Results 31 to 40 of about 293,537 (264)
The Law and the Human Target in Information Warfare: Cautions and Opportunities [PDF]
This bachelor thesis will explore how two traffic shaping mechanisms can help preserve battery power while retaining a certain Quality of Service (QoS) in an Android based application developed for crisis management. The implemented user-space mechanisms
Hall, Henning, Luckey, Christian
core +2 more sources
Efficient Encoding of the Traveling Salesperson Problem on a Quantum Computer
We propose an amplitude encoding of the traveling salesperson problem along with a method for calculating the cost function using a probability distribution obtained on a quantum computer.
John P. T. Stenger +5 more
doaj +1 more source
Selection Strategies for Flexible Pressure Sensor Electrode Materials Toward Ultrafast Response
This study reveals, for the first time, how the electrode–organic interface governs the temporal performance of flexible pressure sensors. By pairing high‐conductivity CVD PEDOT with commonly used metal electrodes, the authors demonstrate that interfacial energy alignment dictates microsecond‐scale response, providing a straightforward design strategy ...
Jinwook Baek +11 more
wiley +1 more source
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian +8 more
wiley +1 more source
Glass, historically valued for its purity and durability, has long inspired artists and societies. This article introduces the concept of “Archeo‐Inspiration”, drawing on cultural and historical contexts of glass to guide future material innovations.
Eva von Contzen +3 more
wiley +1 more source
A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core
Formation Control of Multi‐Agent System with Local Interaction and Artificial Potential Field
This article proposes a local interaction‐based formation control method for Multi‐Agent system, integrating consensus and leader‐follower strategies with a stress response mechanism—artificial potential field to reduce communication overhead and enable obstacle avoidance. Experimental results on triangular, square, and hexagonal formations confirm its
Luoyin Zhao +3 more
wiley +1 more source
This study reveals a hidden chemical weapon among calcareous‐shelled sessile organisms in the intertidal zone: the barnacle Balanus albicostatus releases a synergistic blend of palmitic acid and 1‐palmitoyl‐sn‐glycero‐3‐phosphocholine as the allelochemical with the inhibitory activity against attachment of the mussel Vignadula atrata, which may mediate
Zhuo Li +9 more
wiley +1 more source
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj +1 more source
Thoughts about a General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model [PDF]
The leading question of this paper is: “How would influence warfare (“iWar”) work and how can we simulate it?” The paper discusses foundational aspects of a theory and model of influence warfare by discussing a framework built along the DIME/PMESII/ASCOP
Kodalle, Thorsten +3 more
core

