Search
Now showing items 11-20 of 118
Simulating CSF flow dynamics in the normal and chiari I subarachnoid space during rest and exertion
(2013)
BACKGROUND AND PURPOSE: CSF fluid dynamics in healthy subjects and patients with Chiari I have been characterized during rest with phase-contrast MR imaging and CFD. CSF flow velocities and pressures in the nonresting state ...
'Bomb-making for beginners': Inside an al-Qaida e-learning course
(2013)
This study explores how terrorists utilize the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. Rather, it discusses the efforts being made ...
Extraction and classification of vehicles in LADAR imagery
(2013)
The work presented in this paper is based on a dataset recorded with an airborne sensor. It comprises targets like M-60, M-47, M-113, bridge layers, tank retrievers, and trucks in various types of scenes. The background-object ...
Intracavity trace molecular detection with a broadband mid-IR frequency comb source
(2013)
Ultrasensitive detection of methane, isotopic carbon dioxide, carbon monoxide, formaldehyde, acetylene, and ethylene is performed in the spectral range 2.5–5 μm using intracavity spectroscopy in broadband optical parametric ...
Genetic characterization of trh positive Vibrio spp. isolated from Norway
(2013)
The thermostable direct hemolysin (TDH) and/or TDH-related hemolysin (TRH) genes are carried by most virulent Vibrio parahaemolyticus serovars. In Norway, trh+ V. parahaemolyticus constitute 4.4 and 4.5% of the total number ...
The Recruiter’s Dilemma: Signaling and Terrorist Recruitment Tactics
(2013)
How do terrorists recruit? We know much about the profiles and pathways of recruits, but little about the strategies and tactics of recruiters. Such procedures matter because they help determine who joins. I highlight a ...
Should I Stay or Should I Go? Explaining Variation in Western Jihadists' Choice between Domestic and Foreign Fighting
(2013)
This article studies variation in conflict theater choice by Western jihadists in an effort to understand their motivations. Some militants attack at home, whereas others join insurgencies abroad, but few scholars have ...
The Integration of Trusted Platform Modules into a Tactical Identity Management System
(2013)
The use of integrity protection mechanisms from a tactical Identity Management (IdM) system is the focus of this paper. While traditional identity management systems supports authentication, and some also access control, ...
Energy Partition in Magnetic Reconnection in Earth's Magnetotail
(2013)
The partition of energy flux in magnetic reconnection is examined experimentally using Cluster satellite observations of collisionless reconnection in Earth’s magnetotail. In this plasma regime, the dominant component of ...
Optimization Model for Robust Acquisition Decisions in the Norwegian Armed Forces
(2013)
The Norwegian Defence Research Establishment (FFI) supports the Norwegian Ministry of Defence with quantitative analyses for its long-term defence planning. As part of this activity, FFI has developed a stochastic model ...