WorldWideScience

Sample records for iraqi security forces

  1. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  2. The Iraqi Security Forces: The Challenge of Sectarian and Ethnic Influences

    National Research Council Canada - National Science Library

    Sharp, Jeremy M

    2007-01-01

    .... According to the December 2006 Iraq Study Group Report, Significant questions remain about the ethnic composition and loyalties of some Iraqi units specifically, whether they will carry out missions...

  3. Iraqi Navy: Capability Requirements and Force Structure Recommendations for 2015 and Beyond

    National Research Council Canada - National Science Library

    Lawlor, Alison C; Thompson, Eric V

    2008-01-01

    .... The goal of this study is two-fold: to provide Iraqi and Coalition personnel with a common assessment of capability requirements and force structure recommendations for the Iraqi Navy, and to provide the Iraqi Navy leadership...

  4. Development and Reform of the Iraqi Police Forces

    National Research Council Canada - National Science Library

    Pfaff, Tony

    2008-01-01

    This paper will seek to show how social, political, cultural, and environmental factors have combined to impede Iraqi police development in ways that are predictable, understandable, and, with external help, resolvable...

  5. Development and Reform of the Iraqi Police Forces

    National Research Council Canada - National Science Library

    Pfaff, Tony

    2008-01-01

    .... The corruption and abuse found in the Iraqi police services cannot simply be explained by poor leadership, the actions of a few corrupt individuals, or even the competing agendas of the various...

  6. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  7. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  8. Food security and humanitarian assistance among displaced Iraqi populations in Jordan and Syria.

    Science.gov (United States)

    Doocy, Shannon; Sirois, Adam; Anderson, Jamie; Tileva, Margarita; Biermann, Elizabeth; Storey, J Douglas; Burnham, Gilbert

    2011-01-01

    The Iraq conflict resulted in the largest displacement in the Middle East in recent history, and provision of health services to the displaced population presents a critical challenge. With an increase in the number of people affected by complex emergencies and the number of people displaced in urban settings, the international community must adapt intervention strategies to meet the specific demands and contexts of this population. The study aimed to provide information on food security and livelihoods for Iraqi refugees in Syria and Jordan to inform humanitarian assistance planning. National cross-sectional cluster sample surveys of displaced Iraqi populations displaced were conducted in Jordan (October 2008) and Syria (March 2009). Clusters of ten households were randomly selected using probability-based sampling; a total of 1200 and 813 Iraqi households in Jordan and Syria, respectively, were interviewed about food security and receipt of humanitarian assistance. In Syria, 60% of households reported the household food situation had declined since the arrival period as compared to 46% in Jordan. Food aid receipt was reported by 18.0% of households in Jordan and 90.3% of households in Syria. In Jordan, 10.2% of households received cash assistance and in Syria 25.3% of households received cash assistance. In Jordan, cash assistance was associated with low socioeconomic status, large household size, and UNHCR registration. In Syria, female headed households, Damascus residents, families with children, and those registered with UNHCR were more likely to receive cash assistance. Food insecurity remains a concern among displaced Iraqi households in both Jordan and Syria. Improved targeting of both food and cash assistance and the expansion of cash-based programs could lead to a more effective use of funds and facilitate the implementation of assistance programs that are sustainable in the context of declining funding availability. Copyright © 2010 Elsevier Ltd. All

  9. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  10. Developing Iraq's Security Sector: The Coalition Provisional Authority's Experience

    National Research Council Canada - National Science Library

    Rathmell, Andrew; Oliker, Olga; Kelly, Terrence K; Brannan, David; Crane, Keith

    2005-01-01

    .... The environment was not benign -- it was deteriorating. Iraqi security forces had largely disintegrated, and those that remained were incapable of responding to rising criminality and political violence...

  11. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  12. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  13. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  14. Oil for What?—Illicit Iraqi Oil Contracts and the U.N. Security Council

    OpenAIRE

    Paul Heaton

    2005-01-01

    The Oil-For-Food program was established by United Nations Security Council Resolution 986 in 1995 as a means of providing humanitarian relief to Iraq, which had been under U.N. economic sanctions since the Persian Gulf War in 1991. After the invasion of Iraq, considerable evidence emerged suggesting that Saddam Hussein was able to subvert the Oil-For-Food program to obtain hard currency as well as items on the United Nation's prohibited transfer list. In this paper, I use recently available ...

  15. Sustainment of Army Forces in Operation Iraqi Freedom. Battlefield Logistics and Effects on Operations

    National Research Council Canada - National Science Library

    Peltz, Eric; Halliday, John M; Robbins, Marc L; Girardini, Kenneth J

    2005-01-01

    ..., with an emphasis on the period from the start of ground combat to the fall of Baghdad. The findings should be of interest throughout the Army as well as the broader Department of Defense supply chain, deployment planning, and force development communities...

  16. Deployed Flight Test of the Iraqi Air Force Comp Air 7SLX (CA-7)

    Science.gov (United States)

    2014-02-28

    been built with a castering nose wheel mounted to the engine mount, a simple yet effective design. The team purchased new engine mounts and castering ...nose wheels from Aero Comp Inc. to solve these problems on all the CA-7s they refurbished, which Fred Webster called “a pretty big modification .”22...from a Cessna 310. The UAE had made numerous other modifications .2 The United States Central Command Air Forces (CENTAF) was working with the

  17. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  18. Occupation Iraqi Freedom: The Importance of Planning

    National Research Council Canada - National Science Library

    Caston, Christine J

    2007-01-01

    ... addressed by the Combatant and Joint Force Commanders. The lack of an occupation plan had a major impact on how the Combatant Commander carried out Phases IV and V of Operation Iraqi Freedom and provides relevant lessons for future operations.

  19. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  20. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  1. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  2. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  3. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  4. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  5. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  6. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  7. Iraqi Perspectives Project. A View of Operation Iraqi Freedom from Saddam’s Senior Leadership

    Science.gov (United States)

    2006-01-01

    Pokemon ” really represented a subterfuge by international Zionism to undermine Iraq’s security. Supposedly, “ Pokemon ” meant “I am Jewish” in Hebrew. They...found the fact that the Pokemon character was “widely beloved by Iraqi youth” particularly alarming.22 Once secure in power Saddam Hussein saw...Report on a Cartoon Character Called ‘ Pokemon ’ from Direc- torate of General Security.” This Directorate of General Security report states that the name of

  8. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  9. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  10. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  11. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  12. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  13. Child maltreatment among U.S. Air Force parents deployed in support of Operation Iraqi Freedom/Operation Enduring Freedom.

    Science.gov (United States)

    Rabenhorst, Mandy M; McCarthy, Randy J; Thomsen, Cynthia J; Milner, Joel S; Travis, Wendy J; Colasanti, Marie P

    2015-02-01

    This study examined child maltreatment perpetration among 99,697 active-duty U.S. Air Force parents who completed a combat deployment. Using the deploying parent as the unit of analysis, we analyzed whether child maltreatment rates increased postdeployement relative to predeployment. These analyses extend previous research that used aggregate data and extend our previous work that used data from the same period but used the victim as the unit of analysis and included only deploying parents who engaged in child maltreatment. In this study, 2% (n = 1,746) of deploying parents perpetrated child maltreatment during the study period. Although no overall differences were found in child maltreatment rates postdeployment compared to predeployment, several maltreatment-related characteristics qualified this finding. Rates for emotional abuse and mild maltreatment were lower following deployment, whereas child maltreatment rates for severe maltreatment were higher following deployment. The finding that rates of severe child maltreatment, including incidents involving alcohol use, were higher postdeployment suggests a need for additional support services for parents following their return from combat deployment, with a focus on returning parents who have an alcohol use problem. © The Author(s) 2014.

  14. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  15. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  16. Causes of improvement in the security environment of Iraq, 2006-2009

    OpenAIRE

    Wheeler, Seth A.

    2009-01-01

    Approved for public release, distribution unlimited Popular consensus exists that the 2007 surge of U.S. forces in Iraq led to an improved security environment. The surge was designed to reduce violence and improve security by protecting the Iraqi population - a change in strategy. According to the consensus, the security environment improved due to the surge, measured by the decreasing number of attacks. For this thesis, the security environment consists of the number of attacks and t...

  17. Iraqi Military Academies

    Directory of Open Access Journals (Sweden)

    Nodar Z. Mossaki

    2015-03-01

    Full Text Available The article analyzes the system of training of officers in military academies in Iraq – in Zakho, Qalacholan, ar-Rustamiyah and an-Nasiriyah. The author describes the history of creation, process of evolution, challenges and features of training in these colleges. Particular attention paid to military academies in the territory of Iraqi Kurdistan, which actually do not obey the central government of Iraq, however, have the highest level of training. Currently, Iraq's military academies operate on the basis of the NATO standards. Iraqi military academies paid miuch attention to the specifics of the military and political situation in Iraq – counterinsurgency and counterterrorism operations, patrolling cities, fighting in an urban environment etc. Significant place in the curriculum take the courses contributing to the formation of pro-Western sentiment.

  18. Living with the Choice: A Grounded Theory of Iraqi Refugee Resettlement to the U.S.

    Science.gov (United States)

    Davenport, Lisa A

    2017-04-01

    Though the United States has become a place of increasing resettlement for refugees, particularly Iraqi refugees who have been forced to flee their homeland due to violence, persecution and civil unrest, little is known about Iraqi refugee resettlement in the United States, or the way in which resettlement impacts health and adjustment. A grounded theory study was conducted to develop a substantive theory of Iraqi refugee resettlement. Participants in the qualitative study included 29 Iraqi refugees and 2 community partners who participated in face-to face interviews. Data analysis and interpretation revealed fundamental concepts related to Iraqi refugee resettlement. Results of analysis showed that for Iraqis choosing to resettle here, the outcome is dichotomous: satisfaction or regret. The outcome is influenced by contextual factors as well as facilitating and hindering intervening conditions during the basic social process of resettlement transition. Each refugee's story is unique, yet all share common threads. This study allowed Iraqi refugees the opportunity to voice their personal experiences of resettling in America, and revealed life stories that inspire and illuminate a process that can guide health care delivery as they cope with the stresses of their journey. As a result, an in-depth storyline was established to explain the process of resettlement for Iraqi refugees. The development of this resettlement theory, grounded in Iraqi refugee experience, has the potential to guide nursing education, enhance the efficacy of practice, inform policy development and form the basis for research.

  19. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  20. Night-Time Light Dynamics during the Iraqi Civil War

    Directory of Open Access Journals (Sweden)

    Xi Li

    2018-06-01

    Full Text Available In this study, we analyzed the night-time light dynamics in Iraq over the period 2012–2017 by using Visible Infrared Imaging Radiometer Suite (VIIRS monthly composites. The data quality of VIIRS images was improved by repairing the missing data, and the Night-time Light Ratio Indices (NLRIs, derived from urban extent map and night-time light images, were calculated for different provinces and cities. We found that when the Islamic State of Iraq and Syria (ISIS attacked or occupied a region, the region lost its light rapidly, with the provinces of Al-Anbar, At-Ta’min, Ninawa, and Sala Ad-din losing 63%, 73%, 88%, and 56%, of their night-time light, respectively, between December 2013 and December 2014. Moreover, the light returned after the Iraqi Security Forces (ISF recaptured the region. In addition, we also found that the night-time light in the Kurdish Autonomous Region showed a steady decline after 2014, with the Arbil, Dihok, and As-Sulaymaniyah provinces losing 47%, 18%, and 31% of their night-time light between December 2013 and December 2016 as a result of the economic crisis in the region. The night-time light in Southern Iraq, the region controlled by Iraqi central government, has grown continuously; for example, the night-time light in Al Basrah increased by 75% between December 2013 and December 2017. Regions formerly controlled by ISIS experienced a return of night-time light during 2017 as the ISF retook almost all this territory in 2017. This indicates that as reconstruction began, electricity was re-supplied in these regions. Our analysis shows the night-time light in Iraq is directly linked to the socioeconomic dynamics of Iraq, and demonstrates that the VIIRS monthly night-time light images are an effective data source for tracking humanitarian disasters in that country.

  1. Strategic Reflections: Operation Iraqi Freedom, July 2004-February 2007

    Science.gov (United States)

    2012-10-01

    not pan out. We knew that our mission was ultimately to hand over security responsibility to the Iraqi government, but we had not yet developed a...were “ chicken -egg” discus- sions about whether the security situation had to improve before the political track could begin. I strongly argued that...2005 Lt Gen Nick Houghton (UK), October 2005–February 2006 Lt Gen Rob Fry (UK), March 2006–September 2006 Lt Gen Graham Lamb (UK), September 2006

  2. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  3. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  4. Operation Iraqi Freedom 06-08

    Science.gov (United States)

    2008-02-14

    Managemen 15.6.6 Results Related t 15.6.7 NCOs and Multiple-Deployments 15.6.8 Validated Trainin 15.6.9 Theater Suicide Prevention Program and Suicide...include mental health providers who have deployed to the IT0 and are experienced using AHLTA- T . As noted above, as the operational theater matures in...Mental Health Advisory Team (MHAT) V Operation Iraqi Freedom 06-08 14 February 2008 Office of the Surgeon Multi-National Force-Iraq and Office

  5. Maintaining Discrimination in Operation Iraqi Freedom

    Science.gov (United States)

    2008-12-01

    influenced and do not draw as much scrutiny from coalition  forces. Children are primarily being used by Iraqi insurgents to  plant  roadside bombs or  as...conduct must also mean that there needs to be a group to which these standards are  assigned—the soldier class.    Though there are  warts  to the

  6. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  7. IRAQI BUFFALO NOW

    Directory of Open Access Journals (Sweden)

    J. Kh. ALsaedy

    2010-02-01

    Full Text Available Buffaloes in Iraq represent the most productive animal since its domestication in Mesopotamia about pre-historic era recently, domesticated buffaloes all over country go through drastic factors from (1980_2006, such as (gulf wars, marsh drainage, rinder pest plaque, economic blockade which are attributed to widely changes in animal environment ,geographical sites, and dangerous decline in buffalo population accompanied by reduced fertility and feed shortage, resulted in switch of buffalo raising and started to work on another easy jobs .lastly American war in 2003 lead to marsh return and finally ethnic-fighting release, so thousands of buffalo breeders (Madan started a big mass moving from hot-spot area around Baghdad countryside villages nearer to conflicting sectors in Anbar and sallah aldin provinces towards southern marshes (natural habitats before along time. This new theater encouraged Iraqi government represented by Ministry of agriculture through three involved companies to put strategic plane for buffalo development in future.

  8. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  9. Iraqi Universities Reach a Crossroads

    Science.gov (United States)

    Lindsey, Ursula

    2012-01-01

    Eight years after the U.S. invasion of Iraq and a few months after the withdrawal of the military forces from the country, Iraq's universities, devastated by years of dictatorship, sanctions, and war, are still struggling to recover. The security situation has improved since the deadly, dark days of 2006 and 2007, when the country teetered on the…

  10. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  11. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  12. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  13. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  14. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  15. In Defense of the Iraqi Media: Between Fueling Conflict and Healthy Pluralism

    Directory of Open Access Journals (Sweden)

    Anja Wollenberg

    2017-07-01

    Full Text Available Despite the occupation and ensuing war, Iraq has experienced the emergence of a truly pluralistic media landscape after the fall of the Baath regime in 2003. Today, media coverage of domestic affairs is characterized not only by pluralism but also by bias and partiality reflecting strong ties between political actors and media outlets. Accordingly, the Iraqi media are often accused of fueling conflict and deepening the ethno-sectarian divide in society. Based on a qualitative frame analysis of Iraqi news bulletins, this study reveals that Iraqi media outlets provide indeed contesting frames on even the most divisive issues. Only the coverage of the armed war against IS is characterized by a non-pluralistic conformity among Iraqi channels that unequivocally focus on military successes against IS and jointly refrain from any criticism against the varied forces fighting IS in Iraq.

  16. Taming the wounded lion: Transforming security forces in West Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-01

    Feb 1, 2011 ... Solidarity networks of language and culture link ethnic groups ... policymaking process, financial management issues, defence forces, ... Related articles ... of the developing world's brightest scientists find new ways to improve ...

  17. The Australian Defence Force: Broadened Concepts of Security Operations

    National Research Council Canada - National Science Library

    Wing, Ian

    1998-01-01

    ...-fighting role and could result in fundamental force structure and resource changes. More Australian Government policy changes are possible, and increased participation in counter-drug operations has been foreshadowed...

  18. Image of Iraqis in The Cinema of Sacred Defense

    Directory of Open Access Journals (Sweden)

    Abdollah Givian

    2012-03-01

    Full Text Available Regarding representational function of media, the current dissertation intends to examine the changes in the representation of the image of the Iraqis in the Sacred Defense Cinema. Iraqies have been pictured as the "Others" during last three decades. Due to the importance and role of sacred defense and its cinematic representations of "Self" and "Other" and thereby its contribution in the process of reconstruction of Iranian national identity this research is aimed at studying represented images of Iraqies and its changes during last three decades. To reach this objective I first examined the concept and theories of representation as stated by Richard Dyer and Stuart Hall. Then to complement Hall’s theories I referred to other thinkers in the field of identity theory, ‘self’ and ‘the other’ as stated. In the chapter on methodology I’ve benefited from a combination of the patterns presented by Kate Selbi, Ran Kallory and Rolan Bart to analyze the texts.The findings of this thesis demonstrates that in order to depict the Iraqis in the sixties verbal codes were primarily used whereas in the seventies and the eighties social and technical codes were most used respectively.In the first decade Iraqis were portrayed as those people who are imagined to be cruel, inhuman, in which the emphasis was laid on the impact of the Iraqi’s invasion. In the second decade we see Iraqi’s depicted as dumb and fat people having thick moustaches and rough voices and in the third we see this portrayal to be transformed where Iraqi’s are shown to be our Muslim brothers who have been forced to fight in the war. Having observed, examined and analyzed the films, we found out that when facing ‘the other’, i.e. the Iraqis, the metaphor of the boundary or border was used. This border is seen between ‘self’ and ‘the other’, i.e. the Iranians and the Iraqis in all the chosen movies on the Sacred Defense. In the first decade there was an objective

  19. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  20. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  1. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  2. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  3. Air Force IT System Security Compliance with Law and Policy

    Science.gov (United States)

    2016-04-01

    monetary burden on 3 system owners as there is “…a significant cost benefit to building in IA during the development phase” 4 of a system. Current...16 Option 4 : Cloud Computing to Eliminate Policy and Methodology Requirements ....17 Option 4 : Application...Assurance ( IA ) (data integrity) to support mission assurance. To ensure IA and to support the mission, changes need to be made to Air Force IT

  4. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  5. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  6. Iraqi children's rights: building a system under fire.

    Science.gov (United States)

    AlObaidi, Abdul Kareem; Jeffrey, Linda R; Scarth, Leslie; Albadawi, Ghazwan

    2009-01-01

    War violates every human right of children. In recent years, the lives of Iraqi children and the livelihoods of their families have become precarious. Conflict has split the communities where they live and taken the lives of hundreds of their friends and family members. The literature focuses on the negative effects of armed conflict on Iraqi children, and the steps that need to be taken to ameliorate their condition by adapting evidence based but culturally sensitive measures. A comprehensive solution to child protection problems clearly will take time. The primary need for the protection of Iraqi children is an end to conflict. Family and educational order and social stability are central to efforts to achieve progress in child protection. Solutions to armed conflict and its aftermath work best when they are responsive to local cultural practices and beliefs, and are drawn from an understanding of child development. Child safety, security and well-being should be in the forefront of the national agenda to ensure a more positive future both economically and socially to achieve a healthier Iraq.

  7. The EU should help Iraqi refugees

    Directory of Open Access Journals (Sweden)

    Gunilla Carlsson

    2007-06-01

    Full Text Available There are strong humanitarian reasons and close ties that underpin a Swedish commitment to Iraq. More than 100,000 Iraqis are living in Sweden and the numbers are rising. Europe could do more to provide humanitarian assistance and assist Iraqi refugees.

  8. 31 CFR 575.311 - Iraqi origin.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Iraqi origin. 575.311 Section 575.311 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... Government of Iraq, or of a business entity located in Iraq. Services of Iraqi origin are not imported into...

  9. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  10. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  11. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  12. Refugee warriors or war refugees? Iraqi refugees' predicament in Syria, Jordan and Lebanon

    NARCIS (Netherlands)

    Leenders, R.

    2009-01-01

    This essay attempts to disentangle a debate within the study of refugee crises and their security implications involving 'refugee warriors'. It situates the debate in the context of the Iraqi refugee crisis and its purported and real manifestations in three main host countries: Syria, Jordan and

  13. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  14. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  15. Iraqi Refugees in Jordan: Legal Perspective

    OpenAIRE

    OLWAN, Mohamed Y.

    2009-01-01

    Euro-Mediterranean Consortium for Applied Research on International Migration (CARIM) Jordan has traditionally been one of the regions most welcoming countries toward Iraqis. The country received several flows of Iraqis during the last four decades, but most of Iraqis residing in Jordan fled the precarious situation prevailing in Iraq following the U.S. –led invasion of Iraq in March 2003. Jordan is not a party to the 1951 Convention on the Status of Refuges or the 1967 Protocol on Refugee...

  16. Iraqi Perspectives Project. Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 1 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M; Lacey, James

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  17. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  18. Stability Operations: Learning from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    Clay, Troy A

    2007-01-01

    U.S. strategy in Iraq after the removal of Saddam Hussein was to promote a democratic style of government and to conduct reconstruction of essential Iraqi infrastructure for the political and economic redevelopment of Iraq...

  19. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  20. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  1. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  2. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  3. Border Security -- One Step Toward Resolving the Conflict in Iraq

    National Research Council Canada - National Science Library

    Bennett, Mark S

    2005-01-01

    .... It will do this by proving that border security is a key component to suppressing the Iraqi insurgency and that border security operations have been hindered by a lack of interagency coordination...

  4. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  5. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  6. Quality Assurance for Iraqi Bottled Water Specifications

    Directory of Open Access Journals (Sweden)

    May George Kassir

    2015-10-01

    Full Text Available In this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water, and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc in Iraq by investigating the selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16 to generate X bar, and Pareto chart. It was found from X bar charts that the quality parameters of some drinking bottled water brands are not within Iraqi standards set by the “Central Agency for Standardization and Quality Control” such as pH values, Fe, Na, and Mg concentrations. While the comparison of previously mentioned standard specifications through radar chart many important issues are detected such as the absence of lower limits the whole bottled water quality parameters such as for Na and Mg also the radar chart shows that Iraqi bottled and tap water specifications are almost equal in their quality values. Also the same chart pictured the limited range of Iraqi specifications compared to that of Saudi Arabia, and WHO and the need to introduce other water specifications such as K, Na, etc. This confirms the need to improve Iraqi bottled water specifications since it was introduced on 2000. These results also highlighted the weakness of quality assurance activities since only 33 % of the investigated companies registered the whole water quality specifications as shown in Pareto chart. Other companies do not register any quality characteristics. Also certain companies should be stopped due to non-conforming specifications, yet these companies are

  7. Analysis of Israel's Foreign Policy Concerning Iraqi's Kurdistan (2003-2015

    Directory of Open Access Journals (Sweden)

    Ali Latifi

    2017-06-01

    Full Text Available Analysis of the Israel's Foreign Policy is one of the important issues concerned by the researchers of the international and regional affairs. Israel's Foreign Policy in years 2003-2015 has witnessed a lot of events. In these years, transformation of the Iraq's internal structures including the fall of the Baath Regime in Iraq and appearance of the terroristic group of Dashi (ISIS in this country has provided new opportunities and challenges for the Israel's Foreign Policy. In this regard, establishment of a republic system in Iraq and the reinforcement of the Kurdish streams, specially during the current transformations and the increasing desires for the independence in Iraqi's Kurdistan, have paved the way for Israel to intensify its activities in the region. In this regard, the current study has approach the issue of Israel's Foreign Policy concerning Iraqi's Kurdistan during the years 2003-2015 with a descriptive analytic method. The achieved results show that the political reasons (alliance of the periphery and development of the strategic depth in closeness to Iran, economic (accessing the energy and mineral resources in Iraqi's Kurdistan, the importance of the Kurdistan's hydro-politic resources for Israel and the Israel's economical influence from the Nile to the Euphrates, military-security (presence in the strategic environment of Iran and the external threats in the Middle East, creation of an environmental crisis un the Kurdish region of the Middle East, weakening the Iraqi's central government and disintegration of this country, Israel's security-intelligence expansion, acquiring a strategic territory and getting out of isolation and the resolving the its legitimacy crisis, controlling the currents of thought in this region, all have been influential in thein Israel's Foreign Policy Concerning Iraqi's Kurdistan.

  8. Iraqi architecture in mogul period

    Directory of Open Access Journals (Sweden)

    Hasan Shatha

    2018-01-01

    Full Text Available Iraqi architecture have many periods passed through it until now, each on from these periods have it is architectural style, also through time these styles interacted among us, to creating kind of space forming, space relationships, and architectural elements (detailed treatments, the research problem being from the multi interacted architectural styles causing some of confused of general characteristic to every style, that we could distinguish by it. Research tries to study architecture style through Mogul Conquest to Baghdad. Aim of research follow main characteristic for this architectural style in the Mogul periods on the level of form, elements, and treatments. Research depending on descriptive and analytical all buildings belong to this period, so from analyzing there style by, general form for building, architectural elements, and it architectural treatment, therefore; repeating this procedures to every building we get some similarities, from these similarities we can making conclusion about pure characteristic of the style of these period. Other side, we also discover some Dissimilar in the building periods, these will lead research to make what interacting among styles in this period, after all that we can drew clearly main characteristic of Architectural Style for Mogul Conquest in Baghdad

  9. The Description of Health Among Iraqi Refugee Women in the United States.

    Science.gov (United States)

    Salman, Khlood F; Resick, Lenore K

    2015-08-01

    The purpose of this study was to understand the description of health among Iraqi women refugees, their health status, and health experiences during resettlement in the United States. Twelve women, ages 21-67 years old, who resettled in the United States during or after 2003 where interviewed. The women described health as a gift determined by God, the ability to function, the absence of physical symptoms, and the need to feel safe and secure in the context of resettlement. Although the Iraqi women valued health, during the resettlement process, seeking safety and feeling secure were the foremost priorities. Findings revealed that this is a vulnerable population which has experienced the violence of war and, as a result, have unique physical, mental, economic, and social concerns related to health. Implications are for a multidisciplinary approach to best meet the unique individual health needs of this vulnerable population.

  10. The Stalled Recovery of the Iraqi Marshes

    Directory of Open Access Journals (Sweden)

    Richard H. Becker

    2014-01-01

    Full Text Available The Iraqi (Mesopotamian Marshes, an extensive wetlands system in Iraq, has been heavily impacted by both human and climate forces over the past decades. In the period leading up to the Second Gulf War in 2002, the marshlands were shrinking due to both a policy of draining and water diversion in Iraq and construction of dams upstream on the Tigris and Euphrates rivers. Following the war through 2006, this trend was reversed as the diversions were removed and active draining stopped. A combination of MODIS and GRACE datasets were used to determine the change in surface water area (SWA in the marshes, marshland extent and change in mass both upriver in the Tigris and Euphrates watersheds and in the marshlands. Results suggest that the post war dam removal and decreased pumping in 2003 provided only temporary respite for the marshlands (2003–2006 SWA: 1,477 km2 increase (600%, water equivalent depth (WED: +2.0 cm/yr.; 2006–2009: −860 km2 (−41% WED: −3.9 cm/yr.. Unlike in the period 2003–2006, from 2006 forward the mass variations in the marshes are highly correlated with those in the upper and middle watershed (R = 0.86 and 0.92 respectively, suggesting that any recovery due to that removal is complete, and that all future changes are tied more strongly to any climate changes that will affect recharge in the upper Tigris-Euphrates system. Precipitation changes in the watershed show a reduction of an average of 15% below the 15 yr mean in 2007–2011 This corresponds with published ensemble predictions for the 2071–2099 time period, that suggested similar marshland shrinkage should be expected in that time period.

  11. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  12. Iraqi Refugee High School Students' Academic Adjustment

    Science.gov (United States)

    Bang, Hyeyoung

    2017-01-01

    Many Iraqi refugee students in the United States suffer from posttraumatic stress disorder (PTSD) as well as acculturation stresses. These stresses often create challenges for their integration into U.S. schools. The project explored risk factors such as the length of educational gaps in transit, PTSD, and separation and marginalization…

  13. Homogeneity in Social Groups of Iraqis

    NARCIS (Netherlands)

    Gresham, J.; Saleh, F.; Majid, S.

    With appreciation to the Royal Institute for Inter-Faith Studies for initiating the Second World Congress for Middle Eastern Studies, this paper summarizes findings on homogeneity in community-level social groups derived from inter-ethnic research conducted during 2005 among Iraqi Arabs and Kurds

  14. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  15. History of the Iraqi Nuclear Center of Tuwaitha

    International Nuclear Information System (INIS)

    Fabbri, Silvio

    2009-01-01

    The Tuwaitha site, 20 km south of Baghdad, was chosen at the beginning of the sixties to be the Center for Research and Development of the Iraqi Nuclear Program. The israeli air attack to the Osirak reactor in 1981, the clandestine activities for nuclear weapons production and the inspections carried out by the International Atomic Energy Agency (IAEA) to verify such activities are parts of the history of that nuclear complex. Its installations were extensively damaged in 1991 during the so called Golf War and finally destroyed by air bombardment during the invasion by the Coalition Forces in 2003. The IAEA and other several countries have elaborated an international assistance program for the future activities of installations dismantling and site remediation. (author) [es

  16. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  17. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  18. 'Jail break' made by Iraqi oil tankers

    International Nuclear Information System (INIS)

    Lorenz, A.

    2000-01-01

    The implications of Iran's policy turn-about of allowing ships smuggling Iraqi crude oil to sail through its coastal waters, out of reach of UN and US ships patrolling the Persian Gulf, are discussed. It is suspected that the change in Iranian policy may be due to the fact that an infusion of Iraqi oil on the international markets would suit Iran's purposes by reducing the need for OPEC to raise production quotas. Iran is known to be opposed to an increase of production by OPEC members. At the same time, developments in US-Iranian relations and in the international oil market also have to be considered as factors influencing the Iranian position on this issue

  19. Skin Colour Analysis of Iraqi Kurdish Population

    OpenAIRE

    Zardawi, Faraedon M; Xiao, Kaida; Yates, Julian M

    2015-01-01

    Objective: Skin colour measurement and analysis was performed for Iraqi Kurdish population in sulaimani city. The purpose of this study was to produce a dedicated skin shade guide for precise colour reproduction and colour matching of maxillofacial prostheses with the patient’s original skin colour. Methodology: A skin colour measurement was undertaken for 140 subjects (73 female and 67 male). A method of capturing their (L* a* b*) colour values from nine body parts was performed using a Mi...

  20. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  1. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 2 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  2. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 5 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  3. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 3 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  4. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 4 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  5. Mission Accomplished Rebuilding the Iraqi and Afghan Armies

    Science.gov (United States)

    2016-06-01

    National Defense Security Forces ANSF Afghanistan National Security Forces AQI Al-Qaeda in Iraq ATC Advisor Training Cell ATG Advisor Training Group... Cells (ATCs) resident with the Marine Expeditionary Forces.29 Many of these accounts were in the early years of the wars in Iraq and Afghanistan...convinced that the counterinsurgents have the means, ability, stamina , and will to win…The populace must have confidence in the staying power of both the

  6. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  7. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  8. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  9. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  10. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  11. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2007-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately 2 million Iraqis who have been displaced within Iraq itself...

  12. The Securitisation of Refugee Flows and the Schooling of Refugees: Examining the Cases of North Koreans in South Korea and Iraqis in Jordan

    Science.gov (United States)

    Collet, Bruce A.; Bang, Hyeyoung

    2016-01-01

    Drawing on data collected in South Korea, Jordan and the USA, this paper examines the degree to which security concerns impact the schooling of North Korean refugees in South Korea and Iraqi refugees in Jordan. Operating from a framework examining the intersection of migration and securitisation, the authors find that accounts of negative images…

  13. Iraqi oil industry slowly returning to normal

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Iraq is making progress in putting its battered petroleum industry back together 1 1/2 years after the Persian Gulf war ended. OPEC News Agency (Opecna) reported the finish of reconstruction of Iraq's Mina al-Bakr oil terminal on the northern tip of the Persian Gulf, using Iraqi know-how and engineering personnel. The terminal, heavily damaged during the gulf conflict, has been restored to its prewar loading capacity of 1.6 million b/d at a cost of $16 million. Ninety per cent of the port had been damaged

  14. Some wholesomeness studies on irradiated Iraqi dates

    International Nuclear Information System (INIS)

    Al Rawi, A.M.; Hamoudi, H.I.

    1981-01-01

    Iraqi dates (Zahdi and Khestawi) were irradiated at different dose levels (0 to 1500 krad) to extend their shelf-lives. Samples irradiated at 150 krad showed no change in the behaviour studies of tested Swiss albino mice. Fungi were found to have a constant rate of growth on the syrup irradiated dates. Chemical products such as malondialdehyde, deoxy sugars, acids and reducing sugars were quantified. In conclusion, 150 krad is a convenient dose to extend the shelf-lives of the tested dates and is therefore recommended. (author)

  15. Report on Progress Toward Security and Stability in Afghanistan and United States Plan for Sustaining the Afghanistan National Security Forces

    Science.gov (United States)

    2011-04-01

    105  8.2: INDIA ...2B Afghan Air Force 0 AMoD Education 3 ASOC 0 Gender Integration 0 Personnel Management 2B National Logistics 2B GS G1 2B AMoD AT&L 2B...award nomination package cites her determination to overcome Afghanistan’s cultural stereotypes and to serve in the military “as long as my country

  16. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  17. Analysis and Assessment for Iraqi Communication Technology Development

    Directory of Open Access Journals (Sweden)

    Marwan Al-Khalidy

    2015-09-01

    Full Text Available The communications in Iraq has been fluctuated for decades. In fact, this fluctuation constitutes a reality that the country has been facing such as the security issues, the economic blockade imposed on the previous regime, and all the exceptional circumstances. This paper illustrates the nature and reality of communication in Iraq after 2003. While the sophisticated technology works very well all around the world, Iraq still does not keep the work up to improve its communications. This paper tackles the most importantcommunication problems in Iraq after 2003, and the possibility to process good services to customers, either by developing the governmental combinations, or/and by enforcing telecommunication companies to provide their best services to their customers. This paper answers the following the questions: Are the telecom/communication companies serve good qualities to the customers? If not, why? Who is the responsible? Are these companies at least doing their best to serve good qualities? Or are they just profitable companies? Why have these companies not started using the optical fiber cables instead of the copper one? Is the government seeking to compel such companies to serve good services? Whether the Iraqi government plans to develop the landlines services so it would compete with the telecom companies? What is the role of the Communication and Media Commission (CMC?

  18. The Military Dimension of the Niger Delta Crisis: Increasing the Effectiveness of Security Forces Through Information Operations

    Science.gov (United States)

    2010-06-11

    and over 250 ethnic groups, Nigeria is a mix of cultures , languages and interests. Nigeria got its name from the River Niger, the major river in the...largely Muslim Hausa/Fulani northern protectorate and the predominantly Christian Yoruba and Igbo southern protectorate (Gascoigne 2001). Nigeria gained...keen understanding of what he referred to as the demographic battlespace as well as ―the cultural intricacies that drive the Iraqi population‖ is

  19. THE GODFATHER DOCTRINE SECURITY FORCE ASSISTANCE (SFA) TRAINING - AN OFFER THE MARINE CORPS CAN’T REFUSE

    Science.gov (United States)

    2016-02-16

    experience training military advisors suggests that the commander’s exposure to military advising has a direct affect on who is nominated to advise... Advisor : CAPT Patrick J McCormick, USN 16 February 2016 DISTRIBUTION A. Approved for public release: distribution unlimited. 2 DISCLAIMER The...SFA AT) leader / senior advisor . He advised an Iraqi National Police (INP) Port of Entry Director near the Iraq / Syria Border and Afghan

  20. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  1. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  2. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  3. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  4. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong; Alouini, Mohamed-Slim

    2015-01-01

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI

  5. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  6. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  7. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  8. An Argument for Documenting Casualties: Violence Against Iraqi Civilians 2006

    National Research Council Canada - National Science Library

    Hall, Katharine; Stahl, Dale

    2008-01-01

    The problem of measuring the number of civilian fatalities in Iraq gained widespread media coverage when the Lancet published a study in October 2004 claiming that more than 100,000 Iraqi civilians...

  9. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis?

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2007-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be as many as 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately...

  10. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis?

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2008-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be as many as 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately...

  11. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    National Research Council Canada - National Science Library

    Dale, Catherine

    2008-01-01

    Operation Iraqi Freedom (OIF) was launched on March 20, 2003, with the immediate stated goal of removing Saddam Hussein's regime and destroying its ability to use weapons of mass destruction or to make them available to terrorists...

  12. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    National Research Council Canada - National Science Library

    Dale, Catherine

    2008-01-01

    Operation Iraqi Freedom (OIF) was launched on March 20,2003, with the immediate stated goal of removing Saddam Hussein's regime and destroying its ability to use weapons of mass destruction or to make them available to terrorists...

  13. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  14. Reporting Iraqi civilian fatalities in a time of war

    Directory of Open Access Journals (Sweden)

    Olander William E

    2009-11-01

    Full Text Available Abstract Background In February, 2007, the Associated Press (AP conducted a poll of 1,002 adults in the United States about their attitudes towards the war in Iraq. Respondents were remarkably accurate estimating the current death toll of US soldiers, yet were grossly inaccurate in estimating the current death toll of Iraqi civilians. We conducted a search of newspapers reports to determine the extent of the discrepancy between reporting Coalition and Iraqi civilian deaths, hypothesizing that there would be an over-representation of Coalition deaths compared to Iraqi civilian deaths. Methods We examined 11 U.S. newspapers and 5 non-U.S. newspapers using electronic databases or newspaper web-archives, to record any reports between March 2003 and March 2008 of Coalition and Iraqi deaths that included a numeric indicator. Reports were described as "events" where they described a specific occurrence involving fatalities and "tallies" when they mentioned the number of deaths over a period of time. We recorded the number of events and tallies related to Coalition deaths, Iraqi civilian deaths, and Iraqi combatant deaths Results U.S. newspapers report more events and tallies related to Coalition deaths than Iraqi civilian deaths, although there are substantially different proportions amongst the different U.S. newspapers. In four of the five non-US newspapers, the pattern was reversed. Conclusion This difference in reporting trends may partly explain the discrepancy in how well people are informed about U.S. and Iraqi civilian fatalities in Iraq. Furthermore, this calls into question the role of the media in reporting and sustaining armed conflict, and the extent to which newspaper and other media reports can be used as data to assess fatalities or trends in the time of war.

  15. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  16. Grammar Errors in the Writing of Iraqi English Language Learners

    Directory of Open Access Journals (Sweden)

    Yasir Bdaiwi Jasim Al-Shujairi

    2017-10-01

    Full Text Available Several studies have been conducted to investigate the grammatical errors of Iraqi postgraduates and undergraduates in their academic writing. However, few studies have focused on the writing challenges that Iraqi pre-university students face. This research aims at examining the written discourse of Iraqi high school students and the common grammatical errors they make in their writing. The study had a mixed methods design. Through convenience sampling method, 112 compositions were collected from Iraqi pre-university students. For purpose of triangulation, an interview was conducted. The data was analyzed using Corder’s (1967 error analysis model and James’ (1998 framework of grammatical errors. Furthermore, Brown’s (2000 taxonomy was adopted to classify the types of errors. The result showed that Iraqi high school students have serious problems with the usage of verb tenses, articles, and prepositions. Moreover, the most frequent types of errors were Omission and Addition. Furthermore, it was found that intralanguage was the dominant source of errors. These findings may enlighten Iraqi students on the importance of correct grammar use for writing efficacy.

  17. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  18. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  19. The Law of Force or The Force of Law: Does Following The Rule of Law Assist Security Forces in Defeating an Armed Insurgency?

    Science.gov (United States)

    2012-06-08

    and Policy in International Relations (Spring): 40-79 Arendt , Hannah . 1963. On revolution. New York: Viking Cohen, Eliot A., John Horvath, and...conditions, where the armed forces can be trusted to obey the civil authorities” ( Arendt 1965, 40). This is especially the case in countries where

  20. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  1. Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)

    National Research Council Canada - National Science Library

    Alageel, Sami

    2003-01-01

    The Royal Saudi Naval Forces (RSNF) are vulnerable to the same kinds of threats to its information infrastructure as the rest of the industrialized nations, As an officer in the RSNF, I am familiar with the special information...

  2. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2009-01-01

    ...), which would function much like our military reserve. It would ease the burden on the Armed Forces by allowing the hiring of civilians with critical skills to serve on missions abroad when America needs...

  3. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  4. Decisionmaking in Operation Iraqi Freedom: Removing Saddam Hussein by Force

    Science.gov (United States)

    2010-02-01

    have been to abandon diplomacy, but British Prime Minister Tony Blair warned that without a second resolution (or, at least, a serious effort to... Robbins and Jeanne Cummings, “New Doctrine: How Bush Decided That Iraq’s Hussein Must Be Ousted,” Wall Street Journal, June 14, 2002. 58. National

  5. A fear of coercion and accountability? Security officers and the non-use of force

    NARCIS (Netherlands)

    Eski, Y.

    2017-01-01

    Based on fieldwork among operational security officers working in the Hamburg and Rotterdam ports, it became clear these frontline port policing professionals possess a critical, even fearful attitude towards coercion while performing their duties in the ports. The power of arrest and the

  6. Multiplying a Force for Good? the Impact of Security Sector Management Postgraduate Education in Ethiopia

    Science.gov (United States)

    Macphee, Paula-Louise; Fitz-Gerald, Ann

    2014-01-01

    This paper argues for the importance, benefits and wider impact of a donor-funded, locally supported postgraduate programme in security sector management (SSM) for government officials in Ethiopia. With the exception of specialised education and training programmes within the field of peace and conflict studies, the role of education in…

  7. 77 FR 7243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0728] Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activities Under OMB....'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs...

  8. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  9. Operationalising United Nations Security Council Resolution 1325 within the Australian Defence Force

    Science.gov (United States)

    2016-01-01

    responsibilities. In turn, she goes on to show the upsurge in sectarian violence since 2003 has intensified gender inequality and the future prospects for...security sector reform; disarmament, demobilisation and reintegration; transition assistance; and disaster response. Consideration of the gendered ...There are two key terms used throughout this literature review that need to be defined from the outset: sex and gender . Sex is the anatomy with which

  10. To Enable and Sustain: Pacific Air Forces’ Theater Security Cooperation as a Line of Operation

    Science.gov (United States)

    2015-02-01

    security cooperation mechanisms already in place are evolving into a more sequenced and deliberate plan towards a defined cooperative end state. This...alignment of higher guidance and is designed to advise and guide the command’s activities in the region. Joint in its es- sence , it communicates and...face of crises, it is far better to prevent them from occurring in the first place , establish cooperative arrangements ahead of time, and reduce

  11. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    Science.gov (United States)

    2008-12-01

    and the National Guard, which operated in rural areas.”133 A National Intelligence Directorate supported the 60,000 strong security personnel in...Londoño, Juan Luis, Alejandro Gaviria, and Rodrigo Guerrero eds., Asalto al Desarrollo (Washington, D.C.: Inter-American Development Bank, 2000...Guerrero eds., Asalto al desarrollo . Washington, D.C.: Inter-American Development Bank, 2000. “Saca unimpressed with size of U.S. funding.” Latin

  12. Warrior Resilience Training in Operation Iraqi Freedom: combining rational emotive behavior therapy, resiliency, and positive psychology.

    Science.gov (United States)

    Jarrett, Thomas

    2008-01-01

    Warrior Resilience Training (WRT) is an educational class designed to enhance Warrior resilience, thriving, and posttraumatic growth for Soldiers deployed in Operation Iraqi Freedom. Warrior Resilience Training uses rational emotive behavior therapy (REBT), Army leadership principles, and positive psychology as a vehicle for students to apply resilient philosophies derived from Army Warrior Ethos, Stoic philosophy, and the survivor and resiliency literature. Students in WRT are trained to focus upon virtue, character, and emotional self-regulation by constructing and maintaining a personal resiliency philosophy that emphasizes critical thinking, rationality, virtue, and Warrior Ethos. The author, an Army licensed clinical social worker, executive coach, REBT doctoral fellow, and former Special Forces noncommissioned officer, describes his initial experience teaching WRT during Operation Iraqi Freedom to combat medics and Soldiers from 2005 to 2006, and his experience as a leader of a combat stress control prevention team currently in Iraq offering mobile WRT classes in-theater. Warrior Resilience Training rationale, curriculum, variants (like Warrior Family Resilience Training), and feedback are included, with suggestions as to how behavioral health providers and combat stress control teams might better integrate their services with leaders, chaplains, and commands to better market combat stress resiliency, reduce barriers to care, and promote force preservation. Informal analysis of class feedback from 1168 respondents regarding WRT reception and utilization is examined.

  13. 76 FR 72243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2011-11-22

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activity; Comment... Operation Enduring Freedom/ Operation Iraqi Freedom veterans and their families. DATES: Written comments and...: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10-21091. OMB...

  14. 76 FR 58565 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-09-21

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... solicits comments on information provided to Operation Enduring Freedom/Operation Iraqi Freedom veterans... information technology. Title: Operation Enduring Freedom/Operation Iraqi Freedom Seriously Injured/Ill...

  15. A Study of Apology Strategies Used by Iraqi EFL University Students

    Science.gov (United States)

    Ugla, Raed Latif; Abidin, Mohamad Jafre Zainol

    2016-01-01

    This study was aimed at exploring apology strategies of English used by Iraqi EFL students, apology strategies in Iraqi Arabic and the pragmatic strategies of Iraqi EFL students in relation to the use of apology as a speech act. The data analyzed in this study were collected in Al-Yarmouk University College and University of Diyala. The study was…

  16. Implosion lessons from national security, high reliability spacecraft, electronics, and the forces which changed them

    CERN Document Server

    Temple, L Parker

    2012-01-01

    Implosion is a focused study of the history and uses of high-reliability, solid-state electronics, military standards, and space systems that support our national security and defense. This book is unique in combining the interdependent evolution of and interrelationships among military standards, solid-state electronics, and very high-reliability space systems. Starting with a brief description of the physics that enabled the development of the first transistor, Implosion covers the need for standardizing military electronics, which began during World War II and continu

  17. Job satisfaction and turnover intention among Iraqi doctors--a descriptive cross-sectional multicentre study.

    Science.gov (United States)

    Ali Jadoo, Saad Ahmed; Aljunid, Syed Mohamed; Dastan, Ilker; Tawfeeq, Ruqiya Subhi; Mustafa, Mustafa Ali; Ganasegeran, Kurubaran; AlDubai, Sami Abdo Radman

    2015-04-19

    During the last two decades, the Iraqi human resources for health was exposed to an unprecedented turnover of trained and experienced medical professionals. This study aimed to explore prominent factors affecting turnover intentions among Iraqi doctors. A descriptive cross-sectional multicentre study was carried out among 576 doctors across 20 hospitals in Iraq using multistage sampling technique. Participants completed a self-administered questionnaire, which included socio-demographic information, work characteristics, the 10-item Warr-Cook-Wall job satisfaction scale, and one question on turnover intention. Descriptive and bivariate and multiple logistic regression analyses were conducted to identify significant factors affecting turnover intentions. More than one half of Iraqi doctors (55.2%) were actively seeking alternative employment. Factors associated with turnover intentions among doctors were low job satisfaction score (odds ratio (OR) = 0.97; 95% confidence interval (CI): 0.95, 0.99), aged 40 years old or less (OR = 2.9; 95% CI: 1.74, 4.75), being male (OR = 4.2; 95% CI: 2.54, 7.03), being single (OR = 5.0; 95% CI: 2.61, 9.75), being threatened (OR = 3.5; 95% CI: 1.80, 6.69), internally displaced (OR = 3.1; 95% CI: 1.43, 6.57), having a perception of unsafe medical practice (OR = 4.1; 95% CI: 1.86, 9.21), working more than 40 h per week, (OR = 2.3; 95% CI: 1.27, 4.03), disagreement with the way manager handles staff (OR = 2.2; 95% CI: 1.19, 4.03), being non-specialist, (OR = 3.9, 95% CI: 2.08, 7.13), and being employed in the government sector only (OR = 2.0; 95% CI: 1.09, 3.82). The high-turnover intention among Iraqi doctors is significantly associated with working and security conditions. An urgent and effective strategy is required to prevent doctors' exodus.

  18. Analysing the Improper Pronunciation of Diphthongs by Iraqi EFL learners

    Directory of Open Access Journals (Sweden)

    Mukhalad Malik Almutalabi

    2018-04-01

    Full Text Available The current study aims at analysing the improper pronunciation of Iraqi EFL learners concerning the pronunciation of diphthongs in words of various syllables. It describes and identifies thoroughly the mispronunciations of such important sounds in English language. The study attempts at analysing such mispronunciations by clarifying and assigning the phonetic deviations of Iraqi EFL learners when they pronounce diphthongs. So the main objective of the study is to analyse the errors committed by Iraqi learners in the pronunciation of diphthongs grouping each error into its specific category. To verify the objective of the paper, 25 Iraqi EFL learners from the department of English at Cihan University/ Slemani are chosen to be the main participants of the study. The test which was conducted in the laboratory of the Department of English contained 10 words comprising various diphthongs. The results clearly revealed that mispronouncing English diphthongs by Iraqi EFL were mostly observed by replacing the required diphthong with another improper one and they also tended to use simple vowels instead of the correct required diphthongs.

  19. Joint Force Quarterly. Number 2, Autumn 1993

    Science.gov (United States)

    1993-09-01

    Typography and Design Division Government Printing Office Joint Force Quarterly is published by the Institute for National Strategic Studies, National...Decisions regard- ing the key force will affect many factors in the new environment. It determines reaction time, how much and what type of force to...shelters destroyed? Only indirectly. Attacks on shel- ters had forced a reaction by the Iraqis, one that caused the loss of their air arm as a force in

  20. Strategy of National Cultural Security and Modern Russia «Soft Force»

    Directory of Open Access Journals (Sweden)

    G J Filimonov

    2010-09-01

    Full Text Available Today one of the key factors needed for preservation of the state sovereignty, territorial integrity of the country, consolidation of a society, creation of conditions for the successful decision of internal problems and accordingly occurrence of possibility for conducting by the state of active foreign policy necessity of formation of own strategy of maintenance of national cultural safety and potentials so-called «soft force» appears.

  1. Fast forward for the United Nations. Human security becomes a unifying force

    International Nuclear Information System (INIS)

    Annan, Kofi

    2005-01-01

    This paper speaks about the author's vision of a safer world and a better United Nations. The global threats of our age include terrorism, deadly weapons, genocide, infectious disease, poverty, environmental degradation and organized crime. They will not wait for States to sort out their differences. That is why we must act now to strengthen our collective defences. We must unite to master today's threats, and not allow them to divide and master us. And I submit that the only universal instrument that can bring States together in such a global effort is the United Nations. One must acknowledge that the United Nations is not perfect. At times, it shows its age. But our world will not easily find a better instrument for forging a sustained, global response to today's threats. We must use it to unite around common priorities - and act on them. And we must agree on a plan to reform the United Nations - and get on with the job of implementing it. This message lies at the heart of the recent report, A More Secure World: Our Shared Responsibility. It is the work of the Panel of 16 men and women from around the world I appointed last year. The report contains a powerful vision of collective security. Whether the threat is terrorism or AIDS, a threat to one is a threat to all. Our defences are only as strong as their weakest link. We will be safest if we work together

  2. Geothermal gradients in Iraqi Kurdistan deduced from bottom hole temperatures

    Directory of Open Access Journals (Sweden)

    Rzger A. Abdula

    2017-09-01

    Full Text Available Bottom hole temperature (BHT data from 12 oil wells in Iraqi Kurdistan were used to obtain the thermal trend of Iraqi Kurdistan. Due to differences in thermal conductivity of rocks and groundwater movement, variations in geothermal gradients were observed. The highest geothermal gradient (29.2 °C/km was found for well Taq Taq-8 in the Low Folded Zone (central part of the area. The lowest geothermal gradients (14.9 °C/km were observed for well Bekhme-1 in the High Folded Zone (northern and northeastern parts of the area. The average regional geothermal gradient for Iraqi Kurdistan is 21 °C/km.

  3. Cross Cultural Awareness in International Military Operation: International Security Assistance Force in Afghanistan

    Directory of Open Access Journals (Sweden)

    Jowita Brudnicka

    2015-12-01

    Full Text Available Multiculturalism defined as a multitude of cultures can be typified as a major trend in international relations, what is a chellenge for every participant of global affairs. The phenomen of multiculturalism is absolutely nothing new, but under conditions of progresive globalisation mechanism its importance has been appreciated.In practise multinational forces have to operate in culturally heterogeneous environment in an array of tasks to combat threats of mostly a non-military transnational nature. All the time there are a highly complex relations within coalition personnel, in cuturally diverse society living in the theatre of operation and between all them mutually.

  4. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  5. Geothermal gradients in Iraqi Kurdistan deduced from bottom hole temperatures

    OpenAIRE

    Abdula, Rzger A.

    2016-01-01

    Bottom hole temperature (BHT) data from 12 oil wells in Iraqi Kurdistan were used to obtain the thermal trend of Iraqi Kurdistan. Due to differences in thermal conductivity of rocks and groundwater movement, variations in geothermal gradients were observed. The highest geothermal gradient (29.2 °C/km) was found for well Taq Taq-8 in the Low Folded Zone (central part of the area). The lowest geothermal gradients (14.9 °C/km) were observed for well Bekhme-1 in the High Folded Zone (northern and...

  6. Food insecurity among Iraqi refugees living in Lebanon, 10 years after the invasion of Iraq: data from a household survey.

    Science.gov (United States)

    Ghattas, Hala; Sassine, AnnieBelle J; Seyfert, Karin; Nord, Mark; Sahyoun, Nadine R

    2014-07-14

    Iraqi refugees in Lebanon are vulnerable to food insecurity because of their limited rights and fragile livelihoods. The objective of the present study was to assess household food insecurity among Iraqi refugees living in Lebanon, almost 10 years after the invasion of Iraq. A representative survey of 800 UN High Commissioner for Refugees-registered refugee households in Lebanon was conducted using multi-stage cluster random sampling. We measured food insecurity using a modified US Department of Agriculture household food security module. We collected data on household demographic, socio-economic, health, housing and dietary diversity status and analysed these factors by food security status. Hb level was measured in a subset of children below 5 years of age (n 85). Weighted data were used in univariate and multivariate analyses. Among the Iraqi refugee households surveyed (n 630), 20·1% (95% CI 17·3, 23·2) were found to be food secure, 35·5% (95% CI 32·0, 39·2) moderately food insecure and 44·4% (95% CI 40·8, 48·1) severely food insecure. Severe food insecurity was associated with the respondent's good self-reported health (OR 0·3, 95% CI 0·2, 0·5), length of stay as a refugee (OR 1·1, 95% CI 1·0, 1·2), very poor housing quality (OR 3·3, 95% CI 1·6, 6·5) and the number of children in the household (OR 1·2, 95% CI 1·0, 1·4), and resulted in poor dietary diversity (PLebanon call for urgent programmes to address the food and health situation of this population with restricted rights.

  7. Secure diversity-multiplexing tradeoff of zero-forcing transmit scheme at finite-SNR

    KAUST Repository

    Rezki, Zouheir

    2012-04-01

    In this paper, we address the finite Signal-to-Noise Ratio (SNR) Diversity-Multiplexing Tradeoff (DMT) of the Multiple Input Multiple Output (MIMO) wiretap channel, where a Zero-Forcing (ZF) transmit scheme, that intends to send the secret information in the orthogonal space of the eavesdropper channel, is used. First, we introduce the secrecy multiplexing gain at finite-SNR that generalizes the definition at high-SNR. Then, we provide upper and lower bounds on the outage probability under secrecy constraint, from which secrecy diversity gain estimates of ZF are derived. Through asymptotic analysis, we show that the upper bound underestimates the secrecy diversity gain, whereas the lower bound is tight at high-SNR, and thus its related diversity gain estimate is equal to the actual asymptotic secrecy diversity gain of the MIMO wiretap channel. © 2012 IEEE.

  8. The role of the media in establishing international security regimes

    Directory of Open Access Journals (Sweden)

    Chanan Naveh

    2005-04-01

    Full Text Available This article focuses primarily on the media's impact on international security regimes. It explores the ways in which the media affect the lifecycles of international regimes, from the time they are first conceived of, through their establishment, consolidation and stabilization, up until their ultimate demise. Although this paper highlights the media's role in the evolution of security regimes, it is clear that, regardless of the regime in question, media play a role throughout the lifecycle of all international regimes, whatever their character. In order to analyze the relationships of the media with security regimes in general, and specifically their contribution to each stage in their development, the article utilizes methodologies from the field of communication studies. It examines the media's agenda, "news values" and various functions, and their ability to mobilize public support for the particular issue of the regime. To date, most studies have explored the interaction between media communication patterns and global developments at the state level, or in relation to the formulation of foreign policy, while largely ignoring the international dimension of the relationship. This article attempts to remedy this situation, and the relevant processes are analysed in a case study of the anti-Iraq international security regime. It should be noted that although the paper focuses on the specific anti-Iraqi regime, it is part of a more general Anti-Rogue actors regime which includes the war against global terrorism. The study of the development of the anti-Iraq press-security regime teaches us that during international crises the media mobilize and unanimously support the regime fighting the "bad guys." But, when the regime develops and enters disputed turfs and begins to lose its legitimacy, media support diminishes, and the media may even develop into an opposing force and may join the actors fighting against this regime. Moreover, the study of

  9. Problems with veteran-family communication during operation enduring freedom/operation Iraqi freedom military deployment.

    Science.gov (United States)

    Hinojosa, Ramon; Hinojosa, Melanie Sberna; Högnäs, Robin S

    2012-02-01

    Twenty Reserve component (Army and Marines) and Army National Guard male veterans of Operational Enduring Freedom/Operation Iraqi Freedom discuss their deployment and postdeployment family reintegration experiences. A Grounded Theory approach is used to highlight some of the ways in which family miscommunication during deployment can occur. Communication with civilian family members is affected by the needs of operational security, technical problems with communication tools, miscommunication between family members, or because veterans have "nothing new to say" to family back home. These communication difficulties may lead to an initial gulf of understanding between veterans and family members that can cause family strain during postdeployment family reintegration. We end with a discussion of veteran family reintegration difficulties.

  10. Investigating the Speech Act of Correction in Iraqi EFL Context

    Science.gov (United States)

    Darweesh, Abbas Deygan; Mehdi, Wafaa Sahib

    2016-01-01

    The present paper investigates the performance of the Iraqi students for the speech act of correction and how it is realized with status unequal. It attempts to achieve the following aims: (1) Setting out the felicity conditions for the speech act of correction in terms of Searle conditions; (2) Identifying the semantic formulas that realize the…

  11. Analysis of 49 autosomal SNPs in an Iraqi population

    DEFF Research Database (Denmark)

    Tomas Mas, Carmen; Diez, Isabel E; Moncada, Enrique

    2013-01-01

    (ST) values were statistically significant when pairwise comparisons were performed between the 18 populations. The Iraqi population did not show significant difference from the population in Turkey and it grouped together with other Middle-Eastern populations when a multidimensional scaling plot was drawn...

  12. Women and Learning in the Iraqi War Zone

    Science.gov (United States)

    Zangana, Haifa

    2008-01-01

    Having accumulated, throughout the twentieth century, historical achievements in education and standards of living higher than in most Arab and "third world" countries, Iraqi women were hit hard by two wars, the US-imposed economic sanctions of the 1990s, and then set back by the 2003 Anglo-American imperial occupation. Physical survival…

  13. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  14. Reforming Iraqi Journalism and Mass Communication Higher Education: Adapting the UNESCO Model Curricula for Journalism Education to Iraqi Higher Education

    Science.gov (United States)

    Pavlik, John V.; Laufer, Peter D.; Burns, David P.; Ataya, Ramzi T.

    2012-01-01

    Journalism and mass communication higher education in Iraq is well established but largely isolated from global developments since the 1970s. In the post-Iraq war period, the United Nations Educational, Scientific and Cultural Organization (UNESCO) implemented a multiyear project to work with the leadership of Iraqi higher education to help update…

  15. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  16. Security Force Assistance

    Science.gov (United States)

    2009-05-01

    themselves isolated with great autonomy and no The Advisor 1 May 2009 FM 3-07.1 7-3 supervision. These conditions present moral and ethical dilemmas daily...Group 8-59. Cultures may be individualistic or collectivist in their orientation. An individualist culture is one in which the ties between...individuals are loose—where people are expected to take care of themselves and their immediate families. In a collectivist culture, people are raised from

  17. Institutionalizing Security Force Assistance

    Science.gov (United States)

    2008-05-19

    long before current conflicts developed. An Australian Armoured [sic] Corps Officer with experience in both the Solomon Islands and Iraq noted...and the national level policy. Despite some turnover and changes among the senior military and civilian leadership, the underlying tone has not

  18. Allegiance: Egypt Security Forces

    Science.gov (United States)

    2013-12-01

    Sadat began a policy of economically opening Egypt to the West which led to mandatory subsidy reductions on cooking fuel, rice , bread and other...by a distance from one another. The Emergency Law was not violated, but protestors could look around and see others wearing a black or white shirt...expected after the uprising of 2011 never truly materialized; the Interior Ministry instituted various cosmetic changes, but its basic construct and

  19. Molecular Characterization of Rotavirus Gastroenteritis Strains, Iraqi Kurdistan

    Science.gov (United States)

    Ahmed, Herish M.; Coulter, J. Brian S.; Nakagomi, Osamu; Zaki, Jamal M.; Al-Rabaty, Abas A.; Dove, Winifred; Cunliffe, Nigel A.

    2006-01-01

    Of 260 children with acute diarrhea in Erbil, Iraqi Kurdistan, 96 (37%) were infected with rotavirus. Reverse transcription–polymerase chain reaction identified G1, G4, G2, G9, P[8], P[6], and P[4] as the most common genotypes. Eight G/P combinations were found, but P[8]G1 and P[4]G2 accounted for >50% of the strains. PMID:16704845

  20. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  1. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 4 (Redacted)

    Science.gov (United States)

    2007-11-01

    destroy the residence of the US Ambassador in Jakarta, Japanese Embassy and American Airlines in Philippines 2 CMPC-2003-000 17015 2 Production and...used to seek a number oftargets like (The Iraqi Communist Party Headquarters, assassinating some ofP.K.K members, blowing up Dilshad Cinema ) where...Sulaymaniyyah like Dilshad Cinema , a Casino in (Illegible) Subdivision and a media whole. 4- They issued the first declaration threatening the Secularism

  2. State Control over Private Military and Security Companies in Armed ...

    African Journals Online (AJOL)

    NWUuser

    State Control over Private Military and Security Companies in Armed Conflict by H Tonkin ... (US) in the Iraqi theatre by 2007 exceeded the number of US troops, and in 2010 .... due diligence to promote PMSC compliance therewith. ... relying on existing accountability frameworks of international law, new domestic and.

  3. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  4. 76 FR 73022 - Agency Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-11-28

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... No. 2900-0720.'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom... used VA Form 21-0773 as a checklist to ensure they provided Operation Enduring Freedom or Operation...

  5. Securing Healthcare’s Quantified-Self Data: A Comparative Analysis Versus Personal Financial Account Aggregators Based on Porter’s Five Forces Framework for Competitive Force

    Science.gov (United States)

    2016-09-01

    PORTER’S FIVE FORCES FRAMEWORK FOR COMPETITIVE FORCES Catherine H. Chiang Management Program Analyst, United States Citizenship and Immigration...2009): 454–66, doi:10.1377/hlthaff.28.2.454. 34 Catherine L. Anderson and Ritu Agarwal, “The Digitization of Healthcare: Boundary Risks, Emotion...allows patterns of distinctive characteristics to be tracked. As more behaviors are digitized , these unique characteristics could easily be used to

  6. Viability of the ground of Shithatha, western Iraqi plateau, for industrial and commercial uses via hydrochemistry analysis

    Science.gov (United States)

    Al-Qaraghuli, S. A.

    2017-08-01

    Iraqi western plateau is considered as one of the most resourceful areas of the middle east, that is not yet well explored, due to the many political disturbances and security issues. The viability of underground water for the various industrial, municipal, commercial and agricultural uses is examined for Shithatha, Karbala governorates as a representative for the western plateau via chemical and physical analysis of water samples that are taken from 9 wells and 3 springs all-around the study area during the wet and dry periods. Hydro chemical and statistical analysis for the field samples have proved that groundwater of the studied area is classified as slightly-brackish water and water hardness is very high. Also, the results of the analyses of trace elements in the groundwater of the study area have confirmed the contamination of groundwater with some elements such as (Fe, Cd, Pb, Ni) in concentrations that have exceeded the WHO and Iraqi national standards IQS, permissible limits. The application of Hydro-chemical formulae of Kurlouv and Piper, Schoeller, Stiff classifications have demonstrated that most samples of the study area have water type of (Na2SO4) while other samples have ranged between (MgSO4), and (NaCl) water type. The quality of groundwater is unsuitable for drinking and industrial purposes and it is almost suitable for irrigation purposes, but it is suitable for livestock, building and agricultural purposes because the salinity of the water is within the permissible limits when considering the nature of the soil.

  7. Archaeological Documentation of a Defunct Iraqi Town

    Science.gov (United States)

    Šedina, J.; Pavelka, K.; Housarová, E.

    2016-06-01

    The subject of this article is the possibilities of the documentation of a defunct town from the Pre-Islamic period to Early Islamic period. This town is located near the town Makhmur in Iraq. The Czech archaeological mission has worked at this dig site. This Cultural Heritage site is threatened by war because in the vicinity are positions of ISIS. For security reasons, the applicability of Pleiades satellite data has been tested. Moreover, this area is a no-fly zone. However, the DTM created from stereo-images was insufficient for the desired application in archeology. The subject of this paper is the testing of the usability of RPAS technology and terrestrial photogrammetry for documentation of the remains of buildings. RPAS is a very fast growing technology that combines the advantages of aerial photogrammetry and terrestrial photogrammetry. A probably defunct church is a sample object.

  8. ARCHAEOLOGICAL DOCUMENTATION OF A DEFUNCT IRAQI TOWN

    Directory of Open Access Journals (Sweden)

    J. Šedina

    2016-06-01

    Full Text Available The subject of this article is the possibilities of the documentation of a defunct town from the Pre-Islamic period to Early Islamic period. This town is located near the town Makhmur in Iraq. The Czech archaeological mission has worked at this dig site. This Cultural Heritage site is threatened by war because in the vicinity are positions of ISIS. For security reasons, the applicability of Pleiades satellite data has been tested. Moreover, this area is a no-fly zone. However, the DTM created from stereo-images was insufficient for the desired application in archeology. The subject of this paper is the testing of the usability of RPAS technology and terrestrial photogrammetry for documentation of the remains of buildings. RPAS is a very fast growing technology that combines the advantages of aerial photogrammetry and terrestrial photogrammetry. A probably defunct church is a sample object.

  9. 78 FR 32241 - U.S. Air Force Seeks Industry Input for National Security Space Launch Assessment

    Science.gov (United States)

    2013-05-29

    ..., seeks industry views and perspectives to inform an on-going strategic National Security Space Launch... the U.S. Government. 2. What are the critical issues that concern current and prospective launch...

  10. Corruption in the Kenya Police Force and Impacts on Kenyan Security: Investigating the Need for Police Reforms

    Science.gov (United States)

    2017-03-21

    been using the police culture, philosophy , and organization structure in the Police Service based on the British colonial security system. Such...reflects on the police corruption that wreaks the moral authority of law enforcement; thus, undermining the public trust and confidence in the law...economic growth emphasized in the Kenya’s vision 2030. Since independence, Kenya’s security structure, philosophy , and systems have been inherited and

  11. Struggling for sense of control: everyday life with chronic pain for women of the Iraqi diaspora in Sweden.

    Science.gov (United States)

    Zander, Viktoria; Müllersdorf, Maria; Christensson, Kyllike; Eriksson, Henrik

    2013-12-01

    As dispersed ethnic populations in Swedish society expand, the healthcare system need to adapt rehabilitation services according to their needs. The experiences of trauma and forced resettlement have a continuing impact on health and musculoskeletal pain, as well as the intersecting structures that prerequisite the possibilities in the new country. To understand the specific needs of women from the Iraqi diaspora in Sweden, there is a need to elucidate the effects of pain on their everyday life. To elucidate everyday life with chronic pain from the perspective of women from the Iraqi diaspora in Sweden. Qualitative interview study according to Glaser's grounded theory. The results from 11 interviews suggest that pain was associated with dependency on society as well as on family. It resulted in a struggle for sense of control, framed by faith in God, influenced by the healthcare system, and with support from family. The women's testimony of lack of continuity of care, resulting in recollection of lived traumas in every visit, is a vital sign of the unconscious power relations within health care and how representatives from health care, instead of being the ones who help the women forward, become the ones who hold them back. The results show the importance of challenging the normative assumptions embedded in health care and treatment for patients with chronic pain and of including the voice of "others".

  12. Effect of gamma irradiation on sugars from Iraqi dates

    Energy Technology Data Exchange (ETDEWEB)

    Jaddou, H; Al-Hakim, M; Mhaisen, M D [Iraq Atomic Energy Commission, Baghdad. Nuclear Research Inst.

    1981-01-01

    The possibility of using gamma-irradiation for date preservation had been considered as an alternative method to fumigation. Two varieties of Iraqi dates (Zahdi and Sayer) had been used in the study, and three doses of 50, 100 and 150 krads. A combination of treatments of heat plus irradiation were also applied and tests were conducted at three maturation stages. Gas chromatographic analysis was used to fractionate sugars from dates after converting to their TMS - ether derivatives. No qualitative or quantitative changes were observed in sugar components in either Zahdi or Sayer dates within the doses used in the experiments.

  13. Special Inspector General for Iraq Reconstruction

    National Research Council Canada - National Science Library

    2008-01-01

    .... assistance, the strengthening of Iraq's security forces, evident in the recent transfer of security responsibilities in Anbar and Babylon to Iraqi control, the incremental improvement in essential...

  14. Environmental Assessment: Conversion of the 820th Security Forces Group at Moody AFB, Georgia to a Contingency Response Group

    Science.gov (United States)

    2003-08-01

    Contingency Response Group (CRG) at Moody Air Force Base (AFB), GA . DESCRIPTION OF THE PROPOSED ACTION AND ALTERNATIVES. The United States Air Force...sinkhole formation. 3.5.3.3 Soils Moody AFB Moody AFB is located in the Tifton Upland District of the Lower Coastal Plain. In general, soils on...base. Arsenic, barium, chromium, copper, iron, selenium, and zinc have been found to be naturally occurring in the area. Predominant soils are Tifton

  15. Female genital mutilation in Iraqi Kurdistan: description and associated factors.

    Science.gov (United States)

    Saleem, Rozhgar A; Othman, Nasih; Fattah, Fattah H; Hazim, Luma; Adnan, Berivan

    2013-01-01

    The high prevalence of female genital mutilation has been a concern in Iraqi Kurdistan. This study was undertaken to estimate its prevalence and describe factors associated with its occurrence. A cross-sectional survey was undertaken from March to April 2011 of females aged up to 20 years using interviews and clinical examination. The survey included 1,508 participants with mean age of 13.5 years (SD 5.6). Overall female genital mutilation prevalence was 23%, and the mean age at which it had been performed was 4.6 years (SD 2.4). Type I (partial or total removal of the clitoris) comprised 76% of those who had had female genital mutilation; in 79% of cases the decision to perform it was made by the mother; and in 54% of cases it was performed by traditional birth attendants/midwives. Women aged 16 years and over were more likely to have had female genital mutilation compared to children aged below 6 years (OR 11.9, p Kurdistan region were more likely to have been circumcised. The study results show that female genital mutilation is a frequent practice in Iraqi Kurdistan. Attention and intervention is needed to address this aspect of the well-being of girls and women.

  16. The Military Use of Children by the Syrian-Iraqi Salafi-Jihadist Group

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2017-01-01

    Full Text Available Non-state armed groups are the main threats to states’ national security in the 21st century, to defend against which, states require useful methods. Recently, use of children by these groups, especially in the Middle East, has turned into one of the most important discussable issues that need to be evaluated in the context of the law of armed conflict. This study aims to discuss legal regime of the military use of children in armed conflict. The main purpose of the study is to analyze the use of child soldiers by the Syrian-Iraqi Salafi-Jihadist Group in its combat operations. In this respect, initially, the legal definition of child soldiers and the role of them in armed conflicts will be discussed. Based on this, different forms of the child soldiers’ involvement in armed conflicts and the international criminal responsibility for their war crimes will be examined as an applicable law in the context of international criminal law.

  17. Development a Teaching Methods using a Cloud ‎Computing Technology in Iraqi Schools ‎

    Directory of Open Access Journals (Sweden)

    Thair A. Kadhim

    2018-02-01

    Full Text Available The current state of education is mostly electronic. Factors such as servers, storage space, and software are more prominent than ever before. Cloud Computing is defined as an Internet-based computing space that allows its users to share resources, software and information. In the context of Iraq, increased educational spending has not translated into improved learning environments. This work intends to increase the efficiency of education in Iraq through reviewing the characteristics associated with cloud computing providers, such as Microsoft, Google and Amazon, in the context of enhancing the advantages to students, teachers, and other stakeholders. The work will also try to determine approaches that offered rich and affordable services and tools through posing a suitable Cloud Computing Model for Iraqi Schools (CCIS. This particular model is made up of three major parts; preparation, implementation and monitoring, and evaluating and reviewing. The CCIS model combines public and private clouds in the provision of multiple services to the students and enables the formation of links outside of schools. Problems associated with security and data privacy are quite low and under control in this model, as they are defended beyond firewalls alongside remote services, scalability, low costs, efficiency, and functional plug and play options. This study will also decrease the challenges faced by the model internally and externally via constant appraisals and review.

  18. Lift force fluctuations of magnetically levitated vehicles with an integrated synchronous linear motor and their significance for the technical security

    Energy Technology Data Exchange (ETDEWEB)

    Mnich, P; Huebner, K D

    1980-07-15

    In this paper the influence of the motor current on the magnetic force is investigated by an analytical method. With the integrated synchronous linear motor the reactions of the current sheet on the excitation field are depending on the pole angle and the amplitude of the current sheet. For an undisturbed operation - current sheet and induction wave in phase - the influence of the motor current on the magnetic force can be neglected. In case of a disturbed performance, i.e. when the pole angle is changing periodically, fluctuations of the magnetic force will be found. This effect has to be compensated by a reserve magnetic force in the levitation control. With the technical data for the new magnetic levitation pilots plants (International Traffic Fair 1979 at Hamburg and Transrapid - Pilot Plant Emsland) the stated relations are evaluated. Approximated relations for the levitation force are derived. For comparison, a finite-difference computer programme from the 'Institut fuer elektrische Maschinen, Antriebe und Bahnen, Technische Universitaet Braunschweig' is applied. The approximated relations developed in this paper are verified - with a sufficient precision - by the numerical calculations.

  19. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  20. The Visiting Forces Agreement (VFA in the Philippines: Insights on Issues of Sovereignty, Security and Foreign Policy

    Directory of Open Access Journals (Sweden)

    Mark Anthony M. Velasco

    2015-11-01

    Full Text Available The study intends to compare the Visiting Forces Agreement (VFA between the Philippines and the United States of America and the VFA between the Philippines and Australia. The research piece is arranged in the following flow of ideas. The first and the second part provides the foundations by highlighting issues on definition, historical background, provisions of the agreement and concerns faced by the agreement of the Visiting Forces Agreement (VFA between the Republic of the Philippines and the United States of America and the Status of the Visiting Forces Agreement (SOVFA between the Republic of the Philippines and Australia. The third part is an analysis of the VFA and the SOVFA under the tutelage of the framework on the non-intervention principle. As a result, the provisions of SOVFA were in consonance with the legal arrangement in the Philippines than the VFA with the United States of America.

  1. Culture Wars: Air Force Culture and Civil-Military Relations

    Science.gov (United States)

    2013-08-01

    organizations such that new policies or foreign procedures can appear threatening. In their studies of bureaucracies and policy making, Mor- ton Halperin and...evict Iraqi forces from Kuwait.29 As historians Michael Gordon and Bernard Trainor observe, “The lineup ran counter to what most of the public would

  2. Iraqi nuclear weapons development program. Final report, October 1, 1992--September 30, 1993

    International Nuclear Information System (INIS)

    1993-01-01

    This is an abstract of the final report focusing on the collection, collation, analysis, and recording of information pertaining to Iraqi nuclear weapons development and on the long term monitoring of Iraq

  3. Healthcare Access for Iraqi Refugee Children in Texas: Persistent Barriers, Potential Solutions, and Policy Implications.

    Science.gov (United States)

    Vermette, David; Shetgiri, Rashmi; Al Zuheiri, Haidar; Flores, Glenn

    2015-10-01

    To identify access barriers to healthcare and potential interventions to improve access for Iraqi refugee children. Four focus groups were conducted using consecutive sampling of Iraqi refugee parents residing in the US for 8 months to 5 years. Eight key-informant interviews also were conducted with employees of organizations serving Iraqi refugee families, recruited using snowball sampling. Focus groups and interviews were audiotaped, transcribed, and analyzed using margin coding and grounded theory. Iraqi refugees identified provider availability, Medicaid maintenance and renewal, language issues, and inadequate recognition of post-traumatic stress disorder as barriers to care for their children. Interviewees cited loss of case-management services and difficulties in understanding the Medicaid renewal process as barriers. Potential interventions to improve access include community-oriented efforts to educate parents on Medicaid renewal, obtaining services, and accessing specialists. Given the enduring nature of language and Medicaid renewal barriers, policies addressing eligibility alone are insufficient.

  4. A Medical Logistics Officer Training Needs Assessment Utilizing Feedback from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    Waddick, James L

    2004-01-01

    ... their missions during the initial Operation Iraqi Freedom deployment (OIF 1). Additionally, the study sought to identify the potential benefit of additional training on key medical logistics tasks and training events...

  5. Why the Iraqi Resistance to the Coalition Invasion Was so Weak

    National Research Council Canada - National Science Library

    Hosmer, Stephen T

    2007-01-01

    .... Drawing upon information derived primarily from interviews with former senior Iraqi civilian and military officials, this monograph focuses on two questions relating to the rapidity and ease of that victory: (1...

  6. Unwanted Guests: The Impact of Iraqi Refugees on Jordan’s Economy

    Science.gov (United States)

    2014-06-13

    The International Crisis Group, a non-governmental organization, interviewed Iraqi refugees in 2007 and reported a number of instances of harassment ...process: Before they can be legally employed, Iraqi refugees must obtain a work permit from the Ministry of Labour . To be eligible for a work permit...Minister of the Interior and the Minister of Labour , respectively. Jordanian law also requires potential employers to provide a litany of documents and

  7. The stakes of iraqi petroleum: what is the role of France ?

    International Nuclear Information System (INIS)

    Sarkis, N.

    1995-01-01

    This work deals with some socio-economic and political aspects about the stakes of iraqi petroleum for France. After having described the history of iraqi petroleum, the author gives the estimation of the actual petroleum reserves, the production objective, the petroleum and gaseous projects and the exporting way. Then is given the economic and political role played by France: the increase of importation uses, the economic interests and the political responsibility. (O.L.). 10 tabs

  8. Air Force Military Personnel Entitlement Pay in Support of Contingency Operations

    Science.gov (United States)

    2010-08-23

    Report No. A-2006-0067- FFM , “Military Pay for Operation Enduring Freedom/Operation Iraqi Freedom Active Components,” April 5, 2006 U.S. Army Audit...Agency Report No. A-2006-0079- FFM , “Material Weakness Closeout on Line of Duty and Incapacitation Pay,” March 8, 2006 22B22BAir Force Air Force

  9. Burden of typhoid fever in Sulaimania, Iraqi Kurdistan.

    Science.gov (United States)

    Dworkin, Jonathan; Saeed, Rebeen; Mykhan, Hawar; Kanan, Shwan; Farhad, Dlawer; Ali, Kocher Omer; Abdulwahab, Runak Hama Kareem; Palardy, John; Neill, Marguerite A

    2014-10-01

    Typhoid fever imposes a high disease burden worldwide, but resource limitations mean that the burden of typhoid fever in many countries is poorly understood. The authors conducted a prospective surveillance study at the adult and pediatric teaching hospitals in Sulaimania, Iraqi Kurdistan. All patients presenting with an undifferentiated febrile illness consistent with typhoid were eligible for enrollment. Enrolled patients had blood cultures and Brucella serologies performed. Incidence was calculated with reference to census data. Both typhoid fever and brucellosis were common, and the incidence of typhoid fever was 21 cases/100 000 patient-years. Classic disease symptoms were uncommonly observed. Cost-effective surveillance projects to calculate disease burden of typhoid fever are practical and replicable. Typhoid has successfully adapted to the healthcare environment in Sulaimania. Additional work in the region should focus on antibiotic resistance and other enteric pathogens such as Brucella spp. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  10. Predictors of Coping Strategies Employed by Iraqi Refugees in Jordan.

    Science.gov (United States)

    Al-Smadi, Ahmed Mohammad; Tawalbeh, Loai Issa; Gammoh, Omar Salem; Ashour, Ala; Alzoubi, Fatmeh Ahmad; Slater, Paul

    2017-10-01

    The purpose of this study was to examine coping strategies used by Iraqi refugees in Jordan based on their demographic details. A cross-sectional design was used. A representative sample of 333 refugees living in Jordan participated in the study. The Cope inventory and the demographic details were compiled to produce and collate the relevant data. Being older, female, educated, single, and living with more than three family members was associated with greater use of the problem solving coping strategy. Being female, educated, and unemployed was associated with greater use of the active emotional coping strategy. In addition, being older, male, illiterate, unemployed, and living with less than three family members was associated with greater use of the avoidant emotional coping strategy. This study recommends a multidisciplinary approach intervention as being the best method of addressing and fulfilling the health and socioeconomic needs of older, male, illiterate, unemployed people.

  11. Regionalizing Immigration, Health and Inequality: Iraqi Refugees in Australia

    Directory of Open Access Journals (Sweden)

    Lenore Manderson

    2012-01-01

    Full Text Available Humanitarian immigrants and refugees face multiple adjustment tasks and post-settlement support services concentrated in metropolitan areas play an important role. As part of an ongoing commitment, the Australian Government has increasingly supported resettlement in rural and regional areas of the country. Drawing on the experience of Iraqi migrants in Victoria, Australia, we examine some of the conditions that characterize regional resettlement and raise key questions for public health policy. Structural vulnerabilities and discriminations impact upon physical, mental and social wellbeing, leading to further exclusion, with negative long-term implications. The discussion throws light on the issues that migrants and refugees may encounter in other parts within Australia, but are also germane in many countries and highlight the resulting complexity for policy-making.

  12. Partners of Choice and Necessity: Special Operations Forces and the National Security Imperatives of Building Partner Capacity

    Science.gov (United States)

    2015-05-21

    intersection of complexity, social interaction, political violence, and military force. Lastly, I owe a tremendous debt to my wife and family for giving me the...space to pursue these intellectual endeavors while “taking a break” from deployment. In partial payment of that debt , I promise not to mention any...Going Big by Getting Small (Denver, CO: Outskirts Press), 162-163. 12 liberalism.19 From the Greek civil war of the late 1940s to the modern

  13. The Impacts of Liquidity on Profitability in Banking Sectors of Iraq: A Case of Iraqi Commercial Banks.

    OpenAIRE

    Sardar Shaker Ibrahim

    2017-01-01

    This study examines the influence of liquidity on the profitability of Iraqi commercial banks. Five banks based in Iraq namely: North bank, Iraqi Islamic bank, Sumer bank, Dar Es-Salam bank and Babylon bank randomly selected and analyzed for the current study over the period 2005 to 2013. Moreover,  annual reports of these banks have studied and the main ratios of profitability and liquidity were calculated. These reports are available at Iraqi Stock Exchange site. The variables that were ide...

  14. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    International Nuclear Information System (INIS)

    Arzino, P.A.; Brown, C.H.

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs

  15. Medical screening reference manual for security force personnel at fuel cycle facilities possessing formula quantities of special nuclear materials

    Energy Technology Data Exchange (ETDEWEB)

    Arzino, P.A.; Brown, C.H. (California State Univ., Hayward, CA (United States). Foundation)

    1991-09-01

    The recommendations contained throughout this NUREG were provided to the Nuclear Regulatory Commission (NRC) as medical screening information that could be used by physicians who are evaluating the parameters of the safe participation of guards, Tactical Response Team members (TRTs), and all other armed response personnel in physical fitness training and in physical performance standards testing. The information provided in this NUREG will help licensees to determine if guards, TRTs, and other armed response personnel can effectively perform their normal and emergency duties without undue hazard to themselves, to fellow employees, to the plant site, and to the general public. The medical recommendations in this NUREG are similar in content to the medical standards contained in 10 CFR Part 1046 which, in part, specifies medical standards for the protective force personnel regulated by the Department of Energy. The guidelines contained in this NUREG are not requirements, and compliance is not required. 3 refs.

  16. Joining forces for food security - Linking earth observation and crowd-sourcing for improved decision-support to aid organizations

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Pham, P.

    2013-12-01

    Droughts statistically exceed all other natural disasters in spatio-temporal extent, number of people affected or financial loss. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. Consequently, this study is focused on two complementary developments - a new satellite-derived agricultural drought index and a mobile phone application. The Combined Drought Index (CDI) is enhanced by replacing field measurements of temperature and rainfall modelled/assimilated data. The vegetation component is replaced by a smoothed NDVI dataset. A soil moisture component is introduced to close the gap between rainfall deficiencies and the first visible impacts of atmospheric anomalies on vegetation. The mobile phone application enables the validation of drought index outputs and gives aid organizations an opportunity to increase the speed of socio-economic vulnerability assessments. Supported by Doctors without Borders (MSF) this approach aims at decreasing uncertainties in decision-making via a more holistic risk framework.

  17. Security Force Assistance and Security Sector Reform

    Science.gov (United States)

    2013-09-01

    regional trade, on the region’s tourism and fish- ing industries, and on food prices.”42 Other ungoverned maritime territory attractive to illicit...Verde, Mali, Benin, Togo, and Ghana. Drugs from Colombia and Peru , which often transit through Brazil, are shipped across the Atlantic and enter...intrastate struggles that pitted ideological movements against regimes they sought to change. These included Sendero Luminoso in Peru , the Farabundo

  18. Prevalence of dyslipidemia in the Iraqi adult population

    International Nuclear Information System (INIS)

    Mula-Abed, Waad-Allah S.; Chilmeran, Saba K.

    2007-01-01

    Objective was to establish the prevalence of dyslipidemia in the Iraqi adult population in Mosul, according to the different recommended criteria. The study was carried out from October 2003 to April 2004, with 871 apparently healthy volunteers (413 males, 458 females) aged 20-70 year ([mean+- SD] 41.2+-13.8 year). Fasting blood specimens were collected from all subjects for measurement of serum lipid profile including triglycerides (TG), total cholesterol (TC), high density lipoprotein-cholesterol (HDL-C), low density lipoprotein-cholesterol (LDL-C), and ratios of cholesterol such as TC:HDL-C, LDL-C:HDL-C, and TG:HDL-C. Classification was carried out according to the different cut-off levels as recommended by the 2001 American National Cholesterol Education Program (NCEP) III using thresholds of TG>150mg/dl (2.0 mmol/L), LDL-C>100 mg/dl (2.6 mmol/L), LDL-C 130mg/dl (3.37 mmol/L). The criteria of the 1998 British Hyperlipidemia Association (BHA) were also followed using thresholds of TG>180mg/dl (2.4mmol/L), TC>194mg/dl (5.0 mmol/L), LDL-C>116mg/dl (3.0mmol/L), HDL-C 5.0, HDL-C: DL-C>2.5 and TG: HDL-C>3.0. Based on the American NCEPIII criteria, the dyslipidemic states were noted with high TG (41.6%), high LDL-C (57.8%), low HDL-C (49.9%) and high HDL-C (57.8%), low HDL-C (49.9%) and high non-HDL-C (56.8%) from the subjects. Based on BHA criteria, high TG24.5%), high TC (32.7%), high HDL-C (37.8%), high TC: HDL-C (30.9%), high LDL-C HDL-C (55.7%) and high TG: HDL-C (58.3%) were noted. Dyslipidemia is common in Iraqi population, and this was identified at different recommendation criteria. (author)

  19. Prevalence of dyslipidemia in the Iraqi adult population

    Energy Technology Data Exchange (ETDEWEB)

    Mula-Abed, Waad-Allah S [Dept. of Chemical Pathology, Royal Hospital, Muscat (Oman); Chilmeran, Saba K [Dept. of Biochemistry, College of Medicine, Univ. of Mosul (Iraq)

    2007-07-01

    Objective was to establish the prevalence of dyslipidemia in the Iraqi adult population in Mosul, according to the different recommended criteria. The study was carried out from October 2003 to April 2004, with 871 apparently healthy volunteers (413 males, 458 females) aged 20-70 year ([mean+- SD] 41.2+-13.8 year). Fasting blood specimens were collected from all subjects for measurement of serum lipid profile including triglycerides (TG), total cholesterol (TC), high density lipoprotein-cholesterol (HDL-C), low density lipoprotein-cholesterol (LDL-C), and ratios of cholesterol such as TC:HDL-C, LDL-C:HDL-C, and TG:HDL-C. Classification was carried out according to the different cut-off levels as recommended by the 2001 American National Cholesterol Education Program (NCEP) III using thresholds of TG>150mg/dl (2.0 mmol/L), LDL-C>100 mg/dl (2.6 mmol/L), LDL-C<40mg/dl (1.04mmol/L) and non-HDL-C>130mg/dl (3.37 mmol/L). The criteria of the 1998 British Hyperlipidemia Association (BHA) were also followed using thresholds of TG>180mg/dl (2.4mmol/L), TC>194mg/dl (5.0 mmol/L), LDL-C>116mg/dl (3.0mmol/L), HDL-C<45mg/dl (1.15mmol/L), TC: HDL-C>5.0, HDL-C: DL-C>2.5 and TG: HDL-C>3.0. Based on the American NCEPIII criteria, the dyslipidemic states were noted with high TG (41.6%), high LDL-C (57.8%), low HDL-C (49.9%) and high HDL-C (57.8%), low HDL-C (49.9%) and high non-HDL-C (56.8%) from the subjects. Based on BHA criteria, high TG24.5%), high TC (32.7%), high HDL-C (37.8%), high TC: HDL-C (30.9%), high LDL-C HDL-C (55.7%) and high TG: HDL-C (58.3%) were noted. Dyslipidemia is common in Iraqi population, and this was identified at different recommendation criteria. (author)

  20. Forced Shortsightedness: Security Force Assistance Missions

    Science.gov (United States)

    2014-06-01

    accomplished something no other al-Qaeda franchise has ever been able to pull off: conquering and governing a broad swath of a sovereign country, then...marginalized and disadvantaged .”58 Boko Haram has capitalized on the increasing north-south divide and subsequently has increased the frequency and...groups.”70 VENs, such as AQIM and Boko Haram, are internal threats competing for victory over the people and taking advantage of the lack of

  1. Toward improved software security training using a cyber warfare opposing force (CW OPFOR): the knowledge base design

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2005-03-01

    "Train the way you will fight" has been a guiding principle for military training and has served the warfighter well as evidenced by numerous successful operations over the last decade. This need for realistic training for all combatants has been recognized and proven by the warfighter and continues to guide military training. However, to date, this key training principle has not been applied fully in the arena of cyberwarfare due to the lack of realistic, cost effective, reasonable, and formidable cyberwarfare opponents. Recent technological advances, improvements in the capability of computer-generated forces (CGFs) to emulate human behavior, and current results in research in information assurance and software protection, coupled with increasing dependence upon information superiority, indicate that the cyberbattlespace will be a key aspect of future conflict and that it is time to address the cyberwarfare training shortfall. To address the need for a cyberwarfare training and defensive testing capability, we propose research and development to yield a prototype computerized, semi-autonomous (SAF) red team capability. We term this capability the Cyber Warfare Opposing Force (CW OPFOR). There are several technologies that are now mature enough to enable, for the first time, the development of this powerful, effective, high fidelity CW OPFOR. These include improved knowledge about cyberwarfare attack and defense, improved techniques for assembling CGFs, improved techniques for capturing and expressing knowledge, software technologies that permit effective rapid prototyping to be effectively used on large projects, and the capability for effective hybrid reasoning systems. Our development approach for the CW OPFOR lays out several phases in order to address these requirements in an orderly manner and to enable us to test the capabilities of the CW OPFOR and exploit them as they are developed. We have completed the first phase of the research project, which

  2. Brief narrative exposure therapy for posttraumatic stress in Iraqi refugees: a preliminary randomized clinical trial.

    Science.gov (United States)

    Hijazi, Alaa M; Lumley, Mark A; Ziadni, Maisa S; Haddad, Luay; Rapport, Lisa J; Arnetz, Bengt B

    2014-06-01

    Many Iraqi refugees suffer from posttraumatic stress. Efficient, culturally sensitive interventions are needed, and so we adapted narrative exposure therapy into a brief version (brief NET) and tested its effects in a sample of traumatized Iraqi refugees. Iraqi refugees in the United States reporting elevated posttraumatic stress (N = 63) were randomized to brief NET or waitlist control conditions in a 2:1 ratio; brief NET was 3 sessions, conducted individually, in Arabic. Positive indicators (posttraumatic growth and well-being) and symptoms (posttraumatic stress, depressive, and somatic) were assessed at baseline and 2- and 4-month follow-up. Treatment participation (95.1% completion) and study retention (98.4% provided follow-up data) were very high. Significant condition by time interactions showed that those receiving brief NET had greater posttraumatic growth (d = 0.83) and well-being (d = 0.54) through 4 months than controls. Brief NET reduced symptoms of posttraumatic stress (d = -0.48) and depression (d = -0.46) more, but only at 2 months; symptoms of controls also decreased from 2 to 4 months, eliminating condition differences at 4 months. Three sessions of brief NET increased growth and well-being and led to symptom reduction in highly traumatized Iraqi refugees. This preliminary study suggests that brief NET is both acceptable and potentially efficacious in traumatized Iraqi refugees. Copyright © 2014 International Society for Traumatic Stress Studies.

  3. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  4. Greening Existing Buildings in Contemporary Iraqi Urban Reality/ Virtual Model

    Directory of Open Access Journals (Sweden)

    Saba Jabar Neama Al-Khafaji

    2015-11-01

    Full Text Available The approach of greening existing buildings, is an urgent necessity, because the greening operation provides the speed and optimal efficiency in the environmental performance, as well as keeping up with the global green architecture revolution. Therefore, greening existing buildings in Iraq is important for trends towards renewable energies, because of what the country went through economic conditions and crises and wars which kept the country away from what took place globally in this issue. The research problem is: insufficient knowledge about the importance and the mechanism of the greening of existing buildings, including its environmental and economic dimensions, by rationalization of energy consumption and preserving the environment. The research objective is: clarifying the importance of greening existing buildings environmentally and economically, providing a virtual experience for greening the presidency building of Baghdad University, through advanced computer program. The main conclusions is: there is difference representing by reducing the disbursed thermal loads amount for cooling in summer and heating in winter through the use of computerized program (DesignBuilder and that after the implementation of greening operations on the building envelope, which confirms its effectiveness in raising the energy performance efficiency inside the building. Hence, the importance of the application of greening existing buildings approach in Iraq, to bring back Iraqi architecture to environmental and local track proper.

  5. Bulk Electric Load Cost Calculation Methods: Iraqi Network Comparative Study

    Directory of Open Access Journals (Sweden)

    Qais M. Alias

    2016-09-01

    Full Text Available It is vital in any industry to regain the spent capitals plus running costs and a margin of profits for the industry to flourish. The electricity industry is an everyday life touching industry which follows the same finance-economic strategy. Cost allocation is a major issue in all sectors of the electric industry, viz, generation, transmission and distribution. Generation and distribution service costing’s well documented in the literature, while the transmission share is still of need for research. In this work, the cost of supplying a bulk electric load connected to the EHV system is calculated. A sample basic lump-average method is used to provide a rough costing guide. Also, two transmission pricing methods are employed, namely, the postage-stamp and the load-flow based MW-distance methods to calculate transmission share in the total cost of each individual bulk load. The three costing methods results are then analyzed and compared for the 400kV Iraqi power grid considered for a case study.

  6. Eghterab’ in Iraqi Emigrants\\' Poetry: The Case of Ahmad Matar

    Directory of Open Access Journals (Sweden)

    سید عدنان اشکوری

    2009-12-01

    Full Text Available ‘Eghterab’ in Iraqi Emigrants' Poetry: The Case of Ahmad Matar    Jafar Delshad *  Seyyed Adnan Eshkewaree **    Abstract  The word ‘eghterab’ in human sciences has different concepts which could be classified into three groups: 1 Westernization and tending to western culture or being alien with eastern authenticity 2 nostalgia and homesickness caused by being away from his/her motherhood land and hometown. Most of this group of poets are emigrants or are in exile and 3 having the sense of nostalgia but being in home country. It means that this group of poets have very high ideals which no one in their homeland can take and bare these ideals. The poet perceives that ideals which are essential for him/her are higher than the society in which he/she lives can grasp. This essay makes an attempt to study the various concepts of ‘eghterab’ by focusing on Ahmad Matar as a prominent poet with regard to the third concept and deal with the third concept of Eghterab from three points of view: political, social and spiritual. This article examines some samples of these three parts in Ahmad Matar's poetry.    Key words: nostalgia, poetry, emigration, Ahmad Matar, Iraq   * Assistant Professor, Department of Arabic Language and Literature, University of IsfahanE-mail: delshad@fgn.ui.ir  ** Assistant Professor, University for Teacher Training, E-mail: eshkewaree@yahoo.com.

  7. Mobile recommender application for promoting electricity saving among Iraqis

    Science.gov (United States)

    Sabri, Manhal Isam; Hussain, Azham

    2017-10-01

    Mobile utilization has rapidly expanded due to its feasibility in executing different applications that can be used in solving everyday problems. Common issues in daily life include electricity saving. In Iraq, the Ministry of Power seriously faces such issue. This is because most households have lack access to information regarding to sufficient power consumption, as well as applications that educate about such saving. Therefore, this study aims at developing a mobile application for Iraqi to help them understand the basis for reducing electricity consumption based on the meter data supplied by the users for square meter along with the active devices and period of usage. The proposed mobile application was evaluated by 50 households from the perspective of ease of use, usefulness, ease of learning, and satisfaction. The obtained result showed that majority of the participants found the application to be ease to use, useful, easy to learn, and were satisfied with its functionalities. The study findings provide some insights about the importance of using mobile application for promoting households in Iraq to manage their power consumption behavior.

  8. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  9. The Iraqi civil registration system and the test of political upheaval

    Directory of Open Access Journals (Sweden)

    Sulaiman Bah

    2014-04-01

    Full Text Available An in-depth situation analysis was carried out on the Iraqi civil registration system in 2011, years after the end of the military operation of 2003. The study was done using a combination of methods, including interviews with key role players in the Iraqi civil registration system, observation, study of documents, triangulation, and gap analysis. The study found the civil registration system in Iraq to be largely intact and functional, in spite of the wars experienced in Iraq over the past three decades. Given that civil registration systems generally get destroyed through wars, the paper discusses the reasons for the resilience in the Iraqi civil registration system and draws lessons from them.

  10. Anxiety, stress, and quality of life among Iraqi refugees in Jordan: A cross sectional survey.

    Science.gov (United States)

    Al-Smadi, Ahmed Mohammad; Tawalbeh, Loai Issa; Gammoh, Omar Salem; Ashour, Ala Fawzi; Alshraifeen, Ali; Gougazeh, Yazeed Mohammed

    2017-03-01

    This study was conducted to identify the predictors, levels, and prevalence of anxiety and stress and to assess the relationship between these factors and quality of life in recently displaced Iraqis. A cross-sectional design was used. A convenience sample of 171 Iraqi refugees was recruited. The results indicated that more than half of the sample suffered from high anxiety levels, while 42.8% reported high stress. The regression model explained 46.3% of the variance in levels of quality of life. Unemployment, fewer than three family members, and high anxiety significantly predicted low-level quality of life. These three predictors need to be taken into consideration when developing health-related interventions to improve the quality of life of Iraqi refugees. © 2017 John Wiley & Sons Australia, Ltd.

  11. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  12. The Response of Iraqi buffaloes to standardized diet

    Directory of Open Access Journals (Sweden)

    J.M. Khlef

    2010-02-01

    Full Text Available This Experiment was conducted in the Newashi village of Thiqar province in the south of Iraq from 15 October till 31 December 2006. A sample of 50 milking buffaloes in 1st to 7th lactation were randomly choosed in three nearby herds , then divided into two equal groups for the treatment and the control. After 10 days of adaptation, the treated group was fed the standardized diet which was consisted of: Alfa Alfa hay ,12 kg/day, concentrates, 8 kg/day. The concentrate consists of barley grains 37%, maize grain 15%, wheat bran 40%, rice bran 5%,calcium carbonate 2% and food salt 1% .The control group was fed -as it is usual in the region –reed roughages , rice straws, dray bred and some wheat bran. Daily milk yield for the whole sample, cream( ghiamer and fat percent rom randomly choosed individuals from each group were measured . Simple linear model was used to detect the effect of the lactation, herd, calf sex and milking time on the traits . Duncan test was used to compare the differences between means . The results obtained showed that the lactation , herd, sex of calf and milking time had significant effect on the traits (p< 0.001. The diet had significantly affected daily milk yield , cream and fat percent ( 8.40 ± 1.75 vis 5.67 ± 1.41,21± 6.6 vis 9.79 3.24, and 12.4.11 vis 5.88±1.95 for the treated group vis. the control group (p<0.001.Accordingly, it can be assumed that the Iraqi buffaloes have good potential to produce more milk and fat under standardized feed condition.

  13. Induction New Suitable Soybean Genotypes for Iraqi Environmental Conditions

    International Nuclear Information System (INIS)

    Khudhair, H.; Jaim, A.; Nassralla, A.; Suhail, A.; Abass, H.; Hassan, A.; Hussain, A.; Mahmood, J.

    2002-01-01

    Mutation breeding programme was conducted to improve soybean (Glycine max. L. merrill) yield and oil Seeds were irradiation with 0,100,200,300 Gray of gamma ray Co 60 Selection of genetic variants started from M2 and continued to M8. Eight variants were selected in M8 generation that were characterized with high yield and desirable morphological characters. Preliminary comparison experiments of M9 and M10 with check variety (Lee74) were conducted at two locations (Twaitha and Lattifya). Three promising variants were selected for high yield and low percentage of seed shrinkage as compared with the check variety (Lee74) and other mutants. The same selected variants were planted in large scale comparison experiments with check variety (LEE 74) and two introduced varieties (Coker335 and Gasoy17) in two locations (Twaitha and lattifya) for two seasons (1998,1999). Variants H134 and H39 were superior in their yield components and earliness in maturity compared with the variant H226 and the other check varieties . The average yield and oil percentage in the two seasons(1998,1999) was 3195, 3115kg/ha and 18.2%, 19.3% respectively for the variants H134 and H39 compared with the yield and the percentage of oil for the check variety (Lee74) that was 2794 kg/ha and 18.3% respectively. These two variants were also superior in their protein percentage. According to these promising results of the variants H134 and H39 they were submitted for registration. They were registered under the names TAKA1 and TAKA-2 as suitable varieties for Iraqi environmental conditions. (authors) 13 refs., 5 tabs

  14. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  15. Why Security Force Assistance Fails

    Science.gov (United States)

    2016-05-26

    military intervention, along with Rumsfeld’s vision of transformation, permeated the philosophy behind the planning process for invading Iraq.66...accessed March 23, 2016, http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. 37...Martin Smith. Aired October 28, 2014. Accessed March 23, 2016. http://www.pbs.org/wgbh/frontline/ film /rise-of-isis/. Paul, Christopher et al. What Works

  16. The Socioemotional Development of Orphans in Orphanages and Traditional Foster Care in Iraqi Kurdistan.

    Science.gov (United States)

    Ahmad, Abdulbaghi; Mohamad, Kirmanj

    1996-01-01

    A one-year follow-up study of children who had lost both parents and were placed in orphanages (n=19) or foster homes (n=18) in Iraqi Kurdistan investigated the orphans' situation and development. The children in orphanages were found to have higher frequency of post-traumatic stress disorder than the foster care children. (Author/CR)

  17. History Education in Schools in Iraqi Kurdistan: Representing Values of Peace and Violence

    Science.gov (United States)

    Darweish, Marwan; Mohammed, Maamoon Abdulsamad

    2018-01-01

    The Kurdistan Regional Government has implemented a wide range of reforms in Iraqi Kurdistan's education system since its establishment in 2003. This qualitative study utilises critical discourse analysis to investigate the content of History Education (HE) textbooks (grades five to eight) and to assess how far peace education values and…

  18. Three Secondary School Teachers Implementing Student-Centred Learning in Iraqi Kurdistan

    Science.gov (United States)

    Burner, Tony; Madsen, Janne; Zako, Nadia; Ismail, Adham

    2017-01-01

    In Iraqi Kurdistan, the educational system is going through significant changes. The educational system influences the students' attitudes, and one wants the educational system to support the young democracy. In this study, student-centred learning (SCL) is seen as a first step to learning, but also to participation and engagement as a citizen.…

  19. National E-Learning Strategy to Enhance and Enrich the Iraqi Universities

    Science.gov (United States)

    Elameer, Amer Saleem; Idrus, Rozhan M.

    2011-01-01

    Nowadays, the HE (higher education) sector of Iraq has suffered severe disruption and mass destruction due to the war and, in general, only 10% of its remaining operational sectors are in the acceptable conditions. This research is an attempt to plan a PS (proposed strategy) for the Iraqi HE sector that can be executed easily in Iraq as a part of…

  20. Jesuit Contributions to the Iraqi Education System in the 1930s and Later

    Science.gov (United States)

    Girling, Kristian

    2016-01-01

    This article will consider the significant role which the Society of Jesus had played in the Iraqi secondary and higher education systems in the period 1932-1968. The Jesuits' Baghdad-based school and university formed a part of the substantial Jesuit educational network established across the Middle East from the nineteenth century and this…

  1. Pragmatic Difficulties in the Production of the Speech Act of Apology by Iraqi EFL Learners

    Science.gov (United States)

    Al-Ghazalli, Mehdi Falih; Al-Shammary, Mohanad A. Amert

    2014-01-01

    The purpose of this paper is to investigate the pragmatic difficulties encountered by Iraqi EFL university students in producing the speech act of apology. Although the act of apology is easy to recognize or use by native speakers of English, non-native speakers generally encounter difficulties in discriminating one speech act from another. The…

  2. Awareness of antibiotic use and antimicrobial resistance in the Iraqi community in Jordan.

    Science.gov (United States)

    Darwish, Dana A; Abdelmalek, Suzanne; Abu Dayyih, Wael; Hamadi, Salim

    2014-05-14

    Antimicrobial resistance is a serious global health concern. It has considerable implications on societies' health and resources. In Jordan, there is a large Iraqi community due to the ongoing turmoil in Iraq. Unfortunately, health awareness and practices of this community are under-investigated due to scarcity of research. This paper assesses the awareness of antibiotic use and antimicrobial resistance in the Iraqi community residing in Amman, Jordan. Their level of interaction with health care professionals regarding antibiotics and differences in their antibiotic use between Iraq and Jordan are also discussed. A cross-sectional questionnaire-based survey involving randomly selected Iraqis residing in Amman, Jordan was conducted. The study involved 508 participants. Sixty-two percent of participants agreed with buying antibiotics without a prescription, 29% agreed with obtaining antibiotics from friends or relatives, and 46% agreed with keeping leftover antibiotics for future use. Furthermore, 60% disagreed with not completing an antibiotic course and almost 90% of the sample listed viral diseases as an indication for antibiotics. Forty-four percent of participants abided by physicians' instructions on antibiotic use. Half of the participants believed that pharmacists provided instructions on antibiotics all the time, whereas physicians were perceived to do so by 29% of participants. Gaps exist in knowledge of antibiotic use and reasons for antimicrobial resistance among Iraqis residing in Jordan. These gaps should serve in planning educational campaigns to raise the community's awareness of responsible antibiotic use. Law enforcement to restrict access to antibiotics is also pivotal to tackle their misuse.

  3. Out of Crisis: Reflections of an Iraqi and an American on Advocacy for Andragogy

    Science.gov (United States)

    Bright, Larry K.; Mahdi, Ghada S.

    2010-01-01

    Mahdi is an Iraqi doctoral candidate in adult and higher education and Bright is her doctoral advisor. The two have been involved in intensive dialogue about how they see their cultures, how they perceive the conflict in the Middle East, and how andragogical theory offers hope for changing learning and teaching approaches that can influence…

  4. 48 CFR 252.225-7022 - Trade agreements certificate-inclusion of Iraqi end products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Trade agreements... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.225-7022 Trade agreements certificate—inclusion of Iraqi end products. As prescribed in 225.1101(7), use the following provision: Trade Agreements...

  5. "The Kurds and the Role of Kurdistan Region in Developing Iraq" Where are Iraq and the Iraqi Kurds heading?

    Science.gov (United States)

    Anonymous, Student Author

    Iraq remains one of the hot topics in world politics today and probably more so in the coming decades, with its Kurds as an ever-evolving puzzle of the country's domestic stability and regional conflict. In modern history, the Kurds' resistance to "occupiers" of their region became more evident with the collapse of the Ottoman Empire, following which they were promised their independence. Due to reasons explained in Chapter One--with energy and oil being some of these reasons--this independence, however, led to nothing but fading ink on dusty paper. Since the Kurds were only partially assimilated into their host states, they were treated as though they had a status apart from the host state, yet the host state denied Kurdish efforts to achieve self-determination. In some cases, the host state denied the very existence of the Kurdish culture. This created an ambiguous situation in which Kurds variously saw themselves as nationals of their host states or as Kurds or as both. For the purpose of this thesis, attention will be given mainly to Iraqi Kurds and their struggle for the right to self-determination which they were finally able to achieve following the Gulf War in early 1990s, leading to the establishment of a regional Kurdish government in Northern Iraq (explained in Chapter Two). Chapter Three will focus on what some of the ways to mediate such disputes may be, including the introduction of renewable energy such as wind and solar energy. It will demonstrate how Iraq can take advantage of wind and solar energy as alternative means to oil, by which the country's economy can diversify, and the security situation and ecological conditions can improve. This thesis will further focus on some of the potential challenges in Iraq that may surface in the future, and whether the Kurds can play a role in stabilising the country by remaining part of it, and if so, what may be some of the responsibilities of the Arabs of Iraq in order to provide the required incentives to

  6. Neurological disorders in Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System.

    Science.gov (United States)

    Mateen, Farrah J; Carone, Marco; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Al-Saedy, Huda; Lowenstein, Daniel H; Burnham, Gilbert

    2012-04-01

    The United Nations High Commissioner for Refugees (UNHCR) recognizes 43.7 million forcibly displaced persons and asylum seekers due to conflict and persecution worldwide. Neurological disorders have rarely been described in displaced persons but likely pose a significant burden of disease. We describe the disease spectrum and health service utilization of Iraqi refugees and asylum seekers with neurological disorders using an information system developed by the UNHCR. Neurological disorders were actively monitored among the 7,642 UNHCR-registered Iraqi refugees and asylum seekers who received health and humanitarian assistance using a pilot, centralized, database called the Refugee Assistance Information System (RAIS) in the Kingdom of Jordan in 2010. There were 122 neurological diagnoses reported in 1,328 refugees (mean age 41 years, 49% female, 10% disabled, 43% with pending resettlement applications) in 2,659 health visits, accounting for 17% of all refugees who sought health assistance in RAIS. Referral to a neurologist occurred in 178 cases (13.4%). The most frequent ICD-10 neurological diagnoses were dorsalgia (back pain) (29.7% of individuals with neurological disorders), headache (13.1%), and epilepsy (12.6%). Approximately 1 in 20 Iraqi refugees with a neurological diagnosis self-reported a history of torture, which was higher than Iraqi refugees without a history of torture [66/1,328 versus 196/6,314, odds ratio (OR) = 1.63, 95% confidence interval (CI) 1.21-2.18]. Neurological disease affects a high proportion of Iraqi refugees, including victims of torture and the disabled. Refugees require dedicated care for treatment of neurological disease with a focus on pain disorders and epilepsy.

  7. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  8. Validation of Scales from the Deployment Risk and Resilience Inventory in a Sample of Operation Iraqi Freedom Veterans

    National Research Council Canada - National Science Library

    Vogt, D. S; Proctor, S. P; King, D. W; King, L. A; Vasterling, J. J

    2008-01-01

    .... Although initial evidence for the reliability and validity of DRRI scales based on Gulf War veteran samples is encouraging, evidence with respect to a more contemporary cohort of Operation Iraqi Freedom (OIF...

  9. Now and Then: Combat Casualty Care Policies for Operation Iraqi Freedom and Operation Enduring Freedom Compared With Those of Vietnam

    National Research Council Canada - National Science Library

    Cordts, Paul R; Brosch, Laura A; Holcomb, John B

    2008-01-01

    Between December 2004 and June 2007, 13 key Operation Iraqi Freedom/ Operation Enduring Freedom combat casualty care policies were published to inform medical practice in the combat theater of operations...

  10. The Inspection Process of the Army Reset Program for Equipment for Units Returning from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    2008-01-01

    The subject of this report directly applies to the work of DoD civilian and military personnel responsible for the reset of equipment provided to the warfighter deployed in support of Operation Iraqi Freedom...

  11. Statistical Study to Check the Conformity of Aggregate in Kirkuk City to Requirement of Iraqi Specification

    Directory of Open Access Journals (Sweden)

    Ammar Saleem Khazaal

    2018-01-01

    Full Text Available This research reviews a statistical study to check the conformity of aggregates (Coarse and Fine was used in Kirkuk city to the requirements of the Iraqi specifications. The data of sieve analysis (215 samples of aggregates being obtained from of National Central Construction Laboratory and Technical College Construction Laboratory in Kirkuk city have analyzed using the statistical program SAS. The results showed that 5%, 17%, and 18% of fine aggregate samples are passing sieve sizes 10 mm, 4.75 mm, and 2.36 mm, respectively, which were less than the minimum limit allowed by the Iraqi specifications for each sieve. The percentages passing sieve sizes 1.18mm, 600micrometers, and 300micrometers were more than the upper limit of specification by 5%, 20%, and 30% respectively. The samples were passing sieve sizes 1.18mm, and 600micrometers less than the minimum limit of specification by 17%, and 4%, respectively. The results showed that the deviation in a sieve size of 150 micrometers for the upper limit of the specification performs 2% of the total number of samples. For Coarse aggregate, the samples passing sieves size 37.5mm and 20mm were comforting the Iraqi specifications by 100% and 83% respectively, it has found that the samples were passing sieve sizes 10 mm was 5% was more than the higher limit of Iraqi specifications, and 27% of these samples were less than the minimum limit, whereas sample passing sieve size 5mm was 1% which is more than the upper limit of the Iraqi specification. As a result of statistical analysis of data for fine aggregate, it has found that the samples were passing sieve sizes 10 mm, 2.36 mm, 1.18 mm and 150micrometers conforming from statistical point of view the Iraqi specifications, whereas the samples were passing sieve sizes 4.75 mm, 600micrometers and 300 micrometers didn’t conform. Statistical analysis of the results of the coarse aggregates also showed that conforming to sieve sizes of 37.5 mm and 20 mm and

  12. Neurosurgery in Iraqi Kurdistan: An Example of International Neurosurgery Capacity Building.

    Science.gov (United States)

    Dossani, Rimal Hanif; Carr, Steven; Bolles, Gene; Balata, Razvan; Guthikonda, Bharat

    2016-08-01

    The medical infrastructure of Iraqi Kurdistan, a semiautonomous region in the northern part of Iraq, lags disproportionately behind relative to the otherwise booming industrial advances of the region. Although neurosurgical training is available, the local population lacks trust in its own neurosurgeons. Medical facilities suffer from a lack of basic resources, such as high-speed drills, intracranial pressure monitoring, and stereotaxy to care for neurosurgical patients. Since 2012, American volunteer neurosurgeons have delivered lectures and mentored local neurosurgeons in performing neurosurgical procedures. Over the last 4 years, the visiting neurosurgical team has seen hundreds of patients in consultation and performed more than 50 complex cranial and spinal operations jointly with local neurosurgeons. This article discusses our experience as volunteer neurosurgeons in building neurosurgical capacity in Iraqi Kurdistan. Copyright © 2016 Elsevier Inc. All rights reserved.

  13. Pre- and Post-displacement Stressors and Body Weight Development in Iraqi Refugees in Michigan.

    Science.gov (United States)

    Jen, K-L Catherine; Zhou, Kequan; Arnetz, Bengt; Jamil, Hikmet

    2015-10-01

    Refugees have typically experienced stress and trauma before entering the US. Stressors and mental health disorders may contribute to obesity. The aim of this study was to investigate changes in the body mass index (BMI) in Iraqi refugees settled in Michigan in relationship to pre- and post-migration stressors and mental health. Anthropometric and demographic data were collected from 290 Iraqi refugees immediately after they arrived in Michigan and one year after settlement. Significant increases were observed in BMI (+0.46 ± 0.09 kg/m(2), p refugees suffering from hypertension (from 9.6 to 13.1%, p migration trauma and social support, were also observed. Linear regression analyses failed to link stressors, well-being, and mental health to changes in BMI. It is likely that acculturation to a new lifestyle, including dietary patterns and physical activity levels, may have contributed to these changes.

  14. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  15. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  16. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L.) by using RAPD Technique

    OpenAIRE

    Muhanned Abdul Hasan Kareem; Ali Hmood Al-Saadi ‎; Hassan Fadhil Naji

    2018-01-01

    In this study provided all molecular markers of Random amplified polymorphic (RAPD) successfully with the sixty five Iraqi date palm (Phoenix dactylifera L.) cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592) bands, polymorphism per all primers were (%64.2),...

  17. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L.) by using RAPD Technique

    OpenAIRE

    Muhanned Abdul Hasan; Ali ‎ Hmood Al-Saadi; Hassan Fadhil Naji

    2017-01-01

    In this study provided all molecular markers of Random amplified polymorphic (RAPD) successfully with the sixty five Iraqi date palm (Phoenix dactylifera L.) cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592) bands, polymorphism per all primers were (%64.2),...

  18. Contract formation in cyberspace: a comparative study of Australian, American and Iraqi laws

    OpenAIRE

    Hadi, Iman Majeed

    2017-01-01

    Electronic commerce is an increasingly vital part of national economies and the global economy. The promotion of electronic commerce requires clear and effective laws. As electronic contracts are the building blocks for electronic commerce, it is essential for national laws, especially in developing countries, to be sufficiently certain and appropriately adapted to promote electronic commerce. This thesis formulates recommendations for reforming Iraqi contract law in order to promote the a...

  19. Neuropsychiatric disorders among Syrian and Iraqi refugees in Jordan: a retrospective cohort study 2012-2013.

    Science.gov (United States)

    McKenzie, Erica D; Spiegel, Paul; Khalifa, Adam; Mateen, Farrah J

    2015-01-01

    The burden of neuropsychiatric disorders in refugees is likely high, but little has been reported on the neuropsychiatric disorders that affect Syrian and Iraqi refugees in a country of first asylum. This analysis aimed to study the cost and burden of neuropsychiatric disorders among refugees from Syria and Iraq requiring exceptional, United Nations-funded care in a country of first asylum. The United Nations High Commissioner for Refugees works with multi-disciplinary, in-country exceptional care committees to review refugees' applications for emergency or exceptional medical care. Neuropsychiatric diagnoses among refugee applicants were identified through a retrospective review of applications to the Jordanian Exceptional Care Committee (2012-2013). Diagnoses were made using International Classification of Disease-10(th) edition codes rendered by treating physicians. Neuropsychiatric applications accounted for 11% (264/2526) of all Exceptional Care Committee applications, representing 223 refugees (40% female; median age 35 years; 57% Syrian, 36% Iraqi, 7% other countries of origin). Two-thirds of neuropsychiatric cases were for emergency care. The total amount requested for neuropsychiatric disorders was 925,674 USD. Syrian refugees were significantly more likely to request neurotrauma care than Iraqis (18/128 vs. 3/80, p = 0.03). The most expensive care per person was for brain tumor (7,905 USD), multiple sclerosis (7,502 USD), and nervous system trauma (6,466 USD), although stroke was the most frequent diagnosis. Schizophrenia was the most costly and frequent diagnosis among the psychiatric disorders (2,269 USD per person, 27,226 USD total). Neuropsychiatric disorders, including those traditionally considered outside the purview of refugee health, are an important burden to health among Iraqi and Syrian refugees. Possible interventions could include stroke risk factor reduction and targeted medication donations for multiple sclerosis, epilepsy, and

  20. Pragmatic Difficulties in the Production of the Speech Act of Apology by Iraqi EFL Learners

    Directory of Open Access Journals (Sweden)

    Mehdi Falih Al-Ghazalli

    2014-12-01

    Full Text Available The purpose of this paper is to investigate the pragmatic difficulties encountered by Iraqi EFL university students in producing the speech act of apology. Although the act of apology is easy to recognize or use by native speakers of English, non-native speakers generally encounter difficulties in discriminating one speech act from another. The problem can be attributed to two factors: pragma-linguistic and socio-pragmatic knowledge. The aim of this study is(1to evaluate the socio-pragmatic level of interpreting apologies as understood and used by Iraqi EFL university learners, (2 find out the level of difficulty they experience in producing apologies and(3 detect the reasons behind such misinterpretations and misuses. It is hypothesized that the socio-pragmatic interpretation of apology tends to play a crucial role in comprehending what is intended by the speaker. However, cultural gaps can be the main reason behind the EFL learners' inaccurate production of the act of apology. To verify the aforementioned hypotheses, a test has been constructed and administered to a sample of 70 fourth-year Iraqi EFL university learners, morning classes. The subjects' responses have been collected and linguistically analyzed in the light of an eclectic model based on Deutschmann (2003 and Lazare (2004. It has been concluded that the misinterpretation or difficulty Iraqi EFL students have faced is mainly attributed to their lack of socio-pragmatic knowledge. The interference of the learnersʹ first language culture has led to non-native productions of speech act of apology.

  1. Statistical Study to Check the Conformity of Aggregate in Kirkuk City to Requirement of Iraqi Specification

    OpenAIRE

    Ammar Saleem Khazaal; Nizar N Ismeel; Abdel fattah K. Hussein

    2018-01-01

    This research reviews a statistical study to check the conformity of aggregates (Coarse and Fine) was used in Kirkuk city to the requirements of the Iraqi specifications. The data of sieve analysis (215 samples) of aggregates being obtained from of National Central Construction Laboratory and Technical College Construction Laboratory in Kirkuk city have analyzed using the statistical program SAS. The results showed that 5%, 17%, and 18% of fine aggregate samples are passing sieve sizes 10 mm,...

  2. Negotiations of believing and belonging among Iraqi and Egyptian Christians in Denmark

    DEFF Research Database (Denmark)

    Galal, Lise Paulsen

    This presentation explores negotiations of belonging among Christian immigrants of Iraqi and Egyptian background in Denmark. Based on transnational and diaspora studies, experiences and practices of belonging are explored as multi-directional and situational springing from everyday encounters...... and personal life trajectory, political events in both the region of origin and in the receiving country (Denmark), as well as opportunity structures empowering Middle Eastern Christians as collective and individual actors....

  3. A cross-cultural study of request speech act: Iraqi and Malay students

    Directory of Open Access Journals (Sweden)

    Maryam Farnia

    2014-08-01

    Full Text Available Several studies have indicated that the range and linguistics expressions of external modifiers available in one language differ from those available in another language. The present study aims to investigate the cross-cultural differences and similarities with regards to the realization of request external modifications. To this end, 30 Iraqi and 30 Malay university students are selected as the participants of this study. Spencer-Oatey's (2008 rapport management theoretical framework is used to examine how face rapport is managed through the use of external modifications. The corpus consists of responses to a Discourse Completion Test (DCT consisting of eight situations. The questionnaires, adopted from Rose (1994, were distributed among Iraqi students and Malaysian Malay students studying at Universiti Sains Malaysia, Malaysia. The corpus were then analyzed based on Blum-Kulka, House and Kasper (1989 classification of external modifiers. The primary objective of this paper is to compare the effect of situational factors on the realization patterns of request modification between Iraqi and Malay university students .The findings are hoped to have implications for comparative cross-cultural and intercultural communication studies.

  4. Important considerations when providing mental health first aid to Iraqi refugees in Australia: a Delphi study.

    Science.gov (United States)

    Uribe Guajardo, Maria Gabriela; Slewa-Younan, Shameran; Santalucia, Yvonne; Jorm, Anthony Francis

    2016-01-01

    Refugees are one of the most vulnerable groups in Australian society, presenting high levels of exposure to traumatic events and consequently high levels of severe psychological distress. While there is a need for professional help, only a small percentage will receive appropriate care for their mental health concerns. This study aimed to determine cultural considerations required when providing mental health first aid to Iraqi refugees experiencing mental health problems or crises. Using a Delphi method, 16 experts were presented with statements about possible culturally-appropriate first aid actions via questionnaires and were encouraged to suggest additional actions not covered by the questionnaire content. Statements were accepted for inclusion in a guideline if they were endorsed by ≥90 % of panellists as 'Essential' or 'Important'. From a total of 65 statements, 38 were endorsed (17 for cultural awareness, 12 for cross-cultural communication, 7 for stigma associated with mental health problems, and 2 for barriers to seeking professional help). Experts were able to reach consensus about how to provide culturally-appropriate first aid for mental health problems to Iraqi refugees, demonstrating the suitability of this methodology in developing cultural considerations guidelines. This specific refugee study provided potentially valuable cultural knowledge required to better equip members of the Australian public on how to respond to and assist Iraqi refugees experiencing mental health problems or crises.

  5. Medical conditions among Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System

    Science.gov (United States)

    Carone, Marco; Al-Saedy, Huda; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Black, Robert E

    2012-01-01

    Abstract Objective To determine the range and burden of health services utilization among Iraqi refugees receiving health assistance in Jordan, a country of first asylum. Methods Medical conditions, diagnosed in accordance with the tenth revision of the International classification of diseases, were actively monitored from 1January to 31December 2010 using a pilot centralized database in Jordan called the Refugee Assistance Information System. Findings There were 27 166 medical visits by 7642 Iraqi refugees (mean age: 37.4 years; 49% male; 70% from Baghdad; 6% disabled; 3% with a history of torture). Chronic diseases were common, including essential hypertension (22% of refugees), visual disturbances (12%), joint disorders (11%) and type II diabetes mellitus (11%). The most common reasons for seeking acute care were upper respiratory tract infection (11%), supervision of normal pregnancy (4%) and urinary disorders (3%). The conditions requiring the highest number of visits per refugee were cerebrovascular disease (1.46 visits), senile cataract (1.46) and glaucoma (1.44). Sponsored care included 31 747 referrals or consultations to a specialty service, 18 432 drug dispensations, 2307 laboratory studies and 1090 X-rays. The specialties most commonly required were ophthalmology, dentistry, gynaecology and orthopaedic surgery. Conclusion Iraqi refugees in countries of first asylum and resettlement require targeted health services, health education and sustainable prevention and control strategies for predominantly chronic diseases. PMID:22690034

  6. Medical conditions among Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System.

    Science.gov (United States)

    Mateen, Farrah J; Carone, Marco; Al-Saedy, Huda; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Black, Robert E

    2012-06-01

    To determine the range and burden of health services utilization among Iraqi refugees receiving health assistance in Jordan, a country of first asylum. Medical conditions, diagnosed in accordance with the tenth revision of the International classification of diseases, were actively monitored from 1 January to 31 December 2010 using a pilot centralized database in Jordan called the Refugee Assistance Information System. There were 27 166 medical visits by 7642 Iraqi refugees (mean age: 37.4 years; 49% male; 70% from Baghdad; 6% disabled; 3% with a history of torture). Chronic diseases were common, including essential hypertension (22% of refugees), visual disturbances (12%), joint disorders (11%) and type II diabetes mellitus (11%). The most common reasons for seeking acute care were upper respiratory tract infection (11%), supervision of normal pregnancy (4%) and urinary disorders (3%). The conditions requiring the highest number of visits per refugee were cerebrovascular disease (1.46 visits), senile cataract (1.46) and glaucoma (1.44). Sponsored care included 31 747 referrals or consultations to a specialty service, 18 432 drug dispensations, 2307 laboratory studies and 1090 X-rays. The specialties most commonly required were ophthalmology, dentistry, gynaecology and orthopaedic surgery. Iraqi refugees in countries of first asylum and resettlement require targeted health services, health education and sustainable prevention and control strategies for predominantly chronic diseases.

  7. Epstein-Barr virus and breast cancer: Epidemiological and Molecular study on Egyptian and Iraqi women

    International Nuclear Information System (INIS)

    Zekri, A.N.; Mohamed, W.S.; Hafez, M.M.; Hassan, Z.K.; Bahnassy, A.A.; El-Kassem, F.A.; El-Khalidi, S.J.

    2012-01-01

    Background and purpose: The role of Epstein-Barr virus (EBV) in breast carcinogenesis is still controversial. Unraveling this relationship is potentially important for better understanding of breast cancer etiology, early detection and possibly prevention of breast cancer. The aim of the current study is to unravel the association between EBV and primary invasive breast cancer (PIBC) in two different Arab populations (Egyptian and Iraqi women). Patients and Methods: The study was done on paraffin-embedded tissues of 40 Egyptian and 50 Iraqi patients with PIBC in addition to 20 normal breast tissues as controls for each group. Both controls and neoplastic tissues were assessed for the expression of EBV genes and proteins (EBNA-1, LMP-1, and EBER) as well as CD21 marker by immunohistochemistry (IHC), in situ hybridization (ISH) and PCR techniques. Results: Our gold standard for EBV reactivity in breast cancer cases was positivity of both EBNA1 by PCR and EBER by in situ hybridization. EBV was detected in 18/40 (45%) and 14/50 (28%) of Egyptian and Iraqi women; respectively where p = 0.073, compared to 0/20 (0%) of their control groups (p < 0.05). Regarding the association between EBV positivity and tumor grade, there was not any statistical significant difference between EBV presence and tumor grade in both populations

  8. Developing Accounting Information System Course Content for Iraqi Higher Education Institution: An Instrument Design

    Directory of Open Access Journals (Sweden)

    Naseem Yousif Hanna Lallo

    2013-07-01

    Full Text Available In ensuring that competent graduates are produced in the universities, the course used embedding knowledge in the students, mindsets needs to be effective. However, the unusual circumstances that happened in Iraq were affected on a universities course. The revolution in information technology (IT affects most of our activations. As a result, it is important to consider the impact of IT on accounting careers. Developing accenting information system course content can generate an accountant who is armed with the knowledge and skills before entering accounting job. Also the development process required instructors have characteristics that make the integrating process of IT knowledge components in AIS course content more smoothly. Iraq is the country facing many difficulties that makes its higher education institutions (HEIs suffered from un updated learning environment and technological backwardness. This causes a low level of accounting graduates’ knowledge and in turn leads to led to consider the Iraqi accountant incapable of working with international organizations and companies or conducting was it professionally. The aim of this paper is to explain the role of IT knowledge elements in developing AIS course content in Iraqi HEIs with considering the moderate effect of the instructors’ characteristics. Furthermore, this paper discusses the development and validation of the quantitative instrument (questionnaire for IT knowledge elements in Iraqi HEIs. Moreover, the reliability of the constructs is also discussed.

  9. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  10. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  11. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  12. Turkey’s New Regional Security Role: Implications for the United States

    Science.gov (United States)

    2014-09-01

    organizational reform, economic restructuring, and integrating recent members. Efforts to develop a Eu- ropean Security and Defense Identity (ESDI...the fed- eral state of Iraq. Turkish officials have also developed ties with moderate Kurdish leaders such as Iraqi Pres- ident Jalal Talabani and...most vis- ible presence is its pop culture, especially cinema , and Turkish goods. Turkish clothes, furniture, toys, build- ing materials, and other

  13. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    Science.gov (United States)

    2008-09-29

    reporting procedures, bad investigation methods and unfair double standards amongst employees should not be condoned." Tom Jackman , “Security Contractor...Cleared in Two Firings”, Washington Post, August 2, 2007. p. A-15. 43 Tom Jackman . “U.S. Contractor Fired on Iraqi Vehicles for Sport, Suit Alleges...Public Diplomacy and Public Affairs Karen Hughes , speaking before the Council on Foreign Relations, New York City, N.Y., on May 10, 2006, said of the new

  14. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  15. Evaluating the Effectiveness of Waterside Security Alternatives for Force Protection of Navy Ships and Installations Using X3D Graphics and Agent-Based Simulation

    National Research Council Canada - National Science Library

    Sullivan, Patrick J

    2006-01-01

    The individuals charged with the task of planning, developing and implementing force protection measures both at the unit and installation level must consider numerous factors in formulating the best defensive posture...

  16. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  17. Mental health literacy among refugee communities: differences between the Australian lay public and the Iraqi and Sudanese refugee communities.

    Science.gov (United States)

    May, Samantha; Rapee, Ronald M; Coello, Mariano; Momartin, Shakeh; Aroche, Jorge

    2014-05-01

    This study investigated differences in mental health knowledge and beliefs between participants from the Iraqi and Sudanese refugee communities, and Australian-born individuals, in Sydney, Australia. Ninety-seven participants were given vignettes of characters describing symptoms of major depressive disorder and posttraumatic stress. They were required to identify psychological symptoms as disorders, rate beliefs about the causes of and helpful treatments for these disorders, and rate attitude statements regarding the two characters. Australian participants recognized the presented symptoms as specific mental disorders significantly more than Iraqi and Sudanese participants did, and reported causal and treatment beliefs which were more congruent with expert beliefs as per the western medical model of mental disorder. The Sudanese group endorsed supernatural and religious causal beliefs regarding depression and posttraumatic stress symptoms most often; but both Sudanese and Iraqi participants strongly supported options from the supernatural and religious treatment items. However, evidence for pluralistic belief systems was also found. Although sampling was non-random, suggesting caution in the interpretation of results, it appears that the mental health literacy of lay Australians may be more aligned with the western medical model of mental disorder than that of Iraqi and Sudanese refugee communities. Mental health literacy support needs of Iraqi and Sudanese refugee communities resettled in western countries such as Australia might include education about specific symptoms and causes of mental disorder and the effectiveness of psychiatric treatments. These findings provide useful directions for the promotion of optimal service utilization among such communities.

  18. Message from Mr. R.A. Al-Kital, Commissioner of the Iraqi Atomic Energy Commission, received by the Director General on 23 October 1985

    International Nuclear Information System (INIS)

    1985-10-01

    The document reproduces the message from Mr. R.A. Al-Kital, Commissioner of the Iraqi Atomic Energy Commission received by the Director General of the IAEA on 23 October 1985 related to the Israeli attack against the Iraqi nuclear installations

  19. Combating Terrorism via the Womb: Empowering Iraqi Women

    Science.gov (United States)

    2009-04-01

    influence the decision- making within the home.7 Women are much more powerful than their outward appearances portray to westerners, and it is...households that originated in developing countries where it successfully enables women have been forced to be the breadwinners of the extremely...support should not be just financial but should include training programmes [sic] to help women find jobs in the public and private sectors.”23 She

  20. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  1. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  2. Zaštita računarskih mreža Ministarstva odbrane i Vojske Srbije primenom virtuelnog honeyneta / Security of computer network of the Ministry of Defence and the Serbian Armed Forces using virtual honeynets

    Directory of Open Access Journals (Sweden)

    Zoran Bobar

    2009-07-01

    Full Text Available U ovom radu obrađena je zaštita računarskih mreža u Ministarstvu odbrane i Vojsci Srbije primenom virtuelnog honeyneta. Zaštita je obrađena sa aspekta arhitekture računarskih mreža koje imaju pristup internetu. Predloženi koncept primene virtuelnog honeyneta uzima u obzir dostignuća nauke u ovoj oblasti u svetu, ostale primenjene metode i tehnike zaštite, mogućnosti i potrebe korisnika i elemente delova računarskog sistema Ministarstva odbrane i Vojske koji bi mogli biti meta napada sa udaljenih mesta globalne (internet mreže. / This paper covers the proposed solution for security of computer network in the Ministry of Defence and the Serbian Armed Forces using virtual honeynets. The security is covered from the aspect of the architecture of computer networks with Internet access. The proposed usage of virtual honeynets for protection takes into account the accomplishments of science in this field as well as security methods and techniques, users' needs and opportunities along with the computer network components of the MoD and the SAF that can be targets for attack.

  3. Strategic Studies Quarterly. An Air Force-Sponsored Strategic Forum on National and International Security. Winter 2009. Volume 3, Number 4

    Science.gov (United States)

    2009-01-01

    by George Shultz, William Perry, Henry Kissinger, and Sam Nunn. These seasoned policy experts shocked many with their advocacy of a “world free of...NY: Kennikat Press, 1956); Alexander George and Richard Smoke , Deterrence in American Foreign Policy: Theory and Practice (New York: Columbia...practiced abstinence in defense and security policy matters through the end of the 1990s—and why development of ESDP has proceeded only sluggishly since

  4. [Manpower migrations and Arab unity: the challenges of the Iraqi model].

    Science.gov (United States)

    Roussillon, A

    1985-01-01

    Iraq occupies a unique position in the system of manpower exchanges between Middle Eastern states brought about by the rise in petroleum incomes of the 1970s. Iraq was among the most important oil exporters until the war with Iran, but its economy is predominantly agricultural, it is a rich country in terms of available financial resources, and it is both an importer and exporter of labor, traits which place it squarely between the nonoil-producing states which are poor and overpopulated and the oil exporters which are rich and underpopulated. Its migration policy, which radically distinguishes between Arab and non-Arab manpower, is also unique. Data on migration to Iraq are very sparse despite the fact that the nation has a good data-gathering capacity. Estimates of migration to Iraq and employment patterns of migrants have varied widely and have contradicted each other in crucial respects. The most unusual aspect of Iraqi immigration policy, the free access offered to Egyptians and other Arabs, has hampered attempts to estimate the volume of migration, as workers come and go for relatively short periods, seeking their own employment in Iraq and working in jobs for which they may be overqualified. Official formulations of Iraqi migration policy insist that migration should not only be beneficial to individual importing and exporting countries in terms of development and social cohesion, but should also reinforce the solidarity and regional complementarity of the Arab world as a whole. Iraqi migration policy is presented as expressing the most fundamental choices of the "Arab revolution" in the socialist dimension of Arab unitary ideology rather than in terms of immediate national economic interest. Iraqi legislation grants non-Iraqi Arabs the same labor, residence, investment, and ultimately naturalization rights as those enjoyed by nationals, but severely restricts access to employment and other rights of non-Arab foreigners. Denunciation of the dangers posed by

  5. 东北老工业区生态安全动态演变过程及驱动力%Dynamic evolution and driving forces of ecological security in the Traditional Industrial Area of northeastern China

    Institute of Scientific and Technical Information of China (English)

    唐呈瑞; 逯承鹏; 杨青; 姜璐; 任婉侠; 薛冰

    2017-01-01

    Ecological security is as important as national,economic,and financial security and has become the main constraint of future socio-economic security.The Traditional Industrial Area of northeastern China is an important traditional industrial and grain production base of China,and its ecological security is related to the implementation of sustainable development strategies.Based on the emergy-ecological footprint model,the ecological security in Traditional Industrial Area of northeastern China was quantitatively evaluated from 2000 to 2014,followed by a scenario analysis on the driving forces of the ecological security using a principal component analysis method.The results showed that,the value of emergy ecological-capacity per capita decreased from 0.66 to 0.64 hm2/cap,whereas the emergy-ecological footprint increased from 10.58 to 19.85 hm2/cap,which indicated that an ecological deficit existed in the Traditional Industrial Area of northeastern China.The ecological pressure in this area increased,showing an unsustainable development trend from 2000 to 2014.The ecological pressure index and ecological security levels gradually increasing,ecological security situation is deteriorating,ecological security issues to be urgent resolved.The ecological stress tended to be serious as a result of a combination of several factors,such as social,economic,population,resource,environmental,technological level,and land use degree.Finally,effective management strategies and suggestions to improve the ecological security of the Traditional Industrial Area of northeastern China were proposed.%生态安全与国防安全、经济安全、金融安全等已具有同等重要的战略地位,并成为未来经济社会安全的主要约束.东北老工业区作为我国重要的老工业基地及粮食生产基地,其生态安全状况关系着中国可持续发展战略的实施.采用能值-生态足迹模型,对东北老工业区2000-2014年生态安全动态演变过程进行

  6. An Operational Utility Assessment: Measuring the Effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)

    Science.gov (United States)

    2008-12-01

    time- on-task in deploying a patrol force, for example. In its most basic form, an FOB consists of a ring of barbed wire around a position with a...Modernizing The Marine Corps’ CH- 53 Super Stallion Helicopter,” Thesis, NPS (December 2001). HIGH LEVEL OF IMPORTANCE LOW 62 TASKS

  7. Chronic disease and disability among Iraqi populations displaced in Jordan and Syria.

    Science.gov (United States)

    Doocy, Shannon; Sirois, Adam; Tileva, Margarita; Storey, J Douglas; Burnham, Gilbert

    2013-01-01

    The Iraq conflict resulted in the largest displacement in the Middle East since the Palestinian crisis, and provision of health services to the displaced population presents a critical challenge. The study aimed to provide information on chronic medical conditions and disability to inform humanitarian assistance planning. Nationally representative cross-sectional surveys of Iraqi populations displaced in Jordan and Syria were conducted in late 2008 and early 2009. Clusters of 10 household were randomly selected using probability-based sampling; a total of 1200 and 813 Iraqi households in Jordan and Syria, respectively, were interviewed. The majority of respondents in both countries perceived healthcare as unaffordable but accessible; cost was an important barrier to care. In Jordan, most routine health expenditures were for medications where in Syria, expenses were divided between medical consultations and medication. Chronic disease prevalence among adults was 51.5% (confidence interval (CI): 49.4-53.5) in Syria and 41.0% (CI: 39.4-42.7) in Jordan, most common were hypertension and musculoskeletal problems. Overall disability rates were 7.1% (CI: 6.3-8.0) in Syria and 3.4% (CI: 3.0-3.9) in Jordan. In both countries, the majority of disability was attributed to conflict, prevalence was higher in men than women, and depression was the leading cause of mental health disability. Chronic illnesses, disabilities and psychological health are key challenges for the Iraqi population and the health systems in Jordan and Syria. Continued attention to the development of systems to manage conditions that require secondary and tertiary care is essential, particularly given reported difficulties in accessing care and the anticipated prolonged displacement. Copyright © 2012 John Wiley & Sons, Ltd.

  8. Iraqi health system in kurdistan region: medical professionals' perspectives on challenges and priorities for improvement.

    Science.gov (United States)

    Shabila, Nazar P; Al-Tawil, Namir G; Tahir, Rebaz; Shwani, Falah H; Saleh, Abubakir M; Al-Hadithi, Tariq S

    2010-11-30

    The views of medical professionals on efficiency of health system and needs for any changes are very critical and constitute a cornerstone for any health system improvement. This is particularly relevant to Iraqi Kurdistan case as the events of the last few decades have significantly devastated the national Iraqi health system while the necessity for adopting a new health care system is increasingly recognized since 2004. This study aims to examine the regional health system in Iraqi Kurdistan from medical professionals' perspectives and try to define its problems and priorities for improvement. A survey questionnaire was developed and administered to a convenience sample of 250 medical professionals in Erbil governorate. The questionnaire included four items; rating of the quality of services and availability of resources in the health institutions, view on different aspects of the health system, the perceived priority needs for health system improvement and gender and professional characteristics of the respondents. The response rate to the survey was 83.6%. A high proportion of respondents rated the different aspects of services and resources in the health institutions as weak or very weak including the availability of the required quantity and quality of medicines (68.7%), the availability of sufficient medical equipment and investigation tools (68.7%), and the quality of offered services (65.3%). Around 72% of respondents had a rather negative view on the overall health system. The weak role of medical research, the weak role of professional associations in controlling the system and the inefficient health education were identified as important problems in the current health system (87.9%, 87.1% and 84.9%, respectively). The priority needs of health system improvement included adoption of social insurance for medical care of the poor (82%), enhancing the role of family medicine (77.2%), adopting health insurance system (76.1%) and periodic scientific

  9. Eidinemacheilus proudlovei, a new subterranean loach from Iraqi Kurdistan (Teleostei; Nemacheilidae).

    Science.gov (United States)

    Freyhof, Jörg; Abdullah, Younis Sabir; Ararat, Korsh; Ibrahim, Hamad; Geiger, Matthias F

    2016-10-04

    Eidinemacheilus proudlovei, new species, is described from subterranean waters in the Little Zab River drainage in Iraqi Kurdistan. After the discovery of E. smithi in 1976, E. proudlovei is the second troglomorphic nemacheilid loach found in the Middle East and the second species placed in Eidinemacheilus. Eidinemacheilus proudlovei is distinguished from E. smithi by having 8+8 or 8+7 branched caudal-fin rays, no adipose keel on the caudal peduncle, enlarged jaws and a fully developed head canal system. It furthers differs substantially in its DNA barcode (>8% K2P distance) from all other nemacheilid loaches in the Middle East, Europe and Western India.

  10. Two new species of Oxynoemacheilus from the Tigris drainage in Iraqi Kurdistan (Teleostei: Nemacheilidae).

    Science.gov (United States)

    Freyhof, Jörg; Abdullah, Younis Sabir

    2017-03-02

    Two new species of Oxynoemacheilus are described from the Sirvan River drainage in Iraqi Kurdistan. Oxynoemacheilus gyndes, new species, is distinguished by having a very short lateral line, reaching behind the pectoral-fin base, no scales except on the posteriormost part of the caudal peduncle, a slightly emarginate caudal fin and no suborbital groove in males. Oxynoemacheilus hanae, new species, is distinguished by having a midlateral row of elongated blotches, isolated patches of dark-brown spots or blotches on lower flank, a deeply emarginate caudal fin and a suborbital groove in males.

  11. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  12. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  13. Social Security, Cash Payments and Awards to Servicemen of the Red Army Air Force in the Great Patriotic War of 1941–1945

    Directory of Open Access Journals (Sweden)

    Alexander P. Abramov

    2016-07-01

    Full Text Available On the basis of the historical and sociological material presented materials about the Soviet state measures during the Great Patriotic War for the implementation of social policy in respect of the military air force of the Red Army, expressed in monetary incentives, rewards and social guarantees. The author notes that the implementation of social management practices at each stage of warfare timely adjustments depending on acquired combat experience and the strategic objectives of war. Existing wartime monetary awards system and social guarantees in respect of the personnel of the Red Army Air Force was not a major, but significant moral incentive for both pilots, as for representatives of other arms and services.

  14. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  15. Perception of molar-incisor hypomineralisation (MIH) by Iraqi dental academics.

    Science.gov (United States)

    Ghanim, Aghareed; Morgan, Michael; Mariño, Rodrigo; Manton, David; Bailey, Denise

    2011-07-01

    The understanding and detection of molar-incisor hypomineralisation (MIH) is linked to its recognition by clinicians. No study has investigated dental clinicians' level of perception regarding MIH in the Middle East region including Iraq. To determine the perception of Iraqi academic clinicians about MIH prevalence, severity and aetiological factors. A questionnaire, based on previous European and Australian/New Zealand studies was administered to the academic dental staff of Mosul University. A response rate of 77.7% was reported. General dental practitioners represented 30.8% of the total respondents, whilst 65.1% were dentists with post-graduate qualification. The majority of the respondents (81.2%) encountered MIH in their clinical activities and 37.3% of them identified that the prevalence appeared to have increased in recent years. Fewer than half of the respondents observed MIH affected teeth on a monthly basis. The condition was less commonly seen in primary second molars than the first permanent molars. A variation in views was recorded about MIH specific aetiological factor/s. Respondents advocated the need for clinical training regarding MIH-aetiological and therapeutic fields. Molar-incisor hypomineralisation is a condition commonly diagnosed by Iraqi dental academics. No apparent consensus existed between the general and specialist dentists regarding the anticipated prevalence, severity and aetiology of this condition. © 2011 The Authors. International Journal of Paediatric Dentistry © 2011 BSPD, IAPD and Blackwell Publishing Ltd.

  16. Characterization of Some Iraqi Archaeological Samples Using IBA, Analytical X-ray and Other Complementary Techniques

    International Nuclear Information System (INIS)

    Al-Sarraj, Ziyad Shihab; Damboos, Hassan I; Roumie, Mohamad

    2012-01-01

    The present work aimed at investigating the compositions and microstructures of some archaeological samples which dated back to various periods of the ancient Iraqi civilizations using PIXE, XRF, XRD, and SEM techniques. The models selected for the study (ceramics, glaze, etc.) were diverse in size and nature, therefore a limited number of samples were then butted from them by a small diamond wheel. Conventional powder metallurgy method was then used to prepare the samples. Dried samples were then coated with a thin layer of carbon, and analyzed using the ion beam accelerator of the LAEC. Three other groups of samples were also prepared for the purpose of analysis by X-ray fluorescence (XRF), X-ray diffraction (XRD), and scanning electron microscope (SEM). Analysis results of the chemical composition showed good agreement between the various techniques as well as for phases, while the fine structure analysis obtained by optical and scanning microscopy exhibited features of a structure where it got an intensified densification in the final stage of sintering and accompanied by quasi-homogeneous distribution of the closed pores. This will lead to the conclusion that the temperature used for sintering by ancient Iraqi was sufficient and it may fall in the range between 950-1200°C, also the mixes and the forming methods used by them, were both suitable to obtain good sintered bodies with even distribution of pores. A ring-shaped trace noticed in SEM micrographs need more work and study to explain what it is?

  17. Dentoskeletal Overjet Measurements of Iraqi Adult Sample with Different Skeletal Jaw Relationship

    Directory of Open Access Journals (Sweden)

    Shahbaa A Mohammed

    2017-11-01

    Full Text Available Background: Many attempts were done to develop a method that actually reflects the sagittal jaw discrepancies without depending on cranial landmarks or dental occlusion. This study aimed to use one of these methods (dentoskeletal overjet for assessing the sagittal jaw relationships of Iraqi adult sample with different skeletal jaw relationship. Materials and method: The sample consisted of 90 digital true lateral cephalometric radiographs of Iraqi individuals with no previous orthodontic treatment. Cephalometric analysis of skeletal sagittal jaw relationship -ANB angle, beta angle and Wits appraisal- will perform for everyone to divide the sample into three groups (skeletal class I, II, III for which the dentoskeletal overjet will be measured. All cephalometric measurements will be done using AutoCAD. Results: Descriptive statistics of all variables with different skeletal jaw relationship showed that mean values of dentoskeletal overjet were (1.15, 3.91 and –2.01 mm for skeletal class I, class II and class III jaw relationship respectively. Accurate reproducibility of dentoskeletal overjet in assessment of jaw skeletal relationship showed that the lowest value was for assessment of skeletal class III jaw relationship (73% and the value for assessment of both skeletal class I and class II was higher (93%. Conclusions: Dentoskeletal overjet could be utilized in accurate representation of skeletal jaw relationship.

  18. The Usefulness of Automatic Speech Recognition (ASR Eyespeak Software in Improving Iraqi EFL Students’ Pronunciation

    Directory of Open Access Journals (Sweden)

    Lina Fathi Sidig Sidgi

    2017-02-01

    Full Text Available The present study focuses on determining whether automatic speech recognition (ASR technology is reliable for improving English pronunciation to Iraqi EFL students. Non-native learners of English are generally concerned about improving their pronunciation skills, and Iraqi students face difficulties in pronouncing English sounds that are not found in their native language (Arabic. This study is concerned with ASR and its effectiveness in overcoming this difficulty. The data were obtained from twenty participants randomly selected from first-year college students at Al-Turath University College from the Department of English in Baghdad-Iraq. The students had participated in a two month pronunciation instruction course using ASR Eyespeak software. At the end of the pronunciation instruction course using ASR Eyespeak software, the students completed a questionnaire to get their opinions about the usefulness of the ASR Eyespeak in improving their pronunciation. The findings of the study revealed that the students found ASR Eyespeak software very useful in improving their pronunciation and helping them realise their pronunciation mistakes. They also reported that learning pronunciation with ASR Eyespeak enjoyable.

  19. Knowledge and perception about health risks of cigarette smoking among Iraqi smokers

    Directory of Open Access Journals (Sweden)

    Omar Thanoon Dawood

    2016-01-01

    Full Text Available Background: Smoking is a major public health problem, especially in Iraq. There is very little information had been documented regarding smoking risk factors and quit intention among Iraqi smokers. Objectives: The main objectives of this study are to determine smokers' knowledge and perception about smoking health risks; and to determine smoking behavior and quitting intentions among Iraqi smokers; as well as to predict the factors that may associate with quit intentions. Methods: A cross-sectional study was conducted at the outpatient clinic in Tikrit Teaching Hospital, Tikrit City, Iraq. Adult smokers who are smoking cigarette everyday and able to communicate with the researcher were invited to participate in the study. A self-administered questionnaire was used to collect data from 386 participants. Results: This study showed that smokers had low awareness about some risk effects of smoking such as lung cancer in nonsmokers (30.1%, impotence in male smokers (52.6%, premature ageing (64%, and stroke (66.3%. In addition, the high score of knowledge and perception was significantly associated with quitting intention. Conclusion: Smokers' knowledge and perception regarding smoking health effects were low, especially in terms of secondhand smokers. Many efforts needed from health policy-makers and health care professionals to disseminate information about the risks of smoking and health benefits of give up smoking.

  20. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  1. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  2. Between Home and Exile: A Reading of the Exilic Experience of the Iraqi Poet Adnan Al-Sayegh

    Science.gov (United States)

    Ghena, Hana Khlaif

    2016-01-01

    This paper aims at exploring the exilic experience of the Iraqi poet, Adnan Al-Sayegh whose involuntarily departure from his homeland, Iraq, in the early 1990s made him suffer a strong sense of estrangement, nostalgia, self-fragmentation and disconnection. The paper is divided into three sections and a conclusion. Section one sheds light on the…

  3. In the long term, the United States will have a relatively little influence on the Iraqi petroleum

    International Nuclear Information System (INIS)

    Noel, P.

    2003-01-01

    The author examines the US policy in the petroleum domain, the US intentions concerning the Iraqi petroleum, the Opec coherence facing the come back of the Iraq and the increase power of Russian and the demand increase (77 mb/d today for 115 mb/d in 2030). (A.L.B.)

  4. Challenges and Opportunities of Operation Enduring Freedom/Operation Iraqi Freedom Veterans with Disabilities Transitioning into Learning and Workplace Environments

    Science.gov (United States)

    Ostovary, Fariba; Dapprich, Janet

    2011-01-01

    This article presents issues related to disabled military servicemen and women who are transitioning to civilian life. The emphasis is on the experience of veterans serving in the Operation Enduring Freedom (OEF) and Operation Iraqi Freedom (OIF) as they reintegrate into civilian workplace and learning environments. The authors begin with an…

  5. Self-rated health and social capital in Iraqi immigrants to Sweden: The MEDIM population-based study.

    Science.gov (United States)

    Bennet, Louise; Lindström, Martin

    2018-03-01

    Poor self-rated health is an estimator of quality of life and a predictor of mortality seldom studied in immigrant populations. This work aimed to study self-rated health in relation to social capital, socioeconomic status, lifestyle and comorbidity in immigrants from Iraq - one of the largest non-European immigrant group in Sweden today - and to compare it with the self-rated health of native Swedes. The study was a cross-sectional population-based study conducted from 2010 to 2012 among citizens of Malmö, Sweden, aged 30-65 years and born in Iraq or Sweden. All participants underwent a health examination and answered questionnaires on self-rated health, social capital, comorbidity, lifestyle and socioeconomic status. In total, 1348 Iraqis and 677 Swedes participated. Poor self-rated health was identified in 43.9% of Iraqis and 21.9% of native Swedes ( psocial capital was highly prevalent in the immigrants. Female gender showed higher odds of poor self-rated health in Iraqis than in Swedes (OR 1.8, 95% CI 1.4-2.5, p interaction =0.024), independent of other risk factors connected to social capital, socioeconomic status, lifestyle or comorbidity. Although public health initiatives promoting social capital, socioeconomic status and comorbidity in immigrants are crucial, the excess risk of poor self-rated health in Iraqi women is not fully attributed to known risk factors for self-rated health, but remains to be further explored.

  6. The expression of gonadotropin releasing hormone receptor gene in ovaries and uterus cells of Iraqi and Damascus goat breed

    Directory of Open Access Journals (Sweden)

    Alaa kamil Abdulla

    2017-07-01

    Full Text Available Iraqi goats have a major economic role in production of meat, milk and leather as well as it considered a financial source for owners as reproduce twice a year, yet the Damascus goats have great importance than Iraqi goats owing to the number of twin births. The gonadotropin releasing hormone (GnRH and its receptors have great importance in the reproduction and eugenics. To make a comparison between the Iraqi and Damascus goats in terms of this receptor gene expression in the ovaries and uterus tissue cells, the study was performed, in which used the (∆Ct Using a Reference Gene method by quintitive -real time PCR technique. Results were found a significant difference (p<0.05, as the gene expression of (GnRH-R higher in the ovaries and uterus tissue cells in Damascus goats compared with the Iraqi goats. In conclusion; the multiple pregnancies of twins in Damascus goats may be due to an increase gene expression of (GnRH-R in the ovaries and uterus tissue

  7. The Impacts of Liquidity on Profitability in Banking Sectors of Iraq: A Case of Iraqi Commercial Banks.

    Directory of Open Access Journals (Sweden)

    Sardar Shaker Ibrahim

    2017-02-01

    Full Text Available This study examines the influence of liquidity on the profitability of Iraqi commercial banks. Five banks based in Iraq namely: North bank, Iraqi Islamic bank, Sumer bank, Dar Es-Salam bank and Babylon bank randomly selected and analyzed for the current study over the period 2005 to 2013. Moreover,  annual reports of these banks have studied and the main ratios of profitability and liquidity were calculated. These reports are available at Iraqi Stock Exchange site. The variables that were identified as independent for liquidity were, loan deposit ratio, deposit asset ratio and cash deposit ratio, while return on assets as dependent variable for profitability. The Ordinary Least Square (OLS model used to examine the impact of liquidity on profitability. The study observes that any increase in liquidity ratios as above mentioned will lead return on asset to increase as well. Depending on this study it could be better for Iraqi banks to keep a balance between liquidity and profitability.

  8. Forced Dependency and Legal Barriers: Implications of the UK’s Immigration and Social Security Policies for Minoritized Women Living in Abusive Intimate Relationships in Northern Ireland

    Directory of Open Access Journals (Sweden)

    Monica McWilliams

    2015-12-01

    Full Text Available This paper examines the complexities of the help-seeking process of minoritized women (primarily asylum-seekers and immigrants experiencing domestic violence in Northern Ireland. The term ‘minoritized’ is used here to emphasize that “minority” status is not a static or innate trait of certain groups but instead is the outcome of a process of being positioned as a minority. The paper addresses the intersections of ethnicity, nationality, class and gender and shows how state policies in relation to immigration and social security reinforce inequalities in gendered power relations. Despite attempts to improve the social security and immigration systems, the findings from a Northern Ireland study show how recent policy changes have not addressed the systemic institutional racism and institutionalised patriarchy in these agencies. Where avenues for action are undermined by such practices, the policies raise concerns about the safety and protection of minoritized women living in abusive relationships. We argue that the UK is failing to meet its human rights responsibilities to provide adequate support and assistance to minoritized women in abusive relationships and conclude that delivering state accountability alongside a human rights framework based on security, autonomy, liberty and equality is what is needed. Este artículo analiza las complejidades del proceso de búsqueda de ayuda en Irlanda del Norte para mujeres pertenecientes a minorías (principalmente solicitantes de asilo e inmigrantes que sufren violencia doméstica. El término 'minoritarizadas' se utiliza aquí para hacer hincapié en que la situación de "minoría" no es un rasgo estático o innato de ciertos grupos, sino que es el resultado de un proceso de ser posicionado como una minoría. El artículo aborda las intersecciones de origen étnico, nacionalidad, clase y género y muestra cómo las políticas estatales en relación a la inmigración y la seguridad social

  9. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  10. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  11. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  12. Information report on the behalf of the foreign affairs, defence and armed forces Commission on France security, nuclear disarmament and non proliferation

    International Nuclear Information System (INIS)

    2010-01-01

    This report first gives an overview of nuclear disarmament and non proliferation twenty years after the end of Cold War: evolution and status of Russia's and United States' nuclear weapon arsenals, France's and United Kingdom's trend to reduce their nuclear armament, reinforcement of China's nuclear armament, effects and limitations of the Non Proliferation Treaty (NPT). It notices that the new international context gave birth to some expectations and may lead to a lower nuclear pressure, notably with the influence of START negotiations between Russia and the United States, provided that the Comprehensive Nuclear Test Ban Treaty is ratified by more countries, and that negotiations promote a Fissile Material Cut-off Treaty. The report also outlines the importance of the promotion of better controlled peaceful uses of nuclear energy. It discusses the relationship between maintaining the world nuclear order and the reduction of international and regional tensions, and the importance of struggle against all forms of proliferation. It analyses the French nuclear posture in terms of security requirements, and in front of the zero nuclear option, in a context of ballistic missile proliferation, and in relationship with the issue of tactical nuclear weapons in Europe

  13. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  14. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  15. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  16. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  17. ABOUT US

    Science.gov (United States)

    CENTCOM: Search CENTCOM CENTCOM Home ABOUT US COMMAND NARRATIVE LEADERSHIP COMPONENT COMMANDS HISTORY the Iraqi Security Forces (ISF) and Syrian Democratic Forces (SDF), have made extraordinary progress ; Vision Leadership Component Commands History Posture Statement Area of Responsibility CENTCOM Coalition

  18. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  19. Managing Transitions: Examining the Institutional Army’s Transformation Following the Vietnam War and Operation Iraqi Freedom

    Science.gov (United States)

    2015-05-23

    glance at the Middle East, especially the security of Israel and the access routes to the Persian Gulf oil .57...Anti-Air Defense (PVO-S) consisted of crudely developed aircraft, and minimally-trained pilots. Their aircraft consisted of Su-9, Su-15 and...doing so, the Army distilled the 2008 version of FM 3-0 into five simple rules. Army forces would win on the offense, initiate

  20. Evaluation of Inhibitors Blends Used in Iraqi Markets for Automobile Cooling System

    Directory of Open Access Journals (Sweden)

    Watheq Naser Hussein

    2017-08-01

    Full Text Available Detection the behavior of some metals ( carbon steel and copper that are widely used in automobiles cooling system in tap water and a cooling mixture for radiators was held. The purpose of this work is to check the performance of two types of mixtures that available in Iraqi markets, viz the Kuwait mixture and the Germany one and what are known as blue water by an electrochemical technique. The experiments were held at two values of temperatures of 17 and 80 ˚C-where these values of temperature almost represent the cases of idle and operating engine. The obtained results showed that the two types of mixtures have given good inhibition efficiency for the case of steel especially in presence of Germany mixture.

  1. Iraqi, Syrian, and Palestinian Refugee Adolescents' Beliefs About Parental Authority Legitimacy and Its Correlates.

    Science.gov (United States)

    Smetana, Judith G; Ahmad, Ikhlas; Wray-Lake, Laura

    2015-01-01

    This study examined intra- and interindividual variations in parental legitimacy beliefs in a sample of 883 Arab refugee adolescents (M(age) = 15.01 years, SD = 1.60), 277 Iraqis, 275 Syrians, and 331 Palestinians in Amman, Jordan. Confirmatory factor analyses showed distinct latent factors for moral-conventional, prudential, and personal legitimacy items. Older adolescents rated legitimacy lower for personal issues, but higher for prudential issues. Beliefs were associated with socioeconomic status (fathers' education, family size), particularly for personal issues, but were more pervasively associated with displacement-related experiences. Greater war trauma was associated with less prudential legitimacy for all youth and more authority legitimacy over moral-conventional issues for Syrian youth. Greater hopefulness was associated with more authority legitimacy over all but personal issues. © 2015 The Authors. Child Development © 2015 Society for Research in Child Development, Inc.

  2. Medical Logistics Lessons Observed During Operations Enduring Freedom and Iraqi Freedom.

    Science.gov (United States)

    Dole, Mark J; Kissane, Jonathan M

    2016-01-01

    Medical Logistics (MEDLOG) is a function of the Army's integrated System for Health that provides the medical products and specialized logistics services required to deliver health protection and care under all operational conditions. In unified land operations, MEDLOG is an inherent function of Health Service Support (HSS), which also includes casualty care and medical evacuation. This paper focuses on a few key lessons observed during Operations Enduring Freedom and Iraqi Freedom with direct implications for the support of HSS in future operations as envisioned in the Army Operating Concept and the Joint Concept for Health Services. It also examines a few key enablers that helped mitigate these challenges that are not yet fully acknowledged in Army Medical Department doctrine, policy, and planning.

  3. Willingness to Adopt Telemedicine in Major Iraqi Hospitals: A Pilot Study

    Directory of Open Access Journals (Sweden)

    Mohd Khanapi Abd Ghani

    2015-01-01

    Full Text Available The Iraqi healthcare services are struggling to regain their lost momentum. Many physicians and nurses left Iraq because of the current situation in the country. Despite plans of calling back the skilled health workforce, they are still worried by the disadvantages of their return. Hence, technology plays a central role in taking advantage of their profession through the use of telemedicine. Studying the factors that affect the implementation of telemedicine is necessary. Telemedicine covers network services, policy makers, and patient understanding. A framework that includes the influencing factors in adopting telemedicine in Iraq was developed in this study. A questionnaire was distributed among physicians in Baghdad Medical City to examine the hypothesis on each factor. The Statistical Package for the Social Sciences was utilized to verify the reliability of the questionnaire and Cronbach’s alpha test shows that the factors have values more than 0.7, which are standard.

  4. Operation Iraqi Freedom/Operation Enduring Freedom: exploring wartime death and bereavement.

    Science.gov (United States)

    Harrington Lamorie, Jill

    2011-01-01

    Military deaths are often sudden, unanticipated, traumatic, and/or violent in nature and involve the death of a young adult. More than 5,500 service members have died as a result of their service in the wars in Afghanistan (2001) and Iraq (2003) in combat- or non-combat- related incidences. As the death toll continues to rise, service members and their families struggle with the visible and invisible wounds of war. This article explores wartime death, trauma, and bereavement experienced by those survivors affected by service members who have died as a result of their military service in Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF). It recognizes the circumstantial and cultural factors of the death as well as the grief and trauma experiences of survivors. Resources and suggested interventions of support are highlighted.

  5. Effect of gamma irradiation on the sugar and protein composition of Iraqi dates

    International Nuclear Information System (INIS)

    Auda, H.; Khalaf, Z.; Mirjan, J.

    1978-01-01

    Completely ripened date fruits of several Iraqi varieties were irradiated with 30, 70, 100, 270 and 500krad of gamma irradiation and stored at a temperature of 25-35 0 C in wooden boxes or in plastic bags. At various intervals samples were taken and analysed by paper-chromatography, gas-chromatography and spectrophotometry for quantitative and qualitative changes in carbohydrates. The results showed no effect of gamma irradiation on reducing sugar and major carbohydrate components. The formation of malonaldehyde under gamma irradiation of dates and solid standard sugars was also studied up to 500krad. The results showed no formation of malonaldehyde in irradiated date samples as well as standard sugars. Gamma irradiation showed no effect on the protein content of dates. However, storage showed some reduction in the protein content of both unirradiated and irradiated samples. (author)

  6. Specific trauma subtypes improve the predictive validity of the Harvard Trauma Questionnaire in Iraqi refugees.

    Science.gov (United States)

    Arnetz, Bengt B; Broadbridge, Carissa L; Jamil, Hikmet; Lumley, Mark A; Pole, Nnamdi; Barkho, Evone; Fakhouri, Monty; Talia, Yousif Rofa; Arnetz, Judith E

    2014-12-01

    Trauma exposure contributes to poor mental health among refugees, and exposure often is measured using a cumulative index of items from the Harvard Trauma Questionnaire (HTQ). Few studies, however, have asked whether trauma subtypes derived from the HTQ could be superior to this cumulative index in predicting mental health outcomes. A community sample of recently arrived Iraqi refugees (N = 298) completed the HTQ and measures of posttraumatic stress disorder (PTSD) and depression symptoms. Principal components analysis of HTQ items revealed a 5-component subtype model of trauma that accounted for more item variance than a 1-component solution. These trauma subtypes also accounted for more variance in PTSD and depression symptoms (12 and 10%, respectively) than did the cumulative trauma index (7 and 3%, respectively). Trauma subtypes provided more information than cumulative trauma in the prediction of negative mental health outcomes. Therefore, use of these subtypes may enhance the utility of the HTQ when assessing at-risk populations.

  7. Concentration of uranium in human cancerous tissues of Southern Iraqi patients using fission track analysis

    International Nuclear Information System (INIS)

    Al-Hamzawi, A.A.; Al-Qadisiyah University, Qadisiyah; Jaafar, M.S.; Tawfiq, N.F.

    2015-01-01

    The technique of nuclear fission track analysis with solid state nuclear track detectors CR-39 has been applied to determine concentrations of uranium in cancerous samples of human tissues that excised from patients in the three key southern Iraqi governorates namely, Basrah, Dhi-Qar, and Muthanna. These provinces were the sites of intensive military events during the Gulf Wars in 1991 and 2003. The investigation was based on the study of 24 abnormal samples and 12 normal samples for comparing the results. These samples include four types of soft tissues (kidney, breast, stomach and uterus). The results show that uranium concentrations in the normal tissues ranged between (1.42-4.76 μg kg -1 ), whereas in the cancerous tissues ranged between (3.37-7.22 μg kg -1 ). The uranium concentrations in the normal tissues were significantly lower than in the abnormal tissues (P < 0.001). (author)

  8. Kidnapping and Mental Health in Iraqi Refugees: The Role of Resilience.

    Science.gov (United States)

    Wright, A Michelle; Talia, Yousif R; Aldhalimi, Abir; Broadbridge, Carissa L; Jamil, Hikmet; Lumley, Mark A; Pole, Nnamdi; Arnetz, Bengt B; Arnetz, Judith E

    2017-02-01

    Although kidnapping is common in war-torn countries, there is little research examining its psychological effects. Iraqi refugees (N = 298) were assessed upon arrival to the U.S. and 1 year later. At arrival, refugees were asked about prior trauma exposure, including kidnapping. One year later refugees were assessed for posttraumatic stress disorder (PTSD) and major depression disorder (MDD) using the SCID-I. Individual resilience and narratives of the kidnapping were also assessed. Twenty-six refugees (9 %) reported being kidnapped. Compared to those not kidnapped, those who were had a higher prevalence of PTSD, but not MDD, diagnoses. Analyses examining kidnapping victims revealed that higher resilience was associated with lower rates of PTSD. Narratives of the kidnapping were also discussed. This study suggests kidnapping is associated with PTSD, but not MDD. Additionally, kidnapping victims without PTSD reported higher individual resilience. Future studies should further elucidate risk and resilience mechanisms.

  9. The health profile and chronic diseases comorbidities of US-bound Iraqi refugees screened by the International Organization for Migration in Jordan: 2007-2009.

    Science.gov (United States)

    Yanni, Emad A; Naoum, Marwan; Odeh, Nedal; Han, Pauline; Coleman, Margaret; Burke, Heather

    2013-02-01

    More than 63,000 Iraqi refugees were resettled in the United States from 1994 to 2010. We analyzed data for all US-bound Iraqi refugees screened in International Organization for Migration clinics in Jordan during June 2007-September 2009 (n = 18,990), to describe their health profile before arrival in the United States. Of 14,077 US-bound Iraqi refugees ≥ 15 years of age, one had active TB, 251 had latent TB infection, and 14 had syphilis. No HIV infections were reported. Chronic diseases comorbidities accounted for a large burden of disease in this population: 35% (n = 4,105) of screened Iraqi refugees had at least one of three chronic medical conditions; hypertension, diabetes mellitus, or obesity. State health departments and clinicians who screen refugees need to be aware of the high prevalence of chronic diseases among Iraqi refugees resettled in the United States. These results will help public health specialists develop policies to reduce morbidity and mortality among US-bound Iraqi refugees.

  10. Tuberculosis in Sulaimaniyah, Iraqi Kurdistan: A Detailed Analysis of Cases Registered in Treatment Centers.

    Science.gov (United States)

    Karadakhy, Kamaran; Othman, Nasih; Ibrahimm, Faredun; Saeed, Akam Ali; Amin, Ari Abdul-Adheem Hama

    2016-01-01

    Tuberculosis (TB) remains a major public health problem especially in low and middle-income countries. The current study was undertaken to estimate the incidence of the disease and describe its epidemiological characteristics in Iraqi Kurdistan. A retrospective study was carried out on cases registered in the directly observed treatment-short course (DOTS) centers in Sulaimaniyah province. Information was collected from the summary reports of all cases registered in 2010 and detailed information was obtained from 307 cases in the main center. During 2010, a total of 530 new and relapsed cases were registered in the DOTS centers amounting to an annual incidence of 31 per 100,000. Over 73% of cases were pulmonary TB and 45% of all cases had positive smear. Most common symptoms were cough (58%), sweating (49%) and fever (48). Almost 43% of patients were diagnosed by direct swab examination, 30% by biopsy and 23% through clinical and radiologic examination. In relation to outcome, 89% of patients were treated successfully, 7% died and 3% defaulted. Mortality rate was 8% in pulmonary infection and 4% in extrapulmonary infection. Old age (65 years and over) was significantly associated with higher odds of death compared to people aged 34 years and younger (OR 6.7, 95% CI 1.3-36.1, P=0.03). The incidence of TB is still high in the Iraqi Kurdistan. The DOTS has been successful in treating the majority of cases but there are areas needing improvement especially record-keeping and patient follow-up during and after treatment.

  11. Evaluation of instruments to assess health literacy in Arabic language among Iraqis.

    Science.gov (United States)

    Al-Jumaili, Ali Azeez; Al-Rekabi, Mohammed Dakhil; Sorofman, Bernard

    2015-01-01

    Low health literacy is associated with lack of medical information, less use of preventive measures, low medication adherence rates, high health care costs and high risk of hospitalization. The aims were to compare the results of the three health literacy tests, to measure for the first time the health literacy level of Iraqis, to describe the use of standardized health literacy tests, to evaluate reliability and validity of the Arabic versions of these tests, and to investigate whether there is relationship between the participant characteristics and the health literacy level. A convenience sample of 95 subjects was studied in five community pharmacies in Al-Najaf and Babylon governorates, Iraq. Three health literacy tests, the Single Item Literacy Screener (SILS), the New Vital Sign (NVS) and the Short version of the Test of Functional Health Literacy in Adults (S-TOFHLA), were translated in the Arabic language and administered to the pharmacy customers. There were no statistically significant associations between age, gender, education and current education status and NVS score, but there were significant positive associations between the level of education and each one of SILS, New SILS, and S-TOFHLA scores. SILS has one subjective, possibly culturally biased question. Since Iraqis are generally not exposed to reading product labels, the NVS test might be not an accurate measure for them. S-TOFHLA was the most comprehensive test and gave equitable results. The Arabic version of S-TOFHLA can be used to measure health literacy in 22 Arabic speaking countries. Copyright © 2015 Elsevier Inc. All rights reserved.

  12. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  13. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  14. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  15. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  16. The US Army in Kirkuk: Governance Operations on the Fault Lines of Iraqi Society, 2003-2009

    Science.gov (United States)

    2011-12-01

    point 16 repeatedly to the Baathist regime’s de-Kurdification of Kirkuk as prima facie justification for returning control of the city to the Kurds...Americans had a quid pro quo obligation to help them get their land back from the 10,000 squatting Arabs.23 Patrick Clawson of the Middle East Quarterly...beginning of the campaign, US Soldiers were gradu- ally passing these obligations to Iraqi government officials to manage their own internal and external

  17. Lessons of the Iraqi De-Ba’athification Program for Iraq’s Future and the Arab Revolutions

    Science.gov (United States)

    2012-05-01

    with some of the Arab Spring militaries and has a particu- larly strong relationship with the Egyptian military. These bonds of trust, cooperation...suitable tomb for the co-founder of Ba’athism. Saddam was not a military man, and as a youth was rejected for entry into the Iraqi military academy due...Egypt. While parallels between Saddam Hussein’s Iraq and 64 these countries exist, differences vastly outnumber similarities. The Tunisian and Egyptian

  18. Reproductive and Productive Performance of Iraqi Buffaloes as Influenced by Pre-Mating and Pre-Calving Concentrate Supplementation

    Directory of Open Access Journals (Sweden)

    Talal Anwer Abdulkareem*, Sawsan Ali Al-Sharifi, Sajeda Mahdi Eidan and R.G. Sasser1

    2012-06-01

    Full Text Available The objective of the present study was to investigate the influence of pre-mating and pre-calving concentrate supplementation of Iraqi buffaloes on some of the reproductive (estrus, mating, pregnancy and calving rates and productive (daily milk yield and calves birth weight traits. This study was carried out in 4 Iraqi South-central governorates using 596 pre-mating and 628 pregnant buffaloes (during the last two months of gestation. Pre-mating buffaloes were divided randomly into 496 concentrate-supplemented buffaloes (Flushing and 100 control ones. Additionally, pregnant buffaloes were also divided into 528 concentrate- supplemented buffaloes (Steaming up and 100 controls. Each buffalo within the flushing and steaming up groups were fed daily on 7 Kg of concentrate diet (13% crude protein and 1.70 Mcal of net energy for 60 days. The control buffaloes were nourished only on low-quality roughages of the area and wheat bran. Higher estrus (+15%, P<0.01, pregnancy (+23.8%, P<0.05 and calving rates (+30.8%, P<0.01 were observed in concentrate-supplemented buffaloes as compared with controls. An obvious increase in (P<0.05 calving rate (+14.7%, daily milk yield (+44.8% and calf birth weight (+25.6% were noted in steaming up buffaloes in comparison with control buffaloes. Results indicated that improvement in feeding schedule of Iraqi buffaloes during pre-mating and late gestation periods enhanced the reproductive performance and increased milk production of subsequent lactation and calf birth weight. These improvements increased owner income ($174=209,000 Iraqi dinar /buffalo from the sale of meat and milk.

  19. Gunshot Wounds in Military Working Dogs in Operation Enduring Freedom and Operation Iraqi Freedom: 29 cases (2003-2009)

    Science.gov (United States)

    2013-01-01

    oxygenmask held in proximity to the dog’s face or taped to a basket-style muzzle ) during evacuation to the VTF. None of the WIA dogs received IV crystalloid...military working dogs in Operation Enduring Freedom and Operation Iraqi Freedom: 29 cases (2003–2009) Janice L. Baker, DVM; Karyn A. Havas, DVM; Laura A...received on the battlefield, and ultimate outcome of U.S. military working dogs that incurred gunshot wound (GSW) injury in Operation Enduring Freedom

  20. Field Artillery And Fire Support At The Operational Level: An Analysis Of Operation Desert Storm and Operation Iraqi Freedom

    Science.gov (United States)

    2017-05-25

    assistance with editing and for supporting this endeavor, and to our two wonderful children , Olivia and Theodore. Our time here at Fort Leavenworth has been...Baathist regime. 7 Mary Kaldor, New and Old Wars: Organized Violence in a Global Era, 3d ed...II, 165. 33 television several hours later, denouncing the strike as a “criminal act” and calling on the Iraqi people to draw their swords

  1. E-government factors to reduce administrative and finance corruption in Arab countries: Case study Iraqi oil sector

    Science.gov (United States)

    Mohammed, M. A.; Eman, Y.; Hussein, A. H.; Hasson, A. R.

    2015-12-01

    Arab countries face the corruption issues in its several public organizations. The corruption in these countries is considered as the main challenge. The oil sector is one of the public sectors that have huge level of corruption. However, the Iraqi economy had become dependable on oil sector daring the last three decades, and on the contrary, of what other oil countries did. The capital is considered as one of the essential factor for economic development. The revenues of oil exports will stay the essential source for economic development in Iraq in the future in order to reduce being dependable on oil. Since the beginning of the 3rd thousands, the world witnessed great rise in the demand on oil, but the Iraqi exports of crude oil come to be less than its similarities in the seventeenths of last century. So our oil sector is still in need of deep study. This study focuses on technological technique that can make huge decrease for corruption in oil sector in Iraq. However, e-government is considered as the best techniques that can decrease the corruption. Thus, this study bases on challenges that effect on build successful e-government project in Iraqi oil industry.

  2. Food and Nutrient Intake among 12-Month-Old Norwegian-Somali and Norwegian-Iraqi Infants.

    Science.gov (United States)

    Grewal, Navnit Kaur; Andersen, Lene Frost; Kolve, Cathrine Solheim; Kverndalen, Ingrid; Torheim, Liv Elin

    2016-09-28

    The aim of the present paper was to describe food and nutrient intake among 12-month-old Norwegian-Somali and Norwegian-Iraqi infants, with a focus on iron and vitamin D intake. A cross-sectional survey was conducted from August 2013 through September 2014. Eighty-nine mothers/infants of Somali origin and 77 mothers/infants of Iraqi origin residing in Eastern Norway participated in the study. Data were collected using two 24-h multiple-pass recalls. Forty percent of the Norwegian-Somali infants and 47% of the Norwegian-Iraqi infants were breastfed at 12 months of age ( p = 0.414). Median energy percentages (E%) from protein, fat and carbohydrates were within the recommended intake ranges, except the level of saturated fats (12-13 E%). Median intakes of almost all micronutrients were above the recommended daily intakes. Most of the infants consumed iron-enriched products (81%) and received vitamin D supplements (84%). The median intakes of iron and vitamin D were significantly higher among infants receiving iron-enriched products and vitamin D supplements compared to infants not receiving such products ( p food and nutrient intake of this group of infants in general seems to be in accordance with Norwegian dietary recommendations. Foods rich in iron and vitamin D supplements were important sources of the infants' intake of iron and vitamin D and should continue to be promoted.

  3. Exploring Electronic Communication Modes Between Iraqi Faculty and Students of Pharmacy Schools Using the Technology Acceptance Model.

    Science.gov (United States)

    Al-Jumaili, Ali Azeez; Al-Rekabi, Mohammed D; Alsawad, Oday S; Allela, Omer Q B; Carnahan, Ryan; Saaed, Hiwa; Naqishbandi, Alaadin; Kadhim, Dheyaa J; Sorofman, Bernard

    2017-06-01

    Objective. To explore for the first time the extent to which Iraqi pharmacy students and faculty use Facebook and university email for academic communications, and to examine factors influencing utilization within the framework of the Technology Acceptance Model (TAM). Methods. An electronic survey was administered to convenience samples of students and faculty of six Iraqi public schools and colleges of pharmacy in 2015. Results. Responses included 489 student and 128 faculty usable surveys. Both students and faculty use Facebook more than university email for academic communications. Less than a third of the faculty used university email. Students used Facebook for academic purposes twice as much as faculty. Conclusion. Absence of university email in Iraqi schools and colleges of pharmacy makes Facebook essential for faculty-student communications. The majority (71.1% to 82%) of respondents perceived that Facebook was easy to use. Three TAM variables (intention to use, attitude toward use and perceived usefulness) had significant positive associations with actual use of both Facebook messaging and university email.

  4. "Seeing the Life": Redefining self-worth and family roles among Iraqi refugee families resettled in the United States.

    Science.gov (United States)

    Nelson, Matthew; Hess, Julia Meredith; Isakson, Brian; Goodkind, Jessica

    2016-08-01

    Social and geographic displacement is a global phenomenon that precipitates novel stressors and disruptions that intersect with longstanding familial and social roles. Among the displaced are war-torn Iraqi refugee families, who must address these new obstacles in unconventional ways. This study explores how such disruptions have influenced associations between gender and apparent self-worth experienced by Iraqi refugee families upon relocation to the United States. Further, the psychosocial mechanisms requisite of any novel approach to a new social construct are explored and reveal that production in the family is at the core of instability and shifting power dynamics during resettlement, preventing family members from "seeing the life" in the United States that they had envisioned prior to immigration. Over 200 semi-structured qualitative interviews with Iraqi participants and mental health providers were conducted over the course of the study, and demonstrate a plasticity among social roles in the family and community that transcends the notion of a simple role reversal, and illustrate the complex positionalities that families under stress must approximate during such physical and social displacement.

  5. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  6. Physician Acceptance of Pharmacist Recommendations about Medication Prescribing Errors in Iraqi Hospitals

    Directory of Open Access Journals (Sweden)

    ALI AZEEZ ALI AL-JUMAILI

    2016-08-01

    Full Text Available The objectives of this study were to measure the incidence and types of medication prescribing errors (MPEs in Iraqi hospitals, to calculate for the first time the percentage of physician agreement with pharmacist medication regimen review (MRR recommendations regarding MPEs, and to identify the factors influencing the physician agreement rate with these recommendations. Methods: Fourteen pharmacists (10 females and 4 males reviewed each hand-written physician order for 1506 patients who were admitted to two public hospitals in Al-Najaf, Iraq during August 2015. The pharmacists identified medication prescribing errors using the Medscape WebMD, LCC phone application as a reference. The pharmacists contacted the physicians (2 females and 34 males in-person to address MPEs that were identified. Results: The pharmacists identified 78 physician orders containing 99 MPEs with an incidence of 6.57 percent of all the physician orders reviewed. The patients with MPEs were taking 4.8 medications on average. The MPEs included drug-drug interactions (65.7%, incorrect doses (16.2%, unnecessary medications (8.1%, contra-indications (7.1%, incorrect drug duration (2%, and untreated conditions (1%. The physicians implemented 37 (37.4% pharmacist recommendations. Three factors were significantly related to physician acceptance of pharmacist recommendations. These were physician specialty, pharmacist gender, and patient gender. Pediatricians were less likely (OR= 0.1 to accept pharmacist recommendations compared to internal medicine physicians. Male pharmacists received more positive responses from physicians (OR=7.11 than female pharmacists. Lastly, the recommendations were significantly more likely to be accepted (OR= 3.72 when the patients were females. Conclusions: The incidence of MPEs is higher in Iraqi hospitalized patients than in the U.S. and U.K, but lower than in Brazil, Ethiopia, India, and Croatia. Drug-drug interactions were the most common type of

  7. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  8. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  9. Developing Sustainable Afghan National Security Forces

    Science.gov (United States)

    2012-06-08

    codifies approved methods and techniques throughout an organization. “Doctrine is accepted corporate knowledge; it is authoritative . By definition...doctrine provides authoritative guidance on how the organization ought to operate with current capabilities. It therefore provides the basis for...nutrition; and infant, child, and maternal mortality. . . . Furthermore, Afghanistan’s prospects for growth are severely limited by weak economic

  10. Forced displacement and women's security in Colombia.

    Science.gov (United States)

    Meertens, Donny

    2010-04-01

    In the protracted Colombian conflict, assistance to internally displaced persons has developed in the context of contradictory political processes. The Colombian government's launching of a transitional justice process in the midst of armed conflict has generated a complex situation displaying both conflict and post-conflict characteristics. The progressive Constitutional Court rulings on internal displacement, in particular the gender-sensitive Auto 092, constitute an attempt to bring together humanitarian interventions and transitional justice measures in a rights-based framework. However, the national government is reluctant to adopt them fully and local realities still hamper their integrated implementation. Displaced women, therefore, remain in an especially vulnerable position. This paper argues that gender-sensitive humanitarian interventions must take into account all of these complexities of scale and political process in order to make legal frameworks more effective at the local level. In these contexts, interventions should pay particular attention to strategies that contribute to transforming pre-existing gender regimes.

  11. Security Forces of the Kurdistan Regional Government

    Science.gov (United States)

    2009-02-26

    crisp uniforms. Those in the lower...ur o M em be r. G en er al S ta ff R eg io na l C om m an ds Fu nc tio na l C om m an ds P re si de nc y C ou nc il O pe ra tio ns (G 3) A dm in is...nc y C ou nc il O pe ra tio ns (G 3) A dm in is tra tio n/ Lo gi st ic s (G 1/ G 4) P es hm er ga M in is te r* Fi na nc e In sp ec to r G en er al

  12. Subatomic forces

    International Nuclear Information System (INIS)

    Sutton, C.

    1989-01-01

    Inside the atom, particles interact through two forces which are never felt in the everyday world. But they may hold the key to the Universe. These ideas on subatomic forces are discussed with respect to the strong force, the electromagnetic force and the electroweak force. (author)

  13. DefenseLink Special: On Assignment with Jim Garamone

    Science.gov (United States)

    . Soldiers Work Iraqi Leadership Issues RUSTAMIYAH, Iraq, May 30, 2006 - A number of initiatives are under way to instill democratic values in the Iraq security forces. One such initiative involves U.S. Army leadership experts helping to set up the Iraqi Center for Values, Principles and Leadership here. Story More

  14. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  15. Specific Trauma Subtypes Improve the Predictive Validity of the Harvard Trauma Questionnaire in Iraqi Refugees

    Science.gov (United States)

    Arnetz, Bengt B.; Broadbridge, Carissa L.; Jamil, Hikmet; Lumley, Mark A.; Pole, Nnamdi; Barkho, Evone; Fakhouri, Monty; Talia, Yousif Rofa; Arnetz, Judith E.

    2014-01-01

    Background Trauma exposure contributes to poor mental health among refugees, and exposure often is measured using a cumulative index of items from the Harvard Trauma Questionnaire (HTQ). Few studies, however, have asked whether trauma subtypes derived from the HTQ could be superior to this cumulative index in predicting mental health outcomes. Methods A community sample of recently arrived Iraqi refugees (N = 298) completed the HTQ and measures of posttraumatic stress disorder (PTSD) and depression symptoms. Results Principal components analysis of HTQ items revealed a 5-component subtype model of trauma that accounted for more item variance than a 1-component solution. These trauma subtypes also accounted for more variance in PTSD and depression symptoms (12% and 10%, respectively) than did the cumulative trauma index (7% and 3%, respectively). Discussion Trauma subtypes provided more information than cumulative trauma in the prediction of negative mental health outcomes. Therefore, use of these subtypes may enhance the utility of the HTQ when assessing at-risk populations. PMID:24549491

  16. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L. by using RAPD Technique

    Directory of Open Access Journals (Sweden)

    Muhanned Abdul Hasan Kareem

    2018-01-01

    Full Text Available In this study provided all molecular markers of Random amplified polymorphic (RAPD successfully with the sixty five Iraqi date palm (Phoenix dactylifera L. cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592 bands, polymorphism per all primers were (%64.2, primer efficiency was 0.1, and discriminatory value was (%0.09, which revealed a high percentage similarity about %67 to %100 between cultivars belong to the same variety. There are relationships with twenty four genotypes, divided in to two clusters, clusterΙ ranged distance from 0.74 to 1.30 represented(Maddany, Ashrasi, Greatli, Smeasmi and sukkary and clusterII ranged distance from 0.25 to 0.60 which divided into three sub group, there are sub group I represented (Sultana, Khestawi, Breem, Sabb Drrah, Hamrawi, Brban, and Khadrawi, sub groupiesII represented (Zahdi, Tebarzal, Maktom, brahi, Chipchab and Fom Alrman, sub groupies III represented (Usta Umran, Nersi, Najdi, Guntar, Shwethi and Ghanami Ahmer.

  17. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L. by using RAPD Technique

    Directory of Open Access Journals (Sweden)

    Muhanned Abdul Hasan

    2017-12-01

    Full Text Available In this study provided all molecular markers of Random amplified polymorphic (RAPD successfully with the sixty five Iraqi date palm (Phoenix dactylifera L. cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592 bands, polymorphism per all primers were (%64.2, primer efficiency was 0.1, and discriminatory value was (%0.09, which revealed a high percentage similarity about %67 to %100 between cultivars belong to the same variety. There are relationships with twenty four genotypes, divided in to two clusters, clusterΙ ranged distance from 0.74 to 1.30 represented(Maddany, Ashrasi, Greatli, Smeasmi and sukkary and clusterII ranged distance from 0.25 to 0.60 which divided into three sub group, there are sub group I represented (Sultana, Khestawi, Breem, Sabb Drrah, Hamrawi, Brban, and Khadrawi, sub groupiesII represented (Zahdi, Tebarzal, Maktom, brahi, Chipchab and Fom Alrman, sub groupies III represented (Usta Umran, Nersi, Najdi, Guntar, Shwethi and Ghanami Ahmer.  

  18. Geological evolution of the Iraqi Mesopotamia Foredeep, inner platform and near surroundings of the Arabian Plate

    Science.gov (United States)

    Sissakian, Varoujan K.

    2013-08-01

    The Iraqi territory could be divided into four main tectonic zones; each one has its own characteristics concerning type of the rocks, their age, thickness and structural evolution. These four zones are: (1) Inner Platform (stable shelf), (2) Outer Platform (unstable shelf), (3) Shalair Zone (Terrain), and (4) Zagros Suture Zone. The first two zones of the Arabian Plate lack any kind of metamorphism and volcanism. The Iraqi territory is located in the extreme northeastern part of the Arabian Plate, which is colliding with the Eurasian (Iranian) Plate. This collision has developed a foreland basin that includes: (1) Imbricate Zone, (2) High Folded Zone, (3) Low Folded Zone and (4) Mesopotamia Foredeep. The Mesopotamia Foredeep, in Iraq includes the Mesopotamia Plain and the Jazira Plain; it is less tectonically disturbed as compared to the Imbricate, High Folded and Low Folded Zones. Quaternary alluvial sediments of the Tigris and Euphrates Rivers and their tributaries as well as distributaries cover the central and southeastern parts of the Foredeep totally; it is called the Mesopotamian Flood Plain. The extension of the Mesopotamia Plain towards northwest however, is called the Jazira Plain, which is covered by Miocene rocks. The Mesopotamia Foredeep is represented by thick sedimentary sequence, which thickens northwestwards including synrift sediments; especially of Late Cretaceous age, whereas on surface the Quaternary sediments thicken southeastwards. The depth of the basement also changes from 8 km, in the west to 14 km, in the Iraqi-Iranian boarders towards southeast. The anticlinal structures have N-S trend, in the extreme southern part of the Mesopotamia Foredeep and extends northwards until the Latitude 32°N, within the Jazira Plain, there they change their trends to NW-SE, and then to E-W trend. The Mesozoic sequence is almost without any significant break, with increase in thickness from the west to the east, attaining 5 km. The sequence forms the main

  19. Fire retardancy assessment of polypropylene composite filed with nano clay prepared from Iraqi bentonite

    Science.gov (United States)

    Kareem Salih, Watheq

    2018-05-01

    Fire retardants have an extraordinary importance because of their role in saving the people, property and reducing the damages and minimizing the dangers resulting from fires and burning of polymeric composites which are used in different civil and industrial fields. The work in this paper can be divided into two main stages. In first one nano-clay was manufactured from Iraqi bentonite and it was characterized using AFM, XRD, XRF, SEM, and BET. The AFM test showed the particle size of prepared nano clay was about 99.25 nm. In the second stage, polypropylene/nano clay composites at three low loading percents (0%,2%,4%,6%) were formulated via twin screw extruder. The fire retardancy tests included burning rate according to ASTM:D-635 and maximum flame height of flame according to ASTM:D-3014. Besides, the mechanical tests and thermal behavior of prepared samples were investigated. The results showed that (4%) of nano-clay had the maximum fire retardancy and while at (2%) loading, the maximum value of tensile strength and Yong modulus were obtained. The maximum heat of fusion was recorded for 6% nano clay sample. The final results assessment confirmed on the possibility of using low loadings of prepared nano clay to improve the fire retardancy, mechanical and thermal properties successfully.

  20. Minimizing the Moisture Damage and Drain down of Iraqi SMA Mixtures Using Waste Additives

    Directory of Open Access Journals (Sweden)

    Ali Al-Hadidy

    2013-04-01

    Full Text Available This research deals with the viability of using polyester fiber (PF, crumb rubber tire (CRT and cellulose fiber (CF as stabilizing waste additives in producing Iraqi SMA mixtures that sustain drain down phenomenon and moisture damage sensitivity. Different ratios of these additives (0.1, 0.2, and 0.3% by weight of aggregate and filler were mixed with 40/50 paving asphalt by means of dry process. Unmodified and modified SMA mixtures were subjected to drain down, Marshall, static indirect tensile strength, tensile stiffness modulus, static compressive strength, tensile strength ratio and index of retained strength tests. A set of regression equations between these tests were established. In addition, an optimization table based on these tests, which can be used to select the type or amount of additive for any field applications has been determined and reported. The results indicated that the inclusion of these additives in SMA mixtures can satisfy the performance requirement of high temperature and much rain zone.

  1. Acculturation and post-migration psychological symptoms among Iraqi refugees: A path analysis.

    Science.gov (United States)

    LeMaster, Joseph W; Broadbridge, Carissa L; Lumley, Mark A; Arnetz, Judith E; Arfken, Cynthia; Fetters, Michael D; Jamil, Hikmet; Pole, Nnamdi; Arnetz, Bengt B

    2018-01-01

    Refugees frequently experience symptoms of posttraumatic stress and depression, which impede their acculturation in the new host country where they are resettling. There are few longitudinal studies investigating predictors of mental health and acculturation during the early postmigration period. We conducted a longitudinal study of 298 Iraqi refugees, assessing them upon arrival to the U.S. and 1 year after migration. Premigration trauma was associated with increased PTSD and depressive symptoms at baseline, and with decreased acculturation 1 year later. Resilience was associated with depressive symptoms at 1-year follow-up, but not with other resettlement outcomes (PTSD symptoms, English-language skills, or acculturation). PTSD and depressive symptoms at baseline predicted the same symptoms at 1-year follow-up, but not any other resettlement outcomes. The number of chronic diseases at baseline predicted worse PTSD and depressive symptoms, acculturation, and English language skills at 1-year follow up. Postmigratory exposure to daily stressors and less social support predicted worse 1-year outcomes. Results suggest that interventions that aim to improve mental health and promote acculturation among refugees should assess their history of trauma, chronic disorders, and psychological symptoms soon after migration, and promptly provide opportunities for social support. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  2. Translating Legal Collocations in Contract Agreements by Iraqi EFL Students-Translators

    Directory of Open Access Journals (Sweden)

    Muntaha A. Abdulwahid

    2017-01-01

    Full Text Available Legal translation of contract agreements is a challenge to translators as it involves combining the literary translation with the technical terminological precision. In translating legal contract agreements, a legal translator must utilize the lexical or syntactic precision and, more importantly, the pragmatic awareness of the context. This will guarantee an overall communicative process and avoid inconsistency in legal translation. However, the inability of the translator to meet these two functions in translating the contract item not only affects the contractors’ comprehension of the contract item but also affects the parties’ contractual obligations. In light of this, the purpose of this study was to find out how legal collocations used in contract agreements are translated from Arabic into English by student-translators in terms of (1 purely technical, (2 semi-technical, and (3 everyday vocabulary collocations. For the data collection, a multiple-choice collocation test was used to be answered by 35 EFL Iraqi undergraduate translator-students to decide on the aspects of weaknesses and strengths of their translation, thus decide on the aspects of correction. The findings showed that these students had serious problems in translating legal collocations as they lack the linguistic knowledge and pragmatic awareness needed to achieve the legal meaning and effect. They were also unable to make a difference among the three categories of legal collocations, purely technical, semi-technical, and everyday vocabulary collocations. These students should be exposed to more legal translation practices to obtain the required experience needed for their future career.

  3. Unemployment in Iraqi Refugees: The Interaction of Pre and Post-Displacement Trauma

    Science.gov (United States)

    Wright, A. Michelle; Dhalimi, Abir; Lumley, Mark A.; Jamil, Hikmet; Pole, Nnamdi; Arnetz, Judith E.; Arnetz, Bengt B.

    2016-01-01

    Previous refugee research has been unable to link pre-displacement trauma with unemployment in the host country. The current study assessed the role of pre-displacement trauma, post-displacement trauma, and the interaction of both trauma types to prospectively examine unemployment in a random sample of newly-arrived Iraqi refugees. Participants (N=286) were interviewed three times over the first two years post-arrival. Refugees were assessed for pre-displacement trauma exposure, post-displacement trauma exposure, a history of unemployment in the country of origin and host country, and symptoms of posttraumatic stress disorder (PTSD) and depression. Analyses found that neither pre-displacement nor post-displacement trauma independently predicted unemployment 2 years post-arrival; however, the interaction of pre and post-displacement trauma predicted 2-year unemployment. Refugees with high levels of both pre and post-displacement trauma had a 91% predicted probability of unemployment, whereas those with low levels of both traumas had a 20% predicted probability. This interaction remained significant after controlling for sociodemographic variables and mental health upon arrival to the U.S. Resettlement agencies and community organizations should consider the interactive effect of encountering additional trauma after escaping the hardships of the refugee's country of origin. PMID:27535348

  4. A Periphery Becomes a Center? Shopping Malls as Symbols of Modernity in Iraqi Kurdistan

    Directory of Open Access Journals (Sweden)

    Schluwa Sama

    2015-11-01

    Full Text Available Being labelled and framed as a remote periphery of Iraq, the Kurdistan Region of Iraq is transforming since 2003 into a center attracting investments worth billions of dollars. Investigating this transformation, I scrutinize one of the visible outcomes of the investments, namely shop- ping malls, as examples and symbols of “modernity” and “progress.” The recently built shopping malls are thereby analyzed as the built materialization and symbols of neoliberal transformation and socio-economic change. Engaging with representatives of shopping malls as well as with the experiences of young female shopping-mall-goers, it will be illustrated how modernity and progress is framed within the Kurdish nationalist narrative and how this is taken up by young Kurdish female mall-goers. Thus, it will be contended that a historical narrative of past sufferings comes to legitimize the new liberal “freedoms” that are available through the full connection to and participation of Iraqi Kurdistan in the capitalist economic world system.

  5. Metabolic syndrome in Iraqi female patients with major β-thalassemia

    Directory of Open Access Journals (Sweden)

    Shaemaa Hadi Abdulsada

    2017-02-01

    Full Text Available Patients with β-thalassemia may have an increased risk for diabetes mellitus and cardiovascular diseases due to high level of iron which may lead to insulin resistanceand metabolic syndrome. So this study aimed to evaluate the levels of lipids profile in Iraqi female patients with β-thalassemia. Forty twofemale (age 15-30 years were enrolled in this study. Blood was collected and the sera were separated from (22 female patients with β-thalassemia who were attended the Ibn-Al-Baladi hospital from September 2012 to January 2013 and (20 healthy subject as a control group. Body mass index (BMI, lipid profile, FSG, insulin, insulin resistance, insulin sensitivity, B-cell function, iron, atherogenic index of serum were estimated. The results showed the presence of a significant increase in serum iron and significant decrease in insulin, B-cell function, LDL, VLDL, and TC in serum of patients with β-thalassemia when compared with control group. BMI also showed a significant decrease in patients when compared with the controls. Serum Insulin resistance, insulin sensitivity, HDL, TG, AIS, and FSG showed no-significant differences in patients with β-thalassemia when compared with control group. We concluded there was no metabolic syndrome in female patients with β-thalassemia.

  6. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  7. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  8. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  9. Critical Care Air Transport Team severe traumatic brain injury short-term outcomes during flight for Operation Iraqi Freedom/Operation Enduring Freedom.

    Science.gov (United States)

    Boyd, L Renee; Borawski, J; Lairet, J; Limkakeng, A T

    2017-10-01

    Our understanding of the expertise and equipment required to air transport injured soldiers with severe traumatic brain injuries (TBIs) continue to evolve. We conducted a retrospective chart review of characteristics, interventions required and short-term outcomes of patients with severe TBI managed by the US Air Force Critical Care Air Transport Teams (CCATTs) deployed in support of Operation Iraqi Freedom and Operation Enduring Freedom between 1 June 2007 and 31 August 2010. Patients were cared for based on guidelines given by the Brain Trauma Foundation and the Joint Theater Trauma System by non-neurosurgeon physicians with dedicated neurocritical care training. We report basic characteristics, injuries, interventions required and complications during transport. Intracranial haemorrhage was the most common diagnosis in this cohort. Most injuries were weapon related. During this study, there were no reported in-flight deaths. The majority of patients were mechanically ventilated. There were 45 patients who required at least one vasopressor to maintain adequate tissue perfusion, including four patients who required three or more. Some patients required intracranial pressure (ICP) management, treatment of diabetes insipidus and/or seizure prophylaxis medications. Air transport personnel must be prepared to provide standard critical care but also care specific to TBIs, including ICP control and management of diabetes insipidus. Although these patients and their potential complications are traditionally managed by neurosurgeons, those providers without neurosurgical backgrounds can be provided this training to help fill a wartime need. This study provides data for the future development of air transport guidelines for validating and clearing flight surgeons. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  10. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  11. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  12. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  13. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  14. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  15. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  16. Gasoline, Ethanol and Methanol (GEM) Ternary Blends utilization as an Alternative to Conventional Iraqi Gasoline to Suppress Emitted Sulfur and Lead Components to Environment

    OpenAIRE

    Miqdam Tariq Chaichan

    2016-01-01

    Iraqi conventional gasoline characterized by its low octane number not exceed 82 and high lead and sulfur content. In this paper tri-component or ternary, blends of gasoline, ethanol, and methanol presented as an alternative fuel for Iraqi conventional gasoline. The study conducted by using GEM blend that equals E85 blend in octane rating. The used GEM selected from Turner, 2010 collection. G37 E20 M43 (37% gasoline + 20% ethanol+ 43% methanol) was chosen as GEM in present study. This blend u...

  17. Confirmation of the presence of Heniochus acuminatus (Linnaeus, 1758 (Chaetodontidae and Pomacanthus maculosus (Forsskål, 1775 (Pomacanthidae in Iraqi marine waters, Arabian Gulf

    Directory of Open Access Journals (Sweden)

    Jawad, L. A

    2014-09-01

    Full Text Available Two specimens (116,119 mm TL of Heniochus acuminatus (Linnaeus, 1758 and four specimens (171–190 mm TL of Pomacanthus maculosus (Forsskål, 1775 were collected from Iraqi marine waters of the Arabian Gulf. These findings confirm the presence of H. acuminatus and establish the first record of P. maculosus from Iraqi waters. The samples were captured by hook and line off the coasts of Al–Fao City Peninsula, southern Iraq. Arabian Gulf. morphometric and meristic data are provided and compared with data from other parts of the world.

  18. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  19. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  20. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  1. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  2. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  3. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  4. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  5. Iraqi primary care system in Kurdistan region: providers' perspectives on problems and opportunities for improvement.

    Science.gov (United States)

    Shabila, Nazar P; Al-Tawil, Namir G; Al-Hadithi, Tariq S; Sondorp, Egbert; Vaughan, Kelsey

    2012-09-27

    As part of a comprehensive study on the primary health care system in Iraq, we sought to explore primary care providers' perspectives about the main problems influencing the provision of primary care services and opportunities to improve the system. A qualitative study based on four focus groups involving 40 primary care providers from 12 primary health care centres was conducted in Erbil governorate in the Iraqi Kurdistan region between July and October 2010. A topic guide was used to lead discussions and covered questions on positive aspects of and current problems with the primary care system in addition to the priority needs for its improvement. The discussions were fully transcribed and the qualitative data was analyzed by content analysis, followed by a thematic analysis. Problems facing the primary care system included inappropriate health service delivery (irrational use of health services, irrational treatment, poor referral system, poor infrastructure and poor hygiene), health workforce challenges (high number of specialists, uneven distribution of the health workforce, rapid turnover, lack of training and educational opportunities and discrepancies in the salary system), shortage in resources (shortage and low quality of medical supplies and shortage in financing), poor information technology and poor leadership/governance. The greatest emphasis was placed on poor organization of health services delivery, particularly the irrational use of health services and the related overcrowding and overload on primary care providers and health facilities. Suggestions for improving the system included application of a family medicine approach and ensuring effective planning and monitoring. This study has provided a comprehensive understanding of the factors that negatively affect the primary care system in Iraq's Kurdistan region from the perspective of primary care providers. From their experience, primary care providers have a role in informing the community and

  6. Mothers' factors associated with female genital mutilation in daughters in the Iraqi Kurdistan Region.

    Science.gov (United States)

    Shabila, Nazar P

    2017-03-01

    An important proactive factor for the continuation of female genital mutilation (FGM) is tradition and customs inherited in the family from mothers to daughters. Therefore, the aim of this study was to determine mothers' factors associated with the occurrence of FGM among their daughters. The datasets from the Iraq Multiple Indicator Cluster Survey 2011, on 5,184 women aged 15 to 49 years having at least one daughter, was used. Multivariate analysis based on a binary logistic regression model was applied. Mothers' age (adjusted odds ratio [aOR] = 8.18 at ages 25-34 years, aOR = 22.64 at ages 35-44 years, and aOR = 29.78 at ages 45-49 years, compared to the age group 15-24 years), educational level (aOR = 0.52 for primary education, aOR = 0.26 for secondary education, and aOR = 0.03 for higher education compared to uneducated), employment status (aOR = 0.55 for women having office work compared with unemployed), FGM status (aOR = 27.44 for circumcised mothers compared to uncircumcised), the governorate of residence (aOR = 18.73 for Suleimaniya and aOR = 33.23 for Erbil compared with Dohuk), and the wealth index of the household (aOR = 0.55 for richest group compared to the poorest) were significantly associated with the occurrence of FGM in daughters. Strategies aimed at preventing this harmful practice in the Iraqi Kurdistan Region should include female education and empowerment.

  7. Childhood burns in Sulaimaniyah province, Iraqi Kurdistan: a prospective study of admissions and outpatients.

    Science.gov (United States)

    Othman, Nasih; Kendrick, Denise; Al-Windi, Ahmad

    2015-03-01

    While it is globally observed that young children are at a higher risk of burn injuries, little is known about childhood burns in Iraqi Kurdistan. This study was undertaken to describe the epidemiology of burns amongst pre-school children in this region. A prospective study was undertaken from November 2007 to November 2008 involving all children aged 0-5 years attending the burns centre in Sulaimaniyah province for a new burn injury whether treated as an outpatient or admitted to hospital. 1,122 children attended the burns centre of whom 944 (84%) were interviewed (male 53%, female 47%). Mean age was 1.9 years with children aged 1 year comprising 32% and those aged 2 years comprising 21% of the sample. The incidence of burns was 1044/100,000 person-years (1030 in females and 1057 in males). Mechanisms of injury included scalds (80%), contact burns (12%) flames (6%) and other mechanisms (2%). Almost 97% of burns occurred at home including 43% in the kitchen. Winter was the commonest season (36%) followed by autumn (24%). There were 3 peak times of injury during the day corresponding to meal times. The majority of burns were caused by hot water (44%) and tea (20%) and the most common equipment/products responsible were tea utensils (41%). There were 237 admissions with an admission rate of 95 per 100,000 person-years. Scald injuries accounted for most admissions (84%). Median total body surface area affected by the burn or scald (TBSA) was 11% and median hospital stay was 7 days. In-hospital mortality was 8%. Mortality rate was 4% when TBSA was ≤25%, and 100% when TBSA was over 50%. Burn incidence is high in young children especially those aged 1-2 years. Preventive interventions targeted at families with young children & focusing on home safety measures could be effective in reducing childhood burns. Copyright © 2014 Elsevier Ltd and ISBI. All rights reserved.

  8. Risk factors associated with deciduous tooth decay in Iraqi preschool children.

    Science.gov (United States)

    Al-Mendalawi, Mahmood Dhahir; Karam, Nadia Taha

    2014-01-01

    Tooth decay (TD) is common in children with significant consequences on systemic well-being, growth and quality of life, as well as increasing the risk of decay in the permanent teeth. The aim of the present study is to define risk factors associated with deciduous TD (DTD) in Iraqi preschool children. From the 1(st) June to 31(st) December 2012, a case-control study was carried out on 684 children under the age of 6 years who attended Al-Aulwyiah pediatric teaching hospital in Baghdad. Clinical examination and World Health Organization caries diagnostic criteria for decayed, missing and filled teeth (DMFT) were applied. Data including gender, residence, socio-economic status (SES), parental education level, parental smoking, tooth brushing frequency, type of feeding during infancy and the presence of any systemic disease in the child were sought. The mean DMFT score in the case group was 2.03 ± 1.39, of which decayed teeth formed 1.93. Males had a higher mean DMFT (2.10 ± 1.08) than females (1.96 ± 1.70) but with no statistically significant difference. The study revealed that residence, SES, parental education level and tooth brushing frequency were dependent risk factors significantly associated with DTD. However, gender, parental smoking and pattern of feeding during infancy were not significantly associated with DTD. Only four children with systemic disorders (1.2%), namely asthma and congenital heart diseases, were noticed to have DTD. Pediatricians and dentists could provide dental preventive and screening measures. Confronting relevant risk factors associated with DTD and improving access to oral care services are suggested. In addition, promotion of oral health programs through school curricula is needed.

  9. Management of colorectal injuries during operation iraqi freedom: patterns of stoma usage.

    Science.gov (United States)

    Duncan, James E; Corwin, Christian H; Sweeney, W Brian; Dunne, James R; Denobile, John W; Perdue, Philip W; Galarneau, Michael R; Pearl, Jonathan P

    2008-04-01

    Management of penetrating colorectal injuries in the civilian trauma population has evolved away from diversionary stoma into primary repair or resection and primary anastomosis. With this in mind, we evaluated how injuries to the colon and rectum were managed in the ongoing war in Iraq. The records of Operation Iraqi Freedom patients evacuated to National Naval Medical Center (NNMC) from March 2004 until November 2005 were retrospectively reviewed. Patients with colorectal injuries were identified and characterized by the following: (1) injury type; (2) mechanism; (3) associated injuries; (4) Injury Severity Score; (5) levels of medical care involved in patient treatment; (6) time interval(s) between levels of care; (7) management; and (8) outcomes. Twenty-three patients were identified as having either colon or rectal injury. The average ISS was 24.4 (range, 9-54; median 24). On average, patients were evaluated and treated at 2.5 levels of surgically capable medical care (range, 2-3; median 2) between time of injury and arrival at NNMC, with a median of 6 days from initial injury until presentation at NNMC (range, 3-11). Management of colorectal injuries included 7 primary repairs (30.4%), 3 resections with anastomoses (13.0%), and 13 colostomies (56.6%). There was one death (4.3%) and three anastomotic leaks (30%). Total complication rate was 48%. Based upon injury severity, the complex nature of triage and medical evacuation, and the multiple levels of care involved for injured military personnel, temporary stoma usage should play a greater role in military casualties than in the civilian environment for penetrating colorectal injuries.

  10. Precipitating and Relieving Factors of Migraine Headache in 200 Iraqi Kurdish Patients

    Directory of Open Access Journals (Sweden)

    Ehsan K. Al-Shimmery

    2010-07-01

    Full Text Available Objectives: To study the precipitating and relieving factors of migraine headache in a group of Iraqi Kurdish patients including the effect of fasting in Ramadan, and to estimate the percentage of family history of migraine. Methods: A series of 200 migraine cases from different parts of the Kurdistan region in the North of Iraq attending the out-patient Neurology clinic at Rizgary Teaching Hospital and a private Neurology clinic at Erbil City was carried out between October 2007 and May 2008 were reviewed. The precipitating factors and relieving factors for migraine headache were registered and tabulated to be compared with others. Case definition of migraine was based on the International Headache Society (IHS criteria.Results: 33% of the patients were aged between 30-39 years, while 40.5% of patients experienced their first attack aged between 20-29 years. Stress or psychological upset was the commonest triggering factor (80%, followed by increasing physical activity (68%, change in weather (65.5%, and in relation to fasting (65%. Fasting in Ramadan was a triggering factor for headaches in 65% of patients. However, there was no significant association between the triggering factors with regards to sex difference. Relief of migraine in the studied sample was achieved using NSAIDs in 50% of patients, and sleep (45.5%. Hence, 61% of the study population had positive family history of migraine, 32.5% of them reported maternal history of migraine. Conclusion: Psychological upset, stress and excessive physical activity were the commonest triggering factors of migraine headache, while NSAID was the commonest relieving factor of migraine in this population. Family history was present in 61% of migraine patients based mainly from maternal root.

  11. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  12. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  13. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  14. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  15. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  16. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  17. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  18. Living with burn scars caused by self-immolation among women in Iraqi Kurdistan: A qualitative study.

    Science.gov (United States)

    Mirlashari, Jila; Nasrabadi, Alireza Nikbakht; Amin, Pakestan Mohammad

    2017-03-01

    Patients with burns have to live with a variety of long-term physical and psychosocial consequences. Burns lead to prolonged hospital stay, disfiguring scars, disability, and even death. Since self-immolation is common in women of Iraqi Kurdistan, the present study sought to explore the experiences of women living with scars caused by self-immolation. This paper was part of a qualitative research study. A purposive sample of 18 female self-immolation survivors from Iraqi Kurdistan was selected, and 21 individual interviews were conducted and analyzed using conventional content analysis. Four categories emerged during the data analysis: (1) feelings of disbelief, regret, and anger caused by post-burn scars; (2) desperately seeking solutions; (3) grief due to disappointment and surrender to despair; and (4) rejection and isolation. In conclusion, individuals with scars and disfigurements sometimes adopted inappropriate measures to deal with the psychological problems caused by others' behaviors and wrong perceptions. Educational and support programs are hence indicated to promote awareness levels of self-immolation survivors, their families, and the whole society. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  19. Measurement the concentration of polonium 210Po and find annual dose resulting from eating certain foods by the individual Iraqi

    International Nuclear Information System (INIS)

    Al-Emam, A. M.; Mhemeed, A.K.; Hasan, H.I.

    2012-12-01

    The present study aims to determine the concentration of polonium 2 10P o in some of the food consumed by the Iraqi individual collecting (27) sample produced within the country, including imported and available in local markets to some Iraqi provinces, and these foods included potatoes, wheat and fish. To find concentration of polonium 2 10P o method is used chemical separation and deposition on silver disc, and use surface barrier detector to find alpha particle spectrum for polonium and find concentrations ere at 7.15, 2.58, 6.86 Bq / kg, for each of potatoes, wheat and fish, respectively, Daily intake rate for polotuinm 2 10P o which found in the food under study was measured, and show that the annual dose resulting from eating foods that contain this element was at 4.55, 87,69, 0.298 μSv/ y for food stuff mentioned are compatible with universal values and within the permissible limits worldwide. (Author)

  20. R229Q Polymorphism of NPHS2 Gene in Group of Iraqi Children with Steroid-Resistant Nephrotic Syndrome

    Directory of Open Access Journals (Sweden)

    Shatha Hussain Ali

    2017-01-01

    Full Text Available Background. The polymorphism R229Q is one of the most commonly reported podocin sequence variations among steroid-resistant nephrotic syndromes (SRNS. Aim of the Study. We investigated the frequency and risk of this polymorphism among a group of Iraqi children with SRNS and steroid-sensitive nephrotic syndrome (SSNS. Patients and Methods. A prospective case control study which was conducted in Al-Imamein Al-Kadhimein Medical City, spanning the period from the 1st of April 2015 to 30th of November 2015. Study sample consisted of 54 children having NS, divided into 2 groups: patients group consisted of 27 children with SRNS, and control group involved 27 children with SSNS. Both were screened by real time polymerase chain reaction for R229Q in exon 5 of NPHS2 gene. Results. Molecular study showed R229Q polymorphism in 96.3% of SRNS and 100% of SSNS. There were no phenotypic or histologic characteristics of patients bearing homozygous R229Q polymorphism and the patients with heterozygous R229Q polymorphism. Conclusion. Polymorphism R229Q of NPHS2 gene is prevalent in Iraqi children with SRNS and SSNS. Further study needs to be done, for other exons and polymorphism of NPHS2 gene in those patients.

  1. ON THE HORNS OF A DILEMMA: INTELLECTUALS BETWEEN THE REGIME AND THE PEOPLE AS REFLECTED IN IRAQI COMMUNIST LITERATURE

    Directory of Open Access Journals (Sweden)

    Hilla Peled-Shapira

    2012-12-01

    Full Text Available This paper deals with the way in which Communist writers in mid-twentieth-century Iraq used literature in order to, on the one hand express their tense relationship with the regime during times of severe political repression, and on the other hand sharply criticize the Iraqi people themselves for not taking responsibility for or caring about their fate—or, for that matter, for failing to internalize the social class discourse to which the Communists aspired.  The paper’s objective is to examine the connection between the writers’ ideology and the rhetorical and conceptual elements with which they expressed their dissatisfaction with the regime, the way Iraqi society was run, and the desires of both—intellectuals and society at large—to undergo change. In addition, this study will survey the esthetic and stylistic devices, which the writers under consideration chose, and consider both the meanings and motives behind their choices. These aspects will be examined in the framework of a proposed model of “circles of criticism.”

  2. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  3. Privatisation of security:

    DEFF Research Database (Denmark)

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  4. Private Military and Security Contractors

    DEFF Research Database (Denmark)

    In Private Military and Security Contractors: Controlling the Corporate Warrior a multinational team of 16 scholars and a practitioner from political science, sociology, and law address a developing phenomenon: controlling the use of privatized force by states in international politics. Robust...

  5. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  6. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  7. The pilot and evaluation of a postnatal support Group for Iraqi Women in the year following the birth of their baby

    Directory of Open Access Journals (Sweden)

    Vanessa eGent

    2014-01-01

    Full Text Available The current study involved conducting a pilot test of a culturally sensitive support group program developed to assist Iraqi women in the year following the birth of their baby (CSSG-B in Perth, Western Australia. The aim of this study was to evaluate the social validity of the program. It was hypothesised that women involved in the program would find the program to be socially valid and culturally appropriate, and will also report lower levels of depressive symptomatology and higher levels of social support, following the group intervention. Participants were twelve Iraqi Arabic speaking women, who had a child less than 12 months of age. The program was based on Iraqi women's explanatory models (Kleinman, 1978; Di Ciano, Rooney, Wright, Hay, & Robinson, 2010 of the birth and motherhood experience. Social validity ratings were obtained during the implementation of the program in order to assess the level of acceptability of the intervention. A one-group pretest-posttest design was used to determine if depressive symptoms had decreased during the course of the intervention and social support had increased. Results indicated that Iraqi Arabic speaking women found the support group intervention acceptable and relevant and there was a significant decrease in scores on the Edinburgh Postnatal Depression scale from pretest to posttest. These results that the culturally sensitive group intervention was culturally acceptable and was associated with decreased levels of depressive symptomatology.

  8. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2012

    2012-01-01

    The labor force is the number of people ages 16 or older who are either working or looking for work. It does not include active-duty military personnel or the institutionalized population, such as prison inmates. Determining the size of the labor force is a way of determining how big the economy can get. The size of the labor force depends on two…

  9. Force 2025 and Beyond Strategic Force Design Analytic Model

    Science.gov (United States)

    2017-01-12

    focused thinking , functional hierarchy, task capability matching 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT U 18. NUMBER OF...describe and evaluate current organizational designs in terms of Force Employment and Force Design using the model to offer recommendations and analysis...developed to illuminate the current organizational design structure to better understand how the network of BCTs and enablers function in today’s steady

  10. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  11. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  12. Dispersion Forces

    CERN Document Server

    Buhmann, Stefan Yoshi

    2012-01-01

    In this book, a modern unified theory of dispersion forces on atoms and bodies is presented which covers a broad range of advanced aspects and scenarios. Macroscopic quantum electrodynamics is shown to provide a powerful framework for dispersion forces which allows for discussing general properties like their non-additivity and the relation between microscopic and macroscopic interactions. It is demonstrated how the general results can be used to obtain dispersion forces on atoms in the presence of bodies of various shapes and materials. Starting with a brief recapitulation of volume I, this volume II deals especially with bodies of irregular shapes, universal scaling laws, dynamical forces on excited atoms, enhanced forces in cavity quantum electrodynamics, non-equilibrium forces in thermal environments and quantum friction. The book gives both the specialist and those new to the field a thorough overview over recent results in the field. It provides a toolbox for studying dispersion forces in various contex...

  13. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  14. Mental health challenges of LGBT forced migrants

    Directory of Open Access Journals (Sweden)

    Ariel Shidlo

    2013-04-01

    Full Text Available Many LGBT forced migrants have significant and sometimesincapacitating psychological scars. Mental health providers can assistin documenting the psychological impact of anti-LGBT persecutionand its impact on the ability to secure refugee status.

  15. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  16. Space and Air Force: Rhetoric or Reality

    National Research Council Canada - National Science Library

    Cashin, James

    1999-01-01

    ... to meet requirements set forth in the National Security Strategy (NSS). Joint Vision 2010, the Air Force's Global Engagement, and several long-range plans all establish requirements that can only be fulfilled through the application of spacepower...

  17. Countering North Korean Special Purpose Forces

    National Research Council Canada - National Science Library

    Krause, Troy

    1999-01-01

    As United States and Republic of Korea forces stand to defend against a DPRK attack, one of the most formidable tasks is how to counter a second front in the Joint Rear Security Area of the Republic of Korea...

  18. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  19. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  20. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  1. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  2. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  3. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  4. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    Operation Iraqi Freedom succeeded in overthrowing Saddam Hussein, but Iraq remains violent and unstable because of Sunni Arab resentment and a related insurgency, as well as growing sectarian violence...

  5. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    Operation Iraqi Freedom overthrew Saddam Hussein's regime, but during 2004-2007 much of Iraq was wracked by violence caused by Sunni Arab resentment and a related insurgency, resulting Sunni-Shiite...

  6. Breast-feeding and complementary feeding practices in the first 6 months of life among Norwegian-Somali and Norwegian-Iraqi infants: the InnBaKost survey.

    Science.gov (United States)

    Grewal, Navnit Kaur; Andersen, Lene Frost; Sellen, Daniel; Mosdøl, Annhild; Torheim, Liv Elin

    2016-03-01

    To examine breast-feeding and complementary feeding practices during the first 6 months of life among Norwegian infants of Somali and Iraqi family origin. A cross-sectional survey was performed during March 2013-February 2014. Data were collected using a semi-quantitative FFQ adapted from the second Norwegian national dietary survey among infants in 2006-2007. Somali-born and Iraqi-born mothers living in eastern Norway were invited to participate. One hundred and seven mothers/infants of Somali origin and eighty mothers/infants of Iraqi origin participated. Breast-feeding was almost universally initiated after birth. Only 7 % of Norwegian-Somali and 10 % of Norwegian-Iraqi infants were exclusively breast-fed at 4 months of age. By 1 month of age, water had been introduced to 30 % of Norwegian-Somali and 26 % of Norwegian-Iraqi infants, and infant formula to 44 % and 34 %, respectively. Fifty-four per cent of Norwegian-Somali and 68 % of Norwegian-Iraqi infants had been introduced to solid or semi-solid foods at 4 months of age. Breast-feeding at 6 months of age was more common among Norwegian-Somali infants (79 %) compared with Norwegian-Iraqi infants (58 %; P=0·001). Multivariate analyses indicated no significant factors associated with exclusive breast-feeding at 3·5 months of age. Factors positively associated with breast-feeding at 6 months were country of origin (Somalia) and parity (>2). Breast-feeding initiation was common among Iraqi-born and Somali-born mothers, but the exclusive breast-feeding period was shorter than recommended in both groups. The study suggests that there is a need for new culture-specific approaches to support exclusive breast-feeding and complementary feeding practices among foreign-born mothers living in Norway.

  7. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  8. Measuring Stability and Security in Iraq

    Science.gov (United States)

    2008-09-01

    The Office of the Transportation Attaché (OTA) is helping the Iraqi Ministry of Construction and Housing ( MoCH ) promote economic prosperity...through expansion of highway transport to strengthen Iraq’s links to the global economy and to provide mobility to Iraqi citizens. The MoCH and the OTA...work closely in setting national transport priorities, defining where the MoCH must focus in the short term, and identifying specific strategic

  9. Measuring Stability and Security in Iraq

    Science.gov (United States)

    2008-03-01

    detention system. Overcoming corruption and criminal influence within the judicial and vi March 7, 2008 prison systems and maintaining...on the Rule of Law and Detention, support the Baghdad Operations Command (BOC) and its targeting cell, build Iraqi prison staff and capacity and...Other Inma successes are: over 20 Iraqi agribusi- nesses modernized and operating efficiently with sales revenue up by 150%, perennial horticulture

  10. Experiencing 'pathologized presence and normalized absence'; understanding health related experiences and access to health care among Iraqi and Somali asylum seekers, refugees and persons without legal status.

    Science.gov (United States)

    Fang, Mei Lan; Sixsmith, Judith; Lawthom, Rebecca; Mountian, Ilana; Shahrin, Afifa

    2015-09-19

    Asylum seekers, refugees and persons without legal status have been reported to experience a range of difficulties when accessing public services and supports in the UK. While research has identified health care barriers to equitable access such as language difficulties, it has not considered the broader social contexts of marginalization experienced through the dynamics of 'othering'. The current study explores health and health care experiences of Somali and Iraqi asylum seekers, refugees and persons without legal status, highlighting 'minoritization' processes and the 'pathologization' of difference as analytical lenses to understand the multiple layers of oppression that contribute to health inequities. For the study, qualitative methods were used to document the lived experiences of asylum seekers, refugees and persons without legal status. Thirty-five in-depth interviews and five focus groups were used to explore personal accounts, reveal shared understandings and enable social, cognitive and emotional understandings of on-going health problems and challenges when seeking treatment and care. A participatory framework was undertaken which inspired collaborative workings with local organizations that worked directly with asylum seekers, refugees and persons without legal status. The analysis revealed four key themes: 1) pre-departure histories and post-arrival challenges; 2) legal status; 3) health knowledges and procedural barriers as well as 4) language and cultural competence. Confidentiality, trust, wait times and short doctor-patient consultations were emphasized as being insufficient for culturally specific communications and often translating into inadequate treatment and care. Barriers to accessing health care was associated with social disadvantage and restrictions of the broader welfare system suggesting that a re-evaluation of the asylum seeking process is required to improve the situation. Macro- and micro-level intersections of accustomed societal

  11. Labor force activity after 60

    DEFF Research Database (Denmark)

    Pedersen, Peder J.; Larsen, Mona

    2015-01-01

    of reference. Main emphasis is given to the development in two distint age groups, i.e. people in the first half of the 60s of which many are eligible for early retirement programs and people older than 65 mostly eligible for social security retirement programs. For these two age groups the actual development...... in labor force participation is described based on register data and on labor force surveys along with indicators of cohort relevant changes in education and health. Focus in the paper includes also the gender aspect to accommodate stronger cohort effects for women than for men. The impact on labor force...

  12. Using military friendships to optimize postdeployment reintegration for male Operation Iraqi Freedom/Operation Enduring Freedom veterans.

    Science.gov (United States)

    Hinojosa, Ramon; Hinojosa, Melanie Sberna

    2011-01-01

    Social relationships are important to health out comes. The postdeployment family reintegration literature focuses on the role of the civilian family in facilitating the transition from Active Duty military deployment to civilian society. The focus on the civilian family relationship may miss other important personal connections in veterans' lives. One such connection is the relationship many veterans have with former military unit members who served with them when deployed. Drawing on interviews with male Operation Iraqi Freedom/Operation Enduring Freedom veterans conducted from 2008 to 2009, we argue that the members of a military unit, especially during armed conflict, should be considered a resource to help the "family" reintegration process rather than impede it. This research has implications for current reintegration policy and how best to assist veterans transitioning into civilian society.

  13. FTO gene polymorphisms (rs9939609 and rs17817449) as predictors of Type 2 Diabetes Mellitus in obese Iraqi population.

    Science.gov (United States)

    Younus, Laith A; Algenabi, Abdul Hussein A; Abdul-Zhara, Mohammed S; Hussein, Majid K

    2017-09-05

    The variation of the SNPs in FTO (fat mass and obesity associated) gene are improved to be associated with obesity and type 2 diabetes (T2DM) in some ethnic groups for example in European while, this consistency is controversial in Asians and there were few studies in Iraqi population about the effect of this gene on the development of T2DM in obese patients. Therefore, the objective of this study is to investigate the impact of the two common FTO gene variants in the development of T2DM in obese Iraqi patients. A case-control study in which the FTO gene variants rs9939609 and rs17817449 were genotyping in a total of 800 individuals, 400 T2DM obese patients (patients group) and 400 healthy control obese volunteers (control group) to explore the relation of these SNPs with T2DM in obese Iraqi population. The patients group was enrolled from diabetic clinic in Al Najaf al Ashraf based on WHO guidelines of T2DM. From whole blood the DNA was extraction and genotyped by using ScaI and AlwNI enzymes respectively in the PCR-RFLP technique. Multinomial logistic regression was applied to compare the proportions of genotypes and alleles. The odd's ratio, t-test P value at 95% confidence interval were measured before and after adjustment of BMI, age and sex adjustment. The genetic power, Hardy Weinberg equilibrium and haplotype analysis were tested in the present study. It was observed that the presence of T allele in the two SNPs rs9939609 and rs17817449 in the FTO gene polymorphisms was associated with increased risk for the development of T2DM in Iraqi obese individuals. The minor allele (T) in rs9939609 was significantly higher (P=0.0001) in T2DM (31.25%) when compared with that of the control obese group (20%). The Homozygous genotype (TT) significantly (OR=3.25, CI 95% 1.87-5.64, P=0.000) increased the risk of T2DM by three folds with respect to those of wild type (AA) after adjustment for age, sex and BMI, furthermore, it was significantly increased the risk in the

  14. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  15. Different forces

    CERN Multimedia

    1982-01-01

    The different forces, together with a pictorial analogy of how the exchange of particles works. The table lists the relative strength of the couplings, the quanta associated with the force fields and the bodies or phenomena in which they have a dominant role.

  16. Labor Force

    Science.gov (United States)

    Occupational Outlook Quarterly, 2010

    2010-01-01

    The labor force is the number of people aged 16 or older who are either working or looking for work. It does not include active-duty military personnel or institutionalized people, such as prison inmates. Quantifying this total supply of labor is a way of determining how big the economy can get. Labor force participation rates vary significantly…

  17. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  18. Reproductive Fecundity of Iraqi Awassi Ewes Immunized against Synthetic Inhibin-α Subunit or Steroid-Free Bovine Follicular Fluid.

    Science.gov (United States)

    Al-Saaidi, Jabbar Abbas Ahmed; Khudair, Khalisa Khadim; Al-Kafaji, Sura Safe Aubaes

    2018-03-02

    The present study was conducted to investigate the impacts of active and passive immunization against synthetic inhibin and steroid-free bovine follicular fluid, respectively, on reproductive fecundity out of breeding season in Iraqi Awassi ewes. Follicular fluid was aspired from mature bovine follicles, treated with activated charcoal, and used for immunization of male rabbits for obtaining steroid free bovine follicular fluid (SFBFF) antiserum. Forty non-pregnant Awassi ewes were allocated into 4 groups (n = 10 each). At day 38 of experiment, ewes were treated with intra-vaginal MPA sponge (60 mg for 12 days). Ewes were treated at 0, 28, and 50 days with 4, 2 and 2 ml of normal saline (control; C-ve), 400, 200 and 200 µl of ovalbumine (C+ve), 400, 200 and 200 µl of inhibin (SI group), and 4 ml of normal saline at 0 day, and 4ml and 2ml of SFBFF antiserum, at 28, and 50 days (AI group). After mating with Awassi rams, pregnancy and embryo number were diagnosed using ultrasonography. Blood samples were collected at 30, 60, 90, and 120 days of pregnancy, for assessment of estradiol-17β (E2) and progesterone (P4) levels. After parturition, numbers of delivered lambs were recorded. The results revealed significant increase of P4 and significant decrease of E2 levels in SI and AI pregnant ewes than controls at 30, 60 and 90 day. Newborn number increased significantly in SI and AI treated than control ewes. Active or passive immunization against endogenous inhibin could augment reproductive fecundity out of breeding season in Iraqi Awassi ewes.

  19. The evolution of civil society and the rule of law regarding female genital mutilation in Iraqi Kurdistan.

    Directory of Open Access Journals (Sweden)

    R. Cardone

    2015-04-01

    Full Text Available International human rights law relies on state sovereignty to localize suggested policy with codification and enforcement in an attempt to reconcile universalism with particularity. However, amidst domestic governance developments from post-conflict state building and self-determination, governmental instability complicates and often overlooks priorities of international human rights for more tangible domestic infrastructure, such as basic human needs rather than seemingly suggested rights ideals. This does not diminish the significance of human rights, though, pertaining to the rights of the child in addressing gender-based violence through the elimination of female genital mutilation, for example. While state-centric localization is currently prioritized for implementing international law, the rule of law is more integrated throughout the realms of societal structure, culture, and institutions in addition to the legal realm. If the legal realm is disrupted with instability, violence, and discontinuity, how does society internalize and integrate international human rights law over time, and can it be sustainable despite instability? This research evaluates the development of the rule of law, and its effectiveness, regarding female genital mutilation (FGM as a case study in Iraqi Kurdistan from the end of the Iran-Iraq War in 1988 until 2013, the early years of the Kurdistan Regional Government’s parliament. Comprehensive rule of law evolution can be measured through comparing domestic legal developments through state-centric policy and enforcement, or lack thereof, with cultural internalization and non-governmental engagements. By studying the legal and cultural realms’ interaction with the anti-FGM discourse over Iraqi Kurdistan’s past two decades, this research will determine the role of a continuous society overlaid by intermittent legal structures in the sustainability of negotiating cultural relativity with universal human rights.

  20. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  1. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  2. Operation Iraqi Freedom 04 - 06: Opportunities to Apply Quantitative Methods to Intelligence Analysis

    National Research Council Canada - National Science Library

    Hansen, Eric C

    2005-01-01

    The purpose of this presentation is to illustrate the need for a quantitative analytical capability within organizations and staffs that provide intelligence analysis to Army, Joint, and Coalition Force headquarters...

  3. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  4. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  5. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  6. A glimpse at the intricate mosaic of ethnicities from Mesopotamia: Paternal lineages of the Northern Iraqi Arabs, Kurds, Syriacs, Turkmens and Yazidis.

    Directory of Open Access Journals (Sweden)

    Serkan Dogan

    Full Text Available Widely considered as one of the cradles of human civilization, Mesopotamia is largely situated in the Republic of Iraq, which is also the birthplace of the Sumerian, Akkadian, Assyrian and Babylonian civilizations. These lands were subsequently ruled by the Persians, Greeks, Romans, Arabs, Mongolians, Ottomans and finally British prior to the independence. As a direct consequence of this rich history, the contemporary Iraqi population comprises a true mosaic of different ethnicities, which includes Arabs, Kurds, Turkmens, Assyrians, and Yazidis among others. As such, the genetics of the contemporary Iraqi populations are of anthropological and forensic interest. In an effort to contribute to a better understanding of the genetic basis of this ethnic diversity, a total of 500 samples were collected from Northern Iraqi volunteers belonging to five major ethnic groups, namely: Arabs (n = 102, Kurds (n = 104, Turkmens (n = 102, Yazidis (n = 106 and Syriacs (n = 86. 17-loci Y-STR analyses were carried out using the AmpFlSTR Yfiler system, and subsequently in silico haplogroup assignments were made to gain insights from a molecular anthropology perspective. Systematic comparisons of the paternal lineages of these five Northern Iraqi ethnic groups, not only among themselves but also in the context of the larger genetic landscape of the Near East and beyond, were then made through the use of two different genetic distance metric measures and the associated data visualization methods. Taken together, results from the current study suggested the presence of intricate Y-chromosomal lineage patterns among the five ethic groups analyzed, wherein both interconnectivity and independent microvariation were observed in parallel, albeit in a differential manner. Notably, the novel Y-STR data on Turkmens, Syriacs and Yazidis from Northern Iraq constitute the first of its kind in the literature. Data presented herein is expected to contribute to further population

  7. A glimpse at the intricate mosaic of ethnicities from Mesopotamia: Paternal lineages of the Northern Iraqi Arabs, Kurds, Syriacs, Turkmens and Yazidis.

    Science.gov (United States)

    Dogan, Serkan; Gurkan, Cemal; Dogan, Mustafa; Balkaya, Hasan Emin; Tunc, Ramazan; Demirdov, Damla Kanliada; Ameen, Nihad Ahmed; Marjanovic, Damir

    2017-01-01

    Widely considered as one of the cradles of human civilization, Mesopotamia is largely situated in the Republic of Iraq, which is also the birthplace of the Sumerian, Akkadian, Assyrian and Babylonian civilizations. These lands were subsequently ruled by the Persians, Greeks, Romans, Arabs, Mongolians, Ottomans and finally British prior to the independence. As a direct consequence of this rich history, the contemporary Iraqi population comprises a true mosaic of different ethnicities, which includes Arabs, Kurds, Turkmens, Assyrians, and Yazidis among others. As such, the genetics of the contemporary Iraqi populations are of anthropological and forensic interest. In an effort to contribute to a better understanding of the genetic basis of this ethnic diversity, a total of 500 samples were collected from Northern Iraqi volunteers belonging to five major ethnic groups, namely: Arabs (n = 102), Kurds (n = 104), Turkmens (n = 102), Yazidis (n = 106) and Syriacs (n = 86). 17-loci Y-STR analyses were carried out using the AmpFlSTR Yfiler system, and subsequently in silico haplogroup assignments were made to gain insights from a molecular anthropology perspective. Systematic comparisons of the paternal lineages of these five Northern Iraqi ethnic groups, not only among themselves but also in the context of the larger genetic landscape of the Near East and beyond, were then made through the use of two different genetic distance metric measures and the associated data visualization methods. Taken together, results from the current study suggested the presence of intricate Y-chromosomal lineage patterns among the five ethic groups analyzed, wherein both interconnectivity and independent microvariation were observed in parallel, albeit in a differential manner. Notably, the novel Y-STR data on Turkmens, Syriacs and Yazidis from Northern Iraq constitute the first of its kind in the literature. Data presented herein is expected to contribute to further population and forensic

  8. New records of xanthid crabs Atergatis roseus (Rüppell, 1830 (Crustacea: Decapoda: Brachyura from Iraqi coast, south of Basrah city, Iraq

    Directory of Open Access Journals (Sweden)

    Khaled Khassaf Al-Khafaji

    2017-06-01

    Full Text Available Specimens of the The Brachyuran crab Atergatis roseus (Ruppell, 1830, were collected for first times from Iraqi coast, south Al-Faw, Basrah city, Iraq, in coast of northwest of Arabian Gulf. Morphological features and distribution pattern of this species are highlighted and a figure is provided. The material was mostly collected from the shallow subtidal and intertidal areas using trawl net and hand.

  9. The pilot and evaluation of a postnatal support group for Iraqi women in the year following the birth of their baby

    OpenAIRE

    Rooney, Rosanna M.; Kane, Robert T.; Wright, Bernadette; Gent, Vanessa; Di Ciano, Taralisa; Mancini, Vincent

    2014-01-01

    The current study involved conducting a pilot test of a culturally sensitive support group program developed to assist Iraqi women in the year following the birth of their baby (CSSG-B) in Perth, Western Australia. The aim of this study was to evaluate the social validity of the program. It was hypothesised that women involved in the program would find the program to be socially valid and culturally appropriate, and will also report lower levels of depressive symptomatology and higher levels ...

  10. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  11. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  12. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  13. “Seeing the Life”: Redefining self-worth and family roles among Iraqi refugee families resettled in the United States

    Science.gov (United States)

    Nelson, Matthew; Hess, Julia Meredith; Isakson, Brian; Goodkind, Jessica

    2017-01-01

    Social and geographic displacement is a global phenomenon that precipitates novel stressors and disruptions that intersect with longstanding familial and social roles. Among the displaced are war-torn Iraqi refugee families, who must address these new obstacles in unconventional ways. This study explores how such disruptions have influenced associations between gender and apparent self-worth experienced by Iraqi refugee families upon relocation to the United States. Further, the psychosocial mechanisms requisite of any novel approach to a new social construct are explored and reveal that production in the family is at the core of instability and shifting power dynamics during resettlement, preventing family members from “seeing the life” in the United States that they had envisioned prior to immigration. Over 200 semi-structured qualitative interviews with Iraqi participants and mental health providers were conducted over the course of the study, and demonstrate a plasticity among social roles in the family and community that transcends the notion of a simple role reversal, and illustrate the complex positionalities that families under stress must approximate during such physical and social displacement. PMID:28966556

  14. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  15. Why the Iraqi Resistance to the Coalition Invasion Was so Weak

    Science.gov (United States)

    2007-01-01

    document THE ARTS CHILD POLICY CIVIL JUSTICE EDUCATION ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS NATIONAL SECURITY POPULATION AND...climate of fear Saddam engen - dered gave rise to a “culture of lying,” whereby senior military officers routinely misled Saddam about the readiness...vestiges of civil society” in Iraq. “Autonomous collective societal structures beyond the control of the state simply [did] not exist. In their place

  16. Optimizing the Long-Term Capacity Expansion and Protection of Iraqi Oil Infrastructure

    Science.gov (United States)

    2005-09-01

    remotely using only a computer and a high-speed internet connection. I only wish that the Navy as a whole were as receptive to telecommuting as you...INTRODUCTION Formula for success: Rise early, work hard , strike oil. Jean Paul Getty (1892-1976), American Industrialist and Founder of the Getty...In truth , Iraq has neglected its lifeblood industry for far too long and requires a capital expansion and security plan - as well as the financial

  17. STRONG POINTS AND INTERNAL AND EXTERNAL VULNERABILITIES OF THE MILITARY COMMUNICATIONS AND INFORMATICS SYSTEMS AND NETWORKS DEVELOPED IN THE ROMANIAN ARMED FORCES UNDER THE CIRCUMSTANCES OF THE CURRENT SECURITY CHALLENGES

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2015-12-01

    Full Text Available The author briefly presents a series of recent aspects in the current geopolitical context regarding some strong points as well as internal and external vulnerabilities of the military communication and informatics systems and networks developed in the Romanian Armed Forces since 1997. In the second section we referred to the evolutions in austerity and hostility conditions of the main operational and technical sequels of Romanian Armed Forces Transmissions System - STAR (RTP/RMNC. Furthermore, we presented some strong points of the achieved systems and principles taken into account along the modernization and transformation effort (regarding the NATO criteria and requirements, as well as their internal and external vulnerabilities identified following a thorough analysis.

  18. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  19. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  20. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  1. Nuclear forces

    International Nuclear Information System (INIS)

    Holinde, K.

    1990-01-01

    In this paper the present status of the meson theory of nuclear forces is reviewed. After some introductory remarks about the relevance of the meson exchange concept in the era of QCD and the empirical features of the NN interaction, the exciting history of nuclear forces is briefly outlined. In the main part, the author gives the basic physical ideas and sketch the derivation of the one-boson-exchange model of the nuclear force, in the Feynman approach. Secondly we describe, in a qualitative way, various necessary extensions, leading to the Bonn model of the N interaction. Finally, points to some interesting pen questions connected with the extended quark structure of the hadrons, which are topics of current research activity

  2. Treatment of radioactive liquid waste (Co-60) by sorption on Zeolite Na-A prepared from Iraqi kaolin

    International Nuclear Information System (INIS)

    Mustafa, Yasmen A.; Zaiter, Maysoon J.

    2011-01-01

    Highlights: ► Iraqi synthetic zeolite type Na-A has been suggested as ion exchange material to treat cobalt-60 in radioactive liquid waste which came from neutron activation for corrosion products. ► The ability of Na-A zeolite to remove cobalt from wastewater was checked for high cobalt concentration (822 mg/L) in addition to low cobalt concentration in the source sample (0.093 mg/L). ► The effects of important design variables on the zeolite column performance were studied these include initial concentration, flow rate, and bed depth. ► The experimental results show that high sorption capacity can be obtained at high influent concentration, low flow rate, and high bed depth. ► Higher column performance was obtained at higher bed depth. - Abstract: Iraqi synthetic zeolite type Na-A has been suggested as ion exchange material to treat cobalt-60 in radioactive liquid waste which came from neutron activation for corrosion products. Batch experiments were conducted to find out the equilibrium isotherm for source sample .The equilibrium isotherm for radioactive cobalt in the source sample showed unfavorable type, while the equilibrium isotherm for the total cobalt (the radioactive and nonradioactive cobalt) in the source sample showed a favorable type. The ability of Na-A zeolite to remove cobalt from wastewater was checked for high cobalt concentration (822 mg/L) in addition to low cobalt concentration in the source sample (0.093 mg/L). A good fitting for the experimental data with Langmuir equilibrium model was observed. Langmuir constant qm which is related to monolayer adsorption capacity for low and high cobalt concentration was determined to be 0.021 and 140 mg/g zeolite . The effects of important design variables on the zeolite column performance were studied these include initial concentration, flow rate, and bed depth. The experimental results have shown that high sorption capacity can be obtained at high influent concentration, low flow rate, and

  3. Psychological trauma and help seeking behaviour amongst resettled Iraqi refugees in attending English tuition classes in Australia.

    Science.gov (United States)

    Slewa-Younan, Shameran; Mond, Jonathan M; Bussion, Elise; Melkonian, Maral; Mohammad, Yaser; Dover, Hanan; Smith, Mitchell; Milosevic, Diana; Jorm, Anthony Francis

    2015-01-01

    To examine levels of psychological distress and help seeking behaviour in resettled refugees attending English tuition classes in Australia, and their associations with participants' demographic characteristics. Data was collected by bilingual interviewers between March and November 2013. A volunteer sample of attendees of Adult Migrant English Programs (AMEP) in Western Sydney were recruited. Participants were two hundred and twenty five Iraqi refugees resettled in Western Sydney, who had left Iraq no earlier than 1991, were fluent in Arabic and/or English, and were between the ages of 18 and 70. The chief outcome measures used were the Kessler Psychological Distress Scale (K-10) as well as The Harvard Trauma Questionnaire (HTQ). On the K-10, 39.8% of participants had severe psychological distress, 19.4% moderate distress, and 40.7% had low to mild distress. Ninety-five percent of participants reported having experienced one or more potentially traumatic event (PTE) as defined by the HTQ prior to leaving Iraq, with a mean of 14.28 events (SD = 8.69). Thirty-one percent of participants met the threshold (≥2.5) for clinically significant PTSD symptomatology, with a significantly higher occurrence among participants with lower education attainment (χ (2) (3) = 8.26, p = .04). Of those participants with clinically significant PTSD symptomatology according to the HTQ, only 32.9% reported ever having ever sought help for a mental health problem. The high level of distress found in this sample, combined with low uptake of mental health care, highlights the need for programs targeted to promote help-seeking among Iraqi refugees who have resettled in Australia. Further, the higher level of PTSD symptomatology found amongst those with lower education attainment has mental health promotion and treatment implications. Specifically, in designing service and treatment programs, consideration should be given to the possible impact excessive levels of psychological

  4. Predictors of Help-Seeking Intentions in Operation Enduring Freedom and Operation Iraqi Freedom Veterans and Service Members.

    Science.gov (United States)

    Porcari, Carole; Koch, Ellen I; Rauch, Sheila A M; Hoodin, Flora; Ellison, Grant; McSweeney, Lauren

    2017-05-01

    Despite significant numbers of Afghanistan and Iraqi veterans and service members who report symptoms of posttraumatic stress disorder, depression, anxiety, and substance abuse, the majority do not seek help for these problems. A better understanding of the help-seeking process might aid providers and administrators in outreach and provision of services for those who need them. Past research has shown several variables that influence an individual's help-seeking behavior: demographic variables, the nature and severity of a mental health problem, and psychological variables. The three goals of the study were to determine which variables predicted help-seeking intentions from various sources for a psychological problem, identify barriers to help seeking, and identify sources of help sought in the past year. All Operation Enduring Freedom and Operation Iraqi Freedom veterans and service members registered with a Midwestern VA Healthcare System between 2001 and 2007 received a letter requesting participation in an Internet-based survey. Participants completed nine questionnaires regarding their current physical and psychological health, social support, self-efficacy, public and self-stigma, and barriers to seeking help for a psychological problem. In addition, patterns of help seeking from informal (i.e., partner/spouse, family, friends) and formal (i.e., physician, psychiatrist, or psychologist, either from Veterans Affairs [VA] or the private sector) sources of help were examined. Results from the linear regression model including all formal and informal sources of help indicated a significant model fit with attitudes toward psychotherapy, social support, and current mental health status as significant coefficients. Of note, attitudes toward psychotherapy were a significant coefficient in all help-seeking models; stigma was a significant coefficient with formal and VA sources, and social support was found to be a significant predictor with informal sources

  5. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  6. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  7. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  8. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  9. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  10. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  11. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  12. Kyrgyzstan's security problems today

    OpenAIRE

    Abduvalieva, Ryskul

    2009-01-01

    Regional stability and security consist of two levels-the external security of each country at the regional level and the internal security of each of them individually. A state's external and internal security are closely interrelated concepts. It stands to reason that ensuring internal security and stability is the primary and most important task. But the external aspect also requires attention. This article takes a look at the most important problems of ensuring Kyrgyzstan's security.

  13. Information Security Maturity Model

    OpenAIRE

    Information Security Maturity Model

    2011-01-01

    To ensure security, it is important to build-in security in both the planning and the design phases andadapt a security architecture which makes sure that regular and security related tasks, are deployedcorrectly. Security requirements must be linked to the business goals. We identified four domains thataffect security at an organization namely, organization governance, organizational culture, thearchitecture of the systems, and service management. In order to identify and explore the strengt...

  14. Security By Design

    OpenAIRE

    Tanner, M. James

    2009-01-01

    Securing a computer from unwanted intrusion requires astute planning and effort to effectively minimize the security invasions computers are plagued with today. While all of the efforts to secure a computer are needed, it seems that the underlying issue of what is being secured has been overlooked. The operating system is at the core of the security issue. Many applications and devices have been put into place to add layers of protection to an already weak operating system. Security did not u...

  15. Foundational aspects of security

    DEFF Research Database (Denmark)

    Chatzikokolakis, Konstantinos; Mödersheim, Sebastian Alexander; Palamidessi, Catuscia

    2014-01-01

    This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security.......This Special Issue of the Journal of Computer Security focuses on foundational aspects of security, which in recent years have helped change much of the way we think about and approach system security....

  16. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  17. Redefining security.

    Science.gov (United States)

    Mathews, J T

    1989-01-01

    The concept of US national security was redefined in the 1970s to include international economics, and lately environmental degradation has also become a factor, as pollution transcends boundaries. By 2100 another 5-6 billion people may be added to the world's population requiring dramatic production and technology transformation with the resultant expanded energy use, emissions, and waste impacting the ecosystem. Climate change through global warming is in the offing. The exponential growth of the population in the developing world poses a crucial challenge for food production, housing, and employment. At a 1% growth rate population doubles in 72 years, while at 3% it doubles in 24 years. Africa's growth rate is almost 3%, it is close to 2% in Latin America, and it is somewhat less in Asia. Renewable resources such as overfished fishing grounds can become nonrenewable, and vanished species can never be resurrected. Deforestation leads to soil erosion, damage to water resources through floods and silting of irrigation networks, and accelerated loss of species. 20% of species could disappear by 2000 thereby losing genetic resources for chemicals, drugs, and food sources. Overcultivation has caused major erosion and decline of agricultural productivity in Haiti, Guatemala, Turkey, and India. Lopsided land ownership in Latin America requires land reform for sustainable agricultural production in the face of the majority of people cultivating plots for bare subsistence. Human practices that have caused environmental damage include concessions granted to logging companies in the Philippines, mismanagement of natural resources in sub-Saharan Africa, the ozone hole, and the greenhouse effect with potential climate changes. Solutions include family planning, efficient energy use, sustainable agroforestry techniques, and environmental accounting of goods and services.

  18. Strategic Calculation in Estonia’s Decision to Enter the Coalition of the Willing for Operation Iraqi Freedom in 2003

    Science.gov (United States)

    2015-05-21

    bandwagon , that is, ally with the state that poses the major threat in order to protect their own security. If balancing, then states are more secure...because aggressors face combined opposition. If bandwagoning , then security is scarce because aggression is rewarded.4 Balance of power theorists...Transformed: Complexity Theory and European Security (Lanham, MD: Rowman and Littlefield Publishers, 2001), 6. 10 establish an effective Baltic

  19. Personnel Security Investigations -

    Data.gov (United States)

    Department of Transportation — This data set contains the types of background investigations, decisions, level of security clearance, date of security clearance training, and credentials issued to...

  20. The 2005 Iraqi Sunni Awakening: The Role of the Desert Protectors Program

    Science.gov (United States)

    2015-10-01

    Ret.; Gregory Salomon, Colonel, U.S. Army; Resident Senior Fellows Anna-Marie Wyant, M.A., English , JSOU Press Editor Frederick Zimmerman...remaining pockets of AQI seemed to dissipate throughout June and July from areas around Husaybah as the insurgent group moved east towards Rawah.96...History and Research Office, USSOCOM 20 Year History: 1987 to 2007, pp. 113-137 193. Per DOD dictionary , Economy of force is: The judicious employment

  1. Security 2020 Reduce Security Risks This Decade

    CERN Document Server

    Howard, Doug; Schneier, Bruce

    2010-01-01

    Identify real security risks and skip the hype After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today's IT security and a sobering forecast of what to expect in the next decade. It debunks the media hype and unnecessary concerns while focusing on the knowledge you need to combat and prioritize the actual risks of today and beyond.IT security needs are constantly evolving; this guide examine

  2. Treatment of radioactive liquid waste (Co-60) by sorption on Zeolite Na-A prepared from Iraqi kaolin.

    Science.gov (United States)

    Mustafa, Yasmen A; Zaiter, Maysoon J

    2011-11-30

    Iraqi synthetic zeolite type Na-A has been suggested as ion exchange material to treat cobalt-60 in radioactive liquid waste which came from neutron activation for corrosion products. Batch experiments were conducted to find out the equilibrium isotherm for source sample. The equilibrium isotherm for radioactive cobalt in the source sample showed unfavorable type, while the equilibrium isotherm for the total cobalt (the radioactive and nonradioactive cobalt) in the source sample showed a favorable type. The ability of Na-A zeolite to remove cobalt from wastewater was checked for high cobalt concentration (822 mg/L) in addition to low cobalt concentration in the source sample (0.093 mg/L). A good fitting for the experimental data with Langmuir equilibrium model was observed. Langmuir constant qm which is related to monolayer adsorption capacity for low and high cobalt concentration was determined to be 0.021 and 140 mg/g(zeolite). The effects of important design variables on the zeolite column performance were studied these include initial concentration, flow rate, and bed depth. The experimental results have shown that high sorption capacity can be obtained at high influent concentration, low flow rate, and high bed depth. Higher column performance was obtained at higher bed depth. Thomas model was employed to predict the breakthrough carves for the above variables. A good fitting was observed with correlation coefficients between 0.915 and 0.985. Copyright © 2011 Elsevier B.V. All rights reserved.

  3. Study of Indoor Radon /Thoron And Its Hazard Inside Kindergartens In Iraqi Kurdistan Using CR39 Nuclear Track Detectors

    International Nuclear Information System (INIS)

    Ismail, A.H.

    2007-01-01

    Indoor radon /thoron levels with potential alpha energy concentration PAEC), effective dose (H E ) and equilibrium factor (F) were measured using closed and open-can technique, containing CR-39 nuclear track detector. Measurements were carried during summer season inside different Kindergartens in three main regions (Erbil, Duhok and Sullimaniye) in Iraqi Kurdistan. We found that the radon and thoron densities range from (11 to 33 track.cm -2 .d -1 ) for radon and (8 to 29 track.cm -2 .d -1 ) for thoron, with the average radon concentration (96.81 26.939Bq/m 3 ) While an average (PAEC) and (H E ) was (7.68±2.298 mWL) , (2.306± 0.689 mSv/Y) respectively. On the other hands the average equilibrium factor was (0.291±0.01). Consequently, we believe that our results were done when we comparing them with the action levels were recommended by (lCRP 66). The results obtained indicate that various locations have different values of radon/thoron concentration. The differences can be ascribed to variations in grades of uranium at different locations and to some environmental factors such as ventilation, particle concentration, and the deposition of the progeny on surfaces or on the atmospheric aerosol

  4. Patch testing with uranyl acetate in veterans exposed to depleted uranium during the 1991 Gulf war and the Iraqi conflict.

    Science.gov (United States)

    Shvartsbeyn, Marianna; Tuchinda, Papapit; Gaitens, Joanna; Squibb, Katherine S; McDiarmid, Melissa A; Gaspari, Anthony A

    2011-01-01

    The Depleted Uranium Follow-Up Program is a clinical surveillance program run by the Baltimore Veterans Affairs Medical Center since 1993 for veterans of the Gulf and Iraqi wars who were exposed to depleted uranium (DU) as a result of "friendly-fire" incidents. In 2009, 40 veterans from this cohort were screened for skin reactivity to metals by patch-testing with extended metal series and uranyl acetate (0.25%, 2.5%, and 25%). A control arm comprised 46 patients without any known occupational exposures to DU who were seen at the University of Maryland Dermatology Clinic for evaluation of allergic contact dermatitis. Excluding irritant reactions, no patch-test reactions to uranyl acetate were observed in the participants. Irritant reactions to DU were more common in the clinic cohort, likely reflective of the demographic differences between the two arms of the study. Biologic monitoring of urine uranium concentrations in the DU program participants with 24-hour urine samples showed evidence of percutaneous uranium absorption from the skin patches. We conclude that dermatitis observed in a subset of the veterans was unrelated to their military DU exposure. Our data suggest that future studies of skin testing with uranyl acetate should utilize 0.25%, the least irritating concentration.

  5. Prevalence and gender differences in symptomatology of posttraumatic stress disorder and depression among Iraqi Yazidis displaced into Turkey

    Directory of Open Access Journals (Sweden)

    Atilla Tekin

    2016-02-01

    Full Text Available Background: Posttraumatic stress disorder (PTSD and depression are common among populations displaced due to large-scale political conflicts and war. Objective: The aim of this study is to investigate the prevalence and gender-based differences in symptoms of PTSD and depression among Iraqi Yazidis displaced into Turkey. Method: The study was conducted on 238 individuals who were evaluated using the Structured Clinical Interview for DSM-IV (SCID-I and the Stressful Life Events Screening Questionnaire. Results: Of the participants, 42.9% met the DSM-IV diagnostic criteria for PTSD, 39.5% for major depression, and 26.4% for both disorders. More women than men suffered from PTSD and major depression. More women than men with PTSD or depression reported having experienced or witnessed the death of a spouse or child. Women with PTSD reported flashbacks, hypervigilance, and intense psychological distress due to reminders of trauma more frequently than men. Men with PTSD reported feelings of detachment or estrangement from others more frequently than women. More depressive women than men reported feelings of guilt or worthlessness. Conclusions: PTSD and major depression affected women more frequently than men. While women tended to respond to traumatic stress by undermodulation of emotions and low self-esteem, men tended to respond by overmodulation of emotions. Rather than being a derivative of sex differences, this complementary diversity in response types between genders seems to be shaped by social factors in consideration of survival under extreme threat.

  6. Visual symptomatology and referral patterns for Operation Iraqi Freedom and Operation Enduring Freedom veterans with traumatic brain injury.

    Science.gov (United States)

    Bulson, Ryan; Jun, Weon; Hayes, John

    2012-01-01

    Advances in protective armor technology and changes in the "patterns of war" have created a population of Operation Iraqi Freedom/Operation Enduring Freedom (OIF/OEF) veterans with traumatic brain injury (TBI) that provide a unique challenge to Department of Veterans Affairs (VA) healthcare practitioners. The purpose of the study was to determine the frequency of symptomatic ocular and visual sequelae of TBI in OIF/OEF veterans at the Portland VA Medical Center, a Polytrauma Support Clinic Team site. A retrospective analysis of 100 OIF/OEF veterans with TBI was conducted to determine the prevalence of ocular and visual complaints. Referral patterns were also investigated. Visual symptoms were reported in approximately 50% of veterans with TBI. Loss of consciousness, but not number of deployments or number of blast exposures, was found to have a statistically significant association with severity of reported visual symptoms. The most commonly reported symptoms included blurred vision (67%), photosensitivity (50%), and accommodative problems (40%). Visual symptoms of OIF/OEF veterans at the Portland VA Medical Center are reported at slightly lower rates than similar studies conducted at the Palo Alto and Edward Hines Jr VA facilities.

  7. Incidence of Mental Health Diagnoses in Veterans of Operations Iraqi Freedom, Enduring Freedom, and New Dawn, 2001-2014.

    Science.gov (United States)

    Ramsey, Christine; Dziura, James; Justice, Amy C; Altalib, Hamada Hamid; Bathulapalli, Harini; Burg, Matthew; Decker, Suzanne; Driscoll, Mary; Goulet, Joseph; Haskell, Sally; Kulas, Joseph; Wang, Karen H; Mattocks, Kristen; Brandt, Cynthia

    2017-02-01

    To evaluate gender, age, and race/ethnicity as predictors of incident mental health diagnoses among Operations Iraqi Freedom, Enduring Freedom, and New Dawn veterans. We used US Veterans Health Administration (VHA) electronic health records from 2001 to 2014 to examine incidence rates and sociodemographic risk factors for mental health diagnoses among 888 142 veterans. Posttraumatic stress disorder (PTSD) was the most frequently diagnosed mental health condition across gender and age groups. Incidence rates for all mental health diagnoses were highest at ages 18 to 29 years and declined thereafter, with the exceptions of major depressive disorder (MDD) in both genders, and PTSD among women. Risk of incident bipolar disorder and MDD diagnoses were greater among women; risk of incident schizophrenia, and alcohol- and drug-use disorders diagnoses were greater in men. Compared with Whites, risk incident PTSD, MDD, and alcohol-use disorder diagnoses were lower at ages 18 to 29 years and higher at ages 45 to 64 years for both Hispanics and African Americans. Differentiating high-risk demographic and gender groups can lead to improved diagnosis and treatment of mental health diagnoses among veterans and other high-risk groups.

  8. Hydrodesulfurization of Iraqi Atmospheric Gasoil by Ti-Ni-Mo/γ-Al2O3 Prepared Catalyst

    Directory of Open Access Journals (Sweden)

    Abdul Halim Abdul Karim Mohammed

    2017-11-01

    Full Text Available This study investigates the improvement of Iraqi atmospheric gas oil characteristics which contains 1.402 wt. % sulfur content and 16.88 wt. % aromatic content supplied from Al-Dura Refinery by using hydrodesulfurization (HDS process using Ti-Ni-Mo/γ-Al2O3 prepared catalyst in order to achieve low sulfur and aromatic saturation gas oil. Hydrodearomatization (HDA occurs simultaneously with hydrodesulfurization (HDS process. The effect of titanium on the conventional catalyst Ni-Mo/γ-Al2O3 was investigated by physical adsorption and catalytic activity test.Ti-Ni-Mo/γ-Al2O3 catalyst was prepared under vacuum impregnation condition to ensure efficient precipitation of metals within the carrier γ-Al2O3. The loading percentage of metals as oxide; titanium oxide 3 wt. %, nickel oxide 5 wt. % and molybdenum oxide 12 wt. %. The performance of the synthesized catalyst for removing sulfur and aromatic saturation were tested at various temperatures 275 to 350°C, LHSV 1 to 4h-1, constant pressure 40 bar and H2/HC ratio 500 ml/ml.Results showed that the sulfur and aromatic content were reduced at all operating conditions. Maximum sulfur removal was 75.52 wt. % in gas oil on Ti-Ni-Mo/γ-Al2O3 at temperature 350˚C, LHSV 1h-1, while minimum aromatic content achieved was 15.6 wt. % at the same conditions.

  9. Investigating the Influence of the Cerium loading in prepared Y zeolite from Iraqi kaolin on its Catalytic Performance

    Directory of Open Access Journals (Sweden)

    Karim Khalifa Esgair

    2018-01-01

    Full Text Available In this study, the effects of different loading doses of cerium in the prepared NaY zeolite from Iraqi kaolin were investigated. Al-Duara refinery atmospheric residue fluid catalytic cracking was selected as palpation reaction for testing the catalytic activity of cerium loading NaY zeolite. The insertion of cerium in NaY zeolites has been synthesized by simple ion exchange methods. Three samples of modified zeolite Y have been obtained by replacing the sodium ions in the original sample with cerium and the weight percent added are 0.35, 0.64, and 1.06 respectively. The effects of cerium loading to zeolite Y in different weight percent on the cracking catalysts were studied by employing a laboratory fluidized bed reactor. The experiments have been performed with weight hourly space velocity (WHSV range from 6 to 24 h-1, and the temperature range from 450 to 510 oC. The activity of the catalyst with 1.06 wt% cerium has been shown to be much greater than that of the sample parent NaY. Also it was observed that the addition of the cerium causes an increase in the thermal stability of the zeolite.

  10. Polymorphism of Microsatellite markers and ‎Their Association with Egg Production Traits in ‎Iraqi Chickens

    Directory of Open Access Journals (Sweden)

    Israa Luay AL-jaryan

    2017-12-01

    Full Text Available The present study was conducted on local Iraqi chickens and two strains of commercial laying hens (ISA Brawn and Ross Hen as control. To estimate genetic Diversity using microsatellites and their association with egg production traits, three microsatellites markers, located on 1, 5 and E5C10 chromosomes were used in pesent study. A total of 100 varieties of three chicken populations were genotyped for three microsatellite markers by polymerase chain reaction (PCR to evaluate the genetic Diversity (GD among populations using Nei Index similarity mean.  The present study show that local chicken populations were more diverse than control populations. Genetic Diversity among populations was obtained using Nei Index similarity mean. The present results indicate that the Highest GD among local chickens (0.82 and the lowest GD (0.4 and when comper local chickens with control strains found that the highest GD was (0.76 when comper with ISA Brawn, and (0.702 when comper the study population with Ross Hen strain and the lowest GD was (0.673 when comper with ISA Brawn strain, (0.661 when comper the study population with Ross Hen  strain, that’s mean the Three microsatellite genetic markers applied in the present study success to reveal high degree of similarity among the three population used here. The genetic distance revealed that local chickens are mostly related to ISA Brawn strain more than Ross Hen strain

  11. The corporate security professional

    DEFF Research Database (Denmark)

    Petersen, Karen Lund

    2013-01-01

    In our age of globalization and complex threat environments, every business is called upon to manage security. This tendency is reflected in the fact that a wide range of businesses increasingly think about security in broad terms and strive to translate national security concerns into corporate...... speech. This article argues that the profession of the security manager has become central for understanding how the relationship between national and corporate security is currently negotiated. The national security background of most private sector security managers makes the corporate security...... professional inside the company a powerful hybrid agent. By zooming in on the profession and the practice of national security inside companies, the article raises questions about where to draw the line between corporate security and national security along with the political consequences of the constitution...

  12. Security guide for subcontractors

    Energy Technology Data Exchange (ETDEWEB)

    Adams, R.C.

    1993-06-01

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  13. FOILFEST :community enabled security.

    Energy Technology Data Exchange (ETDEWEB)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01

    tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  14. Transformation in the Developing World: An Analysis of Colombia's Security Transformation

    National Research Council Canada - National Science Library

    Sprunk, Darren

    2004-01-01

    This thesis examines security force transformation issues germane to developing countries, in their attempt to counter emerging threats of international terrorism, insurgency, WMD proliferation and organized crime...

  15. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  16. A security/safety survey of long term care facilities.

    Science.gov (United States)

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  17. Security research roadmap; Security-tutkimuksen roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Naumanen, M.; Rouhiainen, V. (eds.)

    2006-02-15

    Requirements for increasing security have arisen in Europe after highly visible and tragic events in Madrid and in London. While responsibility for security rests largely with the national activities, the EU has also started planning a research area .Space and security. as a part of the 7th Framework Programme. As the justification for this research area it has been presented that technology alone can not assure security, but security can not be assured without the support of technology. Furthermore, the justification highlights that security and military research are becoming ever closer. The old separation between civil and military research is decreasing, because it has been noticed that both areas are nowadays utilising the same knowledge. In Finland, there is already now noteworthy entrepreneurship related to security. Although some of the companies are currently only operating in Finland, others are already international leaders in their area. The importance of the security area is increasing and remarkable potential for new growth business areas can already be identified. This however also requires an increase in research efforts. VTT has a broad range of security research ongoing in many technology areas. The main areas have been concentrating on public safety and security, but VTT is participating also in several research projects related to the defence technology. For identifying and defining in more detail the expertise and research goals, the Security research roadmap was developed. The roadmap identified three particularly significant areas related to security. The assurance of critical infrastructure emphasises the protection of energy networks, information networks, water supply, traffic and transport, and obviously also the citizens. For assuring the activities of entrepreneurship, significant areas include the security of production and services, the security of sites and assets, and information security for embedded systems. The most important

  18. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  19. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  20. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.