Results 71 to 80 of about 1,412,017 (312)
True Believers at Law: National Security Agendas, the Regulation of Lawyers, and the Separation of Powers [PDF]
Ideological agendas distort the deliberation required for sound legal advice about national security. Elite government lawyers after September 11 advanced a theory at the expense of context, labeling legal constraints as lawfare against American ...
Margulies, Peter
core +3 more sources
Biofabrication aims at providing innovative technologies and tools for the fabrication of tissue‐like constructs for tissue engineering and regenerative medicine applications. By integrating multiple biofabrication technologies, such as 3D (bio) printing with fiber fabrication methods, it would be more realistic to reconstruct native tissue's ...
Waseem Kitana +2 more
wiley +1 more source
Neglected Dimensions of Global Security: The Global Health Risk Framework Commission [PDF]
The world has experienced global health crises ranging from novel influenzas (H5N1 and H1N1) and coronaviruses (SARS and MERS) to the Ebola and Zika viruses.
Gostin, Lawrence O. +2 more
core +1 more source
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
The digitalization of the high-tech economy is complicated due to several issues. One can mention non-synchrony and imbalance in the development of industrial enterprises and their integrations; changes in the elements and relations between enterprises ...
Tatyana Tolstykh +4 more
doaj +1 more source
The National Dialogue on the Quadrennial Homeland Security Review [PDF]
Six years after its creation, the Department of Homeland Security (DHS) undertook the first Quadrennial Homeland Security Review (QHSR) to inform the design and implementation of actions to ensure the safety of the United States and its citizens.
Beverly A. Cigler +3 more
core
An all‐in‐one analog AI accelerator is presented, enabling on‐chip training, weight retention, and long‐term inference acceleration. It leverages a BEOL‐integrated CMO/HfOx ReRAM array with low‐voltage operation (<1.5 V), multi‐bit capability over 32 states, low programming noise (10 nS), and near‐ideal weight transfer.
Donato Francesco Falcone +11 more
wiley +1 more source
Identity crime and misuse in Australia: results of the 2014 online survey [PDF]
Misuse of personal information lies at the heart of identity crime and continues to affect all sectors of the Australian community. Abstract To understand the trends associated with identity crime and misuse in Australia, the Australian Institute of ...
Rick Brown +2 more
core
Brexit is likely to hinder Britain’s national security strategy [PDF]
The decoupling of the EU from the UK’s security and defence strategy is a grave error of judgement. Madalina Dobrescu writes that it disregards the value of Britain’s EU membership in the context of relations with the US, European states and new powers ...
Dobrescu, Madalina
core
National Security Space Launch [PDF]
The United States Space Force’s National Security Space Launch (NSSL) program, formerly known as the Evolved Expendable Launch Vehicle (EELV) program, was first established in 1994 by President William J.
Zhang, Michelle
core

