biology with organismal‐scale airborne remote sensing: Challenges and opportunities

open access: yesFunctional Ecology, EarlyView.
Read the free Plain Language Summary for this article on the Journal blog. Abstract Emergent ecosystem properties, such as population and trait distributions, biodiversity and energy and water fluxes, occur because of the dynamic interactions of individuals in their environment.
Sarah J. Graves   +8 more
wiley   +1 more source

Queering Institutional Milestones in Elite Higher Education: Queer Perspectives on Princeton University and Coeducation (1960–1980)

open access: yesGender &History, EarlyView.
ABSTRACT A new archive of oral history interviews from LGBTQIA‐identified alumni, faculty and staff reveals the complex ways that queer and transgender students understood, experienced and remembered the long transition from single‐sex to coeducation at Princeton University.
Ezelle Sanford III   +2 more
wiley   +1 more source

‘From the Fields Into the Bars’: The Story of Israel's First Transgender Novel, The Cut (1977)

open access: yesGender &History, EarlyView.
ABSTRACT In 1977, an Israeli transgender woman, Judy Spotheim, published an autobiographical novel entitled The Cut. It describes the emergence of a trans community in the commercial‐sex areas of Tel Aviv‐Jaffa, hoping to humanise trans women (coccinelles). This article is the first to study the novel and present a biography of Spotheim.
Gil Engelstein, Iris Rachamimov
wiley   +1 more source

‘A Sort of Armed Argument’: Ireland's Civil War of Words

open access: yesHistory, EarlyView.
Abstract This article sets out to contribute to the study of the languages of European civil wars through outlining and analysing the deployment of language as a weapon by the opposing sides of the Irish independence movement that split over the terms of the Anglo‐Irish Treaty of December 1921.
DONAL Ó DRISCEOIL
wiley   +1 more source

The Coloniality of Data: Police Databases and the Rationalization of Surveillance from Colonial Vietnam to the Modern Carceral State

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT Tracing the early adoption of computer gang databases by the Los Angeles County Sheriff's Department and the Los Angeles Police Department in the 1980s to the deployment of computationally‐assisted surveillance during the Vietnam War, this paper uses a genealogical approach to compare surveillance technologies developed across the arc of ...
Christina Hughes
wiley   +1 more source

Affordances, dread, and online fraud: Exploring and advancing social learning theory in online contexts

open access: yesCriminology, EarlyView.
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley   +1 more source

Home - About - Disclaimer - Privacy