Results 11 to 20 of about 406,956 (287)
SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki +1 more
doaj +1 more source
Violence and warfare in prehistoric Japan [PDF]
The origins and consequences of warfare or largescale intergroup violence have been subject of long debate. Based on exhaustive surveys of skeletal remains for prehistoric hunter-gatherers and agriculturists in Japan, the present study examines levels of
Arimatsu, Yui +5 more
core +1 more source
A new method is derived for finding the best positions in which to locate the sensors in a distributed sensor network in order to achieve a desired variation, or pattern, in spatial coverage over a specified domain.
Russell Costa, Thomas A. Wettergren
doaj +1 more source
License to Kill: An Analysis of the Legality of Fully Autonomous Drones in the Context of International Use of Force Law [PDF]
We live in a world of constant technological change; and with this change, comes unknown effects and consequences. This is even truer with weapons and warfare.
Figueroa, Andrew
core +2 more sources
Despite the numerous band selection (BS) algorithms reported in the field, most if not all have exhibited maximal accuracy when more spectral bands are utilized for classification.
Ruben Moya Torres +5 more
doaj +1 more source
Finite Element Modeling of K-Monel Bolts under Static Loading and Dynamic Shock Loading
The Naval Undersea Warfare Center has funded a project to investigate the accuracy of various bolt models used to represent actual shipboard bolted connections within an analytical shock survivability assessment.
Kevin Behan +3 more
doaj +1 more source
Fin Whale Song Patterns Shift Over Time in the Central North Pacific
Male fin whales sing by producing 20 Hz pulses in regular patterns of inter-note intervals. While singing, fin whales may also alternate the frequency ranges of their notes.
Tyler A. Helble +5 more
doaj +1 more source
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
This article describes the effect of high-power electromagnetic environments (HPEMs) on the operation of all basic elements of electrical power networks. Frequency bands are defined for the HPEM environments. Attention is focused particularly on directed
Libor Dražan +2 more
doaj +1 more source
Two visually meaningful correlation measures are proposed for comparing calculated and measured response histories. One is an error index which is a simplification of RSS (root-sum-square) error factor, and the other is an inequality index that is a ...
Benjamin Whang +2 more
doaj +1 more source

