Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Source
    • Language
174,200 result(s) for "Intelligence gathering"
Sort by:
Working Memory and Executive Attention: A Revisit
In this follow-up to my 2002 article on working memory capacity, fluid intelligence, and executive attention in Current Directions in Psychological Science, I review even more evidence supporting the idea that the ability to control one’s attention (i.e., executive attention) is important to working memory and fluid intelligence. I now argue that working memory tasks reflect primarily the maintenance of information, whereas fluid intelligence tests reflect primarily the ability to disengage from recently attended and no longer useful information. I also point out some conclusions in the 2002 article that now appear to be wrong.
Artificial intelligence in cyber security: research advances, challenges, and opportunities
In recent times, there have been attempts to leverage artificial intelligence (AI) techniques in a broad range of cyber security applications. Therefore, this paper surveys the existing literature (comprising 54 papers mainly published between 2016 and 2020) on the applications of AI in user access authentication, network situation awareness, dangerous behavior monitoring, and abnormal traffic identification. This paper also identifies a number of limitations and challenges, and based on the findings, a conceptual human-in-the-loop intelligence cyber security model is presented.
Maritime Security and the Law of the Sea
Maritime Security and the Law of the Sea examines the rights and duties of states across a broad spectrum of maritime security threats. It provides comprehensive coverage of the different dimensions of maritime security in order to assess how responses to maritime security concerns are, and should be, shaping the law of the sea. The discussion canvasses passage of military vessels and military activities at sea, law enforcement activities across the different maritime zones, information sharing and intelligence gathering, as well as armed conflict and naval warfare. In doing so, this book not only addresses traditional security concerns for naval power but also examines responses to contemporary maritime security threats, such as terrorism, weapons of mass destruction, piracy, drug-trafficking, environmental damage and illegal fishing. While the protection of sovereignty and national interests remain fundamental to maritime security and the law of the sea, there is increasing acceptance of a common interest that exists among states when seeking to respond to a variety of modern maritime security threats. It is argued that security interests should be given greater scope in our understanding of the law of the sea in light of the changing dynamics of exclusive and inclusive claims to ocean use. More flexibility may be required in the interpretation and application of the UN Convention on the Law of the Sea if appropriate responses to ensure maritime security are to be allowed.
Repression Technology: Internet Accessibility and State Violence
This article offers a first subnational analysis of the relationship between states' dynamic control of Internet access and their use of violent repression. I argue that where governments provide Internet access, surveillance of digital information exchange can provide intelligence that enables the use of more targeted forms of repression, in particular in areas not fully controlled by the regime. Increasing restrictions on Internet accessibility can impede opposition organization, but they limit access to information on precise targets, resulting in an increase in untargeted repression. I present new data on killings in the Syrian conflict that distinguish between targeted and untargeted events, using supervised text classification. I find that higher levels of Internet accessibility are associated with increases in targeted repression, whereas areas with limited access experience more indiscriminate campaigns of violence. The results offer important implications on how governments incorporate the selective access to communication technology into their strategies of coercion.
A survey of intelligent transmission line inspection based on unmanned aerial vehicle
With the development of the new generation of information technology, artificial intelligence, cloud computing and big data are gradually becoming powerful engines of the smart grid. In recent years, people have been exploring how to reduce the dependence on human experience in the field of transmission line inspection. Therefore, transmission line inspection has attracted wide attention because of its high intelligence, flexibility and reliability. In this paper, we would like to present a survey on the intelligent transmission line inspection based on unmanned aerial vehicle (UAV). Firstly, the origin and development of intelligent electric power inspection are reviewed, and then the process of intelligent transmission line inspection and three key issues, i.e., path planning of UAV, trajectory tracking, and fault detection and diagnosis are presented in details. Finally, the challenges and future solutions are pointed out for power inspection.