نتایج جستجو برای: counter terrorism
تعداد نتایج: 46496 فیلتر نتایج به سال:
Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...
Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In this chapter, we are particularly inte...
This is a brief exploration of the ethical issues raised for psychiatrists, and for universities, schools and wider society, by the demand that they attend mandatory training as part of the UK government's Prevent counter-terrorism strategy. The silence on this matter to date on the part of the General Medical Council, medical Royal Colleges, and the British Medical Association is a failure of ...
In this paper we present an architecture to manage a large, distributed volume of evidence for counterterrorism applications. This approach facilitates the intelligence analyst’s train of thought by enabling hypotheses to be postulated and evaluated against the available evidence. The hypothesis creation is left to the human (as we believe only humans possess the flexibility to adapt hypothesis...
Name matching is an important task in law enforcement and counter-terrorism. This paper briefly describes the nature of the name-matching task, enumerates typical name-matching applications, explains the technical challenges posed by namematching, and sets forth several important approaches to these technical challenges. 1. THE NAME-MATCHING TASK Name matching is the task of recognizing when tw...
The purpose of this study is to produce selenium labeled peptides and phage (bacterial viruses) that can selectively bind to the surface of the pathogenic bacteria Yersinia pestis (the plague) and inactivate it through the generation of superoxide radicals on its surface, similar to the way that it is inactivated by superoxide in macrophage. The results show that phage specific for a given bact...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید