Results 121 to 130 of about 825,778 (325)

Review of millimeter‐wave and terahertz near‐field synthetic aperture radar imaging technology

open access: yesInfoScience, EarlyView.
Abstract This paper comprehensively reviews the development of millimeter‐wave (MMW) and terahertz (THz) near‐field imaging technologies, with an emphasis on the state of synthetic aperture radar (SAR)‐based imaging technologies. Near‐field imaging technologies are categorized into passive and active imaging modes, among which active imaging is favored
Qi Yang   +3 more
wiley   +1 more source

The Impact of Dual Use Controls on UK Science: Results from a Pilot Study [PDF]

open access: yes
Concerns about the proliferation of biological weapons and the threat posed by bioterrorism have assumed greater political prominence in recent years. In response, governments are actively attempting to frustrate the diffusion of technologies, relevant ...
Caitriona McLeish, Paul Nightingale
core  

Decoding temporal miRNA signatures of semen under in vitro exposure for forensic time since deposition estimation using machine learning‐driven modeling

open access: yesInterdisciplinary Medicine, EarlyView.
This study develops a novel miRNA‐based framework for estimating the time since deposition of semen stains, combining small RNA sequencing with machine learning. Time‐dependent miRNA modules were identified using Mfuzz clustering and WGCNA, followed by a multi‐stage feature selection pipeline that reduced 261 candidate miRNAs to a minimal 7‐miRNA panel.
Meiming Cai   +11 more
wiley   +1 more source

Influence of welding speed on the microstructure and mechanical properties of CMT+P WAAM-based 205C aluminum alloy

open access: yesReviews on Advanced Materials Science
To address the limited understanding of the influence of different welding speeds on the performance of thin-walled 205C aluminum alloy components fabricated via CMT+P dual-pass forming, a single-variable comparative study was conducted within the speed ...
Wang Zekai   +5 more
doaj   +1 more source

The Non‐Professional Virtues of the Hospice Volunteer

open access: yesJournal of Applied Philosophy, EarlyView.
ABSTRACT Volunteers have long played a significant role in hospice care. Much of the care volunteers provide consists of weekly hour‐long in‐home visits. Home‐visiting hospice volunteers are not professionals, nor are they strangers or intimates. Hospice volunteers will not typically face moral dilemmas, nor be called upon to make dramatic decisions ...
Michael B. Gill
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Non-strategic nuclear weapons: the next step in multilateral arms control [PDF]

open access: yes
This paper by Crispin Rovere and Kalman A Robertson addresses the many barriers to including tactical nuclear weapons in disarmament talks. It considers the difficulty of bringing other emerging powers such as China into the nuclear arms control equation.
Crispin Rovere, Kalman A Robertson
core  

The Nuclear Non-Proliferation Treaty\u27s Obligation to Transfer Peaceful Nuclear Energy Technology: One Proposal of a Technology [PDF]

open access: yes, 1995
This Essay discusses the technology transfer provisions of the Treaty on the Non-Proliferation of Nuclear Weapons (“NPT”) and describes the Radkowsky Thorium Reactor, which is being developed as a peaceful nuclear energy ...
Grae, Seth
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Optimization of jamming formation of USV offboard active decoy clusters based on an improved PSO algorithm

open access: yesDefence Technology
Offboard active decoys (OADs) can effectively jam monopulse radars. However, for missiles approaching from a particular direction and distance, the OAD should be placed at a specific location, posing high requirements for timing and deployment.
Zhaodong Wu, Yasong Luo, Shengliang Hu
doaj   +1 more source

Home - About - Disclaimer - Privacy