-
181
The Security Needs of International Students: An Analysis in Terms of the Securitization Theory
Published 2023-06-01“…In some states, these students are considered a potential threat to national security and subject to various inequalities of opportunity, however, ironically, the states do not adequately address the higher education policies regarding the security needs of international students. …”
Get full text
Article -
182
IMPROVEMENT OF PROFESSIONAL TRAINING FOR THE MILITARY- INDUSTRIAL COMPLEX
Published 2016-12-01“…Strengthening of the defense capability and the national security of the country in the faceof the contemporary challenges requires the improvement of professional training, retraining, advanced training, additional training of personnel and specialists for the defense industries. …”
Get full text
Article -
183
A survey of V2X security protection technologies
Published 2023-03-01“…The vehicle-road-cloud collaborative V2X system has gradually become a national strategy, and the safety of V2X is related to driving security, life security, property security and even national security, which has increasingly become a hot spot for industry research.Firstly, the overall situation of the V2X security industry and the technology architecture of vehicle-road-cloud collaboration were introduced.Secondly, based on the “vehicle-road-cloud” technology system of V2X, the current status of domestic and international research was discussed, and the remaining problems and challenges in the field of V2X security protection were analyzed from three levels: V2X terminal security, roadside security and cloud security.Finally, the future development and research focus of the V2X security and protection technology were foreseen.…”
Get full text
Article -
184
Initial and Continued Airworthiness: Commonalities and Differences Between Civil and Military Aviation
Published 2024-12-01“…A trend exists towards the homogenization of rules in both fields; however, due to national security interests, these are generally agreed upon on a case-by-case basis. …”
Get full text
Article -
185
L’Empire en question : origines et développement d’un débat américain contemporain
Published 2007-09-01“…Even though members of the Bush administration have declared that the United States is not an Empire, the 2002 National Security Strategy has neo-imperialist overtones that have triggered anti-imperialist reactions across the American political spectrum. …”
Get full text
Article -
186
The Pentagon Papers as History
Published 2022-06-01“…In the past, for the sake of national security, limitations had sometimes been imposed on newspapers and magazines condemning the war that was being fought – most notoriously, in the twentieth century, during the First World War. …”
Get full text
Article -
187
L’exil chilien en France du coup d’état à l’acceptation de l’exil : entre violences et migrations
Published 2011-07-01“…The violence of the Pronunciamento and the implementation of the tenets of the national security doctrine, supplemented by an ad hoc legislation, caused an enormous political, then economic migration, quite extraordinary for a Latin American country. …”
Get full text
Article -
188
Efficient keyword spotting system for information retrieval
Published 2006-01-01“…A new two-stage keyword spotting system was proposed based on syllable graph for audio information retrieval task,which could efficiently spot the interesting words in mass speech data,thus serve for the national security.It comprised two stages – preprocessing and searching.In the preprocessing stage,the audio data was recognized into syllable graph which included high accuracy syllable candidates,and unsupervised MLLR(maximum likelihood linear regression) adaptation was carried out iteratively to further improve the accuracy of the syllable graph.In the searching stage,to answer the frequent queries from users,searching for matched keywords was only scanned in the graph for likely syllable strings.A forward-backward algorithm based on syllable N-grammar was used to calculate confidence measures for further filtering of the searching result.Experimental results show the system achieved good performances in both recall rate and accuracy rate,and in the searching stage only 0.01 times of real time is needed,which can meet the demand for fast retrieval.…”
Get full text
Article -
189
TOWARDS A CONCEPTUALISATION OF RESILIENCE IN SECURITY STUDIES
Published 2020-04-01“…There is a vast literature in the subfields of security studies such as national security, emergency and disaster management, human and corporate security that problematizes this concept. …”
Get full text
Article -
190
Analysis on the dynamics and structure of scientific and innovation-information development indicators of the Russian federal districts
Published 2023-12-01“…The obtained data are the basis for further assessment of the Russian economic security level within the framework of the National Security Strategy.…”
Get full text
Article -
191
SIGNS OF THE ADMINISTRATIVE AND LEGAL REGIME IN THE SYSTEM OF EVENTS OF THE NORTHERN DELIVERY
Published 2024-11-01“…The relevance of the research lies in the strategic importance of events for early delivery of goods to hard-to-reach territories of the North and the Arctic of Russia to ensure national security, including the preservation and development of the local population. …”
Get full text
Article -
192
Research Prospect of Anti-Jamming Strategy for the Satellite Internet
Published 2022-03-01“…As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.The threat of smart jamming and the limitation of classical link-layer anti-jamming methods give rise to the new demand of intelligent and networked antijamming solutions.In view of the structural characteristics of the satellite internet and the development trend of modern communication jamming technologies, this paper analyzed the basic architecture of intelligent and networked anti-jamming.Based on the closed-loop strategic of sense-learn-prediction-decision-feedback, intelligent and active anti-jamming decision was made to realized self-confi guration and self-optimization.Based on the cooperative communication between nodes, networked anti-jamming ability was improved by the means of topology control and reconstruction, adjacent resources reallocation, and traffi c load balancing.It provided certain theoretical support for the construction of anti-jamming strategy system to achieved the cross-layer optimization, multi-domain combination, and adaptive intelligence.…”
Get full text
Article -
193
Singapore Government Securitization Measures against Transboundary Haze Pollution as a Non-Traditional Security Threat
Published 2025-01-01“… Transboundary haze pollution (PALB) has developed into a critical concern for Southeast Asian countries in terms of transboundary issues and national security. This study aims to provide an understanding of the non-traditional threats that have become significant in front of countries, to demonstrate that the PALB issue is worthy of being included in the Non-Traditional Security (KNT) study, to provide an in-depth analysis of how the securitization transformation process has affected PALB issues in Singapore, to correlate the involvement of various actors in the ongoing securitization process, and to evaluate. …”
Get full text
Article -
194
« You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins
Published 2008-12-01“…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
Get full text
Article -
195
A New Approach to Assessing the Accuracy of Forecasting of Emergencies with Environmental Consequences Based on the Theory of Fuzzy Logic
Published 2024-12-01“…Prevention of the occurrence and development of emergencies of a natural and man-made nature is one of the basic fundamental foundations of ensuring the national security of any state. The most important mechanism for preventing emergencies is an effective system of monitoring and forecasting emergencies established at the state level. …”
Get full text
Article -
196
Forecast and Simulation of the Public Opinion on the Public Policy Based on the Markov Model
Published 2021-01-01Get full text
Article -
197
UVDA:design and implementation of automation fusion framework of heterogeneous security vulnerability database
Published 2015-10-01“…Security vulnerability was the core of network security.Vulnerability database was designed to collect,assess and publish vulnerability information.However,there was redundant and heterogeneous data in vulnerability database which leads to sharing difficulty of vulnerability information among vulnerability database.15 main vulnerability database with a total of 842 thousands of vulnerability data items were connected and analyzed.Based on text mining technology,a rule of removing duplicate form vulnerabilities whose accuracy rate was 94.4% and vulnerability database fusion framework(UVDA)were proposed.Finally,three representative vulnerability database were used to realize UVDA framework,which made the process fully automatic.The generated UVDA vulnerability database has been used in national security vulnerability database and can be retrieved according to uniform product version and date time,promoting the standardization process of vulnerability information release mechanism.…”
Get full text
Article -
198
Aid Effectiveness: From Project Appraisal to Strategic Impact Evaluation
Published 2020-11-01“…The US case shows key principles of ensuring policy coherence at different levels of goal-setting — from the National Security Strategy to planning individual projects and programs. …”
Get full text
Article -
199
WESTERN BALKANS U. S. POLICY IN THE CONTEXT OF THE PRESIDENT TRUMP’S GRAND STRATEGY
Published 2019-11-01“…The best guide in that sense would be the 2017 U. S. National Security Strategy idea of principled realism which is the most important written strategic statement of the Trump administration up to this date. …”
Get full text
Article -
200
“Invading Your Hearts and Minds”: Call of Duty® and the (Re)Writing of Militarism in U.S. Digital Games and Popular Culture
Published 2017-03-01“…The conclusion invites players to think about ways to criticize the way games like Call of Duty employ and deploy values that (re)write the militarist mindset that has often pervaded the post-9/11 U.S. national security debate.…”
Get full text
Article