To see the other types of publications on this topic, follow the link: Digital weapon.

Journal articles on the topic 'Digital weapon'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital weapon.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.

Full text
Abstract:
Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding of conflict and warfare due to their different characteristics: cyber weapons. This article explores the crucial differences between the conventional weapon and cyber weapon domains, starting a debate as
APA, Harvard, Vancouver, ISO, and other styles
2

Barbosa-Santillán, Liliana Ibeth, Bertha Patricia Guzman-Velazquez, Ma Teresa Orozco-Aguilera, and Leticia Flores-Pulido. "Unraveling Cyberbullying Dynamis: A Computational Framework Empowered by Artificial Intelligence." Information 16, no. 2 (2025): 80. https://doi.org/10.3390/info16020080.

Full text
Abstract:
Cyberbullying, which manifests in various forms, is a growing challenge on social media, mainly when it involves threats of violence through images, especially those featuring weapons. This study introduces a computational framework to identify such content using convolutional neural networks of weapon-related images. By integrating artificial intelligence techniques with image analysis, our model detects visual patterns associated with violent threats, creating safer digital environments. The development of this work involved analyzing images depicting scenes with weapons carried by children
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Eungsu, and Kiyeol Ryu. "Design for Weapon Live Test Decision Support System Using Digital Twin Architecture." Journal of the Korea Institute of Military Science and Technology 25, no. 5 (2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.

Full text
Abstract:
The purpose of the weapon live test during the phase of development is to provide essential information to decision makers that verify and validate the performance capabilities of weapons. Due to varying allocation and high variance of test resources with an increase in the weapon system’s capability, the test environment can get highly complex, which can lead to a decrease in the reliability of test results. This issue can be addressed by applying a decision support system that provides various timely information collected by resources during the test process. The decision support system can
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Gakgyu, Kangkyun Jin, Yongju Cho, and Kyoungchan Won. "Initial operational capability of future weapon systems and field test method using digital twin." Journal of Advances in Military Studies 5, no. 3 (2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.

Full text
Abstract:
The application of artificial-intelligence technology to weapon systems, is difficult to use in military applications for such reasons as killing or wounding problems, ethical problems, and field environment considerations; therefore, more-sophisticated techniques and development are required for testing and evaluation. There is an increasing demand for advanced weapon systems that incorporate new technologies, such as artificial intelligence, and for electrification, and a new paradigm that can confirm and verify the performance required for field operations is required. Therefore, through ca
APA, Harvard, Vancouver, ISO, and other styles
5

Savushkina, Marina A. "Deepfake as a digital weapon of hybrid warfare." Herald of Omsk University 29, no. 4 (2024): 45. https://doi.org/10.24147/1812-3996.2024.4.45-54.

Full text
Abstract:
Deepfake is analyzed as a phenomenon of hybrid existence, its essence, as well as the features of its use as a digital weapon in a modern hybrid war. The terminological problem of using the Anglicism “deepfake” in Russian-language scientific research is considered; the need for mandatory labeling of content generated by neural networks in order to reduce the criminogenic potential of deep synthesis technology is substantiated. The active use of deepfakes in political communication actualizes the problem of trust in any information, the resolution of which is facilitated by the formation of the
APA, Harvard, Vancouver, ISO, and other styles
6

Puchnin, Aleksandr, and Pavel Minenko. "Digital crime weapons of the XXI century: object, means, tools." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, no. 3 (2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.

Full text
Abstract:
The article is devoted to the definition of a new subject of crime - digital weapons, the analysis of the degree and nature of the public danger of acts committed with its use. The phenomenon of digital means, tools, objects of crimes that arose as a result of the penetration of information and telecommunication technologies into everyday life is investigated. An attempt was made to formulate new categories that define inaccurate behavior on the Internet and integrate them into the current legislation. The question is raised about considering digital weapons as a threat to the national securit
APA, Harvard, Vancouver, ISO, and other styles
7

Zhilkin, M. G., and A. Y. Popov. "Legal gaps and threats to public safety from free circulation of deactivated weapons using digital technologies: ways to improve criminal legislation." Proceedings of Southwest State University. Series: History and Law 14, no. 6 (2025): 171–86. https://doi.org/10.21869/2223-1501-2024-14-6-171-186.

Full text
Abstract:
Relevance. Current weapons legislation of the Russian Federation does not take into account the impact of rapidly developing digital technologies on illegal arms trafficking. Deactivated weapons are freely sold on the Internet without the need for licensing, which creates legal gaps. Combined with the availability of information on weapon conversion and the availability of specialized components, these weapons can be easily modified to fire live ammunition, posing a serious threat to public safety.Purpose: to study is to study the public danger of free circulation of deactivated weapons using
APA, Harvard, Vancouver, ISO, and other styles
8

Bhemavarapu, Sai Varun Reddy, and Agathamudi Vikram Naidu. "INVESTIGATING A NATION-SPONSORED CYBER ATTACK ON CRITICAL INFRASTRUCTURE: CASE STUDY AND ANALYSIS STUXNET WORM." International Journal of Engineering Applied Sciences and Technology 9, no. 09 (2025): 78–83. https://doi.org/10.33564/ijeast.2025.v09i09.013.

Full text
Abstract:
Stuxnet represents a paradigm shift in the landscape of cyber warfare, marking its entry as a groundbreaking cyber weapon with profound implications that extend far beyond its immediate targets. Initially discovered in 2010, this sophisticated piece of malware was uniquely designed to cause physical damage to Iran's nuclear enrichment facility, a feat that had never been achieved by any previous cyber attack. Its discovery unveiled a new frontier in digital warfare, where malicious code could cross the threshold from the digital realm into causing tangible, real-world destruction. This capabil
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, Anmol Deepak, and Tamizharasan Periyasami. "Enhancing Digital Forensics with Deep Learning: Applications of CNNs and YOLOv5 in Weapon Detection and Image Forgery Analysis." American Journal of Innovation in Science and Engineering 4, no. 2 (2025): 66–76. https://doi.org/10.54536/ajise.v4i2.4685.

Full text
Abstract:
Security is an essential problem in all domains. The crime rates are increased at crowded events or suspected isolated regions. Computer vision has significant uses in detecting and monitoring abnormalities to address diverse issues. Video surveillance systems are increasingly necessary for safeguarding the safety, security, and personal belongings. The ability of these systems to identify and understand scenes and unusual occurrences is crucial for effective intelligence monitoring. The primary objective of this study was to analyze surveillance films to identify weapons and detect any unusua
APA, Harvard, Vancouver, ISO, and other styles
10

CHEN, Jie, Hao FANG, Bin XIN, and Fang DENG. "Modeling, Optimization and Control in Ground-based Digital Weapon Systems." Acta Automatica Sinica 39, no. 7 (2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mathew, Dr Alex, and Hannah Alex. "Cyberbiosecurity as the Foremost Biological Weapon to the Digital World." International Research Journal of Innovations in Engineering and Technology 06, no. 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.

Full text
Abstract:
Cyberbiosecurity has emerged as a new field combining cybersecurity and biosecurity. The convergence of cybersecurity and biosecurity can potentially impact the digital operations of enterprises in a variety of industries, including agriculture, manufacturing, and healthcare. This systematic review summarizes and synthesizes research on the increasing importance of cyber-biosecurity threats and the importance of cyber-biosecurity measures in combating the misuse of cyberspace and bioscience technology. The author performed three distinct searches through ProQuest, Web of Science, and MEDLINE d
APA, Harvard, Vancouver, ISO, and other styles
12

Badarna, Ibrahim, and Anat Gesser-Edelsburg. "Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel." Social Sciences 13, no. 3 (2024): 165. http://dx.doi.org/10.3390/socsci13030165.

Full text
Abstract:
Within the Arab community of Israel, the influence of masculine perceptions, violence, the carrying of weapons, and their subsequent use are growing concerns that significantly impact public safety. The omnipresence of social media further complicates this narrative, potentially reshaping traditional notions and behaviors associated with masculinity. This study endeavors to delve deep into the relationships between masculinity, violence, and weapon carrying and use and the role that social media plays in shaping these dynamics among Arab adolescent boys and young men in Israel. By employing a
APA, Harvard, Vancouver, ISO, and other styles
13

Chatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar, and Madhusudan Pal. "Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform." Defence Science Journal 69, no. 3 (2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.

Full text
Abstract:
The primary objective of the study was to assess the compatibility of multi calibre individual weapon system (MCIWS) with the shorter, medium and larger individual users of Indian Army. Three dynamic digital human models (DHM) 5thp, 50thp, 95thp army pooled (AP) population were considered to accommodate wide range (more than 90 per cent) of the army population for ergonomic analysis of the weapon system with the help of digital human modelling software Jack. Solid model of MCIWS which was in Parasolid file format X_T (*.x_t) was imported into NX5 (solid model design software) and subsequently
APA, Harvard, Vancouver, ISO, and other styles
14

Sundiev, Igor’ Yu, and Andrey B. Frolov. "Organizational and Digital Network Means of Terminal Destruction of Social Development." Economic Strategies 144, no. 3 (2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.

Full text
Abstract:
At the moment, there is a change in the universal attractors of the historical process; in this regard, a new management model is required, corresponding to the new “program requirements” of the attractor “from the future”. The former political and economic regulators have fulfilled their role, but the patterns of thinking developed over the centuries do not allow for any other means of “reset” than destruction. The article analyzes who, why, and by what means attempts to preserve the existing world order. As a tool of destruction, the actors of globalization have chosen ultra-effective digita
APA, Harvard, Vancouver, ISO, and other styles
15

Ereken, Ömer Faruk, and Çiğdem Tarhan. "Modeling Objects with Artificial Intelligence Based Image Processing Techniques: Object Detection with Mask R-CNN." Academic Platform Journal of Engineering and Smart Systems 13, no. 1 (2025): 17–21. https://doi.org/10.21541/apjess.1542885.

Full text
Abstract:
Object detection and classification on digital images have great importance in the digitalizing world. After deep learning methods started being implemented for object detection, classification and segmentation a rapid development has been monitored in the field. One of the most successful methods in the field is Mask R-CNN. It can be used in order to detect and segment purposes for many different objects. This study contains the use of Mask R-CNN for weapon detection, specifically handguns. Nowadays, there are many cameras in public areas and these cameras can detect weapons before a forensic
APA, Harvard, Vancouver, ISO, and other styles
16

Pristiyono, Pristiyono, Juliana Juliana, and Yudi Prayoga. "MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE." Jurnal Ekonomi Bisnis dan Kewirausahaan 11, no. 2 (2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.

Full text
Abstract:
The financial and banking industry has implemented digitalization as a marketing weapon and realized industry 4.0. The purpose of this study was to determine the extent of the implementation of banking digitalization in the expansion areas. The population of this research is the customers registered at Bank Sinar Mas Rantauprapat in 2021 as many as 1445 people. Research using multivariate data should use the number of samples in the survey as many as 200 samples with purposive sampling technique. Smart PLS data analysis through the stages of convergent validity, discriminant, composite reliabi
APA, Harvard, Vancouver, ISO, and other styles
17

Vizzini, R. W. "Integrated Flight/Propulsion Control System Considerations for Future Aircraft Application." Journal of Engineering for Gas Turbines and Power 107, no. 4 (1985): 833–37. http://dx.doi.org/10.1115/1.3239819.

Full text
Abstract:
Flight and propulsion controls can effectively be integrated to provide operational benefits to the weapon system which cannot be achieved with either system acting independently. The key factor is the synergistic effect of digital computers and associated high-speed data links, engine condition monitoring, diagnostics, and shared power systems (hydraulic and electrical), thus providing potential improvements in reliability, life cycle cost, weight, and maintenance actions. This technical paper will address the integration concepts required for the airframe and the propulsion control configura
APA, Harvard, Vancouver, ISO, and other styles
18

Abbas Shah, Sadia, Fahima Tahir, Sania Qamar, Anam Umera, and Rabia Javed. "3D Topological Modeling in Forensic Science: Integrating GIS for Digital Evidence Visualization and Analysis." International Journal for Electronic Crime Investigation 9, no. 1 (2025): 56–73. https://doi.org/10.54692/ijeci.2025.0901/244.

Full text
Abstract:
The present paper introduces a unified system of digital crime scene reconstruction, which incorporates 3D topological modeling, Geographic Information Systems (GIS) and the artificial intelligence (AI). Utilizing LiDAR point data and photogrammetry captured by drones, spatial-accurate 3D models are generated reflecting the scene of a crime in the highest resolution. YOLOv8 and Faster R-CNN are AI models, which are trained to automatically recognize critical forensic items, such as weapons, bloodstains, footprints, and bodies, which are fed using synthetic data. Such items are captured with ge
APA, Harvard, Vancouver, ISO, and other styles
19

Woodlock, Delanie, Mandy McKenzie, Deborah Western, and Bridget Harris. "Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control." Australian Social Work 73, no. 3 (2019): 368–80. http://dx.doi.org/10.1080/0312407x.2019.1607510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pitaya, Pitaya, and Ghifari Yuristiadhi Masyhari Makasi. "PENGUATAN STORYTELLING DALAM FORMAT DIGITAL UNTUK WISATA SEJARAH DI MUSEUM PUSAT TNI-AU DIRGANTARA MANDALA." Journal of Tourism and Economic 5, no. 1 (2022): 1–17. http://dx.doi.org/10.36594/jtec.v5i1.136.

Full text
Abstract:
The Indonesian Air Force Dirgantara Mandala Central Museum is a very special tourist attraction in Yogyakarta. This museum is a representative place to study the history of the struggle of the Indonesian people in the field of aerospace. Not only the main collection of weapons system and various other historical relics, the TNI-AU Dirgantara Mandala Central Museum also stores various patriotic and heroic stories from historical actors. Each museum collection that has its own story will be very interesting if it is expressed in the right storytelling scheme. The study focuses on how to include
APA, Harvard, Vancouver, ISO, and other styles
21

Pitaya and Ghifari Yuristiadhi Masyhari Makasi. "Penguatan Storytelling Dalam Format Digital Untuk Wisata Sejarah Di Museum Pusat TNI-AU Dirgantara Mandala." Journal Of Tourism And Economic 5, no. 1 (2022): 1–17. http://dx.doi.org/10.36594/jtec/w3kf2r96.

Full text
Abstract:
The Indonesian Air Force Dirgantara Mandala Central Museum is a very special tourist attraction in Yogyakarta. This museum is a representative place to study the history of the struggle of the Indonesian people in the field of aerospace. Not only the main collection of weapons system and various other historical relics, the TNI-AU Dirgantara Mandala Central Museum also stores various patriotic and heroic stories from historical actors. Each museum collection that has its own story will be very interesting if it is expressed in the right storytelling scheme. The study focuses on how to include
APA, Harvard, Vancouver, ISO, and other styles
22

Putra, Eka, Umi Salamah, and Mintarjo. "Revitalisasi Gudang Senjata Argopuro Akademi Angkatan Laut Guna Meningkatkan Keamanan dan Efisiensi dalam Penyimpanan Senjata Taruna." Saintek: Jurnal Sains Teknologi dan Profesi Akademi Angkatan Laut 18, no. 1 (2025): 49–63. https://doi.org/10.59447/saintek.v18i1.167.

Full text
Abstract:
The current Argopuro Naval Academy Armory, with a total of 900 cadets, is still not feasible. According to standards, due to the lack of effective weapons storage, namely when the number of weapons is maximum on the rack provided, many weapons are placed under the floor, which will make it difficult to carry out weapon calculations and checks. This research is an R&D that uses Steps based on the Center for Educational Policy and Innovation Research (Puslitjaknov) of the Research and Development Agency (Balitbang) of the Ministry of National Education (Depdiknas), which contains three main
APA, Harvard, Vancouver, ISO, and other styles
23

Zhou, Yuqi. "An Overview of Platform Economy and Its Algorithms: Strengths, Weaknesses and Regulatory Initiatives." BCP Business & Management 19 (May 31, 2022): 158–61. http://dx.doi.org/10.54691/bcpbm.v19i.738.

Full text
Abstract:
Algorithm-based Platform Economy is growing rapidly, with digital capitalism as its core. Its advantage of accurately matching supply with demand has attracted an enormous amount of capital. However, the monopolistic nature of platform and the intelligent algorithms are constantly violating the bottom line of consumer privacy, making digital economy a weapon for capital to exploit the laboring people. Therefore, they should be strictly regulated, which is the only way for platform economy to deliver real benefits to working people.
APA, Harvard, Vancouver, ISO, and other styles
24

Wang, Sheng Nan, Hong Ping Zhou, Hong Wei Yuan, Hai Xiao Gan, Wen Long Wang, and Lin Gang Lan. "Strengthening of PBX Perforated Plate Based on Polymer Coating." Key Engineering Materials 891 (July 6, 2021): 137–42. http://dx.doi.org/10.4028/www.scientific.net/kem.891.137.

Full text
Abstract:
Perforated structure is the mechanical weak link of polymer-bonded explosive (PBX). Improving its mechanical property may promote the reliability and effectiveness of weapon system. In this study, strengthening of the perforated PBX plate is conducted by employing surface coating. Digital image correlation (DIC) analysis results suggest that the regional applied epoxy coating layer is able to improve the mechanical properties of the plate. By confining the deformation and releasing the stress concentration around the perforation, the coating layer enhances the load carrying ability and energy
APA, Harvard, Vancouver, ISO, and other styles
25

De Cesaris, Alessandro. "What is a Digital Weapon? Towards a Functional Approach to Hypermodern Warfare Media." Philosophical Journal of Conflict and Violence 5, no. 1 (2021): 35–51. http://dx.doi.org/10.22618/tp.pjcv.20215.1.139003.

Full text
Abstract:
There is a wide debate concerning cyberwar and the new dangers of the Internet, but this debate focuses too often on practical issues, while the conceptual and somehow strictly “philosophical” dimension remains unquestioned. In this article, I will try to show that a better understanding of what we mean when we speak about weapons, or at least a better understanding of the new difficulties entailed by digital technologies in the field of military devices, can help us to provide a better analysis of the risks and of the ethical issues connected to contemporary fighting. In particular, I will ar
APA, Harvard, Vancouver, ISO, and other styles
26

Greer, Robert A. "The Navigation Sensor System Interface Project." Journal of Navigation 46, no. 2 (1993): 238–44. http://dx.doi.org/10.1017/s0373463300011577.

Full text
Abstract:
The AN/SSN-6 Navigation Sensor System Interface (NAVSSI) Project is a new system being designed with two primary objectives; to serve as the central distribution computer for navigation data to shipboard combat/weapon systems and to serve as the electronic chart display and information system (ECDIS). The NAVSSI will operate the digital nautical chart (DNC) database being developed by the Defense Mapping Agency (DMA). Our goal is for the digital nautical chart to replace the paper chart as a legal means of ownship navigation plotting. This paper will introduce the project and will primarily ex
APA, Harvard, Vancouver, ISO, and other styles
27

Woo, Sihyeong, Taesu Choi, and Dooyeol Lee. "Digital Maintenance Ecosystem Application Strategy for Condition-Based Maintenance of Air Weapon Systems." Journal of Applied Reliability 23, no. 4 (2023): 311–24. http://dx.doi.org/10.33162/jar.2023.12.23.4.311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Rowe, Neil C., Simson L. Garfinkel, Robert Beverly, and Panayotis Yannakogeorgos. "Challenges in Monitoring Cyberarms Compliance." International Journal of Cyber Warfare and Terrorism 1, no. 2 (2011): 35–48. http://dx.doi.org/10.4018/ijcwt.2011040104.

Full text
Abstract:
A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and
APA, Harvard, Vancouver, ISO, and other styles
29

Trupti Ulhas Chavan. "THE FUNCTION OF CLOUD COMPUTING TECHNOLOGY: AN INVALUABLE WEAPON AGAINST COVID-19." International Journal of Scientific Research in Modern Science and Technology 3, no. 3 (2024): 08–12. http://dx.doi.org/10.59828/ijsrmst.v3i3.189.

Full text
Abstract:
This study looks into how important cloud computing is to reducing the difficulties brought on by the COVID-19 epidemic. As the workforce becomes more reliant on digital solutions and works remotely more frequently, cloud computing becomes a vital tool for maintaining flexibility and company continuity. The study examines how cloud-based technologies, like scalable infrastructure and tools for remote collaboration, are being used to meet the extraordinary needs of distant work environments.
APA, Harvard, Vancouver, ISO, and other styles
30

Radziwill, Nicole M. "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon." Quality Management Journal 25, no. 2 (2018): 109–10. http://dx.doi.org/10.1080/10686967.2018.1436358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hashimova, Albina. "PERSONNEL WORK PROCESS USING DIGITAL ECONOMY APPLICATION PROGRAMS." AGORA INTERNATIONAL JOURNAL OF ECONOMICAL SCIENCES 17, no. 2 (2023): 78–86. http://dx.doi.org/10.15837/aijes.v17i2.6444.

Full text
Abstract:
Information technologies are emerging as systems that can meet the emerging demands of the business world in the conditions of increased competition and globalization. Today, with the help of information technology, it has become a value that can be multiplied and continuously produced and shared. Today, increased functionality with information technology has become the most important weapon of enterprises. Today, information technologies are used as the most important means of value creation, change, and renewal. The main purpose of the article is to determine the selection, training, and mot
APA, Harvard, Vancouver, ISO, and other styles
32

Widayati, Ani, Eka Ary Wibawa, Yolandaru Septiana, and Razana Juhaida Johari. "Industrial Revolution Era 4.0: Digital Literacy of Accounting Education Students." Dinamika Pendidikan 17, no. 1 (2022): 107–16. http://dx.doi.org/10.15294/dp.v17i1.36645.

Full text
Abstract:
This study aims to find out the different profile of digital literacy skills of four batches of Accounting Education students in the 4th industrial revolution era. As almost all human works will be replaced by robots and only those who have particular skills will be able to survive, it is essential to examine students’ digital literacy skills. A survey employed quantitative approach was conducted with a sample of 175 of four batches Accounting Education students of Universitas Negeri Yogyakarta. The data gathered with questionnaires technique were analysed using descriptive analysis followed w
APA, Harvard, Vancouver, ISO, and other styles
33

Utama, Agung Prija, Chandra Purnama, and Wawan Budi Darmawan. "DONALD TRUMP’S POLICY AGAINST NORTH KOREA’S BALLISTIC NUCLEAR WEAPON TEST." JWP (Jurnal Wacana Politik) 7, no. 2 (2022): 97. http://dx.doi.org/10.24198/jwp.v7i2.41190.

Full text
Abstract:
This study aims to identify the typology of the United States foreign policy towards North Korea’s ballistic nuclear weapons test during the Donald Trump administration. The typology of foreign policy will be explained by using James N. Rosenau’s adaptive foreign policy model which refers to two factors that influence it, namely external and internal changes in the United States environment which are influenced by three classifications, namely personal change, political change, and social-economic change against each factor, both externaly and internaly. This research is a descriptive qualitat
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Chen Ru, Lu Lu, Xia Wang, Wei Qi Jin, and Yong Zhang. "Target-Free Multi-Axes Parallelism Testing Based on Digital Image." Key Engineering Materials 552 (May 2013): 452–58. http://dx.doi.org/10.4028/www.scientific.net/kem.552.452.

Full text
Abstract:
With the development of science and technology, the application to modern warfare of weapon systems identified with modules of laser ranging, infrared imaging and low-light viewing are more and more frequently nowadays. Their combat accuracy depends much on the parallelism of gun line and laser axis. In consequence, it is of great significance to detect and correct the non-parallelism for improving the aim and combat accuracy. The axis parallelism detection exists in not only the production and assembly, but also the adjustment in the combat clearance or field environment. It is the basic to e
APA, Harvard, Vancouver, ISO, and other styles
35

Navarro, Enrico, and Cristiana Latini. "Cybersecurity and Cyberspace: An Insight into the Digital Criminal Investigative Techniques." Science of Law 2024, no. 1 (2024): 1–8. http://dx.doi.org/10.55284/sol.v2024i1.122.

Full text
Abstract:
In the age of global communications, data and information access has become crucial elements in the criminal justice system, and investigations need to evolve digitally in order to remain effective. The collection of digital evidence from computers, networks and storage media has become a vital weapon against various types of software and hardware attacks and prohibited threats. The acquisition, analysis and reporting of digital evidence depends on the nature of the crime scene, the type of available evidence and the digital legal instruments used. This paper suggests that cybersecurity should
APA, Harvard, Vancouver, ISO, and other styles
36

Galkaduwa, Kosalee Thameera. "Digital Transformation in Procurement: Implementing Automated Workflows and Approval Systems." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 12 (2024): 1–5. https://doi.org/10.55041/ijsrem29602.

Full text
Abstract:
Automated procurement and approval process is the key concept of digital transformation in procurement that energises operations by preventing human error and shortening procurement time. These systems are discussed in the subsequent sections of this research based on secondary data collection from industrial reports and academic literature. Several research findings show a 35% error decrease at Siemens, a 40% reduction in approval times at GE, and a 25% upsurge in compliance levels at Unilever. These findings show that automation reduces resource consumption and leakage, increasesthe visibili
APA, Harvard, Vancouver, ISO, and other styles
37

DZIOPA, Zbigniew J., and Maciej NYCKOWSKI. "Modelling and Testing the Dynamic Properties of a Launcher with Unguided Missiles." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (2022): 51–66. http://dx.doi.org/10.5604/01.3001.0016.1457.

Full text
Abstract:
The work analyses the operation of the ZSMU-70 weapon module. The results allowed for the development of several guidelines, aiming to shape the dynamic properties of the WW-4 launcher in order to improve the effectiveness of the ZSMU-70 module. This meant that research was carried out at a military training ground. Unguided NLPR-70 missiles were launched. The launching process was recorded using a Phantom high-speed digital camera. The recorded images were then analysed using TEMA software. Based on the results of empirical research, a physical and mathematical model of the motion was formula
APA, Harvard, Vancouver, ISO, and other styles
38

Mishra, Shivangi. "The dark industry of data brokers: need for regulation?" International Journal of Law and Information Technology 29, no. 4 (2021): 395–410. http://dx.doi.org/10.1093/ijlit/eaab012.

Full text
Abstract:
Abstract Measuring the impact of harm when the perpetrator is a faceless company operating in the shadows is akin to walking in the dark. You never know what’s awaiting you next! The data brokering industry is one such instance, possessing against you, arguably the strongest weapon today—a secret digital twin or a digital doppelganger of your attributes. In the ever-growing digital economy, is there a need to regulate this industry? This article identifies the lacuna in the law that permits its operation and argues for fixing the loopholes in order to regulate the data brokering industry. Furt
APA, Harvard, Vancouver, ISO, and other styles
39

Achmad Zaky Nauval, Tri Ahmad Tommy Sinambela, and Khairiyah Ramadhani. "Transformasi Media Digital dan Moderasi Beragama: Fenomena Politisasi Agama di Indonesia." Tabsyir: Jurnal Dakwah dan Sosial Humaniora 5, no. 3 (2024): 192–201. http://dx.doi.org/10.59059/tabsyir.v5i3.1492.

Full text
Abstract:
Indonesia is a multicultural country, so if you look at it, an approach in religion that emphasizes tolerance, mutual respect and open dialogue between various religions and beliefs is needed. In the political context, freedom of religion and belief can serve as a tool to prevent the politicization of religion. The politicization of religion seems to be the target of political contestation in Indonesia with digital media being its weapon that forms a polarization. The method used in this study is a qualitative descriptive method. The selection of this method is based on the purpose of the rese
APA, Harvard, Vancouver, ISO, and other styles
40

Bognár, Eszter Katalin. "Novel IT Technologies on the Digital Battlefield: The Application of Big Data and Data Mining Technologies." Hadmérnök 15, no. 4 (2020): 141–58. http://dx.doi.org/10.32567/hm.2020.4.10.

Full text
Abstract:
In modern warfare, the most important innovation to date has been the utilisation of information as a weapon. The basis of successful military operations is the ability to correctly assess a situation based on credible collected information. In today’s military, the primary challenge is not the actual collection of data. It has become more important to extract relevant information from that data. This requirement cannot be successfully completed without necessary improvements in tools and techniques to support the acquisition and analysis of data. This study defines Big Data and its concept as
APA, Harvard, Vancouver, ISO, and other styles
41

Ruta, Vaidya, Kulkarni Snehal, Dhame Nutan, and Korpad Dhanashri. "AI-Driven Fraud Detection in Indian Banking: A Statistical Approach." International Journal of Advance and Applied Research S6, no. 22 (2025): 644–47. https://doi.org/10.5281/zenodo.15532628.

Full text
Abstract:
<em>Online banking is now a pillar of India's digital economy, with millions of transactions&nbsp; &nbsp;happening every day in Indian Rupees (INR). But this growth in digital transactions has also brought with it a growth in online banking fraud, and therefore the need for sophisticated detection systems. Artificial Intelligence (AI) has been found to be a key&nbsp;&nbsp;&nbsp;&nbsp; weapon against fraud by utilizing statistical techniques. This aper examines the way AI-powered systems apply statistical methods like anomaly detection, machine learning, and predictive modeling to identify frau
APA, Harvard, Vancouver, ISO, and other styles
42

Wadood, Abdul, and Shabir Hussian. "Analyzing Digital Propaganda on X through Topic Modelling Approach: The Case of Afghanistan." Global Strategic & Securities Studies Review VIII, no. II (2024): 102–9. http://dx.doi.org/10.31703/gsssr.2023(viii-ii).11.

Full text
Abstract:
The dissemination of propaganda has become a formidable weapon, with nation-states exploiting social media platforms to engineer narratives favorable to their geopolitical interests. This study delved into Indo-Pakistan states' orchestrated propaganda in the wake of the Taliban's recapture of Afghanistan. This period is marked by a sophisticated blend of propaganda strategies to mold online discourse. Utilizing a dataset derived from X (formerly Twitter), the research examines how Pakistan and India leveraged information warfare to advance their politico-diplomatic narratives, shedding light o
APA, Harvard, Vancouver, ISO, and other styles
43

Davies, W. J., and R. W. Vizzini. "Engine Control Reliability and Durability Improvement Through Accelerated Mission Environmental Testing." Journal of Engineering for Gas Turbines and Power 109, no. 2 (1987): 142–45. http://dx.doi.org/10.1115/1.3240016.

Full text
Abstract:
The integration of aircraft control systems for future weapon systems will require the engine control system to meet the mission reliability of the flight control system. This will be accomplished through system redundancy and verified by accelerated environmental testing. Combined environment reliability testing (CERT) will assure control system structural integrity and reliability growth of engine-mounted digital electronic controls. Pratt &amp; Whitney, under contract to the U.S. Navy, has recently completed a 10,000-hr CERT program. Dual full authority digital electronic controls (FADEC),
APA, Harvard, Vancouver, ISO, and other styles
44

Erkan, Esra C¸ iftc¸ibași, and S¸ enol Uzun. "User services of tactical communications in the digital age." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2004): 39–44. http://dx.doi.org/10.26636/jtit.2004.4.267.

Full text
Abstract:
Increasing demands on an extensive amount of digital data and information flows for C4I is forcing the modern armies to freeze and omit EUROCOM based tactical area communications system and to develop new concepts based on the adoption of modern communication systems such as ISDN, ATM described in the TACOMS Post 2000 Final Report II in NATO. ASELSAN, as a leading company in the military electronics arena, is following and participating all the activities of TACOMS Post 2000 together with Turkish Ministry of Defense. Turkey`s tactical area communications system TASMUS is a mature and fielded s
APA, Harvard, Vancouver, ISO, and other styles
45

Fedorenko, Vladimir A. "XI International conference on forensic study of weapons." Izvestiya of Saratov University. Economics. Management. Law 24, no. 2 (2024): 232–35. http://dx.doi.org/10.18500/1994-2540-2024-24-2-232-235.

Full text
Abstract:
The article provides an overview of the two-day sessions of the XI International Conference on Forensic Study of Weapons, which was held at Saratov State University on October 17–18, 2023. The conference was attended by ballistics and criminologists experts from Saratov, Moscow, Volgograd, Nizhny Novgorod, St. Petersburg, the Kyrgyz Republic, the Republic of Armenia, Sri Lanka, the United Arab Emirates, Israel, the Republic of Belarus. The conference has been held on the basis of Saratov State University since 2011. The main issues of the conference are related to the introduction of modern te
APA, Harvard, Vancouver, ISO, and other styles
46

Indriya Himawan, Abdurrahman Faris, and Riska Widiyanita Batubara. "DIGITAL COMMERCE BERBASIS REHABILITASI BERSUMBERDAYA MASYARAKAT BAGI DIFABEL SLB KEMALA BHAYANGKARI GRESIK." Jurnal Pengabdian Manajemen 1, no. 2 (2022): 75. http://dx.doi.org/10.30587/jpmanajemen.v1i2.3748.

Full text
Abstract:
The increasingly advanced technology gives rise to many new media that allow the development of marketing communications such as interactive television, the Internet, E-commerce, interactive telephone, and faxing. This led to changes in market segmentation, as well as the way to communicate with them. Then the cultural driving factor makes marketing communication more segmented but its reach is very broad. Certain cultures will receive communication that is appropriate to their culture. Each tool in the promotion mix has different characteristics and it is undeniable that there are still many
APA, Harvard, Vancouver, ISO, and other styles
47

Krasnodemska, Iryna, Viacheslav Kalinichenko, Svitlana Marchenko, Oleksandr Ostapchuk, and Olha Sonechko. "History as a weapon: narratives and propaganda in the Russo-Ukrainian war." Revista Amazonia Investiga 13, no. 81 (2024): 98–107. http://dx.doi.org/10.34069/ai/2024.81.09.7.

Full text
Abstract:
The Russian-Ukrainian war highlights the role of historical memory as a tool for shaping public sentiment and legitimizing political action. This study investigates how historical narratives are used in the information war between Russia and Ukraine, and the means employed to manipulate historical memory. Through content analysis of scientific literature and data synthesis, the research reveals how the Kremlin regime re-appropriates historical concepts, particularly the history of Rus' and the victory in World War II, to promote a distorted historical memory and justify its aggressive policies
APA, Harvard, Vancouver, ISO, and other styles
48

Polu, Achuthananda Reddy, Goldman Sachs Bhumeka Narra, Navya Vattikonda, Varun Kumar Reddy Buddula, and Hari Hara Sudheer Patchipulusu. "Evolution of AI in Software Development and Cybersecurity: Unifying Automation, Innovation, and Protection in the Digital Age." International Journal of Research in Engineering and Applied Sciences 11, no. 5 (2025): 1–15. https://doi.org/10.63665/ijreas.v11i5.01.

Full text
Abstract:
The rapid advancements in Artificial Intelligence (AI) have led to significant transformations across various fields, with software development and cybersecurity being two key areas of profound impact. Software development, testing, and maintenance are being completely transformed by artificial intelligence (AI), namely through machine learning deep learning, and natural language processing. It automates repetitive tasks, enhances decision-making processes, and accelerates development cycles, thus driving efficiency in the software industry. AI has emerged as a crucial weapon in the fight agai
APA, Harvard, Vancouver, ISO, and other styles
49

Foltýn, Otakar. "Některé vojenské aspekty aplikace mezinárodního humanitárního práva v prostředí současných ozbrojených konfliktů." AUC IURIDICA 55, no. 4 (2025): 39–43. https://doi.org/10.14712/23366478.2024.33.

Full text
Abstract:
For an understanding of the Law of Armed Conflict development is important a good knowledge about military aspects. The two current very important topics are irregular warfare and the revolution in military technologies. The guerrilla warfare, which is typical for the Fourth generation of modem warfare is based on completely different style of warfare compare to symmetric style of warfare. Another military aspect, creating new questions for LOAC application, are new technologies, especially autonomic weapon systems and digital battlefield. Generally we have to say, that LOAC react to slowly on
APA, Harvard, Vancouver, ISO, and other styles
50

Fan, Hengxu. "Leader in the Digital Entertainment Market: Netflix's Continued Success in a Fiercely Competitive Environment." Advances in Economics, Management and Political Sciences 73, no. 1 (2024): None. http://dx.doi.org/10.54254/2754-1169/73/20231226.

Full text
Abstract:
As one of the world's largest digital entertainment providers, Netflix plays a crucial role in the entertainment and streaming industry. This article analyzes the main strategies for Netflix's success by using market research data, financial data, and user behavior data. Through analysis, it was found that high-quality original works are the key weapon for Netflix to win. With the help of big data and algorithm analysis, Netflix is deeply loved by consumers. In addition, Netflix's globalization strategy has gained market recognition and allowed it to maintain a competitive advantage in the glo
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!