نتایج جستجو برای: counter terrorism

تعداد نتایج: 46496  

2003
Ashok N. Srivastava

Data mining is playing an increasingly important role in sifting through large amount of data for homeland defense applications. However, we must pay attention to the privacy issues while mining the data. This has resulted in the development of several privacy-preserving data mining techniques. The random value distortion technique is one among them. It attempts to hide the sensitive data by ra...

2006
Krishna R. Pattipati Peter Willett Jefferey Allanach Haiying Tu Satnam Singh

Introduction Information concerning the potential whereabouts and activities of terrorists can be extrapolated from the massive amount of intelligence reported daily to US intelligence agencies. The events encapsulated in these reports, and, in particular, the sequence of these events, can be used to probabilistically infer the activities of terrorists. In this chapter, we are particularly inte...

2016
Derek Summerfield

This is a brief exploration of the ethical issues raised for psychiatrists, and for universities, schools and wider society, by the demand that they attend mandatory training as part of the UK government's Prevent counter-terrorism strategy. The silence on this matter to date on the part of the General Medical Council, medical Royal Colleges, and the British Medical Association is a failure of ...

2002
Daniel Barbará James J. Nolan David Schum Arun Sood

In this paper we present an architecture to manage a large, distributed volume of evidence for counterterrorism applications. This approach facilitates the intelligence analyst’s train of thought by enabling hypotheses to be postulated and evaluated against the available evidence. The hypothesis creation is left to the human (as we believe only humans possess the flexibility to adapt hypothesis...

2005
L. Karl Branting

Name matching is an important task in law enforcement and counter-terrorism. This paper briefly describes the nature of the name-matching task, enumerates typical name-matching applications, explains the technical challenges posed by namematching, and sets forth several important approaches to these technical challenges. 1. THE NAME-MATCHING TASK Name matching is the task of recognizing when tw...

2008
Ted W. Reid Phat Tran Julian Spallholz Joe A. Fralick

The purpose of this study is to produce selenium labeled peptides and phage (bacterial viruses) that can selectively bind to the surface of the pathogenic bacteria Yersinia pestis (the plague) and inactivate it through the generation of superoxide radicals on its surface, similar to the way that it is inactivated by superoxide in macrophage. The results show that phage specific for a given bact...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید