Gotowa bibliografia na temat „Digital weapon”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Digital weapon”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Digital weapon"
Czosseck, Christian, i Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict". International Journal of Cyber Warfare and Terrorism 2, nr 1 (styczeń 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.
Pełny tekst źródłaKim, Eungsu, i Kiyeol Ryu. "Design for Weapon Live Test Decision Support System Using Digital Twin Architecture". Journal of the Korea Institute of Military Science and Technology 25, nr 5 (5.10.2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.
Pełny tekst źródłaKim, Gakgyu, Kangkyun Jin, Yongju Cho i Kyoungchan Won. "Initial operational capability of future weapon systems and field test method using digital twin". Journal of Advances in Military Studies 5, nr 3 (31.12.2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.
Pełny tekst źródłaPuchnin, Aleksandr, i Pavel Minenko. "Digital crime weapons of the XXI century: object, means, tools". Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, nr 3 (3.10.2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.
Pełny tekst źródłaCHEN, Jie, Hao FANG, Bin XIN i Fang DENG. "Modeling, Optimization and Control in Ground-based Digital Weapon Systems". Acta Automatica Sinica 39, nr 7 (25.03.2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.
Pełny tekst źródłaMathew, Dr Alex, i Hannah Alex. "Cyberbiosecurity as the Foremost Biological Weapon to the Digital World". International Research Journal of Innovations in Engineering and Technology 06, nr 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.
Pełny tekst źródłaBadarna, Ibrahim, i Anat Gesser-Edelsburg. "Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel". Social Sciences 13, nr 3 (13.03.2024): 165. http://dx.doi.org/10.3390/socsci13030165.
Pełny tekst źródłaChatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar i Madhusudan Pal. "Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform". Defence Science Journal 69, nr 3 (30.04.2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.
Pełny tekst źródłaSundiev, Igor’ Yu, i Andrey B. Frolov. "Organizational and Digital Network Means of Terminal Destruction of Social Development". Economic Strategies 144, nr 3 (25.06.2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.
Pełny tekst źródłaPristiyono, Pristiyono, Juliana Juliana i Yudi Prayoga. "MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE". Jurnal Ekonomi Bisnis dan Kewirausahaan 11, nr 2 (31.08.2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.
Pełny tekst źródłaRozprawy doktorskie na temat "Digital weapon"
Setterberg, Petter. "Designing a Game Weapon : Start to Finish". Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-22548.
Pełny tekst źródłaChabaud, Laurent. "L'arme numérique : essai sur la dématérialisation des infractions pénales". Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.
Pełny tekst źródłaThe development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
Bowen, James M. "Physicochemical characterization of discrete weapons grade plutonium metal particles originating from the 1960 BOMARC incident". University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1384850163.
Pełny tekst źródłaShen, Teng-Yue, i 沈騰岳. "Air Defense Digital Battlefield and Weapon-Target Assignment Problem Research". Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36275011311297653968.
Pełny tekst źródła國防大學理工學院
資訊工程碩士班
102
This thesis aims to address the several problems in a distributed Joint Missile Defense System (JMDS) which includes weapon-target-assignment (WTA), dynamic simulation, distributed architecture, and the communication between firepowers and radars. We propose an objective function which pursues Facilities Protection Benefit (FPB), Intercept Benefit (IB) and Cost Benefit (CB). Also, we utilize improved rule-based greedy algorithm to complete WTA. For dynamic simulation, we apply Google Map to be a simulated battlefield and simulate some scenarios which could encounter in the real situations. We build a distributed architecture of the JFDS to simulate military operation units located at different place in battleground. These operation units can communicate each other. Through the technique of web-page, we can watch the process of engagement and review the result visually and intuitively so that commander can understand the quality of weapon-target-assignment result. At the simulation experiment, we design a scenario and record the result which includes the average quantity of our facility, the average execution time of the weapon-target-assignment, the average cost of firepower consumption, and the average percentage of target devastation. Regard to the experiment result, we can prove that it is better solution to solve WTA problem through the improved algorithm which we propose. At the same time, we also record the average utilization rate of firepower under the different algorithms. We can prove that it is better to enhance the utilization rate of all our deployed firepowers under the improved rule-based greedy algorithm. The better but high-cost firepower won’t be the first choice; instead, the others which equip middle-or-low level can also be exploited well. Finally, we can utilize the simulated result for deploying firepowers and adjusting position and quantity to find the best airspace defense management strategy.
Książki na temat "Digital weapon"
Dunnigan, James F. Digital Soldiers: The Evolution of High-tech Weaponry and Tomorrow's Brave New Battlefield. New York: St. Martin's Press, 1996.
Znajdź pełny tekst źródłaAutotestcon, 2000 (36th 2000 Anaheim California). 2000 IEEE Autotestcon proceedings: Autotestcon 2000 : IEEE Systems Readiness Technology Conference : Future sustainment for military and aerospace : September 18-21, 2000, Disneyland Hotel, Anaheim, California. Piscataway, New Jersey: IEEE, 2000.
Znajdź pełny tekst źródłaAutotestcon '99 (35th 1999 San Antonio, Tex.). 1999 IEEE Autotestcon proceedings: Autotestcon '99 : IEEE Systems Readiness Technology Conference : Test technology for the new millennium : August 30-September 2, 1999. Piscataway, New Jersey: IEEE, 1999.
Znajdź pełny tekst źródłaAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. Piscataway, N.J: IEEE, 2001.
Znajdź pełny tekst źródłaAutotestcon (38th 2002 Huntsville, Ala.). 2002 IEEE Autotestcon proceedings: [IEEE] Systems Readiness Technology Conference : The new Millennium challenge--transforming test : [October 16-17, 2002], Huntsville, Alabama. Piscataway, New Jersey: IEEE, 2002.
Znajdź pełny tekst źródła(2005), Anmin Chŏngchʻaek Pʻorŏm. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Kyŏnggi-do Pʻaju-si: Nanam Chʻulpʻan, 2005.
Znajdź pełny tekst źródłaZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group, 2015.
Znajdź pełny tekst źródłaZetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown, 2014.
Znajdź pełny tekst źródłaGalliott, Jai, Duncan MacIntosh i Jens David Ohlin, red. Lethal Autonomous Weapons. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197546048.001.0001.
Pełny tekst źródłaDunnigan, James F. Digital Soldiers. St. Martin's Press, 2001.
Znajdź pełny tekst źródłaCzęści książek na temat "Digital weapon"
Hüsing, Zita. "Hacking as a Weapon". W Regimes of Capital in the Post-Digital Age, 126–39. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372578-11.
Pełny tekst źródłaChaturvedi, Saumya, Vandana, Stuti Sharma i Anshika. "Digital Knowledge Ecosystem: A New Weapon to Achieve Sustainable Food Waste Management". W Sustainable Food Waste Management, 403–13. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8967-6_22.
Pełny tekst źródłaIneneji, Collins, i Mehmet Kusaf. "Weapon Detection Using Radar Cross Section (RCS) and Resnet50 Towards Improved Decision Accuracy". W Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 749–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_87.
Pełny tekst źródłaGlenny, Misha. "The Digital Revolution in a Historical Perspective". W Introduction to Digital Humanism, 47–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_4.
Pełny tekst źródłaTucker, Aaron. "The Soldier Interfaces on the Digitally Augmented Battlefield". W Virtual Weaponry, 69–105. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60198-4_3.
Pełny tekst źródłaTamburrini, Guglielmo. "Artificial Intelligence and Large-Scale Threats to Humanity". W Introduction to Digital Humanism, 241–54. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_16.
Pełny tekst źródłaTaddeo, Mariarosaria, i Alexander Blanchard. "A Comparative Analysis of the Definitions of Autonomous Weapons". W The 2022 Yearbook of the Digital Governance Research Group, 57–79. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_6.
Pełny tekst źródłaHughes, Andrew. "Weapons of Mass Consumption: Social and Digital Media in Political Campaigns". W Market Driven Political Advertising, 61–78. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77730-6_4.
Pełny tekst źródłaKendzierskyj, Stefan, i Hamid Jahankhani. "Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age". W Advanced Sciences and Technologies for Security Applications, 3–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_1.
Pełny tekst źródłaJaffe, Joshua. "Cyber Weapons and the Fifth Domain: Implications of Cyber Conflict on International Relations". W The 2022 Yearbook of the Digital Governance Research Group, 51–56. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_5.
Pełny tekst źródłaStreszczenia konferencji na temat "Digital weapon"
CARUSO, PAMELA, i ERIC SCHACHT. "Kinetic Energy Weapon Digital Emulation Center". W Aerospace Design Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-1071.
Pełny tekst źródłaMcCormick, Kirsten, Andy Cullington i Kirstin Rouse. "Artificial intelligence to assist weapon package selection for airborne weapon delivery". W Open Architecture/Open Business Model, Digital Engineering, Agile Software and Autonomy for the Internet of Military Things (IoMT) 2023, redaktor Raja Suresh. SPIE, 2023. http://dx.doi.org/10.1117/12.2659631.
Pełny tekst źródłaHamada, Mohamed Yousef. "Digital Thread and the Impact on Weapon System Acquisition Cost Growth". W AeroTech® Digital Summit. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2021. http://dx.doi.org/10.4271/2021-01-0026.
Pełny tekst źródłaVasalos, Averkios, Nikolaos Uzunoglu, Heung-Gyoon Ryu i Ioannis Vasalos. "Neural network target classification for Concealed Weapon radar detection". W 2013 18th International Conference on Digital Signal Processing (DSP). IEEE, 2013. http://dx.doi.org/10.1109/icdsp.2013.6622819.
Pełny tekst źródłaYoon, Kun Su, Jae Hyun Park, In Gyu Kim i Kwang Su Ryu. "New modeling algorithm for improving accuracy of weapon launch acceptability region". W 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655454.
Pełny tekst źródłaMa, Weijuan, Yuan Zhang, Jixin Duan, Baizhan Yang i Jianhua Huo. "Design of General and Digital Simulation Software for Close-In Weapon System". W 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5677170.
Pełny tekst źródłaWELTER, JAMES, i GEOFFREY BUTLER. "Multimedia digital database innovations and application to the analysis of weapon effects and performance". W Flight Simulation and Technologies. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-3592.
Pełny tekst źródłaKhichi, Manish, i Rajesh Kumar Yadav. "A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods". W 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580031.
Pełny tekst źródłaSchmidt, Timothy. "Lichten Award Paper: Automated Optical Rotor Blade Tip Clearance Tracking Using Artificial Intelligence Algorithms". W Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17633.
Pełny tekst źródłaG., Harold, Branden Sletteland i Max Taylor. "Future Vertical Lift Digital Backbone, Navigating Technology and Implementation Details". W Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16431.
Pełny tekst źródłaRaporty organizacyjne na temat "Digital weapon"
Caruso, Pamela W., i Eric N. Schacht. Kinetic Energy Weapon Digital Emulation Center. Fort Belvoir, VA: Defense Technical Information Center, luty 1992. http://dx.doi.org/10.21236/ada346441.
Pełny tekst źródłaDowns, Lawrence G., i Jr. Digital Data Warfare Using Malicious Computer Code as a Weapon. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 1995. http://dx.doi.org/10.21236/ada424872.
Pełny tekst źródłaPinchuk, O. P., i A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.
Pełny tekst źródła