Showing 181 - 200 results of 351 for search '"national security"', query time: 0.08s Refine Results
  1. 181

    The Security Needs of International Students: An Analysis in Terms of the Securitization Theory by Arda ÖZKAN, Gülşah TAŞÇI

    Published 2023-06-01
    “…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
    Get full text
    Article
  2. 182

    IMPROVEMENT OF PROFESSIONAL TRAINING FOR THE MILITARY- INDUSTRIAL COMPLEX by Anatoly V. Ivanov, Oleg V. Kuznetsov

    Published 2016-12-01
    “…Strengthening of the defense capability and the national security of the country in the faceof the contemporary challenges requires the improvement of professional training, retraining, advanced training, additional training of personnel and specialists for the defense industries. …”
    Get full text
    Article
  3. 183

    A survey of V2X security protection technologies by Fuyuan CHEN, Zhenjiang DONG, Jiankuo DONG, Minjie XU

    Published 2023-03-01
    “…The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.…”
    Get full text
    Article
  4. 184

    Initial and Continued Airworthiness: Commonalities and Differences Between Civil and Military Aviation by Rafael Luterbacher Mus, Rebecca Rodeck, Gerko Wende

    Published 2024-12-01
    “…A trend exists towards the homogenization of rules in both fields; however, due to national security interests, these are generally agreed upon on a case-by-case basis. …”
    Get full text
    Article
  5. 185

    L’Empire en question : origines et développement d’un débat américain contemporain by Céline Letemplé

    Published 2007-09-01
    “…Even though members of the Bush administration have declared that the United States is not an Empire, the 2002 National Security Strategy has neo-imperialist overtones that have triggered anti-imperialist reactions across the American political spectrum. …”
    Get full text
    Article
  6. 186

    The Pentagon Papers as History by Stephen J. Whitfield

    Published 2022-06-01
    “…In the past, for the sake of national security, limitations had sometimes been imposed on newspapers and magazines condemning the war that was being fought – most notoriously, in the twentieth century, during the First World War. …”
    Get full text
    Article
  7. 187

    L’exil chilien en France du coup d’état à l’acceptation de l’exil : entre violences et migrations by Nicolas Prognon

    Published 2011-07-01
    “…The violence of the Pronunciamento and the implementation of the tenets of the national security doctrine, supplemented by an ad hoc legislation, caused an enormous political, then economic migration, quite extraordinary for a Latin American country. …”
    Get full text
    Article
  8. 188

    Efficient keyword spotting system for information retrieval by LUO Jun, OU Zhi-jian

    Published 2006-01-01
    “…A new two-stage keyword spotting system was proposed based on syllable graph for audio information retrieval task,which could efficiently spot the interesting words in mass speech data,thus serve for the national security.It comprised two stages – preprocessing and searching.In the preprocessing stage,the audio data was recognized into syllable graph which included high accuracy syllable candidates,and unsupervised MLLR(maximum likelihood linear regression) adaptation was carried out iteratively to further improve the accuracy of the syllable graph.In the searching stage,to answer the frequent queries from users,searching for matched keywords was only scanned in the graph for likely syllable strings.A forward-backward algorithm based on syllable N-grammar was used to calculate confidence measures for further filtering of the searching result.Experimental results show the system achieved good performances in both recall rate and accuracy rate,and in the searching stage only 0.01 times of real time is needed,which can meet the demand for fast retrieval.…”
    Get full text
    Article
  9. 189

    TOWARDS A CONCEPTUALISATION OF RESILIENCE IN SECURITY STUDIES by Zoran Kekovic, Vladimir Ninkovic

    Published 2020-04-01
    “…There is a vast literature in the subfields of security studies such as national security, emergency and disaster management, human and corporate security that problematizes this concept. …”
    Get full text
    Article
  10. 190

    Analysis on the dynamics and structure of scientific and innovation-information development indicators of the Russian federal districts by S. V. Sidorenko, T. A. Pershina, M. A. Khatuntseva, A. R. Bikbaeva

    Published 2023-12-01
    “…The obtained data are the basis for further assessment of the Russian economic security level within the framework of the National Security Strategy.…”
    Get full text
    Article
  11. 191

    SIGNS OF THE ADMINISTRATIVE AND LEGAL REGIME IN THE SYSTEM OF EVENTS OF THE NORTHERN DELIVERY by Galina V. Goncharuk

    Published 2024-11-01
    “…The relevance of the research lies in the strategic importance of events for early delivery of goods to hard-to-reach territories of the North and the Arctic of Russia to ensure national security, including the preservation and development of the local population. …”
    Get full text
    Article
  12. 192

    Research Prospect of Anti-Jamming Strategy for the Satellite Internet by Chen HAN, Aijun LIU, Kang AN

    Published 2022-03-01
    “…As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.The threat of smart jamming and the limitation of classical link-layer anti-jamming methods give rise to the new demand of intelligent and networked antijamming solutions.In view of the structural characteristics of the satellite internet and the development trend of modern communication jamming technologies, this paper analyzed the basic architecture of intelligent and networked anti-jamming.Based on the closed-loop strategic of sense-learn-prediction-decision-feedback, intelligent and active anti-jamming decision was made to realized self-confi guration and self-optimization.Based on the cooperative communication between nodes, networked anti-jamming ability was improved by the means of topology control and reconstruction, adjacent resources reallocation, and traffi c load balancing.It provided certain theoretical support for the construction of anti-jamming strategy system to achieved the cross-layer optimization, multi-domain combination, and adaptive intelligence.…”
    Get full text
    Article
  13. 193

    Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat by Muhammad Ramli

    Published 2025-01-01
    “… Transboundary haze pollution (PALB) has developed into a critical concern for Southeast Asian countries in terms of transboundary issues and national security. This study aims to provide an understanding of the non-traditional threats that have become significant in front of countries, to demonstrate that the PALB issue is worthy of being included in the Non-Traditional Security (KNT) study, to provide an in-depth analysis of how the securitization transformation process has affected PALB issues in Singapore, to correlate the involvement of various actors in the ongoing securitization process, and to evaluate. …”
    Get full text
    Article
  14. 194

    « You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins by Laurence Taleirach-Vielmas

    Published 2008-12-01
    “…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
    Get full text
    Article
  15. 195

    A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic by Eduard Tshovrebov, Vladimir Moshkov, Irina Oltyan and Filyuz Niyazgulov

    Published 2024-12-01
    “…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
    Get full text
    Article
  16. 196
  17. 197

    UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database by Tao WEN, Yu-qing ZHANG, Qi-xu LIU, Gang YANG

    Published 2015-10-01
    “…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
    Get full text
    Article
  18. 198

    Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation by D. A. Degterev

    Published 2020-11-01
    “…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
    Get full text
    Article
  19. 199

    WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY by Dragan Simić, Dragan Živojinović

    Published 2019-11-01
    “…The best guide in that sense would be the 2017 U. S. National Security Strategy idea of principled realism which is the most important written strategic statement of the Trump administration up to this date. …”
    Get full text
    Article
  20. 200

    “Invading Your Hearts and Minds”: Call of Duty® and the (Re)Writing of Militarism in U.S. Digital Games and Popular Culture by Frédérick Gagnon

    Published 2017-03-01
    “…The conclusion invites players to think about ways to criticize the way games like Call of Duty employ and deploy values that (re)write the militarist mindset that has often pervaded the post-9/11 U.S. national security debate.…”
    Get full text
    Article