期刊文献+
共找到71篇文章
< 1 2 4 >
每页显示 20 50 100
Resolution of night terrors after discontinuation of cetirizine
1
作者 Lourdes DelRosso Romy Hoque 《Case Reports in Clinical Medicine》 2012年第1期1-2,共2页
We present a 4-year-old girl with allergies and asthma who developed night terrors after initia- tion of montelukast at 2 years of age. Montelu-kast was discontinued and cetirizine was started. Nigh terrors persisted.... We present a 4-year-old girl with allergies and asthma who developed night terrors after initia- tion of montelukast at 2 years of age. Montelu-kast was discontinued and cetirizine was started. Nigh terrors persisted. Sleep diaries were col- lected and diagnosticpolysomnogram (PSG) was ordered. Sleep diaries revealed an average sleep time of 10 hours with night terrors occur- ring three nights a week approximately two hours after sleep onset. The PSG did not show evidence of sleep disordered breathing or peri- odic leg movements. Cetirizine was discontin- ued and the night terrors ceased. Upon re-intro- duction of the medication, the sleep terrors re- curred. 展开更多
关键词 NIGHT terrors MONTELUKAST CETIRIZINE ALLERGIC RHINITIS
下载PDF
Terrorism Attack Classification Using Machine Learning: The Effectiveness of Using Textual Features Extracted from GTD Dataset
2
作者 Mohammed Abdalsalam Chunlin Li +1 位作者 Abdelghani Dahou Natalia Kryvinska 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1427-1467,共41页
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli... One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier. 展开更多
关键词 Artificial intelligence machine learning natural language processing data analytic DistilBERT feature extraction terrorism classification GTD dataset
下载PDF
Management of Maxillofacial Gunshot Trauma in the Stomatology and Maxillofacial Surgery Departments of Ouagadougou
3
作者 Mathieu Millogo Motandi Idani +3 位作者 Arsène Coulibaly Michel Fabien Dargani Mahamadi Sanfo Tarcissus Konsem 《Open Journal of Stomatology》 2023年第10期342-352,共11页
Introduction: Maxillofacial ballistic trauma is a serious injury that is difficult to manage, with significant complications and after-effects. The authors report their experience in managing this type of trauma in th... Introduction: Maxillofacial ballistic trauma is a serious injury that is difficult to manage, with significant complications and after-effects. The authors report their experience in managing this type of trauma in the context of insecurity linked to terrorism. Patients and Methods: This was a descriptive cross-sectional study with retrospective data collection covering the period from January 1, 2018 to December 31, 2022 in the stomatology and maxillofacial surgery departments of the university hospitals of Ouagadougou. Results: In 5 years, 52 patients were collected, i.e. 10.4 cases per year. The mean age of the patients was 31.46 ± 15.41 years, and the sex ratio was 3. In 67.31% of patients, these injuries were the result of shootings during terrorist attacks. The jugal (36.54%) and chin (32.69%) regions were the most affected. The mandible (36.54%) and zygomatic bones (28.85%) were the most injured bones in these traumas. All patients underwent surgical treatment, and 25% suffered secondary complications. All patients retained at least one sequela. Conclusion: Maxillofacial injuries caused by ballistic trauma are true emergencies that can be life-threatening and functionally disabling. Their management is delicate and the outcome is uncertain, hence, the prevention is important. 展开更多
关键词 Gunshot Trauma MAXILLOFACIAL Facial Fracas TERRORISM
下载PDF
Cybersecurity and Domestic Terrorism: Purpose and Future
4
作者 Robb Shawe Ian R. McAndrew 《Journal of Software Engineering and Applications》 2023年第10期548-560,共13页
The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electroni... The increasing utilization of digital technologies presents risks to critical systems due to exploitation by terrorists. Cybersecurity entails proactive and reactive measures designed to protect software and electronic devices from any threats. However, the rising cases of cyber threats are carried out by domestic terrorists who share particular ideologies or grievances. This paper analyzes the increasing cyber-attack instances and mechanisms to counter these threats. Additionally, it addresses the growing concern of domestic terrorism and its impact on national security. Finally, it provides an overview of gaps and possible areas of future research to promote cybersecurity. 展开更多
关键词 Cyber-Attacks CYBERCRIME CYBERSECURITY Cyber Threats Domestic Terrorism
下载PDF
Epidemiology of civilian blast injuries inflicted by terrorist bombings from 1970-2016 被引量:7
5
作者 Danyal Magnus Mansoor A.Khan William G.Proud 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2018年第5期469-476,共8页
An upsurge of terrorist activity has occurred in the past two decades. As part of this, explosive devices continue to be extensively deployed against civilians in wide-ranging environments. Bombings remain the leading... An upsurge of terrorist activity has occurred in the past two decades. As part of this, explosive devices continue to be extensively deployed against civilians in wide-ranging environments. Bombings remain the leading worldwide cause of civilian fatalities due to terrorism. This demands an understanding of modern terrorist bombing trends to inform mitigation strategy. The objective of this study was to identify the occurrence and severity of bombings against civilian targets in diverse attack settings, and to establish corresponding blast injury profiles. Data was obtained from analysis of the Global Terrorism Database(GTD) and a meta-analysis of blast injury data derived from the PubMed database. Closed environment explosions were associated with significantly greater(p<0.05) mortality than in open spaces. The injury profiles were found to be influenced by attack setting, with higher rates of primary injury on trains and buses, and secondary injury in open space. 展开更多
关键词 TERRORISM BOMBINGS BLAST injury EPIDEMIOLOGY BLAST mitigation
下载PDF
Using the Haddon matrix to explore medical response strategies for terrorist subway bombings 被引量:7
6
作者 Tie-Cheng Yan Min Yu 《Military Medical Research》 SCIE CAS CSCD 2019年第4期320-327,共8页
Background:Since the 1970 s,terrorist bombings in subways have been frequently occurring worldwide.To cope with this threat and to provide medical response countermeasures,we analyzed the characteristics of subway bom... Background:Since the 1970 s,terrorist bombings in subways have been frequently occurring worldwide.To cope with this threat and to provide medical response countermeasures,we analyzed the characteristics of subway bombing terrorist attacks and used the Haddon matrix to explore medical response strategies.Methods:First,we analyzed 111 subway bombings from 1970 to 2017 recorded in the Global Terrorism Database to provide a reference for the strategy exploration.Then,we convened an expert panel to use the Haddon matrix to explore the medical response strategies to subway bombings.Results:In recent decades,at least one bombing attack occurs every 3 years.Summarized by the Haddon matrix,the influencing factors of medical responses to conventional subway bombings include the adequacy of first-aid kits and the medical evacuation equipment,the traffic conditions affecting the evacuation,the continuity and stability of communication,as well as the factors exclusively attributed to dirty bomb attacks in subways,such as ionizing radiation protection capabilities,the structure of the radiation sickness treatment network based on the subway lines,and the disposal of radioactive sewage.These factors form the basis of the strategy discussion.Conclusions:Since subway bombings are long-term threats,it is necessary to have proper medical response preparation.Based on the Haddon matrix,we explored the medical response strategies for terrorist subway bombings,especially dirty bomb attacks.Haddon matrix can help policymakers systematically find the most important factors,which makes the preparations of the response more efficient. 展开更多
关键词 Haddon MATRIX SUBWAY Terrorism Bomb attack MEDICAL RESPONSE
下载PDF
Soulless Bodies in Elie Wiesel's Night 被引量:1
7
作者 郑莹 《英语广场(学术研究)》 2014年第6期36-39,共4页
Night is Elie Wiesel's classic memoir of the Holocaust. One of its central themes is that once involved in war, a person is doomed to undergo a transformation from a human being to a soulless body. To understand t... Night is Elie Wiesel's classic memoir of the Holocaust. One of its central themes is that once involved in war, a person is doomed to undergo a transformation from a human being to a soulless body. To understand this theme, we shall have to travel with Eliezer, the protagonist as well as the fi rst person narrator, through the long nights of living in fear of hunger, terror, and violence. Hopefully, the leg of this journey would reveal how the consistent exposure to traumatic experiences can compel a person to abandon the soul as his or her emotional and spiritual homebase. 展开更多
关键词 NIGHT soulless body HUNGER TERROR VIOLENCE
下载PDF
Disaster preparedness, pediatric considerations in primary blast injury, chemical, and biological terrorism 被引量:14
8
作者 Mitchell Hamele William Bradley Poss Jill Sweney 《World Journal of Critical Care Medicine》 2014年第1期15-23,共9页
Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the Wor... Both domestic and foreign terror incidents are an unfortunate outgrowth of our modern times from the Oklahoma City bombings, Sarin gas attacks in Japan, the Madrid train bombing, anthrax spores in the mail, to the World Trade Center on September 11 th, 2001. The modalities used to perpetrate these terrorist acts range from conventional weapons to high explosives, chemical weapons, and biological weapons all of which have been used in the recent past. While these weapons platforms can cause significant injury requiring critical care the mechanism of injury, pathophysiology and treatment of these injuries are unfamiliar to many critical care providers. Additionally the pediatric population is particularly vulnerable to these types of attacks. In the event of a mass casualty incident both adult and pediatric critical care practitioners will likely be called upon to care for children and adults alike. We will review the presentation, pathophysiology, and treatment of victims of blast injury, chemical weapons, and biological weapons. The focus will be on those injuries not commonly encountered in critical care practice, primary blast injuries, category A pathogens likely to be used in terrorist incidents, and chemical weapons including nerve agents, vesicants, pulmonary agents, cyanide, and riot control agents with special attention paid to pediatric specific considerations. 展开更多
关键词 TERRORISM BIOTERRORISM CHEMICAL TERRORISM Blast injuries Mass CASUALTY incidents DISASTERS PEDIATRICS
下载PDF
Terrorist Networks, Network Energy and Node Removal: A New Measure of Centrality Based on Laplacian Energy 被引量:16
9
作者 Xingqin Qi Robert D. Duval +6 位作者 Kyle Christensen Edgar Fuller Arian Spahiu Qin Wu Yezhou Wu Wenliang Tang Cunquan Zhang 《Social Networking》 2013年第1期19-31,共13页
In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrali... In this work we propose a centrality measure for networks, which we refer to as Laplacian centrality, that provides a general framework for the centrality of a vertex based on the idea that the importance (or centrality) of a vertex is related to the ability of the network to respond to the deactivation or removal of that vertex from the network. In particular, the Laplacian centrality of a vertex is defined as the relative drop of Laplacian energy caused by the deactivation of this vertex. The Laplacian energy of network G with?n?vertices is defined as , where ?is the eigenvalue of the Laplacian matrix of G. Other dynamics based measures such as that of Masuda and Kori and PageRank compute the importance of a node by analyzing the way paths pass through a node while our measure captures this information as well as the way these paths are “redistributed” when the node is deleted. The validity and robustness of this new measure are illustrated on two different terrorist social network data sets and 84 networks in James Moody’s Add Health in school friendship nomination data, and is compared with other standard centrality measures. 展开更多
关键词 NETWORK CENTRALITY LAPLACIAN ENERGY 9/11 HIJACKING Bali BOMBING Terrorism
下载PDF
Smart Security Framework for Educational Institutions Using Internet of Things(IoT) 被引量:2
10
作者 Afzal Badshah Anwar Ghani +1 位作者 Muhammad Ahsan Qureshi Shahaboddin Shamshirband 《Computers, Materials & Continua》 SCIE EI 2019年第7期81-101,共21页
Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a ... Educational institutions are soft targets for the terrorist with massive and defenseless people.In the recent past,numbers of such attacks have been executed around the world.Conducting research,in order to provide a secure environment to the educational institutions is a challenging task.This effort is motivated by recent assaults,made at Army Public School Peshawar,following another attack at Charsada University,Khyber Pukhtun Khwa,Pakistan and also the Santa Fe High School Texas,USA massacre.This study uses the basic technologies of edge computing,cloud computing and IoT to design a smart emergency alarm system framework.IoT is engaged in developing this world smarter,can contribute significantly to design the Smart Security Framework(SSF)for educational institutions.In the emergency situation,all the command and control centres must be informed within seconds to halt or minimize the loss.In this article,the SSF is proposed.This framework works on three layers.The first layer is the sensors and smart devices layer.All these sensors and smart devices are connected to the Emergency Control Room(ECR),which is the second layer of the proposed framework.The second layer uses edge computing technologies to process massive data and information locally.The third layer uses cloud computing techniques to transmit and process data and information to different command and control centres.The proposed system was tested on Cisco Packet Tracer 7.The result shows that this approach can play an efficient role in security alert,not only in the educational institutions but also in other organizations too. 展开更多
关键词 Internet of things smart security framework massacres TERRORISM smart emergency alert
下载PDF
An evaluation of the role played by remote sensing technology following the World Trade Center attack 被引量:2
11
作者 Charles K.Huyck Beverley J.Adams David I.Kehrlein 《Earthquake Engineering and Engineering Vibration》 SCIE EI CSCD 2003年第1期159-168,共10页
Remote sensing technology has been widely recognized for contributing to emergency response efforts after the World Trade Center attack on September 11th, 2001. The need to coordinate activities in the midst of a dens... Remote sensing technology has been widely recognized for contributing to emergency response efforts after the World Trade Center attack on September 11th, 2001. The need to coordinate activities in the midst of a dense, yet relatively small area, made the combination of imagery and mapped data strategically useful. This paper reviews the role played by aerial photography, satellite imagery, and LIDAR data at Ground Zero. It examines how emergency managers utilized these datasets, and identifies significant problems that were encountered. It goes on to explore additional ways in which imagery could have been used, while presenting recommendations for more effective use in future disasters and Homeland Security applications. To plan adequately for future events, it was important to capture knowledge from individuals who responded to the World Trade Center attack. In recognition, interviews with key emergency management and geographic information system (GIS) personnel provide the basis of this paper. Successful techniques should not be forgotten, or serious problems dismissed. Although widely used after September 11th, it is important to recognize that with better planning, remote sensing and GIS could have played an even greater role. Together with a data acquisition timeline, an expanded discussion of these issues is available in the MCEER/NSF report “Emergency Response in the Wake of the World Trade Center Attack; The Remote Sensing Perspective” (Huyck and Adams, 2002) Keywords World Trade Center (WTC) - terrorism - emergency response - emergency management - ground zero - remote sensing - emergency operations - disasters - geographic information systems (GIS) - satellite imagery - synthetic aperture radar (SAR) - light detection and ranging imagery (LIDAR) 展开更多
关键词 World Trade Center (WTC) TERRORISM emergency response emergency management ground zero remote sensing emergency operations DISASTERS geographic information systems (GIS) satellite imagery synthetic aperture radar (SAR) light detection and ranging imagery (LIDAR)
下载PDF
U.S. Financial War on Terrorism vs. International Financial System 被引量:1
12
作者 Su Jingxiang Associate Research ProfessorDeputy Director at Division for World Economics Studies, China Institute of Contemporary International Relations. 《Contemporary International Relations》 2002年第4期21-32,共12页
After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also... After September 11 events, America has launched a worldwide financial war against terrorism with a series of farreaching measures. It is not only confined to combating international terrorist activities, but will also exert great 展开更多
关键词 FATF International Financial System Financial War on Terrorism vs U.S
下载PDF
Media Coverage of Terrorism and Mental Health Concerns among Youth: Testing Moderated Mediation by Spirituality and Resilience
13
作者 Mian Ahmad Hanan Arooj Arshad +1 位作者 Noshina Saleem Shamaila Asad 《International Journal of Mental Health Promotion》 2021年第4期565-575,共11页
Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this tr... Previous research on media coverage of terrorism and its associated psychological consequences was explored internationally particularly after 9/11 attacks in the US.Also,the constructive role of resilience in this traumatic era has also been explored internationally.However,some studies have been conducted on the effect of media coverage of national terrorism on people that have endured a nearby terrorist attack.Moreover,knowledge about how the media coverage of terrorism,as a secondary source of evidence,can have devastated effects on native’s mental health and how resilience work in this relationship is rather limited.For example,it is possible that different cultures have their own coping strategies(resilience&spirituality)to be adopted as they perceive and respond to terrorism coverage on media differently.Hence,this study examines the moderated role of spirituality as an adaptive mechanism along with resilience as a mediating factor in the relationship between media coverage of terrorists’incidents and mental health concerns such as perceived stress,generalized anxiety and perceived fear among Pakistani youth.Thefindings show significant results as expected,people having high level of spirituality effectively cope with the media coverage of terrorist incidents by facing the situation with more resilient personality and therefore experience less mental health concerns compared to those with low level of spirituality. 展开更多
关键词 Anxiety FEAR online terrorism exposure psychological concerns RESILIENCE stress terrorism coverage
下载PDF
Estimation of radiation-induced health hazards from a“dirty bomb”attack with radiocesium under different assault and rescue conditions
14
作者 Alexis Rump Stefan Eder +4 位作者 Cornelius Hermann Andreas Lamkowski Patrick Ostheim Michael Abend Matthias Port 《Military Medical Research》 SCIE CSCD 2022年第1期106-125,共20页
In the case of a terrorist attack by a“dirty bomb”,blast injuries,external irradiation and the incorporation of radioactivity are to be expected.Departing from information about the radiological attack scenario with... In the case of a terrorist attack by a“dirty bomb”,blast injuries,external irradiation and the incorporation of radioactivity are to be expected.Departing from information about the radiological attack scenario with cesium-137 in the U.S.National Scenario Planning Guide,we estimated the radiological doses absorbed.Similar calculations were performed for a smaller plume size and a detonation in a subway.For conditions as described in the U.S.scenario,the committed effective dose amounted to a maximum of 848 mSv,even for very unfavorable conditions.Red bone marrow equivalent doses are insufcient to induce acute radiation sickness(ARS).In the case of a smaller plume size,the ARS threshold may be exceeded in some cases.In a subway bombing,doses are much higher and the occurrence of ARS should be expected.The health hazards from a dirty bomb attack will depend on the location and the explosive device.The derived Haddon matrix indicates that preparing for such an event includes education of all the medical staff about radiation effects,the time lines of radiation damages and the treatment priorities.Further determinants of the outcome include rapid evacuation even from difficult locations,the availability of a specific triage tool to rapidly identify victims at risk for ARS,the availability of an antidote stockpile and dedicated hospital beds to treat seriously irradiated victims. 展开更多
关键词 Medical NRBC protection TERRORISM Radiological emergency Dirty bomb Combined injuries TRIAGE Acute radiation sickness Radionuclide incorporation
下载PDF
Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning
15
作者 Nasir Mahmood Muhammad Usman Ghani Khan 《Computers, Materials & Continua》 SCIE EI 2022年第3期4411-4428,共18页
This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,location... This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings.By linking‘dots’of police data comprising scattered information of people,groups,logistics,locations,communication,and spatiotemporal characters on different social media groups,the proposed architecture will spawn beneficial information.This useful information will,in turn,help the police both in predicting potential terrorist events and in investigating previous events.Furthermore,this architecture will aid in the identification of criminals and their associates and handlers.Terrorism is psychological warfare,which,in the broadest sense,can be defined as the utilisation of deliberate violence for economic,political or religious purposes.In this study,a supervised learning-based approach was adopted to develop the proposed architecture.The dataset was prepared from the suicide bomb blast data of Pakistan obtained from the South Asia Terrorism Portal(SATP).As the proposed architecture was simulated,the supervised learning-based classifiers na飗e Bayes and Hoeffding Tree reached 72.17%accuracy.One of the additional benefits this study offers is the ability to predict the target audience of potential suicide bomb blasts,which may be used to eliminate future threats or,at least,minimise the number of casualties and other property losses. 展开更多
关键词 EXTREMISM TERRORISM suicide bombing crime prediction pattern recognition machine learning supervised learning
下载PDF
Culturally sanctioned suicide:Euthanasia,seppuku,and terrorist martyrdom
16
作者 Joseph M Pierre 《World Journal of Psychiatry》 SCIE 2015年第1期4-14,共11页
Suicide is one of the greatest concerns in psychiatric practice, with considerable efforts devoted to prevention. The psychiatric view of suicide tends to equate it with depression or other forms of mental illness. Ho... Suicide is one of the greatest concerns in psychiatric practice, with considerable efforts devoted to prevention. The psychiatric view of suicide tends to equate it with depression or other forms of mental illness. However, some forms of suicide occur independently of mental illness and within a framework of cultural sanctioning such that they aren't regarded as suicide at all. Despitepersistent taboos against suicide, euthanasia and physician-assisted suicide in the context of terminal illness is increasingly accepted as a way to preserve autonomy and dignity in the West. Seppuku, the ancient samurai ritual of suicide by self-stabbing, was long considered an honorable act of self-resolve such that despite the removal of cultural sanctioning, the rate of suicide in Japan remains high with suicide masquerading as seppuku still carried out both there and abroad. Suicide as an act of murder and terrorism is a practice currently popular with Islamic militants who regard it as martyrdom in the context of war. The absence of mental illness and the presence of cultural sanctioning do not mean that suicide should not be prevented. Culturally sanctioned suicide must be understood in terms of the specific motivations that underlie the choice of death over life. Efforts to prevent culturally sanctioned suicide must focus on alternatives to achieve similar ends and must ultimately be implemented within cultures to remove the sanctioning of self-destructive acts. 展开更多
关键词 SUICIDE EUTHANASIA MARTYRDOM Physicianassisted SUICIDE Seppuku Hara-kiri TERRORISM Culture
下载PDF
Neogene faulting and volcanism in the Victoria Land Basin of the Ross Sea, Antarctica
17
作者 Mei Yue JinYao Gao +7 位作者 ChunFeng Li Chao Zhu XinZhi Fan Guochao Wu ZhongYan Shen Han Shi XiaoXian Cai YiDong Guo 《Earth and Planetary Physics》 EI CSCD 2022年第3期248-258,共11页
The Neogene Terror Rift in the Antarctic Victoria Land Basin(VLB)of the Ross Sea,Antarctica,is composed of the Discovery Graben and the Lee Arch.Many Neogene volcanoes are aligned in the north-south direction in the s... The Neogene Terror Rift in the Antarctic Victoria Land Basin(VLB)of the Ross Sea,Antarctica,is composed of the Discovery Graben and the Lee Arch.Many Neogene volcanoes are aligned in the north-south direction in the southern VLB,belonging to the McMurdo Volcanic Group.However,due to multiple glaciations and limited seismic data,the volcanic processes are still unclear in the northern VLB,especially in the Terror Rift.Multichannel seismic profiles were collected at the VLB from the 32nd Chinese National Antarctic Research Expedition(CHINARE).We utilized four seismic profiles from the CHINARE and additional historical profiles,along with gravity and magnetic anomalies,to analyze faults and stratigraphic characteristics in the northern Terror Rift and volcanism in the VLB.Negative flower structures found in the northern Terror Rift suggest that the Terror Rift was affected by dextral strike-slip faults extending from the northern Victoria Land(NVL).After the initial orthogonal tension,the rift transited into an oblique extension,forming a set of downward concaving normal faults and accommodation zones in the Terror Rift.On the Lee Arch,several imbricated normal faults formed and converged into a detachment fault.Under gravitational forces,the strata bent upward and formed a rollover anticline.Many deep faults and thin strata subjected to erosion facilitated volcanic activity.A brittle volcanic region in the VLB was affected by dextral strike-slip movements and east-west extension,resulting in two Neogene volcanic chains that connect three igneous provinces in the VLB:the Hallett,Melbourne,and Erebus Provinces.These two chains contain mud volcanoes with magnetic nuclei,volcanic intrusions,and late-stage volcanic eruptions.Volcanisms have brought about opposite polarities of magnetic anomalies in Antarctica,indicating the occurrence of multiple volcanic activities. 展开更多
关键词 Victoria Land Basin Terror Rift seismic stratigraphy gravity and magnetic modeling FAULTING Neogene volcanic intrusion
下载PDF
Performance Study of an FFH/BFSK Self-Normalizing Receiver with Multitone Jamming's Frequency Offsets
18
作者 Chao Wei Yu-Fan Cheng 《Journal of Electronic Science and Technology》 CAS 2010年第2期97-102,共6页
This study investigates how frequency offsets of multitone jamming affect the fast frequencyhopped binary frequency shift keying (FFH/BFSK) self-normalizing (SNZ) receiver under additive white Gaussian noise (AWG... This study investigates how frequency offsets of multitone jamming affect the fast frequencyhopped binary frequency shift keying (FFH/BFSK) self-normalizing (SNZ) receiver under additive white Gaussian noise (AWGN). The average bit-error-rate (BER) expressions of the FFH/BFSK SNZ receiver and the average BER expressions of an FFH/BFSK spread-spectrum (SS) communication system with frequency offsets of multitone jamming for the sake of understanding the simulation results better. Simulation results show that BER performance of the FFH/BFSK SNZ receiver with diversity under the worst case multitone jamming (MTJ) and AWGN suffers from multitone jamming's frequency offsets when the jamming power is moderate, which is validated by several simulations with different frequency offsets configured in multitone jamming. Therefore, an FFH/BFSK SNZ receiver under multitone jamming can be combated with the help of frequency offsets of multitone jamming. 展开更多
关键词 Index Terror. Combatting fast frequency hopping multitone jamming offsets of frequency self- normalizing receiver.
下载PDF
Trojan Terrorism as a Principate of Deception, Or in the Arms of the Terracotta Locust (Ethymological Wing Cases of Virtus): Part 1
19
作者 Menshikova Elena Rudolfovna 《International Relations and Diplomacy》 2019年第11期539-547,共9页
“Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of... “Trojan terrorism”leaped to the place and in time as an exhalation of bewilderment at the terrorist attacks in London last year,as a challenge to political manipulation,and jumped as the continuation of the topic of migration(the fundamental problem of modernity),as a creation of an internal conflict that multiplies the external conflict,in the theme of systemic instability―theoretical reasonableness of deception,which destroys the system of contracts as a condition of the world order,leaped as a report at the University of London(Birkbeck)on Feb.9,2018,which the relevance of its problems beat real events in because the state of modern“utopianism”―the state of Utopus(USA),intended from the matrix of the British Empire,its tactics of violence―“occupy”(seizure of the“alien”)―has never changed.As in the case of Marks’s“capital”,the theory first followed,and then the practice of sabotage:a system of terrorist attacks,riots,revolutions,world and civil wars,and“Trojan terrorism”:bold attacks by international terrorists,sweeping away the principles and norms of any social treaty(Rousseau did not even dream of this sadness),the norms of law,ethics and morality,economic agreements(interstate agreements),including military demonstration of force,provocation of military conflicts,pirate antics,demarches of intimidation and blackmail,reviving the myth of the Trojan Horse and giving it the status of an“established order”:The norms that are accepted by the majority as“natural law”,as the natural course of things,contrary to common sense and universal human canons of being,legitimize treachery and deceit as the only one of possible and all probable ways of further development of human society―such are the“difficulties to the stars”:Without star wars,but by“occupy”,which allows us to conclude that“Trojan terrorism”is the sum of technologies aimed at seizure the land(habitable)by fraud,panic,and violence. 展开更多
关键词 terra TERROR TROJAN TERRORISM TIMOR PIRACY technology of lies Myth
下载PDF
On Uzbekistan's Experience Countering Religious Extremism and Terrorism
20
作者 Mirgiyos Azimov 《Contemporary International Relations》 2017年第5期150-154,共5页
Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of ... Since the first years of independence,Uzbekistan began to develop and implement a policy of countering religious extremism and addressing the ideological basis of terrorism.Taking into consideration the complexity of this problem,Uzbekistan is comprehensively combating expressions of extremism and terrorism. 展开更多
关键词 Uzbekistan experience religious extremism TERRORISM
下载PDF
上一页 1 2 4 下一页 到第
使用帮助 返回顶部