Results 81 to 90 of about 528,199 (384)

Bi-objective trail-planning for a robot team orienteering in a hazardous environment [PDF]

open access: yesPeerJ Computer Science
Consider a team of mobile (aerial, ground, or aquatic) robots for orienteering in a hazardous environment. Modeling the environment as a directed graph, each arc is labeled with a probability that a robot will survive upon traversing it, and each node is
Cory M. Simon   +3 more
doaj   +2 more sources

Informational Warfare [PDF]

open access: yes, 2002
Recent empirical and theoretical work suggests that reputation was an important mediator of access to resources in ancestral human environments. Reputations were built and maintained by the collection, analysis, and dissemination of information about ...
Hagen, Edward H., Hess, Nicole C.
core  

Return and Volatility Spillovers Among Major Cotton Markets

open access: yesAgribusiness, EarlyView.
ABSTRACT This study explores return and volatility transmission among major cotton markets. Several events have disrupted cotton supply and demand in recent years, leading to heightened price volatility and significant shifts in market interconnections.
Susmitha Kalli   +3 more
wiley   +1 more source

The Alt-Right and Global Information Warfare [PDF]

open access: yes, 2019
The Alt-Right is a neo-fascist white supremacist movement that is involved in violent extremism and shows signs of engagement in extensive disinformation campaigns.
Bevensee, Emmi, Ross, Alexander Reid
core   +3 more sources

Assessing the Impact of Promotions on Consumer Purchasing Behavior During Crises

open access: yesAgribusiness, EarlyView.
ABSTRACT Understanding how households modify their food expenditure decisions during times of crisis is essential because consumer purchasing behavior frequently changes during these times. This study looks at these behavioral shifts during the COVID‐19 pandemic, concentrating on how price sensitivity and response to sales promotions changed over the ...
Wafa Mehaba, José María Gil
wiley   +1 more source

Efficient Encoding of the Traveling Salesperson Problem on a Quantum Computer

open access: yesQuantum Reports
We propose an amplitude encoding of the traveling salesperson problem along with a method for calculating the cost function using a probability distribution obtained on a quantum computer.
John P. T. Stenger   +5 more
doaj   +1 more source

The Technology of Terror: Accounting for the Strategic Use of Terrorism [PDF]

open access: yes
To comprehend why a group would intentionally target civilians, we need to understand why other groups do not. In this chapter, we argue that disgruntled groups face three main choices when addressing their dissatisfaction: suffering a disadvantageous ...
Christopher K. Butler, Scott Gates
core  

Now the wars are over: The past, present and future of Scottish battlefields [PDF]

open access: yes, 2010
Battlefield archaeology has provided a new way of appreciating historic battlefields. This paper provides a summary of the long history of warfare and conflict in Scotland which has given rise to a large number of battlefield sites.
C Duffy   +23 more
core   +1 more source

A Survey of Adversarial Machine Learning in Cyber Warfare

open access: yesDefence Science Journal, 2018
The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare.
Vasisht Duddu
semanticscholar   +1 more source

Real‐Time and Rapid Dynamic Missile Identification Utilizing a TiOx Memristor Array

open access: yesAdvanced Intelligent Systems, EarlyView.
Real‐time missile target identification is demonstrated using an artificial intelligence model based on step‐weighted long–short‐term memory networks and a TiOx memristor array. The approach classifies five projectile types with enhanced early‐stage prediction through data augmentation and custom training strategies. Achieving 94.4% accuracy, the model
Mingyu Kim, Gwanyeong Park, Gunuk Wang
wiley   +1 more source

Home - About - Disclaimer - Privacy