Results 51 to 60 of about 3,214,265 (349)

Apply the principles of international humanitarian law to the use of autonomous weapons [PDF]

open access: yesالرافدین للحقوق
The increasing development of modern technology in the military field has led to the emergence of a new type of weapon based on artificial intelligence techniques, known as autonomous weapons, due to the many problems they raise.
Ahmed Al-Taie, Fathi Al Hayani
doaj   +1 more source

The earliest evidence for mechanically delivered projectile weapons in Europe

open access: yesNature Ecology & Evolution, 2019
Microscopic analysis of backed lithic pieces from the Uluzzian technocomplex (45–40 thousand yr ago) at Grotta del Cavallo (southern Italy) reveals their use as mechanically delivered projectile weapons, attributed to anatomically modern humans. Use-wear
Katsuhiro Sano   +16 more
semanticscholar   +1 more source

The impacts of biological invasions

open access: yesBiological Reviews, EarlyView.
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock   +42 more
wiley   +1 more source

Attitude to weapons and military culture of the Adyghe population in the Republic of Adygea

open access: yesКавказология
The article examines how modern Circassians living in the Republic of Adygea relate to the issues of carrying weapons, serving in the army, as well as elements of traditional military culture.
Murat Yu. Donezhuk
doaj   +1 more source

A RECONSTRUCTION OF THE GREEK-ROMAN REPEATING CATAPULT [PDF]

open access: yes, 2010
An “automatic” repeating weapon used by the Roman army is presented. Firstly a short description is shown of the working principle of the torsion motor that powered the Greek-Roman catapults.
F. Russo, ROSSI, CESARE
core   +1 more source

Waiting for a Release: The Expectation in Virtual Gaming Communities

open access: yesJournal of Consumer Behaviour, EarlyView.
ABSTRACT This study examines how virtual gaming communities influence and maintain player expectations before, during, and after a game's release. A mixed‐methods study was conducted, comprising a netnography followed by an experiment. First, a netnographic study was conducted over 12 months, tracking communities to understand player behavior and ...
Lucas Lopes Ferreira de Souza   +4 more
wiley   +1 more source

Modern weapons and military equipment for issue 2/2014

open access: yesVojnotehnički Glasnik, 2014
Armed with motorcycles as a relic of history, or ... Laser sight with 850 nanometer wavelength Microsoft "kinekt" on the Korean border guards Smart gun IDF buying aircraft "osprej" 
Nikola M. Ostojić
doaj   +1 more source

Pakistan’s Nuclear Weapons Program and Implications for US National Security. [PDF]

open access: yes, 2010
This article analyzes Pakistan’s nuclear weapons program and the characteristics of the environment in which the program is nested. These characteristics include Pakistan’s history of internal and external instability; nuclear saber rattling during ...
Tkacik, Michael
core   +2 more sources

National Identity Meaning and Attitudes Toward War, Peace, and the Future of Ukraine

open access: yesConflict Resolution Quarterly, EarlyView.
ABSTRACT The link between attitudes and social identity is complex, influencing perceptions, motivations, and actions. Social psychological research mainly focused on the role of attitude in identity formation, particularly in the contexts of social movements and collective action.
Karina V. Korostelina   +6 more
wiley   +1 more source

Jihad online : how do terrorists use the internet? [PDF]

open access: yes, 2016
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety among wide circles of the targeted population. This paper provides information about the ways terrorists are using the Internet. The threat of terrorism is
Cohen-Almagor, Raphael
core   +2 more sources

Home - About - Disclaimer - Privacy