نتایج جستجو برای: homeland

تعداد نتایج: 2593  

2007
An ESRI White

The information contained in this document is the exclusive property of ESRI. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, exce...

2004
Charles Mitchell Chris Decker

Prior to the attack on the USS Cole and the events of 11 September 2001, the U.S. Navy was developing antiterrorism programs to address potential terrorist attacks in a resource-constrained environment. Amid unprecedented tragedy associated with these and other terrorist strikes against U.S. interests, both domestic and abroad, government agencies, the Armed Forces, and private companies have r...

Journal: :CoRR 2013
Carol Ann Niznik

The Universal Interface Software(UIS) Protocol was a Theater Missile Defense Gateway Protocol which linked the Strategic Defense Initiative(SDI) Architecture Killer Satellite Software Protocol to the National Test Bed Simulation Software Protocol to enable neural network shock loop operation when ICBMS were approaching the SDI Shield. A Gateway Software is required for Homeland Defense and Secu...

Journal: :Sexually transmitted infections 2005
M A Kramer A van den Hoek R A Coutinho M Prins

OBJECTIVES To examine travel related sexual risk behaviour among migrants living in Amsterdam. METHODS People originating from Surinam (n = 798) and the Netherlands Antilles (n = 227) were recruited in order to study the heterosexual spread of HIV within ethnic groups. Log binomial regression was used to study determinants for homeland travel over the past 5 years; logistic regression was use...

2009
Bhavani M. Thuraisingham

Data mining is the process of posing queries to large quantities of data and extracting information often previously unknown using mathematical, statistical, and machine-learning techniques. Data mining has many applications in a number of areas, including marketing and sales, medicine, law, manufacturing, and, more recently, homeland security. Using data mining, one can uncover hidden dependen...

2000
M. Sam Mannan

What I would like to discuss and bring your attention to is my recent trip to Washington, D.C., on Wednesday, December 12, 2007. I traveled, to testify before a House subcommittee citing the potential for acts of terrorism on any of the thousands of chemical processing plants throughout the country and urged Congress to give the Department of Homeland Security permanent and continuing authority...

2008
Charles R. McLean Sanjay Jain Y. Tina Lee

The effective use of modeling, simulation, and analysis (MSA) applications could greatly enhance our nation’s ability to achieve homeland security goals. The development of MSA applications has been conducted largely on an ad hoc and piecemeal basis. There is very little, if any, coordination of MSA development activities across government agencies, the research community, the commercial softwa...

Journal: :حولیة الاتحاد العام للآثاریین العرب "دراسات فى آثار الوطن العربى" 2021

Journal: :Information & Security: An International Journal 2005

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید