Results 51 to 60 of about 3,545,317 (368)

Les Chinois d’outre-mer des Tchou à Deng Xiaoping : des origines historiques et géographiques d'un phénomène migratoire plus que millénaire

open access: yesCybergeo, 2000
The Chinese Overseas form what one estimates to be the world's wealthiest diaspora. They progressively settled throughout the world for more than fifteen centuries, a migratory phenomenon still unmatched.
Pierre-Arnaud Chouvy
doaj   +1 more source

Recent Advances in Decoupling Strategies for Soft Sensors

open access: yesAdvanced Science, EarlyView.
This review provides an overview of recent advances in decoupling strategies for soft sensors. It summarizes single‐modal sensors that are insensitive to stretching, bending, crosstalk, and other environmental interferences, and highlights emerging multimodal decoupling methods enabled by spatiotemporal information and machine learning.
Yangbo Yuan   +4 more
wiley   +1 more source

Decembrists Exonerated by Investigative Commission: Lieutenant Colonel I. A. Arsenyev

open access: yesНаучный диалог
This article examines the Decembrists who were exonerated by the official investigation and found not guilty of involvement in the secret societies. This aspect of the Decembrist movement remains largely understudied in the historiography.
P. V. Ilyin
doaj   +1 more source

Secret Societies in Japan and Preparation for the Russo-Japanese War (1904-1905) [PDF]

open access: yesDiacronie. Studi di Storia Contemporanea, 2016
The Amur Society (often falsely translated as Black Dragon Society) was a resource for the Japanese military with regard to the preparation of the Russo-Japanese War, but the real impact, as stated in the later publications by members of the society ...
Frank Jacob
doaj  

Highly Secure In Vivo DNA Data Storage Driven by Genomic Dynamics

open access: yesAdvanced Science, EarlyView.
Integrated computational‐biological programming enables secure in vivo data storage by generating code tables from either genomes or gene regulatory networks, expanding the encryption key space by over 100 orders of magnitude. Storing code tables within synthetic genes, genomes, or gene regulatory networks adds an additional layer of security by ...
Jiaxin Xu   +9 more
wiley   +1 more source

The lives of others: an interactive installation [PDF]

open access: yes, 2020
“The lives of others” is an interactive audiovisual installation that is based on a voyeuristic approach of the binomial inside / outside and private / public, between the finished product presentable to the public and the mechanism that generates it ...
A.Robotics   +5 more
core   +1 more source

Multi‐Dimensional Acoustic Cascaded Holographic Encryption with Instantaneous Visual Decryption via Particle Manipulation

open access: yesAdvanced Science, EarlyView.
Acoustic holograms act as key tools for information encryption, yet current schemes limit encryption dimensionality/security and require time‐consuming decryption. A compact device integrates multi‐dimensional cascaded acoustic holography with particle manipulation, employs extra secret keys, enables rapid decryption, and is validated via 1D/2D/3D ...
Qin Lin   +8 more
wiley   +1 more source

‘Turkeys Cannot Vote for Christmas’: Why Epistemic Disobedience in an Anti‐Black World Matters

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Never in the history of global coloniality has the idea of epistemic disobedience been as important as in the 21st century. This is not only because the struggle for decolonisation has shifted from physical confrontation between the coloniser and the colonised into a battle of ideas but also because the former has deployed the idea of ...
Morgan Ndlovu
wiley   +1 more source

Gnosticism and esotericism: an example from Russian new religiosity

open access: yesScripta Instituti Donneriani Aboensis, 2008
Time and again, the terms gnosticism and esotericism appear in connection with one another. Most esoteric teachings, for example, draw on the higher knowledge of the secrets of nature or deity.
Vadim Zhdanov
doaj   +1 more source

The anatomy of Russian information warfare. The Crimean operation, a case study. OSW Point of View Number 42, May 2014 [PDF]

open access: yes, 2014
The Crimean operation has served as an occasion for Russia to demonstrate to the entire world the capabilities and the potential of information warfare.
Darczewska, Jolanta
core  

Home - About - Disclaimer - Privacy