نتایج جستجو برای: homeland
تعداد نتایج: 2593 فیلتر نتایج به سال:
AI Technologies are applicable to Homeland Security, particularly in problems of analysis, discovery and prediction. We describe relevant AI techniques including Link Analysis, dynamic Decision Support and Agent Organization modeling, whereby anomalous activities may be detected and threats deterred. We also discuss application of techniques in local government and to security matters close to ...
The contents of this report reflect the views of the authors, who are responsible for the facts and the accuracy of the information presented herein. The authors acknowledge the United States Department of Homeland Security for supporting the work reported here through the National Center for Border Security and Immigration under grant number 2008-ST-061-BS0002. However, any opinions, findings,...
Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-orient...
A plethora of solutions to homeland security problems have been proposed, during the last years, by academia, national governments, and industries. In this chapter, we focus on homeland security solutions based on efficient Wireless Sensor Network (WSN)-based audio signal pattern recognition. This is of interest for efficient surveillance of the perimeters of large areas, in order to detect the...
Diasporas contribute to their homeland’s development through remittances, philanthropy, skills transfer, business investment, and advocacy. This paper focuses on actions that homeland governments can take to create an enabling environment for diasporas’ contributions. Part I addresses the diaspora phenomenon and the homeland government-diaspora relationship. Part II develops a framework for cha...
in this paper, we propose a unified and interactive mobile learning (M-Learning) model to help with expanding and spreading education in the Arab Homeland countries. The model utilizes a new competitive spot beam satellite communication technology, which enables efficient channel allocation, where communication channels can be allocated to specific and precise areas. The proposed model is refer...
In this paper, we propose a unified and interactive mobile learning (M-Learning) model to help with expanding and spreading education in the Arab Homeland countries. The model utilizes a new competitive spot beam satellite communication technology, which enables efficient channel allocation, where communication channels can be allocated to specific and precise areas. The proposed model is refer...
As the population of mobile users grows rapidly, mobile malware targeting smartphones are becoming a new threat to homeland security. So far, many kinds of malicious malwares including monetizing, stealing credentials or rooting have emerged. The latest mobile malwares are especially posing a serious threat to homeland security, because they can zombify phones to be controlled by their command ...
We show how to effectively use antithetic variables to evaluate the expected value of (a) functions of independent random variables, when the functions are monotonic in only some of their variables, (b) Schur functions of random permutations, and (c) monotone functions of random subsets. Acknowledgement. This research was supported by the United States Department of Homeland Security through th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید