Listing 1 - 10 of 196 | << page >> |
Sort by
|
Choose an application
Signal detection (Psychology) --- Perception --- Psychophysics --- Vigilance (Psychology) --- Signal Detection, Psychological.
Choose an application
Explosives are historically the weapons that have been most frequently used against civilians by terrorist organisations. In the past few years, the use of explosives by terrorist groups has cost the lives of more people than the combination of all other attacks, including the use of weapons of mass destruction (chemical, biological and nuclear weapons). Early detection of these substances is one of the most effective ways to prevent attacks using explosives from occurring. Fast and reliable equipment to detect the presence of explosives and explosive devices is critical to fighting terrorism.
Choose an application
This book discusses three major physical phenomena for active source seismology, namely underwater explosions, underground nuclear explosions, and large-scale on-surface chemical explosions. In particular, contributors consider how to use the technologies and applications in active source seismology and seismo-acoustics, rather than the theoretical approach for the resolution of the forensic explosion seismology in the light of an application for defense sciences. The volume also presents seismological investigations of discrimination between earthquakes and man-made explosions.
Underground nuclear explosions --- Seismology. --- Detection.
Choose an application
Recent revelations about America's National Security Agency offer a reminder of the challenges posed by the rise of the digital age for American law. These challenges refigure the meaning of autonomy and of the word 'social' in an age of new modalities of surveillance and social interaction. Each of these developments seems to portend a world without privacy, or in which the meaning of privacy is transformed, both as a legal idea and a lived reality. Each requires us to rethink the role of law, can it keep up with emerging threats to privacy and provide effective protection against new forms of surveillance? This book offers some answers. It considers different understandings of privacy and provides examples of legal responses to the threats to privacy associated with new modalities of surveillance, the rise of digital technology, the excesses of the Bush and Obama administrations, and the continuing war on terror.
Privacy, Right of --- Surveillance detection --- Detection of surveillance --- SD (Surveillance detection)
Choose an application
The application of biosensors is expanding in different areas. These are portable and convenient devices that permit the rapid, accurate, and reliable detection of analytes of interest present either in the atmosphere or in aqueous or in liquid phases. The detection of glucose levels in blood for the effective management of diabetes is one. Though different biosensors have been designed for an increasing number of applications, the kinetics of binding (and dissociation) of analytes by the receptors on the biosensor surfaces has not been given enough attention in the open literature. This i
Biosensors --- Fractals. --- Pathogenic microorganisms --- Mathematics. --- Detection.
Choose an application
The detection of hidden explosives has become an issue of utmost importance in recent years. While terrorism is not new to the international community, recent terrorist attacks have raised the issue of detection of explosives and have generated a great demand for rapid, sensitive and reliable methods for detecting hidden explosives. Counterterrorist Detection Techniques of Explosives covers recent advances in this area of research including vapor and trace detection techniques (chemiluminescence, mass spectrometry, ion mobility spectrometry, electrochemical methods and micromechanical sensors,
International movements --- Bombings --- Explosives --- Terrorism --- Prevention. --- Detection.
Choose an application
Explosives --- Terrorism --- Detection --- Safety measures --- Prevention
Choose an application
Lie detectors and detection --- #RBIB:XTOF --- Polygraphs --- Criminal investigation --- Lie detectors and detection.
Choose an application
Lie detectors and detection -- Evaluation. --- Lie detectors and detection --- Evaluation. --- Polygraphs --- Criminal investigation
Choose an application
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate
Crime prevention --- Terrorism --- Surveillance detection. --- National security --- Internal security --- Prevention. --- Loyalty-security program, 1947 --- -Homeland defense --- Homeland security --- Detection of surveillance --- SD (Surveillance detection)
Listing 1 - 10 of 196 | << page >> |
Sort by
|