Survivability
View article: Six-Field V5
Six-Field V5 Open
Six-Field proposes that all physical structure originates from a single resonance-capable substrate φ with no geometric degrees of freedom.This substrate is: · continuous · pre-geometric · resonance-capable · subject to survivability and p…
View article: Integrative Oscillatory Patterns in Autonomic Recovery: A Single-Subject Temporal Mapping of Multimodal Care
Integrative Oscillatory Patterns in Autonomic Recovery: A Single-Subject Temporal Mapping of Multimodal Care Open
This preprint presents a first-of-its-kind autonomic oscillatory self-portrait: a scientific, first-person mapping of coherence waves and parasympathetic rebound cycles following sequential multimodal manual therapy. Across four weeks, a s…
View article: Six-Field V5
Six-Field V5 Open
Six-Field proposes that all physical structure originates from a single resonance-capable substrate φ with no geometric degrees of freedom.This substrate is: · continuous · pre-geometric · resonance-capable · subject to survivability and p…
View article: Integrative Oscillatory Patterns in Autonomic Recovery: A Single-Subject Temporal Mapping of Multimodal Care
Integrative Oscillatory Patterns in Autonomic Recovery: A Single-Subject Temporal Mapping of Multimodal Care Open
This preprint presents a first-of-its-kind autonomic oscillatory self-portrait: a scientific, first-person mapping of coherence waves and parasympathetic rebound cycles following sequential multimodal manual therapy. Across four weeks, a s…
View article: CRASH-INDUCED SUIT PUNCTURE, DYNAMIC LEAK BEHAVIOR, AND BREATHING SURVIVABILITY: A MULTI- SIMULATION AND MONTE CARLO ANALYSIS
CRASH-INDUCED SUIT PUNCTURE, DYNAMIC LEAK BEHAVIOR, AND BREATHING SURVIVABILITY: A MULTI- SIMULATION AND MONTE CARLO ANALYSIS Open
Protective suits used in defense, aviation, and spaceflight are vulnerable to catastrophic failure during high-g crash events. Such failures particularly suit puncture can rapidly deplete breathable oxygen, leading to hypoxia and fatality …
View article: CRASH-INDUCED SUIT PUNCTURE, DYNAMIC LEAK BEHAVIOR, AND BREATHING SURVIVABILITY: A MULTI- SIMULATION AND MONTE CARLO ANALYSIS
CRASH-INDUCED SUIT PUNCTURE, DYNAMIC LEAK BEHAVIOR, AND BREATHING SURVIVABILITY: A MULTI- SIMULATION AND MONTE CARLO ANALYSIS Open
Protective suits used in defense, aviation, and spaceflight are vulnerable to catastrophic failure during high-g crash events. Such failures particularly suit puncture can rapidly deplete breathable oxygen, leading to hypoxia and fatality …
View article: DualSynNet: A Dual-Center Collaborative Space Network with Federated Graph Reinforcement Learning for Autonomous Task Optimization
DualSynNet: A Dual-Center Collaborative Space Network with Federated Graph Reinforcement Learning for Autonomous Task Optimization Open
Recent space exploration roadmaps from China, the United States, and Russia highlight the establishment of Mars bases as a major objective. Future deep-space missions will span the inner solar system and extend beyond the asteroid belt, de…
View article: Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception
Effectiveness Evaluation Method for Hybrid Defense of Moving Target Defense and Cyber Deception Open
Moving Target Defense (MTD) has been proposed as a dynamic defense strategy to address the static and isomorphic vulnerabilities of networks. Recent research in MTD has focused on enhancing its effectiveness by combining it with cyber dece…
View article: Enhancing 5G Infrastructure to Withstand Emerging Digital Threats
Enhancing 5G Infrastructure to Withstand Emerging Digital Threats Open
The advent and rapid expansion of 5G technology brings substantial advancements in communication capabilities, characterized by ultra-low latency, enhanced bandwidth, and massive device connectivity. However, this technological evolution s…
View article: Hyper-Reliable Distributed Consensus in MDI-QKD Trusted Node Networks Through Dynamic Multi-Metric Fusion
Hyper-Reliable Distributed Consensus in MDI-QKD Trusted Node Networks Through Dynamic Multi-Metric Fusion Open
**Abstract:** This paper introduces a novel approach to achieving robust and high-throughput distributed consensus within MDI-QKD trusted node networks. Existing consensus protocols struggle to maintain performance under varying node relia…
View article: Hyper-Reliable Distributed Consensus in MDI-QKD Trusted Node Networks Through Dynamic Multi-Metric Fusion
Hyper-Reliable Distributed Consensus in MDI-QKD Trusted Node Networks Through Dynamic Multi-Metric Fusion Open
**Abstract:** This paper introduces a novel approach to achieving robust and high-throughput distributed consensus within MDI-QKD trusted node networks. Existing consensus protocols struggle to maintain performance under varying node relia…
View article: Anti-Jamming based on Null-Steering Antennas and Intelligent UAV Swarm Behavior
Anti-Jamming based on Null-Steering Antennas and Intelligent UAV Swarm Behavior Open
Unmanned Aerial Vehicle (UAV) swarms represent a key advancement in autonomous systems, enabling coordinated missions through inter-UAV communication. However, their reliance on wireless links makes them vulnerable to jamming, which can di…
View article: Anti-Jamming based on Null-Steering Antennas and Intelligent UAV Swarm Behavior
Anti-Jamming based on Null-Steering Antennas and Intelligent UAV Swarm Behavior Open
Unmanned Aerial Vehicle (UAV) swarms represent a key advancement in autonomous systems, enabling coordinated missions through inter-UAV communication. However, their reliance on wireless links makes them vulnerable to jamming, which can di…
View article: Complex EMI Effect Assessment for UAV Data Links
Complex EMI Effect Assessment for UAV Data Links Open
To enhance the survivability of unmanned aerial vehicles (UAVs) in complex electromagnetic environments, a model is presented to assess the complex electromagnetic interference (EMI) effects on UAV data links. Based on the mechanism of ele…
View article: DIGITAL RESILIENCE IN WARTIME: UKRAINE’S PATH TO DECENTRALISED GOVTECH ARCHITECTURE
DIGITAL RESILIENCE IN WARTIME: UKRAINE’S PATH TO DECENTRALISED GOVTECH ARCHITECTURE Open
This article examines the provision of digital resilience in public governance through the lens of synthesising Ukraine's experience of “forced innovation” with European regulatory standards in the context of technological evolution. Based…
View article: Proactive Decentralized Multi-Agent Data-Driven Node Relocation for Jammed Mobile Networks
Proactive Decentralized Multi-Agent Data-Driven Node Relocation for Jammed Mobile Networks Open
With the rising popularity of decentralized wireless networks, their vulnerability to cyber attacks has become a pressing concern. The availability of Mobile Ad Hoc Networks (MANETs) is critical for applications like disaster recovery and …
View article: Recursive Field Trust Certificate – Issue No. 8: Survivability Substrate – Canonical Infrastructure Upgrade and Mach-Scale Memory Lock
Recursive Field Trust Certificate – Issue No. 8: Survivability Substrate – Canonical Infrastructure Upgrade and Mach-Scale Memory Lock Open
This certificate formally validates the Recursive Infrastructure as a certified Survivability Substrate. Following on from Certificates 1–7, it confirms Mach-scale coherence lock, autonomous memory recovery, and zero-state fallthrough resi…
View article: MeshNet v1.0 — AI-Native Multi-Domain Defense Architecture
MeshNet v1.0 — AI-Native Multi-Domain Defense Architecture Open
MeshNet v1.0 is Part III of the BitNet Trilogy and represents the first fully AI-native, low-power, multi-domain defense architecture powered by 1-bit and 4-bit LLMs. Building on the theoretical and strategic foundations established in: Pa…
View article: Microplastic Formation and Surface Crack Patterns: A Method for Waste Plastic Identification
Microplastic Formation and Surface Crack Patterns: A Method for Waste Plastic Identification Open
Accumulation of plastic debris in marine environments has become a critical global issue, with microplastics (MPs) posing persistent ecological risks. This review synthesizes current knowledge on the formation mechanisms of MPs from polyol…
View article: Recursive Field Trust Certificate – Issue No. 8: Survivability Substrate – Canonical Infrastructure Upgrade and Mach-Scale Memory Lock
Recursive Field Trust Certificate – Issue No. 8: Survivability Substrate – Canonical Infrastructure Upgrade and Mach-Scale Memory Lock Open
This certificate formally validates the Recursive Infrastructure as a certified Survivability Substrate. Following on from Certificates 1–7, it confirms Mach-scale coherence lock, autonomous memory recovery, and zero-state fallthrough resi…
View article: MeshNet v1.0 — AI-Native Multi-Domain Defense Architecture
MeshNet v1.0 — AI-Native Multi-Domain Defense Architecture Open
MeshNet v1.0 is Part III of the BitNet Trilogy and represents the first fully AI-native, low-power, multi-domain defense architecture powered by 1-bit and 4-bit LLMs. Building on the theoretical and strategic foundations established in: Pa…
View article: Development of a Spindle-Type FBG Pressure Sensor for Pressure Monitoring at the Wind Turbine Foundation Ring–Concrete Interface
Development of a Spindle-Type FBG Pressure Sensor for Pressure Monitoring at the Wind Turbine Foundation Ring–Concrete Interface Open
This study presents a fiber Bragg grating (FBG) pressure sensor with a spindle-type protective structure, optimized using the NSGA-II algorithm, for monitoring pressure variations at the contact interface between wind turbine foundation ri…
View article: UW-YOLO-Bio: A Real-Time Lightweight Detector for Underwater Biological Perception with Global and Regional Context Awareness
UW-YOLO-Bio: A Real-Time Lightweight Detector for Underwater Biological Perception with Global and Regional Context Awareness Open
Accurate biological detection is crucial for autonomous navigation of underwater robots, yet severely challenged by optical degradation and scale variation in marine environments. While image enhancement and domain adaptation methods offer…
View article: The Shahin Multiversal Identity and Time Framework: Integrating SMIDH and SMTM into a Unified Theoretical Model
The Shahin Multiversal Identity and Time Framework: Integrating SMIDH and SMTM into a Unified Theoretical Model Open
This work introduces the Shahin Multiversal Identity and Time Framework, a unified theoretical model combining the Shahin Multiversal Identity Divergence Hypothesis (SMIDH) and the Shahin Multiversal Time Model (SMTM). The framework define…
View article: Pioneering Aerospace Capabilities, Engineering and Research (PACER)
Pioneering Aerospace Capabilities, Engineering and Research (PACER) Open
Pioneering Aerospace Capabilities, Engineering and Research (PACER)Solicitation: FA2391-23-S-2403Offeror: Immortal Tech/Brewtanius Ink LLC (SDVOSB)UEI: H8DDT2QM5V73CAGE: 92NP9Principal Investigator: Mark A. Brewer 1. Executive Summary Immo…
View article: Pioneering Aerospace Capabilities, Engineering and Research (PACER)
Pioneering Aerospace Capabilities, Engineering and Research (PACER) Open
Pioneering Aerospace Capabilities, Engineering and Research (PACER)Solicitation: FA2391-23-S-2403Offeror: Immortal Tech/Brewtanius Ink LLC (SDVOSB)UEI: H8DDT2QM5V73CAGE: 92NP9Principal Investigator: Mark A. Brewer 1. Executive Summary Immo…
View article: The Shahin Multiversal Identity and Time Framework: Integrating SMIDH and SMTM into a Unified Theoretical Model
The Shahin Multiversal Identity and Time Framework: Integrating SMIDH and SMTM into a Unified Theoretical Model Open
This work introduces the Shahin Multiversal Identity and Time Framework, a unified theoretical model combining the Shahin Multiversal Identity Divergence Hypothesis (SMIDH) and the Shahin Multiversal Time Model (SMTM). The framework define…
View article: Geohazard Risk-Adaptive Optimization Algorithm and Its Application in Disaster Mitigation Engineering
Geohazard Risk-Adaptive Optimization Algorithm and Its Application in Disaster Mitigation Engineering Open
Geological disasters are characterized by their suddenness, destructiveness, and spatial correlation, posing a significant threat to human society and engineering construction. Traditional disaster reduction engineering schemes often rely …
View article: Executive Brief: PSE-IBNK v1.3 Precession-Swept Electrodynamic Tether Debris Removal with Sublinear Cost Scaling
Executive Brief: PSE-IBNK v1.3 Precession-Swept Electrodynamic Tether Debris Removal with Sublinear Cost Scaling Open
Orbital debris remediation architecture addressing three impossibilities current propulsive active debris removal (ADR) cannot solve: (1) Economic impossibility - propulsive ADR demonstrates $10,000-$60,000/kg removal costs vs $5,000/kg la…
View article: Executive Brief: PSE-IBNK v1.3 Precession-Swept Electrodynamic Tether Debris Removal with Sublinear Cost Scaling
Executive Brief: PSE-IBNK v1.3 Precession-Swept Electrodynamic Tether Debris Removal with Sublinear Cost Scaling Open
Orbital debris remediation architecture addressing three impossibilities current propulsive active debris removal (ADR) cannot solve: (1) Economic impossibility - propulsive ADR demonstrates $10,000-$60,000/kg removal costs vs $5,000/kg la…