Narrow your search

Library

Vlaams Parlement (3)

KBR (2)

Royal Museums of Art and History (2)

KU Leuven (2)

EHC (1)

Hogeschool West-Vlaanderen (1)

ULB (1)


Resource type

book (9)


Language

English (8)

Dutch (1)


Year
From To Submit

2022 (1)

2020 (2)

2014 (1)

2009 (1)

2000 (1)

More...
Listing 1 - 9 of 9
Sort by

Book
Studies on Typhus fever in China.
Authors: ---
Year: 1933 Publisher: Peiping Catholic university press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Studies on typhus fever in China
Authors: ---
Year: 1933 Publisher: Peiping The Catholic University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Pharmacological methods in the control of inflammation
Authors: ---
ISBN: 047151764X Year: 1989 Volume: v. 5 Publisher: New York, NY : A.R. Liss,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Brushing the past : later Chinese calligraphy from the gift of Robert Hatfield Ellsworth.
Authors: --- ---
Year: 2000 Publisher: Washington Smithsonian institution. Freer gallery of art

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Modeling the Impact of Border-Enforcement Measures
Authors: --- --- ---
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Homeland Security Operational Analysis Center researchers sought to establish a causal connection between border-enforcement actions or policies and metrics that might be used to measure relevant outcomes at the border. Applying quasi-experimental methods, they investigated the impact of surveillance technology on levels of U.S. Border Patrol apprehensions of unlawful border-crossers between ports of entry along the southwest border. Their analysis offers insights into some of the effects of surveillance technology and serves as a demonstration of concept for the usefulness of such statistical methods. The most robust finding is that deploying integrated fixed towers (IFTs) is associated with decreased apprehension levels in the zones of deployment. Although the researchers emphasize ambiguity in the meaning of the results and the uncertainty in statistical inference with relatively small numbers of deployments, they concluded that there is strong evidence that some migrants were deterred from crossing surveilled areas of the border. The results are more inconclusive for the other surveillance assets—but there are suggestions that, unlike IFTs, tactical aerostat systems (TASs) (and, to a lesser extent, other technologies) elevate apprehension levels, which points to a boost to the U.S. Border Patrol's situational awareness. Statistical methods hold both promise and limitations for the study of the impact of border-enforcement measures beyond the analysis in this study. Although these methods cannot, on their own, yield clear answers in every case, they do have the potential to help operational commanders and policymakers understand and anticipate the impact and effectiveness of different border-enforcement measures.

Keywords


Book
De drie dromen van de Mandarijn.
Authors: --- --- --- --- --- et al.
ISBN: 9789061538950 Year: 2009 Publisher: Brussel Mercatorfonds


Book
The Risk-Mitigation Value of the Transportation Worker Identification Credential: A Comprehensive Security Assessment of the TWIC Program
Authors: --- --- --- --- --- et al.
Year: 2020 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Transportation Worker Identification Credential (TWIC®) is one of multiple measures that the Maritime Transportation Security Act (MTSA) introduced to enhance security at U.S. ports. Anyone with unescorted access to a secure area at an MTSA-regulated facility, vessel, or outer continental shelf (OCS) facility must have a TWIC. Congress established TWIC to help prevent transportation security incidents. TWIC's primary function is to establish that the holder has passed a Transportation Security Administration (TSA) security threat assessment (STA); the TWIC card can also serve as identification. Each secure area at each regulated location must maintain an access control program and verify three things at every access point: identity, presence and validity of the TWIC card, and whether the person has a business purpose at that facility. Currently, facilities are required only to conduct visual verification of the TWIC card, either at each time of entry or at time of enrollment into a facility physical access control system (PACS). A pending regulation, which we call the TWIC-reader rule, would require that any high-risk facility electronically inspect the card and, using biometrics, match it to the holder. The governing legislation requires that an assessment of TWIC determine the program's value in mitigating the risk of terrorism and crime at ports. The U.S. Department of Homeland Security commissioned the Homeland Security Operational Analysis Center to complete that comprehensive assessment. In this report, the authors establish factors that increase or decrease TWIC's security value and determine what TWIC's value would need to be to offset the costs of establishing further access control requirements for facilities.

Keywords


Book
Risk-Informed Analysis of Transportation Worker Identification Credential Reader Requirements

Loading...
Export citation

Choose an application

Bookmark

Abstract

A 2016 U.S. Coast Guard (USCG) regulation, "Transportation Worker Identification Credential (TWIC)-Reader Requirements," requires certain maritime facilities determined to be of high risk to use electronic and biometric access control programs in the facilities' secure areas. The final version of this rule, known as the final reader rule, has been delayed (from 2020) until May 8, 2023, for three categories of facilities that handle certain dangerous cargoes (CDCs) in bulk. The USCG asked the Homeland Security Operational Analysis Center to reestimate the population of such regulated facilities that could be subject to the final reader rule delay, develop an objective risk assessment model for these facilities, and conduct a cost-benefit analysis of the regulation. This report describes the researchers' analytical efforts to address these three research areas. Because there is no database of Maritime Transportation Security Act-regulated facilities that has all the requisite information about CDCs that facilities handle in bulk, the researchers resorted to other data sources, such as the U.S. Environmental Protection Agency's databases, an online survey, and interviews, to estimate the facility population. For the facility risk model, they used the modeling approach for assessing potential consequence included in the risk engine of the Cybersecurity and Infrastructure Security Agency's Chemical Facility Anti-Terrorism Standards (CFATS) program, harmonizing the TWIC and CFATS programs in consequence assessment. Because there was no credible estimate for the probability of a transportation security incident, the researchers used a break-even analysis to assess whether the final reader rule is cost-effective.


Book
Out of Character : Decoding Chinese Calligraphy

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Listing 1 - 9 of 9
Sort by