Results 101 to 110 of about 10,182 (242)
Chromosome‐scale genome assembly of the South American fruit fly, Anastrepha fraterculus sp.1
Anastrepha fraterculus sp. 1 is a major fruit fly pest in Argentina, currently controlled through chemical treatments and traps. This study aims to enhance the genomic understanding of this species to support the development of sterile insect technique as well as the use of innovative technologies.
Máximo Rivarola +15 more
wiley +1 more source
Entrevista com Ian Hacking: (por Paul Kennedy e David Cayley)
Ian Hacking
doaj +1 more source
A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION
n the rapidly evolving landscape of digital communication, ensuring data security remains a paramount concern. This research proposes a hybrid encryption technique that combines the strengths of Elliptic Curve Cryptography (ECC) and the Data Encryption ...
Samuel N. John +5 more
doaj
Neoclassical development of genetic sexing strains for insect pest and disease vector control
The sterile insect technique has been effectively used for decades, and an important component is the availability of sex separation systems, in particular genetic sexing strains. Classical approaches, such as irradiation‐induced chromosomal translocations, have yielded stable strains for species like the Mediterranean fruit fly.
Giovanni Petrucci +5 more
wiley +1 more source
Teaching Through Hack, Play and Game-Design
Students engage most with complex problems when they learn to hack existing systems instead of building solutions from scratch. In my teaching, hacking means critically engaging with what already exists: repurposing, questioning, and reshaping ...
Sarit Youdelevich
doaj
Abstract Police body‐worn cameras (BWCs) generate extensive video data on officer behavior, yet resource constraints mean that only a fraction of this footage is ever reviewed. Recent advancements in artificial intelligence (AI) present an opportunity to automate these reviews, potentially influencing police conduct.
Ian T. Adams +2 more
wiley +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Technology for Whom and for What? A Global South View of Tech Diplomacy
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley +1 more source
“Coder,” “Activist,” “Hacker”: Aaron Swartz in the Italian, UK, U.S. and Technology Press
Aaron Swartz has been one of the pivotal characters in the recent history of the Internet. As an American activist, programmer, hacker and open access advocate, Swartz was involved in the launch of now established Web standards and services and has been ...
Philip Di Salvo
doaj

