Добірка наукової літератури з теми "Digital weapon"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Digital weapon".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Digital weapon":

1

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (January 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding of conflict and warfare due to their different characteristics: cyber weapons. This article explores the crucial differences between the conventional weapon and cyber weapon domains, starting a debate as to what extent classical concepts and doctrines are applicable to cyberspace and cyber conflict. The authors propose a definition of cyber weapons being an instrument consisting primarily of data and knowledge, presenting them in the form of prepared and executed computer codes on or a sequence of user interactions with a vulnerable system. The authors describe a vulnerability-based model for cyber weapons and for cyber defence. This model is then applied to describe the relationship between cyber-capable actors (e.g. States). The proposed model clarifies important implications for cyber coalition-building and disarmament. Furthermore, it presents a general solution for the problem of the destruction of cyber weapons, i.e., in the context of cyber arms control.
2

Kim, Eungsu, and Kiyeol Ryu. "Design for Weapon Live Test Decision Support System Using Digital Twin Architecture." Journal of the Korea Institute of Military Science and Technology 25, no. 5 (October 5, 2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of the weapon live test during the phase of development is to provide essential information to decision makers that verify and validate the performance capabilities of weapons. Due to varying allocation and high variance of test resources with an increase in the weapon system’s capability, the test environment can get highly complex, which can lead to a decrease in the reliability of test results. This issue can be addressed by applying a decision support system that provides various timely information collected by resources during the test process. The decision support system can be designed by applying the concept of digital twins, that are defined as digital replicas of components, systems and processes. This paper describes a design methodology of the decision support system that consists of digital models and service functions using digital twin architecture. A case study illustrates the feasibility of the proposed methodology in supporting the weapon live test process.
3

Kim, Gakgyu, Kangkyun Jin, Yongju Cho, and Kyoungchan Won. "Initial operational capability of future weapon systems and field test method using digital twin." Journal of Advances in Military Studies 5, no. 3 (December 31, 2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The application of artificial-intelligence technology to weapon systems, is difficult to use in military applications for such reasons as killing or wounding problems, ethical problems, and field environment considerations; therefore, more-sophisticated techniques and development are required for testing and evaluation. There is an increasing demand for advanced weapon systems that incorporate new technologies, such as artificial intelligence, and for electrification, and a new paradigm that can confirm and verify the performance required for field operations is required. Therefore, through case studies on digital twins, a plan for field testing and initial operational capability in future weapon systems was developed. Five development directions were identified, including policies and systems, organization, establishment of infrastructure, and utilization plans, to establish a field test and initial operational capability. In addition, studies on economic ripple effects and cost-effectiveness were conducted based on application cases of digital twins in the private sector. An optimal method for users to safely verify performance by utilizing the digital twin method to overcome the difficulties of testing and evaluating weapon systems with new technologies from the time when the weapon system requirements are determined to mass production is proposed.
4

Puchnin, Aleksandr, and Pavel Minenko. "Digital crime weapons of the XXI century: object, means, tools." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, no. 3 (October 3, 2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The article is devoted to the definition of a new subject of crime - digital weapons, the analysis of the degree and nature of the public danger of acts committed with its use. The phenomenon of digital means, tools, objects of crimes that arose as a result of the penetration of information and telecommunication technologies into everyday life is investigated. An attempt was made to formulate new categories that define inaccurate behavior on the Internet and integrate them into the current legislation. The question is raised about considering digital weapons as a threat to the national security of the Russian Federation. The timeliness and social conditionality of the criminalization of the circulation of digital data used to commit crimes and the establishment of criminal liability for the commission of acts using digital weapons are substantiated, the main measures aimed at counteracting such crimes are proposed. The legal nature and basic principles of the functioning of information tools for committing crimes are investigated. The study considers arrays of inaccurate user accounts of information and telecommunication networks as an example of a digital weapon. The article raises the question of the need to criminalize certain digital technologies that form the tools of criminals in the digital environment. Taking into account the problems raised in the article, the authors formulated proposals for improving the current legislation in the form of a new norm of the special part of the Criminal Code of the Russian Federation.
5

CHEN, Jie, Hao FANG, Bin XIN, and Fang DENG. "Modeling, Optimization and Control in Ground-based Digital Weapon Systems." Acta Automatica Sinica 39, no. 7 (March 25, 2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Mathew, Dr Alex, and Hannah Alex. "Cyberbiosecurity as the Foremost Biological Weapon to the Digital World." International Research Journal of Innovations in Engineering and Technology 06, no. 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cyberbiosecurity has emerged as a new field combining cybersecurity and biosecurity. The convergence of cybersecurity and biosecurity can potentially impact the digital operations of enterprises in a variety of industries, including agriculture, manufacturing, and healthcare. This systematic review summarizes and synthesizes research on the increasing importance of cyber-biosecurity threats and the importance of cyber-biosecurity measures in combating the misuse of cyberspace and bioscience technology. The author performed three distinct searches through ProQuest, Web of Science, and MEDLINE databases. The author used keywords to identify 15 articles that met the systematic review’s purpose. Analysis of the 15 articles revealed that the intersection of current advancements in biosciences with conventional cyberspace security risks has promoted the awareness and discovery of threats in the cyberbiosecurity field. The author concludes that cybersecurity is the foremost biological weapon to the digital world when challenged by new technologies and security threats. As a result, cyberbiosecurity measures must safeguard the bioeconomy and address the possibility for or actual misuse of critical information, materials, and systems at the convergence of biosciences and cyberspace. Stakeholders interested in cyberbiosecurity outcomes need to be competent in its implementation.
7

Badarna, Ibrahim, and Anat Gesser-Edelsburg. "Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel." Social Sciences 13, no. 3 (March 13, 2024): 165. http://dx.doi.org/10.3390/socsci13030165.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Within the Arab community of Israel, the influence of masculine perceptions, violence, the carrying of weapons, and their subsequent use are growing concerns that significantly impact public safety. The omnipresence of social media further complicates this narrative, potentially reshaping traditional notions and behaviors associated with masculinity. This study endeavors to delve deep into the relationships between masculinity, violence, and weapon carrying and use and the role that social media plays in shaping these dynamics among Arab adolescent boys and young men in Israel. By employing a qualitative constructivist lens, the research integrated content analysis, digital ethnography, and rhetorical semiotic analysis. The participants included 40 Israeli Arab Muslim and Christian adolescent boys and young men. A recurrent theme was the belief in “Maktub”, signifying preordained events, pointing to a profound cultural relationship with fatalistic views on violence. Participants’ backgrounds in relation to violence influenced their stance on weapon carrying. There was a prevalent mistrust towards law enforcement. Social media’s role was pronounced, with genre preferences acting as indicators of violent inclinations. Culturally sensitive interventions are imperative, and it is essential to construct an early childhood educational program that includes positive male role models while collaborating with epistemic authorities.
8

Chatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar, and Madhusudan Pal. "Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform." Defence Science Journal 69, no. 3 (April 30, 2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The primary objective of the study was to assess the compatibility of multi calibre individual weapon system (MCIWS) with the shorter, medium and larger individual users of Indian Army. Three dynamic digital human models (DHM) 5thp, 50thp, 95thp army pooled (AP) population were considered to accommodate wide range (more than 90 per cent) of the army population for ergonomic analysis of the weapon system with the help of digital human modelling software Jack. Solid model of MCIWS which was in Parasolid file format X_T (*.x_t) was imported into NX5 (solid model design software) and subsequently converted to JT (*.jt) format. This solid model was later translated into Jack 5.0.1 environment. Standing, squatting and crawling with the weapon were adopted for the study. Angular deviations of important joints, posture prediction using OWAS, and comfort discomfort assessment using Dreyfus 3D method were carried out in the study. The result of the study revealed that the operation in squatting and crawling conditions may increase postural load on neck, shoulder and upper arm. The pistol grip size, shape and contour are acceptable for the taller population. Removal of corrugated gripping surface, reduction of grip diameter and space adjustment for gloves use will be effective for optimal use. The position and size of fore grip seemed suitable for the taller users. Sight system could be accessed by all three user populations. It is advised to avoid holding the weapon for long duration with hands to prevent overuse injury or undue fatigue.
9

Sundiev, Igor’ Yu, and Andrey B. Frolov. "Organizational and Digital Network Means of Terminal Destruction of Social Development." Economic Strategies 144, no. 3 (June 25, 2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
At the moment, there is a change in the universal attractors of the historical process; in this regard, a new management model is required, corresponding to the new “program requirements” of the attractor “from the future”. The former political and economic regulators have fulfilled their role, but the patterns of thinking developed over the centuries do not allow for any other means of “reset” than destruction. The article analyzes who, why, and by what means attempts to preserve the existing world order. As a tool of destruction, the actors of globalization have chosen ultra-effective digital network methods of cross-border impact — a hidden organizational weapon that allows, without destroying the infrastructure facilities necessary to meet vital needs, to block the development of society through the deformation of the motivational and need base of a person. In order to identify the hidden impact of organizational weapons, the authors propose to use a methodological “polarizing filter” — a normative ranking that allows us to determine the direction of various social phenomena as the results of “horizontal” or “vertical” regulation, leading to the limit of destruction or development.
10

Pristiyono, Pristiyono, Juliana Juliana, and Yudi Prayoga. "MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE." Jurnal Ekonomi Bisnis dan Kewirausahaan 11, no. 2 (August 31, 2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The financial and banking industry has implemented digitalization as a marketing weapon and realized industry 4.0. The purpose of this study was to determine the extent of the implementation of banking digitalization in the expansion areas. The population of this research is the customers registered at Bank Sinar Mas Rantauprapat in 2021 as many as 1445 people. Research using multivariate data should use the number of samples in the survey as many as 200 samples with purposive sampling technique. Smart PLS data analysis through the stages of convergent validity, discriminant, composite reliability, Cronbach's alpha and R-square. The results show that customer trust is very important in the business practice of the financial or banking industry, this is because customer trust is the most effective weapon in the banking service industry based on digital transformation as banking services will be able to increase customer satisfaction and even loyalty and attract new customers. Digital transformation in the banking world is an important phenomenon as access to the realization of customer-company interactions through information and communication technology, making it easier for companies to win the competition and become a competitive advantage for banking.

Дисертації з теми "Digital weapon":

1

Setterberg, Petter. "Designing a Game Weapon : Start to Finish." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-22548.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The workflow of different game modelling artists is explored, with the goal of creating a melee weapon designed for games. A low polygon weapon was created using the research into the most common components from professional workflows of creating game models. One of the goals for the paper was to obtain a greater understanding of professional workflows when creating models for games. Other goals were to utilize the research and design a finished game model from concept to end product.
2

Chabaud, Laurent. "L'arme numérique : essai sur la dématérialisation des infractions pénales." Electronic Thesis or Diss., Université de Montpellier (2022-....), 2023. http://www.theses.fr/2023UMOND043.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le développement d’Internet, et du numérique en général, a facilité la commission de bon nombre d’infractions et a fait son entrée dans la majorité des branches du droit pénal. Pourtant il reste une branche du droit pénal où le numérique n’a pas fait son entrée : l’atteinte à l’intégrité physique de la personne. Ce rejet, pourtant logique, ne pose-t-il pas question ? Le développement des objets connectés à Internet permet d’envisager que ces atteintes deviennent réalité. Il faut donc intégrer la possibilité de réaliser de telles atteintes au sein du Code pénal. La première partie propose d’étudier cette possibilité par un rapprochement entre les notions d’arme et de numérique pour créer la notion d’arme numérique. Si ces notions paraissent antinomiques, elles sont au contraire relativement proches. Leur intégration au sein du Code pénal permet de montrer qu’elles obéissent au même mécanisme : la sanction de l’usage d’un outil particulier, l’arme ou le numérique, pour réaliser l’infraction. Nous proposons donc un changement de paradigme dans l’analyse de l’arme pour rapprocher ces notions. Cette rethéorisation de l’arme autour de sa fonction, que nous appelons le mode de perpétration, permet une meilleure prise en compte de la dématérialisation des infractions. La seconde partie quant à elle, s’attache à dresser le régime de l’arme mode de perpétration pour intégrer l’arme numérique en permettant de renforcer l’efficience économique de la loi en matière de lutte contre la cybercriminalité. Cela permet notamment une prise en compte globale de la cybercriminalité en favorisant une analyse proactive plutôt que simplement réactive
The development of the Internet, and of digital technology in general, has facilitated the commission of a large number of offences, and has made its entry into most branches of criminal law. However, there is still one branch of criminal law where digital technology has not made its entry: offences against the physical integrity of the person. Doesn't this logical rejection raise questions? The development of objects connected to the Internet means that such attacks are becoming a reality. The possibility of such attacks must therefore be incorporated into the Penal Code. The first part of this paper proposes to explore this possibility by bringing together the notions of weapon and digital to create the notion of digital weapon. Although these notions may seem antinomic, they are in fact relatively close. Their integration into the penal code shows that they obey the same mechanism: sanctioning the use of a particular tool - a weapon or a digital device - to commit an offence. We therefore propose a paradigm shift in the analysis of the weapon to bring these notions closer together. This re-theorization of the weapon around its function, which we call the mode of perpetration, enables us to take better account of the dematerialization of offences. The second part sets out to extend the regime of the "mode of perpetration" weapon to include the digital weapon, thereby strengthening the economic efficiency of the law in the fight against cybercrime. In particular, this allows us to take a global approach to cybercrime, favoring proactive rather than merely reactive analysis
3

Bowen, James M. "Physicochemical characterization of discrete weapons grade plutonium metal particles originating from the 1960 BOMARC incident." University of Cincinnati / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1384850163.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Shen, Teng-Yue, and 沈騰岳. "Air Defense Digital Battlefield and Weapon-Target Assignment Problem Research." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/36275011311297653968.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
碩士
國防大學理工學院
資訊工程碩士班
102
This thesis aims to address the several problems in a distributed Joint Missile Defense System (JMDS) which includes weapon-target-assignment (WTA), dynamic simulation, distributed architecture, and the communication between firepowers and radars. We propose an objective function which pursues Facilities Protection Benefit (FPB), Intercept Benefit (IB) and Cost Benefit (CB). Also, we utilize improved rule-based greedy algorithm to complete WTA. For dynamic simulation, we apply Google Map to be a simulated battlefield and simulate some scenarios which could encounter in the real situations. We build a distributed architecture of the JFDS to simulate military operation units located at different place in battleground. These operation units can communicate each other. Through the technique of web-page, we can watch the process of engagement and review the result visually and intuitively so that commander can understand the quality of weapon-target-assignment result. At the simulation experiment, we design a scenario and record the result which includes the average quantity of our facility, the average execution time of the weapon-target-assignment, the average cost of firepower consumption, and the average percentage of target devastation. Regard to the experiment result, we can prove that it is better solution to solve WTA problem through the improved algorithm which we propose. At the same time, we also record the average utilization rate of firepower under the different algorithms. We can prove that it is better to enhance the utilization rate of all our deployed firepowers under the improved rule-based greedy algorithm. The better but high-cost firepower won’t be the first choice; instead, the others which equip middle-or-low level can also be exploited well. Finally, we can utilize the simulated result for deploying firepowers and adjusting position and quantity to find the best airspace defense management strategy.

Книги з теми "Digital weapon":

1

Dunnigan, James F. Digital Soldiers: The Evolution of High-tech Weaponry and Tomorrow's Brave New Battlefield. New York: St. Martin's Press, 1996.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Autotestcon, 2000 (36th 2000 Anaheim California). 2000 IEEE Autotestcon proceedings: Autotestcon 2000 : IEEE Systems Readiness Technology Conference : Future sustainment for military and aerospace : September 18-21, 2000, Disneyland Hotel, Anaheim, California. Piscataway, New Jersey: IEEE, 2000.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Autotestcon '99 (35th 1999 San Antonio, Tex.). 1999 IEEE Autotestcon proceedings: Autotestcon '99 : IEEE Systems Readiness Technology Conference : Test technology for the new millennium : August 30-September 2, 1999. Piscataway, New Jersey: IEEE, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. Piscataway, N.J: IEEE, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Autotestcon (38th 2002 Huntsville, Ala.). 2002 IEEE Autotestcon proceedings: [IEEE] Systems Readiness Technology Conference : The new Millennium challenge--transforming test : [October 16-17, 2002], Huntsville, Alabama. Piscataway, New Jersey: IEEE, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

(2005), Anmin Chŏngchʻaek Pʻorŏm. Hanʼguk hyŏndaesa: Chinsil kwa haesŏk. Kyŏnggi-do Pʻaju-si: Nanam Chʻulpʻan, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown Publishing Group, 2015.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Zetter, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Crown, 2014.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Galliott, Jai, Duncan MacIntosh, and Jens David Ohlin, eds. Lethal Autonomous Weapons. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197546048.001.0001.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The question of whether new rules or regulations are required to govern, restrict, or even prohibit the use of autonomous weapons systems has been the subject of debate for the better part of a decade. Despite the claims of advocacy groups, the way ahead remains unclear since the international community has yet to agree on a specific definition of Lethal Autonomous Weapons Systems, and the great powers have largely refused to support an effective ban. In this vacuum, the public has been presented with a heavily one-sided view of “Killer Robots.” This volume presents a more nuanced approach to autonomous weapon systems that recognizes the need to progress beyond a discourse framed by the Terminator and HAL 9000. Reshaping the discussion around this emerging military innovation requires a new line of thought and a willingness to challenge the orthodoxy. Lethal Autonomous Weapons: Re-Examining the Law and Ethics of Robotic Warfare therefore focuses on exploring the moral and legal issues associated with the design, development, and deployment of lethal autonomous weapons. In this volume, we bring together some of the most prominent academics and academic-practitioners in the lethal autonomous weapons space and seek to return some balance to the debate. As part of this effort, we recognize that society needs to invest in hard conversations that tackle the ethics, morality, and law of these new digital technologies and understand the human role in their creation and operation.
10

Dunnigan, James F. Digital Soldiers. St. Martin's Press, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Digital weapon":

1

Hüsing, Zita. "Hacking as a Weapon." In Regimes of Capital in the Post-Digital Age, 126–39. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003372578-11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Chaturvedi, Saumya, Vandana, Stuti Sharma, and Anshika. "Digital Knowledge Ecosystem: A New Weapon to Achieve Sustainable Food Waste Management." In Sustainable Food Waste Management, 403–13. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8967-6_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Ineneji, Collins, and Mehmet Kusaf. "Weapon Detection Using Radar Cross Section (RCS) and Resnet50 Towards Improved Decision Accuracy." In Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation, 749–56. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-85626-7_87.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Glenny, Misha. "The Digital Revolution in a Historical Perspective." In Introduction to Digital Humanism, 47–63. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThe coincidence and interaction between political and technological revolutions have resulted in epoch-changing social, political, and economic developments on three occasions over the past 500 years: the Renaissance and Reformation with the invention of print and weapons technology, the French and American revolutions with the industrial revolution, and the collapse of communism with the information revolution. Each boast their specific attributes but follow a pattern which can assist us in understanding the implications of today’s technologies for our social and political structures.
5

Tucker, Aaron. "The Soldier Interfaces on the Digitally Augmented Battlefield." In Virtual Weaponry, 69–105. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60198-4_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tamburrini, Guglielmo. "Artificial Intelligence and Large-Scale Threats to Humanity." In Introduction to Digital Humanism, 241–54. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-45304-5_16.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThis chapter provides a concise introduction to the impact of artificial intelligence (AI) on major man-made, large-scale threats to humanity: the risk of nuclear war and the climate crisis. AI has a sizable carbon footprint. But the AI research and commercial communities may adopt good practices to reduce this footprint and to develop AI applications supporting climate warming mitigation. It has been suggested that AI systems may improve nuclear weapons command and control. But AI scientists must raise awareness about the downsides of this proposal and the potentially negative impact of AI on nuclear deterrence. Coherent with the inspiring principles of Digital Humanism, ethical and political responsibilities are identified to reduce AI’s role in the buildup of these man-made, large-scale threats to humanity.
7

Taddeo, Mariarosaria, and Alexander Blanchard. "A Comparative Analysis of the Definitions of Autonomous Weapons." In The 2022 Yearbook of the Digital Governance Research Group, 57–79. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hughes, Andrew. "Weapons of Mass Consumption: Social and Digital Media in Political Campaigns." In Market Driven Political Advertising, 61–78. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-77730-6_4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Kendzierskyj, Stefan, and Hamid Jahankhani. "Critical National Infrastructure, C4ISR and Cyber Weapons in the Digital Age." In Advanced Sciences and Technologies for Security Applications, 3–21. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-35746-7_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Jaffe, Joshua. "Cyber Weapons and the Fifth Domain: Implications of Cyber Conflict on International Relations." In The 2022 Yearbook of the Digital Governance Research Group, 51–56. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28678-0_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Digital weapon":

1

CARUSO, PAMELA, and ERIC SCHACHT. "Kinetic Energy Weapon Digital Emulation Center." In Aerospace Design Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1992. http://dx.doi.org/10.2514/6.1992-1071.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

McCormick, Kirsten, Andy Cullington, and Kirstin Rouse. "Artificial intelligence to assist weapon package selection for airborne weapon delivery." In Open Architecture/Open Business Model, Digital Engineering, Agile Software and Autonomy for the Internet of Military Things (IoMT) 2023, edited by Raja Suresh. SPIE, 2023. http://dx.doi.org/10.1117/12.2659631.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hamada, Mohamed Yousef. "Digital Thread and the Impact on Weapon System Acquisition Cost Growth." In AeroTech® Digital Summit. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2021. http://dx.doi.org/10.4271/2021-01-0026.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Vasalos, Averkios, Nikolaos Uzunoglu, Heung-Gyoon Ryu, and Ioannis Vasalos. "Neural network target classification for Concealed Weapon radar detection." In 2013 18th International Conference on Digital Signal Processing (DSP). IEEE, 2013. http://dx.doi.org/10.1109/icdsp.2013.6622819.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Yoon, Kun Su, Jae Hyun Park, In Gyu Kim, and Kwang Su Ryu. "New modeling algorithm for improving accuracy of weapon launch acceptability region." In 2010 IEEE/AIAA 29th Digital Avionics Systems Conference (DASC). IEEE, 2010. http://dx.doi.org/10.1109/dasc.2010.5655454.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ma, Weijuan, Yuan Zhang, Jixin Duan, Baizhan Yang, and Jianhua Huo. "Design of General and Digital Simulation Software for Close-In Weapon System." In 2010 International Conference on Computational Intelligence and Software Engineering (CiSE). IEEE, 2010. http://dx.doi.org/10.1109/cise.2010.5677170.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

WELTER, JAMES, and GEOFFREY BUTLER. "Multimedia digital database innovations and application to the analysis of weapon effects and performance." In Flight Simulation and Technologies. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-3592.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Khichi, Manish, and Rajesh Kumar Yadav. "A Threat of Deepfakes as a Weapon on Digital Platform and their Detection Methods." In 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2021. http://dx.doi.org/10.1109/icccnt51525.2021.9580031.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Schmidt, Timothy. "Lichten Award Paper: Automated Optical Rotor Blade Tip Clearance Tracking Using Artificial Intelligence Algorithms." In Vertical Flight Society 78th Annual Forum & Technology Display. The Vertical Flight Society, 2022. http://dx.doi.org/10.4050/f-0078-2022-17633.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Analytical methods used to determine weapon projectile trajectory relative to helicopter rotor blade tips during most conceivable maneuvers tend to provide insufficient safety margins to accurately define a safe firing envelope. The flight test team at Sikorsky, a Lockheed Martin Company, was given the challenging task of measuring the weaponto-rotor-blade-tip clearance during these maneuvers. The first-generation methodology was entirely manual using a flat vertical projection screen tangentially aligned with the rotor tip path plane to visualize the intersection between the weapon's projectile and blade tip path. While the first flight test program utilizing this technique was successful in its own right, by the time a second opportune flight test program was initiated, software tools had been developed to help automate the process, drastically increasing the amount of data that could be used to correlate with other aircraft state parameters. During the data processing, a training set was created that was used to build an Artificial Intelligence (AI) capable of performing the same task while bringing the processing time down from 4-5 frames per second (fps) to 130 fps. This enables real-time AI inference to be taken from digital video cameras on the helicopter and clearance measurements real-time processed and recorded to the instrumentation system or displayed for the pilot's awareness.
10

G., Harold, Branden Sletteland, and Max Taylor. "Future Vertical Lift Digital Backbone, Navigating Technology and Implementation Details." In Vertical Flight Society 76th Annual Forum & Technology Display. The Vertical Flight Society, 2020. http://dx.doi.org/10.4050/f-0076-2020-16431.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The current US DoD has recognized that their asymmetric advantage is eroding1. Adversaries have had over 25 years to counter the US playbook and weapon systems (Ref. [1]). The US Army Future Vertical Lift (FVL) programs have identified several key tenets that their airborne weapon systems need to ensure they maintain asymmetric advantage. (1) New and upgraded mission capabilities of their airborne platforms need to get to the field faster (Ref. [2]). One of the current roadblocks to achieving this is the extensive full-system regression testing that ends up being required when there are mission system changes (Ref. [3]). (2) More competition is needed to help generate "quicker, better, faster" capabilities (Ref. [4]). "Vendor lock" inherent in current system designs hinders the speed at which technology advances (Ref. [4, 5]). (3) Improved portability of mission capability across the FVL and enduring fleet (Ref. [6, 7]). The ability to more easily reuse technology will help maintain advantage by eliminating the time needed to develop platform specific solutions (Ref. [4, 6]). The request for Modular Open System Architecture (MOSA) solutions has been a practice to try to address the items above (Ref. [8]). Most air vehicle and mission system providers are today providing MOSA solutions but the required benefits have not yet been fully realized. MOSA standards as they exist today do a very good job of identifying electronics hardware and software architectures. However, they fall short on physical aircraft integration and consistency in architecture among aircraft systems. Minimizing aircraft wiring and structural modifications, increasing speed to fielding, and portability among multiple systems types are all part of integrating highly MOSA compliant solutions. The US Army FVL programs have required a "digital backbone" (Ref. [7, 9, 10]) to address these integration issues and ensure that they can maintain asymmetric advantage. Unique requirements affecting the digital backbone include: - Power and power distribution (Ref. [9]) - Thermal management (Ref. [9, 11]) - Packaging and installation (Ref. [9]) - Air Vehicle data distribution (Ref. [9]) - Mission System data distribution (Ref. [9]) - Isolation of air vehicle and mission system (Ref. [9]) This paper will provide an introduction to the envisioned digital backbone for US Army, Future Vertical Lift aircraft. The paper will also offer discussion of digital backbone impacts on aircraft and avionics size, weight, power and cost, as well as technology considerations to address interoperability, safety, security, qualification, and accommodations for new, as well as, legacy avionics technology.

Звіти організацій з теми "Digital weapon":

1

Caruso, Pamela W., and Eric N. Schacht. Kinetic Energy Weapon Digital Emulation Center. Fort Belvoir, VA: Defense Technical Information Center, February 1992. http://dx.doi.org/10.21236/ada346441.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Downs, Lawrence G., and Jr. Digital Data Warfare Using Malicious Computer Code as a Weapon. Fort Belvoir, VA: Defense Technical Information Center, April 1995. http://dx.doi.org/10.21236/ada424872.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Pinchuk, O. P., and A. A. Prokopenko. Model of a computer-orient-ed methodological system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of qualification improvement. Національна академія Державної прикордонної служби України імені Б. Хмельницького, 2023. http://dx.doi.org/10.33407/lib.naes.736836.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Pedagogical modeling of modern educational environments remains an urgent task of educational sciences. Research on the formation and development of digital competence of specialists, although they have common features, differ and acquire characteristic features depending on the field of application. This is due to the focus on mastering specific professional skills and increasing the professional level. We found out that, compared to the social and humanitarian sphere and medicine, the development of digital competence of specialists in the military and defense industry is little discussed in scientific sources. The development of digital competence of military personnel, in particular military management officers, is an urgent problem that requires an immediate solution. On the one hand, the armed aggression of the Russian Federation adds to the criticality of the situation, on the other hand, scientific and technical progress and, as a result, the appearance of new types of weapons and the complexity of digital tools in the environments of military specialists. Scientific approaches and conceptual principles regarding the formation of digital competence of the Armed Forces of Ukraine and NATO member countries are described. Problems, contradictions and trends in the development of digital education of military specialists in the system of professional development are singled out. The article clarifies the concept of “digital competence of military command officers” of the Armed Forces of Ukraine. The authors developed and substantiated a theoretical model of a computer-oriented methodical system for the development of digital competence of officers of the military administration of the Armed Forces of Ukraine in the system of professional development, which is presented in an informative scheme with a description of individual modules combined into conceptual, target, content-methodical, procedural, technological and effective blocks. The built model ensures systematicity and consistency of the educational process in the digital educational environment of higher military education institutions for the development of digital competencies of military management officers. The technological unit contains a variety of software for training and training. In particular, specialized computer programs and multimedia guides. In the content-methodical block, among other things, the following modules are presented: cloud services; information-didactic and educational-methodical learning tools, multimedia objects, VR/AR tools, AI elements that allow selection of existing ones or creation of new learning materials; Training Course; diagnostic tools, etc. The prospect is the verification of the developed model during distance training.

До бібліографії