Results 41 to 50 of about 672,495 (309)

Restructuring Sovereign Debt After NML v. Argentina [PDF]

open access: yes, 2017
The decade and a half of litigation that followed Argentina’s sovereign bond default in 2001 ended with a great disturbance in the Force. A new creditor weapon had been uncloaked: The prospect of a court injunction requiring the sovereign borrower to pay
Buchheit, Lee C., Gulati, G. Mitu
core   +2 more sources

Nuclear Disarmament without the Nuclear-Weapon States: The Nuclear Weapon Ban Treaty

open access: yesDaedalus, 2020
The 2017 Treaty on the Prohibition of Nuclear Weapons (tpnw) represents a daring act of self-empowerment: nuclear have-nots produced an international disarmament treaty without the involvement of the nuclear-weapon states or their allies.
Harald Müller, Carmen Wunderlich
semanticscholar   +1 more source

Under-actuated USV path following control under multiple constraints

open access: yesAIP Advances, 2022
The path following control of an under-actuated unmanned surface vehicle (USV) under the constraints of rudder angle, rudder velocity, and rudder response time in the disturbing environment is studied, and a cascaded path following control system based ...
Hongbin Wang   +4 more
doaj   +1 more source

Securities Regulation: Shareholder Derivative Actions Against Insiders Under Rule 10b-5 [PDF]

open access: yes, 1966
After a general examination of Rule 10b-5 in the context of its traditional application, this comment focuses on the recent developments concerning the rule\u27s function as a weapon for the enforcement of controlling insiders\u27 duties to their ...
Caidahl, Kenneth   +4 more
core   +4 more sources

Research on Encounter Probability Between a Supercavitating Vehicle and a Target Based on Path Planning

open access: yesIEEE Access
Supercavitating vehicles have received significant attention in military applications due to their high underwater speed. This paper aims to establish analytic models of the encounter probability between a supercavitating vehicle and its target in two ...
Yang Guang   +4 more
doaj   +1 more source

Application of ant colony and immune combined optimization algorithm in path planning of unmanned craft

open access: yesAIP Advances, 2022
The ant colony optimization (ACO) algorithm is improved and further integrated with the immune algorithm (IA) to address its problems, such as slow convergence, local optimum, and premature convergence in the path planning.
Hongbin Wang, Jianqiang Zhang, Jiao Dong
doaj   +1 more source

Multi-UAV Cooperative Air Combat Target Assignment Method Based on VNS-IBPSO in Complex Dynamic Environment

open access: yesInternational Journal of Aerospace Engineering
This paper investigates the threat assessment method and target assignment algorithm in multi-UAV cooperative air combat decision-making. To address the uncertainty and dynamic changes in multiple threat attributes and attribute information of UAV ...
Yiyuan Li   +4 more
doaj   +1 more source

Trade and Currency Weapons [PDF]

open access: yesSSRN Electronic Journal, 2018
AbstractThe debate on trade and currency wars has reemerged since the Global Financial Crisis. We study the two forms of noncooperative policies within a single framework. First, we compare the elasticity of trade flows to import tariffs and to the real exchange rate, based on product‐level data for 110 countries over the 1989–2013 period. We find that
Bénassy-Quéré, Agnès   +2 more
openaire   +8 more sources

"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]

open access: yes, 2013
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N.   +1 more
core  

Sibling violence: validating a two-factor model of severity in nonoffender populations [PDF]

open access: yes, 2016
Objective: Despite a recent surge of academic and clinical interest in sibling violence (SV), valid measures of severity have not been psychometrically established using non-offender populations. This study examined the factor-structure of intentional SV
Khan, Roxanne
core   +1 more source

Home - About - Disclaimer - Privacy