نتایج جستجو برای: Counter-Terrorist

تعداد نتایج: 45045  

Terrorism is generally understood to be the use of threat or extra normal violence to gain ideological reasons and personal benefit. In this paper, a mathematical modelling of terrorism with military strategies and rehabilitation of terrorists was constructed. The model is developed to control the spread of terrorist ideologies in the society and suitable to describe terrorist group. The popula...

2005
Ralph L. Keeney

Decisions are made to achieve objectives. A value model unambiguously represents objectives in a quantitative manner. Hence, a value model both guides thinking and provides a basis for analyzing alternatives to best meet the desired objectives. This paper proposes the development of value models to support counter-terrorism efforts. It summarizes the theory and procedures to develop value model...

Journal: :Education, Citizenship and Social Justice 2017

Journal: :Proceedings of the Institution of Civil Engineers - Urban Design and Planning 2008

2008
João Ricardo Faria

The increase in the number of terrorist attacks in Russia suggests that anti-terrorist policies have failed to solve the Chechen terrorist problem. The Putin paradox, named after Russia’s president Vladimir Putin, is the capacity of the incumbent government to maintain or even increase its popular support while suffering increasing terrorist attacks. This paper presents a dynamic model where go...

2017
R. D. Gaharwar D. B. Shah M. A. Shaikh N. Chaurasia M. Dhakar A. Tiwari R. K. Gupta

Nowadays different types of web crawlers are available to perform variety of tasks. As internet is expanding the need of specialized web crawlers is also increasing with each passing days. Numbers of visualization tools which can be used to dynamically generate visual images are available in market. The need for visual representation of data increases in the case of counter terrorism. Terror ac...

2003
Michael W. David Kouichi Sakurai

The paper proposes ways to counter the Cyber Terrorist (CT) advantages of surprise and anonymity. It recommends the creation of a Cyberint Analysis Center to develop and evaluate methods to improve the ability to detect, identify and deter Cyber Terrorist attack. It also proposes ways to implement responsible, accountable and identifiable use of the Internet, and deny anonymity to the attackers.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید