Results 151 to 160 of about 233,719 (314)
A HYBRID ELLIPTIC CURVE AND DATA ENCRYPTION STANDARD ALGORITHM FOR SECURE DATA COMMUNICATION
n the rapidly evolving landscape of digital communication, ensuring data security remains a paramount concern. This research proposes a hybrid encryption technique that combines the strengths of Elliptic Curve Cryptography (ECC) and the Data Encryption ...
Samuel N. John +5 more
doaj
Abstract Globalization and climate change may be driving the spread of the quarantine fruit fly, Bactrocera carambolae, highlighting the need for ecofriendly control methods like the Sterile Insect Technique (SIT), which relies on releasing sterile males to reduce wild populations.
Kamoltip Laohakieat +2 more
wiley +1 more source
Teaching Through Hack, Play and Game-Design
Students engage most with complex problems when they learn to hack existing systems instead of building solutions from scratch. In my teaching, hacking means critically engaging with what already exists: repurposing, questioning, and reshaping ...
Sarit Youdelevich
doaj
Chromosome‐scale genome assembly of the South American fruit fly, Anastrepha fraterculus sp.1
Anastrepha fraterculus sp. 1 is a major fruit fly pest in Argentina, currently controlled through chemical treatments and traps. This study aims to enhance the genomic understanding of this species to support the development of sterile insect technique as well as the use of innovative technologies.
Máximo Rivarola +15 more
wiley +1 more source
Neoclassical development of genetic sexing strains for insect pest and disease vector control
The sterile insect technique has been effectively used for decades, and an important component is the availability of sex separation systems, in particular genetic sexing strains. Classical approaches, such as irradiation‐induced chromosomal translocations, have yielded stable strains for species like the Mediterranean fruit fly.
Giovanni Petrucci +5 more
wiley +1 more source
Abstract Police body‐worn cameras (BWCs) generate extensive video data on officer behavior, yet resource constraints mean that only a fraction of this footage is ever reviewed. Recent advancements in artificial intelligence (AI) present an opportunity to automate these reviews, potentially influencing police conduct.
Ian T. Adams +2 more
wiley +1 more source
“Coder,” “Activist,” “Hacker”: Aaron Swartz in the Italian, UK, U.S. and Technology Press
Aaron Swartz has been one of the pivotal characters in the recent history of the Internet. As an American activist, programmer, hacker and open access advocate, Swartz was involved in the launch of now established Web standards and services and has been ...
Philip Di Salvo
doaj
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
The Building That Teaches: Exploring Augmented Reality Affordances in Academic Incubators
ABSTRACT Efforts to enhance the experience of interior environments have led to experimentation with augmented reality (AR) technology to encourage users to participate in the built space using their mobile devices. To investigate the role of AR technologies in interior design experiences, we highlight the interdisciplinary design of a mobile AR ...
Leah Scolere, Laura Malinin
wiley +1 more source
Technology for Whom and for What? A Global South View of Tech Diplomacy
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley +1 more source

