![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
This work sets out to describe a fully automated Boolean System and to discuss theoretical problems in automatic retrieval of textual information. It details algorithms in each process in the system, including those deemed new in the process and those that are adaptable to the individual. Features include: a review of the principles of constructing a system, such as an information retrieval system; an analysis of basic concepts such as information need, information, information crisis and the notation of information retrieval; construction of an information retrieval system (methods, algorithms and approaches); and different approaches to evaluating the results of information retrieval).
This highly successful manual has served for nearly three decades as the definitive guide to the safe use of radioactive materials. Completely revised and updated, the fourth edition presents a new dimension by adding coverage of nonionizing radiation, and is thus concerned with the entire field of radiation protection. The author takes the novel approach of introducing the whole range of energies possessed by particles and electromagnetic waves at the beginning of the text, thus integrating coverage of ionizing and nonionizing radiation rather than considering them as two separate disciplines. He goes on to cover the entire spectrum of radiation sources, including radionuclides, x-ray machines, accelerators, nuclear reactors, power lines, microwave towers, and cellular phones. With its expanded coverage, including a broader focus on public health issues, this new volume will serve as an important training and reference resource, not only for research scientists, physicians, and engineers, but for regulatory officials, attorneys, engineers, and environmental health and safety professionals. The breadth of citations alone makes this resource invaluable.
The Combating Terrorism Center at West Point (CTC) launched the Harmony Project in order to release and analyze documents from the Department of Defense's classified Harmony Database. The Harmony Project unearths and releases documents that reveal the inner-functioning of al-Qaeda, its associated movements, and other security threats. Chapter 1-Foreign Fighters in Historical Perspective: The Case of Afghanistan By Vahid Brown Chapter 1 explains the role foreign fighters played during the anti-Soviet Jihad in Afghanistan during the 1980s, providing context that is critical to understanding the role that foreign fighters currently play in Iraq. Brown's discussion of Afghan Arabs alienating local Afghani mujahidin is particularly relevant considering the formation of anti-al-Qaeda movements in Iraq. The chapter also helps us measure the prospect of foreign fighters in Iraq contributing to violent movements outside of Iraq, whether in the Arab world, Europe, or United States. Chapter 2-The Demographics of Recruitment, Finances, and Suicide By Joseph Felter and Brian Fishman In Chapter 2, Felter and Fishman expand on their preliminary analysis of the Sinjar Records released in December 2007. Incorporating even more data on foreign fighters in Iraq and using new analytical techniques, Felter and Fishman assess the factors that may have contributed to foreign fighters traveling to Iraq and explore the networks that funnel those fighters to Iraq. They provide the first hard evidence that foreign fighters of Saudi origin contribute more money to al-Qaeda in Iraq (AQI) than individuals from other countries, explore the dynamics of AQI's logistics network in Syria, and offer an open-source assessment of the percentage of suicide attacks in Iraq committed by foreign fighters. Chapter 3-Bureaucratic Terrorists: Al-Qaeda in Iraq's Management and Finances By Jacob Shapiro In Chapter 3, Shapiro explores al-Qaeda in Iraq's finances and bureaucracy. Analyzing AQI's spending patterns and accounting structures, Shapiro provides new insights into what the organization prioritizes and how it controls its agents. Among other insights, Shapiro reveals that AQI receives a large percentage of its funding from foreign fighters and likely has become more bureaucratic to rein in operators who use violence wantonly and thereby degrade fundraising opportunities. Shapiro also offers creative recommendations on how to use these insights to undermine AQI. Chapter 4-Smuggling, Syria, and Spending By Anonymous Chapter 4 describes AQI's smuggling efforts between Syria and Iraq's Nineveh Province. Drawing on his extensive experience on the ground, the author describes smuggling networks and tribal relations, two elements critical for AQI's human smuggling and the movement of goods and money. Importantly, Jihadis looking to leave Iraq may use these same networks to exit the country. The author also assesses AQI's spending patterns in the border region. Chapter 5-Beyond Iraq: The Future of AQI By Peter Bergman Chapter 5 looks to the future. Where will Jihadis in Iraq go if they leave? Using historical analogies and an assessment of current political dynamics around the Middle East, Bergen analyzes AQI's interests and opportunities to bring Iraq-style violence to other locations, in the Mideast and beyond. He concludes that the number of fighters leaving Iraq will be relatively small, but they will be highly-skilled, and reminds us that a US withdrawal from Iraq will not necessarily end the flow of foreign fighters.
|
![]() ![]() You may like...
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan
Paperback
|