Sample records for foreign intelligence surveillance

  1. The Foreign Intelligence Surveillance Act: An Overview of the Statutory Framework and U.S. Foreign Intelligence Surveillance Court and U.S. Foreign Intelligence Surveillance Court of Review Decisions

    DTIC Science & Technology

    2007-02-15

    an application for electronic surveillance of an agent of a foreign power and for an FISC order renewing that surveillance, both subject to...Review) of an FISC order authorizing electronic surveillance of an agent of a foreign power, subject to restrictions flowing from the May 17th...their agents .”13 However, the guidance which the Court provided in Keith with respect to national security surveillance in a domestic context to some

  2. To provide for the public disclosure of information regarding surveillance activities under the Foreign Intelligence Surveillance Act of 1978.

    THOMAS, 113th Congress

    Rep. Perry, Scott [R-PA-4

    2013-12-12

    House - 01/27/2014 Referred to the Subcommittee on Crime, Terrorism, Homeland Security, and Investigations. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. 78 FR 36279 - Sunshine Act Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-17

    ... information pertaining to the PRISM-related activities and the Foreign Intelligence Surveillance Act. The...)(1), the Board determined, by recorded vote, that agency business requires that this meeting be...

  4. Information and the War against Terrorism, Part III: New Information-Related Laws and the Impact on Civil Liberties.

    ERIC Educational Resources Information Center

    Strickland, Lee S.

    2002-01-01

    Reviews provisions of information-related laws in light of the September 11th attacks and their impact on civil liberties. Highlights include the USA Patriot Act of 2001; law enforcement and the ECPA (Electronic Communications Privacy Act); intelligence and the FISA (Foreign Intelligence Surveillance Act of 1978); implications for information…

  5. Collaborating with the Private Sector

    DTIC Science & Technology

    2009-08-01

    private sector, laws, Patriot Act, FISA, FAR, Intellectual Property, Antitrust Law, Title 10, Title 50, FOIA, FACA, data classification, culture...33 Intellectual Property...Patriot Act) Foreign Intelligence Surveillance Act (FISA) Federal Acquisition Regulation (FAR) Intellectual Property Antitrust Law Title 10

  6. The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and Information Policy Research in Libraries: Issues, Impacts, and Questions for Libraries and Researchers

    ERIC Educational Resources Information Center

    Jaeger, Paul T.; McClure, Charles R.; Bertot, John Carlo; Snead, John T.

    2004-01-01

    While the USA PATRIOT Act has altered how certain types of federal intelligence investigations affect libraries, the act also greatly alters how researchers can study information policy issues related to libraries. To date, the gravity and scope of the act's implications for researchers of library services, resources, operations, and policies have…

  7. The Drone Court And Due Process

    DTIC Science & Technology

    2016-12-01

    killings. However, specific people were targeted through the use of drones; it could be argued that this does, in fact, fit the definition of...Court (FISC) and Foreign Intelligence Surveillance Act (FISA) are the same and used interchangeably. 9 Amos N. Guiora and Jeffrey S. Brand ...receives, and that judges use when deciding if the same executive branch can pursue surveillance in a given case. Guiora and Brand point out that

  8. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  9. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  10. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  11. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  12. 28 CFR 0.72 - National Security Division.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... relating to terrorism; (6) Prosecute matters involving torture, genocide, and war crimes to the extent such... the Foreign Intelligence Surveillance Act; (7) Prosecute Federal crimes involving national security... offenses (49 U.S.C. 46501-07); aircraft sabotage (18 U.S.C. 32); crimes against internationally protected...

  13. Cyberforce 2025: Crafting a Selection Program for Tomorrow’s Cyber Warriors

    DTIC Science & Technology

    2013-02-14

    One of the more current and commonly used adult IQ tests is the Wechsler Adult Intelligence Scale – fourth edition (WAIS- IV), which currently...LeMay Center for Doctrine Development and Education, 2011. David J. Kay, Terry J. Pudas, and Brett Young. Preparing the Pipeline: The...34 May/June 1973: 30-34. Times, The New York. Foreign Intelligence Surveillance Act (FISA). New York, September 13, 2012. Trollman, Capt David

  14. Civilian Demonstrations Near the Military Installation: Restraints on Military Surveillance and Other Intelligence Activities

    DTIC Science & Technology

    1992-03-01

    violent events linked by a nationwide foreign-sponsored conspiracy . However, there was never any evidence that the disturbances were other than a series... conspiracy , either foreign or domestic. Subcommittee on Constitutional Rights, Senate Committee on the Judiciary, 93d Cong., 1st Sess., Report on Military...DoD (para. D.l.g). 127 Conspiracy to use force in impeding federal government functions is prohibited by 18 U.S.C. § 2384 (1988)(Seditious Conspiracy

  15. 32 CFR Appendix E to Part 275 - Obtaining Access for Foreign Intelligence, Foreign Counterintelligence, and International...

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Obtaining Access for Foreign Intelligence..., App. E Appendix E to Part 275—Obtaining Access for Foreign Intelligence, Foreign Counterintelligence... financial institution (as identified at § 275.3) by an intelligence organization, as identified in DoD...

  16. 32 CFR Appendix E to Part 275 - Obtaining Access for Foreign Intelligence, Foreign Counterintelligence, and International...

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Obtaining Access for Foreign Intelligence..., App. E Appendix E to Part 275—Obtaining Access for Foreign Intelligence, Foreign Counterintelligence... financial institution (as identified at § 275.3) by an intelligence organization, as identified in DoD...

  17. 32 CFR Appendix E to Part 275 - Obtaining Access for Foreign Intelligence, Foreign Counterintelligence, and International...

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Obtaining Access for Foreign Intelligence..., App. E Appendix E to Part 275—Obtaining Access for Foreign Intelligence, Foreign Counterintelligence... financial institution (as identified at § 275.3) by an intelligence organization, as identified in DoD...

  18. 32 CFR Appendix E to Part 275 - Obtaining Access for Foreign Intelligence, Foreign Counterintelligence, and International...

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Obtaining Access for Foreign Intelligence..., App. E Appendix E to Part 275—Obtaining Access for Foreign Intelligence, Foreign Counterintelligence... financial institution (as identified at § 275.3) by an intelligence organization, as identified in DoD...

  19. 32 CFR Appendix E to Part 275 - Obtaining Access for Foreign Intelligence, Foreign Counterintelligence, and International...

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Obtaining Access for Foreign Intelligence..., App. E Appendix E to Part 275—Obtaining Access for Foreign Intelligence, Foreign Counterintelligence... financial institution (as identified at § 275.3) by an intelligence organization, as identified in DoD...

  20. 75 FR 43943 - Defense Science Board; Task Force on Counter Insurgency (COIN) Intelligence, Surveillance and...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-27

    ... Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations AGENCY: Department of... Force on Counter Insurgency (COIN) Intelligence, Surveillance and Reconnaissance (ISR) Operations will... Defense. These meetings will identify how DoD intelligence can most effectively support COIN operations...

  1. Security Vs. Liberty: How to Measure Privacy Costs in Domestic Surveillance Programs

    DTIC Science & Technology

    2014-03-01

    FBI’s definition, a rabble-rouser was “a person who tries to arouse people to violent action by appealing to their emotions , prejudices, et cetera.”55...information through a search engine 91 Send or receive email 88 Search a map or get driving directions 84 Read the news 78 Research health information 72...necessary to understand the value of the foreign intelligence, it is evidence of a crime, or it “indicates a threat of death or serious bodily harm.”187

  2. Satellite Vulnerabilities

    DTIC Science & Technology

    2008-02-18

    allies. 8  Satellites and Intelligence , Surveillance, and Reconnaissance We have become dependent also on our satellite surveillance assets...uninterrupted ISR”, with “space intelligence , surveillance, and reconnaissance (ISR) systems…fundamental to air power—especially to the execution...tremendous informational and intelligence advantage. But if we lose those satellites, or the links to them, we also lose the advantages of them, and

  3. National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-01-01

    execution of that budget. The National Intelligence Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  4. Intelligence and Metacognition as Predictors of Foreign Language Achievement: A Structural Equation Modeling Approach

    ERIC Educational Resources Information Center

    Pishghadam, Reza; Khajavy, Gholam Hassan

    2013-01-01

    This study examined the role of metacognition and intelligence in foreign language achievement on a sample of 143 Iranian English as a Foreign Language (EFL) learners. Participants completed Raven's Advanced Progressive Matrices as a measure of intelligence, and Metacognitive Awareness Inventory as a measure of metacognition. Learners' scores at…

  5. What Has Personality and Emotional Intelligence to Do with "Feeling Different" while Using a Foreign Language?

    ERIC Educational Resources Information Center

    Ozanska-Ponikwia, Katarzyna

    2012-01-01

    The present study investigates the link between personality traits (OCEAN Personality test), emotional intelligence (EI) (Trait Emotional Intelligence Questionnaire) and the notion of "feeling different" while using a foreign language among 102 Polish-English bilinguals and Polish L2 users of English who were immersed in a foreign language and…

  6. 2009 National Intelligence: A Consumer’s Guide

    DTIC Science & Technology

    2009-04-01

    Program (NIP), formerly known as the National Foreign Intelligence Program ( NFIP ), provides the resources needed to develop and maintain...Clandestine Service NCTC: National Counterterrorism Center NDIC: National Defense Intelligence College (DIA – formerly JMIC) NFIP : National Foreign...Coordination Center (ODNI) NIE: National Intelligence Estimate NIP: National Intelligence Program (formerly NFIP ) NIPRNet: Non-Secure Internet Protocol Router

  7. A Study of Multiple Intelligences, Foreign Language Success and Some Selected Variables

    ERIC Educational Resources Information Center

    Saricaoglu, Aysel; Arikan, Arda

    2009-01-01

    The aim of this study was to investigate the relationship between students' gender and intelligence types, the relationship between particular intelligence types and students' success in grammar, listening and writing in English as a foreign language and the relationship between parental education and students' types of intelligences. Preparatory…

  8. Intelligence Surveillance And Reconnaissance Full Motion Video Automatic Anomaly Detection Of Crowd Movements: System Requirements For Airborne Application

    DTIC Science & Technology

    The collection of Intelligence , Surveillance, and Reconnaissance (ISR) Full Motion Video (FMV) is growing at an exponential rate, and the manual... intelligence for the warfighter. This paper will address the question of how can automatic pattern extraction, based on computer vision, extract anomalies in

  9. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance.

    PubMed

    Smith, Frank L

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats.

  10. Malware and Disease: Lessons from Cyber Intelligence for Public Health Surveillance

    PubMed Central

    Smith, Frank L.

    2016-01-01

    Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analysis reveals that civilian cyber defense is more decentralized, private, and voluntary than public health in the United States. Most of these differences are due to political choices rather than technical necessities. In particular, political resistance to government institutions has shaped cyber intelligence over the past 30 years, which is a troubling sign for attempts to improve disease surveillance through local, state, and federal health departments. Information sharing about malware is also limited, despite information technology being integral to cyberspace. Such limits suggest that automation through electronic health records will not automatically improve public health surveillance. Still, certain aspects of information sharing and analysis for cyber defense are worth emulating or, at the very least, learning from to help detect and manage health threats. PMID:27564783

  11. Review of intelligent video surveillance with single camera

    NASA Astrophysics Data System (ADS)

    Liu, Ying; Fan, Jiu-lun; Wang, DianWei

    2012-01-01

    Intelligent video surveillance has found a wide range of applications in public security. This paper describes the state-of- the-art techniques in video surveillance system with single camera. This can serve as a starting point for building practical video surveillance systems in developing regions, leveraging existing ubiquitous infrastructure. In addition, this paper discusses the gap between existing technologies and the requirements in real-world scenario, and proposes potential solutions to reduce this gap.

  12. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  13. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  14. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  15. 28 CFR 16.74 - Exemption of National Security Division Systems-limited access.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Privacy Act pursuant to 5 U.S.C. 552a(j)(2), (k)(1), (2) and (5): Foreign Intelligence and... concerning him or her would hinder authorized United States intelligence activities by informing that...) Subsection (d)(1). Disclosure of foreign intelligence and counterintelligence information would interfere...

  16. Assessing Irregular Warfare: A Framework for Intelligence Analysis

    DTIC Science & Technology

    2008-01-01

    AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY SUBSTANCE ABUSE TERRORISM AND...Interim FSTC Foreign Science and Technology Center GMI general military intelligence IED improvised explosive device INSCOM Intelligence and Security...ground forces intelligence in the Department of Defense (DoD).1 NGIC was created in March 1995, when the U.S. Army Foreign Science and Technology

  17. Present situation and trend of precision guidance technology and its intelligence

    NASA Astrophysics Data System (ADS)

    Shang, Zhengguo; Liu, Tiandong

    2017-11-01

    This paper first introduces the basic concepts of precision guidance technology and artificial intelligence technology. Then gives a brief introduction of intelligent precision guidance technology, and with the help of development of intelligent weapon based on deep learning project in foreign: LRASM missile project, TRACE project, and BLADE project, this paper gives an overview of the current foreign precision guidance technology. Finally, the future development trend of intelligent precision guidance technology is summarized, mainly concentrated in the multi objectives, intelligent classification, weak target detection and recognition, intelligent between complex environment intelligent jamming and multi-source, multi missile cooperative fighting and other aspects.

  18. 14 CFR 1245.104 - Advance waivers.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... of business in the United States or is subject to the control of a foreign government; (2) When a... foreign intelligence or counter-intelligence activities that the restriction or elimination of the right...

  19. GLOBAL INTEGRATED ISR: A BETTER ORGANIZATIONAL CONSTRUCT FOR AIR FORCE LD/HD ISR

    DTIC Science & Technology

    2017-04-06

    Mr. Kevin S. Williams, LeMay Center Intelligence Directorate, United States Air Force 6 April 2017 DISTRIBUTION A. Approved for public...E-8 intelligence , surveillance, and reconnaissance (ISR) aircraft it refers to as Low Density/High Demand (LD/HD). Current worldwide demand for LD...management GFMAP Global Force Management Allocation Plan GIISR global integrated intelligence , surveillance, and reconnaissance ISIS Islamic

  20. The Perceptions of Community College Students to Foreign Language Acquisition Grounded in Multiple Intelligence Theory

    ERIC Educational Resources Information Center

    Wallace, Richard Le Roy Wayne

    2010-01-01

    The purpose of this qualitative study was to examine and gain a clearer understanding of the perceptions of foreign language learning of adult foreign language learners attending a South-West Missouri community college. This study was based on the Multiple Intelligence (MI) theory of Howard Gardner. It examined the perceptions of adult language…

  1. U.S. Army Workshop on Exploring Enterprise, System of Systems, System, and Software Architectures

    DTIC Science & Technology

    2009-03-01

    state of a net-centric intelligence /surveillance/reconnaissance (ISR) capability featuring DCGS by the middle of the next decade.5 In some situations...boundaries. The DoDAF has a relatively long history. It started as a Command, Control, Communications, Computers, Surveillance and Intelligence ...Army have needed to perform tasks such as: col- lect and analyze intelligence information; maneuver the force; target and provide fire support; conduct

  2. Vector-borne disease intelligence: strategies to deal with disease burden and threats.

    PubMed

    Braks, Marieta; Medlock, Jolyon M; Hubalek, Zdenek; Hjertqvist, Marika; Perrin, Yvon; Lancelot, Renaud; Duchyene, Els; Hendrickx, Guy; Stroo, Arjan; Heyman, Paul; Sprong, Hein

    2014-01-01

    Owing to the complex nature of vector-borne diseases (VBDs), whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of VBDs. Knowledge on the presence and distribution of vectors and the pathogens that they transmit is vital to the risk assessment process to permit effective early warning, surveillance, and control of VBDs. Upon accepting this reality, public health authorities face an ever-increasing range of possible surveillance targets and an associated prioritization process. Here, we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance, and context-based surveillance for EU member states to tailor the best surveillance strategy for control of VBDs in their geographic region. By classifying the surveillance structure into five different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for VBDs entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.

  3. Vector-Borne Disease Intelligence: Strategies to Deal with Disease Burden and Threats

    PubMed Central

    Braks, Marieta; Medlock, Jolyon M.; Hubalek, Zdenek; Hjertqvist, Marika; Perrin, Yvon; Lancelot, Renaud; Duchyene, Els; Hendrickx, Guy; Stroo, Arjan; Heyman, Paul; Sprong, Hein

    2014-01-01

    Owing to the complex nature of vector-borne diseases (VBDs), whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of VBDs. Knowledge on the presence and distribution of vectors and the pathogens that they transmit is vital to the risk assessment process to permit effective early warning, surveillance, and control of VBDs. Upon accepting this reality, public health authorities face an ever-increasing range of possible surveillance targets and an associated prioritization process. Here, we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance, and context-based surveillance for EU member states to tailor the best surveillance strategy for control of VBDs in their geographic region. By classifying the surveillance structure into five different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for VBDs entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure. PMID:25566522

  4. Defense Intelligence: Foreign Area/Language Needs and Academe.

    ERIC Educational Resources Information Center

    SRI International, Menlo Park, CA.

    The Department of Defense's (DOD) need for foreign language/area expertise was assessed, along with opportunities for the academic community to supplement government training. In addition to interviewing intelligence managers, questionnaires were administered to defense analysts to determine their background, training, and use of external…

  5. Utility and potential of rapid epidemic intelligence from internet-based sources.

    PubMed

    Yan, S J; Chughtai, A A; Macintyre, C R

    2017-10-01

    Rapid epidemic detection is an important objective of surveillance to enable timely intervention, but traditional validated surveillance data may not be available in the required timeframe for acute epidemic control. Increasing volumes of data on the Internet have prompted interest in methods that could use unstructured sources to enhance traditional disease surveillance and gain rapid epidemic intelligence. We aimed to summarise Internet-based methods that use freely-accessible, unstructured data for epidemic surveillance and explore their timeliness and accuracy outcomes. Steps outlined in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) checklist were used to guide a systematic review of research related to the use of informal or unstructured data by Internet-based intelligence methods for surveillance. We identified 84 articles published between 2006-2016 relating to Internet-based public health surveillance methods. Studies used search queries, social media posts and approaches derived from existing Internet-based systems for early epidemic alerts and real-time monitoring. Most studies noted improved timeliness compared to official reporting, such as in the 2014 Ebola epidemic where epidemic alerts were generated first from ProMED-mail. Internet-based methods showed variable correlation strength with official datasets, with some methods showing reasonable accuracy. The proliferation of publicly available information on the Internet provided a new avenue for epidemic intelligence. Methodologies have been developed to collect Internet data and some systems are already used to enhance the timeliness of traditional surveillance systems. To improve the utility of Internet-based systems, the key attributes of timeliness and data accuracy should be included in future evaluations of surveillance systems. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  6. Intelligence Spending and Appropriations: Issues for Congress

    DTIC Science & Technology

    2013-09-05

    while the MIP grew at a slower pace. The NIP budget in 2001 (then referred to as the National Foreign Intelligence Program— NFIP ) was roughly $24 billion...House Appropriations Committee (HAC) disclosure, adjusted for inflation. The Committee indicated that the Administration’s FY1995 NFIP request was...to shows funding for the National Foreign Intelligence Program. The FY1995 figure is therefore a useful proxy for the NFIP budget in FY2001. 13 DNI

  7. Using Multiple Intelligences To Improve Retention in Foreign Language Vocabulary Study.

    ERIC Educational Resources Information Center

    Anderson, Virginia B.

    The report describes an experiment for increasing retention of foreign language vocabulary by using multiple intelligence approaches and memory enhancement tools. The targeted population was approximately 100 seventh- and eighth-grade Latin students. Student difficulty with vocabulary retention had been ascribed to the teacher's emphasis on…

  8. Strategic Studies Quarterly. Volume 10, Number 2, Summer 2016

    DTIC Science & Technology

    2016-01-01

    munitions, and networked command, control, communications , com- puters, intelligence, surveillance, and reconnaissance (C4ISR) has been a vital... communications , space capabilities, and networked intelligence, surveillance, and recon- naissance (ISR). The rapid pace of this proliferation is...intensity akin to that of the Manhattan Project or the Apollo Program. Building upon recent actions by Congress and DOD leadership, the next secretary of

  9. 75 FR 35684 - Defense Federal Acquisition Regulation Supplement; Ownership or Control by a Foreign Government...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-23

    ... Undersecretary of Defense for Intelligence. Additionally, subparagraph (a)(4) of DFARS 252.209-7002, Disclosure... or controlled by a foreign government. DoD invites comments from small business concerns and other... Defense, Human Intelligence, Counterintelligence, and Security. (C) In accordance with 10 U.S.C. 2536(b)(1...

  10. Listening Comprehension Performance Viewed in the Light of Emotional Intelligence and Foreign Language Listening Anxiety

    ERIC Educational Resources Information Center

    Valizadeh, Mohammad Reza; Alavinia, Parviz

    2013-01-01

    The researchers in the current study were after probing the potential relationship between emotional intelligence, foreign language listening anxiety (FLLA), and listening comprehension performance of Iranian EFL learners. To this end, 233 participants, studying English language and literature at three different Universities in Urmia, were…

  11. 77 FR 57013 - Privacy Act; Implementation

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-17

    ... Act; Implementation AGENCY: Defense Intelligence Agency, DoD. ACTION: Direct final rule with request for comments. SUMMARY: The Defense Intelligence Agency is updating the Defense Intelligence Agency... records in the system of records notice LDIA 10-0002, Foreign Intelligence and Counterintelligence...

  12. On Using Intelligent Computer-Assisted Language Learning in Real-Life Foreign Language Teaching and Learning

    ERIC Educational Resources Information Center

    Amaral, Luiz A.; Meurers, Detmar

    2011-01-01

    This paper explores the motivation and prerequisites for successful integration of Intelligent Computer-Assisted Language Learning (ICALL) tools into current foreign language teaching and learning (FLTL) practice. We focus on two aspects, which we argue to be important for effective ICALL system development and use: (i) the relationship between…

  13. An intelligent surveillance platform for large metropolitan areas with dense sensor deployment.

    PubMed

    Fernández, Jorge; Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M; Carro, Belén; Sánchez-Esguevillas, Antonio; Alonso-López, Jesus A; Smilansky, Zeev

    2013-06-07

    This paper presents an intelligent surveillance platform based on the usage of large numbers of inexpensive sensors designed and developed inside the European Eureka Celtic project HuSIMS. With the aim of maximizing the number of deployable units while keeping monetary and resource/bandwidth costs at a minimum, the surveillance platform is based on the usage of inexpensive visual sensors which apply efficient motion detection and tracking algorithms to transform the video signal in a set of motion parameters. In order to automate the analysis of the myriad of data streams generated by the visual sensors, the platform's control center includes an alarm detection engine which comprises three components applying three different Artificial Intelligence strategies in parallel. These strategies are generic, domain-independent approaches which are able to operate in several domains (traffic surveillance, vandalism prevention, perimeter security, etc.). The architecture is completed with a versatile communication network which facilitates data collection from the visual sensors and alarm and video stream distribution towards the emergency teams. The resulting surveillance system is extremely suitable for its deployment in metropolitan areas, smart cities, and large facilities, mainly because cheap visual sensors and autonomous alarm detection facilitate dense sensor network deployments for wide and detailed coverage.

  14. Public Health Intelligence: Learning From the Ebola Crisis

    PubMed Central

    Weber, David Jay

    2015-01-01

    Today’s public health crises, as exemplified by the Ebola outbreak, lead to dramatic calls to action that typically include improved electronic monitoring systems to better prepare for, and respond to, similar occurrences in the future. Even a preliminary public health informatics evaluation of the current Ebola crisis exposes the need for enhanced coordination and sharing of trustworthy public health intelligence. We call for a consumer-centric model of public health intelligence and the formation of a national center to guide public health intelligence gathering and synthesis. Sharing accurate and actionable information with government agencies, health care practitioners, policymakers, and, critically, the general public, will mark a shift from doing public health surveillance on people to doing public health surveillance for people. PMID:26180978

  15. WANDERER IN THE MIST: THE SEARCH FOR INTELLIGENCE, SURVEILLANCE, AND RECONNAISSANCE (ISR) STRATEGY

    DTIC Science & Technology

    2017-06-01

    methodology that seeks to understand the significance of intelligence, surveillance, and reconnaissance (ISR) strategy at the operational level of war. The...qualitative approach, utilizing a within-case methodology , to empirically assess the relationship between ISR strategy and integrated effects...chapters two through four to determine the significance of ISR strategy at the operational level of war. The study’s qualitative methodology allows a

  16. Event detection for car park entries by video-surveillance

    NASA Astrophysics Data System (ADS)

    Coquin, Didier; Tailland, Johan; Cintract, Michel

    2007-10-01

    Intelligent surveillance has become an important research issue due to the high cost and low efficiency of human supervisors, and machine intelligence is required to provide a solution for automated event detection. In this paper we describe a real-time system that has been used for detecting car park entries, using an adaptive background learning algorithm and two indicators representing activity and identity to overcome the difficulty of tracking objects.

  17. Multiple Intelligences Theory and Foreign Language Education: Perspectives of College Students in a German Immersion Program

    ERIC Educational Resources Information Center

    Weber-Segler, Ellen

    2013-01-01

    The purpose of this qualitative research study was to explore and comprehend the role of Howard Gardner's theory of multiple intelligences (MI) in foreign language learning by analyzing the perspectives of college students in a German immersion program at a liberal arts college in the Midwest. Data collection included 10 in-depth student…

  18. Pre-Service English as a Foreign Language Teachers' Perceptions of the Relationship between Multiple Intelligences and Foreign Language Learning

    ERIC Educational Resources Information Center

    Savas, Perihan

    2012-01-01

    The relationship between intelligence, language, and learning is a challenging field of study. One way to study how this relationship occurs and works is to investigate the perceptions of advanced language learners. Therefore, this paper reports a study that was conducted to explore 160 pre-service English language teachers' perceptions about…

  19. Collaborative Point Paper on Border Surveillance Technology

    DTIC Science & Technology

    2007-12-01

    including; Unmanned Aerial Vehicles, Airships, and/or Aerostats, (RF, Electro-Optical, Infrared, Video) • Land- based Sensor Systems (Attended...warning. These ground- based systems are primarily short-range, up to around 500 meters. • Observation towers extend surveillance capabilities many...Foreign Companies Applicable Environment(s Foreign Companies Air Land Maritime Technology 25. BAE Systems PLC (BAE Systems Inc. is a US subsidiary

  20. Framework for objective evaluation of privacy filters

    NASA Astrophysics Data System (ADS)

    Korshunov, Pavel; Melle, Andrea; Dugelay, Jean-Luc; Ebrahimi, Touradj

    2013-09-01

    Extensive adoption of video surveillance, affecting many aspects of our daily lives, alarms the public about the increasing invasion into personal privacy. To address these concerns, many tools have been proposed for protection of personal privacy in image and video. However, little is understood regarding the effectiveness of such tools and especially their impact on the underlying surveillance tasks, leading to a tradeoff between the preservation of privacy offered by these tools and the intelligibility of activities under video surveillance. In this paper, we investigate this privacy-intelligibility tradeoff objectively by proposing an objective framework for evaluation of privacy filters. We apply the proposed framework on a use case where privacy of people is protected by obscuring faces, assuming an automated video surveillance system. We used several popular privacy protection filters, such as blurring, pixelization, and masking and applied them with varying strengths to people's faces from different public datasets of video surveillance footage. Accuracy of face detection algorithm was used as a measure of intelligibility (a face should be detected to perform a surveillance task), and accuracy of face recognition algorithm as a measure of privacy (a specific person should not be identified). Under these conditions, after application of an ideal privacy protection tool, an obfuscated face would be visible as a face but would not be correctly identified by the recognition algorithm. The experiments demonstrate that, in general, an increase in strength of privacy filters under consideration leads to an increase in privacy (i.e., reduction in recognition accuracy) and to a decrease in intelligibility (i.e., reduction in detection accuracy). Masking also shows to be the most favorable filter across all tested datasets.

  1. The Secret Air War Over France USAAF Special Operations Units in the French Campaign of 1944

    DTIC Science & Technology

    1992-05-01

    Branch, or SI, and its Special Operations Branch, known as SO. The Secret Intelligence Branch was responsible for collecting foreign intelligence...infiltrating its own intelligence agents into France. The Secret Intelligence Branch staff in London (SI/London) began planning for joint operations

  2. 5 CFR 630.1002 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... Intelligence Agency, the Defense Intelligence Agency, the National Security Agency, the Federal Bureau of... Administrative Personnel OFFICE OF PERSONNEL MANAGEMENT CIVIL SERVICE REGULATIONS ABSENCE AND LEAVE Voluntary... function is the conduct of foreign intelligence or counterintelligence activities. Available paid leave has...

  3. An Intelligent Active Video Surveillance System Based on the Integration of Virtual Neural Sensors and BDI Agents

    NASA Astrophysics Data System (ADS)

    Gregorio, Massimo De

    In this paper we present an intelligent active video surveillance system currently adopted in two different application domains: railway tunnels and outdoor storage areas. The system takes advantages of the integration of Artificial Neural Networks (ANN) and symbolic Artificial Intelligence (AI). This hybrid system is formed by virtual neural sensors (implemented as WiSARD-like systems) and BDI agents. The coupling of virtual neural sensors with symbolic reasoning for interpreting their outputs, makes this approach both very light from a computational and hardware point of view, and rather robust in performances. The system works on different scenarios and in difficult light conditions.

  4. Intelligent Surveillance Robot with Obstacle Avoidance Capabilities Using Neural Network

    PubMed Central

    2015-01-01

    For specific purpose, vision-based surveillance robot that can be run autonomously and able to acquire images from its dynamic environment is very important, for example, in rescuing disaster victims in Indonesia. In this paper, we propose architecture for intelligent surveillance robot that is able to avoid obstacles using 3 ultrasonic distance sensors based on backpropagation neural network and a camera for face recognition. 2.4 GHz transmitter for transmitting video is used by the operator/user to direct the robot to the desired area. Results show the effectiveness of our method and we evaluate the performance of the system. PMID:26089863

  5. Prevalence of Anti-Tuberculosis Drug Resistance in Foreign-Born Tuberculosis Cases in the U.S. and in Their Countries of Origin

    PubMed Central

    Taylor, Allison B.; Kurbatova, Ekaterina V.; Cegielski, J. Peter

    2012-01-01

    Background Foreign-born individuals comprise >50% of tuberculosis (TB) cases in the U.S. Since anti-TB drug resistance is more common in most other countries, when evaluating a foreign-born individual for TB, one must consider the risk of drug resistance. Naturally, clinicians query The Global Project on Anti-tuberculosis Drug Resistance Surveillance (Global DRS) which provides population-based data on the prevalence of anti-TB drug resistance in 127 countries starting in 1994. However, foreign-born persons in the U.S. are a biased sample of the population of their countries of origin, and Global DRS data may not accurately predict their risk of drug resistance. Since implementing drug resistance surveillance in 1993, the U.S. National TB Surveillance System (NTSS) has accumulated systematic data on over 130,000 foreign-born TB cases from more than 200 countries and territories. Our objective was to determine whether the prevalence of drug resistance among foreign-born TB cases correlates better with data from the Global DRS or with data on foreign-born TB cases in the NTSS. Methods and Findings We compared the prevalence of resistance to isoniazid and rifampin among foreign-born TB cases in the U.S., 2007–2009, with US NTSS data from 1993 to 2006 and with Global DRS data from 1994–2007 visually with scatterplots and statistically with correlation and linear regression analyses. Among foreign-born TB cases in the U.S., 2007–2009, the prevalence of isoniazid resistance and multidrug resistance (MDR, i.e. resistance to isoniazid and rifampin), correlated much better with 1993–2006 US surveillance data (isoniazid: r = 0.95, P<.001, MDR: r = 0.75, P<.001) than with Global DRS data, 1994–2007 (isoniazid: r = 0.55, P = .001; MDR: r = 0.50, P<.001). Conclusion Since 1993, the US NTSS has accumulated sufficient data on foreign-born TB cases to estimate the risk of drug resistance among such individuals better than data from the Global DRS. PMID:23145161

  6. An Intelligent Surveillance Platform for Large Metropolitan Areas with Dense Sensor Deployment

    PubMed Central

    Fernández, Jorge; Calavia, Lorena; Baladrón, Carlos; Aguiar, Javier M.; Carro, Belén; Sánchez-Esguevillas, Antonio; Alonso-López, Jesus A.; Smilansky, Zeev

    2013-01-01

    This paper presents an intelligent surveillance platform based on the usage of large numbers of inexpensive sensors designed and developed inside the European Eureka Celtic project HuSIMS. With the aim of maximizing the number of deployable units while keeping monetary and resource/bandwidth costs at a minimum, the surveillance platform is based on the usage of inexpensive visual sensors which apply efficient motion detection and tracking algorithms to transform the video signal in a set of motion parameters. In order to automate the analysis of the myriad of data streams generated by the visual sensors, the platform's control center includes an alarm detection engine which comprises three components applying three different Artificial Intelligence strategies in parallel. These strategies are generic, domain-independent approaches which are able to operate in several domains (traffic surveillance, vandalism prevention, perimeter security, etc.). The architecture is completed with a versatile communication network which facilitates data collection from the visual sensors and alarm and video stream distribution towards the emergency teams. The resulting surveillance system is extremely suitable for its deployment in metropolitan areas, smart cities, and large facilities, mainly because cheap visual sensors and autonomous alarm detection facilitate dense sensor network deployments for wide and detailed coverage. PMID:23748169

  7. 5 CFR 432.102 - Coverage.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ...) The Government Printing Office. (d) Agencies excluded. This part does not apply to: (1) A Government corporation; (2) The Central Intelligence Agency; (3) The Defense Intelligence Agency; (4) The National... principal function of which is the conduct of foreign intelligence or counterintelligence activities; (6...

  8. The Real Rebalancing: American Diplomacy and the Tragedy of President Obama’s Foreign Policy

    DTIC Science & Technology

    2015-10-01

    engagement” to its list of warfight- ing functions, along with mission command, move- ment and maneuver, intelligence , fires, sustainment, and protection...technologies, and foreign intelligence collection. Even earlier, see National Security Strategy, Washington, DC: The White House, August 1991, p. 8... Malnutrition , illiteracy and poverty put dangerous pressures on democratic institutions as hungry, uneducated or poorly 33 housed citizens are ripe for

  9. 77 FR 40630 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-10

    ... the United States against terrorist and foreign intelligence threats and to enforce U.S. criminal laws..., informants, sources, bystanders, law enforcement personnel, intelligence personnel, other responders... intelligence operation; individuals who are identified in open source information or commercial databases, or...

  10. Framework for the Intelligent Transportation System (ITS) Evaluation : ITS Integration Activities

    DOT National Transportation Integrated Search

    2006-08-01

    Intelligent Transportation Systems (ITS) represent a significant opportunity to improve the efficiency and safety of the surface transportation system. ITS includes technologies to support information processing, communications, surveillance and cont...

  11. The impact of phonetic dissimilarity on the perception of foreign accented speech

    NASA Astrophysics Data System (ADS)

    Weil, Shawn A.

    2003-10-01

    Non-normative speech (i.e., synthetic speech, pathological speech, foreign accented speech) is more difficult to process for native listeners than is normative speech. Does perceptual dissimilarity affect only intelligibility, or are there other costs to processing? The current series of experiments investigates both the intelligibility and time course of foreign accented speech (FAS) perception. Native English listeners heard single English words spoken by both native English speakers and non-native speakers (Mandarin or Russian). Words were chosen based on the similarity between the phonetic inventories of the respective languages. Three experimental designs were used: a cross-modal matching task, a word repetition (shadowing) task, and two subjective ratings tasks which measured impressions of accentedness and effortfulness. The results replicate previous investigations that have found that FAS significantly lowers word intelligibility. Furthermore, in FAS as well as perceptual effort, in the word repetition task, correct responses are slower to accented words than to nonaccented words. An analysis indicates that both intelligibility and reaction time are, in part, functions of the similarity between the talker's utterance and the listener's representation of the word.

  12. An intelligent crowdsourcing system for forensic analysis of surveillance video

    NASA Astrophysics Data System (ADS)

    Tahboub, Khalid; Gadgil, Neeraj; Ribera, Javier; Delgado, Blanca; Delp, Edward J.

    2015-03-01

    Video surveillance systems are of a great value for public safety. With an exponential increase in the number of cameras, videos obtained from surveillance systems are often archived for forensic purposes. Many automatic methods have been proposed to do video analytics such as anomaly detection and human activity recognition. However, such methods face significant challenges due to object occlusions, shadows and scene illumination changes. In recent years, crowdsourcing has become an effective tool that utilizes human intelligence to perform tasks that are challenging for machines. In this paper, we present an intelligent crowdsourcing system for forensic analysis of surveillance video that includes the video recorded as a part of search and rescue missions and large-scale investigation tasks. We describe a method to enhance crowdsourcing by incorporating human detection, re-identification and tracking. At the core of our system, we use a hierarchal pyramid model to distinguish the crowd members based on their ability, experience and performance record. Our proposed system operates in an autonomous fashion and produces a final output of the crowdsourcing analysis consisting of a set of video segments detailing the events of interest as one storyline.

  13. Robust Behavior Recognition in Intelligent Surveillance Environments.

    PubMed

    Batchuluun, Ganbayar; Kim, Yeong Gon; Kim, Jong Hyun; Hong, Hyung Gil; Park, Kang Ryoung

    2016-06-30

    Intelligent surveillance systems have been studied by many researchers. These systems should be operated in both daytime and nighttime, but objects are invisible in images captured by visible light camera during the night. Therefore, near infrared (NIR) cameras, thermal cameras (based on medium-wavelength infrared (MWIR), and long-wavelength infrared (LWIR) light) have been considered for usage during the nighttime as an alternative. Due to the usage during both daytime and nighttime, and the limitation of requiring an additional NIR illuminator (which should illuminate a wide area over a great distance) for NIR cameras during the nighttime, a dual system of visible light and thermal cameras is used in our research, and we propose a new behavior recognition in intelligent surveillance environments. Twelve datasets were compiled by collecting data in various environments, and they were used to obtain experimental results. The recognition accuracy of our method was found to be 97.6%, thereby confirming the ability of our method to outperform previous methods.

  14. U.S. Reliance on Foreign IT: Mitigating Risks Associated with Foreign Sources of Hardware Components, Summer 2008 - Project 08-03

    DTIC Science & Technology

    2008-08-01

    REPORT MAY 2008 - AUGUST 2008 U.S. Reliance on Foreign IT: Mitigating Risks Associated with Foreign Sources of Hardware Components N/A N/A N/A 08...Clinger-Cohen Act CIA Central Intelligence Agency CIO Chief Information Officer CMOS Complimentary Metal -Oxide Semiconductor DARPA Defense Advanced

  15. The Intelligence Problem of Policymakers in Counterinsurgency: Asking And Answering the Right Questions

    DTIC Science & Technology

    2013-12-01

    explosive device ISR intelligence, surveillance and reconnaissance J2 joint staff intelligence section NATO North Atlantic Treaty Organization OSINT open...commonly referring to the technical means of collection to the exclusion of HUMINT, open source intelligence ( OSINT ), and other information coming...is using to gain popular support or to delegitimize the supported government. The 10th Mountain Division determined OSINT was an important component

  16. Multiple Intelligences and Language Learning Strategies: Investigating Possible Relations

    ERIC Educational Resources Information Center

    Akbari, Ramin; Hosseini, Kobra

    2008-01-01

    The present study was conducted to investigate the existence of any possible relationship between the use of language learning strategies and multiple intelligences' scores of foreign language learners of English. Ninety subjects participated in the study. To measure the participants' multiple intelligence scores, MIDAS, a commercially designed…

  17. Automated Knowledge Generation with Persistent Surveillance Video

    DTIC Science & Technology

    2008-03-26

    5 2.1 Artificial Intelligence . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Formal Logic . . . . . . . . . . . . . . . . . . . 6 2.1.2...background of Artificial Intelligence and the reasoning engines that will be applied to generate knowledge from data. Section 2.2 discusses background on...generation from persistent video. 4 II. Background In this chapter, we will discuss the background of Artificial Intelligence, Semantic Web, image

  18. The Russian Way of Warfare

    DTIC Science & Technology

    2017-01-01

    against any of the country’s neighbors, and Russia has invested heavily in intelligence , surveillance, and reconnaissance (ISR) capabilities to...annexation of Crimea and the destabilization of eastern Ukraine in the vicinity of Donetsk and Luhansk. Russian use of Spetsnaz, intelligence services...greater escalation risk. Russian use of Spetsnaz, intelligence services, and paramilitaries could be an important element of a conflict in

  19. iTRAC : intelligent video compression for automated traffic surveillance systems.

    DOT National Transportation Integrated Search

    2010-08-01

    Non-intrusive video imaging sensors are commonly used in traffic monitoring : and surveillance. For some applications it is necessary to transmit the video : data over communication links. However, due to increased requirements of : bitrate this mean...

  20. Benefits of Applying Predictive Intelligence to the Space Situational Awareness (SSA) Mission

    NASA Astrophysics Data System (ADS)

    Lane, B.; Mann, B.; Millard, C.

    Recent events have heightened the interest in providing improved Space Situational Awareness (SSA) to the warfighter using novel techniques that are affordable and effective. The current Space Surveillance Network (SSN) detects, tracks, catalogs and identifies artificial objects orbiting earth and provides information on Resident Space Objects (RSO) as well as new foreign launch (NFL) satellites. The reactive nature of the SSN provides little to no warning on changes to the expected states of these RSOs or NFLs. This paper will detail the use of the historical data collected on RSOs to characterize what their steady state is, proactively help identify when changes or anomalies have occurred using a pattern-of-like activity based intelligence approach, and apply dynamic, adaptive mission planning to the observables that lead up to a NFL. Multiple hypotheses will be carried along with the intent or the changes to the steady state to assist the SSN in tasking the various sensors in the network to collect the relevant data needed to help prune the number of hypotheses by assigning likelihood to each of those activities. Depending on the hypothesis and thresholds set, these likelihoods will then be used in turn to alert the SSN operator with changes to the steady state, prioritize additional data collections, and provide a watch list of likely next activities.

  1. Northeast Artificial Intelligence Consortium (NAIC). Volume 12. Computer Architecture for Very Large Knowledge Bases

    DTIC Science & Technology

    1990-12-01

    data rate to the electronics would be much lower on the average and the data much "richer" in information. Intelligent use of...system bottleneck, a high data rate should be provided by I/O systems. 2. machines with intelligent storage management specially designed for logic...management information processing, surveillance sensors, intelligence data collection and handling, solid state sciences, electromagnetics, and propagation, and electronic reliability/maintainability and compatibility.

  2. 32 CFR 2001.55 - Foreign disclosure of classified information.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... foreign government or international organization of governments, or any element thereof, in accordance... Intelligence may issue policy directives or guidelines pursuant to section 6.2(b) of the Order that modify such...

  3. 32 CFR 2001.55 - Foreign disclosure of classified information.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... foreign government or international organization of governments, or any element thereof, in accordance... Intelligence may issue policy directives or guidelines pursuant to section 6.2(b) of the Order that modify such...

  4. 32 CFR 2001.55 - Foreign disclosure of classified information.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... foreign government or international organization of governments, or any element thereof, in accordance... Intelligence may issue policy directives or guidelines pursuant to section 6.2(b) of the Order that modify such...

  5. 32 CFR 2001.55 - Foreign disclosure of classified information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... foreign government or international organization of governments, or any element thereof, in accordance... Intelligence may issue policy directives or guidelines pursuant to section 6.2(b) of the Order that modify such...

  6. 32 CFR 2001.55 - Foreign disclosure of classified information.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... foreign government or international organization of governments, or any element thereof, in accordance... Intelligence may issue policy directives or guidelines pursuant to section 6.2(b) of the Order that modify such...

  7. 75 FR 76664 - Commerce Control List: Revising Descriptions of Items and Foreign Availability

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-09

    ... intelligence advantage; and the availability of the item outside certain groups of countries. DATES: Comments... an item provides the United States with a military or intelligence advantage and (b) the availability... military or intelligence advantage to the United States. Tier 2 items are almost exclusively available from...

  8. Intelligent route surveillance

    NASA Astrophysics Data System (ADS)

    Schoemaker, Robin; Sandbrink, Rody; van Voorthuijsen, Graeme

    2009-05-01

    Intelligence on abnormal and suspicious behaviour along roads in operational domains is extremely valuable for countering the IED (Improvised Explosive Device) threat. Local sensor networks at strategic spots can gather data for continuous monitoring of daily vehicle activity. Unattended intelligent ground sensor networks use simple sensing nodes, e.g. seismic, magnetic, radar, or acoustic, or combinations of these in one housing. The nodes deliver rudimentary data at any time to be processed with software that filters out the required information. At TNO (Netherlands Organisation for Applied Scientific Research) research has started on how to equip a sensor network with data analysis software to determine whether behaviour is suspicious or not. Furthermore, the nodes should be expendable, if necessary, and be small in size such that they are hard to detect by adversaries. The network should be self-configuring and self-sustaining and should be reliable, efficient, and effective during operational tasks - especially route surveillance - as well as robust in time and space. If data from these networks are combined with data from other remote sensing devices (e.g. UAVs (Unmanned Aerial Vehicles)/aerostats), an even more accurate assessment of the tactical situation is possible. This paper shall focus on the concepts of operation towards a working intelligent route surveillance (IRS) research demonstrator network for monitoring suspicious behaviour in IED sensitive domains.

  9. Sources and Levels of Stress among 70th Intelligence, Surveillance, and Reconnaissance Wing Intelligence Operators and Support Personnel

    DTIC Science & Technology

    2013-03-01

    personnel had responses indicative of the syndrome of burnout (i.e., simultaneously reporting high exhaustion, high cynicism, and low professional...as well as levels of burnout , psychological distress, and post-traumatic stress disorder symptoms among United States Air Force 70th Intelligence...revealed lower rates of burnout and psychological distress among 70 ISRW personnel when compared to intelligence operators in other arenas of the 25th Air

  10. Development of a special topics course on intelligent transportation systems for the Zachry Department of Civil Engineering of Texas A&M University.

    DOT National Transportation Integrated Search

    2009-08-31

    With Intelligent Transportation Systems (ITS), engineers and system integrators blend emerging : detection/surveillance, communications, and computer technologies with transportation management and : control concepts to improve the safety and mobilit...

  11. A Mexican Study of Multiple Intelligences for Pre-Service Teachers of English as a Foreign Language

    ERIC Educational Resources Information Center

    Tapia Carlín, Rebeca Elena; Castillo Salazar, María del Carmen; Velázquez Cortés, Susana

    2013-01-01

    This article describes a study conducted in a Mexican English teacher education program about multiple intelligences. Seventy-four first year students participated in the study. Findings reveal that the highest kinds of intelligences were the bodily kinesthetic, the interpersonal, the intrapersonal, and the musical; the lowest ones were the…

  12. An Empirical Examination of the Association between Multiple Intelligences and Language Learning Self-Efficacy among TEFL University Students

    ERIC Educational Resources Information Center

    Moafian, Fatemeh; Ebrahimi, Mohammad Reza

    2015-01-01

    The current study investigated the association between multiple intelligences and language learning efficacy expectations among TEFL (Teaching English as a Foreign Language) university students. To fulfill the aim of the study, 108 junior and senior TEFL students were asked to complete the "Multiple Intelligence Developmental Assessment…

  13. Implications for Intelligent Tutoring Systems for Research and Practice in Foreign Language Learning, NFLC Occasional Papers.

    ERIC Educational Resources Information Center

    Ginsberg, Ralph B.

    Most of the now commonplace computer-assisted instruction (CAI) uses computers to increase the capacity to perform logical, numerical, and symbolic computations. However, computers are an interactive and potentially intelligent medium. The implications of artificial intelligence (AI) for learning are more radical than those for traditional CAI. AI…

  14. Out of the Blue: NATO SOF Air Wing

    DTIC Science & Technology

    2012-03-01

    surveillance, targeting, and reconnaissance aircraft . This research also examines NSHQ’s training and readiness organizational structure, and proposes...mix contains rotary-wing and fixed-wing aviation platforms, as well as intelligence, surveillance, targeting, and reconnaissance aircraft . This...METHODOLOGY ..........................................................................................9  II.  AIRCRAFT CATEGORIZATION

  15. 14 CFR § 1203.400 - Specific classifying guidance.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... and operational information and material, and in some exceptional cases scientific information falling... activities), intelligence sources or methods, or cryptology; (d) Foreign relations or foreign activities of the United States, including confidential sources; (e) Scientific, technological, or economic matters...

  16. Intelligent Classification in Huge Heterogeneous Data Sets

    DTIC Science & Technology

    2015-06-01

    Competencies DoD Department of Defense GMTI Ground Moving Target Indicator ISR Intelligence, Surveillance and Reconnaissance NCD Noncoherent Change...Detection OCR Optical Character Recognition PCA Principal Component Analysis SAR Synthetic Aperture Radar SVD Singular Value Decomponsition USPS United States Postal Service 8 Approved for Public Release; Distribution Unlimited.

  17. Military Transformation: Intelligence, Surveillance and Reconnaissance

    DTIC Science & Technology

    2003-01-17

    http:// ww2 .pstripes.osd.mil/01/research1.html]. The Air Force is the largest military provider of surveillance and reconnaissance as it operates most... Infrared System both had funding requests reduced. The cuts were due primarily to seriously escalating costs and program management issues.101 The DOD

  18. Knowledge-based understanding of aerial surveillance video

    NASA Astrophysics Data System (ADS)

    Cheng, Hui; Butler, Darren

    2006-05-01

    Aerial surveillance has long been used by the military to locate, monitor and track the enemy. Recently, its scope has expanded to include law enforcement activities, disaster management and commercial applications. With the ever-growing amount of aerial surveillance video acquired daily, there is an urgent need for extracting actionable intelligence in a timely manner. Furthermore, to support high-level video understanding, this analysis needs to go beyond current approaches and consider the relationships, motivations and intentions of the objects in the scene. In this paper we propose a system for interpreting aerial surveillance videos that automatically generates a succinct but meaningful description of the observed regions, objects and events. For a given video, the semantics of important regions and objects, and the relationships between them, are summarised into a semantic concept graph. From this, a textual description is derived that provides new search and indexing options for aerial video and enables the fusion of aerial video with other information modalities, such as human intelligence, reports and signal intelligence. Using a Mixture-of-Experts video segmentation algorithm an aerial video is first decomposed into regions and objects with predefined semantic meanings. The objects are then tracked and coerced into a semantic concept graph and the graph is summarized spatially, temporally and semantically using ontology guided sub-graph matching and re-writing. The system exploits domain specific knowledge and uses a reasoning engine to verify and correct the classes, identities and semantic relationships between the objects. This approach is advantageous because misclassifications lead to knowledge contradictions and hence they can be easily detected and intelligently corrected. In addition, the graph representation highlights events and anomalies that a low-level analysis would overlook.

  19. How is NATO Meeting the Challenge of Cyberspace

    DTIC Science & Technology

    2017-12-21

    surveillance cameras. We also saw the first attacks driven by artificial intelligence , and increasing evidence of collusion between state... intelligence services and organized crime networks. Yet it is not the much discussed theme of the economic damage inflicted by cyber crime in the past year that...structural sabotage. Although companies in other countries were also affected by NotPetya, 80 percent of the impact was in Ukraine.1 Intelligence

  20. Extracting foreground ensemble features to detect abnormal crowd behavior in intelligent video-surveillance systems

    NASA Astrophysics Data System (ADS)

    Chan, Yi-Tung; Wang, Shuenn-Jyi; Tsai, Chung-Hsien

    2017-09-01

    Public safety is a matter of national security and people's livelihoods. In recent years, intelligent video-surveillance systems have become important active-protection systems. A surveillance system that provides early detection and threat assessment could protect people from crowd-related disasters and ensure public safety. Image processing is commonly used to extract features, e.g., people, from a surveillance video. However, little research has been conducted on the relationship between foreground detection and feature extraction. Most current video-surveillance research has been developed for restricted environments, in which the extracted features are limited by having information from a single foreground; they do not effectively represent the diversity of crowd behavior. This paper presents a general framework based on extracting ensemble features from the foreground of a surveillance video to analyze a crowd. The proposed method can flexibly integrate different foreground-detection technologies to adapt to various monitored environments. Furthermore, the extractable representative features depend on the heterogeneous foreground data. Finally, a classification algorithm is applied to these features to automatically model crowd behavior and distinguish an abnormal event from normal patterns. The experimental results demonstrate that the proposed method's performance is both comparable to that of state-of-the-art methods and satisfies the requirements of real-time applications.

  1. DSB Task Force on Cyber Supply Chain

    DTIC Science & Technology

    2017-02-06

    27 3.4 Cybersecurity for Commercial and Open Source Components...Communications and Intelligence ASD(L&MR): Assistant Secretary of Defense for Logistics and Materiel Readiness ASD(R&E): Assistant Secretary of Defense...system BSIMM: Building Security in Maturity Model C4ISR: command, control, communications, computers, intelligence , surveillance and

  2. 144th Fighter Wing

    Science.gov Websites

    , the wing provides agile combat support, and intelligence, surveillance and reconnaissance to combatant the U.S. Air Force AF Week in Photos Senior leaders meet with industry to discuss utilizing artificial intelligence and quantum science throughout the Air Force AF announces 2018 Blacks in Government Meritorious

  3. Close ISR Support: Re-organizing the Combined Forces Air Component Commander’s Intelligence, Surveillance and Reconnaissance Processes and Agencies

    DTIC Science & Technology

    2009-12-01

    instruction, searching existing data sources , gathering and maintaining the data needed, and completing and reviewing the collection of information...146 1. Allocation vs. Apportionment .........................................................146 2. Collection Management Authority...290 D. MEASUREMENT AND SIGNATURE INTELLIGENCE .....................291 E. OPEN- SOURCE

  4. A Commonsense Approach to Intelligence, Surveillance, and Reconnaissance Operations

    DTIC Science & Technology

    2016-09-01

    effectively.  Notes 1. Gordon Lubold, “Pentagon to Sharply Expand U.S. Drone Flights over Next Four Years,” Wall Street Journal, 16 August 2015, http...white paper, 2015. 14. Carl Rhodes, Jeff Hagen, and Mark Westergren, A Strategies-to-Tasks Framework for Planning and Executing Intelligence

  5. 76 FR 25407 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... INFORMATION CONTACT: Assistant Director, Compliance Outreach & Implementation, Office of Foreign Assets... their organizations on a worldwide basis with the objective of denying their businesses and agents... of the Central Intelligence Agency, the Director of the Federal Bureau of Investigation, the...

  6. Sustainable Model for Public Health Emergency Operations Centers for Global Settings.

    PubMed

    Balajee, S Arunmozhi; Pasi, Omer G; Etoundi, Alain Georges M; Rzeszotarski, Peter; Do, Trang T; Hennessee, Ian; Merali, Sharifa; Alroy, Karen A; Phu, Tran Dac; Mounts, Anthony W

    2017-10-01

    Capacity to receive, verify, analyze, assess, and investigate public health events is essential for epidemic intelligence. Public health Emergency Operations Centers (PHEOCs) can be epidemic intelligence hubs by 1) having the capacity to receive, analyze, and visualize multiple data streams, including surveillance and 2) maintaining a trained workforce that can analyze and interpret data from real-time emerging events. Such PHEOCs could be physically located within a ministry of health epidemiology, surveillance, or equivalent department rather than exist as a stand-alone space and serve as operational hubs during nonoutbreak times but in emergencies can scale up according to the traditional Incident Command System structure.

  7. China Naval Modernization: Implications for U.S. Navy Capabilities Background and Issues for Congress

    DTIC Science & Technology

    2016-05-31

    control, communications, computers, intelligence , surveillance, and reconnaissance) systems. China’s naval modernization effort also includes...developments involving China, 1 2015 and 2009 reports on China’s navy from the Office of Naval Intelligence (ONI), 2 published reference sources such as...Naval Intelligence , The PLA Navy, New Capabilities and Missions for the 21st Century, undated but released in April 2015, 47 pp., and The People’s

  8. Posturing Tactical ISR Beyond The Umbilical Cord

    DTIC Science & Technology

    2017-02-03

    intelligence sensors, it carries a lethal payload of ordinance for strike and or close air support missions. In fact, world media have discussed the MQ-9’s...awareness all their visual and signal intelligence sensors provide is a force multiplier that enhances mission success significantly. For example, when...on C-17 Photo Source http://www.aircav.com/dodphoto/dod98/mh60-002rs.jpg 407MRH multirole armed ISR ( intelligence , surveillance, reconnaissance

  9. A Vision-Based Driver Nighttime Assistance and Surveillance System Based on Intelligent Image Sensing Techniques and a Heterogamous Dual-Core Embedded System Architecture

    PubMed Central

    Chen, Yen-Lin; Chiang, Hsin-Han; Chiang, Chuan-Yen; Liu, Chuan-Ming; Yuan, Shyan-Ming; Wang, Jenq-Haur

    2012-01-01

    This study proposes a vision-based intelligent nighttime driver assistance and surveillance system (VIDASS system) implemented by a set of embedded software components and modules, and integrates these modules to accomplish a component-based system framework on an embedded heterogamous dual-core platform. Therefore, this study develops and implements computer vision and sensing techniques of nighttime vehicle detection, collision warning determination, and traffic event recording. The proposed system processes the road-scene frames in front of the host car captured from CCD sensors mounted on the host vehicle. These vision-based sensing and processing technologies are integrated and implemented on an ARM-DSP heterogamous dual-core embedded platform. Peripheral devices, including image grabbing devices, communication modules, and other in-vehicle control devices, are also integrated to form an in-vehicle-embedded vision-based nighttime driver assistance and surveillance system. PMID:22736956

  10. A vision-based driver nighttime assistance and surveillance system based on intelligent image sensing techniques and a heterogamous dual-core embedded system architecture.

    PubMed

    Chen, Yen-Lin; Chiang, Hsin-Han; Chiang, Chuan-Yen; Liu, Chuan-Ming; Yuan, Shyan-Ming; Wang, Jenq-Haur

    2012-01-01

    This study proposes a vision-based intelligent nighttime driver assistance and surveillance system (VIDASS system) implemented by a set of embedded software components and modules, and integrates these modules to accomplish a component-based system framework on an embedded heterogamous dual-core platform. Therefore, this study develops and implements computer vision and sensing techniques of nighttime vehicle detection, collision warning determination, and traffic event recording. The proposed system processes the road-scene frames in front of the host car captured from CCD sensors mounted on the host vehicle. These vision-based sensing and processing technologies are integrated and implemented on an ARM-DSP heterogamous dual-core embedded platform. Peripheral devices, including image grabbing devices, communication modules, and other in-vehicle control devices, are also integrated to form an in-vehicle-embedded vision-based nighttime driver assistance and surveillance system.

  11. 75 FR 14255 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-24

    ... FURTHER INFORMATION CONTACT: Assistant Director, Compliance Outreach & Implementation, Office of Foreign... worldwide basis, with the objective of denying their businesses and agents access to the U.S. financial... Secretary of the Treasury consults with the Attorney General, the Director of the Central Intelligence...

  12. 75 FR 36474 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-06-25

    ... FURTHER INFORMATION CONTACT: Assistant Director, Compliance Outreach & Implementation, Office of Foreign... worldwide basis, with the objective of denying their businesses and agents access to the U.S. financial... Secretary of the Treasury consults with the Attorney General, the Director of the Central Intelligence...

  13. Manned Airborne Intelligence, Surveillance, and Reconnaissance: Strategic, Tactical . . . Both?

    DTIC Science & Technology

    2012-12-01

    Program, 1996), 97, http://www.dtic.mil /cgi-bin/GetTRDoc?AD=ADA442835&Location=U2&doc=GetTRDoc.pdf. 17. Quoted in William E. Burrows , By Any Means...41. Larry Tart and Robert Keefe, The Price of Vigilance: Attacks on American Surveillance Flights (New York: Ballantine Books, 2001), 196. 42. Ibid

  14. Integrated Air Surveillance Concept of Operations

    DTIC Science & Technology

    2011-11-01

    information, intelligence, weather data, and other situational awareness-related information. 4.2.4 Shared Services Automated processing of sensor and...other surveillance information will occur through shared services , accessible through an enterprise network infrastructure, that provide for collecting...also be provided, such as information discovery and translation. The IS architecture effort will identify specific shared services . Shared

  15. Life of an Idea: DLIFLC Annual Program Review.

    ERIC Educational Resources Information Center

    Woytak, Lidia

    1999-01-01

    Discusses the Defense Language Institute's Foreign Language Center's (DLIFLC) annual program review. Representatives from the Army, Air Force, Marine Corps, HQ TRADOC, National Security Agency, Defense Intelligence Agency, and the Office of the Assistant Secretary of Defense for Command, Control, Communication, and Intelligence met to discuss…

  16. Can’t We All Just Get Along? Improving the Law Enforcement-Intelligence Community Relationship

    DTIC Science & Technology

    2007-06-01

    program that honored analysts, executives, authors, and agencies for exceptional intelligence writing and products. Some cross- pollination between...enforcement was primarily still reactive rather than proactive.8 There was more evidence of cross- pollination between local law enforcement and members of...capability, infrastructure, and other conventional foreign intelligence problems. Over the years, these CD analysts had little if any interaction or

  17. Netwar

    NASA Astrophysics Data System (ADS)

    Keen, Arthur A.

    2006-04-01

    This paper describes technology being developed at 21st Century Technologies to automate Computer Network Operations (CNO). CNO refers to DoD activities related to Attacking and Defending Computer Networks (CNA & CND). Next generation cyber threats are emerging in the form of powerful Internet services and tools that automate intelligence gathering, planning, testing, and surveillance. We will focus on "Search-Engine Hacks", queries that can retrieve lists of router/switch/server passwords, control panels, accessible cameras, software keys, VPN connection files, and vulnerable web applications. Examples include "Titan Rain" attacks against DoD facilities and the Santy worm, which identifies vulnerable sites by searching Google for URLs containing application-specific strings. This trend will result in increasingly sophisticated and automated intelligence-driven cyber attacks coordinated across multiple domains that are difficult to defeat or even understand with current technology. One traditional method of CNO relies on surveillance detection as an attack predictor. Unfortunately, surveillance detection is difficult because attackers can perform search engine-driven surveillance such as with Google Hacks, and avoid touching the target site. Therefore, attack observables represent only about 5% of the attacker's total attack time, and are inadequate to provide warning. In order to predict attacks and defend against them, CNO must also employ more sophisticated techniques and work to understand the attacker's Motives, Means and Opportunities (MMO). CNO must use automated reconnaissance tools, such as Google, to identify information vulnerabilities, and then utilize Internet tools to observe the intelligence gathering, planning, testing, and collaboration activities that represent 95% of the attacker's effort.

  18. Catalogue Creation for Space Situational Awareness with Optical Sensors

    NASA Astrophysics Data System (ADS)

    Hobson, T.; Clarkson, I.; Bessell, T.; Rutten, M.; Gordon, N.; Moretti, N.; Morreale, B.

    2016-09-01

    In order to safeguard the continued use of space-based technologies, effective monitoring and tracking of man-made resident space objects (RSOs) is paramount. The diverse characteristics, behaviours and trajectories of RSOs make space surveillance a challenging application of the discipline that is tracking and surveillance. When surveillance systems are faced with non-canonical scenarios, it is common for human operators to intervene while researchers adapt and extend traditional tracking techniques in search of a solution. A complementary strategy for improving the robustness of space surveillance systems is to place greater emphasis on the anticipation of uncertainty. Namely, give the system the intelligence necessary to autonomously react to unforeseen events and to intelligently and appropriately act on tenuous information rather than discard it. In this paper we build from our 2015 campaign and describe the progression of a low-cost intelligent space surveillance system capable of autonomously cataloguing and maintaining track of RSOs. It currently exploits robotic electro-optical sensors, high-fidelity state-estimation and propagation as well as constrained initial orbit determination (IOD) to intelligently and adaptively manage its sensors in order to maintain an accurate catalogue of RSOs. In a step towards fully autonomous cataloguing, the system has been tasked with maintaining surveillance of a portion of the geosynchronous (GEO) belt. Using a combination of survey and track-refinement modes, the system is capable of maintaining a track of known RSOs and initiating tracks on previously unknown objects. Uniquely, due to the use of high-fidelity representations of a target's state uncertainty, as few as two images of previously unknown RSOs may be used to subsequently initiate autonomous search and reacquisition. To achieve this capability, particularly within the congested environment of the GEO-belt, we use a constrained admissible region (CAR) to generate a plausible estimate of the unknown RSO's state probability density function and disambiguate measurements using a particle-based joint probability data association (JPDA) method. Additionally, the use of alternative CAR generation methods, incorporating catalogue-based priors, is explored and tested. We also present the findings of two field trials of an experimental system that incorporates these techniques. The results demonstrate that such a system is capable of autonomously searching for an RSO that was briefly observed days prior in a GEO-survey and discriminating it from the measurements of other previously catalogued RSOs.

  19. Intelligence and Law Enforcement: Countering Transnational Threats to the U.S.

    DTIC Science & Technology

    2001-12-03

    K. Johnson, America’s Secret Power: the CIA in a Democratic Society (New York: Oxford University Press , 1989), pp. 133-203. 26 The history of the...gathering on civilians by the military is found in Joan M. Jensen, Army Surveillance in America, 1775-1980 (New Haven: Yale University Press , 1991). 27...103rd Congress, 1st session, Select Committee on Intelligence, The Intelligence Community’s Involvement in the Banca Nazionale del Lavoro (BNL

  20. 75 FR 65554 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ..., Compliance Outreach & Implementation, Office of Foreign Assets Control, Department of the Treasury... their businesses and agents access to the U.S. financial system and the benefits of trade and..., the Director of the Central Intelligence Agency, the Director of the Federal Bureau of Investigation...

  1. 76 FR 23644 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-27

    ...: Assistant Director, Compliance Outreach & Implementation, Office of Foreign Assets Control, Department of... objective of denying their businesses and agents access to the U.S. financial system and the benefits of... the Attorney General, the Director of the Central Intelligence Agency, the Director of the Federal...

  2. 75 FR 20425 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-19

    ...: Assistant Director, Compliance Outreach & Implementation, Office of Foreign Assets Control, Department of... their businesses and agents access to the U.S. financial system and the benefits of trade and..., the Director of the Central Intelligence Agency, the Director of the Federal Bureau of Investigation...

  3. 75 FR 24773 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-05-05

    ... Director, Compliance Outreach & Implementation, Office of Foreign Assets Control, Department of the... their businesses and agents access to the U.S. financial system and the benefits of trade and..., the Director of the Central Intelligence Agency, the Director of the Federal Bureau of Investigation...

  4. DISCOURSE ON METHODS.

    ERIC Educational Resources Information Center

    BOUCHER, JOHN G.

    THE AUTHOR STATES THAT BEFORE PRESENT FOREIGN LANGUAGE TEACHING METHODS CAN BE DISCUSSED INTELLIGENTLY, THE RESEARCH IN PSYCHOLOGY AND LINGUISTICS WHICH HAS INFLUENCED THE DEVELOPMENT OF THESE METHODS MUST BE CONSIDERED. MANY FOREIGN LANGUAGE TEACHERS WERE BEGINNING TO FEEL COMFORTABLE WITH THE AUDIOLINGUAL APPROACH WHEN NOAM CHOMSKY, IN HIS 1966…

  5. Social Intelligence and Communication Competence: Predictors of Students' Intercultural Sensitivity

    ERIC Educational Resources Information Center

    Bosuwon, Takwa

    2017-01-01

    This study investigated the level of intercultural sensitivity of foreign international undergraduates and its possible predictors. Sample participants included 269 foreign international undergraduates of both government and private universities in Thailand. The research instrument was the three-page survey constructed questionnaire based on the…

  6. Semantic Processing for Communicative Exercises in Foreign-Language Learning.

    ERIC Educational Resources Information Center

    Mulford, George W.

    1989-01-01

    Outlines the history of semantically based programs that have influenced the design of computer assisted language instruction (CALI) programs. Describes early attempts to make intelligent CALI as well as current projects, including the Foreign Language Adventure Game, developed at the University of Delaware. Describes some important…

  7. The Relevance of Multiple Intelligences to CALL Instruction

    ERIC Educational Resources Information Center

    Kim, In-Seok

    2009-01-01

    Many teachers and researchers believe learning preferences or learning styles can be used advantageously to enhance language study and motivate learners. Following an overview of Gardner's theory of multiple intelligences (MI) and research on multimedia-based approaches in foreign language instruction, this paper first describes a study comparing…

  8. The Effect of Phonological Variation on Adult Learner Comprehension.

    ERIC Educational Resources Information Center

    Eisenstein, Miriam; Berkowitz, Diana

    1981-01-01

    Reports on a study of the relationship of English phonological variation to intelligibility for adult second language learners of English. Indicates that learners tested on their ability to understand working-class (New Yorkese), educated (Standard English), and Foreign-accented speakers of English found the standard more intelligible than the…

  9. 41 CFR 105-60.501 - Categories of records exempt from disclosure under the FOIA.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... to be withheld; (4) Trade secrets and commercial or financial information obtained from a person and... intelligence investigation, information furnished by a confidential source; (v) Would disclose techniques and... foreign intelligence or counterintelligence, or international terrorism, and the existence of the records...

  10. Developing Cultural Intelligence and Empathy through Diversified Mentoring Relationships

    ERIC Educational Resources Information Center

    Young, Cheri A.; Haffejee, Badiah; Corsun, David L.

    2018-01-01

    Given increasing globalization and the foreign-born workforce characterizing many organizations around the world, managers are increasingly called on to effectively manage a culturally diverse workforce. One way to increase the cultural intelligence and empathy of managers was proposed by Ragins, who indicated that mentors in diversified mentoring…

  11. 75 FR 61574 - Unblocking of Specially Designated Nationals and Blocked Persons Pursuant To the Foreign...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-05

    ... & Implementation, U.S. Department of the Treasury, Office of Foreign Assets Control, Washington, DC 20220, tel... and their organizations on a worldwide basis, with the objective of denying their businesses and... the Central Intelligence Agency, the Director of the Federal Bureau of Investigation, the...

  12. 75 FR 65554 - Additional Designations, Foreign Narcotics Kingpin Designation Act

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ... Outreach & Implementation, Office of Foreign Assets Control, Department of the Treasury, Washington, DC... objective of denying their businesses and agents access to the U.S. financial system and to the benefits of... with the Attorney General, the Director of the Central Intelligence Agency, the Director of the Federal...

  13. 75 FR 42487 - Supplementary Identifying Information of Previously-Designated Individual, Foreign Narcotics...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-07-21

    ... Director, Compliance Outreach & Implementation, Office of Foreign Assets Control, Department of the... their businesses and agents access to the U.S. financial system and the benefits of trade and..., the Director of the Central Intelligence Agency, the Director of the Federal Bureau of Investigation...

  14. A generic flexible and robust approach for intelligent real-time video-surveillance systems

    NASA Astrophysics Data System (ADS)

    Desurmont, Xavier; Delaigle, Jean-Francois; Bastide, Arnaud; Macq, Benoit

    2004-05-01

    In this article we present a generic, flexible and robust approach for an intelligent real-time video-surveillance system. A previous version of the system was presented in [1]. The goal of these advanced tools is to provide help to operators by detecting events of interest in visual scenes and highlighting alarms and compute statistics. The proposed system is a multi-camera platform able to handle different standards of video inputs (composite, IP, IEEE1394 ) and which can basically compress (MPEG4), store and display them. This platform also integrates advanced video analysis tools, such as motion detection, segmentation, tracking and interpretation. The design of the architecture is optimised to playback, display, and process video flows in an efficient way for video-surveillance application. The implementation is distributed on a scalable computer cluster based on Linux and IP network. It relies on POSIX threads for multitasking scheduling. Data flows are transmitted between the different modules using multicast technology and under control of a TCP-based command network (e.g. for bandwidth occupation control). We report here some results and we show the potential use of such a flexible system in third generation video surveillance system. We illustrate the interest of the system in a real case study, which is the indoor surveillance.

  15. Creating National Attraction: Military Intelligence Sharing Building Foreign Military Interdependence

    DTIC Science & Technology

    2015-05-21

    were focused on security of the information, access to desired intelligence, and access to locations favorable to collecting desired intelligence.8 The...obtain a more favorable position in the relationship. For example, a state might threaten defection due to a lack of domestic support for the...administration, the United States worked with Colombia and Mexico to reduce the flow of cocaine and marijuana into the United States.62 This action

  16. Automated document analysis system

    NASA Astrophysics Data System (ADS)

    Black, Jeffrey D.; Dietzel, Robert; Hartnett, David

    2002-08-01

    A software application has been developed to aid law enforcement and government intelligence gathering organizations in the translation and analysis of foreign language documents with potential intelligence content. The Automated Document Analysis System (ADAS) provides the capability to search (data or text mine) documents in English and the most commonly encountered foreign languages, including Arabic. Hardcopy documents are scanned by a high-speed scanner and are optical character recognized (OCR). Documents obtained in an electronic format bypass the OCR and are copied directly to a working directory. For translation and analysis, the script and the language of the documents are first determined. If the document is not in English, the document is machine translated to English. The documents are searched for keywords and key features in either the native language or translated English. The user can quickly review the document to determine if it has any intelligence content and whether detailed, verbatim human translation is required. The documents and document content are cataloged for potential future analysis. The system allows non-linguists to evaluate foreign language documents and allows for the quick analysis of a large quantity of documents. All document processing can be performed manually or automatically on a single document or a batch of documents.

  17. SARS in Singapore: surveillance strategies in a globalising city.

    PubMed

    Teo, Peggy; Yeoh, Brenda S A; Ong, Shir Nee

    2005-06-01

    Public health measures employed to fight against the spread of SARS need to be guided by biomedical knowledge as well as an understanding of the social science aspects of the disease. Using Singapore as a case study, we explore how the state constructs the disease and implements measures targeted at creating a ring of defense around the island and using surveillance to monitor and prevent its spread. While there is support, there is also resentment among some Singaporeans who complain that their right to privacy has been invaded and that over surveillance may have actually occurred. Marginalisation and discrimination have not only affected the local population but in this open economy which is striving to achieve global city status, businesses, tourism, foreign talent, foreign contract workers and foreign students studying in Singapore have also been negatively affected. While Singapore has been applauded by WHO and used as an example of quick and effective response, a holistic approach to the management of infectious disease must address the social implications of strategies that are drawn from medical knowledge alone because it impinges on the social lives of people and how people interact with each other under stressful circumstances.

  18. Transitioning ISR architecture into the cloud

    NASA Astrophysics Data System (ADS)

    Lash, Thomas D.

    2012-06-01

    Emerging cloud computing platforms offer an ideal opportunity for Intelligence, Surveillance, and Reconnaissance (ISR) intelligence analysis. Cloud computing platforms help overcome challenges and limitations of traditional ISR architectures. Modern ISR architectures can benefit from examining commercial cloud applications, especially as they relate to user experience, usage profiling, and transformational business models. This paper outlines legacy ISR architectures and their limitations, presents an overview of cloud technologies and their applications to the ISR intelligence mission, and presents an idealized ISR architecture implemented with cloud computing.

  19. Gastrointestinal illnesses among French forces deployed to Djibouti: French military health surveillance, 2005-2009.

    PubMed

    Ollivier, Lénaïck; Decam, Christophe; Pommier de Santi, Vincent; Darar, Houssein Y; Dia, Aïssata; Nevin, Remington L; Romand, Olivier; Bougère, Jacques; Deparis, Xavier; Boutin, Jean-Paul

    2010-10-01

    Despite an increase in foreign tourism and in the numbers of foreign military personnel deployed to Djibouti, little is known about the risk of gastrointestinal illness in this country in eastern Africa. To assess risk and to describe common features of gastrointestinal illnesses, reports of illness derived from military health surveillance data collected during 2005-2009 among French service members deployed to Djibouti were reviewed. Diarrhea was the most common problem; it had an annual incidence ranging from 260 to 349 cases per 1,000 person-years. The risk was higher among soldiers deployed short-term (four months) than among soldiers deployed long-term (two years). This five-year review of French health surveillance data documents a significant burden of diarrhea among French soldiers in Djibouti. The identification of factors associated with risk may permit efficient targeting of interventions to reduce morbidity from gastrointestinal illness.

  20. Gastrointestinal Illnesses among French Forces Deployed to Djibouti: French Military Health Surveillance, 2005–2009

    PubMed Central

    Ollivier, Lénaïck; Decam, Christophe; de Santi, Vincent Pommier; Darar, Houssein Y.; Dia, Aïssata; Nevin, Remington L.; Romand, Olivier; Bougère, Jacques; Deparis, Xavier; Boutin, Jean-Paul

    2010-01-01

    Despite an increase in foreign tourism and in the numbers of foreign military personnel deployed to Djibouti, little is known about the risk of gastrointestinal illness in this country in eastern Africa. To assess risk and to describe common features of gastrointestinal illnesses, reports of illness derived from military health surveillance data collected during 2005–2009 among French service members deployed to Djibouti were reviewed. Diarrhea was the most common problem; it had an annual incidence ranging from 260 to 349 cases per 1,000 person-years. The risk was higher among soldiers deployed short-term (four months) than among soldiers deployed long-term (two years). This five-year review of French health surveillance data documents a significant burden of diarrhea among French soldiers in Djibouti. The identification of factors associated with risk may permit efficient targeting of interventions to reduce morbidity from gastrointestinal illness. PMID:20889897

  1. Escalation and Intrawar Deterrence During Limited Wars in the Middle East

    DTIC Science & Technology

    2009-09-01

    informed by a solid understanding of the potential variation in the escalatory process as U.S. leaders work with the UN to try to establish cease...discern Arab intensions within their own psychological framework which emphasized the searing memory of the most tragic episodes in the history of... information is obtained, processed , and presented to foreign leaders. The intelligence services of foreign nations may not be providing a foreign

  2. On the Relationship of Multiple Intelligences with Listening Proficiency and Attitudes among Iranian TEFL University Students

    ERIC Educational Resources Information Center

    Naeini, Ma'ssoumeh Bemani; Pandian, Ambigapathy

    2010-01-01

    Gardner's (1983) Multiple Intelligences Theory (MIT) has been found to have profound implications in teaching English as a foreign language (TEFL) in that it provides a way for teachers to recognize learners' individual cognitive and affective differences by providing favorable motivational conditions for learning. However, little investigation…

  3. Learner Differences among Children Learning a Foreign Language: Language Anxiety, Strategy Use, and Multiple Intelligences

    ERIC Educational Resources Information Center

    Liu, Hui-ju; Chen, Ting-Han

    2014-01-01

    This study mainly investigates language anxiety and its relationship to the use of learning strategies and multiple intelligences among young learners in an EFL educational context. The participants were composed of 212 fifth- and sixth-graders from elementary schools in central Taiwan. Findings indicated that most participants generally…

  4. The Learning Styles and Multiple Intelligences of EFL College Students in Kuwait

    ERIC Educational Resources Information Center

    Alrabah, Sulaiman; Wu, Shu-hua; Alotaibi, Abdullah M.

    2018-01-01

    The study aimed to investigate the learning styles and multiple intelligences of English as foreign language (EFL) college-level students. "Convenience sampling" (Patton, 2015) was used to collect data from a population of 250 students enrolled in seven different academic departments at the College of Basic Education in Kuwait. The data…

  5. Analyzing Learner Language: Towards a Flexible Natural Language Processing Architecture for Intelligent Language Tutors

    ERIC Educational Resources Information Center

    Amaral, Luiz; Meurers, Detmar; Ziai, Ramon

    2011-01-01

    Intelligent language tutoring systems (ILTS) typically analyze learner input to diagnose learner language properties and provide individualized feedback. Despite a long history of ILTS research, such systems are virtually absent from real-life foreign language teaching (FLT). Taking a step toward more closely linking ILTS research to real-life…

  6. Major Federal Research and Development Agencies are Implementing the Patent and Trademark Amendments of 1980.

    DTIC Science & Technology

    1984-02-28

    foreign intelligence or counter- intelligence activities determines that restrict- ing or eliminating the right to retain title to any sub- ject...qzired clause, giving rights in their inventions to small busines and nonprofit subcontractors. However, we are persuaded that the lSection 9 (42 U.S.C

  7. Improving Learners' Oral Fuency through Computer-Mediated Emotional Intelligence Activities

    ERIC Educational Resources Information Center

    Abdolrezapour, Parisa

    2017-01-01

    Previous studies have shown that emotional intelligence (henceforth, EI) has a significant impact on important life outcomes (e.g., mental and physical health, academic achievement, work performance, and social relationships). This study aimed to see whether there is any relationship between EI and English as a foreign language (EFL) learners'…

  8. Linguists: The Hidden Strength of U.S. Intelligence

    ERIC Educational Resources Information Center

    Dow, Kathleen A.

    2006-01-01

    This article seeks to argue that linguists--not technology--have been the true power behind the successes of the U.S. intelligence community. However, this power has not come to them without difficulty. The author explores four issues in relation to this argument: (a) previous U.S. foreign language policy proposals; (b) the recruitment of…

  9. An Intelligent Computer Assisted Language Learning System for Arabic Learners

    ERIC Educational Resources Information Center

    Shaalan, Khaled F.

    2005-01-01

    This paper describes the development of an intelligent computer-assisted language learning (ICALL) system for learning Arabic. This system could be used for learning Arabic by students at primary schools or by learners of Arabic as a second or foreign language. It explores the use of Natural Language Processing (NLP) techniques for learning…

  10. Near-space airships against terrorist activities

    NASA Astrophysics Data System (ADS)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  11. Foreign Language Reading and Spelling in Gifted Students with Dyslexia in Secondary Education

    ERIC Educational Resources Information Center

    van Viersen, Sietske; de Bree, Elise H.; Kalee, Lilian; Kroesbergen, Evelyn H.; de Jong, Peter F.

    2017-01-01

    A few studies suggest that gifted children with dyslexia have better literacy skills than averagely intelligent children with dyslexia. This finding aligns with the hypothesis that giftedness-related factors provide compensation for poor reading. The present study investigated whether, as in the native language (NL), the level of foreign language…

  12. Integrating Sensor-Collected Intelligence

    DTIC Science & Technology

    2008-11-01

    collecting, processing, data storage and fusion, and the dissemination of information collected by Intelligence, Surveillance, and Reconnaissance (ISR...Grid – Bandwidth Expansion (GIG-BE) program) to provide the capability to transfer data from sensors to accessible storage and satellite and airborne...based ISR is much more fragile. There was a purposeful drawdown of these systems following the Cold War and modernization programs were planned to

  13. Effects of Multiple Intelligences Supported Project-Based Learning on Students' Achievement Levels and Attitudes towards English Lesson

    ERIC Educational Resources Information Center

    Bas, Gökhan; Beyhan, Ömer

    2010-01-01

    The aim of the research was to investigate the effects of multiple intelligences supported project-based learning and traditional foreign language-teaching environment on students' achievement and their attitude towards English lesson. The research was carried out in 2009-2010 education-instruction year in Karatli Sehit Sahin Yilmaz Elementary…

  14. Effects of Noise and Proficiency on Intelligibility of Chinese-Accented English

    ERIC Educational Resources Information Center

    Rogers, Catherine L.; Dalby, Jonathan; Nishi, Kanae

    2004-01-01

    This study compared the intelligibility of native and foreign-accented English speech presented in quiet and mixed with three different levels of background noise. Two native American English speakers and four native Mandarin Chinese speakers for whom English is a second language each read a list of 50 phonetically balanced sentences (Egan, 1948).…

  15. Iranian EFL Learners' Emotional Intelligence, Learning Styles, Strategy Use, and Their L2 Achievement

    ERIC Educational Resources Information Center

    Afshar, Hassan Soodmand; Tofighi, Somayyeh; Hamazavi, Raouf

    2016-01-01

    The idea that language learning is facilitated or inhibited by a multitude of factors has prompted scholars in the field to investigate variables considered to be crucial in the process of second or foreign language learning. This study investigated relationships between emotional intelligence, learning style, language learning strategy use, and…

  16. Medical intelligence, security and global health: the foundations of a new health agenda.

    PubMed

    Bowsher, G; Milner, C; Sullivan, R

    2016-07-01

    Medical intelligence, security and global health are distinct fields that often overlap, especially as the drive towards a global health security agenda gathers pace. Here, we outline some of the ways in which this has happened in the recent past during the recent Ebola epidemic in West Africa and in the killing of Osama Bin laden by US intelligence services. We evaluate medical intelligence and the role it can play in global health security; we also attempt to define a framework that illustrates how medical intelligence can be incorporated into foreign policy action in order delineate the boundaries and scope of this growing field. © The Royal Society of Medicine.

  17. Corps Communications for the Airland Battle

    DTIC Science & Technology

    1985-04-01

    intelligence , fire support. 111 wm mssemm vvw* m » ’■I.|J|.’■,■■*.■■.■ ■;■’!■». p i JL ■ .■.’.■, .■i». ■. ■ ■ ■. ■■ ■ ———-— im ^’ air de-fense...logistics support. The system must be flexible to support the pace of maneuver, it must have extensive range to support surveillance, intelligence and the...Command and Control, Intelligence , Fire Support, etc.) must be adjusted to correspond to the new mission. Communications assets must be allocated

  18. Evaluation of Oral Fluency in English as a Foreign Language.

    ERIC Educational Resources Information Center

    Yorozuya, Ryuichi

    Fluency can be defined in terms of intelligibility and effectiveness. For learners of English as a foreign language, fluency includes some degree of accuracy in phonological, syntactic, and semantic terms. It is a quality of speech that is produced in novel situations where what is said and how it is said cannot be predicted. To clarify the…

  19. Strategy for Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2013-02-14

    Marine Corps School of Advanced Warfighting. He was the commander of the 13th Intelligence Squadron (Distributed Ground System – 2) and served in the...military campaigns and major operations. The root cause of these difficulties is adherence to a centralized, Cold War collection management doctrine...current collection management doctrine creates for implementing ISR strategy. It will then propose an alternative framework for ISR strategy using a

  20. Strategy for Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2014-12-01

    AIR FORCE RESEARCH INSTITUTE AIR UNIVERSITY PRESS Director and Publisher Allen G. Peck Editor in Chief Oreste M. Johnson Managing Editor...Demorah Hayes Design and Production Manager Cheryl King Air University Press 155 N. Twining St., Bldg. 693 Maxwell AFB, AL 36112-6026 afri.aupress...the Marine Corps School of Advanced Warfight- ing, and the Air War College. He previously commanded the 13th Intelligence Squadron (Distributed Ground

  1. Long Range Surveillance Units (LRSU): The Past, Present, and Future

    DTIC Science & Technology

    1990-03-27

    learned very well the lessons of the past and has put the human element back in the intelligence collection business . In 1986 the Army revitalized...has learned very well the lessons of the past and has put the human element back in the intelligence collection business . In 1986 the Army revitalized...USAREUR ------------------- 13 Methods of Insertion -------------------- 15 CHAPTER IV. EQUIPMENT ISSUES ------------------------ 18 (GORTEX, OPTICS

  2. Development of a real time multiple target, multi camera tracker for civil security applications

    NASA Astrophysics Data System (ADS)

    Åkerlund, Hans

    2009-09-01

    A surveillance system has been developed that can use multiple TV-cameras to detect and track personnel and objects in real time in public areas. The document describes the development and the system setup. The system is called NIVS Networked Intelligent Video Surveillance. Persons in the images are tracked and displayed on a 3D map of the surveyed area.

  3. Amazon Surveillance System (SIVAM): U.S. and Brazilian Cooperation

    DTIC Science & Technology

    1999-12-01

    Controle de Träfe go Aereo) Clutter Effects Model Parliamentary Investigation Commission (Comissäo Parlamentär de Inqutrito) Weather Forecasting...de Pesquisas Espaciais) INPA National Institute of Amazon Research (Instituto Nacional de Pesquisas da Amazonia ) IR Infrared KW Kilowatt (a...VSAT System for Surveillance of the Amazon (Sistema de Vigiläncia da Amazonia ) Brazilian Intelligence Agency (Subsecretaria de Inteligencia

  4. Pedestrian detection based on redundant wavelet transform

    NASA Astrophysics Data System (ADS)

    Huang, Lin; Ji, Liping; Hu, Ping; Yang, Tiejun

    2016-10-01

    Intelligent video surveillance is to analysis video or image sequences captured by a fixed or mobile surveillance camera, including moving object detection, segmentation and recognition. By using it, we can be notified immediately in an abnormal situation. Pedestrian detection plays an important role in an intelligent video surveillance system, and it is also a key technology in the field of intelligent vehicle. So pedestrian detection has very vital significance in traffic management optimization, security early warn and abnormal behavior detection. Generally, pedestrian detection can be summarized as: first to estimate moving areas; then to extract features of region of interest; finally to classify using a classifier. Redundant wavelet transform (RWT) overcomes the deficiency of shift variant of discrete wavelet transform, and it has better performance in motion estimation when compared to discrete wavelet transform. Addressing the problem of the detection of multi-pedestrian with different speed, we present an algorithm of pedestrian detection based on motion estimation using RWT, combining histogram of oriented gradients (HOG) and support vector machine (SVM). Firstly, three intensities of movement (IoM) are estimated using RWT and the corresponding areas are segmented. According to the different IoM, a region proposal (RP) is generated. Then, the features of a RP is extracted using HOG. Finally, the features are fed into a SVM trained by pedestrian databases and the final detection results are gained. Experiments show that the proposed algorithm can detect pedestrians accurately and efficiently.

  5. The Relationship between Willingness to Communicate and Multiple Intelligences among Learners of English as a Foreign Language

    ERIC Educational Resources Information Center

    Mohammadzadeh, Afsaneh; Jafarigohar, Manoochehr

    2012-01-01

    The present study was conducted to examine the existence of any possible relationship between willingness to communicate (WTC) and multiple intelligences (MI) among over 500 EFL learners. The study also investigated the effect of gender on the relationship between these two constructs. The data for the research were gathered using a three-part…

  6. Teaching Culture and Language through the Multiple Intelligences Film Teaching Model in the ESL/EFL Classroom

    ERIC Educational Resources Information Center

    Yeh, Ellen

    2014-01-01

    This paper will demonstrate how to enhance second language (L2) learners' linguistic and cultural competencies through the use of the Multiple Intelligences Film Teaching (MIFT) model. The paper will introduce two ideas to teachers of English as a Second/Foreign Language (ESL/EFL). First, the paper shows how L2 learners learn linguistic and…

  7. Cultural Intelligence and Writing Ability: Delving into Fluency, Accuracy and Complexity

    ERIC Educational Resources Information Center

    Ghonsooly, Behzad; Shalchy, Somayye

    2013-01-01

    Over the recent decades, cultural intelligence, now referred to as CQ has become a burgeoning area of research in the domain of business and management. Given the paucity of research on the effects of CQ on second or foreign language learning especially writing, this study intends to examine the effects of CQ on L2 learners' written performance…

  8. Pronunciation-Specific Adjustment Strategies for Intelligibility in L2 Teacher Talk: Results and Implications of a Questionnaire Study

    ERIC Educational Resources Information Center

    Saito, Kazuya; van Poeteren, Kim

    2012-01-01

    A questionnaire study was conducted to examine how 120 highly experienced EFL (English as a foreign language) teachers in Japan adjust their pronunciation in order to facilitate and refine their students' learning skills to approach mutual intelligibility in second language (L2) classrooms (i.e. "pronunciation-specific teacher talk").…

  9. Accent, intelligibility, and comprehensibility in the perception of foreign-accented Lombard speech

    NASA Astrophysics Data System (ADS)

    Li, Chi-Nin

    2003-10-01

    Speech produced in noise (Lombard speech) has been reported to be more intelligible than speech produced in quiet (normal speech). This study examined the perception of non-native Lombard speech in terms of intelligibility, comprehensibility, and degree of foreign accent. Twelve Cantonese speakers and a comparison group of English speakers read simple true and false English statements in quiet and in 70 dB of masking noise. Lombard and normal utterances were mixed with noise at a constant signal-to-noise ratio, and presented along with noise-free stimuli to eight new English listeners who provided transcription scores, comprehensibility ratings, and accent ratings. Analyses showed that, as expected, utterances presented in noise were less well perceived than were noise-free sentences, and that the Cantonese speakers' productions were more accented, but less intelligible and less comprehensible than those of the English speakers. For both groups of speakers, the Lombard sentences were correctly transcribed more often than their normal utterances in noisy conditions. However, the Cantonese-accented Lombard sentences were not rated as easier to understand than was the normal speech in all conditions. The assigned accent ratings were similar throughout all listening conditions. Implications of these findings will be discussed.

  10. Intelligibility of foreign-accented speech: Effects of listening condition, listener age, and listener hearing status

    NASA Astrophysics Data System (ADS)

    Ferguson, Sarah Hargus

    2005-09-01

    It is well known that, for listeners with normal hearing, speech produced by non-native speakers of the listener's first language is less intelligible than speech produced by native speakers. Intelligibility is well correlated with listener's ratings of talker comprehensibility and accentedness, which have been shown to be related to several talker factors, including age of second language acquisition and level of similarity between the talker's native and second language phoneme inventories. Relatively few studies have focused on factors extrinsic to the talker. The current project explored the effects of listener and environmental factors on the intelligibility of foreign-accented speech. Specifically, monosyllabic English words previously recorded from two talkers, one a native speaker of American English and the other a native speaker of Spanish, were presented to three groups of listeners (young listeners with normal hearing, elderly listeners with normal hearing, and elderly listeners with hearing impairment; n=20 each) in three different listening conditions (undistorted words in quiet, undistorted words in 12-talker babble, and filtered words in quiet). Data analysis will focus on interactions between talker accent, listener age, listener hearing status, and listening condition. [Project supported by American Speech-Language-Hearing Association AARC Award.

  11. Foreign Language Learning Difficulties in Italian Children: Are They Associated with Other Learning Difficulties?

    ERIC Educational Resources Information Center

    Ferrari, Marcella; Palladino, Paola

    2007-01-01

    A group of seventh- and eighth-grade Italian students with low achievement (LA) in learning English as a foreign language (FL) was selected and compared to a group with high achievement (HA) in FL learning. The two groups were matched for age and nonverbal intelligence. Two experiments were conducted to examine the participants' verbal and…

  12. Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress

    DTIC Science & Technology

    2013-04-16

    scientists and engineers that launched the satellite program.7 5 Ibid., p. 21. 6 Ibid., p. 22. It is...major role in supporting combat operations in Iraq and Afghanistan, although the E-8s are scheduled to have new engines to extend their service life...that the Army is even considering the development of intelligence- gathering airships .43 In comparison to the complex acquisition history of UAS, the

  13. For and from Cyberspace: Conceptualizing Cyber Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2012-12-01

    intelligence. Cyber ISR, there- fore, “requires the development of algorithms and visualizations capa- bilities to make activities in the cyber domain... Pentagon , 19 January 2012), https://www.intelink.gov/inteldocs/action.php?kt_path_info=ktcore.actions.docu- ment.view&fDocumentId=1517681, defines...selected proxy servers, with successive levels of encryption and then de- cryption, before delivery to their final destination as plain text. W. Earl

  14. Agent Based Study of Surprise Attacks:. Roles of Surveillance, Prompt Reaction and Intelligence

    NASA Astrophysics Data System (ADS)

    Shanahan, Linda; Sen, Surajit

    Defending a confined territory from a surprise attack is seldom possible. We use molecular dynamics and statistical physics inspired agent-based simulations to explore the evolution and outcome of such attacks. The study suggests robust emergent behavior, which emphasizes the importance of accurate surveillance, automated and powerful attack response, building layout, and sheds light on the role of communication restrictions in defending such territories.

  15. Automated intelligent video surveillance system for ships

    NASA Astrophysics Data System (ADS)

    Wei, Hai; Nguyen, Hieu; Ramu, Prakash; Raju, Chaitanya; Liu, Xiaoqing; Yadegar, Jacob

    2009-05-01

    To protect naval and commercial ships from attack by terrorists and pirates, it is important to have automatic surveillance systems able to detect, identify, track and alert the crew on small watercrafts that might pursue malicious intentions, while ruling out non-threat entities. Radar systems have limitations on the minimum detectable range and lack high-level classification power. In this paper, we present an innovative Automated Intelligent Video Surveillance System for Ships (AIVS3) as a vision-based solution for ship security. Capitalizing on advanced computer vision algorithms and practical machine learning methodologies, the developed AIVS3 is not only capable of efficiently and robustly detecting, classifying, and tracking various maritime targets, but also able to fuse heterogeneous target information to interpret scene activities, associate targets with levels of threat, and issue the corresponding alerts/recommendations to the man-in- the-loop (MITL). AIVS3 has been tested in various maritime scenarios and shown accurate and effective threat detection performance. By reducing the reliance on human eyes to monitor cluttered scenes, AIVS3 will save the manpower while increasing the accuracy in detection and identification of asymmetric attacks for ship protection.

  16. Intelligent agents for adaptive security market surveillance

    NASA Astrophysics Data System (ADS)

    Chen, Kun; Li, Xin; Xu, Baoxun; Yan, Jiaqi; Wang, Huaiqing

    2017-05-01

    Market surveillance systems have increasingly gained in usage for monitoring trading activities in stock markets to maintain market integrity. Existing systems primarily focus on the numerical analysis of market activity data and generally ignore textual information. To fulfil the requirements of information-based surveillance, a multi-agent-based architecture that uses agent intercommunication and incremental learning mechanisms is proposed to provide a flexible and adaptive inspection process. A prototype system is implemented using the techniques of text mining and rule-based reasoning, among others. Based on experiments in the scalping surveillance scenario, the system can identify target information evidence up to 87.50% of the time and automatically identify 70.59% of cases depending on the constraints on the available information sources. The results of this study indicate that the proposed information surveillance system is effective. This study thus contributes to the market surveillance literature and has significant practical implications.

  17. 77 FR 11369 - Delegation of Certain Function Under Section 308(a) of the Intelligence Authorization Act for...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-02-24

    ... Vol. 77 Friday, No. 37 February 24, 2012 Part V The President Memorandum of January 27, 2012--Delegation of Certain Function Under Section 308(a) of the Intelligence Authorization Act for Fiscal Year 2012 Memorandum of January 30, 2012--Delegation of Authority in Accordance With Sections 610 and 652 of the Foreign Assistance Act of 1961, as...

  18. Why Is an Application of Multiple Intelligences Theory Important for Language Learning and Teaching Speaking Ability?

    ERIC Educational Resources Information Center

    Boonma, Malai; Phaiboonnugulkij, Malinee

    2014-01-01

    This article calls for a strong need to propose the theoretical framework of the Multiple Intelligences theory (MI) and provide a suitable answer of the doubt in part of foreign language teaching. The article addresses the application of MI theory following various sources from Howard Gardner and the authors who revised this theory for use in the…

  19. Congressional Oversight of Intelligence: Current Structure and Alternatives

    DTIC Science & Technology

    2012-03-14

    Intelligence Information, by Richard A. Best Jr.; CRS Report RL33639, Sources of Systemic Risk in Large Value Interbank Payment Systems, by Edward V. Murphy...Numerous initiatives to change Congress’s oversight structure have materialized in the meantime, including, most importantly, the creation of parallel... Risk : Report, available at http://www.preventionwmd.gov/report, p. 9. 12 Kay King, Congress and National Security, Council on Foreign Relations

  20. Developing Students' Intelligent Character through Linguistic Politeness: The Case of English as a Foreign Language for Indonesian Students

    ERIC Educational Resources Information Center

    Mariani, Nanik

    2016-01-01

    English is a foreign language that must be taught at school, particularly in secondary school. Based on a preliminary observation of several secondary schools in Banjarmasin, it appears that the English taught focuses most on concepts or language formulas. Most of the students who interact in English during the learning process do not use…

  1. A Case Study of the NATO Identification System (NIS) Codevelopment Program

    DTIC Science & Technology

    1988-09-01

    the otherhand are unrelated to the military equipment being purchased. These offsets include foreign investment, technology transfer, and countertrade ...manufacturer and a foreign entity. 6. Countertrade - a transaction that specifies the exchange of selected goods and services for another of equivalent...arrangements. In fact, U.S. agencies are permitted to provide advisory and marketing intelligence services to U.S. exporters involved in countertrade

  2. Worldwide Threat Assessment of the U.S. Intelligence Community

    DTIC Science & Technology

    2011-03-10

    to political stability in all cases . African elections are likely to continue in many cases to heighten tensions and intensify conflict. Critical...priorities, and bureaucratic resistance. The Mexican Congress recently passed a law to toughen penalties in kidnapping cases , and is considering...situation is dire. Major sources of foreign revenue such as nickel exports and tourism have decreased. Moreover, a decline in foreign currency reserves

  3. 76 FR 38562 - Libyan Sanctions Regulations

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-07-01

    ..., Foreign trade, Investments, Libya, Loans, Securities, Services. For the reasons set forth in the preamble.... David S. Cohen, Acting Under Secretary, Office of Terrorism and Financial Intelligence, Department of...

  4. Convergence in full motion video processing, exploitation, and dissemination and activity based intelligence

    NASA Astrophysics Data System (ADS)

    Phipps, Marja; Lewis, Gina

    2012-06-01

    Over the last decade, intelligence capabilities within the Department of Defense/Intelligence Community (DoD/IC) have evolved from ad hoc, single source, just-in-time, analog processing; to multi source, digitally integrated, real-time analytics; to multi-INT, predictive Processing, Exploitation and Dissemination (PED). Full Motion Video (FMV) technology and motion imagery tradecraft advancements have greatly contributed to Intelligence, Surveillance and Reconnaissance (ISR) capabilities during this timeframe. Imagery analysts have exploited events, missions and high value targets, generating and disseminating critical intelligence reports within seconds of occurrence across operationally significant PED cells. Now, we go beyond FMV, enabling All-Source Analysts to effectively deliver ISR information in a multi-INT sensor rich environment. In this paper, we explore the operational benefits and technical challenges of an Activity Based Intelligence (ABI) approach to FMV PED. Existing and emerging ABI features within FMV PED frameworks are discussed, to include refined motion imagery tools, additional intelligence sources, activity relevant content management techniques and automated analytics.

  5. Detection of Terrorist Preparations by an Artificial Intelligence Expert System Employing Fuzzy Signal Detection Theory

    DTIC Science & Technology

    2004-10-25

    FUSEDOT does not require facial recognition , or video surveillance of public areas, both of which are apparently a component of TIA ([26], pp...does not use fuzzy signal detection. Involves facial recognition and video surveillance of public areas. Involves monitoring the content of voice...fuzzy signal detection, which TIA does not. Second, FUSEDOT would be easier to develop, because it does not require the development of facial

  6. Extracting 3d Semantic Information from Video Surveillance System Using Deep Learning

    NASA Astrophysics Data System (ADS)

    Zhang, J. S.; Cao, J.; Mao, B.; Shen, D. Q.

    2018-04-01

    At present, intelligent video analysis technology has been widely used in various fields. Object tracking is one of the important part of intelligent video surveillance, but the traditional target tracking technology based on the pixel coordinate system in images still exists some unavoidable problems. Target tracking based on pixel can't reflect the real position information of targets, and it is difficult to track objects across scenes. Based on the analysis of Zhengyou Zhang's camera calibration method, this paper presents a method of target tracking based on the target's space coordinate system after converting the 2-D coordinate of the target into 3-D coordinate. It can be seen from the experimental results: Our method can restore the real position change information of targets well, and can also accurately get the trajectory of the target in space.

  7. A fiber Bragg grating acceleration sensor for ground surveillance

    NASA Astrophysics Data System (ADS)

    Jiang, Shaodong; Zhang, Faxiang; Lv, Jingsheng; Ni, Jiasheng; Wang, Chang

    2017-10-01

    Ground surveillance system is a kind of intelligent monitoring equipment for detecting and tracking the ground target. This paper presents a fiber Bragg grating (FBG) acceleration sensor for ground surveillance, which has the characteristics of no power supply, anti-electromagnetic interference, easy large-scale networking, and small size. Which make it able to achieve the advantage of the ground surveillance system while avoiding the shortcoming of the electric sensing. The sensor has a double cantilever beam structure with a sensitivity of 1000 pm/g. Field experiment has been carried out on a flood beach to examine the sensor performance. The result shows that the detection distance on the walking of personnel reaches 70m, and the detection distance on the ordinary motor vehicle reaches 200m. The performance of the FBG sensor can satisfy the actual needs of the ground surveillance system.

  8. Human-Interaction Challenges in UAV-Based Autonomous Surveillance

    NASA Technical Reports Server (NTRS)

    Freed, Michael; Harris, Robert; Shafto, Michael G.

    2004-01-01

    Autonomous UAVs provide a platform for intelligent surveillance in application domains ranging from security and military operations to scientific information gathering and land management. Surveillance tasks are often long duration, requiring that any approach be adaptive to changes in the environment or user needs. We describe a decision- theoretic model of surveillance, appropriate for use on our autonomous helicopter, that provides a basis for optimizing the value of information returned by the UAV. From this approach arise a range of challenges in making this framework practical for use by human operators lacking specialized knowledge of autonomy and mathematics. This paper describes our platform and approach, then describes human-interaction challenges arising from this approach that we have identified and begun to address.

  9. Great Powers, National Interests, and Australian Grand Strategy

    DTIC Science & Technology

    2013-06-01

    52 National Intelligence Council, Global Trends 2030: Alternative Worlds, Kindle ed. (Washington, DC: National Intelligence Council, 2012), loc ...Kennedy, The Rise and Fall of the Great Powers: Economic Change and Military Conflict From 1500 to 2000, Kindle ed., (New York: Vintage, 1987), loc ...Kennedy, The Rise and Fall of the Great Powers, loc . 6359. 9 George C. Herring, From Colony to Superpower: U.S. Foreign Relations Since 1776, Kindle

  10. 2008: A Year of Transition. DoD Global Emerging Infections Surveillance and Response System

    DTIC Science & Technology

    2009-04-01

    surveillance program to 72 countries, 20 Navy ships, 1 foreign ship, and 6 clinics along the Mexican border (four in California, two in Mexico ... Mexico Mongolia Morocco Mozambique Nepal Nicaragua Nigeria Northern Mariana Islands Oman Pakistan Palau Panama Paraguay Peru Philippines Poland Portugal...tested for Arenaviruses, Rift Valley fever virus, rickettsia, Barto- nella, pox viruses, and leishmaniasis in collaboration with the National Museums

  11. Recent Weather Extremes and Impacts on Agricultural Production and Vector-Borne Disease Outbreak Patterns

    DTIC Science & Technology

    2014-03-21

    funding from USDA Foreign Agricultural Service towards the Global Agricultural Monitoring project, DoD Armed Forces Health Surveillance Center’s...Global Emerging Infections Surveillance and Response System (AFHSC/GEIS) under the Human Febrile and Vector -Borne Illnesses (FVBI) Program and USDA ...outbreaks during the 2010?2012 period. We utilized 2000?2012 vegetation index and land surface temperature data from NASA ?s satellitebased Moderate

  12. Avian influenza at both ends of a migratory flyway: characterizing viral genomic diversity to optimize surveillance plans for North America

    USGS Publications Warehouse

    Pearce, John M.; Ramey, Andrew M.; Flint, Paul L.; Koehler, Anson V.; Fleskes, Joseph P.; Franson, J. Christian; Hall, Jeffrey S.; Derksen, Dirk V.; Ip, Hon S.

    2009-01-01

    Although continental populations of avian influenza viruses are genetically distinct, transcontinental reassortment in low pathogenic avian influenza (LPAI) viruses has been detected in migratory birds. Thus, genomic analyses of LPAI viruses could serve as an approach to prioritize species and regions targeted by North American surveillance activities for foreign origin highly pathogenic avian influenza (HPAI). To assess the applicability of this approach, we conducted a phylogenetic and population genetic analysis of 68 viral genomes isolated from the northern pintail (Anas acuta) at opposite ends of the Pacific migratory flyway in North America. We found limited evidence for Asian LPAI lineages on wintering areas used by northern pintails in California in contrast to a higher frequency on breeding locales of Alaska. Our results indicate that the number of Asian LPAI lineages observed in Alaskan northern pintails, and the nucleotide composition of LPAI lineages, is not maintained through fall migration. Accordingly, our data indicate that surveillance of Pacific Flyway northern pintails to detect foreign avian influenza viruses would be most effective in Alaska. North American surveillance plans could be optimized through an analysis of LPAI genomics from species that demonstrate evolutionary linkages with European or Asian lineages and in regions that have overlapping migratory flyways with areas of HPAI outbreaks.

  13. Human Infrastructure Detection and Exploitation (HIDE)

    DTIC Science & Technology

    2009-11-01

    Finding human infrastructure elements such as machinery, chemicals, radiofrequency emissions, electrical currents, or other evidence of human ... activity in confined enclosed spaces is a deficiency in current intelligence, surveillance, and reconnaissance (ISR) systems. In addition, operations in

  14. Problems associated with nondestructive evaluation of bridges

    DOT National Transportation Integrated Search

    1995-06-01

    The Orlando Metropolitan Area has a rich history in the development and deployment of intelligent Transportation Systems (ITS). Starting in 1990, the Florida Department of Transportation (FDOT) began development of a freeway surveillance system for l...

  15. Air Pollution Affects Community Health

    ERIC Educational Resources Information Center

    Shy, Carl M.; Finklea, John F.

    1973-01-01

    Community Health and Environmental Surveillance System (CHESS), a nationwide program relating community health to environmental quality, is designed to evaluate existing environmental standards, obtain health intelligence for new standards, and document health benefits of air pollution control. (BL)

  16. Lighter-Than-Air (LTA) "AirStation": Unmanned Aircraft System (UAS) Carrier Concept

    NASA Technical Reports Server (NTRS)

    Hochstetler, Ron; Chachad, Girish; Blanken, Matthew; Bosma, John

    2016-01-01

    Proposals for adapting modern airship technologies for military missions have mostly focused on exploiting the airships high flight endurance and low fuel requirement to conduct direct surveillance missions requiring high degrees of persistence over the areas to be observed. While this mission has value, it constrains the airship in two regards. (1) It places all the surveillance sensors, communication systems, and other mission equipment in the airship itself. (2) It requires the airship to be physically in the vicinity of the areas to be directly observed. A more advanced utilization of airship technology would be to add the capability to deploy a separate set of surveillance equipment, thereby enabling indirect and distributed observation operations. This can be undertaken by installing surveillance equipment in a squadron of unmanned aircraft systems (UAS) that can be carried and operated remotely from the airship, and then return to the airship as a base of support. This could be accomplished by deploying 20-30 UASs on an optionally manned (5 person crew) airship. The mission focus of the airship UAS carrier would be for support of distributed intelligence, surveillance and reconnaissance (ISR), close air support (CAS), maritime patrol and interdiction, electronic warfare (EW), persistent area dominance and missile defense. The logic for utilizing an airship carrier over a ground base to deploy UAS will be examined. Whether to be used as a stand-alone platform or in concert with conventional intelligence gathering techniques, the airship UAS carrier can provide the following benefits: a mobile base that will remain accessible despite political fallout which may render a ground base unavailable for use, the psychological impact of a power projection tool that has no geographical limits (imagined in the same way a naval carrier group projects power), cost-saving intelligence gathering over manned alternatives (assumption), and a wider area of influence when compared to an immobile ground base that must facilitate the transfer of UAS to other bases in order to overfly particular areas (all operations, launch, recover, etc. take place from the airship).

  17. Foreign Languages: Workforce Planning Could Help Address Staffing and Proficiency Shortfalls. Testimony before the Subcommittee on International Security, Proliferation, and Federal Services, Committee on Governmental Affairs, U.S. Senate.

    ERIC Educational Resources Information Center

    Westin, Susan S.

    This statement examines the nature and impact of foreign language proficiency and personnel shortages in the Army, State Department, Central Intelligence Agency, and Federal Bureau of Investigation (FBI), discussing strategies used to address these shortages and efforts made to address current and projected shortages. All four agencies reported…

  18. High Frontier: The Journal for Space & Missile Professionals. Volume 2, Number 3

    DTIC Science & Technology

    2006-04-01

    of businesses that do not have a disaster plan go out of business after a major loss like a fire, a break-in, or a storm.”2 Gartner Dataquest...information exchange between and across all echelons of com- mand and control, logistics, and intelligence , surveillance, and reconnaissance (ISR...swiftly process, manage, and fuse intelligence from across a variety of sources in order to reduce information cycle timelines and thus shorten the

  19. The Concurrent Implementation of Radio Frequency Identification and Unique Item Identification at Naval Surface Warfare Center, Crane, IN as a Model for a Navy Supply Chain Application

    DTIC Science & Technology

    2007-12-01

    electromagnetic theory related to RFID in his works “ Field measurements using active scatterers” and “Theory of loaded scatterers”. At the same time...Business Case Analysis BRE: Bangor Radio Frequency Evaluation C4ISR: Command, Control, Communications, Computers, Intelligence, Surveillance...Surveillance EEDSKs: Early Entry Deployment Support Kits EHF: Extremely High Frequency xvi EUCOM: European Command FCC : Federal Communications

  20. Infectious diseases prioritisation for event-based surveillance at the European Union level for the 2012 Olympic and Paralympic Games.

    PubMed

    Economopoulou, A; Kinross, P; Domanovic, D; Coulombier, D

    2014-04-17

    In 2012, London hosted the Olympic and Paralympic Games (the Games), with events occurring throughout the United Kingdom (UK) between 27 July and 9 September 2012. Public health surveillance was performed by the Health Protection Agency (HPA). Collaboration between the HPA and the European Centre for Disease Prevention and Control (ECDC) was established for the detection and assessment of significant infectious disease events (SIDEs) occurring outside the UK during the time of the Games. Additionally, ECDC undertook an internal prioritisation exercise to facilitate ECDC’s decisions on which SIDEs should have preferentially enhanced monitoring through epidemic intelligence activities for detection and reporting in daily surveillance in the European Union (EU). A team of ECDC experts evaluated potential public health risks to the Games, selecting and prioritising SIDEs for event-based surveillance with regard to their potential for importation to the Games, occurrence during the Games or export to the EU/European Economic Area from the Games. The team opted for a multilevel approach including comprehensive disease selection, development and use of a qualitative matrix scoring system and a Delphi method for disease prioritisation. The experts selected 71 infectious diseases to enter the prioritisation exercise of which 27 were considered as priority for epidemic intelligence activities by ECDC for the EU for the Games.

  1. Drivers of Emerging Infectious Disease Events as a Framework for Digital Detection.

    PubMed

    Olson, Sarah H; Benedum, Corey M; Mekaru, Sumiko R; Preston, Nicholas D; Mazet, Jonna A K; Joly, Damien O; Brownstein, John S

    2015-08-01

    The growing field of digital disease detection, or epidemic intelligence, attempts to improve timely detection and awareness of infectious disease (ID) events. Early detection remains an important priority; thus, the next frontier for ID surveillance is to improve the recognition and monitoring of drivers (antecedent conditions) of ID emergence for signals that precede disease events. These data could help alert public health officials to indicators of elevated ID risk, thereby triggering targeted active surveillance and interventions. We believe that ID emergence risks can be anticipated through surveillance of their drivers, just as successful warning systems of climate-based, meteorologically sensitive diseases are supported by improved temperature and precipitation data. We present approaches to driver surveillance, gaps in the current literature, and a scientific framework for the creation of a digital warning system. Fulfilling the promise of driver surveillance will require concerted action to expand the collection of appropriate digital driver data.

  2. Speech-on-speech masking with variable access to the linguistic content of the masker speech for native and nonnative english speakers.

    PubMed

    Calandruccio, Lauren; Bradlow, Ann R; Dhar, Sumitrajit

    2014-04-01

    Masking release for an English sentence-recognition task in the presence of foreign-accented English speech compared with native-accented English speech was reported in Calandruccio et al (2010a). The masking release appeared to increase as the masker intelligibility decreased. However, it could not be ruled out that spectral differences between the speech maskers were influencing the significant differences observed. The purpose of the current experiment was to minimize spectral differences between speech maskers to determine how various amounts of linguistic information within competing speech Affiliationect masking release. A mixed-model design with within-subject (four two-talker speech maskers) and between-subject (listener group) factors was conducted. Speech maskers included native-accented English speech and high-intelligibility, moderate-intelligibility, and low-intelligibility Mandarin-accented English. Normalizing the long-term average speech spectra of the maskers to each other minimized spectral differences between the masker conditions. Three listener groups were tested, including monolingual English speakers with normal hearing, nonnative English speakers with normal hearing, and monolingual English speakers with hearing loss. The nonnative English speakers were from various native language backgrounds, not including Mandarin (or any other Chinese dialect). Listeners with hearing loss had symmetric mild sloping to moderate sensorineural hearing loss. Listeners were asked to repeat back sentences that were presented in the presence of four different two-talker speech maskers. Responses were scored based on the key words within the sentences (100 key words per masker condition). A mixed-model regression analysis was used to analyze the difference in performance scores between the masker conditions and listener groups. Monolingual English speakers with normal hearing benefited when the competing speech signal was foreign accented compared with native accented, allowing for improved speech recognition. Various levels of intelligibility across the foreign-accented speech maskers did not influence results. Neither the nonnative English-speaking listeners with normal hearing nor the monolingual English speakers with hearing loss benefited from masking release when the masker was changed from native-accented to foreign-accented English. Slight modifications between the target and the masker speech allowed monolingual English speakers with normal hearing to improve their recognition of native-accented English, even when the competing speech was highly intelligible. Further research is needed to determine which modifications within the competing speech signal caused the Mandarin-accented English to be less effective with respect to masking. Determining the influences within the competing speech that make it less effective as a masker or determining why monolingual normal-hearing listeners can take advantage of these differences could help improve speech recognition for those with hearing loss in the future. American Academy of Audiology.

  3. Annual Threat Assessment of the Intelligence Community for the Senate Select Committee on Intelligence

    DTIC Science & Technology

    2009-02-12

    industries—so-called beggar-thy-neighbor policies such as competitive currency devaluations , import tariffs, and/or export subsidies—risk unleashing a...in domestic and foreign spending or to devalue the Venezuelan currency and draw down government hard currency reserves to avoid a major economic...early as late 2009. The IMF , which recently released its revised forecast for 2009 projecting an anemic 0.5 percent increase in the global economy

  4. Annual Threat Assessment of the US Intelligence Community for the House Permanent Select Committee on Intelligence

    DTIC Science & Technology

    2010-02-03

    water and power shortages, and a major currency devaluation , raising questions about his longer term political future. On foreign policy, Chavez’s...have not disappeared. Most emerging market nations have weathered the crisis, international private investment flows are recovering, and the IMF has...lose support from the IMF and other sources of finance. Bulgaria, Estonia, Greece, Hungary, Iceland, Ireland, Latvia, Lithuania, and Romania remain

  5. Blood and Treasure: The U.S. Debt and Its Implications for National Defense and Security

    DTIC Science & Technology

    2012-12-01

    Reserve Board, “Major Foreign Holders of Treasury Securities ,” 15 May 2012. http://www.treasury.gov/resource-center/ data -chart- center/tic/Documents...Coupled with numerous cyber -attacks and theft of intelligence, China could be performing dry runs and gaining intelligence on every occasion for the...THE U.S. DEBT AND ITS IMPLICATIONS FOR NATIONAL DEFENSE AND SECURITY by Nicholas C. Malokofsky December 2012 Thesis Advisor: Carolyn

  6. The Global Public Health Intelligence Network and early warning outbreak detection: a Canadian contribution to global public health.

    PubMed

    Mykhalovskiy, Eric; Weir, Lorna

    2006-01-01

    The recent SARS epidemic has renewed widespread concerns about the global transmission of infectious diseases. In this commentary, we explore novel approaches to global infectious disease surveillance through a focus on an important Canadian contribution to the area--the Global Public Health Intelligence Network (GPHIN). GPHIN is a cutting-edge initiative that draws on the capacity of the Internet and newly available 24/7 global news coverage of health events to create a unique form of early warning outbreak detection. This commentary outlines the operation and development of GPHIN and compares it to ProMED-mail, another Internet-based approach to global health surveillance. We argue that GPHIN has created an important shift in the relationship of public health and news information. By exiting the pyramid of official reporting, GPHIN has created a new monitoring technique that has disrupted national boundaries of outbreak notification, while creating new possibilities for global outbreak response. By incorporating news within the emerging apparatus of global infectious disease surveillance, GPHIN has effectively responded to the global media's challenge to official country reporting of outbreak and enhanced the effectiveness and credibility of international public health.

  7. A Distributed, Collaborative Intelligent Agent System Approach for Proactive Postmarketing Drug Safety Surveillance

    PubMed Central

    Ji, Yanqing; Ying, Hao; Farber, Margo S.; Yen, John; Dews, Peter; Miller, Richard E.; Massanari, R. Michael

    2014-01-01

    Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance primarily relies on spontaneous reporting. It is a passive surveillance system and limited by gross underreporting (<10% reporting rate), latency, and inconsistent reporting. We propose a novel team-based intelligent agent software system approach for proactively monitoring and detecting potential ADRs of interest using electronic patient records. We designed such a system and named it ADRMonitor. The intelligent agents, operating on computers located in different places, are capable of continuously and autonomously collaborating with each other and assisting the human users (e.g., the food and drug administration (FDA), drug safety professionals, and physicians). The agents should enhance current systems and accelerate early ADR identification. To evaluate the performance of the ADRMonitor with respect to the current spontaneous reporting approach, we conducted simulation experiments on identification of ADR signal pairs (i.e., potential links between drugs and apparent adverse reactions) under various conditions. The experiments involved over 275 000 simulated patients created on the basis of more than 1000 real patients treated by the drug cisapride that was on the market for seven years until its withdrawal by the FDA in 2000 due to serious ADRs. Healthcare professionals utilizing the spontaneous reporting approach and the ADRMonitor were separately simulated by decision-making models derived from a general cognitive decision model called fuzzy recognition-primed decision (RPD) model that we recently developed. The quantitative simulation results show that 1) the number of true ADR signal pairs detected by the ADRMonitor is 6.6 times higher than that by the spontaneous reporting strategy; 2) the ADR detection rate of the ADRMonitor agents with even moderate decision-making skills is five times higher than that of spontaneous reporting; and 3) as the number of patient cases increases, ADRs could be detected significantly earlier by the ADRMonitor. PMID:20007038

  8. Distributed video data fusion and mining

    NASA Astrophysics Data System (ADS)

    Chang, Edward Y.; Wang, Yuan-Fang; Rodoplu, Volkan

    2004-09-01

    This paper presents an event sensing paradigm for intelligent event-analysis in a wireless, ad hoc, multi-camera, video surveillance system. In particilar, we present statistical methods that we have developed to support three aspects of event sensing: 1) energy-efficient, resource-conserving, and robust sensor data fusion and analysis, 2) intelligent event modeling and recognition, and 3) rapid deployment, dynamic configuration, and continuous operation of the camera networks. We outline our preliminary results, and discuss future directions that research might take.

  9. Is Language a Factor in the Perception of Foreign Accent Syndrome?

    PubMed

    Jose, Linda; Read, Jennifer; Miller, Nick

    2016-06-01

    Neurogenic foreign accent syndrome (FAS) is diagnosed when listeners perceive speech associated with motor speech impairments as foreign rather than disordered. Speakers with foreign accent syndrome typically have aphasia. It remains unclear how far language changes might contribute to the perception of foreign accent syndrome independent of accent. Judges with and without training in language analysis rated orthographic transcriptions of speech from people with foreign accent syndrome, speech-language disorder and no foreign accent syndrome, foreign accent without neurological impairment and healthy controls on scales of foreignness, normalness and disorderedness. Control speakers were judged as significantly more normal, less disordered and less foreign than other groups. Foreign accent syndrome speakers' transcriptions consistently profiled most closely to those of foreign speakers and significantly different to speakers with speech-language disorder. On normalness and foreignness ratings there were no significant differences between foreign and foreign accent syndrome speakers. For disorderedness, foreign accent syndrome participants fell midway between foreign speakers and those with speech-language impairment only. Slower rate, more hesitations, pauses within and between utterances influenced judgments, delineating control scripts from others. Word-level syntactic and morphological deviations and reduced syntactic and semantic repertoire linked strongly with foreignness perceptions. Greater disordered ratings related to word fragments, poorly intelligible grammatical structures and inappropriate word selection. Language changes influence foreignness perception. Clinical and theoretical issues are addressed.

  10. Watching the Games: public health surveillance for the Sydney 2000 Olympic Games

    PubMed Central

    Jorm, L; Thackway, S; Churches, T; Hills, M

    2003-01-01

    Design: Planning for the system took almost three years. Its major components included increased surveillance of communicable diseases; presentations to sentinel emergency departments; medical encounters at Olympic venues; cruise ship surveillance; environmental and food safety inspections; surveillance for bioterrorism; and global epidemic intelligence. A daily report integrated data from all sources. Setting: Sydney, Australia. Surveillance spanned the period 28 August to 4 October 2000. Participants: Residents of Sydney, athletes and officials, Australian and international visitors. Main results: No outbreaks of communicable diseases were detected. There were around 5% more presentations to Sydney emergency departments than in comparable periods in other years. Several incidents detected through surveillance, including injuries caused by broken glass, and a cluster of presentations related to the use of the drug ecstasy, prompted further action. Conclusions: Key elements in the success of public health surveillance for the Games included its careful planning, its comprehensive coverage of public health issues, and its timely reporting and communication processes. Future systems need to be flexible enough to detect the unexpected. PMID:12540684

  11. Monitoring and diagnosis of vegetable growth based on internet of things

    NASA Astrophysics Data System (ADS)

    Zhang, Qian; Yu, Feng; Fu, Rong; Li, Gang

    2017-10-01

    A new condition monitoring method of vegetable growth was proposed, which was based on internet of things. It was combined remote environmental monitoring, video surveillance, intelligently decision-making and two-way video consultation together organically.

  12. 76 FR 34273 - National Endowment for the Arts; National Council on the Arts 173rd Meeting

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-13

    ... Commander, 70 Intelligence Surveillance and Reconnaissance Wing, Fort Meade, MD on Blue Star Museums; by... discussion, it becomes necessary for the Council to discuss non-public commercial or financial information of...

  13. Intelligent Foreign Particle Inspection Machine for Injection Liquid Examination Based on Modified Pulse-Coupled Neural Networks

    PubMed Central

    Ge, Ji; Wang, YaoNan; Zhou, BoWen; Zhang, Hui

    2009-01-01

    A biologically inspired spiking neural network model, called pulse-coupled neural networks (PCNN), has been applied in an automatic inspection machine to detect visible foreign particles intermingled in glucose or sodium chloride injection liquids. Proper mechanisms and improved spin/stop techniques are proposed to avoid the appearance of air bubbles, which increases the algorithms' complexity. Modified PCNN is adopted to segment the difference images, judging the existence of foreign particles according to the continuity and smoothness properties of their moving traces. Preliminarily experimental results indicate that the inspection machine can detect the visible foreign particles effectively and the detection speed, accuracy and correct detection rate also satisfying the needs of medicine preparation. PMID:22412318

  14. 78 FR 49653 - Reviewing Our Global Signals Intelligence Collection and Communications Technologies

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-15

    ... national security and advances our foreign policy while appropriately accounting for other policy considerations, such as the risk of unauthorized disclosure and our need to maintain the public trust. Within 60...

  15. Are Women More Emotionally Skilled When It Comes to Expression of Emotions in the Foreign Language? Gender, Emotional Intelligence and Personality Traits in Relation to Emotional Expression in the L2

    ERIC Educational Resources Information Center

    Ozanska-Ponikwia, Katarzyna

    2017-01-01

    The present study investigates the link between gender, emotional intelligence (EI), personality traits and self-reported emotional expression in the second language (L2). Data analysis suggests that gender might not influence self-perceived emotional expression in the L2, as the results of the t-test show that both males and females declare…

  16. Studies in Intelligence. Volume 53, Number 2, June 2009

    DTIC Science & Technology

    2009-06-01

    intellig s of foreign states and similar organization lligence has both a defensive mission—prot n—and an offensive mission—finding out ir aims.–Office of...the fundamental question of how homas Powers The Basics of CI Differences in the conceptions of their missions, as well as the political, social...as a distinct subject area,” but he goes on to say that traditional international relations ( IR ) theory on “structural realism” provides a

  17. [Post-marketing surveillance systems for psychoactive prescription drug abuse].

    PubMed

    Nordmann, Sandra; Frauger, Elisabeth; Pauly, Vanessa; Rouby, Frank; Mallaret, Michel; Micallef, Joëlle; Thirion, Xavier

    2011-01-01

    Drugs affecting the central nervous system form a unique group of products for surveillance because they could be misused, abused or diverted. Considering the characteristics of this behaviour that is often concealed, specific post-marketing surveillance systems have been developed to monitor abuse of prescription drugs in some countries. The purpose of this review is to list and to describe post-marketing surveillance systems, according their methodology, in France and in foreign countries. These programs are based on adverse effect notifications, medical or legal consequences of abuse, general or specific population-based survey, professional networks or medication databases. Some programs use simultaneously several information sources. In conclusion, the multifaceted nature, the diversity and the inventiveness of post-marketing surveillance systems reflects the complexity of the abuse issue. © 2011 Société Française de Pharmacologie et de Thérapeutique.

  18. Panel Discussion: Near Real Time Imagery Intelligence How Will We Do It?

    NASA Astrophysics Data System (ADS)

    Andraitis, Arthur A.; Crane, Alfred C.; Daniels, George; Graham, Johnny; LaGesse, Francis R.

    1987-02-01

    This afternoon's panel discussion will address near real time imagery and intelligence--how will we do it? Our moderator is Arthur Andraitis, a consultant in intelligence reconnaissance systems and international marketing. He was commissioned in the United States Air Force out of the University of Idaho, and entered the Air Force in 1955 where he became an Image Intelligence Officer serving in a variety of intelligence and reconnaisance related assignments, including two tours each in Asia and Europe supporting tactical theater and national level operations. He also suffered through two Pentagon tours--one as Branch Chief of the Imagery Branch for the Assistant Chief of Staff for Intelligence. He was the U. S. National Coordinator for two NATO intelligence and reconnaissance panels, and served several assignments in support of special operations, which included a year with the special forces in Viet Nam where he flew many missions in L-19s, 01 and assault helicopters. He has been an advisor on intelligence and reconnaissance matters to several foreign countries. In 1978 he retired from the United States Air Force, went to work for Itek, and then became an independent consultant in intelligence and reconaissance systems. I would like to introduce Art Andraitis.

  19. Integrated Corridor Management (ICM) Initiative : ICM Surveillance and Detection Requirements for Arterial and Transit Networks

    DOT National Transportation Integrated Search

    2008-10-01

    The primary objective of the ICM Initiative is to demonstrate how Intelligent Transportation System (ITS) technologies can efficiently and proactively facilitate the movement of people and goods through major transportation corridors that comprise a ...

  20. Influence Small State Force Design

    DTIC Science & Technology

    2012-03-22

    Intelligence, Surveillance, and Reconnaissance (ISR), and sustainment formations, become clusters of joint combat power that have the capacity for operations...Global System: Analisis and Ilustrationd from the Case of Island, (Aldershod: Ashgate, 1998), 8-10. 4 Davif Vital, The inequality of States: A

  1. An Analysis of the Requirements and Potential Opportunities for the Future Education of Law Enforcement Intelligence Analysts

    DTIC Science & Technology

    2008-03-01

    thinking as a specialized course. None of these schools requires a foreign language. Only Cal State Fullerton and Sacrament State requires students to...research methods. None of the schools require a foreign language. AMU offers critical thinking as an elective from its General Program for students ...analysts should learn more about the religion. Question Six: Instruction in which of these types of philosophies (Western, Eastern, Middle Eastern, or

  2. Integrated corridor management (ICM) initiative : ICM surveillance and detection needs analysis for the transit data gap.

    DOT National Transportation Integrated Search

    2008-11-01

    The primary objective of the ICM Initiative is to demonstrate how Intelligent Transportation System (ITS) technologies can efficiently and proactively facilitate the movement of people and goods through major transportation corridors that comprise a ...

  3. Integrated corridor management (ICM) initiative : ICM surveillance and detection requirements needs analysis for the arterial data gap.

    DOT National Transportation Integrated Search

    2008-11-01

    The primary objective of the ICM Initiative is to demonstrate how Intelligent Transportation System (ITS) technologies can efficiently and proactively facilitate the movement of people and goods through major transportation corridors that comprise a ...

  4. Speech-on-speech masking with variable access to the linguistic content of the masker speech for native and non-native speakers of English

    PubMed Central

    Calandruccio, Lauren; Bradlow, Ann R.; Dhar, Sumitrajit

    2013-01-01

    Background Masking release for an English sentence-recognition task in the presence of foreign-accented English speech compared to native-accented English speech was reported in Calandruccio, Dhar and Bradlow (2010). The masking release appeared to increase as the masker intelligibility decreased. However, it could not be ruled out that spectral differences between the speech maskers were influencing the significant differences observed. Purpose The purpose of the current experiment was to minimize spectral differences between speech maskers to determine how various amounts of linguistic information within competing speech affect masking release. Research Design A mixed model design with within- (four two-talker speech maskers) and between-subject (listener group) factors was conducted. Speech maskers included native-accented English speech, and high-intelligibility, moderate-intelligibility and low-intelligibility Mandarin-accented English. Normalizing the long-term average speech spectra of the maskers to each other minimized spectral differences between the masker conditions. Study Sample Three listener groups were tested including monolingual English speakers with normal hearing, non-native speakers of English with normal hearing, and monolingual speakers of English with hearing loss. The non-native speakers of English were from various native-language backgrounds, not including Mandarin (or any other Chinese dialect). Listeners with hearing loss had symmetrical, mild sloping to moderate sensorineural hearing loss. Data Collection and Analysis Listeners were asked to repeat back sentences that were presented in the presence of four different two-talker speech maskers. Responses were scored based on the keywords within the sentences (100 keywords/masker condition). A mixed-model regression analysis was used to analyze the difference in performance scores between the masker conditions and the listener groups. Results Monolingual speakers of English with normal hearing benefited when the competing speech signal was foreign-accented compared to native-accented allowing for improved speech recognition. Various levels of intelligibility across the foreign-accented speech maskers did not influence results. Neither the non-native English listeners with normal hearing, nor the monolingual English speakers with hearing loss benefited from masking release when the masker was changed from native-accented to foreign-accented English. Conclusions Slight modifications between the target and the masker speech allowed monolingual speakers of English with normal hearing to improve their recognition of native-accented English even when the competing speech was highly intelligible. Further research is needed to determine which modifications within the competing speech signal caused the Mandarin-accented English to be less effective with respect to masking. Determining the influences within the competing speech that make it less effective as a masker, or determining why monolingual normal-hearing listeners can take advantage of these differences could help improve speech recognition for those with hearing loss in the future. PMID:25126683

  5. Energy Logic (EL): a novel fusion engine of multi-modality multi-agent data/information fusion for intelligent surveillance systems

    NASA Astrophysics Data System (ADS)

    Rababaah, Haroun; Shirkhodaie, Amir

    2009-04-01

    The rapidly advancing hardware technology, smart sensors and sensor networks are advancing environment sensing. One major potential of this technology is Large-Scale Surveillance Systems (LS3) especially for, homeland security, battlefield intelligence, facility guarding and other civilian applications. The efficient and effective deployment of LS3 requires addressing number of aspects impacting the scalability of such systems. The scalability factors are related to: computation and memory utilization efficiency, communication bandwidth utilization, network topology (e.g., centralized, ad-hoc, hierarchical or hybrid), network communication protocol and data routing schemes; and local and global data/information fusion scheme for situational awareness. Although, many models have been proposed to address one aspect or another of these issues but, few have addressed the need for a multi-modality multi-agent data/information fusion that has characteristics satisfying the requirements of current and future intelligent sensors and sensor networks. In this paper, we have presented a novel scalable fusion engine for multi-modality multi-agent information fusion for LS3. The new fusion engine is based on a concept we call: Energy Logic. Experimental results of this work as compared to a Fuzzy logic model strongly supported the validity of the new model and inspired future directions for different levels of fusion and different applications.

  6. Challenge of emerging technologies: balancing the needs of law enforcement against the duty to protect individual rights

    NASA Astrophysics Data System (ADS)

    Lingerfelt, James A.

    1997-01-01

    This paper discusses three emerging technologies which will revolutionize the business operations of law enforcement: databases and search engines; biometric identification systems; and electronic surveillance and tracking devices. Unfortunately, these technologies may also lead to a serious ethical conflict for law enforcement. The tools will make it easier than ever to accomplish the core business of policing: crime prevention; investigation; and intelligence gathering. The same tools, used improperly, will also lead to routine intrusions on personal privacy. These technologies have been and are being developed for the private sector, the military and the intelligence community. The vendors are now aggressively marketing them to law enforcement and criminal justice agencies. The law enforcement community has embraced the technology, but without considering the long term impact. In the past, the police have abused wiretaps and other early surveillance technology. As a result, a sinister perception about police surveillance practices persists and a cumbersome bureaucracy has been imposed to control their use. Developing and establishing policies governing the use of emerging technologies can prevent these mistakes from being repeated. This paper recommends that criminal justice practitioners begin a discussion now, in advance of these technologies becoming commercially available, with a view to defining clear guidelines for their proper use.

  7. 48 CFR 25.702-1 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... Financial Services, the Committee on Foreign Relations, and the Permanent Select Committee on Intelligence... equipment, facilities, personnel, products, services, personal property, real property, or any other...) Consist of providing goods or services to marginalized populations of Sudan; (iv) Consist of providing...

  8. Proceedings of the MIT/ONR Workshop on Distributed Communication and Decision Problems Motivated by Naval C3 Systems (2nd). Held in Monterey, California on 16-27 July 1979. Volume 2

    DTIC Science & Technology

    1980-03-01

    artificial intellegence methods to organize and control the system as well as to interpret surveillance data. • Surveillance and tracking of low-flying...algorithms and an artificial Intellegence approach to the processing and interpretation of the sensor data. At the very least we will consider how to...8:00-8:30 REGISTRATION 8:30-9:30 HALTING THE PROLIFERATION OF ERRORS - AN APPLICATION FOR ARTIFICIAL INTELLIGENCE Gerald Wilson, Senior Comcuter

  9. Monitoring the health of power transformers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Kirtley, J.L. Jr.; Hagman, W.H.; Lesieutre, B.C.

    This article reviews MIT`s model-based system which offers adaptive, intelligent surveillance of transformers, and summons attention to anomalous operation through paging devices. Failures of large power transformers are problematic for four reasons. Generally, large transformers are situated so that failures present operational problems to the system. In addition, large power transformers are encased in tanks of flammable and environmentally hazardous fluid. Failures are often accompanied by fire and/or spillage of this fluid. This presents hazards to people, other equipment and property, and the local environment. Finally, large power transformers are costly devices. There is a clear incentive for utilities tomore » keep track of the health of their power transformers. Massachusetts Institute of Technology (MIT) has developed an adaptive, intelligent, monitoring system for large power transformers. Four large transformers on the Boston Edison system are under continuous surveillance by this system, which can summon attention to anomalous operation through paging devices. The monitoring system offers two advantages over more traditional (not adaptive) methods of tracking transformer operation.« less

  10. New technologies in predicting, preventing and controlling emerging infectious diseases.

    PubMed

    Christaki, Eirini

    2015-01-01

    Surveillance of emerging infectious diseases is vital for the early identification of public health threats. Emergence of novel infections is linked to human factors such as population density, travel and trade and ecological factors like climate change and agricultural practices. A wealth of new technologies is becoming increasingly available for the rapid molecular identification of pathogens but also for the more accurate monitoring of infectious disease activity. Web-based surveillance tools and epidemic intelligence methods, used by all major public health institutions, are intended to facilitate risk assessment and timely outbreak detection. In this review, we present new methods for regional and global infectious disease surveillance and advances in epidemic modeling aimed to predict and prevent future infectious diseases threats.

  11. New technologies in predicting, preventing and controlling emerging infectious diseases

    PubMed Central

    Christaki, Eirini

    2015-01-01

    Surveillance of emerging infectious diseases is vital for the early identification of public health threats. Emergence of novel infections is linked to human factors such as population density, travel and trade and ecological factors like climate change and agricultural practices. A wealth of new technologies is becoming increasingly available for the rapid molecular identification of pathogens but also for the more accurate monitoring of infectious disease activity. Web-based surveillance tools and epidemic intelligence methods, used by all major public health institutions, are intended to facilitate risk assessment and timely outbreak detection. In this review, we present new methods for regional and global infectious disease surveillance and advances in epidemic modeling aimed to predict and prevent future infectious diseases threats. PMID:26068569

  12. Tuberculosis control, and the where and why of artificial intelligence

    PubMed Central

    Falzon, Dennis; Thomas, Bruce V.; Temesgen, Zelalem; Sadasivan, Lal; Raviglione, Mario

    2017-01-01

    Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB. PMID:28656130

  13. Tuberculosis control, and the where and why of artificial intelligence.

    PubMed

    Doshi, Riddhi; Falzon, Dennis; Thomas, Bruce V; Temesgen, Zelalem; Sadasivan, Lal; Migliori, Giovanni Battista; Raviglione, Mario

    2017-04-01

    Countries aiming to reduce their tuberculosis (TB) burden by 2035 to the levels envisaged by the World Health Organization End TB Strategy need to innovate, with approaches such as digital health (electronic and mobile health) in support of patient care, surveillance, programme management, training and communication. Alongside the large-scale roll-out required for such interventions to make a significant impact, products must stay abreast of advancing technology over time. The integration of artificial intelligence into new software promises to make processes more effective and efficient, endowing them with a potential hitherto unimaginable. Users can benefit from artificial intelligence-enabled pattern recognition software for tasks ranging from reading radiographs to adverse event monitoring, sifting through vast datasets to personalise a patient's care plan or to customise training materials. Many experts forecast the imminent transformation of the delivery of healthcare services. We discuss how artificial intelligence and machine learning could revolutionise the management of TB.

  14. Underreporting of viral encephalitis and viral meningitis, Ireland, 2005-2008.

    PubMed

    Kelly, Tara A; O'Lorcain, Piaras; Moran, Joanne; Garvey, Patricia; McKeown, Paul; Connell, Jeff; Cotter, Suzanne

    2013-01-01

    Viral encephalitis (VE) and viral meningitis (VM) have been notifiable infectious diseases under surveillance in the Republic of Ireland since 1981. Laboratories have reported confirmed cases by detection of viral nucleic acid in cerebrospinal fluid since 2004. To determine the prevalence of these diseases in Ireland during 2005-2008, we analyzed 3 data sources: Hospital In-patient Enquiry data (from hospitalized following patients discharge) accessed through Health Intelligence Ireland, laboratory confirmations from the National Virus Reference Laboratory, and events from the Computerised Infectious Disease Reporting surveillance system. We found that the national surveillance system underestimates the incidence of these diseases in Ireland with a 10-fold higher VE hospitalization rate and 3-fold higher VM hospitalization rate than the reporting rate. Herpesviruses were responsible for most specified VE and enteroviruses for most specified VM from all 3 sources. Recommendations from this study have been implemented to improve the surveillance of these diseases in Ireland.

  15. Sensory Intelligence for Extraction of an Abstract Auditory Rule: A Cross-Linguistic Study.

    PubMed

    Guo, Xiao-Tao; Wang, Xiao-Dong; Liang, Xiu-Yuan; Wang, Ming; Chen, Lin

    2018-02-21

    In a complex linguistic environment, while speech sounds can greatly vary, some shared features are often invariant. These invariant features constitute so-called abstract auditory rules. Our previous study has shown that with auditory sensory intelligence, the human brain can automatically extract the abstract auditory rules in the speech sound stream, presumably serving as the neural basis for speech comprehension. However, whether the sensory intelligence for extraction of abstract auditory rules in speech is inherent or experience-dependent remains unclear. To address this issue, we constructed a complex speech sound stream using auditory materials in Mandarin Chinese, in which syllables had a flat lexical tone but differed in other acoustic features to form an abstract auditory rule. This rule was occasionally and randomly violated by the syllables with the rising, dipping or falling tone. We found that both Chinese and foreign speakers detected the violations of the abstract auditory rule in the speech sound stream at a pre-attentive stage, as revealed by the whole-head recordings of mismatch negativity (MMN) in a passive paradigm. However, MMNs peaked earlier in Chinese speakers than in foreign speakers. Furthermore, Chinese speakers showed different MMN peak latencies for the three deviant types, which paralleled recognition points. These findings indicate that the sensory intelligence for extraction of abstract auditory rules in speech sounds is innate but shaped by language experience. Copyright © 2018 IBRO. Published by Elsevier Ltd. All rights reserved.

  16. National Security and Civil Liberty: Striking the Balance

    ERIC Educational Resources Information Center

    Lopach, James J.; Luckowski, Jean A.

    2006-01-01

    After September 11, 2001, the Bush administration initiated large-scale electronic surveillance within the United States to gather intelligence to protect citizens from terrorists. Media commentary, public reaction, and classroom practices regarding this program have tended toward either-or positions: either for presidential power and national…

  17. Air National Guard Intelligence Surveillance and Reconnaissance: A New Way of Doing Business

    DTIC Science & Technology

    Additionally, this operational demand had far outpaced published guidance for ISR manning and organization, leaving critical gaps in organizational development...group was used to analyze current published guidance for manpower and organization of ISR and each missions unique structure. Additionally, the weapons

  18. Computer Ethics Topics and Teaching Strategies.

    ERIC Educational Resources Information Center

    DeLay, Jeanine A.

    An overview of six major issues in computer ethics is provided in this paper: (1) unauthorized and illegal database entry, surveillance and monitoring, and privacy issues; (2) piracy and intellectual property theft; (3) equity and equal access; (4) philosophical implications of artificial intelligence and computer rights; (5) social consequences…

  19. Project 1946: Phase II

    DTIC Science & Technology

    2010-07-01

    History (Project 1946 - Phase II),” for the National Intelligence Council. The views, opinions, and findings should not be construed as representing...29 Section 1: Senior Leadership  Foreign Assistance  Officer Corps  Saddam‘s Personality ...45 Section 3: Personal Interactions with Saddam  Senior Leadership

  20. Safety and Health Evaluation - Command, Control Communication, Computers, Intelligence, Surveillance, Reconnaissance, and Electronic Warfare Equipment. Change 1

    DTIC Science & Technology

    2015-02-25

    required. For example, RF transmitting equipment is tested for Hazards of Electromagnetic Radiation to Personnel ( HERP ) at EPG’s Electromagnetic...Environmental Effects EPG U.S. Army Electronic Proving Ground GFCI ground fault circuit interrupter GOTS Government off-the-shelf HERP

  1. The New Intelligence, Surveillance, and Reconnaissance Cockpit: Examining the Contributions of Emerging Unmanned Aircraft Systems

    DTIC Science & Technology

    2010-04-25

    other method involves the development of software-based pheromones ; borrowing from the genetic behaviors employed by ants and termites . 170 UAVs and...UCAVs employing this theoretical technique can essentially mark coverage areas and targets with “digital pheromones .” 171 Both concepts are

  2. UAVs Being Used for Environmental Surveying

    ScienceCinema

    Chung, Sandra

    2017-12-09

    UAVs, are much more sophisticated than your typical remote-controlled plane. INL robotics and remote sensing experts have added state-of-the-art imaging and wireless technology to the UAVs to create intelligent remote surveillance craft that can rapidly survey a wide area for damage and track down security threats.

  3. Overhauling the Airborne Intelligence, Surveillance, and Reconnaissance Systems Procurement Process

    DTIC Science & Technology

    2011-03-18

    over 300,000 returning troops suffering from major depression or post-traumatic stress disorder and at least 320,000 brain injuries received6, the...Accessed December 31, 2010) 24 “Aviation Fuel,” linked from the U.S. Centennial of Flight Commission Home Page at “Essays,” http

  4. Soldier Decision-Making for Allocation of Intelligence, Surveillance, and Reconnaissance Assets

    DTIC Science & Technology

    2014-06-01

    Judgments; also called Algoritmic or Statistical Judgements Computer Science , Psychology, and Statistics Actuarial or algorithmic...Jan. 2011. [17] R. M. Dawes, D. Faust, and P. E. Meehl, “Clinical versus Actuarial Judgment,” Science , vol. 243, no. 4899, pp. 1668–1674, 1989. [18...School of Computer Science

  5. The War on Terror, Intelligence Convergence, and Privacy

    DTIC Science & Technology

    2012-05-31

    surveillance directed at domestic threats to U.S. national security.”17 Then, in reaction to Watergate and other “ scandals that involved overreaching into U.S...killing, and the propriety of the Total Information Awareness data-mining program. The list continues with what some label as scandals such as NSA

  6. Imported malaria in Finland 1995 to 2008: an overview of surveillance, travel trends, and antimalarial drug sales.

    PubMed

    Guedes, Sandra; Siikamäki, Heli; Kantele, Anu; Lyytikäinen, Outi

    2010-01-01

    To improve pre-travel advice, we analyzed nationwide population-based surveillance data on malaria cases reported to the National Infectious Disease Register of Finland (population 5.3 million) during 1995 to 2008 and related it to data on traveling and antimalarial drug sales. Surveillance data comprised information on malaria cases reported to the National Infectious Disease Register during 1995 to 2008. Traveling data were obtained from Statistics Finland (SF) and the Association of Finnish Travel Agents (AFTA). SF data included information on overnight leisure trips to malaria-endemic countries during 2000 to 2008. AFTA data included annual number of organized trips during 1999 to 2007. Quarterly numbers of antimalarial drug sales were obtained from the Finnish Medicines Agency. Descriptive and time series analyses were performed. A total of 484 malaria cases (average annual incidence 0.7/100,000 population) were reported; 283 patients were Finnish- and 201 foreign-born. In all, 15% of all cases were children; 72% foreign- and 28% Finnish-born. Malaria infections were mostly acquired in Africa (76%). Among foreign-born cases, 89% of the infections were acquired in the region of birth. The most common species were Plasmodium falciparum (61%) and Plasmodium vivax (22%). Although traveling to malaria-endemic areas increased, no increase occurred in malaria cases, and a decreasing trend was present in antimalarial drug sales. Traveling to malaria-endemic countries and drug sales followed the same seasonal pattern, with peaks in the first and last quarter of the year. More efforts should be focused on disseminating pre-travel advice to immigrants planning to visit friends and relatives and travelers on self-organized trips. © 2010 International Society of Travel Medicine.

  7. Enhanced surveillance for tuberculosis among foreign-born persons, Finland, 2014-2016.

    PubMed

    Räisänen, Pirre E; Soini, Hanna; Turtiainen, Pirjo; Vasankari, Tuula; Ruutu, Petri; Nuorti, J Pekka; Lyytikäinen, Outi

    2018-05-09

    Tuberculosis (TB) in foreign-born residents is increasing in many European countries including Finland. We conducted enhanced TB surveillance to collect supplementary information on TB cases among recent immigrants and their children to provide data for revising TB control policies in Finland to take into account the decrease in native cases and increase in foreign-born cases. TB cases were identified from the National Infectious Diseases Register. Data on foreign-born (if not available, most recent nationality other than Finnish) TB cases notified during 2014-2016 (country of birth, date of arrival to Finland, participation in TB screening, date of first symptoms, and details of possible contact tracing) were requested from physicians responsible for regional communicable disease control through a web-based questionnaire. Questionnaires were returned for 203 (65%) of 314 foreign-born TB cases; 36 (18%) were paediatric cases TB was detected in arrival screening in 42 (21%) and during contact tracing of another TB case in 18 (9%); 143 (70%) cases sought care for symptoms or were identified by chance (e.g. chest x-ray because of an accident). Of cases with data available, 48 (24%) cases were diagnosed within 3 months of arrival to Finland, 55 (27%) cases between 3 months and 2 years from arrival, and 84 (42%) cases after 2 years from arrival. Of all the foreign-born cases, 17% had been in a reception centre in Finland and 15% had been in a refugee camp abroad. In addition to asylum seekers and refugees, TB screening should be considered for immigrants arriving from high TB incidence countries, since the majority of TB cases were detected among persons who immigrated to Finland due to other reasons, presumably work or study. Further evaluation of the target group and timing of TB screening is warranted to update national screening guidance.

  8. The neural processing of foreign-accented speech and its relationship to listener bias

    PubMed Central

    Yi, Han-Gyol; Smiljanic, Rajka; Chandrasekaran, Bharath

    2014-01-01

    Foreign-accented speech often presents a challenging listening condition. In addition to deviations from the target speech norms related to the inexperience of the nonnative speaker, listener characteristics may play a role in determining intelligibility levels. We have previously shown that an implicit visual bias for associating East Asian faces and foreignness predicts the listeners' perceptual ability to process Korean-accented English audiovisual speech (Yi et al., 2013). Here, we examine the neural mechanism underlying the influence of listener bias to foreign faces on speech perception. In a functional magnetic resonance imaging (fMRI) study, native English speakers listened to native- and Korean-accented English sentences, with or without faces. The participants' Asian-foreign association was measured using an implicit association test (IAT), conducted outside the scanner. We found that foreign-accented speech evoked greater activity in the bilateral primary auditory cortices and the inferior frontal gyri, potentially reflecting greater computational demand. Higher IAT scores, indicating greater bias, were associated with increased BOLD response to foreign-accented speech with faces in the primary auditory cortex, the early node for spectrotemporal analysis. We conclude the following: (1) foreign-accented speech perception places greater demand on the neural systems underlying speech perception; (2) face of the talker can exaggerate the perceived foreignness of foreign-accented speech; (3) implicit Asian-foreign association is associated with decreased neural efficiency in early spectrotemporal processing. PMID:25339883

  9. Annual Report to Congress on Foreign Economic Collection and Industrial Espionage - 2004

    DTIC Science & Technology

    2005-04-01

    Administration ( DTSA ) • Department of Energy (DOE) • Department of Justice (DOJ) • Department of State, including the Bureau of Intelligence and...Threat Reduction Agency DTSA Defense Technology Security Administration EAR Export Administration Regulations 18 EEA Economic Espionage Act of 1996

  10. 31 CFR 560.215 - Prohibitions on foreign entities owned or controlled by U.S. persons.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... knowingly means that the person engages in the transaction with actual knowledge or reason to know. (3) For... intelligence activities of the United States Government. Note to § 560.215: A U.S. person is subject to the...

  11. 31 CFR 560.215 - Prohibitions on foreign entities owned or controlled by U.S. persons.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... knowingly means that the person engages in the transaction with actual knowledge or reason to know. (3) For... intelligence activities of the United States Government. Note to § 560.215: A U.S. person is subject to the...

  12. Falkland’s War: Strategic, Intelligence and Diplomatic Failures

    DTIC Science & Technology

    1985-05-01

    Foreign and Commonwealth Office. Background Brief: Argentina Misinformation, July 1982. El Diario de Caracas. Special Edition: Las Malvinas. Mayo 1982...Daily Telegraph, 27 April 1982. • Aldo Ferrer. " Economia Argentina y estrategia preindustrial" in Alain Ronquie, ed.. Argentina hoy. Buenos Aires

  13. Individual differences in adult foreign language learning: the mediating effect of metalinguistic awareness.

    PubMed

    Brooks, Patricia J; Kempe, Vera

    2013-02-01

    In this study, we sought to identify cognitive predictors of individual differences in adult foreign-language learning and to test whether metalinguistic awareness mediated the observed relationships. Using a miniature language-learning paradigm, adults (N = 77) learned Russian vocabulary and grammar (gender agreement and case marking) over six 1-h sessions, completing tasks that encouraged attention to phrases without explicitly teaching grammatical rules. The participants' ability to describe the Russian gender and case-marking patterns mediated the effects of nonverbal intelligence and auditory sequence learning on grammar learning and generalization. Hence, even under implicit-learning conditions, individual differences stemmed from explicit metalinguistic awareness of the underlying grammar, which, in turn, was linked to nonverbal intelligence and auditory sequence learning. Prior knowledge of languages with grammatical gender (predominantly Spanish) predicted learning of gender agreement. Transfer of knowledge of gender from other languages to Russian was not mediated by awareness, which suggests that transfer operates through an implicit process akin to structural priming.

  14. Semantic querying of relational data for clinical intelligence: a semantic web services-based approach

    PubMed Central

    2013-01-01

    Background Clinical Intelligence, as a research and engineering discipline, is dedicated to the development of tools for data analysis for the purposes of clinical research, surveillance, and effective health care management. Self-service ad hoc querying of clinical data is one desirable type of functionality. Since most of the data are currently stored in relational or similar form, ad hoc querying is problematic as it requires specialised technical skills and the knowledge of particular data schemas. Results A possible solution is semantic querying where the user formulates queries in terms of domain ontologies that are much easier to navigate and comprehend than data schemas. In this article, we are exploring the possibility of using SADI Semantic Web services for semantic querying of clinical data. We have developed a prototype of a semantic querying infrastructure for the surveillance of, and research on, hospital-acquired infections. Conclusions Our results suggest that SADI can support ad-hoc, self-service, semantic queries of relational data in a Clinical Intelligence context. The use of SADI compares favourably with approaches based on declarative semantic mappings from data schemas to ontologies, such as query rewriting and RDFizing by materialisation, because it can easily cope with situations when (i) some computation is required to turn relational data into RDF or OWL, e.g., to implement temporal reasoning, or (ii) integration with external data sources is necessary. PMID:23497556

  15. The Warfighter Associate: decision-support software agent for the management of intelligence, surveillance, and reconnaissance (ISR) assets

    NASA Astrophysics Data System (ADS)

    Buchler, Norbou; Marusich, Laura R.; Sokoloff, Stacey

    2014-06-01

    A unique and promising intelligent agent plug-in technology for Mission Command Systems— the Warfighter Associate (WA)— is described that enables individuals and teams to respond more effectively to the cognitive challenges of Mission Command, such as managing limited intelligence, surveillance, and reconnaissance (ISR) assets and information sharing in a networked environment. The WA uses a doctrinally-based knowledge representation to model role-specific workflows and continuously monitors the state of the operational environment to enable decision-support, delivering the right information to the right person at the right time. Capabilities include: (1) analyzing combat events reported in chat rooms and other sources for relevance based on role, order-of-battle, time, and geographic location, (2) combining seemingly disparate pieces of data into meaningful information, (3) driving displays to provide users with map based and textual descriptions of the current tactical situation, and (4) recommending courses of action with respect to necessary staff collaborations, execution of battle-drills, re-tasking of ISR assets, and required reporting. The results of a scenario-based human-in-the-loop experiment are reported. The underlying WA knowledge-graph representation serves as state traces, measuring aspects of Soldier decision-making performance (e.g. improved efficiency in allocating limited ISR assets) across runtime as dynamic events unfold on a simulated battlefield.

  16. Digital disease detection: A systematic review of event-based internet biosurveillance systems.

    PubMed

    O'Shea, Jesse

    2017-05-01

    Internet access and usage has changed how people seek and report health information. Meanwhile,infectious diseases continue to threaten humanity. The analysis of Big Data, or vast digital data, presents an opportunity to improve disease surveillance and epidemic intelligence. Epidemic intelligence contains two components: indicator based and event-based. A relatively new surveillance type has emerged called event-based Internet biosurveillance systems. These systems use information on events impacting health from Internet sources, such as social media or news aggregates. These systems circumvent the limitations of traditional reporting systems by being inexpensive, transparent, and flexible. Yet, innovations and the functionality of these systems can change rapidly. To update the current state of knowledge on event-based Internet biosurveillance systems by identifying all systems, including current functionality, with hopes to aid decision makers with whether to incorporate new methods into comprehensive programmes of surveillance. A systematic review was performed through PubMed, Scopus, and Google Scholar databases, while also including grey literature and other publication types. 50 event-based Internet systems were identified, including an extraction of 15 attributes for each system, described in 99 articles. Each system uses different innovative technology and data sources to gather data, process, and disseminate data to detect infectious disease outbreaks. The review emphasises the importance of using both formal and informal sources for timely and accurate infectious disease outbreak surveillance, cataloguing all event-based Internet biosurveillance systems. By doing so, future researchers will be able to use this review as a library for referencing systems, with hopes of learning, building, and expanding Internet-based surveillance systems. Event-based Internet biosurveillance should act as an extension of traditional systems, to be utilised as an additional, supplemental data source to have a more comprehensive estimate of disease burden. Copyright © 2017 Elsevier B.V. All rights reserved.

  17. Foreign language reading and spelling in gifted students with dyslexia in secondary education.

    PubMed

    van Viersen, Sietske; de Bree, Elise H; Kalee, Lilian; Kroesbergen, Evelyn H; de Jong, Peter F

    2017-01-01

    A few studies suggest that gifted children with dyslexia have better literacy skills than averagely intelligent children with dyslexia. This finding aligns with the hypothesis that giftedness-related factors provide compensation for poor reading. The present study investigated whether, as in the native language (NL), the level of foreign language (FL) literacy of gifted students with dyslexia is higher than the literacy level of averagely intelligent students with dyslexia and whether this difference can be accounted for by the difference in their NL literacy level. The sample consisted of 148 Dutch native speaking secondary school students divided in four groups: dyslexia, gifted/dyslexia, typically developing (TD), and gifted. All students were assessed on word reading and orthographic knowledge in Dutch and English when they were in 7th or 8th grade. A subsample ( n  = 71) was (re)assessed on Dutch, English, French, and German literacy one year later. Results showed that Dutch gifted students with dyslexia have higher NL literacy levels than averagely intelligent students with dyslexia. As in the NL, a stepwise pattern of group differences was found for English word reading and spelling, i.e., dyslexia < gifted/dyslexia < TD < gifted. However, it was not found for French and German literacy performance. These results point towards compensation: the higher English literacy levels of gifted/dyslexic students compared to their averagely intelligent dyslexic peers result from mechanisms that are unique to English as a FL. Differences in results between FLs are discussed in terms of variation in orthographic transparency and exposure.

  18. Serious Use of a Serious Game for Language Learning

    ERIC Educational Resources Information Center

    Johnson, W. Lewis

    2010-01-01

    The Tactical Language and Culture Training System (TLCTS) helps learners acquire basic communicative skills in foreign languages and cultures. Learners acquire communication skills through a combination of interactive lessons and serious games. Artificial intelligence plays multiple roles in this learning environment: to process the learner's…

  19. Atlas of the Soviet Union.

    ERIC Educational Resources Information Center

    Young, Harry F.

    This atlas consists of 20 maps, tables, charts, and graphs with complementary text illustrating Soviet government machinery, trade and political relations, and military stance. Some topics depicted by charts and graphs include: (1) Soviet foreign affairs machinery; (2) Soviet intelligence and security services; (4) Soviet position in the United…

  20. 10 CFR 95.17 - Processing facility clearance.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... existing facility clearance granted by a current CSA and authorize possession of license or certificate... concerning the foreign intelligence threat, risk of unauthorized technology transfer, type and sensitivity of..., certificate holder, or other person must advise the NRC within 30 days of any significant events or changes...

  1. 10 CFR 95.17 - Processing facility clearance.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... existing facility clearance granted by a current CSA and authorize possession of license or certificate... concerning the foreign intelligence threat, risk of unauthorized technology transfer, type and sensitivity of..., certificate holder, or other person must advise the NRC within 30 days of any significant events or changes...

  2. Demonizing in the Gulf War: Reading the Archetypes.

    ERIC Educational Resources Information Center

    Zorn, Jeff

    1991-01-01

    Argues the artificial, propagandistic quality of demonizing the enemy, a technique used by both sides in the Persian Gulf War. Asserts that principled and effective foreign policymaking requires intelligence and moral courage, whereas demonizing the enemy requires only a phrase book and the will to injure. (PRA)

  3. 99 Facts about the FBI: Questions and Answers.

    ERIC Educational Resources Information Center

    Federal Bureau of Investigation, Quantico, VA.

    This booklet on the Federal Bureau of Investigation (FBI) attempts to provide an overview of the FBI's functions. Presented in a question and answer format, the 99 questions and answers discuss the federal government agency's history, administrative matters, jurisdiction, criminal investigations, security matters, foreign counter-intelligence, and…

  4. The CIA-Media Connection.

    ERIC Educational Resources Information Center

    Zerbinos, Eugenia

    The Central Intelligence Agency (CIA) has paid journalists, used information from unpaid journalists, owned foreign media outlets, planted stories, and put the lid on other stories throughout its 30-year history. Journalism makes a good cover for agents because journalists can ask questions without arousing suspicion. It has been estimated that…

  5. Preparing for One War and Getting Another?

    DTIC Science & Technology

    2010-09-01

    Foreign Affairs, July/August 2000. 46. Max Boot and Richard Bennet, “The Colombian Miracle: How Alvaro Uribe with Smart U.S. Support Turned the Tide...Colombia, and measures taken by President Alvaro Uribe’s administration, which have benefited from high-level intelligence penetration of the FARC. To

  6. High-efficient Unmanned Aircraft System Operations for Ecosystem Assessment

    NASA Astrophysics Data System (ADS)

    Xu, H.; Zhang, H.

    2016-02-01

    Diverse national and international agencies support the idea that incorporating Unmanned Aircraft Systems (UAS) into ecosystem assessment will improve the operations efficiency and accuracy. In this paper, a UAS will be designed to monitor the Gulf of Mexico's coastal area ecosystems intelligently and routinely. UAS onboard sensors will capture information that can be utilized to detect and geo-locate areas affected by invasive grasses. Moreover, practical ecosystem will be better assessed by analyzing the collected information. Compared with human-based/satellite-based surveillance, the proposed strategy is more efficient and accurate, and eliminates limitations and risks associated with human factors. State of the art UAS onboard sensors (e.g. high-resolution electro optical camera, night vision camera, thermal sensor etc.) will be used for monitoring coastal ecosystems. Once detected the potential risk in ecosystem, the onboard GPS data will be used to geo-locate and to store the exact coordinates of the affected area. Moreover, the UAS sensors will be used to observe and to record the daily evolution of coastal ecosystems. Further, benefitting from the data collected by the UAS, an intelligent big data processing scheme will be created to assess the ecosystem evolution effectively. Meanwhile, a cost-efficient intelligent autonomous navigation strategy will be implemented into the UAS, in order to guarantee that the UAS can fly over designated areas, and collect significant data in a safe and effective way. Furthermore, the proposed UAS-based ecosystem surveillance and assessment methodologies can be utilized for natural resources conservation. Flying UAS with multiple state of the art sensors will monitor and report the actual state of high importance natural resources frequently. Using the collected data, the ecosystem conservation strategy can be performed effectively and intelligently.

  7. Cooperative Surveillance and Pursuit Using Unmanned Aerial Vehicles and Unattended Ground Sensors

    PubMed Central

    Las Fargeas, Jonathan; Kabamba, Pierre; Girard, Anouck

    2015-01-01

    This paper considers the problem of path planning for a team of unmanned aerial vehicles performing surveillance near a friendly base. The unmanned aerial vehicles do not possess sensors with automated target recognition capability and, thus, rely on communicating with unattended ground sensors placed on roads to detect and image potential intruders. The problem is motivated by persistent intelligence, surveillance, reconnaissance and base defense missions. The problem is formulated and shown to be intractable. A heuristic algorithm to coordinate the unmanned aerial vehicles during surveillance and pursuit is presented. Revisit deadlines are used to schedule the vehicles' paths nominally. The algorithm uses detections from the sensors to predict intruders' locations and selects the vehicles' paths by minimizing a linear combination of missed deadlines and the probability of not intercepting intruders. An analysis of the algorithm's completeness and complexity is then provided. The effectiveness of the heuristic is illustrated through simulations in a variety of scenarios. PMID:25591168

  8. Schweizer RU-38A Twin-Condor: covert surveillance aircraft

    NASA Astrophysics Data System (ADS)

    O'Toole, Michael J.; Schweizer, Paul H.

    1997-11-01

    The world order has changed and with it, governments are now faced with waging a new type of `ware.' Regional instability, drug trafficking, environmental issues, international terrorism, and illegal immigration are examples of escalating problems that cross international boundaries and threaten the security of nations. The first and most important element in coping with these illegal activities is the ability to detect and monitor events in a timely and secure fashion. Conventional means of gathering intelligence such as large airborne collection systems and satellites lack the flexibility, dwell times, and cost effectiveness to meet many of today's needs. There is a growing requirement for airborne platforms that can covertly perform surveillance missions during either day or night and in a cost effective manner. To meet this need, Schweizer Aircraft has recently developed the RU-38A twin-engine surveillance aircraft. This paper discusses the evolution and principle design concepts of this aircraft and how its unique performance enables the RU-38A to achieve new levels of surveillance capability.

  9. Underreporting of Viral Encephalitis and Viral Meningitis, Ireland, 2005–2008

    PubMed Central

    O’Lorcain, Piaras; Moran, Joanne; Garvey, Patricia; McKeown, Paul; Connell, Jeff; Cotter, Suzanne

    2013-01-01

    Viral encephalitis (VE) and viral meningitis (VM) have been notifiable infectious diseases under surveillance in the Republic of Ireland since 1981. Laboratories have reported confirmed cases by detection of viral nucleic acid in cerebrospinal fluid since 2004. To determine the prevalence of these diseases in Ireland during 2005–2008, we analyzed 3 data sources: Hospital In-patient Enquiry data (from hospitalized following patients discharge) accessed through Health Intelligence Ireland, laboratory confirmations from the National Virus Reference Laboratory, and events from the Computerised Infectious Disease Reporting surveillance system. We found that the national surveillance system underestimates the incidence of these diseases in Ireland with a 10-fold higher VE hospitalization rate and 3-fold higher VM hospitalization rate than the reporting rate. Herpesviruses were responsible for most specified VE and enteroviruses for most specified VM from all 3 sources. Recommendations from this study have been implemented to improve the surveillance of these diseases in Ireland. PMID:23965781

  10. Satire, Surveillance, and the State: A Classified Primer

    ERIC Educational Resources Information Center

    Bogad, L. M.

    2007-01-01

    This article explores the use of ironic performance in education, particularly around issues of human rights. I examine my own efforts to engage audiences with the history of domestic espionage and sabotage by the intelligence agencies of the United States. This is a history well known to some marginalized counterpublics (see Fraser, 1997), but…

  11. Advanced traveler information systems (ATIS) : development and testing of a surveillance and delay advisory system for rural areas, and evaluation of satellite communications system for mayday applications

    DOT National Transportation Integrated Search

    1999-04-01

    In early 1993, the Federal Highway Administration (FHWA) initiated a comprehensive study of rural applications of Advanced Traveler Information Systems (ATIS). The study objectives were to guide Federal programs with respect to Intelligent Transporta...

  12. A Multi-Resolution Mode CMOS Image Sensor with a Novel Two-Step Single-Slope ADC for Intelligent Surveillance Systems.

    PubMed

    Kim, Daehyeok; Song, Minkyu; Choe, Byeongseong; Kim, Soo Youn

    2017-06-25

    In this paper, we present a multi-resolution mode CMOS image sensor (CIS) for intelligent surveillance system (ISS) applications. A low column fixed-pattern noise (CFPN) comparator is proposed in 8-bit two-step single-slope analog-to-digital converter (TSSS ADC) for the CIS that supports normal, 1/2, 1/4, 1/8, 1/16, 1/32, and 1/64 mode of pixel resolution. We show that the scaled-resolution images enable CIS to reduce total power consumption while images hold steady without events. A prototype sensor of 176 × 144 pixels has been fabricated with a 0.18 μm 1-poly 4-metal CMOS process. The area of 4-shared 4T-active pixel sensor (APS) is 4.4 μm × 4.4 μm and the total chip size is 2.35 mm × 2.35 mm. The maximum power consumption is 10 mW (with full resolution) with supply voltages of 3.3 V (analog) and 1.8 V (digital) and 14 frame/s of frame rates.

  13. Infrared and visible image fusion using discrete cosine transform and swarm intelligence for surveillance applications

    NASA Astrophysics Data System (ADS)

    Paramanandham, Nirmala; Rajendiran, Kishore

    2018-01-01

    A novel image fusion technique is presented for integrating infrared and visible images. Integration of images from the same or various sensing modalities can deliver the required information that cannot be delivered by viewing the sensor outputs individually and consecutively. In this paper, a swarm intelligence based image fusion technique using discrete cosine transform (DCT) domain is proposed for surveillance application which integrates the infrared image with the visible image for generating a single informative fused image. Particle swarm optimization (PSO) is used in the fusion process for obtaining the optimized weighting factor. These optimized weighting factors are used for fusing the DCT coefficients of visible and infrared images. Inverse DCT is applied for obtaining the initial fused image. An enhanced fused image is obtained through adaptive histogram equalization for a better visual understanding and target detection. The proposed framework is evaluated using quantitative metrics such as standard deviation, spatial frequency, entropy and mean gradient. The experimental results demonstrate the outperformance of the proposed algorithm over many other state- of- the- art techniques reported in literature.

  14. Bidirectional clear speech perception benefit for native and high-proficiency non-native talkers and listeners: Intelligibility and accentednessa

    PubMed Central

    Smiljanić, Rajka; Bradlow, Ann R.

    2011-01-01

    This study investigated how native language background interacts with speaking style adaptations in determining levels of speech intelligibility. The aim was to explore whether native and high proficiency non-native listeners benefit similarly from native and non-native clear speech adjustments. The sentence-in-noise perception results revealed that fluent non-native listeners gained a large clear speech benefit from native clear speech modifications. Furthermore, proficient non-native talkers in this study implemented conversational-to-clear speaking style modifications in their second language (L2) that resulted in significant intelligibility gain for both native and non-native listeners. The results of the accentedness ratings obtained for native and non-native conversational and clear speech sentences showed that while intelligibility was improved, the presence of foreign accent remained constant in both speaking styles. This suggests that objective intelligibility and subjective accentedness are two independent dimensions of non-native speech. Overall, these results provide strong evidence that greater experience in L2 processing leads to improved intelligibility in both production and perception domains. These results also demonstrated that speaking style adaptations along with less signal distortion can contribute significantly towards successful native and non-native interactions. PMID:22225056

  15. Moving Object Detection Using Scanning Camera on a High-Precision Intelligent Holder.

    PubMed

    Chen, Shuoyang; Xu, Tingfa; Li, Daqun; Zhang, Jizhou; Jiang, Shenwang

    2016-10-21

    During the process of moving object detection in an intelligent visual surveillance system, a scenario with complex background is sure to appear. The traditional methods, such as "frame difference" and "optical flow", may not able to deal with the problem very well. In such scenarios, we use a modified algorithm to do the background modeling work. In this paper, we use edge detection to get an edge difference image just to enhance the ability of resistance illumination variation. Then we use a "multi-block temporal-analyzing LBP (Local Binary Pattern)" algorithm to do the segmentation. In the end, a connected component is used to locate the object. We also produce a hardware platform, the core of which consists of the DSP (Digital Signal Processor) and FPGA (Field Programmable Gate Array) platforms and the high-precision intelligent holder.

  16. [Cost estimation of an epidemiological surveillance network for animal diseases in Central Africa: a case study of the Chad network].

    PubMed

    Ouagal, M; Berkvens, D; Hendrikx, P; Fecher-Bourgeois, F; Saegerman, C

    2012-12-01

    In sub-Saharan Africa, most epidemiological surveillance networks for animal diseases were temporarily funded by foreign aid. It should be possible for national public funds to ensure the sustainability of such decision support tools. Taking the epidemiological surveillance network for animal diseases in Chad (REPIMAT) as an example, this study aims to estimate the network's cost by identifying the various costs and expenditures for each level of intervention. The network cost was estimated on the basis of an analysis of the operational organisation of REPIMAT, additional data collected in surveys and interviews with network field workers and a market price listing for Chad. These costs were then compared with those of other epidemiological surveillance networks in West Africa. The study results indicate that REPIMAT costs account for 3% of the State budget allocated to the Ministry of Livestock. In Chad in general, as in other West African countries, fixed costs outweigh variable costs at every level of intervention. The cost of surveillance principally depends on what is needed for surveillance at the local level (monitoring stations) and at the intermediate level (official livestock sectors and regional livestock delegations) and on the cost of the necessary equipment. In African countries, the cost of surveillance per square kilometre depends on livestock density.

  17. Academic Travel Abroad for High School Students: Making an Intelligent Choice.

    ERIC Educational Resources Information Center

    Buss, Lois Converse

    Social studies educators frequently receive publicity about programs of academic travel abroad. The sponsoring organizations and institutions claim that these programs will improve foreign language ability, create greater international understanding, and help students grow personally. The question is whether or not these claims are supported by…

  18. On the Effectiveness of Robot-Assisted Language Learning

    ERIC Educational Resources Information Center

    Lee, Sungjin; Noh, Hyungjong; Lee, Jonghoon; Lee, Kyusong; Lee, Gary Geunbae; Sagong, Seongdae; Kim, Munsang

    2011-01-01

    This study introduces the educational assistant robots that we developed for foreign language learning and explores the effectiveness of robot-assisted language learning (RALL) which is in its early stages. To achieve this purpose, a course was designed in which students have meaningful interactions with intelligent robots in an immersive…

  19. Operation Ajax: A Case Study on Analyst-Policymaker Tensions and the Challenges of Estimative Intelligence

    DTIC Science & Technology

    2015-05-21

    London, UK: Granada , 1982). 140 Woodhouse, 117. 141 Ibid., 118. This comment is interesting, because Roosevelt recounted that Smith ultimately...1951. Foreign Relations of the United States, 1952-1954, Vol X, 71-73. Woodhouse, C. M. Something Ventured. London, UK: Granada , 1982

  20. Covert Action: Title 10, Title 50, and the Chain of Command

    DTIC Science & Technology

    2012-01-01

    within the National Foreign Intelligence Program ( NFIP ). The former appears to be an exception that swallows the rule. But even in empowering the...Secretary of Defense’s authority.49 Although the director’s duties include the transfer of “personnel within the NFIP ,” which includes DOD

  1. Applications of Parsing Theory to Computer-Assisted Instruction.

    ERIC Educational Resources Information Center

    Markosian, Lawrence Z.; Ager, Tryg A.

    1983-01-01

    Applications of an LR-1 parsing algorithm to intelligent programs for computer assisted instruction in symbolic logic and foreign languages are discussed. The system has been adequately used for diverse instructional applications, including analysis of student input, generation of pattern drills, and modeling the student's understanding of the…

  2. Dispelling the Myth of the Natural-Born Linguist

    ERIC Educational Resources Information Center

    Mercer, Sarah

    2012-01-01

    An individual's mindset about the perceived malleability of ability or intelligence is known to strongly influence a person's other beliefs, behaviours, and motivation. This article seeks to provide justification for holding a "growth" mindset in the domain of foreign language learning. It discusses contemporary understandings of ability and…

  3. Overview of Constitutional Challenges to NSA Collection Activities and Recent Developments

    DTIC Science & Technology

    2014-04-01

    acquisition of foreign intelligence information went “well beyond garden -variety law enforcement” purposes.106 Furthermore, the court found a high degree of...the affected person may challenge the lawfulness of the acquisition.”). 127 See Charlie Savage , Federal Prosecutors, in a Policy Shift, Cite

  4. Critical Technology Accessibility

    ERIC Educational Resources Information Center

    National Academies Press, 2006

    2006-01-01

    In 2003, the Defense Intelligence Agency asked the NRC to form a standing committee to help develop study topics about technology warning. One issue that was identified was the growing dependence on foreign suppliers of critical technology as a result of the increase in globalization of economic activity. Two important questions emerged for study:…

  5. 22 CFR 505.13 - General exemptions (Subsection (j)).

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 22 Foreign Relations 2 2010-04-01 2010-04-01 true General exemptions (Subsection (j)). 505.13... exemptions (Subsection (j)). (a) General exemptions are available for systems of records which are maintained by the Central Intelligence Agency (Subsection (j)(1)), or maintained by an agency which performs as...

  6. Emerging Approach of Natural Language Processing in Opinion Mining: A Review

    NASA Astrophysics Data System (ADS)

    Kim, Tai-Hoon

    Natural language processing (NLP) is a subfield of artificial intelligence and computational linguistics. It studies the problems of automated generation and understanding of natural human languages. This paper outlines a framework to use computer and natural language techniques for various levels of learners to learn foreign languages in Computer-based Learning environment. We propose some ideas for using the computer as a practical tool for learning foreign language where the most of courseware is generated automatically. We then describe how to build Computer Based Learning tools, discuss its effectiveness, and conclude with some possibilities using on-line resources.

  7. Purposeful Development of the Intelligence, Surveillance, and Reconnaissance for Space Cadre

    DTIC Science & Technology

    2016-07-13

    available. For these reasons, an attack on US space assets seems an un- likely scenario. However, the threat to space has changed since 1967. Enhanced and...get them up to speed on issues that affect ISR support to ACC weapon systems. Context The above scenarios would seem unthinkable to ACC but are very

  8. Radio Frequency Propagation and Performance Assessment Suite (RFPPAS)

    DTIC Science & Technology

    2016-11-15

    Intelligence, Surveillance, and Reconnaissance Clutter-to-Noise Ratio Central Processing Unit Evaporation Duct Climatology Engineer’s Refractive Effects...and maximum trapped wavelength (right) PCS display ...23 12. AREPS surface layer (evaporation duct) climatology regions...evaporation duct profiles computed from surface layer climatological statistics. The impetus for building such a database is to provide a means for instant

  9. Increasing Intelligence, Surveillance, and Reconnaissance (ISR) Operational Agility through Mission Command

    DTIC Science & Technology

    2016-06-10

    Counterinsurgency COM Collections Operations Management CONOP Concept of Operations CRM Collections Requirements Management DOD Department of...collection requirements management ( CRM ) and collection operations management (COM). CRM is the authoritative development and control of collection...management ( CRM ) and collections operations management (COM) (see figure 6). In general, CRM advocates and prioritizes customer requirements while

  10. Resilient Military Systems and the Advanced Cyber Threat

    DTIC Science & Technology

    2013-01-01

    systems; intelligence, surveillance, and reconnaissance systems; logistics and human resource systems; and mobile as well as fixed- infrastructure ...significant portions of military and critical infrastructure : power generation, communications, fuel and transportation, emergency services, financial...vulnerabilities in the domestic power grid and critical infrastructure systems.4,5 DoD, and the United States, is extremely reliant on the

  11. Resource Contention Management in Parallel Systems

    DTIC Science & Technology

    1989-04-01

    technical competence include communications, command and control, battle management, information processing, surveillance sensors, intelligence data ...two-simulation approach since they require only a single simulation run. More importantly, since they involve only observed data , they may also be...we use the original, unobservable RAC of Section 2 and handle un- observable transitions by generating artifcial events, when required, using a random

  12. Joint Fire Support

    DTIC Science & Technology

    2010-06-30

    intelligence application package for theater battle management core system ( TBMCS ) functionality at wing and squadron levels. The automated four... TBMCS , Joint Surveillance and Target Attack Radar System (Ground Control Station), and Global Command and Control System, as well as with Allied FA...The TBMCS is a force level integrated air C2 system. TBMCS provides hardware, software, and communications interfaces to support the preparation

  13. The 2009 DOD Cost Research Workshop: Acquisition Reform

    DTIC Science & Technology

    2010-02-01

    2 ACEIT Enhancement, Help-Desk/Training, Consulting DASA-CE–3 Command, Control, Communications, Computers, Intelligence, Surveillance, and...Management Information System (OSMIS) online interactive relational database DASA-CE–2 Title: ACEIT Enhancement, Help-Desk/Training, Consulting Summary...support and training for the Automated Cost estimator Integrated Tools ( ACEIT ) software suite. ACEIT is the Army standard suite of analytical tools for

  14. Intelligence, Surveillance, and Reconnaissance Fusion for Coalition Operations

    DTIC Science & Technology

    2008-07-01

    classification of the targets of interest. The MMI features extracted in this manner have two properties that provide a sound justification for...are generalizations of well- known feature extraction methods such as Principal Components Analysis (PCA) and Independent Component Analysis (ICA...augment (without degrading performance) a large class of generic fusion processes. Ontologies Classifications Feature extraction Feature analysis

  15. Toward sensor modular autonomy for persistent land intelligence surveillance and reconnaissance (ISR)

    NASA Astrophysics Data System (ADS)

    Thomas, Paul A.; Marshall, Gillian; Faulkner, David; Kent, Philip; Page, Scott; Islip, Simon; Oldfield, James; Breckon, Toby P.; Kundegorski, Mikolaj E.; Clark, David J.; Styles, Tim

    2016-05-01

    Currently, most land Intelligence, Surveillance and Reconnaissance (ISR) assets (e.g. EO/IR cameras) are simply data collectors. Understanding, decision making and sensor control are performed by the human operators, involving high cognitive load. Any automation in the system has traditionally involved bespoke design of centralised systems that are highly specific for the assets/targets/environment under consideration, resulting in complex, non-flexible systems that exhibit poor interoperability. We address a concept of Autonomous Sensor Modules (ASMs) for land ISR, where these modules have the ability to make low-level decisions on their own in order to fulfil a higher-level objective, and plug in, with the minimum of preconfiguration, to a High Level Decision Making Module (HLDMM) through a middleware integration layer. The dual requisites of autonomy and interoperability create challenges around information fusion and asset management in an autonomous hierarchical system, which are addressed in this work. This paper presents the results of a demonstration system, known as Sensing for Asset Protection with Integrated Electronic Networked Technology (SAPIENT), which was shown in realistic base protection scenarios with live sensors and targets. The SAPIENT system performed sensor cueing, intelligent fusion, sensor tasking, target hand-off and compensation for compromised sensors, without human control, and enabled rapid integration of ISR assets at the time of system deployment, rather than at design-time. Potential benefits include rapid interoperability for coalition operations, situation understanding with low operator cognitive burden and autonomous sensor management in heterogenous sensor systems.

  16. Reassessment of psychological distress and post-traumatic stress disorder in United States Air Force Distributed Common Ground System operators.

    PubMed

    Prince, Lillian; Chappelle, Wayne L; McDonald, Kent D; Goodman, Tanya; Cowper, Sara; Thompson, William

    2015-03-01

    The goal of this study was to assess for the main sources of occupational stress, as well as self-reported symptoms of distress and post-traumatic stress disorder among U.S. Air Force (USAF) Distributed Common Ground System (DCGS) intelligence exploitation and support personnel. DCGS intelligence operators (n=1091) and nonintelligence personnel (n = 447) assigned to a USAF Intelligence, Surveillance, and Reconnaissance Wing responded to the web-based survey. The overall survey response rate was 31%. Study results revealed the most problematic stressors among DCGS intelligence personnel included high workload, low manning, as well as organizational leadership and shift work issues. Results also revealed 14.35% of DCGS intelligence operators' self-reported high levels of psychological distress (twice the rate of DCGS nonintelligence support personnel). Furthermore, 2.0% to 2.5% self-reported high levels of post-traumatic stress disorder symptoms, with no significant difference between groups. The implications of these findings are discussed along with recommendations for USAF medical and mental health providers, as well as operational leadership. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.

  17. Smart sensing surveillance video system

    NASA Astrophysics Data System (ADS)

    Hsu, Charles; Szu, Harold

    2016-05-01

    An intelligent video surveillance system is able to detect and identify abnormal and alarming situations by analyzing object movement. The Smart Sensing Surveillance Video (S3V) System is proposed to minimize video processing and transmission, thus allowing a fixed number of cameras to be connected on the system, and making it suitable for its applications in remote battlefield, tactical, and civilian applications including border surveillance, special force operations, airfield protection, perimeter and building protection, and etc. The S3V System would be more effective if equipped with visual understanding capabilities to detect, analyze, and recognize objects, track motions, and predict intentions. In addition, alarm detection is performed on the basis of parameters of the moving objects and their trajectories, and is performed using semantic reasoning and ontologies. The S3V System capabilities and technologies have great potential for both military and civilian applications, enabling highly effective security support tools for improving surveillance activities in densely crowded environments. It would be directly applicable to solutions for emergency response personnel, law enforcement, and other homeland security missions, as well as in applications requiring the interoperation of sensor networks with handheld or body-worn interface devices.

  18. 76 FR 20452 - Unblocking of Specially Designated Nationals and Blocked Persons Pursuant to the Foreign...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-12

    .... FOR FURTHER INFORMATION CONTACT: Assistant Director, Compliance Outreach & Implementation, U.S... their businesses and agents access to the U.S. financial system and to the benefits of trade and... Attorney General, the Director of the Central Intelligence Agency, the Director of the Federal Bureau of...

  19. 75 FR 65558 - Unblocking of Specially Designated Nationals and Blocked Persons Pursuant to the Foreign...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-25

    ..., 2010. FOR FURTHER INFORMATION CONTACT: Assistant Director, Compliance Outreach & Implementation, U.S... organizations on a worldwide basis, with the objective of denying their businesses and agents access to the U.S... Secretary of the Treasury consults with the Attorney General, the Director of the Central Intelligence...

  20. 22 CFR 11.2 - Written examination for appointment to class 7 or 8.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... written examination is designed to permit the Board to test the candidate's intelligence, breadth and quality of knowledge, and understanding. It will consist of three parts: (1) A general ability test, (2... designated cities in the United States and at Foreign Service posts on dates established by the Board of...

  1. 22 CFR 11.2 - Written examination for appointment to class 7 or 8.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... written examination is designed to permit the Board to test the candidate's intelligence, breadth and quality of knowledge, and understanding. It will consist of three parts: (1) A general ability test, (2... designated cities in the United States and at Foreign Service posts on dates established by the Board of...

  2. 22 CFR 11.2 - Written examination for appointment to class 7 or 8.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... written examination is designed to permit the Board to test the candidate's intelligence, breadth and quality of knowledge, and understanding. It will consist of three parts: (1) A general ability test, (2... designated cities in the United States and at Foreign Service posts on dates established by the Board of...

  3. 22 CFR 11.2 - Written examination for appointment to class 7 or 8.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... written examination is designed to permit the Board to test the candidate's intelligence, breadth and quality of knowledge, and understanding. It will consist of three parts: (1) A general ability test, (2... designated cities in the United States and at Foreign Service posts on dates established by the Board of...

  4. 22 CFR 11.2 - Written examination for appointment to class 7 or 8.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... written examination is designed to permit the Board to test the candidate's intelligence, breadth and quality of knowledge, and understanding. It will consist of three parts: (1) A general ability test, (2... designated cities in the United States and at Foreign Service posts on dates established by the Board of...

  5. Childhood Bilingualism and Adult Language Learning Aptitude, CUNY Forum, No. 3.

    ERIC Educational Resources Information Center

    Eisenstein, Miriam

    This paper investigates the influence childhood bilingualism has on adult foreign language learning ability. Early research exploring the influence of bilingualism on general intelligence is mentioned as well as recent studies that present more favorable results. It is hypothesized that childhood bilingualism will have a positive effect on adult…

  6. Machine Learning Algorithms for Statistical Patterns in Large Data Sets

    DTIC Science & Technology

    2018-02-01

    REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR FORCE RESEARCH LABORATORY INFORMATION ...general public, including foreign nations. Copies may be obtained from the Defense Technical Information Center (DTIC) (http://www.dtic.mil...CHIEF ENGINEER: / S / / S / JOHN SPINA JON S. JONES Work Unit Manager Technical Advisor, Information Intelligence

  7. A Comparative Study of the Effect of CALL on Gifted and Non-Gifted Adolescents' English Proficiency

    ERIC Educational Resources Information Center

    Tai, Sophie; Chen, Hao-Jan

    2015-01-01

    Computer-Assisted Language Learning (CALL) has gained increasing acceptance since it provides learners with abundant resources. Most researches confirm the beneficial effect of CALL on English as a Foreign Language (EFL) learners' cognitive, metacognitive, and affective developments. However, the diversity of students' intelligence is associated…

  8. In Pursuit of Alternatives in ELT Methodology: WebQuests

    ERIC Educational Resources Information Center

    Sen, Ayfer; Neufeld, Steve

    2006-01-01

    Although the Internet has opened up a vast new source of information for university students to use and explore, many students lack the skills to find, critically evaluate and intelligently exploit web-based resources. This problem is accentuated in English-medium universities where students learn and use English as a foreign language. In these…

  9. Native-Speaker and English as a Lingua Franca Pronunciation Norms: English Majors' Views

    ERIC Educational Resources Information Center

    Wach, Aleksandra

    2011-01-01

    Within the communicative approach to English as a foreign language (EFL) teaching, the aims of instruction are primarily to enable learners to communicate; hence, functional and communicative intelligibility has become the goal of pronunciation training. On the other hand, contemporary approaches to EFL teaching leave sufficient room for…

  10. Moving Object Detection Using Scanning Camera on a High-Precision Intelligent Holder

    PubMed Central

    Chen, Shuoyang; Xu, Tingfa; Li, Daqun; Zhang, Jizhou; Jiang, Shenwang

    2016-01-01

    During the process of moving object detection in an intelligent visual surveillance system, a scenario with complex background is sure to appear. The traditional methods, such as “frame difference” and “optical flow”, may not able to deal with the problem very well. In such scenarios, we use a modified algorithm to do the background modeling work. In this paper, we use edge detection to get an edge difference image just to enhance the ability of resistance illumination variation. Then we use a “multi-block temporal-analyzing LBP (Local Binary Pattern)” algorithm to do the segmentation. In the end, a connected component is used to locate the object. We also produce a hardware platform, the core of which consists of the DSP (Digital Signal Processor) and FPGA (Field Programmable Gate Array) platforms and the high-precision intelligent holder. PMID:27775671

  11. In depth review of the 1979 AIAA Lighter-Than-Air Systems Technology Conference

    NASA Technical Reports Server (NTRS)

    Ardema, M. D.

    1979-01-01

    The lighter than air (LTA) systems technology conference is reviewed. Highlights of the conference were: (1) the interest shown in patrol and surveillance airships, particularly for coastal patrol missions; (2) the session devoted to overviews of foreign activity; and (3) heavy lift and long range transport aircraft design considerations.

  12. Present status of metrology of electro-optical surveillance systems

    NASA Astrophysics Data System (ADS)

    Chrzanowski, K.

    2017-10-01

    There has been a significant progress in equipment for testing electro-optical surveillance systems over the last decade. Modern test systems are increasingly computerized, employ advanced image processing and offer software support in measurement process. However, one great challenge, in form of relative low accuracy, still remains not solved. It is quite common that different test stations, when testing the same device, produce different results. It can even happen that two testing teams, while working on the same test station, with the same tested device, produce different results. Rapid growth of electro-optical technology, poor standardization, limited metrology infrastructure, subjective nature of some measurements, fundamental limitations from laws of physics, tendering rules and advances in artificial intelligence are major factors responsible for such situation. Regardless, next decade should bring significant improvements, since improvement in measurement accuracy is needed to sustain fast growth of electro-optical surveillance technology.

  13. Use of Unstructured Event-Based Reports for Global Infectious Disease Surveillance

    PubMed Central

    Blench, Michael; Tolentino, Herman; Freifeld, Clark C.; Mandl, Kenneth D.; Mawudeku, Abla; Eysenbach, Gunther; Brownstein, John S.

    2009-01-01

    Free or low-cost sources of unstructured information, such as Internet news and online discussion sites, provide detailed local and near real-time data on disease outbreaks, even in countries that lack traditional public health surveillance. To improve public health surveillance and, ultimately, interventions, we examined 3 primary systems that process event-based outbreak information: Global Public Health Intelligence Network, HealthMap, and EpiSPIDER. Despite similarities among them, these systems are highly complementary because they monitor different data types, rely on varying levels of automation and human analysis, and distribute distinct information. Future development should focus on linking these systems more closely to public health practitioners in the field and establishing collaborative networks for alert verification and dissemination. Such development would further establish event-based monitoring as an invaluable public health resource that provides critical context and an alternative to traditional indicator-based outbreak reporting. PMID:19402953

  14. Particle swarm optimization based space debris surveillance network scheduling

    NASA Astrophysics Data System (ADS)

    Jiang, Hai; Liu, Jing; Cheng, Hao-Wen; Zhang, Yao

    2017-02-01

    The increasing number of space debris has created an orbital debris environment that poses increasing impact risks to existing space systems and human space flights. For the safety of in-orbit spacecrafts, we should optimally schedule surveillance tasks for the existing facilities to allocate resources in a manner that most significantly improves the ability to predict and detect events involving affected spacecrafts. This paper analyzes two criteria that mainly affect the performance of a scheduling scheme and introduces an artificial intelligence algorithm into the scheduling of tasks of the space debris surveillance network. A new scheduling algorithm based on the particle swarm optimization algorithm is proposed, which can be implemented in two different ways: individual optimization and joint optimization. Numerical experiments with multiple facilities and objects are conducted based on the proposed algorithm, and simulation results have demonstrated the effectiveness of the proposed algorithm.

  15. Profile of tuberculosis among the foreign-born population in Japan, 2007–2014

    PubMed Central

    Uchimura, Kazuhiro; Izumi, Kiyohiko; Ohkado, Akihiro; Ishikawa, Nobukatsu

    2016-01-01

    The proportion of foreign-born people among the newly notified tuberculosis (TB) patients has been increasing in recent years and potentially poses a new challenge to TB control in Japan. In this report, we analysed the data from the Japan TB surveillance system between 2007 and 2014 to gain an overview of the trends and characteristics of foreign-born TB patients in Japan. We found that the proportion of foreign-born TB patients was especially high among the younger age groups – 44.1% among the 20–29 years age group in 2014. The largest groups of foreign-born patients were from China and the Philippines; however, the number of those from Nepal and Viet Nam was on the rise. Students comprised the second largest professional category group for TB after regular workers, and its proportion increased over the study period. Compared to Japan-born TB patients, foreign-born patients were more likely to be diagnosed through routine medical check-ups. Treatment successes and patients still on treatment were significantly lower among foreign-born patients than their Japan-born counterparts; and transferred-out and unknown outcomes were higher. Our results indicated that distinctive subgroups within the foreign-born population in Japan, especially students and regular workers, might have a higher risk of developing TB. Measures to ensure early diagnosis and treatment adherence should be adapted to such populations. PMID:27508086

  16. Profile of tuberculosis among the foreign-born population in Japan, 2007-2014.

    PubMed

    Kawatsu, Lisa; Uchimura, Kazuhiro; Izumi, Kiyohiko; Ohkado, Akihiro; Ishikawa, Nobukatsu

    2016-01-01

    The proportion of foreign-born people among the newly notified tuberculosis (TB) patients has been increasing in recent years and potentially poses a new challenge to TB control in Japan. In this report, we analysed the data from the Japan TB surveillance system between 2007 and 2014 to gain an overview of the trends and characteristics of foreign-born TB patients in Japan. We found that the proportion of foreign-born TB patients was especially high among the younger age groups - 44.1% among the 20-29 years age group in 2014. The largest groups of foreign-born patients were from China and the Philippines; however, the number of those from Nepal and Viet Nam was on the rise. Students comprised the second largest professional category group for TB after regular workers, and its proportion increased over the study period. Compared to Japan-born TB patients, foreign-born patients were more likely to be diagnosed through routine medical check-ups. Treatment successes and patients still on treatment were significantly lower among foreign-born patients than their Japan-born counterparts; and transferred-out and unknown outcomes were higher. Our results indicated that distinctive subgroups within the foreign-born population in Japan, especially students and regular workers, might have a higher risk of developing TB. Measures to ensure early diagnosis and treatment adherence should be adapted to such populations.

  17. HIV Transmission Dynamics Among Foreign-Born Persons in the United States.

    PubMed

    Valverde, Eduardo E; Oster, Alexandra M; Xu, Songli; Wertheim, Joel O; Hernandez, Angela L

    2017-12-15

    In the United States (US), foreign-born persons are disproportionately affected by HIV and differ epidemiologically from US-born persons with diagnosed HIV infection. Understanding HIV transmission dynamics among foreign-born persons is important to guide HIV prevention efforts for these populations. We conducted molecular transmission network analysis to describe HIV transmission dynamics among foreign-born persons with diagnosed HIV. Using HIV-1 polymerase nucleotide sequences reported to the US National HIV Surveillance System for persons with diagnosed HIV infection during 2001-2013, we constructed a genetic distance-based transmission network using HIV-TRACE and examined the birth region of potential transmission partners in this network. Of 77,686 people, 12,064 (16%) were foreign born. Overall, 28% of foreign-born persons linked to at least one other person in the transmission network. Of potential transmission partners, 62% were born in the United States, 31% were born in the same region as the foreign-born person, and 7% were born in another region of the world. Most transmission partners of male foreign-born persons (63%) were born in the United States, whereas most transmission partners of female foreign-borns (57%) were born in their same world region. These finding suggests that a majority of HIV infections among foreign-born persons in our network occurred after immigrating to the United States. Efforts to prevent HIV infection among foreign-born persons in the United States should include information of the transmission networks in which these individuals acquire or transmit HIV to develop more targeted HIV prevention interventions.

  18. Enhanced intelligence through optimized TCPED concepts for airborne ISR

    NASA Astrophysics Data System (ADS)

    Spitzer, M.; Kappes, E.; Böker, D.

    2012-06-01

    Current multinational operations show an increased demand for high quality actionable intelligence for different operational levels and users. In order to achieve sufficient availability, quality and reliability of information, various ISR assets are orchestrated within operational theatres. Especially airborne Intelligence, Surveillance and Reconnaissance (ISR) assets provide - due to their endurance, non-intrusiveness, robustness, wide spectrum of sensors and flexibility to mission changes - significant intelligence coverage of areas of interest. An efficient and balanced utilization of airborne ISR assets calls for advanced concepts for the entire ISR process framework including the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED). Beyond this, the employment of current visualization concepts, shared information bases and information customer profiles, as well as an adequate combination of ISR sensors with different information age and dynamic (online) retasking process elements provides the optimization of interlinked TCPED processes towards higher process robustness, shorter process duration, more flexibility between ISR missions and, finally, adequate "entry points" for information requirements by operational users and commands. In addition, relevant Trade-offs of distributed and dynamic TCPED processes are examined and future trends are depicted.

  19. Fifth pathway in New Jersey. House officer preparatory course for US foreign medical graduates.

    PubMed

    McGrough, W E

    1975-06-09

    The Fifth Channel in New Jersey is a Fifth Pathway program for US foreign medical graduates. In its third year, 83 percent of its 81 graduates are house officers at 18 US medical school-affiliated hospitals. Performance as house officers is characterized as competitive with peers, including US graduates. Positive attitudes toward work load, fellow workers, and patients compared with those of fellow house staff are noted. Quality of performance as house officers correlates most strongly with the change in mean scores of two batteries of clinical National Board examinations taken during the Fifth Pathway and less strongly with mean scores of single batteries of National Boards, Intelligence quotient, Educational Council for Foreign Medical Graduates (ECFMG) examination, ang age. Recommendations concerning the implementing of similar programs in other states are presented.

  20. The perspective of USDA APHIS Veterinary Services Emergency Management and Diagnostics in preparing and responding to Foreign Animal Diseases - plans, strategies, and countermeasures.

    PubMed

    Díez, J R; Styles, D K

    2013-01-01

    The United States Department of Agriculture (USDA) Animal and Plant Health Inspection Service (APHIS) Veterinary Services (VS) is charged with monitoring, controlling, and responding to select reportable diseases and all foreign animal diseases. Emergency Management and Diagnostics (EM&D) oversees Foreign Animal Disease (FAD) preparedness and response. In order to effectively prepare for and respond to FADs, such as highly pathogenic avian influenza and foot-and-mouth disease, VS develops plans, strategies, and policies to effectively combat an intrusion. USDA APHIS VS has made significant gains in preparedness and response planning. However, much remains to be done especially in surveillance, diagnostic tools, and vaccines. There are significant needs for novel medical technologies to improve diagnostic capabilities and offer additional approaches for FAD response.

  1. Conclusions

    NASA Astrophysics Data System (ADS)

    Ahonen, Pasi; Alahuhta, Petteri; Daskala, Barbara; Delaitre, Sabine; Hert, Paul De; Lindner, Ralf; Maghiros, Ioannis; Moscibroda, Anna; Schreurs, Wim; Verlinden, Michiel

    Some say that an increase in security does not necessarily mean a further encroachment on privacy - indeed, security is necessary to protect personal data and our privacy. Networks must be secure, our personal devices, reliable, dependable and trustworthy. But security is a multifaceted term, with many dimensions. We are of the view that an increase in security most likely will encroach upon our privacy in an ambient intelligence world. Surveillance cameras will continue to proliferate. We assume that, whatever the law is, whatever privacy protections government and business say they honour, our telecommunications, e-mails and Internet usage will be monitored to an increasing degree. The same will be true of our interfaces with the world of ambient intelligence.

  2. The Development of a Virtual McKenna Military Operations in Urban Terrain (MOUT) Site for Command, Control, Communication, Computing, Intelligence, Surveillance, and Reconnaissance (C4ISR) Studies

    DTIC Science & Technology

    2007-06-01

    4.2 Creating the Skybox and Terrain Model .........................................................................7 4.3 Creating New Textures... Skybox and Terrain Model The next step was to build a sky box. Since it already resided in Raven Shield, the creation of the sky box was limited to

  3. Rapidly expanding range of highly pathogenic avian influenza viruses

    USGS Publications Warehouse

    Hall, Jeffrey S.; Dusek, Robert J.; Spackman, Erica

    2015-01-01

    The movement of highly pathogenic avian influenza (H5N8) virus across Eurasia and into North America and the virus’ propensity to reassort with co-circulating low pathogenicity viruses raise concerns among poultry producers, wildlife biologists, aviculturists, and public health personnel worldwide. Surveillance, modeling, and experimental research will provide the knowledge required for intelligent policy and management decisions.

  4. On the Suitability of Mobile Cloud Computing at the Tactical Edge

    DTIC Science & Technology

    2014-04-23

    geolocation; Facial recognition (photo identification/classification); Intelligence, Surveillance, and Reconnaissance (ISR); and Fusion of Electronic...could benefit most from MCC are those with large processing overhead, low bandwidth requirements, and a need for large database support (e.g., facial ... recognition , language translation). The effect—specifically on the communication links—of supporting these applications at the tactical edge

  5. MIT Lincoln Laboratory 2011 Facts

    DTIC Science & Technology

    2011-01-01

    currently valid OMB control number. 1. REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE MIT Lincoln...primary mission areas—space control ; air and missile defense; communication systems; intelligence, surveillance, and reconnaissance systems; advanced...electronics; tactical systems; homeland protection and chemical and biological defense; cyber security; and air traffic control . Two of the

  6. MIT Lincoln Laboratory 2010 Facts

    DTIC Science & Technology

    2010-03-01

    currently valid OMB control number. 1. REPORT DATE 2010 2. REPORT TYPE 3. DATES COVERED 00-00-2010 to 00-00-2010 4. TITLE AND SUBTITLE MIT Lincoln...space control ; air and missile defense; communications and information technology; intelligence, surveillance, and reconnaissance systems...advanced electronics; tactical systems; homeland protection and biological/chemical defense; and air traffic control . Two of the Laboratory’s principal

  7. Testing and Evaluation of Low-Light Sensors to Enhance Intelligence, Surveillance, and Reconnaissance (ISR) and Real-Time Situational Awareness

    DTIC Science & Technology

    2009-03-01

    infrared, thermal , or night vision applications. Understanding the true capabilities and limitations of the ALAN camera and its applicability to a...an option to more expensive infrared, thermal , or night vision applications. Ultimately, it will be clear whether the configuration of the Kestrel...45  A.  THERMAL CAMERAS................................................................................45  1

  8. Telephone Surveillance Accountability Act of 2013

    THOMAS, 113th Congress

    Rep. Lynch, Stephen F. [D-MA-8

    2013-07-11

    House - 07/11/2013 Referred to the Committee on the Judiciary, and in addition to the Committee on Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the jurisdiction of the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  9. The FBI's Library Awareness Program: National Security vs Government Intrusion into American Libraries [and] The KGB and the Library Target.

    ERIC Educational Resources Information Center

    Information Reports and Bibliographies, 1988

    1988-01-01

    Presents statements made to the House Judiciary Subcommittee on Civil and Constitutional Rights by representatives of the Federal Bureau of Investigation and the library community concerning the surveillance of library users' reading habits as a national security measure. An FBI study on the extent of Soviet intelligence service's utilization of…

  10. Networking the Global Maritime Partnership

    DTIC Science & Technology

    2008-06-01

    how do the navies of disparate nations that desire to operate together at sea obtain the requisite, compatible C4ISR (command, control, communications ...compatible C4ISR (command, control, communications , computers, intelligence, surveillance, and reconnaissance) systems that will enable them to truly...partnership. Coalition Naval Operations Maritime coalitions have existed for two and one-half millennia and navies have communicated at sea for

  11. Rapidly Expanding Range of Highly Pathogenic Avian Influenza Viruses.

    PubMed

    Hall, Jeffrey S; Dusek, Robert J; Spackman, Erica

    2015-07-01

    The movement of highly pathogenic avian influenza (H5N8) virus across Eurasia and into North America and the virus' propensity to reassort with co-circulating low pathogenicity viruses raise concerns among poultry producers, wildlife biologists, aviculturists, and public health personnel worldwide. Surveillance, modeling, and experimental research will provide the knowledge required for intelligent policy and management decisions.

  12. Department of Defense Space Science and Technology Strategy 2015

    DTIC Science & Technology

    2015-01-01

    solar cells at 34% efficiency enabling higher power spacecraft capability. These solar cells developed by the Air Force Research Laboratory (AFRL...Reduce size, weight, power , cost, and improve thermal management for SATCOM terminals  Support intelligence surveillance and reconnaissance (ISR...Improve understanding and awareness of the Earth-to-Sun environment  Improve space environment forecast capabilities and tools to predict operational

  13. Network Structures for Distributed Situation Assessment

    DTIC Science & Technology

    1980-08-01

    name a few-can contribute to the study of DAI. Presumably, DAI will advance these fields as well by providing a modeling technology suitable for precise...moreover, current SA sys- tems are highly centralized and vulnerable. Technological advances in cheap sen- sors, microprocessors, packet radio...communications, and artificial intelligence offer promising alternatives for performing military surveillance in many situations. A new approach now being

  14. Expert system for surveillance and diagnosis of breach fuel elements

    DOEpatents

    Gross, K.C.

    1988-01-21

    An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil area of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor. 2 figs.

  15. Expert system for surveillance and diagnosis of breach fuel elements

    DOEpatents

    Gross, Kenny C.

    1989-01-01

    An apparatus and method are disclosed for surveillance and diagnosis of breached fuel elements in a nuclear reactor. A delayed neutron monitoring system provides output signals indicating the delayed neutron activity and age and the equivalent recoil areas of a breached fuel element. Sensors are used to provide outputs indicating the status of each component of the delayed neutron monitoring system. Detectors also generate output signals indicating the reactor power level and the primary coolant flow rate of the reactor. The outputs from the detectors and sensors are interfaced with an artificial intelligence-based knowledge system which implements predetermined logic and generates output signals indicating the operability of the reactor.

  16. Impact of three task demand factors on simulated unmanned system intelligence, surveillance, and reconnaissance operations.

    PubMed

    Abich, Julian; Reinerman-Jones, Lauren; Matthews, Gerald

    2017-06-01

    The present study investigated how three task demand factors influenced performance, subjective workload and stress of novice intelligence, surveillance, and reconnaissance operators within a simulation of an unmanned ground vehicle. Manipulations were task type, dual-tasking and event rate. Participants were required to discriminate human targets within a street scene from a direct video feed (threat detection [TD] task) and detect changes in symbols presented in a map display (change detection [CD] task). Dual-tasking elevated workload and distress, and impaired performance for both tasks. However, with increasing event rate, CD task deteriorated, but TD improved. Thus, standard workload models provide a better guide to evaluating the demands of abstract symbols than to processing realistic human characters. Assessment of stress and workload may be especially important in the design and evaluation of systems in which human character critical signals must be detected in video images. Practitioner Summary: This experiment assessed subjective workload and stress during threat and CD tasks performed alone and in combination. Results indicated an increase in event rate led to significant improvements in performance during TD, but decrements during CD, yet both had associated increases in workload and engagement.

  17. The Acquisition of English Lexical Stress by Chinese-Speaking Learners: An OT Account

    ERIC Educational Resources Information Center

    Yuan, Man; Cheng, Wei

    2017-01-01

    Lexical stress is an important contributor to foreign accent as well as intelligibility of second language (L2) speech. The present study intends to find out to what extent Chinese-speaking learners whose native language has less evident stress can acquire English lexical stress. A production test was administered to nine advanced Chinese learners…

  18. Web Delivery of Adaptive and Interactive Language Tutoring: Revisited

    ERIC Educational Resources Information Center

    Heift, Trude

    2016-01-01

    This commentary reconsiders the description and assessment of the design and implementation of "German Tutor," an Intelligent Language Tutoring System (ILTS) for learners of German as a foreign language, published in 2001. Based on our experience over the past 15 years with the design and real classroom use of an ILTS, we address a…

  19. Robotic Technology: An Assessment and Forecast,

    DTIC Science & Technology

    1984-07-01

    Research Associates# Inc. Dr. Roger Nagel# Lehigh University Dr. Charles Rosen# Machine Intelligence Corporations and Mr. Jack Thornton# Robot Insider...amr (Subcontractors: systems for assembly and Adopt Technology# inspection Stanford University. SRI) AFSC MANTECH o McDonnell Douglas o Machine ...supervisory controls man- machine interaction and system integration. - .. _ - Foreign R& The U.S. faces a strong technological challenge in robotics from

  20. EUROPE IN CRISIS

    DTIC Science & Technology

    2017-04-06

    the only international organization that can manage the Syrian refugee security crisis causing problems for the EU from root to branch because NATO is...AIR WAR COLLEGE AIR UNIVERSITY EUROPE IN CRISIS By Peter Halseth, Civilian, Defense Logistics Agency A Research Report Submitted...Syrian refugee crisis and providing intelligence assistance to member countries in the European Union (EU) of foreign fighters returning from the

  1. Libya: Transition and U.S. Policy

    DTIC Science & Technology

    2016-04-20

    the country’s public finances , or create a viable framework for post-conflict justice and reconciliation. Elections for legislative bodies and a...revenue earned from each barrel sold, putting significant pressure on government finances . The Central Intelligence Agency World Factbook estimates...FY2015 Request Complex Crises Fund (CCF-OCO) 15,000 - - Foreign Military Financing (FMF) 150 - 150 949 - - International Military Education

  2. An Expert System And Simulation Approach For Sensor Management & Control In A Distributed Surveillance Network

    NASA Astrophysics Data System (ADS)

    Leon, Barbara D.; Heller, Paul R.

    1987-05-01

    A surveillance network is a group of multiplatform sensors cooperating to improve network performance. Network control is distributed as a measure to decrease vulnerability to enemy threat. The network may contain diverse sensor types such as radar, ESM (Electronic Support Measures), IRST (Infrared search and track) and E-0 (Electro-Optical). Each platform may contain a single sensor or suite of sensors. In a surveillance network it is desirable to control sensors to make the overall system more effective. This problem has come to be known as sensor management and control (SM&C). Two major facets of network performance are surveillance and survivability. In a netted environment, surveillance can be enhanced if information from all sensors is combined and sensor operating conditions are controlled to provide a synergistic effect. In contrast, when survivability is the main concern for the network, the best operating status for all sensors would be passive or off. Of course, improving survivability tends to degrade surveillance. Hence, the objective of SM&C is to optimize surveillance and survivability of the network. Too voluminous data of various formats and the quick response time are two characteristics of this problem which make it an ideal application for Artificial Intelligence. A solution to the SM&C problem, presented as a computer simulation, will be presented in this paper. The simulation is a hybrid production written in LISP and FORTRAN. It combines the latest conventional computer programming methods with Artificial Intelligence techniques to produce a flexible state-of-the-art tool to evaluate network performance. The event-driven simulation contains environment models coupled with an expert system. These environment models include sensor (track-while-scan and agile beam) and target models, local tracking, and system tracking. These models are used to generate the environment for the sensor management and control expert system. The expert system, driven by a forward chaining inference engine, makes decisions based on the global database. The global database contains current track and sensor information supplied by the simulation. At present, the rule base emphasizes the surveillance features with rules grouped into three main categories: maintenance and enhancing track on prioritized targets; filling coverage holes and countering jamming; and evaluating sensor status. The paper will describe the architecture used for the expert system and the reasons for selecting the chosen methods. The SM&C simulation produces a graphical representation of sensors and their associated tracks such that the benefits of the sensor management and control expert system are evident. Jammer locations are also part of the display. The paper will describe results from several scenarios that best illustrate the sensor management and control concepts.

  3. 17 CFR 140.73 - Delegation of authority to disclose information to United States, States, and foreign government...

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... of Market Oversight or, in his or her absence, each Deputy Director of the Division of Market Oversight, the Director of the Market Surveillance Section, the Director of the Division of Clearing and... jurisdiction, provided that the Commission official making the disclosure is satisfied that the information...

  4. Sex differences in general knowledge domains.

    PubMed

    Lynn, Richard; Ivanec, Dragutin; Zarevski, Predrag

    2009-06-01

    The aim of this study was to investigate some cognitive differences in highly comparable (according to age, education and motivation) samples of female and male university graduates in Croatia. Female (N=280; age X = 26.59; SD = 2.84) and male participants (N=96; age X = 26.99; SD = 2.99) were university graduates in economics, law humanities and social sciences applying for positions in public service. As part of the selection procedure, they were given a number of cognitive tests. The results were that men obtained higher average scores on the g-factor intelligence test, on the general knowledge tests of natural and social sciences, world religion and customs, and knowledge of current affairs. There were no significant sex differences on vocabulary, foreign language ability and general knowledge of culture. An analysis of covariance, with intelligence test as a covariate, showed that sex differences in general knowledge were present when intelligence was controlled.

  5. Appearance-based multimodal human tracking and identification for healthcare in the digital home.

    PubMed

    Yang, Mau-Tsuen; Huang, Shen-Yen

    2014-08-05

    There is an urgent need for intelligent home surveillance systems to provide home security, monitor health conditions, and detect emergencies of family members. One of the fundamental problems to realize the power of these intelligent services is how to detect, track, and identify people at home. Compared to RFID tags that need to be worn all the time, vision-based sensors provide a natural and nonintrusive solution. Observing that body appearance and body build, as well as face, provide valuable cues for human identification, we model and record multi-view faces, full-body colors and shapes of family members in an appearance database by using two Kinects located at a home's entrance. Then the Kinects and another set of color cameras installed in other parts of the house are used to detect, track, and identify people by matching the captured color images with the registered templates in the appearance database. People are detected and tracked by multisensor fusion (Kinects and color cameras) using a Kalman filter that can handle duplicate or partial measurements. People are identified by multimodal fusion (face, body appearance, and silhouette) using a track-based majority voting. Moreover, the appearance-based human detection, tracking, and identification modules can cooperate seamlessly and benefit from each other. Experimental results show the effectiveness of the human tracking across multiple sensors and human identification considering the information of multi-view faces, full-body clothes, and silhouettes. The proposed home surveillance system can be applied to domestic applications in digital home security and intelligent healthcare.

  6. Appearance-Based Multimodal Human Tracking and Identification for Healthcare in the Digital Home

    PubMed Central

    Yang, Mau-Tsuen; Huang, Shen-Yen

    2014-01-01

    There is an urgent need for intelligent home surveillance systems to provide home security, monitor health conditions, and detect emergencies of family members. One of the fundamental problems to realize the power of these intelligent services is how to detect, track, and identify people at home. Compared to RFID tags that need to be worn all the time, vision-based sensors provide a natural and nonintrusive solution. Observing that body appearance and body build, as well as face, provide valuable cues for human identification, we model and record multi-view faces, full-body colors and shapes of family members in an appearance database by using two Kinects located at a home's entrance. Then the Kinects and another set of color cameras installed in other parts of the house are used to detect, track, and identify people by matching the captured color images with the registered templates in the appearance database. People are detected and tracked by multisensor fusion (Kinects and color cameras) using a Kalman filter that can handle duplicate or partial measurements. People are identified by multimodal fusion (face, body appearance, and silhouette) using a track-based majority voting. Moreover, the appearance-based human detection, tracking, and identification modules can cooperate seamlessly and benefit from each other. Experimental results show the effectiveness of the human tracking across multiple sensors and human identification considering the information of multi-view faces, full-body clothes, and silhouettes. The proposed home surveillance system can be applied to domestic applications in digital home security and intelligent healthcare. PMID:25098207

  7. AMR Surveillance in low and middle-income settings - A roadmap for participation in the Global Antimicrobial Surveillance System (GLASS)

    PubMed Central

    Seale, Anna C.; Gordon, N. Claire; Islam, Jasmin; Peacock, Sharon J.; Scott, J. Anthony G.

    2017-01-01

    Drug-resistant infections caused by bacteria with increasing antimicrobial resistance (AMR) threaten our ability to treat life-threatening conditions. Tackling AMR requires international collaboration and partnership. An early and leading priority to do this is to strengthen AMR surveillance, particularly in low-income countries where the burden of infectious diseases is highest and where data are most limited. The World Health Organization (WHO) has developed the Global AMR Surveillance System (GLASS) as one of a number of measures designed to tackle the problem of AMR, and WHO member states have been encouraged to produce National Action Plans for AMR by 2017. However, low-income countries are unlikely to have the resources or capacity to implement all the components in the GLASS manual. To facilitate their efforts, we developed a guideline that is aligned to the GLASS procedures, but written specifically for implementation in low-income countries. The guideline allows for flexibility across different systems, but has sufficient standardisation of core protocols to ensure that, if followed, data will be valid and comparable. This will ensure that the surveillance programme can provide health intelligence data to inform evidence-based interventions at local, national and international levels. PMID:29062918

  8. Efficient large-scale graph data optimization for intelligent video surveillance

    NASA Astrophysics Data System (ADS)

    Shang, Quanhong; Zhang, Shujun; Wang, Yanbo; Sun, Chen; Wang, Zepeng; Zhang, Luming

    2017-08-01

    Society is rapidly accepting the use of a wide variety of cameras Location and applications: site traffic monitoring, parking Lot surveillance, car and smart space. These ones here the camera provides data every day in an analysis Effective way. Recent advances in sensor technology Manufacturing, communications and computing are stimulating.The development of new applications that can change the traditional Vision system incorporating universal smart camera network. This Analysis of visual cues in multi camera networks makes wide Applications ranging from smart home and office automation to large area surveillance and traffic surveillance. In addition, dense Camera networks, most of which have large overlapping areas of cameras. In the view of good research, we focus on sparse camera networks. One Sparse camera network using large area surveillance. As few cameras as possible, most cameras do not overlap Each other’s field of vision. This task is challenging Lack of knowledge of topology Network, the specific changes in appearance and movement Track different opinions of the target, as well as difficulties Understanding complex events in a network. In this review in this paper, we present a comprehensive survey of recent studies Results to solve the problem of topology learning, Object appearance modeling and global activity understanding sparse camera network. In addition, some of the current open Research issues are discussed.

  9. Cryo-EM Structures Reveal Mechanism and Inhibition of DNA Targeting by a CRISPR-Cas Surveillance Complex.

    PubMed

    Guo, Tai Wei; Bartesaghi, Alberto; Yang, Hui; Falconieri, Veronica; Rao, Prashant; Merk, Alan; Eng, Edward T; Raczkowski, Ashleigh M; Fox, Tara; Earl, Lesley A; Patel, Dinshaw J; Subramaniam, Sriram

    2017-10-05

    Prokaryotic cells possess CRISPR-mediated adaptive immune systems that protect them from foreign genetic elements, such as invading viruses. A central element of this immune system is an RNA-guided surveillance complex capable of targeting non-self DNA or RNA for degradation in a sequence- and site-specific manner analogous to RNA interference. Although the complexes display considerable diversity in their composition and architecture, many basic mechanisms underlying target recognition and cleavage are highly conserved. Using cryoelectron microscopy (cryo-EM), we show that the binding of target double-stranded DNA (dsDNA) to a type I-F CRISPR system yersinia (Csy) surveillance complex leads to large quaternary and tertiary structural changes in the complex that are likely necessary in the pathway leading to target dsDNA degradation by a trans-acting helicase-nuclease. Comparison of the structure of the surveillance complex before and after dsDNA binding, or in complex with three virally encoded anti-CRISPR suppressors that inhibit dsDNA binding, reveals mechanistic details underlying target recognition and inhibition. Published by Elsevier Inc.

  10. Assessing the Strategic Utility of the High North: The Colder War

    DTIC Science & Technology

    2016-12-01

    FUNDING NUMBERS 6. AUTHOR(S) Brandon J. Daigle and Brian W. James 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Naval Postgraduate School...Monterey, CA 93943-5000 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING /MONITORING AGENCY NAME(S) AND ADDRESS(ES) N/A 10. SPONSORING...European Command GDP Gross domestic product ISR Intelligence, surveillance and reconnaissance NATO North Atlantic Treaty Organization NSR Northern

  11. Integrated Speech and Language Technology for Intelligence, Surveillance, and Reconnaissance (ISR)

    DTIC Science & Technology

    2017-07-01

    applying submodularity techniques to address computing challenges posed by large datasets in speech and language processing. MT and speech tools were...aforementioned research-oriented activities, the IT system administration team provided necessary support to laboratory computing and network operations...operations of SCREAM Lab computer systems and networks. Other miscellaneous activities in relation to Task Order 29 are presented in an additional fourth

  12. Search and Pursuit with Unmanned Aerial Vehicles in Road Networks

    DTIC Science & Technology

    2013-11-01

    production volume in each area for use in consumer electronics. Simultaneously, a shift in defense strategy towards unmanned vehicles, particularly...Vöcking. Randomized pursuit-evasion in graphs. Combinatorics, Probability and Computing, 12:225–244, May 2003. [3] AeroVironment Inc. Raven Product Data...Ali and Mubarak Shah. COCOA - tracking in aerial imagery. In SPIE Airborne Intelligence, Surveillance, Reconnaissance Systems and Applications, 2006

  13. Closing the Gap Between Research and Field Applications for Multi-UAV Cooperative Missions

    DTIC Science & Technology

    2013-09-01

    IMU Inertial Measurement Units INCOSE International Council on Systems Engineering ISR Intelligence Surveillance and Reconnaissance ISTAR...light-weight and low-cost inertial measurement units ( IMUs ) are widely adopted for navigation of small- scale UAVs. Low-costs IMUs are characterized...by high measurement noises and large measurement biases. Hence pure initial navigation using low-cost IMUs drifts rapidly. In practice, inertial

  14. Free Space Optical Communication in the Military Environment

    DTIC Science & Technology

    2014-09-01

    Communications Commission FDA Food and Drug Administration FMV Full Motion Video FOB Forward Operating Base FOENEX Free-Space Optical Experimental Network...from radio and voice to chat message and email. Data-rich multimedia content, such as high-definition pictures, video chat, video files, and...introduction of full-motion video (FMV) via numerous different Intelligence Surveillance and Reconnaissance (ISR) systems, such as targeting pods on

  15. Impact of Prior Flight Experience on Learning Predator UAV Operator Skills

    DTIC Science & Technology

    2002-02-01

    UAVs are becoming a mainstay of intelligence , surveillance, and reconnaissance (ISR) information gathering, with the capability of supplying, in...indicators of UAV pilot skill, namely frequency and type of videogame playing, and experience with remote-controlled hobby aircraft. Experience with...indicator, artificial horizon, heading rate indicator, and engine revolutions per minute. The right monitor displays other useful information, such as a

  16. Transforming Effective Army Units: Best Practices and Lessons Learned

    DTIC Science & Technology

    2013-08-01

    Unlimited 106 Dorothy Young 703-545-2316 ii iii Technical Report 1326 Effective Army Units: Best Practices and Lessons Learned...SBCT units at Joint Base Lewis -McChord (JBLM), and two civilian subject matter experts on transformation from the Program Manager (PM) Stryker and...ISR Intelligence, Surveillance, Reconnaissance JBLM Joint Base Lewis -McChord JRTC Joint Readiness Training Center A-2 LNO Liaison

  17. Space War Meets Info War: The Integration of Space and Information Operations

    DTIC Science & Technology

    2000-04-01

    spacelift, command and control of satellites, and surveillance and deconfliction of systems in space.” (4, xi) These operations provide the physical ...PSYOPS), electronic warfare (EW), physical attack/destruction, special information operations (SIO), and may include computer network attack. (3, viii... physical security, counter-deception, counter- propaganda, counter-intelligence, EW, and SIO. (3, viii) Information operations employ both lethal and non

  18. Increase in pediatric magnet-related foreign bodies requiring emergency care.

    PubMed

    Silverman, Jonathan A; Brown, Julie C; Willis, Margaret M; Ebel, Beth E

    2013-12-01

    We describe magnetic foreign body injuries among children and obtain national estimates of magnetic foreign body injury incidence over time. We searched the National Electronic Injury Surveillance System for cases of magnetic foreign bodies in children younger than 21 years in the United States, from 2002 to 2011. Cases were analyzed by location: alimentary or respiratory tract, nasal cavity, ear canal, or genital area. We identified 893 cases of magnetic foreign bodies, corresponding to 22,581 magnetic foreign body cases during a 10-year period (95% confidence interval [CI] 17,694 to 27,469). Most magnetic foreign bodies were ingested (74%) or intranasal (21%). Mean age was 5.2 years for ingested magnetic foreign bodies and 10.1 years for nasal magnetic foreign bodies (difference 4.9; 95% CI 4.1 to 5.6), suggesting different circumstances of injury. The incidence of pediatric magnet ingestions increased from 2002 to 2003 from 0.57 cases per 100,000 children per year (95% CI 0.22 to 0.92) to a peak in 2010 to 2011 of 3.06 cases per 100,000 children per year (95% CI 2.16 to 3.96). Most ingested magnetic foreign bodies (73%) and multiple magnet ingestions (91%) occurred in 2007 or later. Patients were admitted in 15.7% of multiple magnet ingestions versus 2.3% of single magnet ingestions (difference 13.4%; 95% CI 2.8% to 24.0%). Magnet-related injuries are an increasing public health problem for young children, as well for older children who may use magnets for play or to imitate piercings. Education and improved magnet safety standards may decrease the risk small magnets pose to children. Copyright © 2013 American College of Emergency Physicians. Published by Mosby, Inc. All rights reserved.

  19. The Relationship between Multiple Intelligence Profiles and Reading Strategy Use of Successful English as a Foreign Language (EFL) Readers

    ERIC Educational Resources Information Center

    Iyitoglu, Orhan; Aydin, Hasan

    2015-01-01

    This study relied on Sheorey and Mokhtari's (2001) metacognitive knowledge about reading strategies,which was influenced by a number of factors, including previous experiences, beliefs, culture-specific instructional practices and proficiency in a second language (L2). This study is thereby built on the premise that EFL readers' metacognitive…

  20. Ukraine Security Assistance Act of 2014

    THOMAS, 113th Congress

    Rep. Gerlach, Jim [R-PA-6

    2014-07-24

    House - 07/24/2014 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Reconnaissance-Pul - Seeking the Path of Least Resistance

    DTIC Science & Technology

    1990-12-15

    Carl von Clausewitz, the great eighteenth century military theorist, also professed pitting friendly strength against enemy weakness. Addressing "the...izortance of reconnaissance, its relation to intelligence, and the advantage of pitting friendly strength against enemy weaknesses. The Soviets use a...64. Ibid. 65. Vasily Gerasimovich Reznichenko, "Taktika" (Tactics), translated by Foreign Broadcast Information Service (Moscow, 1988):p.55. 66

  2. Relations Between the U.S. and Iran

    DTIC Science & Technology

    2013-03-01

    British and Russians were taken over by the United State as the dominant superpower in Iran, becoming the leading foreign power both economically and...domestic security and intelligent service, began repressive operations including murdering, jailing and torturing, quickly becoming a nightmare for the...Samuel Huntington,48 and influenced the U.S. decision makers, becoming an important part of geopolitical discussions in international relations and

  3. How Can Writing Tasks Be Characterized in a Way Serving Pedagogical Goals and Automatic Analysis Needs?

    ERIC Educational Resources Information Center

    Quixal, Martí; Meurers, Detmar

    2016-01-01

    The paper tackles a central question in the field of Intelligent Computer-Assisted Language Learning (ICALL): How can language learning tasks be conceptualized and made explicit in a way that supports the pedagogical goals of current Foreign Language Teaching and Learning and at the same time provides an explicit characterization of the Natural…

  4. An Intelligent E-Learning Software for Learning to Write Correct Chinese Characters on Mobile Devices

    ERIC Educational Resources Information Center

    Tam, Vincent

    2012-01-01

    Purpose: Learning Chinese is unquestionably very important and popular worldwide with the fast economic growth of China. To most foreigners and also local students, one of the major challenges in learning Chinese is to write Chinese characters in correct stroke sequences that are considered as significant in the Chinese culture. However, due to…

  5. CTC Sentinel. Volume 7, Issue 3

    DTIC Science & Technology

    2014-03-01

    foreign fighting, including Finland . In March 2014, the Finnish Security and Intelligence Service (FSIS) stated that over 30 individuals had...hardened jihadists returning to Finland from Syria.5 This article examines the factors that may have contributed to Finnish Muslim participation...Violent Extremism in Finland – Situation Overview 2/2013,” Finland Ministry of the Interior, August 26, 2013. The reports do not clarify whether

  6. Neither Here nor There: Transformational Leadership and Cultural Intelligence in Presidents of U.S. Accredited Universities in Foreign Countries

    ERIC Educational Resources Information Center

    Bourgeois, Jeff

    2017-01-01

    The role of a university president combines the symbolism of an institutional ambassador with the leadership responsibilities of a private-sector executive. When considering the cultural context of the university and the culture of the surrounding community, the demands of the presidential position become far more complex. The Council for Higher…

  7. War Powers Protection Act of 2013

    THOMAS, 113th Congress

    Rep. Massie, Thomas [R-KY-4

    2013-06-26

    House - 06/26/2013 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. Developing a Cultural Intelligence Capability

    DTIC Science & Technology

    2008-12-12

    assumptions about how to achieve results vary greatly among key players” (Teachers College, Columbia University n.d.). Operating in a foreign culture...institution building and economic development, among other things.” 9 CHAPTER 2 CONVENTIONAL WISDOM Modern military forces have been transforming...war (OOTW). Among the new competencies identified for leadership in the new operating environment is “cultural awareness” or “cultural competence

  9. Reconnaissance blind multi-chess: an experimentation platform for ISR sensor fusion and resource management

    NASA Astrophysics Data System (ADS)

    Newman, Andrew J.; Richardson, Casey L.; Kain, Sean M.; Stankiewicz, Paul G.; Guseman, Paul R.; Schreurs, Blake A.; Dunne, Jeffrey A.

    2016-05-01

    This paper introduces the game of reconnaissance blind multi-chess (RBMC) as a paradigm and test bed for understanding and experimenting with autonomous decision making under uncertainty and in particular managing a network of heterogeneous Intelligence, Surveillance and Reconnaissance (ISR) sensors to maintain situational awareness informing tactical and strategic decision making. The intent is for RBMC to serve as a common reference or challenge problem in fusion and resource management of heterogeneous sensor ensembles across diverse mission areas. We have defined a basic rule set and a framework for creating more complex versions, developed a web-based software realization to serve as an experimentation platform, and developed some initial machine intelligence approaches to playing it.

  10. Radar research at University of Oklahoma (Conference Presentation)

    NASA Astrophysics Data System (ADS)

    Zhang, Yan R.; Weber, Mark E.

    2017-05-01

    This abstract is for the academic institution profiles session This presentation will focus on radar research programs at the University of Oklahoma, the radar research in OU has more than 50 years history of collaboration with NOAA, and has been through tremendous growth since early 2000. Before 2010, the focus was weather radar and weather surveillance, and since the Defense, Security and Intelligence (DSI) initiative in 2011, there have many new efforts on the defense and military radar applications. This presentation will focus on the following information: (1) The history, facilities and instrumentations of Advanced Radar Research Center, (2) Focus area of polarimetric phased array systems, (3) Focus area of airborne and spaceborne radars, (4) Intelligent radar information processing, (5) Innovative antenna and components.

  11. A knowledge-based system for controlling automobile traffic

    NASA Technical Reports Server (NTRS)

    Maravas, Alexander; Stengel, Robert F.

    1994-01-01

    Transportation network capacity variations arising from accidents, roadway maintenance activity, and special events as well as fluctuations in commuters' travel demands complicate traffic management. Artificial intelligence concepts and expert systems can be useful in framing policies for incident detection, congestion anticipation, and optimal traffic management. This paper examines the applicability of intelligent route guidance and control as decision aids for traffic management. Basic requirements for managing traffic are reviewed, concepts for studying traffic flow are introduced, and mathematical models for modeling traffic flow are examined. Measures for quantifying transportation network performance levels are chosen, and surveillance and control strategies are evaluated. It can be concluded that automated decision support holds great promise for aiding the efficient flow of automobile traffic over limited-access roadways, bridges, and tunnels.

  12. Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Water Security

    NASA Technical Reports Server (NTRS)

    Hakimdavar, Raha; Wood, Danielle; Eylander, John; Peters-Lidard, Christa; Smith, Jane; Doorn, Brad; Green, David; Hummel, Corey; Moore, Thomas C.

    2018-01-01

    River basins for which transboundary coordination and governance is a factor are of concern to US national security, yet there is often a lack of sufficient data-driven information available at the needed time horizons to inform transboundary water decision-making for the intelligence, defense, and foreign policy communities. To address this need, a two-day workshop entitled Transboundary Water: Improving Methodologies and Developing Integrated Tools to Support Global Water Security was held in August 2017 in Maryland. The committee that organized and convened the workshop (the Organizing Committee) included representatives from the National Aeronautics and Space Administration (NASA), the US Army Corps of Engineers Engineer Research and Development Center (ERDC), and the US Air Force. The primary goal of the workshop was to advance knowledge on the current US Government and partners' technical information needs and gaps to support national security interests in relation to transboundary water. The workshop also aimed to identify avenues for greater communication and collaboration among the scientific, intelligence, defense, and foreign policy communities. The discussion around transboundary water was considered in the context of the greater global water challenges facing US national security.

  13. Recognition and localization of relevant human behavior in videos

    NASA Astrophysics Data System (ADS)

    Bouma, Henri; Burghouts, Gertjan; de Penning, Leo; Hanckmann, Patrick; ten Hove, Johan-Martijn; Korzec, Sanne; Kruithof, Maarten; Landsmeer, Sander; van Leeuwen, Coen; van den Broek, Sebastiaan; Halma, Arvid; den Hollander, Richard; Schutte, Klamer

    2013-06-01

    Ground surveillance is normally performed by human assets, since it requires visual intelligence. However, especially for military operations, this can be dangerous and is very resource intensive. Therefore, unmanned autonomous visualintelligence systems are desired. In this paper, we present an improved system that can recognize actions of a human and interactions between multiple humans. Central to the new system is our agent-based architecture. The system is trained on thousands of videos and evaluated on realistic persistent surveillance data in the DARPA Mind's Eye program, with hours of videos of challenging scenes. The results show that our system is able to track the people, detect and localize events, and discriminate between different behaviors, and it performs 3.4 times better than our previous system.

  14. Epidemiological Surveillance as a Basis for Vaccine Trials. Establishment of a Vaccine Evaluation Unit

    DTIC Science & Technology

    1993-05-01

    hepatitis (A, B and non-A non-B), infectious mononucleosis and cytomegalovirus infection. IMMUNOGENICITY STUDIES A randomized, partly blinded...Klebsiella, Pseudomonas). Enterics, Foreign, Hepatitis A, Hepatitis B, Infectious Diseases, Vaccines, Biotechnology, ID, RA I Unclassified Unclassified...INTRODUCTION MILITARY IMPORTANCE OF THE STUDY AND MEDICAL APPLICATIONS A number of infectious diseases are of particular importance in military

  15. Paediatric Active Enhanced Disease Surveillance inaugural annual report, 2014.

    PubMed

    Zurynski, Yvonne A; McRae, Jocelynne E; Quinn, Helen E; Wood, Nicholas J; Macartney, Kristine K

    2016-09-30

    The Paediatric Active Enhanced Disease Surveillance (PAEDS) network is a hospital-based active surveillance system employing prospective case ascertainment of selected uncommon vaccine preventable diseases and potential adverse events following immunisation (AEFI). PAEDS enhances other Australian surveillance systems by providing prospective detailed clinical and laboratory data for the same child. Specialist surveillance nurses screen hospital admissions, emergency department records, laboratory and other data, to prospectively identify hospitalised children aged under 15 years in 5 paediatric tertiary referral hospitals in New South Wales, Victoria, South Australia, Western Australia and Queensland. Standardised protocols and case definitions are used across all sites. Conditions under surveillance include vaccine preventable diseases: acute flaccid paralysis, varicella, pandemic and seasonal influenza and pertussis, and potential AEFIs: febrile seizures and intussusception. PAEDS also conducts surveillance for acute childhood encephalitis. Since August 2007, PAEDS has recruited a total of 6,227 hospitalised cases in total, for all conditions. From January to December 2014, there were 1,220 cases recruited across all conditions. Key outcomes include: enhanced acute flaccid paralysis surveillance to reach World Health Organization targets; supporting varicella and influenza vaccination in children; confirmation of a known low risk of febrile seizures following the 1st dose of measles-mumps-rubella vaccine but no increased risk of febrile seizures after measles-mumps-rubella-varicella vaccine, and a slightly increased risk of developing intussusception 1-7 days after rotavirus vaccination in infants aged less than 3 months. Acute childhood encephalitis data facilitated rapid investigation and response to the enterovirus 71 outbreak in 2013-2014. PAEDS provides unique policy-relevant data. This is the first of planned PAEDS annual reports to Communicable Diseases Intelligence.

  16. Technological innovations in the development of cardiovascular clinical information systems.

    PubMed

    Hsieh, Nan-Chen; Chang, Chung-Yi; Lee, Kuo-Chen; Chen, Jeen-Chen; Chan, Chien-Hui

    2012-04-01

    Recent studies have shown that computerized clinical case management and decision support systems can be used to assist surgeons in the diagnosis of disease, optimize surgical operation, aid in drug therapy and decrease the cost of medical treatment. Therefore, medical informatics has become an extensive field of research and many of these approaches have demonstrated potential value for improving medical quality. The aim of this study was to develop a web-based cardiovascular clinical information system (CIS) based on innovative techniques, such as electronic medical records, electronic registries and automatic feature surveillance schemes, to provide effective tools and support for clinical care, decision-making, biomedical research and training activities. The CIS developed for this study contained monitoring, surveillance and model construction functions. The monitoring layer function provided a visual user interface. At the surveillance and model construction layers, we explored the application of model construction and intelligent prognosis to aid in making preoperative and postoperative predictions. With the use of the CIS, surgeons can provide reasonable conclusions and explanations in uncertain environments.

  17. Detecting abandoned objects using interacting multiple models

    NASA Astrophysics Data System (ADS)

    Becker, Stefan; Münch, David; Kieritz, Hilke; Hübner, Wolfgang; Arens, Michael

    2015-10-01

    In recent years, the wide use of video surveillance systems has caused an enormous increase in the amount of data that has to be stored, monitored, and processed. As a consequence, it is crucial to support human operators with automated surveillance applications. Towards this end an intelligent video analysis module for real-time alerting in case of abandoned objects in public spaces is proposed. The overall processing pipeline consists of two major parts. First, person motion is modeled using an Interacting Multiple Model (IMM) filter. The IMM filter estimates the state of a person according to a finite-state, discrete-time Markov chain. Second, the location of persons that stay at a fixed position defines a region of interest, in which a nonparametric background model with dynamic per-pixel state variables identifies abandoned objects. In case of a detected abandoned object, an alarm event is triggered. The effectiveness of the proposed system is evaluated on the PETS 2006 dataset and the i-Lids dataset, both reflecting prototypical surveillance scenarios.

  18. Fast Human Detection for Intelligent Monitoring Using Surveillance Visible Sensors

    PubMed Central

    Ko, Byoung Chul; Jeong, Mira; Nam, JaeYeal

    2014-01-01

    Human detection using visible surveillance sensors is an important and challenging work for intruder detection and safety management. The biggest barrier of real-time human detection is the computational time required for dense image scaling and scanning windows extracted from an entire image. This paper proposes fast human detection by selecting optimal levels of image scale using each level's adaptive region-of-interest (ROI). To estimate the image-scaling level, we generate a Hough windows map (HWM) and select a few optimal image scales based on the strength of the HWM and the divide-and-conquer algorithm. Furthermore, adaptive ROIs are arranged per image scale to provide a different search area. We employ a cascade random forests classifier to separate candidate windows into human and nonhuman classes. The proposed algorithm has been successfully applied to real-world surveillance video sequences, and its detection accuracy and computational speed show a better performance than those of other related methods. PMID:25393782

  19. Toward a generation free of tuberculosis: TB disease and infection in individuals of college age in the United States.

    PubMed

    Shah, N S; Flood-Bryzman, A; Jeffries, C; Scott, J

    2018-01-01

    To assess the magnitude of active TB disease and latent TB infection (LTBI) in young adults of college age. Individuals who were aged 18-24 years in 2011 were used as a proxy for college students. Active TB cases reported to the 2011 US National TB Surveillance System (NTSS) were included. LTBI prevalence was calculated from the 2011-2012 National Health and Nutrition Examination Survey. The 2011 American Community Survey was used to calculate population denominators. Analyses were stratified by nativity. Active TB disease incidence among persons aged 18-24 years was 2.82/100,000, 18.8/100,000 among foreign-born individuals and 0.9/100,000 among US-born individuals. In 2011, 878 TB cases were reported; 629 (71.6%) were foreign-born. LTBI prevalence among persons of 18-24 years was 2.5%: 8.7% and 1.3% among foreign-born and US-born, respectively. Active screening and treatment programs for foreign-born young adults could identify TB cases earlier and provide an opportunity for prevention efforts.

  20. Prostate Cancer Prognostic Factors Among Asian Patients Born in the US Compared to Those Born Abroad.

    PubMed

    Xu, Junjun; Goodman, Michael; Jemal, Ahemdin; Fedewa, Stacey A

    2015-06-01

    US surveillance data indicate that incidence of prostate cancer differs by place of birth among Asian men. However, it is less clear if the prognostic factors for prostate cancer also differ by place of birth. The study included 7,824 Asian prostate cancer patients diagnosed between 2004 and 2009 and reported to the Surveillance Epidemiology and End Results (SEER) program. Logistic regression models were used to evaluate the relation of place of birth (foreign born vs. US born) to three outcomes: prostate specific antigen (PSA) level, Gleason score, and T classification, adjusting for age, marital status, Rural-Urban Continuum Code, and SEER registry. All outcome variables were binary using different cutoffs: ≥ 4, ≥ 10 and ≥ 20 ng/ml for PSA; ≥ 7 and ≥ 8 for Gleason score; and ≥ T2 and ≥ T3 for T classification. Elevated PSA was more common among foreign born Asian men regardless of the cut point used. In the analysis comparing foreign born versus US born patients by ethnic group, the association with PSA was most pronounced at cut point of ≥ 20 ng/ml for Chinese men (OR 1.68, 95% CI 1.02-2.75), and at cut point of ≥ 4 ng/ml for Japanese men (OR 2.73, 95% CI 1.20-6.21). A statistically significant association with Gleason score was only found for Japanese men and only for the cutoff ≥ 7 (OR 1.71, 95% CI 1.12-2.61). There was no difference in clinical T classification between foreign-born and US-born Asian men. Inclusion of cases with missing place of birth or restriction of data to those who underwent radical prostatectomy did not substantially change the results. The data suggest that foreign-born Asian prostate cancer patients may have moderately elevated PSA levels at diagnosis compared with their US born counterparts. For the other prognostic markers, the associations were less consistent and did not form a discernible pattern.

  1. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    NASA Astrophysics Data System (ADS)

    Martínez, José F.; Bravo, Sury; García, Ana B.; Corredor, Iván; Familiar, Miguel S.; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

    2010-12-01

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment.

  2. A web-based video annotation system for crowdsourcing surveillance videos

    NASA Astrophysics Data System (ADS)

    Gadgil, Neeraj J.; Tahboub, Khalid; Kirsh, David; Delp, Edward J.

    2014-03-01

    Video surveillance systems are of a great value to prevent threats and identify/investigate criminal activities. Manual analysis of a huge amount of video data from several cameras over a long period of time often becomes impracticable. The use of automatic detection methods can be challenging when the video contains many objects with complex motion and occlusions. Crowdsourcing has been proposed as an effective method for utilizing human intelligence to perform several tasks. Our system provides a platform for the annotation of surveillance video in an organized and controlled way. One can monitor a surveillance system using a set of tools such as training modules, roles and labels, task management. This system can be used in a real-time streaming mode to detect any potential threats or as an investigative tool to analyze past events. Annotators can annotate video contents assigned to them for suspicious activity or criminal acts. First responders are then able to view the collective annotations and receive email alerts about a newly reported incident. They can also keep track of the annotators' training performance, manage their activities and reward their success. By providing this system, the process of video analysis is made more efficient.

  3. A Tumor Profile in Primary Immune Deficiencies Challenges the Cancer Immune Surveillance Concept.

    PubMed

    Satgé, Daniel

    2018-01-01

    Under the concept of cancer immune surveillance, individuals with primary immune deficiencies would be expected to develop many more malignancies and show an excess of all types of cancers, compared to people with a normal immune system. A review of the nine most frequent and best-documented human conditions with primary immune deficiency reveals a 1.6- to 2.3-fold global increase of cancer in the largest epidemiological studies. However, the spectrum of cancer types with higher frequencies is narrow, limited mainly to lymphoma, digestive tract cancers, and virus-induced cancers. Increased lymphoma is also reported in animal models of immune deficiency. Overstimulation of leukocytes, chronic inflammation, and viruses explain this tumor profile. This raises the question of cancers being foreign organisms or tissues. Organisms, such as bacteria, viruses, and parasites as well as non-compatible grafts are seen as foreign (non-self) and identified and destroyed or rejected by the body (self). As cancer cells rarely show strong (and unique) surface antibodies, their recognition and elimination by the immune system is theoretically questionable, challenging the immune surveillance concept. In the neonatal period, the immune system is weak, but spontaneous regression and good outcomes occur for some cancers, suggesting that non-immune factors are effective in controlling cancer. The idea of cancer as a group of cells that must be destroyed and eliminated appears instead as a legacy of methods and paradigms in microbiological medicine. As an alternative approach, cancer cells could be considered part of the body and could be controlled by an embryonic and neonatal environment.

  4. Developing a Partnership with Brazil - An Emerging Power

    DTIC Science & Technology

    2004-03-19

    with the purpose of better preparing their troops for this type of operation. The Centro Argentino de Entrenamiento Conjunto para Fuerza de Paz...definitively tying the Fuerzas Armadas Revolucionarias de Colombia (FARC) with drug dealing73 is convincing Brazilian policymakers that what is happening in...in terms of military intelligence in the region with the use of the recently installed apparatus of the Amazon Surveillance System (Sistema de

  5. Recommendations for Airborne Intelligence, Surveillance, and Reconnaissance in the Year 2035 in a Cost Constrained Environment

    DTIC Science & Technology

    2012-02-10

    the aircraft is the arms and legs , putting the sensory organ in the 5 right location to do its job. The human body’s most important element is the...20Role&storyID=news/ dti /2011/02/01/DT_02_0 1_2011_p36-283449.xml. “Can Technology Save the Military From a Data Deluge? | Popular Science”, n.d

  6. Future Soldiers: Analysis of Entry-Level Performance Requirements and Their Predictors

    DTIC Science & Technology

    2005-09-01

    these future missions; "* New technology such as weapons, tools, and vehicles (e.g., robotics ) and the effect of technological change on personnel...Clusters 1. Close Combat 2. Non Line-of-Sight Fire 3. Surveillance, Intelligence, and Communications 4. Unmanned Vehicle/ Robotics Operator 5. Security...minimized with (a) new materials for ballistic protection, (b) new lethalities, and (c) exoskeletons /artificial muscles. • Infantrymen will experience better

  7. Strategic Uncertainty: Thinking About Tactical Level Cyberspace Operations

    DTIC Science & Technology

    2015-05-25

    places on the topic. For example, the Edward Snowden revelations on U.S. intelligence agencies’ surveillance programs heightened tensions between the...generates a new level of strategic uncertainty? The answer is yes. The Edward Snowden disclosures are one example that made it more difficult to assure...revelations from Edward Snowden . Backlash over additional offensive cyber capabilities development and extension down to even lower levels in the Force is

  8. Evolving Intelligence, Surveillance & Reconnaissance (ISR) for Air Force Cyber Defense

    DTIC Science & Technology

    2013-02-14

    Telecommunications and Assessment Program ( TMAP ) notes in Air Force Instruction (AFI) 10-712 that “adversaries can easily monitor (unclassified) systems to...Instruction (AFI) 10-712, Telecommunications Monitoring And Assessment Program ( TMAP ), 2011, 4. 23. Lt Col Hugh M. Ragland., interview with author...Monitoring And Assessment Program ( TMAP ), 8 June 2011. Brenner, Carl N. Col, USAF. NASIC Air & Cyber Analysis Group/CC. Interview by the author. 29

  9. SSC San Diego Biennial Review 2003. Vol 3: Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2003-01-01

    following: • Improving a Commander’s situational analysis, awareness, and planning by leveraging the concepts of Smart Push (time-sensitive situational...The node FPGA implements a universal asynchronous receive and transmit ( UART )-style detector to decode the data stream. The data are then briefly...hypothetical sound sources at various points within a five-dimensional search grid over a short processing epoch. Historically, this has been

  10. Command History. United States Military Assistance Command, Vietnam 1968. Volume 2

    DTIC Science & Technology

    1968-01-01

    phase of the 1968 plan was put through ae scheduled. The opening of the Tte Offensive. however, temporarily scuttled the program. Temporarily, local...decrease slightly. Completed construction of an additional 1, 200 km oalhighways and tte restoration of more of the VNRS was expected to materialize in...Assistance Program MINRON Mine Squadron \\05 Military Intelligence Service MISC Mobile Infiltration Surveillance Center MIUWG Mobile Inshore Undersea

  11. Rapid Prototype Development of a Remotely-Piloted Aircraft Powered by a Hybrid-Electric Propulsion System

    DTIC Science & Technology

    2012-03-01

    ch1) IED Improvised Explosive Device (ch1) IMS Integrated Master Schedule (ch3) ISR Intelligence Surveillance Reconnaissance (ch1...including the locating, monitoring, and neutralizing of enemy combatants, identification of and detonation of improvised explosive devices (IED...typically high altitude) necessitating the use of costly optics and sensors for ISR data collection. These features preclude long endurance RPAs from being

  12. The EP-3E vs. the BAMS UAS: An Operating and Support Cost Comparison

    DTIC Science & Technology

    2012-09-01

    Accountability Office HALE High Altitude Long Endurance ISR Intelligence, Surveillance and Reconnaissance JCC Joint Architecture...others are very complex high altitude long endurance (HALE) aircraft. However, most share the common need for satellite bandwidth. The DoD plan is...collection sites, and risks as they apply to the BAMS UAS. These factors were not adequately considered in the original O&S analysis . Once the analysis

  13. Threats at Our Threshold: Homeland Defense and Homeland Security in the New Century

    DTIC Science & Technology

    2006-10-21

    evacuation. Meanwhile, DoD C4ISR (Command, Control, Communications, Computers , Intelligence, Surveillance and Reconnaissance) assets can provide state-of...hurricane and flooding. In addition, he challenged the company to find a way to track all supplies even though the computer systems were down...relevant to the homeland security realm. In general terms, individuals empowered with computing and communications technology and connected by

  14. Employing Intelligence, Surveillance, and Reconnaissance: Organizing, Training, and Equipping to Get It Right

    DTIC Science & Technology

    2014-02-01

    facilitate effective employment across all spectra and that an adequate ISR- specific C2 structure be established. Lastly, it addresses artificial seams...becomes too great. Thus, unless an individual is specifically tasked to perform a tactical controller role under the senior intelli - gence duty...into joint operations enabling rapid decisions based on actionable intelli - gence.൚ It also highlights the requirement of synchronizing all actions

  15. Assessing the Use of Tactical Clouds to Enhance Warfighter Effectiveness

    DTIC Science & Technology

    2014-04-01

    operating while compromised environment” (attackers with access to communications network); Big Data – Since 9/11 the amount of surveillance data ...unanalyzed. The big data problem is unlikely to improve as it is projected that sensor data volume could potentially be measured in yottabytes (1024...www.forbes.com/sites/techonomy/2012/03/12/military-intelligence-redefined- big - data -in-the- battlefield/ 5 Data Analysis Challenges [Reference 5] DRDC-RDDC

  16. The Air War in Libya: Implications for the US, NATO, and the Future Role of Airpower

    DTIC Science & Technology

    2012-04-23

    Nimrod and Sentinel, which comprise two of the three parts of the ISTAR (intelligence, surveillance, target acquisition and reconnaissance) cross-cueing...Hercules C4/C5 YES NO YES YES YES Nimrod R1 YES YES YES YES YES Sentinel R1 YES YES YES YES YES E-3D YES YES YES YES YES Tornado GR4 NO NO YES YES YES

  17. Epidemiology of Tuberculosis in Young Children in the United States

    PubMed Central

    Pang, Jenny; Teeter, Larry D.; Katz, Dolly J.; Davidow, Amy L.; Miranda, Wilson; Wall, Kirsten; Ghosh, Smita; Stein-Hart, Trudy; Restrepo, Blanca I.; Reves, Randall; Graviss, Edward A.

    2016-01-01

    OBJECTIVES To estimate tuberculosis (TB) rates among young children in the United States by children’s and parents’ birth origins and describe the epidemiology of TB among young children who are foreign-born or have at least 1 foreign-born parent. METHODS Study subjects were children <5 years old diagnosed with TB in 20 US jurisdictions during 2005–2006. TB rates were calculated from jurisdictions’ TB case counts and American Community Survey population estimates. An observational study collected demographics, immigration and travel histories, and clinical and source case details from parental interviews and health department and TB surveillance records. RESULTS Compared with TB rates among US-born children with US-born parents, rates were 32 times higher in foreign-born children and 6 times higher in US-born children with foreign-born parents. Most TB cases (53%) were among the 29% of children who were US born with foreign-born parents. In the observational study, US-born children with foreign-born parents were more likely than foreign-born children to be infants (30% vs 7%), Hispanic (73% vs 37%), diagnosed through contact tracing (40% vs 7%), and have an identified source case (61% vs 19%); two-thirds of children were exposed in the United States. CONCLUSIONS Young children who are US born of foreign-born parents have relatively high rates of TB and account for most cases in this age group. Prompt diagnosis and treatment of adult source cases, effective contact investigations prioritizing young contacts, and targeted testing and treatment of latent TB infection are necessary to reduce TB morbidity in this population. PMID:24515517

  18. An evolutionary algorithm technique for intelligence, surveillance, and reconnaissance plan optimization

    NASA Astrophysics Data System (ADS)

    Langton, John T.; Caroli, Joseph A.; Rosenberg, Brad

    2008-04-01

    To support an Effects Based Approach to Operations (EBAO), Intelligence, Surveillance, and Reconnaissance (ISR) planners must optimize collection plans within an evolving battlespace. A need exists for a decision support tool that allows ISR planners to rapidly generate and rehearse high-performing ISR plans that balance multiple objectives and constraints to address dynamic collection requirements for assessment. To meet this need we have designed an evolutionary algorithm (EA)-based "Integrated ISR Plan Analysis and Rehearsal System" (I2PARS) to support Effects-based Assessment (EBA). I2PARS supports ISR mission planning and dynamic replanning to coordinate assets and optimize their routes, allocation and tasking. It uses an evolutionary algorithm to address the large parametric space of route-finding problems which is sometimes discontinuous in the ISR domain because of conflicting objectives such as minimizing asset utilization yet maximizing ISR coverage. EAs are uniquely suited for generating solutions in dynamic environments and also allow user feedback. They are therefore ideal for "streaming optimization" and dynamic replanning of ISR mission plans. I2PARS uses the Non-dominated Sorting Genetic Algorithm (NSGA-II) to automatically generate a diverse set of high performing collection plans given multiple objectives, constraints, and assets. Intended end users of I2PARS include ISR planners in the Combined Air Operations Centers and Joint Intelligence Centers. Here we show the feasibility of applying the NSGA-II algorithm and EAs in general to the ISR planning domain. Unique genetic representations and operators for optimization within the ISR domain are presented along with multi-objective optimization criteria for ISR planning. Promising results of the I2PARS architecture design, early software prototype, and limited domain testing of the new algorithm are discussed. We also present plans for future research and development, as well as technology transition goals.

  19. A national study of socioeconomic status and tuberculosis rates by country of birth, United States, 1996-2005.

    PubMed

    Olson, Nicole A; Davidow, Amy L; Winston, Carla A; Chen, Michael P; Gazmararian, Julie A; Katz, Dolores J

    2012-05-18

    Tuberculosis (TB) in developed countries has historically been associated with poverty and low socioeconomic status (SES). In the past quarter century, TB in the United States has changed from primarily a disease of native-born to primarily a disease of foreign-born persons, who accounted for more than 60% of newly-diagnosed TB cases in 2010. The purpose of this study was to assess the association of SES with rates of TB in U.S.-born and foreign-born persons in the United States, overall and for the five most common foreign countries of origin. National TB surveillance data for 1996-2005 was linked with ZIP Code-level measures of SES (crowding, unemployment, education, and income) from U.S. Census 2000. ZIP Codes were grouped into quartiles from low SES to high SES and TB rates were calculated for foreign-born and U.S.-born populations in each quartile. TB rates were highest in the quartiles with low SES for both U.S.-born and foreign-born populations. However, while TB rates increased five-fold or more from the two highest to the two lowest SES quartiles among the U.S.-born, they increased only by a factor of 1.3 among the foreign-born. Low SES is only weakly associated with TB among foreign-born persons in the United States. The traditional associations of TB with poverty are not sufficient to explain the epidemiology of TB among foreign-born persons in this country and perhaps in other developed countries. TB outreach and research efforts that focus only on low SES will miss an important segment of the foreign-born population.

  20. Forging Peace Through Strength in Ukraine and the Transatlantic Alliance Act

    THOMAS, 113th Congress

    Rep. Turner, Michael R. [R-OH-10

    2014-04-09

    House - 04/09/2014 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Onto-Agents-Enabling Intelligent Agents on the Web

    DTIC Science & Technology

    2005-05-01

    AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE ROME RESEARCH SITE ROME, NEW YORK STINFO FINAL REPORT This report has been reviewed...by the Air Force Research Laboratory, Information Directorate, Public Affairs Office (IFOIPA) and is releasable to the National Technical... Information Service (NTIS). At NTIS it will be releasable to the general public, including foreign nations. AFRL-IF-RS-TR-2005-178 has been reviewed

  2. Protecting Americans from the Proliferation of Weapons to Terrorists Act of 2013

    THOMAS, 113th Congress

    Rep. DesJarlais, Scott [R-TN-4

    2013-06-25

    House - 06/25/2013 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, and Intelligence (Permanent Select), for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  3. Japanese supercomputer technology.

    PubMed

    Buzbee, B L; Ewald, R H; Worlton, W J

    1982-12-17

    Under the auspices of the Ministry for International Trade and Industry the Japanese have launched a National Superspeed Computer Project intended to produce high-performance computers for scientific computation and a Fifth-Generation Computer Project intended to incorporate and exploit concepts of artificial intelligence. If these projects are successful, which appears likely, advanced economic and military research in the United States may become dependent on access to supercomputers of foreign manufacture.

  4. Vernon A. Walters: Pathfinder of the Intelligence Profession

    DTIC Science & Technology

    2004-06-03

    administrations and has served in military and civilian capacities in ten administrations, including 13 successive years in the Executive Office of the...where his career as Presidential Aide, Interpreter and masterful trouble-shooter began. This assignment led to service in these capacities with every...General Walters. To say that he had a fantastic capacity for foreign languages certainly is an understatement. General Goodpaster, a former Aide to

  5. Studies in Intelligence. Volume 55, Number 2

    DTIC Science & Technology

    2011-06-01

    terrorists. And while they note the stories that claim the FSB poisoned Al- exander Litvinenko using polonium - 210 in Lon- don, they conclude that...cultural data effectively . This bias also affects intelli- gence collection, which aims disproportionately at foreign leaders and the elite cadres that...holdings. Given this particular organiza- tional backdrop, our aims have been modest but effective , we hope, in moving cultural research and analysis

  6. To strengthen the United States response to Russian interference, and for other purposes.

    THOMAS, 112th Congress

    Rep. Demings, Val Butler [D-FL-10

    2018-05-22

    House - 05/22/2018 Referred to the Committee on Foreign Affairs, and in addition to the Committees on Armed Services, Intelligence (Permanent Select), Oversight and Government Reform, and Financial Services, for a period to be subsequently determined by the Speaker, in each case for... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  7. T-Cell Warriors—Equipped to Kill Cancer Cells | Center for Cancer Research

    Cancer.gov

    When the body recognizes tumor cells as foreign, a natural immune response arises to attack them. Unfortunately, tumors have ways to evade immune surveillance systems and antitumor responses are often too weak to defeat the disease. Rather than relying on the body’s natural response, scientists can now manipulate a patient’s own immune cells so that they latch on to tumor

  8. Interagency Coordination in the Case of an Intentional Agroterrorist Incident

    DTIC Science & Technology

    2009-05-11

    and working groups; development of a National Veterinary Stockpile of vaccines needed to respond to animal diseases; and funding of research...outbreak or an intentional incident. They include lack of personnel able to recognize a foreign animal disease outbreak, difficulty with vaccination and... vaccination stockpiling, and difficulty detecting a covert attack and differentiating it from a natural outbreak with the current surveillance and

  9. Guesswork: The Troubled Past of Prediciton

    DTIC Science & Technology

    2010-10-01

    tech surveillance or cloak -and- dagger spies were needed to change the U.S. perceptions of Soviet behavior. Years of studying Soviet strategy was... cloak of Soviet Russia. Industrial giants such as the Junker aircraft manufacturer established satellite factories inside Russia. German companies built...that Stresemann had not been seriously attacked at any time during the past two days of bitter Reichstag debate, and therefore German foreign policy

  10. Eyes of Things.

    PubMed

    Deniz, Oscar; Vallez, Noelia; Espinosa-Aranda, Jose L; Rico-Saavedra, Jose M; Parra-Patino, Javier; Bueno, Gloria; Moloney, David; Dehghani, Alireza; Dunne, Aubrey; Pagani, Alain; Krauss, Stephan; Reiser, Ruben; Waeny, Martin; Sorci, Matteo; Llewellynn, Tim; Fedorczak, Christian; Larmoire, Thierry; Herbst, Marco; Seirafi, Andre; Seirafi, Kasra

    2017-05-21

    Embedded systems control and monitor a great deal of our reality. While some "classic" features are intrinsically necessary, such as low power consumption, rugged operating ranges, fast response and low cost, these systems have evolved in the last few years to emphasize connectivity functions, thus contributing to the Internet of Things paradigm. A myriad of sensing/computing devices are being attached to everyday objects, each able to send and receive data and to act as a unique node in the Internet. Apart from the obvious necessity to process at least some data at the edge (to increase security and reduce power consumption and latency), a major breakthrough will arguably come when such devices are endowed with some level of autonomous "intelligence". Intelligent computing aims to solve problems for which no efficient exact algorithm can exist or for which we cannot conceive an exact algorithm. Central to such intelligence is Computer Vision (CV), i.e., extracting meaning from images and video. While not everything needs CV, visual information is the richest source of information about the real world: people, places and things. The possibilities of embedded CV are endless if we consider new applications and technologies, such as deep learning, drones, home robotics, intelligent surveillance, intelligent toys, wearable cameras, etc. This paper describes the Eyes of Things (EoT) platform, a versatile computer vision platform tackling those challenges and opportunities.

  11. On the Application of Pattern Recognition and AI Technique to the Cytoscreening of Vaginal Smears by Computer

    NASA Astrophysics Data System (ADS)

    Bow, Sing T.; Wang, Xia-Fang

    1989-05-01

    In this paper the concepts of pattern recognition, image processing and artificial intelligence are applied to the development of an intelligent cytoscreening system to differentiate the abnormal cytological objects from the normal ones in vaginal smears. To achieve this goal,work listed below are involved: 1. Enhancement of the microscopic images of the smears; 2. Elevation of the qualitative differentiation under the microscope by cytologists to a quantitative differentiation plateau on the epithelial cells, ciliated cells, vacuolated cells, foreign-body-giant cells, plasma cells, lymph cells, white blood cells, red blood cells, etc. These knowledges are to be inputted into our intelligent cyto-screening system to ameliorate machine differentiation; 3. Selection of a set of effective features to characterize the cytological objects onto various regions of the multiclustered by computer algorithms; and 4. Systematical summarization of the knowledge that a gynecologist has and the way he/she follows when dealing with a case.

  12. A concept for routine emergency-care data-based syndromic surveillance in Europe.

    PubMed

    Ziemann, A; Rosenkötter, N; Garcia-Castrillo Riesgo, L; Schrell, S; Kauhl, B; Vergeiner, G; Fischer, M; Lippert, F K; Krämer, A; Brand, H; Krafft, T

    2014-11-01

    We developed a syndromic surveillance (SyS) concept using emergency dispatch, ambulance and emergency-department data from different European countries. Based on an inventory of sub-national emergency data availability in 12 countries, we propose framework definitions for specific syndromes and a SyS system design. We tested the concept by retrospectively applying cumulative sum and spatio-temporal cluster analyses for the detection of local gastrointestinal outbreaks in four countries and comparing the results with notifiable disease reporting. Routine emergency data was available daily and electronically in 11 regions, following a common structure. We identified two gastrointestinal outbreaks in two countries; one was confirmed as a norovirus outbreak. We detected 1/147 notified outbreaks. Emergency-care data-based SyS can supplement local surveillance with near real-time information on gastrointestinal patients, especially in special circumstances, e.g. foreign tourists. It most likely cannot detect the majority of local gastrointestinal outbreaks with few, mild or dispersed cases.

  13. A multi-agent approach to intelligent monitoring in smart grids

    NASA Astrophysics Data System (ADS)

    Vallejo, D.; Albusac, J.; Glez-Morcillo, C.; Castro-Schez, J. J.; Jiménez, L.

    2014-04-01

    In this paper, we propose a scalable multi-agent architecture to give support to smart grids, paying special attention to the intelligent monitoring of distribution substations. The data gathered by multiple sensors are used by software agents that are responsible for monitoring different aspects or events of interest, such as normal voltage values or unbalanced intensity values that can end up blowing fuses and decreasing the quality of service of end consumers. The knowledge bases of these agents have been built by means of a formal model for normality analysis that has been successfully used in other surveillance domains. The architecture facilitates the integration of new agents and can be easily configured and deployed to monitor different environments. The experiments have been conducted over a power distribution network.

  14. Tobacco industry surveillance of public health groups: the case of STAT (Stop Teenage Addiction to Tobacco) and INFACT (Infant Formula Action Coalition).

    PubMed

    Malone, Ruth E

    2002-06-01

    The goal of this study was to describe how the tobacco industry collects information about public health groups. Publicly available internal tobacco industry documents were reviewed and analyzed using a chronological case study approach. The industry engaged in aggressive intelligence gathering, used intermediaries to obtain materials under false pretenses, sent public relations spies to the organizations' meetings, and covertly taped strategy sessions. Other industry strategies included publicly minimizing the effects of boycotts, painting health advocates as "extreme," identifying and exploiting disagreements, and planning to "redirect the funding" of tobacco control organizations to other purposes. Public health advocates often make light of tobacco industry observers, but industry surveillance may be real, intense, and covert and may obstruct public health initiatives.

  15. A radar-enabled collaborative sensor network integrating COTS technology for surveillance and tracking.

    PubMed

    Kozma, Robert; Wang, Lan; Iftekharuddin, Khan; McCracken, Ernest; Khan, Muhammad; Islam, Khandakar; Bhurtel, Sushil R; Demirer, R Murat

    2012-01-01

    The feasibility of using Commercial Off-The-Shelf (COTS) sensor nodes is studied in a distributed network, aiming at dynamic surveillance and tracking of ground targets. Data acquisition by low-cost (<$50 US) miniature low-power radar through a wireless mote is described. We demonstrate the detection, ranging and velocity estimation, classification and tracking capabilities of the mini-radar, and compare results to simulations and manual measurements. Furthermore, we supplement the radar output with other sensor modalities, such as acoustic and vibration sensors. This method provides innovative solutions for detecting, identifying, and tracking vehicles and dismounts over a wide area in noisy conditions. This study presents a step towards distributed intelligent decision support and demonstrates effectiveness of small cheap sensors, which can complement advanced technologies in certain real-life scenarios.

  16. A study of the effects of degraded imagery on tactical 3D model generation using structure-from-motion

    NASA Astrophysics Data System (ADS)

    Bolick, Leslie; Harguess, Josh

    2016-05-01

    An emerging technology in the realm of airborne intelligence, surveillance, and reconnaissance (ISR) systems is structure-from-motion (SfM), which enables the creation of three-dimensional (3D) point clouds and 3D models from two-dimensional (2D) imagery. There are several existing tools, such as VisualSFM and open source project OpenSfM, to assist in this process, however, it is well-known that pristine imagery is usually required to create meaningful 3D data from the imagery. In military applications, such as the use of unmanned aerial vehicles (UAV) for surveillance operations, imagery is rarely pristine. Therefore, we present an analysis of structure-from-motion packages on imagery that has been degraded in a controlled manner.

  17. Tobacco Industry Surveillance of Public Health Groups: The Case of STAT and INFACT

    PubMed Central

    Malone, Ruth E.

    2002-01-01

    Objectives. The goal of this study was to describe how the tobacco industry collects information about public health groups. Methods. Publicly available internal tobacco industry documents were reviewed and analyzed using a chronological case study approach. Results. The industry engaged in aggressive intelligence gathering, used intermediaries to obtain materials under false pretenses, sent public relations spies to the organizations' meetings, and covertly taped strategy sessions. Other industry strategies included publicly minimizing the effects of boycotts, painting health advocates as “extreme,” identifying and exploiting disagreements, and planning to “redirect the funding” of tobacco control organizations to other purposes. Conclusions. Public health advocates often make light of tobacco industry observers, but industry surveillance may be real, intense, and covert and may obstruct public health initiatives. PMID:12036789

  18. Hierarchical video surveillance architecture: a chassis for video big data analytics and exploration

    NASA Astrophysics Data System (ADS)

    Ajiboye, Sola O.; Birch, Philip; Chatwin, Christopher; Young, Rupert

    2015-03-01

    There is increasing reliance on video surveillance systems for systematic derivation, analysis and interpretation of the data needed for predicting, planning, evaluating and implementing public safety. This is evident from the massive number of surveillance cameras deployed across public locations. For example, in July 2013, the British Security Industry Association (BSIA) reported that over 4 million CCTV cameras had been installed in Britain alone. The BSIA also reveal that only 1.5% of these are state owned. In this paper, we propose a framework that allows access to data from privately owned cameras, with the aim of increasing the efficiency and accuracy of public safety planning, security activities, and decision support systems that are based on video integrated surveillance systems. The accuracy of results obtained from government-owned public safety infrastructure would improve greatly if privately owned surveillance systems `expose' relevant video-generated metadata events, such as triggered alerts and also permit query of a metadata repository. Subsequently, a police officer, for example, with an appropriate level of system permission can query unified video systems across a large geographical area such as a city or a country to predict the location of an interesting entity, such as a pedestrian or a vehicle. This becomes possible with our proposed novel hierarchical architecture, the Fused Video Surveillance Architecture (FVSA). At the high level, FVSA comprises of a hardware framework that is supported by a multi-layer abstraction software interface. It presents video surveillance systems as an adapted computational grid of intelligent services, which is integration-enabled to communicate with other compatible systems in the Internet of Things (IoT).

  19. Study on Persistent Monitoring of Maritime, Great Lakes and St. Lawrence Seaway Border Regions

    DTIC Science & Technology

    2011-12-01

    narcotics between both countries, particularly due to the burgeoning marijuana market originating in British Columbia (BC). Additionally, due to the...Sensors 2008, Vol. 8, pp. 2959-2973 Crisp D. J., The State-of-the-Art in Ship Detection in Synthetic Aperture Radar Imagery, DSTO– RR–0272...Network SAR – Synthetic Aperture radar SII-Surveillance Intelligence and Interdiction SNR - Signal-to-Noise SOLAS - Safety of Life at Sea

  20. The Use of EMS Personnel as Intelligence Sensors: Critical Issues and Recommended Practices

    DTIC Science & Technology

    2007-09-01

    caustic chemical with intent to injure, child abuse or endangerment , abuse of spouse, lewd acts with a child , and elder abuse.) The content of the...technicians and paramedics must report child abuse and dependent elder abuse.46 However, within the performance of their pre-hospital duties, this... child abuse, or public health surveillance, investigation or intervention.48 This preemption test creates a floor or minimum standard for protection

  1. 11th Annual Systems Engineering Conference

    DTIC Science & Technology

    2008-10-23

    effectiveness for force structure architecture studies – Problem of interest was Layered Intelligence, Surveillance and Reconnaissance ( LISR ) with Integrated...Cleared for Public Release, Control No. 08-110, dtd. 10-1-0811 LISR CET Typical Products 1 Satellite_A; 1 Satellite_B; 3 VehA; 1 VehB (50%) 2 VehA; 3...the means to support LISR force structure architecture studies: Stand-alone and as a lead-in to detailed work Cleared for Public Release, Control No

  2. A Tasking Construct for Non-Traditional Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2009-04-01

    carrying six GBU-38 JDAM 500 lbs GPS guided munitions, six GBU-12 500 lbs laser guided munitions, and a Litening AT Advanced Targeting pod with video...combination thereof. The strike planners categorize common munitions configurations and list them on the ATO as Standard Conventional Loadouts ( SCL ...The SCL requested for each strike mission is listed on the ATO and sent to the unit to coordinate munitions availability in theater. In the same

  3. Achieving an Optimal Medium Altitude UAV Force Balance in Support of COIN Operations

    DTIC Science & Technology

    2009-02-02

    and execute operations. UAS with common data links and remote video terminals (RVTs) provide input to the common operational picture (COP) and...full-motion video (FMV) is intuitive to many tactical warfighters who have used similar sensors in manned aircraft. Modern data links allow the video ...Document (AFDD) 2-9. Intelligence, Surveillance, and Reconnaissance Operations, 17 July 2007. Baldor, Lolita C. “Increased UAV reliance evident in

  4. A RAND Analysis Tool for Intelligence, Surveillance, and Reconnaissance: The Collections Operations Model

    DTIC Science & Technology

    2008-01-01

    appropriate; scan cycle, emission interval, or emission probability; frequency bands; relative angular size of 2 Carl Rhodes, Jeff Hagen, and Mark...choices based on its own perceptions. An agent has autonomy. 2 In this report, “behaviors” are individual scripts , programs, instructions, or decision...relative angular size of main and side lobes (for directional signals); and the effective radiated power of each radiative lobe. With these parameters and

  5. EXTENDING THE UNITED STATES NUCLEAR DETERRENCE UMBRELLA TO THE MIDDLE EAST

    DTIC Science & Technology

    2016-05-01

    the oil fields of the Persian Gulf.”27 This policy supported a larger US strategic objective to contain Soviet expansion, and was applied to Saudi... uranium ore concentrate produced by Iran… containment and surveillance of centrifuge rotors and bellows… use of IAEA-approved and certified modern...Caravelli, Jack. Beyond Sand & Oil : The Nuclear Middle East. Santa Barbara, CA: Praeger, 2011. Central Intelligence Agency website. “The World Factbook

  6. U.S. Coast Guard Cutter Procurement Lessons Impacts on the Offshore Patrol Cutter (OPC) Program Affordability

    DTIC Science & Technology

    2015-12-01

    Block Buy Contracting Budget Control Act Bureau of Labor and Statistics Command, Control, Communications, Computers, Intelligence, Surveillance, and...made prior to full-rate production. If the program is delinquent in the testing of all of the functionality and the ability to meet stated KPPs, the...incorporating the Bureau of Labor Statistics calculations on shipbuilding labor costs, average material cost per ship, and “wrap rate” for overhead

  7. The New Intelligence, Surveillance, and Reconnaissance Cockpit: Examining the Contributions of Emerging Unmanned Aircraft Systems

    DTIC Science & Technology

    2010-04-25

    similar to the architecture of the right hemisphere of the brain. 169 The other method involves the development of software-based pheromones ...borrowing from the genetic behaviors employed by ants and termites . 170 UAVs and UCAVs employing this theoretical technique can essentially mark...coverage areas and targets with “digital pheromones .” 171 Both concepts are being designed to allow relatively inexpensive unmanned aircraft to cue

  8. Air Sea Battle Intelligence, Surveillance, and Reconnaissance Concept of Operations: Getting Back to Fundamentals

    DTIC Science & Technology

    2012-05-08

    Assessment” phase. This phase will be constant throughout the AirSea Battle. A subset of this phase includes battle damage assessment ( BDA ). BDA ...taskings for assessment. There may be situations where operations will cease until the proper BDA is desired. This possibility directly... BDA assessments. It is paramount to task fifth generation fighter with this mission set due to their advanced capabilities. 15 The USAF and USN

  9. Deterrence and First-Strike Stability in Space: A Preliminary Assessment

    DTIC Science & Technology

    2010-01-01

    Paul Deluca, Andrew Hoehn, Martin Libicki, Karl Mueller, Richard Mesic, David Ochmanek, Chad Ohlandt, Jan Osburg, and Carl Rhodes for their...Positioning System ISR intelligence, surveillance, and reconnaissance LEO low earth orbit MAD mutual assured destruction MILSATCOM military satellite...pp. 10–11. 4 Paul B. Stares, The Militarization of Space: U.S. Policy, 1945–1984, Ithaca, N.Y.: Cornell University Press, 1985, pp. 99–100. In the

  10. Leading the Development of Concepts of Operations for Next-Generation Remotely Piloted Aircraft

    DTIC Science & Technology

    2016-01-01

    overarching CONOPS. RPAs must provide full motion video and signals intelli- gence (SIGINT) capabilities to fulfill their intelligence, surveillance, and...reached full capacity, combatant commanders had an insatiable demand for this new breed of capability, and phrases like Pred porn and drone strike...dimensional steering line on the video feed of the pilot’s head-up display (HUD) that would indicate turning cues and finite steering paths for optimal

  11. Logistics and Maintenance Options to Support the P-8A Poseidon’s Expeditionary Mission

    DTIC Science & Technology

    2010-06-01

    Equipment HOA Horn Of Africa ICD Initial Capabilities Document IFR In Flight Refueling ISR Intelligence Surveillance and Reconnaissance JOA...will transition to the new MPRF platform 18 one base and one squadron at a time beginning with the Fleet Readiness Squadron ( FRS ) and VP squadrons...and is equipped with in a universal aerial refueling receptacle that will provide In-Flight Refueling ( IFR ) capability. This new in-flight

  12. Space Based Intelligence, Surveillance, and Reconnaissance Contribution to Global Strike in 2035

    DTIC Science & Technology

    2012-02-15

    include using high altitude air platforms and airships as a short-term solution, and small satellites with an Operationally Responsive Space (ORS) launch...irreversible threats, along with a worst case scenario. Section IV provides greater detail of the high altitude air platform, airship , and commercial space...Resultantly, the U.S. could use high altitude air platforms, airships , and cyber to complement its space systems in case of denial, degradation, or

  13. Transforming Airborne Command and Control and Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2012-06-01

    launched once and remains on station at high altitude for many years. The ISIS airship loiters at very slow speeds, but it can relocate to any theater...operate at considerable altitudes are too high to permit adequate radar resolution for MTI purposes. Additionally, even with improved radar resolution...provides a capability analysis on the AWACS, JSTARS, RPAs, and unmanned airships to determine which systems can best meet these requirements in the future

  14. A Concept of Operations for an Unclassified Common Operational Picture in Support of Maritime Domain Awareness

    DTIC Science & Technology

    2017-03-01

    Responsibility AWS Amazon Web Services C2 Command and Control C4ISR Command, Control, Communications, Computers and Intelligence, Surveillance...and Reconnaissance C5F Commander Fifth Fleet C6F Commander Sixth Fleet C7F Commander Seventh Fleet CAMTES Computer -Assisted Maritime...capabilities. C. SCOPE AND LIMITATIONS The scope of this study is considerable and encompasses numerous agencies and classification levels. Some

  15. Disparities in work-related homicide rates in selected retail industries in the United States, 2003–2008

    PubMed Central

    Menéndez, Cammie Chaumont; Konda, Srinivas; Hendricks, Scott; Amandus, Harlan

    2015-01-01

    Problem Segments within the retail industry have a substantially higher rate of work-related fatality due to workplace violence compared to the retail industry overall. Certain demographic subgroups may be at higher risk. Method National traumatic injury surveillance data were analyzed to characterize the distribution of fatality rates due to workplace violence among selected retail workers in the United States from 2003 through 2008. Results Overall, the highest fatality rates due to work-related homicide occurred among men, workers aged ≥ 65 years, black, Asian, foreign-born and Southern workers. Among foreign-born workers, those aged 16–24 years, non-Hispanic whites and Asians experienced substantially higher fatality rates compared to their native-born counterparts. Conclusions The burden of work-related homicide in the retail industry falls more heavily on several demographic groups, including racial minorities and the foreign-born. Further research should examine the causes of these trends. Interventions designed to prevent workplace violence should target these groups. PMID:23398701

  16. India-United States Security Cooperation: Past, Present, and Future

    DTIC Science & Technology

    2011-12-16

    IOR Indian Ocean Region ISI Inter-Services Intelligence JeM Jaish-e-Mohammad ix JTG Joint Technical Group LCA Light Combat Aircraft LeT...community’s senior expert who has written and consulted on issues ranging from terrorism to nuclear policy, political stability, and foreign relations... resulted in the happy situation of simultaneous expansion of relations with all the major powers, growing weight in Asia and the Indian Ocean regions

  17. CTC Sentinel: January 2017, Volume 10, Issue 1

    DTIC Science & Technology

    2017-01-01

    Yemeni intelligence services — are charged with identifying ranking individuals who may be sym- pathetic to AQAP’s cause and then offering financial and...and Wil van Gemert U.S. Immigration and Customs Enforcement Acting Deputy Director and Europol Deputy Director Editor in Chief Paul Cruickshank...and Customs En- forcement, and Wil van Gemert, Deputy Director of Europol, focus on the challenges of identifying, tracking, and interdicting foreign

  18. Counter-Insurgency Lessons from the French-Algerian War

    DTIC Science & Technology

    2004-02-09

    the behavior of foreign governments, organizations, groups, and individuals.”20 PSYOP capability currently exists only in specialized units, organized...as necessary to counter the threat. As described by communist doctrine, terrorists can be compared to “ fish swimming in the ocean of the people.”26...greater threat than the military, and that the military is capable and willing to protect them, they will come forward and deliver intelligence. The

  19. Truman Smith's Reports on Nazi Militarism: Domestic Political Priorities and U.S. Foreign Policy-Making in Franklin Roosevelt's First and Second Terms

    ERIC Educational Resources Information Center

    Shearer, Sam

    2015-01-01

    After an accomplished military career leading up to and during World War II, Truman Smith (1893-1970) was seemingly forgotten. His name was seldom mentioned after the war until his memoirs were published posthumously in 1984. History shows Smith to be an astoundingly successful figure in military intelligence. This article provides a biography on…

  20. The Special Forces Organization for Foreign Internal Defense in 2010.

    DTIC Science & Technology

    1997-06-07

    synchronization of all elements of national power and interagency efforts. 7 This publication also describes three " tools " in executing the FID program...logistical, intelligence, or other combat support and service support means. This third tool also reiterates that U.S. forces may be required to engage hostile...ventilated ideas in his patient, sometimes didactic style and Magsaysay listened reverently. A Filipino nationalist once charged Lansdale with keeping

  1. Wireless intelligent network: infrastructure before services?

    NASA Astrophysics Data System (ADS)

    Chu, Narisa N.

    1996-01-01

    The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.

  2. Marketing medical devices in Japan.

    PubMed

    Ohashi, J

    1998-01-01

    The control of medical devices in Japan has recently undergone significant changes as the country brings its systems into line with those of the United States and Europe. This article discusses pre-market approval, quality system requirements and post-market surveillance. Many technical issues have been harmonized but language is likely to continue to be a barrier to trade. Details of information services that are available to foreign manufacturers and importers are supplied.

  3. Physicist falls foul of US export law

    NASA Astrophysics Data System (ADS)

    Gwynne, Peter

    2008-10-01

    A retired US plasma physicist is seeking to overturn his conviction last month of offences under the American Arms Export Control Act, which prohibits the export, without a government licence, of technology and data to foreign nationals or nations. A jury in Knoxville, Tennessee, found JReece Roth, 70, guilty of illegally exporting technical information about a military project to develop plasma technology for guiding spyplanes that operate as weapons or surveillance devices.

  4. The CRISPR RNA-guided surveillance complex in Escherichia coli accommodates extended RNA spacers

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Luo, Michelle L.; Jackson, Ryan N.; Denny, Steven R.

    Bacteria and archaea acquire resistance to foreign genetic elements by integrating fragments of foreign DNA into CRISPR (clustered regularly interspaced short palindromic repeats) loci. In Escherichia coli, CRISPR-derived RNAs (crRNAs) assemble with Cas proteins into a multi-subunit surveillance complex called Cascade (CRISPR-associated complex for antiviral defense). Cascade recognizes DNA targets via protein-mediated recognition of a protospacer adjacent motif and complementary base pairing between the crRNA spacer and the DNA target. Previously determined structures of Cascade showed that the crRNA is stretched along an oligomeric protein assembly, leading us to ask how crRNA length impacts the assembly and function of thismore » complex. We found that extending the spacer portion of the crRNA resulted in larger Cascade complexes with altered stoichiometry and preserved in vitro binding affinity for target DNA. Longer spacers also preserved the in vivo ability of Cascade to repress target gene expression and to recruit the Cas3 endonuclease for target degradation. Lastly, longer spacers exhibited enhanced silencing at particular target locations and were sensitive to mismatches within the extended region. These findings demonstrate the flexibility of the Type I-E CRISPR machinery and suggest that spacer length can be modified to fine-tune Cascade activity.« less

  5. The CRISPR RNA-guided surveillance complex in Escherichia coli accommodates extended RNA spacers

    DOE PAGES

    Luo, Michelle L.; Jackson, Ryan N.; Denny, Steven R.; ...

    2016-05-12

    Bacteria and archaea acquire resistance to foreign genetic elements by integrating fragments of foreign DNA into CRISPR (clustered regularly interspaced short palindromic repeats) loci. In Escherichia coli, CRISPR-derived RNAs (crRNAs) assemble with Cas proteins into a multi-subunit surveillance complex called Cascade (CRISPR-associated complex for antiviral defense). Cascade recognizes DNA targets via protein-mediated recognition of a protospacer adjacent motif and complementary base pairing between the crRNA spacer and the DNA target. Previously determined structures of Cascade showed that the crRNA is stretched along an oligomeric protein assembly, leading us to ask how crRNA length impacts the assembly and function of thismore » complex. We found that extending the spacer portion of the crRNA resulted in larger Cascade complexes with altered stoichiometry and preserved in vitro binding affinity for target DNA. Longer spacers also preserved the in vivo ability of Cascade to repress target gene expression and to recruit the Cas3 endonuclease for target degradation. Lastly, longer spacers exhibited enhanced silencing at particular target locations and were sensitive to mismatches within the extended region. These findings demonstrate the flexibility of the Type I-E CRISPR machinery and suggest that spacer length can be modified to fine-tune Cascade activity.« less

  6. Kestrel: force protection and Intelligence, Surveillance, and Reconnaissance (ISR) persistent surveillance on aerostats

    NASA Astrophysics Data System (ADS)

    Luber, David R.; Marion, John E.; Fields, David

    2012-05-01

    Logos Technologies has developed and fielded the Kestrel system, an aerostat-based, wide area persistent surveillance system dedicated to force protection and ISR mission execution operating over forward operating bases. Its development included novel imaging and stabilization capability for day/night operations on military aerostat systems. The Kestrel system's contribution is a substantial enhancement to aerostat-based, force protection systems which to date have relied on narrow field of view ball gimbal sensors to identify targets of interest. This inefficient mechanism to conduct wide area field of view surveillance is greatly enhanced by Kestrel's ability to maintain a constant motion imagery stare of the entire forward operating base (FOB) area. The Kestrel airborne sensor enables 360° coverage out to extended ranges which covers a city sized area at moderate resolution, while cueing a narrow field of view sensor to provide high resolution imagery of targets of interest. The ground station exploitation system enables operators to autonomously monitor multiple regions of interest in real time, and allows for backtracking through the recorded imagery, while continuing to monitor ongoing activity. Backtracking capability allows operators to detect threat networks, their CONOPS, and locations of interest. Kestrel's unique advancement has already been utilized successfully in OEF operations.

  7. Using OpenSSH to secure mobile LAN network traffic

    NASA Astrophysics Data System (ADS)

    Luu, Brian B.; Gopaul, Richard D.

    2002-08-01

    Mobile Internet Protocol (IP) Local Area Network (LAN) is a technique, developed by the U.S. Army Research Laboratory, which allows a LAN to be IP mobile when attaching to a foreign IP-based network and using this network as a means to retain connectivity to its home network. In this paper, we describe a technique that uses Open Secure Shell (OpenSSH) software to ensure secure, encrypted transmission of a mobile LAN's network traffic. Whenever a mobile LAN, implemented with Mobile IP LAN, moves to a foreign network, its gateway (router) obtains an IP address from the new network. IP tunnels, using IP encapsulation, are then established from the gateway through the foreign network to a home agent on its home network. These tunnels provide a virtual two-way connection to the home network for the mobile LAN as if the LAN were connected directly to its home network. Hence, when IP mobile, a mobile LAN's tunneled network traffic must traverse one or more foreign networks that may not be trusted. This traffic could be subject to eavesdropping, interception, modification, or redirection by malicious nodes in these foreign networks. To protect network traffic passing through the tunnels, OpenSSH is used as a means of encryption because it prevents surveillance, modification, and redirection of mobile LAN traffic passing across foreign networks. Since the software is found in the public domain, is available for most current operating systems, and is commonly used to provide secure network communications, OpenSSH is the software of choice.

  8. Standards-based sensor interoperability and networking SensorWeb: an overview

    NASA Astrophysics Data System (ADS)

    Bolling, Sam

    2012-06-01

    The War fighter lacks a unified Intelligence, Surveillance, and Reconnaissance (ISR) environment to conduct mission planning, command and control (C2), tasking, collection, exploitation, processing, and data discovery of disparate sensor data across the ISR Enterprise. Legacy sensors and applications are not standardized or integrated for assured, universal access. Existing tasking and collection capabilities are not unified across the enterprise, inhibiting robust C2 of ISR including near-real time, cross-cueing operations. To address these critical needs, the National Measurement and Signature Intelligence (MASINT) Office (NMO), and partnering Combatant Commands and Intelligence Agencies are developing SensorWeb, an architecture that harmonizes heterogeneous sensor data to a common standard for users to discover, access, observe, subscribe to and task sensors. The SensorWeb initiative long term goal is to establish an open commercial standards-based, service-oriented framework to facilitate plug and play sensors. The current development effort will produce non-proprietary deliverables, intended as a Government off the Shelf (GOTS) solution to address the U.S. and Coalition nations' inability to quickly and reliably detect, identify, map, track, and fully understand security threats and operational activities.

  9. OPUS One: An Intelligent Adaptive Learning Environment Using Artificial Intelligence Support

    NASA Astrophysics Data System (ADS)

    Pedrazzoli, Attilio

    2010-06-01

    AI based Tutoring and Learning Path Adaptation are well known concepts in e-Learning scenarios today and increasingly applied in modern learning environments. In order to gain more flexibility and to enhance existing e-learning platforms, the OPUS One LMS Extension package will enable a generic Intelligent Tutored Adaptive Learning Environment, based on a holistic Multidimensional Instructional Design Model (PENTHA ID Model), allowing AI based tutoring and adaptation functionality to existing Web-based e-learning systems. Relying on "real time" adapted profiles, it allows content- / course authors to apply a dynamic course design, supporting tutored, collaborative sessions and activities, as suggested by modern pedagogy. The concept presented combines a personalized level of surveillance, learning activity- and learning path adaptation suggestions to ensure the students learning motivation and learning success. The OPUS One concept allows to implement an advanced tutoring approach combining "expert based" e-tutoring with the more "personal" human tutoring function. It supplies the "Human Tutor" with precise, extended course activity data and "adaptation" suggestions based on predefined subject matter rules. The concept architecture is modular allowing a personalized platform configuration.

  10. Surveillance of borders, coastlines, and harbours (SOBCAH): a European commission preparatory action on security research

    NASA Astrophysics Data System (ADS)

    Clarke, David J.; Davis, Eric; Varco, Alan G.

    2008-10-01

    Surveillance Of Borders Coastlines And Harbours (SOBCAH ) is becoming increasingly challenging in Europe due to the expansion of new European borders coupled with the increased risks from the potential quantity and variety of terrorist activities. SOBCAH was an 18-month programme undertaken as a European Commission funded Preparatory Action in the field of Security Research (PASR) initiative to identify and demonstrate improvements in security; initially focusing on techniques to maximise the surveillance and detection effectiveness of existing sensor systems and technologies. This paper discusses the rationale in identifying the requirements, establishing a system architecture and the findings of building a security system demonstrator that underwent trials in the Port of Genoa, Italy in July 2007. It will provide an overview of the main drivers for a European-wide concept to standardise the development of enhanced border security systems. The paper will focus on techniques employed in the demonstrator to maximise the intelligence gathered from many disparate sensor sources without burdening the work load of the operators; providing enhanced situational awareness of the threat environment.

  11. Usaf Space Sensing Cryogenic Considerations

    NASA Astrophysics Data System (ADS)

    Roush, F.

    2010-04-01

    Infrared (IR) space sensing missions of the future depend upon low mass components and highly capable imaging technologies. Limitations in visible imaging due to the earth's shadow drive the use of IR surveillance methods for a wide variety of applications for Intelligence, Surveillance, and Reconnaissance (ISR), Ballistic Missile Defense (BMD) applications, and almost certainly in Space Situational Awareness (SSA) and Operationally Responsive Space (ORS) missions. Utilization of IR sensors greatly expands and improves mission capabilities including target and target behavioral discrimination. Background IR emissions and electronic noise that is inherently present in Focal Plane Arrays (FPAs) and surveillance optics bench designs prevents their use unless they are cooled to cryogenic temperatures. This paper describes the role of cryogenic coolers as an enabling technology for generic ISR and BMD missions and provides ISR and BMD mission and requirement planners with a brief glimpse of this critical technology implementation potential. The interaction between cryogenic refrigeration component performance and the IR sensor optics and FPA can be seen as not only mission enabling but also as mission performance enhancing when the refrigeration system is considered as part of an overall optimization problem.

  12. Airborne Intelligence, Surveillance, and Reconnaissance: Mission Command and Centralized Control

    DTIC Science & Technology

    2014-12-10

    short stint in Texas, Stuart reported to Fort Leavenworth, where he began his career as a cavalryman and found himself confronted with the torrent of...found themselves back at the War Department in a meeting with Secretary Floyd and President James Buchanan.50 The Secretary of War placed Lee in command...and Aldie. Those fights were tactical victories for the Union cavalry and Stuart had lost 500 men , but his cavalry had served its operational

  13. Cognitive Impact of a C4ISR Tactical Network

    DTIC Science & Technology

    2009-06-01

    1 14th ICCRTS    “C2 and Agility”    Title of Paper: Cognitive Impact of a C4ISR Tactical Network   Topic(s)    Topic 5:  Experimentation  and...Intelligence, Surveillance, and Reconnaissance (ISR) force. Data collection included observational, quantitative, and qualitative methods designed to...Sensor (UAS) platforms. These Soldiers operated against a live but scripted Opposition Force (OPFOR). The platoons were organizationally designed to

  14. Development Of A Numerical Tow Tank With Wave Generation To Supplement Experimental Efforts

    DTIC Science & Technology

    2017-12-01

    vehicles CAD computer aided design CFD computational fluid dynamics FVM finite volume method IO information operations ISR intelligence, surveillance, and...deliver a product that I am truly proud of. xv THIS PAGE INTENTIONALLY LEFT BLANK xvi CHAPTER 1: Introduction 1.1 Importance of Tow Tank Testing Modern...wedge installation. 1 In 2016, NPS student Ensign Ryan Tran adapted an existing vertical plunging wedge wave maker design used at the U.S. Naval

  15. Velocity and Structure Estimation of a Moving Object Using a Moving Monocular Camera

    DTIC Science & Technology

    2006-01-01

    map the Euclidean position of static landmarks or visual features in the environment . Recent applications of this technique include aerial...From Motion in a Piecewise Planar Environment ,” International Journal of Pattern Recognition and Artificial Intelligence, Vol. 2, No. 3, pp. 485-508...1988. [9] J. M. Ferryman, S. J. Maybank , and A. D. Worrall, “Visual Surveil- lance for Moving Vehicles,” Intl. Journal of Computer Vision, Vol. 37, No

  16. Path Planning for Reduced Identifiability of Unmanned Surface Vehicles Conducting Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2017-05-22

    angular velocity values Figure 33: Feasibility test Figure 34: Bellman’s Principle Figure 35: Bellman’s Principle validation Minimum Figure 36...Distribution of at test point for simulated ISR traffic Figure 48: PDFs of observed and ISR traffic Table 2: Adversary security states at test point #10...Figure 49: Hypothesis testing at test point #10 Figure 50: Distribution of for observed traffic Figure 51: Distribution of for ISR traffic Table 3

  17. Topological Entropy Measure of Artificial Grammar Complexity for Use in Designing Experiments on Human Performance in Intelligence, Surveillance, and Reconnaissance (ISR) Tasks

    DTIC Science & Technology

    2015-04-02

    grammar may be stated as AA 6→ AA, so not form AAA xB 6→ BB, so not form xBB xS 6→ SS, so not form xSS SA 6→ AB, so not form SAB BA 6→ AS, so not form BAS... 350 . Dienes, Z., & Scott, R. (2005). Measuring Unconscious Knowledge: Distinguishing Structural Knowledge and Judgment Knowledge. Psychological

  18. Context Aware TCP for Intelligence, Surveillance and Reconnaissance Missions on Autonomous Platforms

    DTIC Science & Technology

    2014-10-08

    under the Unmanned Vehicle Experimental Communications Testbed (UVECT) flight test plan and were done over the Stockbridge Research Facility in the...sure the payload did not interfere with the command and control systems of the aircraft several flight paths were selected to exert the link and the...throughput from data source to destination. Figure 1 shows the flight path of a small RPA in a PoL flight path scenario. The change of SNR

  19. Pulling Teeth: Why Humans Are More Important Than Hardware in Airborne Intelligence, Surveillance, and Reconnaissance

    DTIC Science & Technology

    2015-06-12

    soldiers aloft in tethered hot air balloons to observe enemy positions on the battlefield. The Union Army even established a separate Balloon Corps from...December 20, 2014). 1 describe man-lifting kites in the Far East while eighteenth and nineteenth century manned balloons and piloted fixed wing aircraft...in the twentieth and twenty-first centuries provided this capability. One of the first recorded Western uses of manned balloons for ISR purposes

  20. U.S. Coast Guard Cutter Procurement Lessons Impacts on the Offshore Patrol Cutter Program Affordability

    DTIC Science & Technology

    2015-12-01

    Budget Control Act BLS Bureau of Labor and Statistics C4ISR Command, Control, Communications, Computers, Intelligence, Surveillance, and...made prior to full-rate production. If the program is delinquent in the testing of all of the functionality and the ability to meet stated KPPs, the...estimated the price per pound of the ship by incorporating the Bureau of Labor Statistics calculations on shipbuilding labor costs, average material cost

  1. Command and Control, Cyber, Communications, Intelligence, Surveillance and Reconnaissance (CRISR) and Cyber Tactical Measures

    DTIC Science & Technology

    2016-09-01

    between U.S. bases and the theater of operations. • Cyber Attack capabilities designed to disrupt U.S. command and control systems and critical...operational area. Key area-denial capabilities include: • Air forces and air defense systems, both fixed and mobile, designed to deny local U.S. air...Precision-guided rockets, artillery, missiles, and mortars (G-RAMM) designed to attack surface targets, including landing forces, with much greater accuracy

  2. Final Environmental Impact Statement Establishment and Operation of an Intelligence, Surveillance, Reconnaissance, and Strike Capability Andersen Air Force Base, Guam

    DTIC Science & Technology

    2007-01-01

    Mariana Fruit Bat Pup Recruitment at Pati Point Colony; • Brown Tree Snake Interdiction and Control; and • Adaptive Management and Ground Track...establishment of a mitigation monitoring plan and adaptive management program. FUTURE ACTIONS As discussed in the Final EIS, the Air Force recognizes that...would initiate modifications to aircraft ground tracks and profiles over sensitive areas through an adaptive management strategy. This adaptive

  3. Test and Evaluation of a Prototyped Sensor-Camera Network for Persistent Intelligence, Surveillance, and Reconnaissance in Support of Tactical Coalition Networking Environments

    DTIC Science & Technology

    2006-06-01

    scenarios. The demonstration planned for May 2006, in Chiang Mai , Thailand, will have a first-responder, law enforcement, and counter-terrorism and counter...to local ( Chiang Mai ), theater (Bangkok), and global (Alameda, California) command and control centers. This fusion of information validates using...network performance to be tested during moderate environmental conditions. The third and fourth scenarios were conducted in Chiang Mai , Thailand

  4. Verbal short-term memory and vocabulary learning in polyglots.

    PubMed

    Papagno, C; Vallar, G

    1995-02-01

    Polyglot and non-polyglot Italian subjects were given tests assessing verbal (phonological) and visuo-spatial short-term and long-term memory, general intelligence, and vocabulary knowledge in their native language. Polyglots had a superior level of performance in verbal short-term memory tasks (auditory digit span and nonword repetition) and in a paired-associate learning test, which assessed the subjects' ability to acquire new (Russian) words. By contrast, the two groups had comparable performance levels in tasks assessing general intelligence, visuo-spatial short-term memory and learning, and paired-associate learning of Italian words. These findings, which are in line with neuropsychological and developmental evidence, as well as with data from normal subjects, suggest a close relationship between the capacity of phonological memory and the acquisition of foreign languages.

  5. Hot spots in a wired world: WHO surveillance of emerging and re-emerging infectious diseases.

    PubMed

    Heymann, D L; Rodier, G R

    2001-12-01

    The resurgence of the microbial threat, rooted in several recent trends, has increased the vulnerability of all nations to the risk of infectious diseases, whether newly emerging, well-established, or deliberately caused. Infectious disease intelligence, gleaned through sensitive surveillance, is the best defence. The epidemiological and laboratory techniques needed to detect, investigate, and contain a deliberate outbreak are the same as those used for natural outbreaks. In April 2000, WHO formalised an infrastructure (the Global Outbreak Alert and Response Network) for responding to the heightened need for early awareness of outbreaks and preparedness to respond. The Network, which unites 110 existing networks, is supported by several new mechanisms and a computer-driven tool for real time gathering of disease intelligence. The procedure for outbreak alert and response has four phases: systematic detection, outbreak verification, real time alerts, and rapid response. For response, the framework uses different strategies for combating known risks and unexpected events, and for improving both global and national preparedness. New forces at work in an electronically interconnected world are beginning to break down the traditional reluctance of countries to report outbreaks due to fear of the negative impact on trade and tourism. About 65% of the world's first news about infectious disease events now comes from informal sources, including press reports and the internet.

  6. Evaluation of the Health Protection Event-Based Surveillance for the London 2012 Olympic and Paralympic Games.

    PubMed

    Severi, E; Kitching, A; Crook, P

    2014-06-19

    The Health Protection Agency (HPA) (currently Public Health England) implemented the Health Protection Event-Based Surveillance (EBS) to provide additional national epidemic intelligence for the 2012 London Olympic and Paralympic Games (the Games). We describe EBS and evaluate the system attributes. EBS aimed at identifying, assessing and reporting to the HPA Olympic Coordination Centre (OCC) possible national infectious disease threats that may significantly impact the Games. EBS reported events in England from 2 July to 12 September 2012. EBS sourced events from reports from local health protection units and from screening an electronic application 'HPZone Dashboard' (DB). During this period, 147 new events were reported to EBS, mostly food-borne and vaccine-preventable diseases: 79 from regional units, 144 from DB (76 from both). EBS reported 61 events to the OCC: 21 of these were reported onwards. EBS sensitivity was 95.2%; positive predictive value was 32.8%; reports were timely (median one day; 10th percentile: 0 days - same day; 90th percentile: 3.6 days); completeness was 99.7%; stability was 100%; EBS simplicity was assessed as good; the daily time per regional or national unit dedicated to EBS was approximately 4 hours (weekdays) and 3 hours (weekends). OCC directors judged EBS as efficient, fast and responsive. EBS provided reliable, reassuring, timely, simple and stable national epidemic intelligence for the Games.

  7. Contributing to communicable diseases intelligence management in Canada: CACMID meeting, March 2007, Halifax, Nova Scotia

    PubMed Central

    Mukhi, Shamir; Aramini, Jeff; Kabani, Amin

    2007-01-01

    In the spring of 2003, the Public Health Agency of Canada (then, Health Canada) partnered with several provincial/territorial and regional public health stakeholders to improve pan-Canadian public health surveillance, communications and response through the application of new technologies. This resulted in the creation of the Canadian Network for Public Health Intelligence (CNPHI), a comprehensive framework of applications and resources designed to fill critical gaps in Canada's national public health infostructure. Over the past four years, the CNPHI has evolved into Canada's only pan-Canadian public health information management system. With over 2000 registered users, the current CNPHI environment consists of more than 30 integrated applications and systems that can be loosely categorized into four functional groups: data exchange; data analysis and integration; communication, collaboration and coordination; and knowledge management. Despite poor data repositories, legacy information management systems, and the lack of standards and agreements, the CNPHI has demonstrated that much can be accomplished in these areas. Over the next decade, significant barriers impeding additional advances will be bridged through the implementation of the Electronic Health Record, and through ongoing efforts to address gaps in standards, and data- and information-sharing agreements. Together with new technologies coming on-line, opportunities to further enhance public health surveillance and response will be limited only by one's imagination. PMID:18978985

  8. Terrain Commander: a next-generation remote surveillance system

    NASA Astrophysics Data System (ADS)

    Finneral, Henry J.

    2003-09-01

    Terrain Commander is a fully automated forward observation post that provides the most advanced capability in surveillance and remote situational awareness. The Terrain Commander system was selected by the Australian Government for its NINOX Phase IIB Unattended Ground Sensor Program with the first systems delivered in August of 2002. Terrain Commander offers next generation target detection using multi-spectral peripheral sensors coupled with autonomous day/night image capture and processing. Subsequent intelligence is sent back through satellite communications with unlimited range to a highly sophisticated central monitoring station. The system can "stakeout" remote locations clandestinely for 24 hours a day for months at a time. With its fully integrated SATCOM system, almost any site in the world can be monitored from virtually any other location in the world. Terrain Commander automatically detects and discriminates intruders by precisely cueing its advanced EO subsystem. The system provides target detection capabilities with minimal nuisance alarms combined with the positive visual identification that authorities demand before committing a response. Terrain Commander uses an advanced beamforming acoustic sensor and a distributed array of seismic, magnetic and passive infrared sensors to detect, capture images and accurately track vehicles and personnel. Terrain Commander has a number of emerging military and non-military applications including border control, physical security, homeland defense, force protection and intelligence gathering. This paper reviews the development, capabilities and mission applications of the Terrain Commander system.

  9. Establishment, test and evaluation of a prototype volcano surveillance system

    NASA Technical Reports Server (NTRS)

    Ward, P. L.; Eaton, J. P.; Endo, E.; Harlow, D.; Marquez, D.; Allen, R.

    1973-01-01

    A volcano-surveillance system utilizing 23 multilevel earthquake counters and 6 biaxial borehole tiltmeters is being installed and tested on 15 volcanoes in 4 States and 4 foreign countries. The purpose of this system is to give early warning when apparently dormant volcanoes are becoming active. The data are relayed through the ERTS-Data Collection System to Menlo Park for analysis. Installation was completed in 1972 on the volcanoes St. Augustine and Iliamna in Alaska, Kilauea in Hawaii, Baker, Rainier and St. Helens in Washington, Lassen in California, and at a site near Reykjavik, Iceland. Installation continues and should be completed in April 1973 on the volcanoes Santiaguito, Fuego, Agua and Pacaya in Guatemala, Izalco in El Salvador and San Cristobal, Telica and Cerro Negro in Nicaragua.

  10. A novel framework for intelligent surveillance system based on abnormal human activity detection in academic environments.

    PubMed

    Al-Nawashi, Malek; Al-Hazaimeh, Obaida M; Saraee, Mohamad

    2017-01-01

    Abnormal activity detection plays a crucial role in surveillance applications, and a surveillance system that can perform robustly in an academic environment has become an urgent need. In this paper, we propose a novel framework for an automatic real-time video-based surveillance system which can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment. To develop our system, we have divided the work into three phases: preprocessing phase, abnormal human activity detection phase, and content-based image retrieval phase. For motion object detection, we used the temporal-differencing algorithm and then located the motions region using the Gaussian function. Furthermore, the shape model based on OMEGA equation was used as a filter for the detected objects (i.e., human and non-human). For object activities analysis, we evaluated and analyzed the human activities of the detected objects. We classified the human activities into two groups: normal activities and abnormal activities based on the support vector machine. The machine then provides an automatic warning in case of abnormal human activities. It also embeds a method to retrieve the detected object from the database for object recognition and identification using content-based image retrieval. Finally, a software-based simulation using MATLAB was performed and the results of the conducted experiments showed an excellent surveillance system that can simultaneously perform the tracking, semantic scene learning, and abnormality detection in an academic environment with no human intervention.

  11. Research on the Wireless Sensor Networks Applied in the Battlefield Situation Awareness System

    NASA Astrophysics Data System (ADS)

    Hua, Guan; Li, Yan-Xiao; Yan, Xiao-Mei

    In the modern warfare information is the crucial key of winning. Battlefield situation awareness contributes to grasping and retaining the intelligence predominance. Due to its own special characteristics Wireless Sensor Networks (WSN) have been widely used to realize reconnaissance and surveillance in the joint operations and provide simultaneous, comprehensive, accurate data to multiechelon commanders and the combatant personnel for decision making and rapid response. Military sensors have drawn great attention in the ongoing projects which have satisfied the initial design or research purpose. As the interface of the "Internet of Things" which will have an eye on every corner of the battlespace WSNs play the necessary role in the incorporated situation awareness system. WSNs, radar, infrared ray or other means work together to acquire awareness intelligence for the deployed functional units to enhance the fighting effect.

  12. A Radar-Enabled Collaborative Sensor Network Integrating COTS Technology for Surveillance and Tracking

    PubMed Central

    Kozma, Robert; Wang, Lan; Iftekharuddin, Khan; McCracken, Ernest; Khan, Muhammad; Islam, Khandakar; Bhurtel, Sushil R.; Demirer, R. Murat

    2012-01-01

    The feasibility of using Commercial Off-The-Shelf (COTS) sensor nodes is studied in a distributed network, aiming at dynamic surveillance and tracking of ground targets. Data acquisition by low-cost (<$50 US) miniature low-power radar through a wireless mote is described. We demonstrate the detection, ranging and velocity estimation, classification and tracking capabilities of the mini-radar, and compare results to simulations and manual measurements. Furthermore, we supplement the radar output with other sensor modalities, such as acoustic and vibration sensors. This method provides innovative solutions for detecting, identifying, and tracking vehicles and dismounts over a wide area in noisy conditions. This study presents a step towards distributed intelligent decision support and demonstrates effectiveness of small cheap sensors, which can complement advanced technologies in certain real-life scenarios. PMID:22438713

  13. A practical approach for active camera coordination based on a fusion-driven multi-agent system

    NASA Astrophysics Data System (ADS)

    Bustamante, Alvaro Luis; Molina, José M.; Patricio, Miguel A.

    2014-04-01

    In this paper, we propose a multi-agent system architecture to manage spatially distributed active (or pan-tilt-zoom) cameras. Traditional video surveillance algorithms are of no use for active cameras, and we have to look at different approaches. Such multi-sensor surveillance systems have to be designed to solve two related problems: data fusion and coordinated sensor-task management. Generally, architectures proposed for the coordinated operation of multiple cameras are based on the centralisation of management decisions at the fusion centre. However, the existence of intelligent sensors capable of decision making brings with it the possibility of conceiving alternative decentralised architectures. This problem is approached by means of a MAS, integrating data fusion as an integral part of the architecture for distributed coordination purposes. This paper presents the MAS architecture and system agents.

  14. GEODSS Overview

    NASA Astrophysics Data System (ADS)

    Bruck, R.

    2014-09-01

    Ground-based Electro-Optical Deep Space Surveillance (GEODSS) is an optical telescope system that passively collects visible wavelength data for the Space Surveillance Network (SSN). The GEODSS generated data is used by the Joint Space Operations Center (JSpOC) located at, both Vandenberg AFB California and Colorado Springs, Colorado. GEODSS data is also used by National Air and Space Intelligence Center (NASIC) situated on Wright-Patterson Air Force Base outside of Dayton Ohio, There are three geographically dispersed GEODSS sites; Socorro, NM on White Sands Missile Range (WSMR), Diego Garcia, British Indian Ocean Territory, and Haleakala on the island of Maui, Hawaii. Each of the sites is equipped with three telescopes of identical design. GEODSS Telescopes are primarily used to observe individually tasked deep space artificial satellites in the period range of 225 minutes and beyond using Charge Coupling Device (CCD) technology.

  15. Studies in Intelligence. Volume 49, Number 3, 2005

    DTIC Science & Technology

    2005-01-01

    variety of other technologies. Working from a makeshift micro - film studio in a Greenwich Vil- lage apartment, they copied and turned over to Soviet...lectured Khrush- chev on the potential for micro - electronics—a word he had introduced into the Russian lan- guage—to transform industry. The new... micro - manage SIS affairs. He effected his liaison with Hoover through State’s Division of Foreign Activ- ity Correlation (FC).43 In addi- 41 In

  16. Islam in Tanzania and Kenya: Ally or Foe in the War on Terror?

    DTIC Science & Technology

    2009-01-01

    US foreign policy in the region. The recent US strategy of intelligence-sharing with Kenya, training and military support to both Kenya and Tanzania...assisted one another in establishing businesses , houses, schools, and so forth.43 Indeed, they were among the first Muslim groups to establish...be debated at that level , although under supervision from the central government. Also, local elections occurred for representatives, even if both

  17. Criminal Prohibitions on the Publication of Classified Defense Information

    DTIC Science & Technology

    2010-09-10

    crimes , and we are aware of no case in which a publisher of information obtained through unauthorized disclosure by a government employee has been...904. 19 18 U.S.C. § 794(d). Proceeds go to the Crime Victims Fund. 20 § 795. Photographing and sketching defense installations (a) Whenever, in the...not authorized access to classified information, with reason to believe that such activities would impair U.S. foreign intelligence efforts. This crime

  18. Listening with a foreign-accent: The interlanguage speech intelligibility benefit in Mandarin speakers of English

    PubMed Central

    Xie, Xin; Fowler, Carol A.

    2013-01-01

    This study examined the intelligibility of native and Mandarin-accented English speech for native English and native Mandarin listeners. In the latter group, it also examined the role of the language environment and English proficiency. Three groups of listeners were tested: native English listeners (NE), Mandarin-speaking Chinese listeners in the US (M-US) and Mandarin listeners in Beijing, China (M-BJ). As a group, M-US and M-BJ listeners were matched on English proficiency and age of acquisition. A nonword transcription task was used. Identification accuracy for word-final stops in the nonwords established two independent interlanguage intelligibility effects. An interlanguage speech intelligibility benefit for listeners (ISIB-L) was manifest by both groups of Mandarin listeners outperforming native English listeners in identification of Mandarin-accented speech. In the benefit for talkers (ISIB-T), only M-BJ listeners were more accurate identifying Mandarin-accented speech than native English speech. Thus, both Mandarin groups demonstrated an ISIB-L while only the M-BJ group overall demonstrated an ISIB-T. The English proficiency of listeners was found to modulate the magnitude of the ISIB-T in both groups. Regression analyses also suggested that the listener groups differ in their use of acoustic information to identify voicing in stop consonants. PMID:24293741

  19. The expert and the foreigner: Reflections of forensic transcultural psychopathology on a total of 86 reports by experts on criminal liability.

    PubMed

    Merzagora, Isabella; Amadasi, Alberto; Blandino, Alberto; Travaini, Guido

    In recent times Italy has been experiencing massive migration flows, therefore the attention on the issue of crimes committed by foreigners is increasing. But within trials, in the evaluation of criminal liability of foreigners, how do experts deal with them? Do the performed evaluations take cultural diversity into account? The present study took origin from these questions and examined a total of 86 reports by experts on criminal liability of foreign persons (16 females and 70 males). Examinees have been declared indictable in 31 cases (36%), totally mentally ill in 40 cases (45%) and with diminished liability in 15 cases (17%); when liability was excluded, examinees were diagnosed in 11 cases with mood disorders, in 23 cases with personality disorders, in 4 cases with adaptation disorders and post-traumatic stress disorder and in 10 cases with different diagnoses (in some cases more than one diagnosis was present). None of the reports used the section of the DSM concerning "cultural framing". Tests were used in 48 surveys (56% of cases), with more tests for each examinee, for a total of 39 Rorschach, 14 Raven test, 8 Minnesota Multiphasic Personality Inventory - MMPI - 4 Wechsler Adult Intelligence Scale - WAIS - level test, 8 Thematic Apperception test. When subjects were diagnosed with mental disorder and with diminished liability, 42 (79%) were also socially dangerous. Results highlight the importance of the relationship between the expert and the foreigner. Many factors ought to be critically considered by experts dealing with foreigners, like cultural awareness, knowledge of verbal communication, critical consideration of meanings and diagnosis, knowledge of the foreigners' personal story, presence of tests with inexact information and cultural fallacy. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. [Epidemiologic surveillance of dengue fever in the French army from 1996 to 1999].

    PubMed

    Meynard, J B; Ollivier-Gay, L; Deparis, X; Durand, J P; Michel, R; Pages, F; Matton, T; Boutin, J P; Tolou, H; Merouze, F; Baudon, D

    2001-01-01

    Dengue fever is a widespread disease that can occur outside tropical areas. Several thousand French military personnel are exposed to this infectious risk each year and exposure is expected to rise with the creation of a professional army and the increasing number of foreign missions. As a result, dengue fever has become a major priority for the Armed Services Health Corps (ASHC). A system of epidemiological surveillance based on the active participation of all military physicians has been designed by the ASHC to collect and analyze all data relevant to cases of dengue fever involving French military personnel stationed overseas or at home. The purpose of this study is to present data compiled for the period from 1996 to 1999. Analysis of these data demonstrated that the incidence of dengue fever peaked in 1997 due to epidemic outbreaks occurring in French Polynesia and Martinique. In response to these outbreaks control measures were adapted especially in regard to vector control. This study shows that the system of surveillance implemented by the ASHC is an effective but still perfectible tool.

  1. Battlefield Acoustic Sensing, Multimodal Sensing, and Networked Sensing for Intelligence, Surveillance, and Reconnaissance (ISR) Applications

    DTIC Science & Technology

    2015-09-01

    seen in Fig. 9, were placed at the rear of the vehicle to minimize the noise and vibration from the engine and its intake and exhaust from the...Specific/unique algorithm approaches attempted and results 4) Observations related to wind noise rejection and/or effects 5) Limitations of technology 6...After a certain time, the muzzle blast is detected, which results from the exit of the munition at the muzzle. Figure 6 shows an example of a single

  2. Unclassified Report on the President’s Surveillance Program

    DTIC Science & Technology

    2009-07-10

    for Intelligence Policy James Baker. Jay Bybee was OLC Assistant Attorney General from November 2001 through March 2003, and Yoo’s supervisor. Bybee ...Attorney General slots. Bybee said he was "enthusiastic" about Yoo and later agreed to Yoo’s request to be assigned to the "national security portfolio...34 because Y00 had more national security experience than any of the other OLC deputies. However, Bybee stated he was never read into the PSP and could

  3. Addressing Risk Assessment for Patient Safety in Hospitals through Information Extraction in Medical Reports

    NASA Astrophysics Data System (ADS)

    Proux, Denys; Segond, Frédérique; Gerbier, Solweig; Metzger, Marie Hélène

    Hospital Acquired Infections (HAI) is a real burden for doctors and risk surveillance experts. The impact on patients' health and related healthcare cost is very significant and a major concern even for rich countries. Furthermore required data to evaluate the threat is generally not available to experts and that prevents from fast reaction. However, recent advances in Computational Intelligence Techniques such as Information Extraction, Risk Patterns Detection in documents and Decision Support Systems allow now to address this problem.

  4. Defending an Area with Autonomy: Autonomous Intelligence, Surveillance, and Reconnaissance Capabilities Leveraging Unmanned Aerial Systems for Defending Forward Operating Locations

    DTIC Science & Technology

    2017-05-08

    electromagnetic ( EM ) spectrum, cyberspace, and air domain access and dependencies. Access to space-based assets is necessary to provide and share C2ISR...the EM spectrum for communications is necessary for many of the same reasons we need space capabilities, but this spectrum is under threat from...emerging electronic warfare technologies. Both LOS and BLOS radio frequency (RF) communications require access to the EM spectrum for sharing critical

  5. Human Factors in Intelligence, Surveillance, and Reconnaissance: Gaps for Soldiers and Technology Recommendations

    DTIC Science & Technology

    2014-07-01

    technology work seeks to address gaps in the management, processing, and fusion of heterogeneous (i.e., soft and hard ) information to aid human decision...and bandwidth) to exploit the vast and growing amounts of data [16], [17]. There is also a broad research program on techniques for soft and hard ...Mott, G. de Mel, and T. Pham, “Integrating hard and soft information sources for D2D using controlled natural language,” in Proc. Information Fusion

  6. The Peoples Liberation Army and Contingency Planning in China

    DTIC Science & Technology

    2015-01-01

    House [军事科学出版社], 1998), 93–94. 59 Liu Jian [刘建], “ Wireless Technologies: Military Applications of Wireless Sensor Networks” [无线技术:无线传感器网络在军事的应用...Weinan (Shaanxi Province), prob- ably fuses space tracking data from sensors managed by the GSD Technical Reconnaissance Department, PLA Air Force (PLAAF...would probably integrate sensor information from strategic- and operational-level intelligence, surveillance, and reconnaissance assets. A firepower

  7. Major Range and Test Facility Base Summary of Capabilities.

    DTIC Science & Technology

    1983-06-01

    TEST CHART NATIONAL BUREAU OF STANDARDS 1963 A 3,i 4, S °.I i L -. ~ . % o,. ° . - ° . - . .I ¢ PHOTOGRAPH THIS SHEET LEVEL INVENTORY DOCUMENT...NUMBER DOD 3200.11-D 4. TTLE(~dS..tt~t@) S TYPE Of REPORT a PERIO’ COVERED Major Range and Test Facility Base Summary Reference Maerial of Capabilities...Electronic Warfare, Command, Control Communications and Intelligence (C31) Surveillance, Jammers, Radar, Test Facility ZG5 ABETW ACT f~ a "Afie Afr- s 444 eF~f

  8. Work Domain Analysis of Australia’s Air Power System: Purpose-related Functions of Combat; Transport; and Intelligence, Surveillance, and Reconnaissance Subsystems

    DTIC Science & Technology

    2015-03-01

    of nature (e.g., flooding, drought, cyclone, earthquake, volcanic eruption , disease epidemic) or an act of man (e.g., riots, civil unrest, war...e.g., volcanic eruption ). To militate against these potential dangers, assets contributing to People Rescue (e.g., fixed-wing aircraft, rotary-wing...operating altitude of an aircraft to avoid strong winds or volcanic ash). UNCLASSIFIED DSTO-TR-3085 UNCLASSIFIED 69  “…rescue helicopters and

  9. Children of Aphrodite: The Proliferation and Threat of Unmanned Aerial Vehicles in the Twenty-First Century

    DTIC Science & Technology

    2011-05-19

    65Peter La Franchi . “East Asia remains focus of UAV spy activity as US Defence watchdog releases suspected espionage report.” Flight Global ...drone fired one of the first UAV launched missiles in America’s “ Global War on Terror,” when it engaged and destroyed a vehicle carrying the...from the tactical small UAV, to theater and global strike and intelligence, surveillance, and reconnaissance assets organic to primarily the U.S

  10. Just Do It: Close the Collection Gap

    DTIC Science & Technology

    1989-11-27

    Just Do It: Close The Collection Gap A Monograph by (V) Major James A. Marks Military Intelligence NDTIC 9ELECTE 0%1 8AU 211990 u School of Advanced...UNIT ELEMENT NO. NO. NO. ACCESSION NI 11. TITLE (Include Security Classification) Just Do It: Close The Collection Gap (U) 1,. PERSONAL AUTHOR(S) RAJ...cont. ’long-range surveillance (LRS) teams as a possible means to close the collection gap . It uses the Soviet experience with LRS type units as a

  11. Nontraditional Intelligence, Surveillance, and Reconnaissance: Making the Most of Airborne Assets

    DTIC Science & Technology

    2015-10-01

    Constrained Budgets,” White paper, 4. 36. Ibid., 3 . 37. Ibid., 4. 38. This pod would not include integration on “stealth” aircraft for obvious reasons. 39...sortie flow showing planned XCAS/convoy escort sorties 6 3 VDL-equipped Sniper XR/ATP 7 4 PED management team organization 9 vii Foreword It...platforms and capabilities. 3 In general, the military has a poor historical record when it comes to predicting who the adversary will be, what it

  12. The Effects of the Joint Multi-Mission Electro-Optical System on Littoral Maritime Intelligence, Surveillance, and Reconnaissance Operations

    DTIC Science & Technology

    2009-09-01

    though other variants can also deploy and operate from an aircraft carrier as well. While the SH-60B is equipped with a towed Magnetic Anomaly...for the scope of this thesis, the JMMES system utilized was not equipped with a MAD sensor and the operator workstation was onboard the aircraft ...investigates how a JMMES equipped SH-60 variant aircraft affects U.S. ISR capabilities in the littoral regions, specifically in the areas of Anti

  13. Intelligence, Surveillance, And Reconnaissance Processing, Exploitation, And Dissemination System In Support Of Global Strike In 2035

    DTIC Science & Technology

    2012-02-15

    ways is the human brain. If the US could design its Processing, Exploitation, and Dissemination (PED) architecture to function similarly to the human...is that a lot of training is required before it starts to “think” in a useful fashion. What the PED system needs is a way to jump start this...Cross-network connectivity Once the PED is using identical standards and operating on two networks at different classification levels, install a

  14. Scientific Openness and National Security at the National Laboratories

    NASA Astrophysics Data System (ADS)

    McTague, John

    2000-04-01

    The possible loss to the People's Republic of China of important U.S. nuclear-weapons-related information has aroused concern about interactions of scientists employed by the national laboratories with foreign nationals. As a result, the National Academies assembled a committee to examine the roles of the national laboratories, the contribution of foreign interactions to the fulfillment of those roles, the risks and benefits of scientific openness in this context, and the merits and liabilities of the specific policies being implemented or proposed with respect to contacts with foreign nationals. The committee concluded that there are many aspects of the work at the laboratories that benefit from or even demand the opportunity for foreign interactions. The committee recommended five principles for guiding policy: (1) Maintain balance. Policy governing international dialogue by laboratory staff should seek to encourage international engagement in some areas, while tightly controlling it in others. (2) Educate staff. Security procedures should be clear, easy to follow, and serve an understandable purpose. (3) Streamline procedures. Good science is compatible with good security if there is intelligent line management both at the labs and in Washington, which applies effective tools for security in a sensible fashion. (4) Focus efforts. DOE should focus its efforts governing tightened security for information. The greatest attention should obviously be provided to the protection of classified information by appropriate physical and cybersecurity measures, and by personnel procedures and training. (5) Beware of prejudice against foreigners. Over the past half-century foreign-born individuals have contributed broadly and profoundly to national security through their work at the national laboratories.

  15. A critical review of the state of foreign space technology

    NASA Technical Reports Server (NTRS)

    Grey, J.; Gerard, M.

    1978-01-01

    A conference was held to exchange technical information in the area of space technology. Soviet system capability and technology both in Intersputnik and in the domestic Ekran system was discussed in detail. The thermonic power conversion system used in the Soviet Topaz nuclear power reactor was described in detail. Other areas of examination included: (1) Bioastronautics; (2) Space based industry; (3) Propulsion; (4) Astrodynamics; (5) Contact with extraterrestrial intelligence; and (6) Space rescue and safety.

  16. Foodborne Disease and the Need for Greater Foodborne Disease Surveillance in the Caribbean

    PubMed Central

    Lee, Brendan

    2017-01-01

    The Caribbean is a net importer of food, and with billions of dollars’ worth of food products being imported each year, territorial governments are now seeking to encourage local production of foods in an attempt to stem the loss of foreign exchange from these economies with little resilience. The Caribbean, however, lacks the comprehensive food safety system that should be a corollary to successful food production. Regional authorities underestimate the burden of foodborne diseases especially on its workforce and major economic base, the tourism industry. Anecdotally after every mass event in the region, many officially unreported cases of gastroenteritis are recognized. This short communication makes the argument of the importance of food borne illnesses specific to the Caribbean, and improvements that could be made to surveillance to reduce negative outcomes associated with the food supply chain.

  17. Eyes of Things

    PubMed Central

    Deniz, Oscar; Vallez, Noelia; Espinosa-Aranda, Jose L.; Rico-Saavedra, Jose M.; Parra-Patino, Javier; Bueno, Gloria; Moloney, David; Dehghani, Alireza; Dunne, Aubrey; Pagani, Alain; Krauss, Stephan; Reiser, Ruben; Waeny, Martin; Sorci, Matteo; Llewellynn, Tim; Fedorczak, Christian; Larmoire, Thierry; Herbst, Marco; Seirafi, Andre; Seirafi, Kasra

    2017-01-01

    Embedded systems control and monitor a great deal of our reality. While some “classic” features are intrinsically necessary, such as low power consumption, rugged operating ranges, fast response and low cost, these systems have evolved in the last few years to emphasize connectivity functions, thus contributing to the Internet of Things paradigm. A myriad of sensing/computing devices are being attached to everyday objects, each able to send and receive data and to act as a unique node in the Internet. Apart from the obvious necessity to process at least some data at the edge (to increase security and reduce power consumption and latency), a major breakthrough will arguably come when such devices are endowed with some level of autonomous “intelligence”. Intelligent computing aims to solve problems for which no efficient exact algorithm can exist or for which we cannot conceive an exact algorithm. Central to such intelligence is Computer Vision (CV), i.e., extracting meaning from images and video. While not everything needs CV, visual information is the richest source of information about the real world: people, places and things. The possibilities of embedded CV are endless if we consider new applications and technologies, such as deep learning, drones, home robotics, intelligent surveillance, intelligent toys, wearable cameras, etc. This paper describes the Eyes of Things (EoT) platform, a versatile computer vision platform tackling those challenges and opportunities. PMID:28531141

  18. Compact SAR and Small Satellite Solutions for Earth Observation

    NASA Astrophysics Data System (ADS)

    LaRosa, M.; L'Abbate, M.

    2016-12-01

    Requirements for near and short term mission applications (Observation and Reconnaissance, SIGINT, Early Warning, Meteorology,..) are increasingly calling for spacecraft operational responsiveness, flexible configuration, lower cost satellite constellations and flying formations, to improve both the temporal performance of observation systems (revisit, response time) and the remote sensing techniques (distributed sensors, arrays, cooperative sensors). In answer to these users' needs, leading actors in Space Systems for EO are involved in development of Small and Microsatellites solutions. Thales Alenia Space (TAS) has started the "COMPACT-SAR" project to develop a SAR satellite characterized by low cost and reduced mass while providing, at the same time, high image quality in terms of resolution, swath size, and radiometric performance. Compact SAR will embark a X-band SAR based on a deployable reflector antenna fed by an active phased array feed. This concept allows high performance, providing capability of electronic beam steering both in azimuth and elevation planes, improving operational performance over a purely mechanically steered SAR system. Instrument provides both STRIPMAP and SPOTLIGHT modes, and thanks to very high gain antenna, can also provide a real maritime surveillance mode based on a patented Low PRF radar mode. Further developments are in progress considering missions based on Microsatellites technology, which can provide effective solutions for different user needs, such as Operational responsiveness, low cost constellations, distributed observation concept, flying formations, and can be conceived for applications in the field of Observation, Atmosphere sensing, Intelligence, Surveillance, Reconnaissance (ISR), Signal Intelligence. To satisfy these requirements, flexibility of small platforms is a key driver and especially new miniaturization technologies able to optimize the performance. An overview new micros-satellite (based on NIMBUS platform) and mission concepts is provided, such as passive SAR for multi-static imaging and tandem, Medium swath/medium resolution dual pol MICROSAR for in L-C-X band multi-application for maritime surveillance and land monitoring, applications for Space Debris monitoring, precision farming, Atmosphere sensing.

  19. Inhaled foreign bodies in children: a global perspective on their epidemiological, clinical, and preventive aspects.

    PubMed

    Foltran, Francesca; Ballali, Simonetta; Rodriguez, Hugo; Sebastian van As, Arjan B; Passali, Desiderio; Gulati, Achal; Gregori, Dario

    2013-04-01

    While several articles describe clinical management of foreign bodies injuries in the upper air tract, little epidemiological evidence is available from injury databases. This article aims to understand the burden of airway FB injuries in high-, low-, and middle-income countries as emerging from scientific literature. One thousand six hundred ninety-nine published articles 1978-2008. A free text search on PubMed database ((foreign bodies) or (foreign body)) and ((aspiration) or (airways) or (tracheobronchial) or (nasal) or (inhalation) or (obstruction) or (choking) or (inhaled) or (aspirations) or (nose) or (throat) or (asphyxiation)) and ((children) or (child)). Information on reported injuries according to country, time period, children sex and age, FB type, site of obstruction, symptoms, signs, diagnostic and therapeutic procedures, delay at the diagnosis, complications, number of deaths. Serious complications occur both in high-income and low-middle income countries in a considerable proportion of cases (10% and 20%, respectively). Similarly, death is not infrequent (5-7% of cases). Few countries have good systematic data collection and there's a lack of sensibility in parents and clinicians in terms of acknowledge of the choking risk. On the contrary, international surveillance systems able to collect information in a standardized way need to be implemented. Copyright © 2012 Wiley Periodicals, Inc.

  20. Introduction of Mobile Health Tools to Support Ebola Surveillance and Contact Tracing in Guinea.

    PubMed

    Sacks, Jilian A; Zehe, Elizabeth; Redick, Cindil; Bah, Alhoussaine; Cowger, Kai; Camara, Mamady; Diallo, Aboubacar; Gigo, Abdel Nasser Iro; Dhillon, Ranu S; Liu, Anne

    2015-11-12

    Challenges in data availability and quality have contributed to the longest and deadliest Ebola epidemic in history that began in December 2013. Accurate surveillance data, in particular, has been difficult to access, as it is often collected in remote communities. We describe the design, implementation, and challenges of implementing a smartphone-based contact tracing system that is linked to analytics and data visualization software as part of the Ebola response in Guinea. The system, built on the mobile application CommCare and business intelligence software Tableau, allows for real-time identification of contacts who have not been visited and strong accountability of contact tracers through timestamps and collection of GPS points with their surveillance data. Deployment of this system began in November 2014 in Conakry, Guinea, and was expanded to a total of 5 prefectures by April 2015. To date, the mobile system has not replaced the paper-based system in the 5 prefectures where the program is active. However, as of April 30, 2015, 210 contact tracers in the 5 prefectures were actively using the mobile system to collectively monitor 9,162 contacts. With proper training, some investment in technical hardware, and adequate managerial oversight, there is opportunity to improve access to surveillance data from difficult-to-reach communities in order to inform epidemic control strategies while strengthening health systems to reduce risk of future disease outbreaks. © Liu et al.

Top