WorldWideScience

Sample records for iraqi security forces

  1. Interim Analysis of Iraqi Security Force Information Provided by the Department of Defense Report, "Measuring Stability and Security in Iraq"

    National Research Council Canada - National Science Library

    Nguyen, Tinh; Thompson, Charles; Williams, Roger M

    2008-01-01

    .... One indicator being reported is information on the number of Iraqi Security Forces (ISF) authorized (required), assigned (on-the-payroll), and trained. The Special Inspector General for Iraq Reconstruction...

  2. Iraqi Navy: Capability Requirements and Force Structure Recommendations for 2015 and Beyond

    National Research Council Canada - National Science Library

    Lawlor, Alison C; Thompson, Eric V

    2008-01-01

    .... The goal of this study is two-fold: to provide Iraqi and Coalition personnel with a common assessment of capability requirements and force structure recommendations for the Iraqi Navy, and to provide the Iraqi Navy leadership...

  3. The Report of the Independent Commission on the Security Forces of Iraq

    Science.gov (United States)

    2007-09-06

    Point of Entry Border Station 7. Taji Camp Taji Counterinsurgency Center for Excelence Iraqi Counterinsurgency Academy Iraqi Military Inteligence ...he serves on the North Carolina Military Foundation and as a director with several private and public businesses . General Charles G. Boyd, USAF...Ret.) General Charles G. Boyd, U.S. Air Force (Ret.), became president and CEO of Business Executives for National Security (BENS) in May of 2002

  4. The Iraqi Security Forces: The Challenge of Sectarian and Ethnic Influences

    National Research Council Canada - National Science Library

    Sharp, Jeremy M

    2007-01-01

    .... According to the December 2006 Iraq Study Group Report, Significant questions remain about the ethnic composition and loyalties of some Iraqi units specifically, whether they will carry out missions...

  5. Food security and humanitarian assistance among displaced Iraqi populations in Jordan and Syria.

    Science.gov (United States)

    Doocy, Shannon; Sirois, Adam; Anderson, Jamie; Tileva, Margarita; Biermann, Elizabeth; Storey, J Douglas; Burnham, Gilbert

    2011-01-01

    The Iraq conflict resulted in the largest displacement in the Middle East in recent history, and provision of health services to the displaced population presents a critical challenge. With an increase in the number of people affected by complex emergencies and the number of people displaced in urban settings, the international community must adapt intervention strategies to meet the specific demands and contexts of this population. The study aimed to provide information on food security and livelihoods for Iraqi refugees in Syria and Jordan to inform humanitarian assistance planning. National cross-sectional cluster sample surveys of displaced Iraqi populations displaced were conducted in Jordan (October 2008) and Syria (March 2009). Clusters of ten households were randomly selected using probability-based sampling; a total of 1200 and 813 Iraqi households in Jordan and Syria, respectively, were interviewed about food security and receipt of humanitarian assistance. In Syria, 60% of households reported the household food situation had declined since the arrival period as compared to 46% in Jordan. Food aid receipt was reported by 18.0% of households in Jordan and 90.3% of households in Syria. In Jordan, 10.2% of households received cash assistance and in Syria 25.3% of households received cash assistance. In Jordan, cash assistance was associated with low socioeconomic status, large household size, and UNHCR registration. In Syria, female headed households, Damascus residents, families with children, and those registered with UNHCR were more likely to receive cash assistance. Food insecurity remains a concern among displaced Iraqi households in both Jordan and Syria. Improved targeting of both food and cash assistance and the expansion of cash-based programs could lead to a more effective use of funds and facilitate the implementation of assistance programs that are sustainable in the context of declining funding availability. Copyright © 2010 Elsevier Ltd. All

  6. Muddling Through: An Analysis of Security Force Assistance in Iraq

    Science.gov (United States)

    2017-05-25

    OSC-I mostly fell back into their comfort zone of managing 60 foreign military sales programs as the nominal advisement programs quickly fell apart...implications of these observations are critical to future SFA efforts, as the US government seeks to continue a long-term strategy of advising and...Iraqi Army, Mosul, ISIS, Advise and Assist, Security Assistance, Security Cooperation, MNSTC-I, OIF 16. SECURITY CLASSIFICATION OF: 17. LIMITATION

  7. Iraqi Perspectives Project. A View of Operation Iraqi Freedom from Saddam’s Senior Leadership

    Science.gov (United States)

    2006-01-01

    Pokemon ” really represented a subterfuge by international Zionism to undermine Iraq’s security. Supposedly, “ Pokemon ” meant “I am Jewish” in Hebrew. They...found the fact that the Pokemon character was “widely beloved by Iraqi youth” particularly alarming.22 Once secure in power Saddam Hussein saw...Report on a Cartoon Character Called ‘ Pokemon ’ from Direc- torate of General Security.” This Directorate of General Security report states that the name of

  8. Developing Iraq's Security Sector: The Coalition Provisional Authority's Experience

    National Research Council Canada - National Science Library

    Rathmell, Andrew; Oliker, Olga; Kelly, Terrence K; Brannan, David; Crane, Keith

    2005-01-01

    .... The environment was not benign -- it was deteriorating. Iraqi security forces had largely disintegrated, and those that remained were incapable of responding to rising criminality and political violence...

  9. Development and Reform of the Iraqi Police Forces

    National Research Council Canada - National Science Library

    Pfaff, Tony

    2008-01-01

    This paper will seek to show how social, political, cultural, and environmental factors have combined to impede Iraqi police development in ways that are predictable, understandable, and, with external help, resolvable...

  10. Development and Reform of the Iraqi Police Forces

    National Research Council Canada - National Science Library

    Pfaff, Tony

    2008-01-01

    .... The corruption and abuse found in the Iraqi police services cannot simply be explained by poor leadership, the actions of a few corrupt individuals, or even the competing agendas of the various...

  11. Causes of improvement in the security environment of Iraq, 2006-2009

    OpenAIRE

    Wheeler, Seth A.

    2009-01-01

    Approved for public release, distribution unlimited Popular consensus exists that the 2007 surge of U.S. forces in Iraq led to an improved security environment. The surge was designed to reduce violence and improve security by protecting the Iraqi population - a change in strategy. According to the consensus, the security environment improved due to the surge, measured by the decreasing number of attacks. For this thesis, the security environment consists of the number of attacks and t...

  12. Occupation Iraqi Freedom: The Importance of Planning

    National Research Council Canada - National Science Library

    Caston, Christine J

    2007-01-01

    ... addressed by the Combatant and Joint Force Commanders. The lack of an occupation plan had a major impact on how the Combatant Commander carried out Phases IV and V of Operation Iraqi Freedom and provides relevant lessons for future operations.

  13. Analysis of Israel's Foreign Policy Concerning Iraqi's Kurdistan (2003-2015

    Directory of Open Access Journals (Sweden)

    Ali Latifi

    2017-06-01

    Full Text Available Analysis of the Israel's Foreign Policy is one of the important issues concerned by the researchers of the international and regional affairs. Israel's Foreign Policy in years 2003-2015 has witnessed a lot of events. In these years, transformation of the Iraq's internal structures including the fall of the Baath Regime in Iraq and appearance of the terroristic group of Dashi (ISIS in this country has provided new opportunities and challenges for the Israel's Foreign Policy. In this regard, establishment of a republic system in Iraq and the reinforcement of the Kurdish streams, specially during the current transformations and the increasing desires for the independence in Iraqi's Kurdistan, have paved the way for Israel to intensify its activities in the region. In this regard, the current study has approach the issue of Israel's Foreign Policy concerning Iraqi's Kurdistan during the years 2003-2015 with a descriptive analytic method. The achieved results show that the political reasons (alliance of the periphery and development of the strategic depth in closeness to Iran, economic (accessing the energy and mineral resources in Iraqi's Kurdistan, the importance of the Kurdistan's hydro-politic resources for Israel and the Israel's economical influence from the Nile to the Euphrates, military-security (presence in the strategic environment of Iran and the external threats in the Middle East, creation of an environmental crisis un the Kurdish region of the Middle East, weakening the Iraqi's central government and disintegration of this country, Israel's security-intelligence expansion, acquiring a strategic territory and getting out of isolation and the resolving the its legitimacy crisis, controlling the currents of thought in this region, all have been influential in thein Israel's Foreign Policy Concerning Iraqi's Kurdistan.

  14. Iraqi children's rights: building a system under fire.

    Science.gov (United States)

    AlObaidi, Abdul Kareem; Jeffrey, Linda R; Scarth, Leslie; Albadawi, Ghazwan

    2009-01-01

    War violates every human right of children. In recent years, the lives of Iraqi children and the livelihoods of their families have become precarious. Conflict has split the communities where they live and taken the lives of hundreds of their friends and family members. The literature focuses on the negative effects of armed conflict on Iraqi children, and the steps that need to be taken to ameliorate their condition by adapting evidence based but culturally sensitive measures. A comprehensive solution to child protection problems clearly will take time. The primary need for the protection of Iraqi children is an end to conflict. Family and educational order and social stability are central to efforts to achieve progress in child protection. Solutions to armed conflict and its aftermath work best when they are responsive to local cultural practices and beliefs, and are drawn from an understanding of child development. Child safety, security and well-being should be in the forefront of the national agenda to ensure a more positive future both economically and socially to achieve a healthier Iraq.

  15. In Defense of the Iraqi Media: Between Fueling Conflict and Healthy Pluralism

    Directory of Open Access Journals (Sweden)

    Anja Wollenberg

    2017-07-01

    Full Text Available Despite the occupation and ensuing war, Iraq has experienced the emergence of a truly pluralistic media landscape after the fall of the Baath regime in 2003. Today, media coverage of domestic affairs is characterized not only by pluralism but also by bias and partiality reflecting strong ties between political actors and media outlets. Accordingly, the Iraqi media are often accused of fueling conflict and deepening the ethno-sectarian divide in society. Based on a qualitative frame analysis of Iraqi news bulletins, this study reveals that Iraqi media outlets provide indeed contesting frames on even the most divisive issues. Only the coverage of the armed war against IS is characterized by a non-pluralistic conformity among Iraqi channels that unequivocally focus on military successes against IS and jointly refrain from any criticism against the varied forces fighting IS in Iraq.

  16. Strategic Reflections: Operation Iraqi Freedom, July 2004-February 2007

    Science.gov (United States)

    2012-10-01

    not pan out. We knew that our mission was ultimately to hand over security responsibility to the Iraqi government, but we had not yet developed a...were “ chicken -egg” discus- sions about whether the security situation had to improve before the political track could begin. I strongly argued that...2005 Lt Gen Nick Houghton (UK), October 2005–February 2006 Lt Gen Rob Fry (UK), March 2006–September 2006 Lt Gen Graham Lamb (UK), September 2006

  17. Operation Iraqi Freedom 06-08

    Science.gov (United States)

    2008-02-14

    Managemen 15.6.6 Results Related t 15.6.7 NCOs and Multiple-Deployments 15.6.8 Validated Trainin 15.6.9 Theater Suicide Prevention Program and Suicide...include mental health providers who have deployed to the IT0 and are experienced using AHLTA- T . As noted above, as the operational theater matures in...Mental Health Advisory Team (MHAT) V Operation Iraqi Freedom 06-08 14 February 2008 Office of the Surgeon Multi-National Force-Iraq and Office

  18. Institutionalizing Security Force Assistance

    National Research Council Canada - National Science Library

    Binetti, Michael R

    2008-01-01

    .... It looks at the manner in which security assistance guidance is developed and executed. An examination of national level policy and the guidance from senior military and civilian leaders highlights the important role of Security Force Assistance...

  19. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  20. Living with the Choice: A Grounded Theory of Iraqi Refugee Resettlement to the U.S.

    Science.gov (United States)

    Davenport, Lisa A

    2017-04-01

    Though the United States has become a place of increasing resettlement for refugees, particularly Iraqi refugees who have been forced to flee their homeland due to violence, persecution and civil unrest, little is known about Iraqi refugee resettlement in the United States, or the way in which resettlement impacts health and adjustment. A grounded theory study was conducted to develop a substantive theory of Iraqi refugee resettlement. Participants in the qualitative study included 29 Iraqi refugees and 2 community partners who participated in face-to face interviews. Data analysis and interpretation revealed fundamental concepts related to Iraqi refugee resettlement. Results of analysis showed that for Iraqis choosing to resettle here, the outcome is dichotomous: satisfaction or regret. The outcome is influenced by contextual factors as well as facilitating and hindering intervening conditions during the basic social process of resettlement transition. Each refugee's story is unique, yet all share common threads. This study allowed Iraqi refugees the opportunity to voice their personal experiences of resettling in America, and revealed life stories that inspire and illuminate a process that can guide health care delivery as they cope with the stresses of their journey. As a result, an in-depth storyline was established to explain the process of resettlement for Iraqi refugees. The development of this resettlement theory, grounded in Iraqi refugee experience, has the potential to guide nursing education, enhance the efficacy of practice, inform policy development and form the basis for research.

  1. The Description of Health Among Iraqi Refugee Women in the United States.

    Science.gov (United States)

    Salman, Khlood F; Resick, Lenore K

    2015-08-01

    The purpose of this study was to understand the description of health among Iraqi women refugees, their health status, and health experiences during resettlement in the United States. Twelve women, ages 21-67 years old, who resettled in the United States during or after 2003 where interviewed. The women described health as a gift determined by God, the ability to function, the absence of physical symptoms, and the need to feel safe and secure in the context of resettlement. Although the Iraqi women valued health, during the resettlement process, seeking safety and feeling secure were the foremost priorities. Findings revealed that this is a vulnerable population which has experienced the violence of war and, as a result, have unique physical, mental, economic, and social concerns related to health. Implications are for a multidisciplinary approach to best meet the unique individual health needs of this vulnerable population.

  2. Security force effectiveness and technology

    International Nuclear Information System (INIS)

    Seaton, M.B.

    1988-01-01

    No one would propose ineffective security forces. Applied technology always has, as its purpose, to increase effectiveness. Evidence exists, however, that poorly conceived or executed technological solutions can actually do more harm than good. The author argues for improved human factor considerations in physical security applied technology -- especially in the area of security console operations

  3. Iraqi violence, Saudi attack and further bombings

    Energy Technology Data Exchange (ETDEWEB)

    Anon

    2006-03-15

    Iraq moved closer to all-out civil war following an attack on the Imam Ali al-Hadi mosque in Samarra, one of Shi'i Islam's holiest shrines, on 22nd February. In the days that followed, several hundred Iraqis died in inter-communal violence. Attacks on installations close to the Basrah Oil Terminal were reported. Earlier in the month, the main oil storage facility in Kirkuk was bombed, forcing the Northern Oil Company to shut-in the 0.3 mn bpd field. Oil and electricity supplies in southern Iraq were cut by attacks on installations some 40 miles south of Baghdad. Turkey agreed to resume product exports to Iraq after a deal was agreed on repaying Iraqi debts of $1 bn to Turkish suppliers. An official Australian inquiry into illegal payments made under the UN's oil-for-food programme is to investigate allegations involving two Australian-controlled oil firms. (author)

  4. Refugee warriors or war refugees? Iraqi refugees' predicament in Syria, Jordan and Lebanon

    NARCIS (Netherlands)

    Leenders, R.

    2009-01-01

    This essay attempts to disentangle a debate within the study of refugee crises and their security implications involving 'refugee warriors'. It situates the debate in the context of the Iraqi refugee crisis and its purported and real manifestations in three main host countries: Syria, Jordan and

  5. Image of Iraqis in The Cinema of Sacred Defense

    Directory of Open Access Journals (Sweden)

    Abdollah Givian

    2012-03-01

    Full Text Available Regarding representational function of media, the current dissertation intends to examine the changes in the representation of the image of the Iraqis in the Sacred Defense Cinema. Iraqies have been pictured as the "Others" during last three decades. Due to the importance and role of sacred defense and its cinematic representations of "Self" and "Other" and thereby its contribution in the process of reconstruction of Iranian national identity this research is aimed at studying represented images of Iraqies and its changes during last three decades. To reach this objective I first examined the concept and theories of representation as stated by Richard Dyer and Stuart Hall. Then to complement Hall’s theories I referred to other thinkers in the field of identity theory, ‘self’ and ‘the other’ as stated. In the chapter on methodology I’ve benefited from a combination of the patterns presented by Kate Selbi, Ran Kallory and Rolan Bart to analyze the texts.The findings of this thesis demonstrates that in order to depict the Iraqis in the sixties verbal codes were primarily used whereas in the seventies and the eighties social and technical codes were most used respectively.In the first decade Iraqis were portrayed as those people who are imagined to be cruel, inhuman, in which the emphasis was laid on the impact of the Iraqi’s invasion. In the second decade we see Iraqi’s depicted as dumb and fat people having thick moustaches and rough voices and in the third we see this portrayal to be transformed where Iraqi’s are shown to be our Muslim brothers who have been forced to fight in the war. Having observed, examined and analyzed the films, we found out that when facing ‘the other’, i.e. the Iraqis, the metaphor of the boundary or border was used. This border is seen between ‘self’ and ‘the other’, i.e. the Iranians and the Iraqis in all the chosen movies on the Sacred Defense. In the first decade there was an objective

  6. Protective force legal issues: the security perspective

    International Nuclear Information System (INIS)

    Rich, B.L.

    1984-01-01

    There has been much discussion and some controversy on the legal issues faced by the Department of Energy's (DOE) protective forces in the performance of their security duties. These include the observance of legal proprieties in the arrest of non-violent demonstrators, the use of lethal weapons, and the extent of protective forces' authority to carry weapons and protect DOE's security interests offsite. In brief, the need to protect DOE's security interests may be in nominal conflict with other requirements. When faced with a potential conflict in requirements, we in the DOE security community must place first attention to the security mission -- to deter and prevent hostile acts

  7. Iraqi Refugees in Jordan: Legal Perspective

    OpenAIRE

    OLWAN, Mohamed Y.

    2009-01-01

    Euro-Mediterranean Consortium for Applied Research on International Migration (CARIM) Jordan has traditionally been one of the regions most welcoming countries toward Iraqis. The country received several flows of Iraqis during the last four decades, but most of Iraqis residing in Jordan fled the precarious situation prevailing in Iraq following the U.S. –led invasion of Iraq in March 2003. Jordan is not a party to the 1951 Convention on the Status of Refuges or the 1967 Protocol on Refugee...

  8. Night-Time Light Dynamics during the Iraqi Civil War

    Directory of Open Access Journals (Sweden)

    Xi Li

    2018-06-01

    Full Text Available In this study, we analyzed the night-time light dynamics in Iraq over the period 2012–2017 by using Visible Infrared Imaging Radiometer Suite (VIIRS monthly composites. The data quality of VIIRS images was improved by repairing the missing data, and the Night-time Light Ratio Indices (NLRIs, derived from urban extent map and night-time light images, were calculated for different provinces and cities. We found that when the Islamic State of Iraq and Syria (ISIS attacked or occupied a region, the region lost its light rapidly, with the provinces of Al-Anbar, At-Ta’min, Ninawa, and Sala Ad-din losing 63%, 73%, 88%, and 56%, of their night-time light, respectively, between December 2013 and December 2014. Moreover, the light returned after the Iraqi Security Forces (ISF recaptured the region. In addition, we also found that the night-time light in the Kurdish Autonomous Region showed a steady decline after 2014, with the Arbil, Dihok, and As-Sulaymaniyah provinces losing 47%, 18%, and 31% of their night-time light between December 2013 and December 2016 as a result of the economic crisis in the region. The night-time light in Southern Iraq, the region controlled by Iraqi central government, has grown continuously; for example, the night-time light in Al Basrah increased by 75% between December 2013 and December 2017. Regions formerly controlled by ISIS experienced a return of night-time light during 2017 as the ISF retook almost all this territory in 2017. This indicates that as reconstruction began, electricity was re-supplied in these regions. Our analysis shows the night-time light in Iraq is directly linked to the socioeconomic dynamics of Iraq, and demonstrates that the VIIRS monthly night-time light images are an effective data source for tracking humanitarian disasters in that country.

  9. 76 FR 5232 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-01-28

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  10. 75 FR 77934 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-12-14

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the second meeting of the Small Business Information Security...

  11. 75 FR 70764 - Small Business Information Security Task Force

    Science.gov (United States)

    2010-11-18

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the first meeting of the Small Business Information Security...

  12. 76 FR 11307 - Small Business Information Security Task Force

    Science.gov (United States)

    2011-03-01

    ... SMALL BUSINESS ADMINISTRATION Small Business Information Security Task Force AGENCY: U.S. Small... publish meeting minutes for the Small Business Information Security Task Force Meeting. DATES: 1 p.m... 2009, SBA submits the meeting minutes for the third meeting of the Small Business Information Security...

  13. Maintaining Discrimination in Operation Iraqi Freedom

    Science.gov (United States)

    2008-12-01

    influenced and do not draw as much scrutiny from coalition  forces. Children are primarily being used by Iraqi insurgents to  plant  roadside bombs or  as...conduct must also mean that there needs to be a group to which these standards are  assigned—the soldier class.    Though there are  warts  to the

  14. Security Force Assistance: Building Foreign Security Forces and Joint Doctrine for the Future of U.S. Regional Security

    National Research Council Canada - National Science Library

    Sullivan, Michael D

    2008-01-01

    .... From training the Nicaraguan National Guard to the most recent efforts in Iraq, the U.S. Military has repeatedly shown a need for a coherent and comprehensive plan to develop foreign security forces. U.S...

  15. The EU should help Iraqi refugees

    Directory of Open Access Journals (Sweden)

    Gunilla Carlsson

    2007-06-01

    Full Text Available There are strong humanitarian reasons and close ties that underpin a Swedish commitment to Iraq. More than 100,000 Iraqis are living in Sweden and the numbers are rising. Europe could do more to provide humanitarian assistance and assist Iraqi refugees.

  16. Quality Assurance for Iraqi Bottled Water Specifications

    Directory of Open Access Journals (Sweden)

    May George Kassir

    2015-10-01

    Full Text Available In this research the specifications of Iraqi drinking bottled water brands are investigated throughout the comparison between local brands, Saudi Arabia and the World Health Organization (WHO for bottled water standard specifications. These specifications were also compared to that of Iraqi Tap Water standards. To reveal variations in the specifications for Iraqi bottled water, and above mentioned standards some quality control tools are conducted for more than 33% of different bottled water brands (of different origins such as spring, purified,..etc in Iraq by investigating the selected quality parameters registered on their marketing labels. Results employing Minitab software (ver. 16 to generate X bar, and Pareto chart. It was found from X bar charts that the quality parameters of some drinking bottled water brands are not within Iraqi standards set by the “Central Agency for Standardization and Quality Control” such as pH values, Fe, Na, and Mg concentrations. While the comparison of previously mentioned standard specifications through radar chart many important issues are detected such as the absence of lower limits the whole bottled water quality parameters such as for Na and Mg also the radar chart shows that Iraqi bottled and tap water specifications are almost equal in their quality values. Also the same chart pictured the limited range of Iraqi specifications compared to that of Saudi Arabia, and WHO and the need to introduce other water specifications such as K, Na, etc. This confirms the need to improve Iraqi bottled water specifications since it was introduced on 2000. These results also highlighted the weakness of quality assurance activities since only 33 % of the investigated companies registered the whole water quality specifications as shown in Pareto chart. Other companies do not register any quality characteristics. Also certain companies should be stopped due to non-conforming specifications, yet these companies are

  17. A risk-based approach to designing effective security force training exercises

    International Nuclear Information System (INIS)

    Bott, T.F.; Eisenhawer, S.W.

    2002-01-01

    The effectiveness of a security force in protecting a nuclear facility is often evaluated using training exercises that pit a group of simulated attackers against a security team. In the situation studied here, a security force was regularly tested by a regulatory body with the responsibility for security oversight. It was observed that the regulators were continually imposing more challenging security scenarios by assigning increasingly sophisticated facility knowledge to the attackers. Not surprisingly, the security forces' assessed effectiveness decreased until eventually they were unable to successfully resist the attacks. Security managers maintained that the knowledge attributed to the attackers was becoming increasingly unrealistic and feared they would be forced to concentrate resources on unrealistic scenarios at the expense of more credible threats.

  18. 31 CFR 575.311 - Iraqi origin.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Iraqi origin. 575.311 Section 575.311 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE OF FOREIGN... Government of Iraq, or of a business entity located in Iraq. Services of Iraqi origin are not imported into...

  19. Border Security -- One Step Toward Resolving the Conflict in Iraq

    National Research Council Canada - National Science Library

    Bennett, Mark S

    2005-01-01

    .... It will do this by proving that border security is a key component to suppressing the Iraqi insurgency and that border security operations have been hindered by a lack of interagency coordination...

  20. Iraqi Military Academies

    Directory of Open Access Journals (Sweden)

    Nodar Z. Mossaki

    2015-03-01

    Full Text Available The article analyzes the system of training of officers in military academies in Iraq – in Zakho, Qalacholan, ar-Rustamiyah and an-Nasiriyah. The author describes the history of creation, process of evolution, challenges and features of training in these colleges. Particular attention paid to military academies in the territory of Iraqi Kurdistan, which actually do not obey the central government of Iraq, however, have the highest level of training. Currently, Iraq's military academies operate on the basis of the NATO standards. Iraqi military academies paid miuch attention to the specifics of the military and political situation in Iraq – counterinsurgency and counterterrorism operations, patrolling cities, fighting in an urban environment etc. Significant place in the curriculum take the courses contributing to the formation of pro-Western sentiment.

  1. The role of the media in establishing international security regimes

    Directory of Open Access Journals (Sweden)

    Chanan Naveh

    2005-04-01

    Full Text Available This article focuses primarily on the media's impact on international security regimes. It explores the ways in which the media affect the lifecycles of international regimes, from the time they are first conceived of, through their establishment, consolidation and stabilization, up until their ultimate demise. Although this paper highlights the media's role in the evolution of security regimes, it is clear that, regardless of the regime in question, media play a role throughout the lifecycle of all international regimes, whatever their character. In order to analyze the relationships of the media with security regimes in general, and specifically their contribution to each stage in their development, the article utilizes methodologies from the field of communication studies. It examines the media's agenda, "news values" and various functions, and their ability to mobilize public support for the particular issue of the regime. To date, most studies have explored the interaction between media communication patterns and global developments at the state level, or in relation to the formulation of foreign policy, while largely ignoring the international dimension of the relationship. This article attempts to remedy this situation, and the relevant processes are analysed in a case study of the anti-Iraq international security regime. It should be noted that although the paper focuses on the specific anti-Iraqi regime, it is part of a more general Anti-Rogue actors regime which includes the war against global terrorism. The study of the development of the anti-Iraq press-security regime teaches us that during international crises the media mobilize and unanimously support the regime fighting the "bad guys." But, when the regime develops and enters disputed turfs and begins to lose its legitimacy, media support diminishes, and the media may even develop into an opposing force and may join the actors fighting against this regime. Moreover, the study of

  2. Reporting Iraqi civilian fatalities in a time of war

    Directory of Open Access Journals (Sweden)

    Olander William E

    2009-11-01

    Full Text Available Abstract Background In February, 2007, the Associated Press (AP conducted a poll of 1,002 adults in the United States about their attitudes towards the war in Iraq. Respondents were remarkably accurate estimating the current death toll of US soldiers, yet were grossly inaccurate in estimating the current death toll of Iraqi civilians. We conducted a search of newspapers reports to determine the extent of the discrepancy between reporting Coalition and Iraqi civilian deaths, hypothesizing that there would be an over-representation of Coalition deaths compared to Iraqi civilian deaths. Methods We examined 11 U.S. newspapers and 5 non-U.S. newspapers using electronic databases or newspaper web-archives, to record any reports between March 2003 and March 2008 of Coalition and Iraqi deaths that included a numeric indicator. Reports were described as "events" where they described a specific occurrence involving fatalities and "tallies" when they mentioned the number of deaths over a period of time. We recorded the number of events and tallies related to Coalition deaths, Iraqi civilian deaths, and Iraqi combatant deaths Results U.S. newspapers report more events and tallies related to Coalition deaths than Iraqi civilian deaths, although there are substantially different proportions amongst the different U.S. newspapers. In four of the five non-US newspapers, the pattern was reversed. Conclusion This difference in reporting trends may partly explain the discrepancy in how well people are informed about U.S. and Iraqi civilian fatalities in Iraq. Furthermore, this calls into question the role of the media in reporting and sustaining armed conflict, and the extent to which newspaper and other media reports can be used as data to assess fatalities or trends in the time of war.

  3. Grammar Errors in the Writing of Iraqi English Language Learners

    Directory of Open Access Journals (Sweden)

    Yasir Bdaiwi Jasim Al-Shujairi

    2017-10-01

    Full Text Available Several studies have been conducted to investigate the grammatical errors of Iraqi postgraduates and undergraduates in their academic writing. However, few studies have focused on the writing challenges that Iraqi pre-university students face. This research aims at examining the written discourse of Iraqi high school students and the common grammatical errors they make in their writing. The study had a mixed methods design. Through convenience sampling method, 112 compositions were collected from Iraqi pre-university students. For purpose of triangulation, an interview was conducted. The data was analyzed using Corder’s (1967 error analysis model and James’ (1998 framework of grammatical errors. Furthermore, Brown’s (2000 taxonomy was adopted to classify the types of errors. The result showed that Iraqi high school students have serious problems with the usage of verb tenses, articles, and prepositions. Moreover, the most frequent types of errors were Omission and Addition. Furthermore, it was found that intralanguage was the dominant source of errors. These findings may enlighten Iraqi students on the importance of correct grammar use for writing efficacy.

  4. Comparison of the Force Required for Dislodgement Between Secured and Unsecured Airways.

    Science.gov (United States)

    Davenport, Curtis; Martin-Gill, Christian; Wang, Henry E; Mayrose, James; Carlson, Jestin N

    2018-05-01

    Airway device placement and maintenance are of utmost importance when managing critically ill patients. The best method to secure airway devices is currently unknown. We sought to determine the force required to dislodge 4 types of airways with and without airway securing devices. We performed a prospective study using 4 commonly used airway devices (endotracheal tube [ETT], laryngeal mask airway [LMA], King laryngeal tube [King], and iGel) performed on 5 different mannequin models. All devices were removed twice per mannequin in random order, once unsecured and once secured as per manufacturers' recommendations; Thomas Tube Holder (Laerdal, Stavanger, Norway) for ETT, LMA, and King; custom tube holder for iGel. A digital force measuring device was attached to the exposed end of the airway device and gradually pulled vertically and perpendicular to the mannequin until the tube had been dislodged, defined as at least 4 cm of movement. Dislodgement force was reported as the maximum force recorded during dislodgement. We compared the relative difference in the secured and unsecured force for each device and between devices using a random-effects regression model accounting for variability in the manikins. The median dislodgment forces (interquartile range [IQR]) in pounds for each secured device were: ETT 13.3 (11.6, 14.1), LMA 16.6 (13.9, 18.3), King 21.7 (16.9, 25.1), and iGel 8 (6.8, 8.3). The median dislodgement forces for each unsecured device were: ETT 4.5 (4.3, 5), LMA 8.4 (6.8, 10.7), King 10.6 (8.2, 11.5), and iGel 3.9 (3.2, 4.2). The relative difference in dislodgement forces (95% confidence intervals) were higher for each device when secured: ETT 8.6 (6.2 to 11), LMA 8.8 (4.6 to 13), King 12.1 (7.2 to 16.6), iGel 4 (1.1 to 6.9). When compared to secured ETT, the King required greater dislodgement force (relative difference 8.6 [4.5-12.7]). The secured iGel required less force than the secured ETT (relative difference -4.8 [-8.9 to -0.8]). Compared with a

  5. Testing and Demonstrating Speaker Verification Technology in Iraqi-Arabic as Part of the Iraqi Enrollment Via Voice Authentication Project (IEVAP) in Support of the Global War on Terrorism (GWOT)

    National Research Council Canada - National Science Library

    Withee, Jeffrey W; Pena, Edwin D

    2007-01-01

    This thesis documents the findings of an Iraqi-Arabic language test and concept of operations for speaker verification technology as part of the Iraqi Banking System in support of the Iraqi Enrollment...

  6. Special Inspector General for Iraq Reconstruction

    National Research Council Canada - National Science Library

    2008-01-01

    .... assistance, the strengthening of Iraq's security forces, evident in the recent transfer of security responsibilities in Anbar and Babylon to Iraqi control, the incremental improvement in essential...

  7. A Study of Apology Strategies Used by Iraqi EFL University Students

    Science.gov (United States)

    Ugla, Raed Latif; Abidin, Mohamad Jafre Zainol

    2016-01-01

    This study was aimed at exploring apology strategies of English used by Iraqi EFL students, apology strategies in Iraqi Arabic and the pragmatic strategies of Iraqi EFL students in relation to the use of apology as a speech act. The data analyzed in this study were collected in Al-Yarmouk University College and University of Diyala. The study was…

  8. Analysing the Improper Pronunciation of Diphthongs by Iraqi EFL learners

    Directory of Open Access Journals (Sweden)

    Mukhalad Malik Almutalabi

    2018-04-01

    Full Text Available The current study aims at analysing the improper pronunciation of Iraqi EFL learners concerning the pronunciation of diphthongs in words of various syllables. It describes and identifies thoroughly the mispronunciations of such important sounds in English language. The study attempts at analysing such mispronunciations by clarifying and assigning the phonetic deviations of Iraqi EFL learners when they pronounce diphthongs. So the main objective of the study is to analyse the errors committed by Iraqi learners in the pronunciation of diphthongs grouping each error into its specific category. To verify the objective of the paper, 25 Iraqi EFL learners from the department of English at Cihan University/ Slemani are chosen to be the main participants of the study. The test which was conducted in the laboratory of the Department of English contained 10 words comprising various diphthongs. The results clearly revealed that mispronouncing English diphthongs by Iraqi EFL were mostly observed by replacing the required diphthong with another improper one and they also tended to use simple vowels instead of the correct required diphthongs.

  9. Job satisfaction and turnover intention among Iraqi doctors--a descriptive cross-sectional multicentre study.

    Science.gov (United States)

    Ali Jadoo, Saad Ahmed; Aljunid, Syed Mohamed; Dastan, Ilker; Tawfeeq, Ruqiya Subhi; Mustafa, Mustafa Ali; Ganasegeran, Kurubaran; AlDubai, Sami Abdo Radman

    2015-04-19

    During the last two decades, the Iraqi human resources for health was exposed to an unprecedented turnover of trained and experienced medical professionals. This study aimed to explore prominent factors affecting turnover intentions among Iraqi doctors. A descriptive cross-sectional multicentre study was carried out among 576 doctors across 20 hospitals in Iraq using multistage sampling technique. Participants completed a self-administered questionnaire, which included socio-demographic information, work characteristics, the 10-item Warr-Cook-Wall job satisfaction scale, and one question on turnover intention. Descriptive and bivariate and multiple logistic regression analyses were conducted to identify significant factors affecting turnover intentions. More than one half of Iraqi doctors (55.2%) were actively seeking alternative employment. Factors associated with turnover intentions among doctors were low job satisfaction score (odds ratio (OR) = 0.97; 95% confidence interval (CI): 0.95, 0.99), aged 40 years old or less (OR = 2.9; 95% CI: 1.74, 4.75), being male (OR = 4.2; 95% CI: 2.54, 7.03), being single (OR = 5.0; 95% CI: 2.61, 9.75), being threatened (OR = 3.5; 95% CI: 1.80, 6.69), internally displaced (OR = 3.1; 95% CI: 1.43, 6.57), having a perception of unsafe medical practice (OR = 4.1; 95% CI: 1.86, 9.21), working more than 40 h per week, (OR = 2.3; 95% CI: 1.27, 4.03), disagreement with the way manager handles staff (OR = 2.2; 95% CI: 1.19, 4.03), being non-specialist, (OR = 3.9, 95% CI: 2.08, 7.13), and being employed in the government sector only (OR = 2.0; 95% CI: 1.09, 3.82). The high-turnover intention among Iraqi doctors is significantly associated with working and security conditions. An urgent and effective strategy is required to prevent doctors' exodus.

  10. Civilian casualties of Iraqi ballistic missile attack to

    Directory of Open Access Journals (Sweden)

    Khaji Ali

    2012-06-01

    Full Text Available 【Abstract】Objective: To determine the pattern of causalities of Iraqi ballistic missile attacks on Tehran, the capital of Iran, during Iraq-Iran war. Methods: Data were extracted from the Army Staff Headquarters based on daily reports of Iranian army units during the war. Results: During 52 days, Tehran was stroked by 118 Al-Hussein missiles (a modified version of Scud missile. Eighty-six missiles landed in populated areas. During Iraqi missile attacks, 422 civilians died and 1 579 injured (4.9 deaths and 18.3 injuries per missile. During 52 days, 8.1 of the civilians died and 30.4 injured daily. Of the cases that died, 101 persons (24% were excluded due to the lack of information. Among the remainders, 179 (55.8% were male and 142 (44.2% were female. The mean age of the victims was 25.3 years±19.9 years. Our results show that the high accuracy of modified Scud missiles landed in crowded ar-eas is the major cause of high mortality in Tehran. The pres-ence of suitable warning system and shelters could reduce civilian casualties. Conclusion: The awareness and readiness of civilian defense forces, rescue services and all medical facilities for dealing with mass casualties caused by ballistic missile at-tacks are necessary. Key words: Mortality; War; Mass casualty incidents; Wounds and injuries

  11. 76 FR 58565 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-09-21

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... solicits comments on information provided to Operation Enduring Freedom/Operation Iraqi Freedom veterans... information technology. Title: Operation Enduring Freedom/Operation Iraqi Freedom Seriously Injured/Ill...

  12. 76 FR 72243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2011-11-22

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activity; Comment... Operation Enduring Freedom/ Operation Iraqi Freedom veterans and their families. DATES: Written comments and...: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs Assessment, VA Form 10-21091. OMB...

  13. Iraqi Perspectives Project. Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 1 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M; Lacey, James

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  14. Food insecurity among Iraqi refugees living in Lebanon, 10 years after the invasion of Iraq: data from a household survey.

    Science.gov (United States)

    Ghattas, Hala; Sassine, AnnieBelle J; Seyfert, Karin; Nord, Mark; Sahyoun, Nadine R

    2014-07-14

    Iraqi refugees in Lebanon are vulnerable to food insecurity because of their limited rights and fragile livelihoods. The objective of the present study was to assess household food insecurity among Iraqi refugees living in Lebanon, almost 10 years after the invasion of Iraq. A representative survey of 800 UN High Commissioner for Refugees-registered refugee households in Lebanon was conducted using multi-stage cluster random sampling. We measured food insecurity using a modified US Department of Agriculture household food security module. We collected data on household demographic, socio-economic, health, housing and dietary diversity status and analysed these factors by food security status. Hb level was measured in a subset of children below 5 years of age (n 85). Weighted data were used in univariate and multivariate analyses. Among the Iraqi refugee households surveyed (n 630), 20·1% (95% CI 17·3, 23·2) were found to be food secure, 35·5% (95% CI 32·0, 39·2) moderately food insecure and 44·4% (95% CI 40·8, 48·1) severely food insecure. Severe food insecurity was associated with the respondent's good self-reported health (OR 0·3, 95% CI 0·2, 0·5), length of stay as a refugee (OR 1·1, 95% CI 1·0, 1·2), very poor housing quality (OR 3·3, 95% CI 1·6, 6·5) and the number of children in the household (OR 1·2, 95% CI 1·0, 1·4), and resulted in poor dietary diversity (PLebanon call for urgent programmes to address the food and health situation of this population with restricted rights.

  15. DefenseLink Special: On Assignment with Jim Garamone

    Science.gov (United States)

    . Soldiers Work Iraqi Leadership Issues RUSTAMIYAH, Iraq, May 30, 2006 - A number of initiatives are under way to instill democratic values in the Iraq security forces. One such initiative involves U.S. Army leadership experts helping to set up the Iraqi Center for Values, Principles and Leadership here. Story More

  16. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2007-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately 2 million Iraqis who have been displaced within Iraq itself...

  17. Extending Mobile Security Robots to Force Protection Missions

    National Research Council Canada - National Science Library

    Carroll, Daniel

    2002-01-01

    ...) sites for physical security and automated inventory missions MDARS was initiated in 1989 to improve the effectiveness of a shrinking guard force, but was quickly expanded to address the intensive...

  18. Annual training manual for security training: Protective force

    Energy Technology Data Exchange (ETDEWEB)

    1990-10-01

    Westinghouse is committed to high quality training relevant to the need of the Protective Forces at the Waste Isolation Pilot Plant (WIPP). The training programs at WIPP are designed to qualify Security personnel to perform WIPP security missions in a professional and responsible manner. The program consists of basic as well as sustainment training, as further described in this plan. This plan documents the WIPP Security training program for security personnel for calendar year 1990. The programs detailed in this plan are designed to adequately train persons to ensure the uninterrupted continuity of Department of Energy (DOE)/Westinghouse operations. The Security Training Program consists of four basic elements. These elements are (1) basic level training; (2) on-the-job training; (3) refresher training; and (4) in-service training.

  19. History of the Iraqi Nuclear Center of Tuwaitha

    International Nuclear Information System (INIS)

    Fabbri, Silvio

    2009-01-01

    The Tuwaitha site, 20 km south of Baghdad, was chosen at the beginning of the sixties to be the Center for Research and Development of the Iraqi Nuclear Program. The israeli air attack to the Osirak reactor in 1981, the clandestine activities for nuclear weapons production and the inspections carried out by the International Atomic Energy Agency (IAEA) to verify such activities are parts of the history of that nuclear complex. Its installations were extensively damaged in 1991 during the so called Golf War and finally destroyed by air bombardment during the invasion by the Coalition Forces in 2003. The IAEA and other several countries have elaborated an international assistance program for the future activities of installations dismantling and site remediation. (author) [es

  20. Geothermal gradients in Iraqi Kurdistan deduced from bottom hole temperatures

    Directory of Open Access Journals (Sweden)

    Rzger A. Abdula

    2017-09-01

    Full Text Available Bottom hole temperature (BHT data from 12 oil wells in Iraqi Kurdistan were used to obtain the thermal trend of Iraqi Kurdistan. Due to differences in thermal conductivity of rocks and groundwater movement, variations in geothermal gradients were observed. The highest geothermal gradient (29.2 °C/km was found for well Taq Taq-8 in the Low Folded Zone (central part of the area. The lowest geothermal gradients (14.9 °C/km were observed for well Bekhme-1 in the High Folded Zone (northern and northeastern parts of the area. The average regional geothermal gradient for Iraqi Kurdistan is 21 °C/km.

  1. Joint Force Quarterly. Number 2, Autumn 1993

    Science.gov (United States)

    1993-09-01

    Typography and Design Division Government Printing Office Joint Force Quarterly is published by the Institute for National Strategic Studies, National...Decisions regard- ing the key force will affect many factors in the new environment. It determines reaction time, how much and what type of force to...shelters destroyed? Only indirectly. Attacks on shel- ters had forced a reaction by the Iraqis, one that caused the loss of their air arm as a force in

  2. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    National Research Council Canada - National Science Library

    Elsea, Jennifer K; Schwartz, Moshe; Nakamura, Kennon H

    2008-01-01

    .... In Iraq, private firms known as Private Security Contractors (PSCs) serve to protect individuals, transport convoys, forward operating bases, buildings, and other economic infrastructure, and are training Iraqi police and military personnel...

  3. The Securitisation of Refugee Flows and the Schooling of Refugees: Examining the Cases of North Koreans in South Korea and Iraqis in Jordan

    Science.gov (United States)

    Collet, Bruce A.; Bang, Hyeyoung

    2016-01-01

    Drawing on data collected in South Korea, Jordan and the USA, this paper examines the degree to which security concerns impact the schooling of North Korean refugees in South Korea and Iraqi refugees in Jordan. Operating from a framework examining the intersection of migration and securitisation, the authors find that accounts of negative images…

  4. ABOUT US

    Science.gov (United States)

    CENTCOM: Search CENTCOM CENTCOM Home ABOUT US COMMAND NARRATIVE LEADERSHIP COMPONENT COMMANDS HISTORY the Iraqi Security Forces (ISF) and Syrian Democratic Forces (SDF), have made extraordinary progress ; Vision Leadership Component Commands History Posture Statement Area of Responsibility CENTCOM Coalition

  5. 'Jail break' made by Iraqi oil tankers

    International Nuclear Information System (INIS)

    Lorenz, A.

    2000-01-01

    The implications of Iran's policy turn-about of allowing ships smuggling Iraqi crude oil to sail through its coastal waters, out of reach of UN and US ships patrolling the Persian Gulf, are discussed. It is suspected that the change in Iranian policy may be due to the fact that an infusion of Iraqi oil on the international markets would suit Iran's purposes by reducing the need for OPEC to raise production quotas. Iran is known to be opposed to an increase of production by OPEC members. At the same time, developments in US-Iranian relations and in the international oil market also have to be considered as factors influencing the Iranian position on this issue

  6. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 2 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  7. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 5 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  8. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 3 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  9. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 4 (Redacted)

    National Research Council Canada - National Science Library

    Woods, Kevin M

    2007-01-01

    Captured Iraqi documents have uncovered evidence that links the regime of Saddam Hussein to regional and global terrorism, including a variety of revolutionary, liberation, nationalist, and Islamic...

  10. Mission Accomplished Rebuilding the Iraqi and Afghan Armies

    Science.gov (United States)

    2016-06-01

    National Defense Security Forces ANSF Afghanistan National Security Forces AQI Al-Qaeda in Iraq ATC Advisor Training Cell ATG Advisor Training Group... Cells (ATCs) resident with the Marine Expeditionary Forces.29 Many of these accounts were in the early years of the wars in Iraq and Afghanistan...convinced that the counterinsurgents have the means, ability, stamina , and will to win…The populace must have confidence in the staying power of both the

  11. 77 FR 7243 - Proposed Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Veterans...

    Science.gov (United States)

    2012-02-10

    ... DEPARTMENT OF VETERANS AFFAIRS [OMB Control No. 2900-0728] Proposed Information Collection (Operation Enduring Freedom/ Operation Iraqi Freedom Veterans Health Needs Assessment) Activities Under OMB....'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom Veterans Health Needs...

  12. The Iraqi civil registration system and the test of political upheaval

    Directory of Open Access Journals (Sweden)

    Sulaiman Bah

    2014-04-01

    Full Text Available An in-depth situation analysis was carried out on the Iraqi civil registration system in 2011, years after the end of the military operation of 2003. The study was done using a combination of methods, including interviews with key role players in the Iraqi civil registration system, observation, study of documents, triangulation, and gap analysis. The study found the civil registration system in Iraq to be largely intact and functional, in spite of the wars experienced in Iraq over the past three decades. Given that civil registration systems generally get destroyed through wars, the paper discusses the reasons for the resilience in the Iraqi civil registration system and draws lessons from them.

  13. G8 Regional Security Governance through Sanctions and Force

    Directory of Open Access Journals (Sweden)

    John Kirton

    2014-11-01

    Full Text Available Why do the Group of Eight (G8 members approve its members’ use of material sanctions in some regional conflicts but military force in others?2 As an informal security institution composed of major democratic powers from North America, Europe and Asia, the G8 has often chosen sanctions, notably on Iran in 1980, Afghanistan in 1980, Sudan in 2004, North Korea in 2006, and Syria in 2011. It has increasingly chosen military force, notably in Iraq in 1990, Kosovo in 1999, the USSR over Afghanistan in 2001, Libya in 2011, and Mali in 2013. Yet the G8’s choice, initiation, commitment, compliance, implementation and effectiveness of both sanctions and force has varied. Force was chosen and used effectively only in the post cold war period, primarily where the target was close to southern Europe. A high relative-capability predominance of G8 members over the target country strongly produces the G8’s choice of force, but a high, direct, deadly threat from the target state to G8 countries does not. Geographic proximity and the connectivity coming from the former colonial relationship between G8 members and the target country only weakly cause the G8 to choose force. Support from the most relevant regional organization – the North Atlantic Treaty Organization – and support from the United Nations in the form of an authorizing UN Security Council or General Assembly resolution have a strong, positive effect on the G8’s choice of force. Accompanying accountability mechanisms from the G8 itself have a variable impact, as leaders’ iteration of the issue at subsequent summits does not increase compliance with G8 commitments on force-related cases, but their foreign ministers’ follow up does to a substantial degree.

  14. Warrior Resilience Training in Operation Iraqi Freedom: combining rational emotive behavior therapy, resiliency, and positive psychology.

    Science.gov (United States)

    Jarrett, Thomas

    2008-01-01

    Warrior Resilience Training (WRT) is an educational class designed to enhance Warrior resilience, thriving, and posttraumatic growth for Soldiers deployed in Operation Iraqi Freedom. Warrior Resilience Training uses rational emotive behavior therapy (REBT), Army leadership principles, and positive psychology as a vehicle for students to apply resilient philosophies derived from Army Warrior Ethos, Stoic philosophy, and the survivor and resiliency literature. Students in WRT are trained to focus upon virtue, character, and emotional self-regulation by constructing and maintaining a personal resiliency philosophy that emphasizes critical thinking, rationality, virtue, and Warrior Ethos. The author, an Army licensed clinical social worker, executive coach, REBT doctoral fellow, and former Special Forces noncommissioned officer, describes his initial experience teaching WRT during Operation Iraqi Freedom to combat medics and Soldiers from 2005 to 2006, and his experience as a leader of a combat stress control prevention team currently in Iraq offering mobile WRT classes in-theater. Warrior Resilience Training rationale, curriculum, variants (like Warrior Family Resilience Training), and feedback are included, with suggestions as to how behavioral health providers and combat stress control teams might better integrate their services with leaders, chaplains, and commands to better market combat stress resiliency, reduce barriers to care, and promote force preservation. Informal analysis of class feedback from 1168 respondents regarding WRT reception and utilization is examined.

  15. Two 'hot buttons' in gas contracting: security performance and force majeure

    International Nuclear Information System (INIS)

    Park, J.J.

    1996-01-01

    Two important developments in gas contracting issues are the 'force majeure' provisions and security for performance clauses. 'Force majeure' was defined as any acts of God or any acts of omission by a transporter of gas, which is excused by any event not within the control of the party claiming suspension. 'Force majeure' provisions need to be specifically negotiated in every case. These issues often arise in gas contracting situations, but the nature of Canada's non-litigious oil and gas industry is such that we have had little or no Canadian case law to assist in interpreting what these clauses mean. The 'force majeure' clause is basically meant to protect the parties from events outside normal business risk. The security of performance issue arises when the obligation of a supplier of gas to perform, and the obligation of a buyer of gas to pay, is unsecured, as would be the case for example, if one of the parties becomes bankrupt

  16. 76 FR 73022 - Agency Information Collection (Operation Enduring Freedom/Operation Iraqi Freedom Seriously...

    Science.gov (United States)

    2011-11-28

    ... (Operation Enduring Freedom/ Operation Iraqi Freedom Seriously Injured/Ill Service Member Veteran Worksheet... No. 2900-0720.'' SUPPLEMENTARY INFORMATION: Title: Operation Enduring Freedom/Operation Iraqi Freedom... used VA Form 21-0773 as a checklist to ensure they provided Operation Enduring Freedom or Operation...

  17. Homogeneity in Social Groups of Iraqis

    NARCIS (Netherlands)

    Gresham, J.; Saleh, F.; Majid, S.

    With appreciation to the Royal Institute for Inter-Faith Studies for initiating the Second World Congress for Middle Eastern Studies, this paper summarizes findings on homogeneity in community-level social groups derived from inter-ethnic research conducted during 2005 among Iraqi Arabs and Kurds

  18. Stability Operations: Learning from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    Clay, Troy A

    2007-01-01

    U.S. strategy in Iraq after the removal of Saddam Hussein was to promote a democratic style of government and to conduct reconstruction of essential Iraqi infrastructure for the political and economic redevelopment of Iraq...

  19. State Control over Private Military and Security Companies in Armed ...

    African Journals Online (AJOL)

    NWUuser

    State Control over Private Military and Security Companies in Armed Conflict by H Tonkin ... (US) in the Iraqi theatre by 2007 exceeded the number of US troops, and in 2010 .... due diligence to promote PMSC compliance therewith. ... relying on existing accountability frameworks of international law, new domestic and.

  20. The stakes of iraqi petroleum: what is the role of France ?

    International Nuclear Information System (INIS)

    Sarkis, N.

    1995-01-01

    This work deals with some socio-economic and political aspects about the stakes of iraqi petroleum for France. After having described the history of iraqi petroleum, the author gives the estimation of the actual petroleum reserves, the production objective, the petroleum and gaseous projects and the exporting way. Then is given the economic and political role played by France: the increase of importation uses, the economic interests and the political responsibility. (O.L.). 10 tabs

  1. Problems with veteran-family communication during operation enduring freedom/operation Iraqi freedom military deployment.

    Science.gov (United States)

    Hinojosa, Ramon; Hinojosa, Melanie Sberna; Högnäs, Robin S

    2012-02-01

    Twenty Reserve component (Army and Marines) and Army National Guard male veterans of Operational Enduring Freedom/Operation Iraqi Freedom discuss their deployment and postdeployment family reintegration experiences. A Grounded Theory approach is used to highlight some of the ways in which family miscommunication during deployment can occur. Communication with civilian family members is affected by the needs of operational security, technical problems with communication tools, miscommunication between family members, or because veterans have "nothing new to say" to family back home. These communication difficulties may lead to an initial gulf of understanding between veterans and family members that can cause family strain during postdeployment family reintegration. We end with a discussion of veteran family reintegration difficulties.

  2. 33 CFR 165.1411 - Security zone; waters surrounding U.S. Forces vessel SBX-1, HI.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 2 2010-07-01 2010-07-01 false Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. 165.1411 Section 165.1411 Navigation and Navigable Waters COAST GUARD... § 165.1411 Security zone; waters surrounding U.S. Forces vessel SBX-1, HI. (a) Location. The following...

  3. Weapons of Mass Destruction and Domestic Force Protection: Basic Response Capability for Military, Police & Security Forces

    National Research Council Canada - National Science Library

    Manto, Samuel

    1999-01-01

    ... actions to improve preparedness. This paper examines what a minimum basic response capability for all military, police and security forces should be to ensure at least some chance for their own survival and possible early warning...

  4. Geothermal gradients in Iraqi Kurdistan deduced from bottom hole temperatures

    OpenAIRE

    Abdula, Rzger A.

    2016-01-01

    Bottom hole temperature (BHT) data from 12 oil wells in Iraqi Kurdistan were used to obtain the thermal trend of Iraqi Kurdistan. Due to differences in thermal conductivity of rocks and groundwater movement, variations in geothermal gradients were observed. The highest geothermal gradient (29.2 °C/km) was found for well Taq Taq-8 in the Low Folded Zone (central part of the area). The lowest geothermal gradients (14.9 °C/km) were observed for well Bekhme-1 in the High Folded Zone (northern and...

  5. Air Force Military Personnel Entitlement Pay in Support of Contingency Operations

    Science.gov (United States)

    2010-08-23

    Report No. A-2006-0067- FFM , “Military Pay for Operation Enduring Freedom/Operation Iraqi Freedom Active Components,” April 5, 2006 U.S. Army Audit...Agency Report No. A-2006-0079- FFM , “Material Weakness Closeout on Line of Duty and Incapacitation Pay,” March 8, 2006 22B22BAir Force Air Force

  6. Unwanted Guests: The Impact of Iraqi Refugees on Jordan’s Economy

    Science.gov (United States)

    2014-06-13

    The International Crisis Group, a non-governmental organization, interviewed Iraqi refugees in 2007 and reported a number of instances of harassment ...process: Before they can be legally employed, Iraqi refugees must obtain a work permit from the Ministry of Labour . To be eligible for a work permit...Minister of the Interior and the Minister of Labour , respectively. Jordanian law also requires potential employers to provide a litany of documents and

  7. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Moonsung; Jung, Myungtak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities.

  8. The Development of a Scientific Evaluation System of Force-on-Force (FOF) Exercise for Performance-based Regulation in Nuclear Security

    International Nuclear Information System (INIS)

    Koh, Moonsung; Jung, Myungtak

    2015-01-01

    A terrorist attack or sabotage at a nuclear facility could lead result in a great amount of loss of life and social chaos, in addition to serious radiological damage. As threats have been evolved more intelligent, divergent, advanced, the international societies including IAEA encourage for all member states to establish the performance-based regulation using Forceon- Force (FOF) exercise, computer simulation. Consequently, the performance evaluation for physical protection at nuclear facilities should focus on properly reacting to threat scenarios. Physical protection should also include detecting, blocking, delaying, interrupting including the human and technical factors the adversary having malicious intention of the realistic main threat element before he accomplishes the goal based on Design Basis Threat (DBT). After the completion of the FOF evaluation system, KINAC will evaluate, and later strengthen its overall security program in response to changes in the threat environment, technological advancements, and lessons learned. As a result, substantial improvements to a nuclear facility security can be predicted. These improvements will focus on a plant security force, physical barriers, intrusion detection systems, surveillance systems, and access controls. Through the building a Force-on-Force scientific evaluation system, KINAC will establish an efficient physical protection implementation system for nuclear energy facilities

  9. Healthcare Access for Iraqi Refugee Children in Texas: Persistent Barriers, Potential Solutions, and Policy Implications.

    Science.gov (United States)

    Vermette, David; Shetgiri, Rashmi; Al Zuheiri, Haidar; Flores, Glenn

    2015-10-01

    To identify access barriers to healthcare and potential interventions to improve access for Iraqi refugee children. Four focus groups were conducted using consecutive sampling of Iraqi refugee parents residing in the US for 8 months to 5 years. Eight key-informant interviews also were conducted with employees of organizations serving Iraqi refugee families, recruited using snowball sampling. Focus groups and interviews were audiotaped, transcribed, and analyzed using margin coding and grounded theory. Iraqi refugees identified provider availability, Medicaid maintenance and renewal, language issues, and inadequate recognition of post-traumatic stress disorder as barriers to care for their children. Interviewees cited loss of case-management services and difficulties in understanding the Medicaid renewal process as barriers. Potential interventions to improve access include community-oriented efforts to educate parents on Medicaid renewal, obtaining services, and accessing specialists. Given the enduring nature of language and Medicaid renewal barriers, policies addressing eligibility alone are insufficient.

  10. A cross-case comparative analysis of international security forces' impacts on health systems in conflict-affected and fragile states.

    Science.gov (United States)

    Bourdeaux, Margaret; Kerry, Vanessa; Haggenmiller, Christian; Nickel, Karlheinz

    2015-01-01

    Destruction of health systems in fragile and conflict-affected states increases civilian mortality. Despite the size, scope, scale and political influence of international security forces intervening in fragile states, little attention has been paid to array of ways they may impact health systems beyond their effects on short-term humanitarian health aid delivery. Using case studies we published on international security forces' impacts on health systems in Haiti, Kosovo, Afghanistan and Libya, we conducted a comparative analysis that examined three questions: What aspects, or building blocks, of health systems did security forces impact across the cases and what was the nature of these impacts? What forums or mechanisms did international security forces use to interact with health system actors? What policies facilitated or hindered security forces from supporting health systems? We found international security forces impacted health system governance, information systems and indigenous health delivery organizations. Positive impacts included bolstering the authority, transparency and capability of health system leadership. Negative impacts included undermining the impartial nature of indigenous health institutions by using health projects to achieve security objectives. Interactions between security and health actors were primarily ad hoc, often to the detriment of health system support efforts. When international security forces were engaged in health system support activities, the most helpful communication and consultative mechanisms to manage their involvement were ones that could address a wide array of problems, were nimble enough to accommodate rapidly changing circumstances, leveraged the power of personal relationships, and were able to address the tensions that arose between security and health system supporting strategies. Policy barriers to international security organizations participating in health system support included lack of mandate, conflicts

  11. Numbers Matter: Post-2014 Afghan National Security Force End Strength

    Science.gov (United States)

    2013-03-01

    Afghan Border Police ( ABP ), and the Afghan National Civil Order Police (ANCOP).16 Two other Afghan security organizations, which did not factor...Air Force (AAF), Afghan Border Police ( ABP ), and Afghan Uniform Police (AUP), is also a significant challenge to the legitimacy of the ANSF with the

  12. Iraqi Refugee High School Students' Academic Adjustment

    Science.gov (United States)

    Bang, Hyeyoung

    2017-01-01

    Many Iraqi refugee students in the United States suffer from posttraumatic stress disorder (PTSD) as well as acculturation stresses. These stresses often create challenges for their integration into U.S. schools. The project explored risk factors such as the length of educational gaps in transit, PTSD, and separation and marginalization…

  13. The Impacts of Liquidity on Profitability in Banking Sectors of Iraq: A Case of Iraqi Commercial Banks.

    OpenAIRE

    Sardar Shaker Ibrahim

    2017-01-01

    This study examines the influence of liquidity on the profitability of Iraqi commercial banks. Five banks based in Iraq namely: North bank, Iraqi Islamic bank, Sumer bank, Dar Es-Salam bank and Babylon bank randomly selected and analyzed for the current study over the period 2005 to 2013. Moreover,  annual reports of these banks have studied and the main ratios of profitability and liquidity were calculated. These reports are available at Iraqi Stock Exchange site. The variables that were ide...

  14. Culture Wars: Air Force Culture and Civil-Military Relations

    Science.gov (United States)

    2013-08-01

    organizations such that new policies or foreign procedures can appear threatening. In their studies of bureaucracies and policy making, Mor- ton Halperin and...evict Iraqi forces from Kuwait.29 As historians Michael Gordon and Bernard Trainor observe, “The lineup ran counter to what most of the public would

  15. Brief narrative exposure therapy for posttraumatic stress in Iraqi refugees: a preliminary randomized clinical trial.

    Science.gov (United States)

    Hijazi, Alaa M; Lumley, Mark A; Ziadni, Maisa S; Haddad, Luay; Rapport, Lisa J; Arnetz, Bengt B

    2014-06-01

    Many Iraqi refugees suffer from posttraumatic stress. Efficient, culturally sensitive interventions are needed, and so we adapted narrative exposure therapy into a brief version (brief NET) and tested its effects in a sample of traumatized Iraqi refugees. Iraqi refugees in the United States reporting elevated posttraumatic stress (N = 63) were randomized to brief NET or waitlist control conditions in a 2:1 ratio; brief NET was 3 sessions, conducted individually, in Arabic. Positive indicators (posttraumatic growth and well-being) and symptoms (posttraumatic stress, depressive, and somatic) were assessed at baseline and 2- and 4-month follow-up. Treatment participation (95.1% completion) and study retention (98.4% provided follow-up data) were very high. Significant condition by time interactions showed that those receiving brief NET had greater posttraumatic growth (d = 0.83) and well-being (d = 0.54) through 4 months than controls. Brief NET reduced symptoms of posttraumatic stress (d = -0.48) and depression (d = -0.46) more, but only at 2 months; symptoms of controls also decreased from 2 to 4 months, eliminating condition differences at 4 months. Three sessions of brief NET increased growth and well-being and led to symptom reduction in highly traumatized Iraqi refugees. This preliminary study suggests that brief NET is both acceptable and potentially efficacious in traumatized Iraqi refugees. Copyright © 2014 International Society for Traumatic Stress Studies.

  16. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    Schill, David

    Like civilian infrastructure, Air Force installations are dependent on electrical energy for daily operations. Energy shortages translate to decreased productivity, higher costs, and increased health risks. But for the United States military, energy shortages have the potential to become national security risks. Over ninety-five percent of the electrical energy used by the Air Force is supplied by the domestic grid, which is susceptible to shortages and disruptions. Many Air Force operations require a continuous source of energy, and while the Air Force has historically established redundant supplies of electrical energy, these back-ups are designed for short-term outages and may not provide sufficient supply for a longer, sustained power outage. Furthermore, it is the goal of the Department of Defense to produce or procure 25 percent of its facility energy from renewable sources by fiscal year 2025. In a government budget environment where decision makers are required to provide more capability with less money, it is becoming increasingly important for informed decisions regarding which energy supply options bear the most benefit for an installation. The analysis begins by exploring the field of energy supply options available to an Air Force installation. The supply options are assessed according to their ability to provide continuous and reliable energy, their applicability to unique requirements of Air Force installations, and their costs. Various methods of calculating energy usage by an installation are also addressed. The next step of this research develops a methodology and tool which assesses how an installation responds to various power outage scenarios. Lastly, various energy supply options are applied to the tool, and the results are reported in terms of cost and loss of installation capability. This approach will allow installation commanders and energy managers the ability to evaluate the cost and effectiveness of various energy investment options.

  17. Iraqi Universities Reach a Crossroads

    Science.gov (United States)

    Lindsey, Ursula

    2012-01-01

    Eight years after the U.S. invasion of Iraq and a few months after the withdrawal of the military forces from the country, Iraq's universities, devastated by years of dictatorship, sanctions, and war, are still struggling to recover. The security situation has improved since the deadly, dark days of 2006 and 2007, when the country teetered on the…

  18. Reforming Iraqi Journalism and Mass Communication Higher Education: Adapting the UNESCO Model Curricula for Journalism Education to Iraqi Higher Education

    Science.gov (United States)

    Pavlik, John V.; Laufer, Peter D.; Burns, David P.; Ataya, Ramzi T.

    2012-01-01

    Journalism and mass communication higher education in Iraq is well established but largely isolated from global developments since the 1970s. In the post-Iraq war period, the United Nations Educational, Scientific and Cultural Organization (UNESCO) implemented a multiyear project to work with the leadership of Iraqi higher education to help update…

  19. A cross-cultural study of request speech act: Iraqi and Malay students

    Directory of Open Access Journals (Sweden)

    Maryam Farnia

    2014-08-01

    Full Text Available Several studies have indicated that the range and linguistics expressions of external modifiers available in one language differ from those available in another language. The present study aims to investigate the cross-cultural differences and similarities with regards to the realization of request external modifications. To this end, 30 Iraqi and 30 Malay university students are selected as the participants of this study. Spencer-Oatey's (2008 rapport management theoretical framework is used to examine how face rapport is managed through the use of external modifications. The corpus consists of responses to a Discourse Completion Test (DCT consisting of eight situations. The questionnaires, adopted from Rose (1994, were distributed among Iraqi students and Malaysian Malay students studying at Universiti Sains Malaysia, Malaysia. The corpus were then analyzed based on Blum-Kulka, House and Kasper (1989 classification of external modifiers. The primary objective of this paper is to compare the effect of situational factors on the realization patterns of request modification between Iraqi and Malay university students .The findings are hoped to have implications for comparative cross-cultural and intercultural communication studies.

  20. An Argument for Documenting Casualties: Violence Against Iraqi Civilians 2006

    National Research Council Canada - National Science Library

    Hall, Katharine; Stahl, Dale

    2008-01-01

    The problem of measuring the number of civilian fatalities in Iraq gained widespread media coverage when the Lancet published a study in October 2004 claiming that more than 100,000 Iraqi civilians...

  1. Joint force protection advanced security system (JFPASS) "the future of force protection: integrate and automate"

    Science.gov (United States)

    Lama, Carlos E.; Fagan, Joe E.

    2009-09-01

    The United States Department of Defense (DoD) defines 'force protection' as "preventive measures taken to mitigate hostile actions against DoD personnel (to include family members), resources, facilities, and critical information." Advanced technologies enable significant improvements in automating and distributing situation awareness, optimizing operator time, and improving sustainability, which enhance protection and lower costs. The JFPASS Joint Capability Technology Demonstration (JCTD) demonstrates a force protection environment that combines physical security and Chemical, Biological, Radiological, Nuclear, and Explosive (CBRNE) defense through the application of integrated command and control and data fusion. The JFPASS JCTD provides a layered approach to force protection by integrating traditional sensors used in physical security, such as video cameras, battlefield surveillance radars, unmanned and unattended ground sensors. The optimization of human participation and automation of processes is achieved by employment of unmanned ground vehicles, along with remotely operated lethal and less-than-lethal weapon systems. These capabilities are integrated via a tailorable, user-defined common operational picture display through a data fusion engine operating in the background. The combined systems automate the screening of alarms, manage the information displays, and provide assessment and response measures. The data fusion engine links disparate sensors and systems, and applies tailored logic to focus the assessment of events. It enables timely responses by providing the user with automated and semi-automated decision support tools. The JFPASS JCTD uses standard communication/data exchange protocols, which allow the system to incorporate future sensor technologies or communication networks, while maintaining the ability to communicate with legacy or existing systems.

  2. The Military Use of Children by the Syrian-Iraqi Salafi-Jihadist Group

    Directory of Open Access Journals (Sweden)

    Saeed Bagheri

    2017-01-01

    Full Text Available Non-state armed groups are the main threats to states’ national security in the 21st century, to defend against which, states require useful methods. Recently, use of children by these groups, especially in the Middle East, has turned into one of the most important discussable issues that need to be evaluated in the context of the law of armed conflict. This study aims to discuss legal regime of the military use of children in armed conflict. The main purpose of the study is to analyze the use of child soldiers by the Syrian-Iraqi Salafi-Jihadist Group in its combat operations. In this respect, initially, the legal definition of child soldiers and the role of them in armed conflicts will be discussed. Based on this, different forms of the child soldiers’ involvement in armed conflicts and the international criminal responsibility for their war crimes will be examined as an applicable law in the context of international criminal law.

  3. The Impacts of Liquidity on Profitability in Banking Sectors of Iraq: A Case of Iraqi Commercial Banks.

    Directory of Open Access Journals (Sweden)

    Sardar Shaker Ibrahim

    2017-02-01

    Full Text Available This study examines the influence of liquidity on the profitability of Iraqi commercial banks. Five banks based in Iraq namely: North bank, Iraqi Islamic bank, Sumer bank, Dar Es-Salam bank and Babylon bank randomly selected and analyzed for the current study over the period 2005 to 2013. Moreover,  annual reports of these banks have studied and the main ratios of profitability and liquidity were calculated. These reports are available at Iraqi Stock Exchange site. The variables that were identified as independent for liquidity were, loan deposit ratio, deposit asset ratio and cash deposit ratio, while return on assets as dependent variable for profitability. The Ordinary Least Square (OLS model used to examine the impact of liquidity on profitability. The study observes that any increase in liquidity ratios as above mentioned will lead return on asset to increase as well. Depending on this study it could be better for Iraqi banks to keep a balance between liquidity and profitability.

  4. Analysis of 49 autosomal SNPs in an Iraqi population

    DEFF Research Database (Denmark)

    Tomas Mas, Carmen; Diez, Isabel E; Moncada, Enrique

    2013-01-01

    (ST) values were statistically significant when pairwise comparisons were performed between the 18 populations. The Iraqi population did not show significant difference from the population in Turkey and it grouped together with other Middle-Eastern populations when a multidimensional scaling plot was drawn...

  5. Women and Learning in the Iraqi War Zone

    Science.gov (United States)

    Zangana, Haifa

    2008-01-01

    Having accumulated, throughout the twentieth century, historical achievements in education and standards of living higher than in most Arab and "third world" countries, Iraqi women were hit hard by two wars, the US-imposed economic sanctions of the 1990s, and then set back by the 2003 Anglo-American imperial occupation. Physical survival…

  6. Anxiety, stress, and quality of life among Iraqi refugees in Jordan: A cross sectional survey.

    Science.gov (United States)

    Al-Smadi, Ahmed Mohammad; Tawalbeh, Loai Issa; Gammoh, Omar Salem; Ashour, Ala Fawzi; Alshraifeen, Ali; Gougazeh, Yazeed Mohammed

    2017-03-01

    This study was conducted to identify the predictors, levels, and prevalence of anxiety and stress and to assess the relationship between these factors and quality of life in recently displaced Iraqis. A cross-sectional design was used. A convenience sample of 171 Iraqi refugees was recruited. The results indicated that more than half of the sample suffered from high anxiety levels, while 42.8% reported high stress. The regression model explained 46.3% of the variance in levels of quality of life. Unemployment, fewer than three family members, and high anxiety significantly predicted low-level quality of life. These three predictors need to be taken into consideration when developing health-related interventions to improve the quality of life of Iraqi refugees. © 2017 John Wiley & Sons Australia, Ltd.

  7. The health profile and chronic diseases comorbidities of US-bound Iraqi refugees screened by the International Organization for Migration in Jordan: 2007-2009.

    Science.gov (United States)

    Yanni, Emad A; Naoum, Marwan; Odeh, Nedal; Han, Pauline; Coleman, Margaret; Burke, Heather

    2013-02-01

    More than 63,000 Iraqi refugees were resettled in the United States from 1994 to 2010. We analyzed data for all US-bound Iraqi refugees screened in International Organization for Migration clinics in Jordan during June 2007-September 2009 (n = 18,990), to describe their health profile before arrival in the United States. Of 14,077 US-bound Iraqi refugees ≥ 15 years of age, one had active TB, 251 had latent TB infection, and 14 had syphilis. No HIV infections were reported. Chronic diseases comorbidities accounted for a large burden of disease in this population: 35% (n = 4,105) of screened Iraqi refugees had at least one of three chronic medical conditions; hypertension, diabetes mellitus, or obesity. State health departments and clinicians who screen refugees need to be aware of the high prevalence of chronic diseases among Iraqi refugees resettled in the United States. These results will help public health specialists develop policies to reduce morbidity and mortality among US-bound Iraqi refugees.

  8. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis?

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2007-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be as many as 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately...

  9. Iraqi Refugees and Internally Displaced Persons: A Deepening Humanitarian Crisis?

    National Research Council Canada - National Science Library

    Margesson, Rhoda; Sharp, Jeremy M; Bruno, Andorra

    2008-01-01

    .... It is estimated that in total (including those displaced prior to the war) there may be as many as 2 million Iraqi refugees who have fled to Jordan, Syria, and other neighboring states, and approximately...

  10. Canine Supply for Physical Security: An Analysis of the Royal Australian Air Force Military Working Dog Program

    Science.gov (United States)

    2016-03-01

    PHYSICAL SECURITY: AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM by Mark W. Powell March 2016 Thesis...AN ANALYSIS OF THE ROYAL AUSTRALIAN AIR FORCE MILITARY WORKING DOG PROGRAM 5. FUNDING NUMBERS 6. AUTHOR(S) Mark W. Powell 7. PERFORMING...increased demand on its physical security elements. Its military working dog (MWD) workforce is required to meet an inventory of 204 by end of year 2023 as

  11. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    National Research Council Canada - National Science Library

    Dale, Catherine

    2008-01-01

    Operation Iraqi Freedom (OIF) was launched on March 20, 2003, with the immediate stated goal of removing Saddam Hussein's regime and destroying its ability to use weapons of mass destruction or to make them available to terrorists...

  12. Operation Iraqi Freedom: Strategies, Approaches, Results, and Issues for Congress

    National Research Council Canada - National Science Library

    Dale, Catherine

    2008-01-01

    Operation Iraqi Freedom (OIF) was launched on March 20,2003, with the immediate stated goal of removing Saddam Hussein's regime and destroying its ability to use weapons of mass destruction or to make them available to terrorists...

  13. [Manpower migrations and Arab unity: the challenges of the Iraqi model].

    Science.gov (United States)

    Roussillon, A

    1985-01-01

    Iraq occupies a unique position in the system of manpower exchanges between Middle Eastern states brought about by the rise in petroleum incomes of the 1970s. Iraq was among the most important oil exporters until the war with Iran, but its economy is predominantly agricultural, it is a rich country in terms of available financial resources, and it is both an importer and exporter of labor, traits which place it squarely between the nonoil-producing states which are poor and overpopulated and the oil exporters which are rich and underpopulated. Its migration policy, which radically distinguishes between Arab and non-Arab manpower, is also unique. Data on migration to Iraq are very sparse despite the fact that the nation has a good data-gathering capacity. Estimates of migration to Iraq and employment patterns of migrants have varied widely and have contradicted each other in crucial respects. The most unusual aspect of Iraqi immigration policy, the free access offered to Egyptians and other Arabs, has hampered attempts to estimate the volume of migration, as workers come and go for relatively short periods, seeking their own employment in Iraq and working in jobs for which they may be overqualified. Official formulations of Iraqi migration policy insist that migration should not only be beneficial to individual importing and exporting countries in terms of development and social cohesion, but should also reinforce the solidarity and regional complementarity of the Arab world as a whole. Iraqi migration policy is presented as expressing the most fundamental choices of the "Arab revolution" in the socialist dimension of Arab unitary ideology rather than in terms of immediate national economic interest. Iraqi legislation grants non-Iraqi Arabs the same labor, residence, investment, and ultimately naturalization rights as those enjoyed by nationals, but severely restricts access to employment and other rights of non-Arab foreigners. Denunciation of the dangers posed by

  14. Awareness of antibiotic use and antimicrobial resistance in the Iraqi community in Jordan.

    Science.gov (United States)

    Darwish, Dana A; Abdelmalek, Suzanne; Abu Dayyih, Wael; Hamadi, Salim

    2014-05-14

    Antimicrobial resistance is a serious global health concern. It has considerable implications on societies' health and resources. In Jordan, there is a large Iraqi community due to the ongoing turmoil in Iraq. Unfortunately, health awareness and practices of this community are under-investigated due to scarcity of research. This paper assesses the awareness of antibiotic use and antimicrobial resistance in the Iraqi community residing in Amman, Jordan. Their level of interaction with health care professionals regarding antibiotics and differences in their antibiotic use between Iraq and Jordan are also discussed. A cross-sectional questionnaire-based survey involving randomly selected Iraqis residing in Amman, Jordan was conducted. The study involved 508 participants. Sixty-two percent of participants agreed with buying antibiotics without a prescription, 29% agreed with obtaining antibiotics from friends or relatives, and 46% agreed with keeping leftover antibiotics for future use. Furthermore, 60% disagreed with not completing an antibiotic course and almost 90% of the sample listed viral diseases as an indication for antibiotics. Forty-four percent of participants abided by physicians' instructions on antibiotic use. Half of the participants believed that pharmacists provided instructions on antibiotics all the time, whereas physicians were perceived to do so by 29% of participants. Gaps exist in knowledge of antibiotic use and reasons for antimicrobial resistance among Iraqis residing in Jordan. These gaps should serve in planning educational campaigns to raise the community's awareness of responsible antibiotic use. Law enforcement to restrict access to antibiotics is also pivotal to tackle their misuse.

  15. Turkey’s New Regional Security Role: Implications for the United States

    Science.gov (United States)

    2014-09-01

    organizational reform, economic restructuring, and integrating recent members. Efforts to develop a Eu- ropean Security and Defense Identity (ESDI...the fed- eral state of Iraq. Turkish officials have also developed ties with moderate Kurdish leaders such as Iraqi Pres- ident Jalal Talabani and...most vis- ible presence is its pop culture, especially cinema , and Turkish goods. Turkish clothes, furniture, toys, build- ing materials, and other

  16. Why the Iraqi Resistance to the Coalition Invasion Was so Weak

    National Research Council Canada - National Science Library

    Hosmer, Stephen T

    2007-01-01

    .... Drawing upon information derived primarily from interviews with former senior Iraqi civilian and military officials, this monograph focuses on two questions relating to the rapidity and ease of that victory: (1...

  17. Environmental Assessment for the Air Force Research Laboratory Security Fence Project, Edwards Air Force Base, California

    Science.gov (United States)

    2012-11-26

    Pleistocene/Early-Holocene Prehistory (12,000 to 7,000 BP). The Lake Mojave Period in the southwestern Great Basin comprises a regional manifestation...adaptive patterns with focal exploitation of such habitats (Tetra Tech 2010). Middle-Holocene Prehistory (8,000 to 4,000 BP). Succeeding Lake Mojave in the...Security Fence at Edwards Air Force Base, California Late Holocene Prehistory (4,000 to Contact). With return to more “favorable” environmental

  18. Iraqi Perspectives Project. Primary Source Materials for Saddam and Terrorism: Emerging Insights from Captured Iraqi Documents. Volume 4 (Redacted)

    Science.gov (United States)

    2007-11-01

    destroy the residence of the US Ambassador in Jakarta, Japanese Embassy and American Airlines in Philippines 2 CMPC-2003-000 17015 2 Production and...used to seek a number oftargets like (The Iraqi Communist Party Headquarters, assassinating some ofP.K.K members, blowing up Dilshad Cinema ) where...Sulaymaniyyah like Dilshad Cinema , a Casino in (Illegible) Subdivision and a media whole. 4- They issued the first declaration threatening the Secularism

  19. Los Alamos National Laboratory Facilities, Security and Safeguards Division, Safeguards and Security Program Office, Protective Force Oversight Program

    International Nuclear Information System (INIS)

    1995-01-01

    The purpose of this document is to identify and describe the duties and responsibilities of Facility Security and Safeguards (FSS) Safeguards and Security (SS) organizations (groups/offices) with oversight functions over the Protection Force (PF) subcontractor. Responsible organizations will continue their present PF oversight functions under the Cost Plus Award Fee (CPAF) assessment, but now will be required to also coordinate, integrate, and interface with other FSS S and S organizations and with the PF subcontractor to measure performance, assess Department of Energy (DOE) compliance, reduce costs, and minimize duplication of effort. The role of the PF subcontractor is to provide the Laboratory with effective and efficient protective force services. PF services include providing protection for the special nuclear material, government property and classified or sensitive information developed and/or consigned to the Laboratory, as well as protection for personnel who work or participate in laboratory activities. FSS S and S oversight of both performance and compliance standards/metrics is essential for these PF objectives to be met

  20. Analysis and Assessment for Iraqi Communication Technology Development

    Directory of Open Access Journals (Sweden)

    Marwan Al-Khalidy

    2015-09-01

    Full Text Available The communications in Iraq has been fluctuated for decades. In fact, this fluctuation constitutes a reality that the country has been facing such as the security issues, the economic blockade imposed on the previous regime, and all the exceptional circumstances. This paper illustrates the nature and reality of communication in Iraq after 2003. While the sophisticated technology works very well all around the world, Iraq still does not keep the work up to improve its communications. This paper tackles the most importantcommunication problems in Iraq after 2003, and the possibility to process good services to customers, either by developing the governmental combinations, or/and by enforcing telecommunication companies to provide their best services to their customers. This paper answers the following the questions: Are the telecom/communication companies serve good qualities to the customers? If not, why? Who is the responsible? Are these companies at least doing their best to serve good qualities? Or are they just profitable companies? Why have these companies not started using the optical fiber cables instead of the copper one? Is the government seeking to compel such companies to serve good services? Whether the Iraqi government plans to develop the landlines services so it would compete with the telecom companies? What is the role of the Communication and Media Commission (CMC?

  1. Transitions to Peace: Effects on Internal Security Forces in Nicaragua, El Salvador and Guatemala

    National Research Council Canada - National Science Library

    Atha, Roberto J

    2008-01-01

    .... It reveals how the influence of the military affected the implementation of internal security reforms, influencing the professionalism and effectiveness of police forces in the fight against violence and gangs today...

  2. Neurosurgery in Iraqi Kurdistan: An Example of International Neurosurgery Capacity Building.

    Science.gov (United States)

    Dossani, Rimal Hanif; Carr, Steven; Bolles, Gene; Balata, Razvan; Guthikonda, Bharat

    2016-08-01

    The medical infrastructure of Iraqi Kurdistan, a semiautonomous region in the northern part of Iraq, lags disproportionately behind relative to the otherwise booming industrial advances of the region. Although neurosurgical training is available, the local population lacks trust in its own neurosurgeons. Medical facilities suffer from a lack of basic resources, such as high-speed drills, intracranial pressure monitoring, and stereotaxy to care for neurosurgical patients. Since 2012, American volunteer neurosurgeons have delivered lectures and mentored local neurosurgeons in performing neurosurgical procedures. Over the last 4 years, the visiting neurosurgical team has seen hundreds of patients in consultation and performed more than 50 complex cranial and spinal operations jointly with local neurosurgeons. This article discusses our experience as volunteer neurosurgeons in building neurosurgical capacity in Iraqi Kurdistan. Copyright © 2016 Elsevier Inc. All rights reserved.

  3. Neurological disorders in Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System.

    Science.gov (United States)

    Mateen, Farrah J; Carone, Marco; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Al-Saedy, Huda; Lowenstein, Daniel H; Burnham, Gilbert

    2012-04-01

    The United Nations High Commissioner for Refugees (UNHCR) recognizes 43.7 million forcibly displaced persons and asylum seekers due to conflict and persecution worldwide. Neurological disorders have rarely been described in displaced persons but likely pose a significant burden of disease. We describe the disease spectrum and health service utilization of Iraqi refugees and asylum seekers with neurological disorders using an information system developed by the UNHCR. Neurological disorders were actively monitored among the 7,642 UNHCR-registered Iraqi refugees and asylum seekers who received health and humanitarian assistance using a pilot, centralized, database called the Refugee Assistance Information System (RAIS) in the Kingdom of Jordan in 2010. There were 122 neurological diagnoses reported in 1,328 refugees (mean age 41 years, 49% female, 10% disabled, 43% with pending resettlement applications) in 2,659 health visits, accounting for 17% of all refugees who sought health assistance in RAIS. Referral to a neurologist occurred in 178 cases (13.4%). The most frequent ICD-10 neurological diagnoses were dorsalgia (back pain) (29.7% of individuals with neurological disorders), headache (13.1%), and epilepsy (12.6%). Approximately 1 in 20 Iraqi refugees with a neurological diagnosis self-reported a history of torture, which was higher than Iraqi refugees without a history of torture [66/1,328 versus 196/6,314, odds ratio (OR) = 1.63, 95% confidence interval (CI) 1.21-2.18]. Neurological disease affects a high proportion of Iraqi refugees, including victims of torture and the disabled. Refugees require dedicated care for treatment of neurological disease with a focus on pain disorders and epilepsy.

  4. Private Security Contractors in Iraq: Background, Legal Status, and Other Issues

    Science.gov (United States)

    2008-09-29

    reporting procedures, bad investigation methods and unfair double standards amongst employees should not be condoned." Tom Jackman , “Security Contractor...Cleared in Two Firings”, Washington Post, August 2, 2007. p. A-15. 43 Tom Jackman . “U.S. Contractor Fired on Iraqi Vehicles for Sport, Suit Alleges...Public Diplomacy and Public Affairs Karen Hughes , speaking before the Council on Foreign Relations, New York City, N.Y., on May 10, 2006, said of the new

  5. Molecular Characterization of Rotavirus Gastroenteritis Strains, Iraqi Kurdistan

    Science.gov (United States)

    Ahmed, Herish M.; Coulter, J. Brian S.; Nakagomi, Osamu; Zaki, Jamal M.; Al-Rabaty, Abas A.; Dove, Winifred; Cunliffe, Nigel A.

    2006-01-01

    Of 260 children with acute diarrhea in Erbil, Iraqi Kurdistan, 96 (37%) were infected with rotavirus. Reverse transcription–polymerase chain reaction identified G1, G4, G2, G9, P[8], P[6], and P[4] as the most common genotypes. Eight G/P combinations were found, but P[8]G1 and P[4]G2 accounted for >50% of the strains. PMID:16704845

  6. Command and Control of Private Security Contractors: Are They a Viable Force Option for the Combatant Commander?

    National Research Council Canada - National Science Library

    Sherard, Scott H

    2008-01-01

    If a Combatant Commander (CCDR) or Joint Force Commander (JFC) were to take command of the approximately 25,000 security contractors in Iraq, a force of such size and capability would prove to be a valuable operational asset...

  7. IRAQI BUFFALO NOW

    Directory of Open Access Journals (Sweden)

    J. Kh. ALsaedy

    2010-02-01

    Full Text Available Buffaloes in Iraq represent the most productive animal since its domestication in Mesopotamia about pre-historic era recently, domesticated buffaloes all over country go through drastic factors from (1980_2006, such as (gulf wars, marsh drainage, rinder pest plaque, economic blockade which are attributed to widely changes in animal environment ,geographical sites, and dangerous decline in buffalo population accompanied by reduced fertility and feed shortage, resulted in switch of buffalo raising and started to work on another easy jobs .lastly American war in 2003 lead to marsh return and finally ethnic-fighting release, so thousands of buffalo breeders (Madan started a big mass moving from hot-spot area around Baghdad countryside villages nearer to conflicting sectors in Anbar and sallah aldin provinces towards southern marshes (natural habitats before along time. This new theater encouraged Iraqi government represented by Ministry of agriculture through three involved companies to put strategic plane for buffalo development in future.

  8. Statistical Study to Check the Conformity of Aggregate in Kirkuk City to Requirement of Iraqi Specification

    Directory of Open Access Journals (Sweden)

    Ammar Saleem Khazaal

    2018-01-01

    Full Text Available This research reviews a statistical study to check the conformity of aggregates (Coarse and Fine was used in Kirkuk city to the requirements of the Iraqi specifications. The data of sieve analysis (215 samples of aggregates being obtained from of National Central Construction Laboratory and Technical College Construction Laboratory in Kirkuk city have analyzed using the statistical program SAS. The results showed that 5%, 17%, and 18% of fine aggregate samples are passing sieve sizes 10 mm, 4.75 mm, and 2.36 mm, respectively, which were less than the minimum limit allowed by the Iraqi specifications for each sieve. The percentages passing sieve sizes 1.18mm, 600micrometers, and 300micrometers were more than the upper limit of specification by 5%, 20%, and 30% respectively. The samples were passing sieve sizes 1.18mm, and 600micrometers less than the minimum limit of specification by 17%, and 4%, respectively. The results showed that the deviation in a sieve size of 150 micrometers for the upper limit of the specification performs 2% of the total number of samples. For Coarse aggregate, the samples passing sieves size 37.5mm and 20mm were comforting the Iraqi specifications by 100% and 83% respectively, it has found that the samples were passing sieve sizes 10 mm was 5% was more than the higher limit of Iraqi specifications, and 27% of these samples were less than the minimum limit, whereas sample passing sieve size 5mm was 1% which is more than the upper limit of the Iraqi specification. As a result of statistical analysis of data for fine aggregate, it has found that the samples were passing sieve sizes 10 mm, 2.36 mm, 1.18 mm and 150micrometers conforming from statistical point of view the Iraqi specifications, whereas the samples were passing sieve sizes 4.75 mm, 600micrometers and 300 micrometers didn’t conform. Statistical analysis of the results of the coarse aggregates also showed that conforming to sieve sizes of 37.5 mm and 20 mm and

  9. Auxiliary Armed Forces and Innovations in Security Governance in Mozambique’s Civil War

    NARCIS (Netherlands)

    Jentzsch, C.

    2017-01-01

    Who rules during the civil war? This article argues that the concept of armed group governance must be expanded to include auxiliary armed forces linked to rebels or the government. Comparing the organization of rebel and government auxiliaries, the article demonstrates that security governance

  10. Skin Colour Analysis of Iraqi Kurdish Population

    OpenAIRE

    Zardawi, Faraedon M; Xiao, Kaida; Yates, Julian M

    2015-01-01

    Objective: Skin colour measurement and analysis was performed for Iraqi Kurdish population in sulaimani city. The purpose of this study was to produce a dedicated skin shade guide for precise colour reproduction and colour matching of maxillofacial prostheses with the patient’s original skin colour. Methodology: A skin colour measurement was undertaken for 140 subjects (73 female and 67 male). A method of capturing their (L* a* b*) colour values from nine body parts was performed using a Mi...

  11. Struggling for sense of control: everyday life with chronic pain for women of the Iraqi diaspora in Sweden.

    Science.gov (United States)

    Zander, Viktoria; Müllersdorf, Maria; Christensson, Kyllike; Eriksson, Henrik

    2013-12-01

    As dispersed ethnic populations in Swedish society expand, the healthcare system need to adapt rehabilitation services according to their needs. The experiences of trauma and forced resettlement have a continuing impact on health and musculoskeletal pain, as well as the intersecting structures that prerequisite the possibilities in the new country. To understand the specific needs of women from the Iraqi diaspora in Sweden, there is a need to elucidate the effects of pain on their everyday life. To elucidate everyday life with chronic pain from the perspective of women from the Iraqi diaspora in Sweden. Qualitative interview study according to Glaser's grounded theory. The results from 11 interviews suggest that pain was associated with dependency on society as well as on family. It resulted in a struggle for sense of control, framed by faith in God, influenced by the healthcare system, and with support from family. The women's testimony of lack of continuity of care, resulting in recollection of lived traumas in every visit, is a vital sign of the unconscious power relations within health care and how representatives from health care, instead of being the ones who help the women forward, become the ones who hold them back. The results show the importance of challenging the normative assumptions embedded in health care and treatment for patients with chronic pain and of including the voice of "others".

  12. The expression of gonadotropin releasing hormone receptor gene in ovaries and uterus cells of Iraqi and Damascus goat breed

    Directory of Open Access Journals (Sweden)

    Alaa kamil Abdulla

    2017-07-01

    Full Text Available Iraqi goats have a major economic role in production of meat, milk and leather as well as it considered a financial source for owners as reproduce twice a year, yet the Damascus goats have great importance than Iraqi goats owing to the number of twin births. The gonadotropin releasing hormone (GnRH and its receptors have great importance in the reproduction and eugenics. To make a comparison between the Iraqi and Damascus goats in terms of this receptor gene expression in the ovaries and uterus tissue cells, the study was performed, in which used the (∆Ct Using a Reference Gene method by quintitive -real time PCR technique. Results were found a significant difference (p<0.05, as the gene expression of (GnRH-R higher in the ovaries and uterus tissue cells in Damascus goats compared with the Iraqi goats. In conclusion; the multiple pregnancies of twins in Damascus goats may be due to an increase gene expression of (GnRH-R in the ovaries and uterus tissue

  13. Viability of the ground of Shithatha, western Iraqi plateau, for industrial and commercial uses via hydrochemistry analysis

    Science.gov (United States)

    Al-Qaraghuli, S. A.

    2017-08-01

    Iraqi western plateau is considered as one of the most resourceful areas of the middle east, that is not yet well explored, due to the many political disturbances and security issues. The viability of underground water for the various industrial, municipal, commercial and agricultural uses is examined for Shithatha, Karbala governorates as a representative for the western plateau via chemical and physical analysis of water samples that are taken from 9 wells and 3 springs all-around the study area during the wet and dry periods. Hydro chemical and statistical analysis for the field samples have proved that groundwater of the studied area is classified as slightly-brackish water and water hardness is very high. Also, the results of the analyses of trace elements in the groundwater of the study area have confirmed the contamination of groundwater with some elements such as (Fe, Cd, Pb, Ni) in concentrations that have exceeded the WHO and Iraqi national standards IQS, permissible limits. The application of Hydro-chemical formulae of Kurlouv and Piper, Schoeller, Stiff classifications have demonstrated that most samples of the study area have water type of (Na2SO4) while other samples have ranged between (MgSO4), and (NaCl) water type. The quality of groundwater is unsuitable for drinking and industrial purposes and it is almost suitable for irrigation purposes, but it is suitable for livestock, building and agricultural purposes because the salinity of the water is within the permissible limits when considering the nature of the soil.

  14. Iraqi adolescents: self-regard, self-derogation, and perceived threat in war.

    Science.gov (United States)

    Carlton-Ford, Steve; Ender, Morten G; Tabatabai, Ahoo

    2008-02-01

    A year into the 2003 US-Iraq war, how were adolescents in Baghdad faring? Conflict-related events typically lower psychological well-being; in contrast, investment in and protection of threatened identities should lead to self-esteem striving and, presumably, better well-being. How threatened do Iraqi adolescents feel? Is their self-esteem related to their sense of threat? Do age, religion, ethnicity, and gender alter the link between perceived threat and self-esteem? We use data from 1000 randomly selected adolescents living in Baghdad during July 2004. Iraqi adolescents reported high levels of threat; those feeling more threatened reported higher levels of self-esteem. Social background correlates with both self-esteem and perceived threat, but controlling for social background does not eliminate the relationship between self-esteem and perceived threat. We interpret our results in light of theory and research concerning social identity, mortality threats, and war trauma.

  15. Some wholesomeness studies on irradiated Iraqi dates

    International Nuclear Information System (INIS)

    Al Rawi, A.M.; Hamoudi, H.I.

    1981-01-01

    Iraqi dates (Zahdi and Khestawi) were irradiated at different dose levels (0 to 1500 krad) to extend their shelf-lives. Samples irradiated at 150 krad showed no change in the behaviour studies of tested Swiss albino mice. Fungi were found to have a constant rate of growth on the syrup irradiated dates. Chemical products such as malondialdehyde, deoxy sugars, acids and reducing sugars were quantified. In conclusion, 150 krad is a convenient dose to extend the shelf-lives of the tested dates and is therefore recommended. (author)

  16. Mental health literacy among refugee communities: differences between the Australian lay public and the Iraqi and Sudanese refugee communities.

    Science.gov (United States)

    May, Samantha; Rapee, Ronald M; Coello, Mariano; Momartin, Shakeh; Aroche, Jorge

    2014-05-01

    This study investigated differences in mental health knowledge and beliefs between participants from the Iraqi and Sudanese refugee communities, and Australian-born individuals, in Sydney, Australia. Ninety-seven participants were given vignettes of characters describing symptoms of major depressive disorder and posttraumatic stress. They were required to identify psychological symptoms as disorders, rate beliefs about the causes of and helpful treatments for these disorders, and rate attitude statements regarding the two characters. Australian participants recognized the presented symptoms as specific mental disorders significantly more than Iraqi and Sudanese participants did, and reported causal and treatment beliefs which were more congruent with expert beliefs as per the western medical model of mental disorder. The Sudanese group endorsed supernatural and religious causal beliefs regarding depression and posttraumatic stress symptoms most often; but both Sudanese and Iraqi participants strongly supported options from the supernatural and religious treatment items. However, evidence for pluralistic belief systems was also found. Although sampling was non-random, suggesting caution in the interpretation of results, it appears that the mental health literacy of lay Australians may be more aligned with the western medical model of mental disorder than that of Iraqi and Sudanese refugee communities. Mental health literacy support needs of Iraqi and Sudanese refugee communities resettled in western countries such as Australia might include education about specific symptoms and causes of mental disorder and the effectiveness of psychiatric treatments. These findings provide useful directions for the promotion of optimal service utilization among such communities.

  17. Pragmatic Difficulties in the Production of the Speech Act of Apology by Iraqi EFL Learners

    Directory of Open Access Journals (Sweden)

    Mehdi Falih Al-Ghazalli

    2014-12-01

    Full Text Available The purpose of this paper is to investigate the pragmatic difficulties encountered by Iraqi EFL university students in producing the speech act of apology. Although the act of apology is easy to recognize or use by native speakers of English, non-native speakers generally encounter difficulties in discriminating one speech act from another. The problem can be attributed to two factors: pragma-linguistic and socio-pragmatic knowledge. The aim of this study is(1to evaluate the socio-pragmatic level of interpreting apologies as understood and used by Iraqi EFL university learners, (2 find out the level of difficulty they experience in producing apologies and(3 detect the reasons behind such misinterpretations and misuses. It is hypothesized that the socio-pragmatic interpretation of apology tends to play a crucial role in comprehending what is intended by the speaker. However, cultural gaps can be the main reason behind the EFL learners' inaccurate production of the act of apology. To verify the aforementioned hypotheses, a test has been constructed and administered to a sample of 70 fourth-year Iraqi EFL university learners, morning classes. The subjects' responses have been collected and linguistically analyzed in the light of an eclectic model based on Deutschmann (2003 and Lazare (2004. It has been concluded that the misinterpretation or difficulty Iraqi EFL students have faced is mainly attributed to their lack of socio-pragmatic knowledge. The interference of the learnersʹ first language culture has led to non-native productions of speech act of apology.

  18. The New Roles of the Dominican Armed Forces in the Dominican Republic National Security Plan

    National Research Council Canada - National Science Library

    Arias, Jose D

    2007-01-01

    ... in the 2005 National Security Plan. The resulting analysis provides a basis for determining what the new roles of the Dominican Armed Forces and the National Police should be for the 21st century...

  19. Al Sahawa - The Awakening. Volume 4: Al Anbar Province, Area of Operations Topeka, Ramadi

    Science.gov (United States)

    2016-08-01

    simultaneously and he had our message resonating out, including music , popular music , we had video of people dancing in the streets to the music ; it was...As Abd al-hakim Muhammad Rashid, the mayor of Had- ithah indicated, “there was no popular militia to fight the sahawa” in Hadithah as there was in Al...secure the city from AQI led insurgent dominance, and 2) build Iraqi security forces, espe- cially police, along with a municipal structure and popular

  20. Self-rated health and social capital in Iraqi immigrants to Sweden: The MEDIM population-based study.

    Science.gov (United States)

    Bennet, Louise; Lindström, Martin

    2018-03-01

    Poor self-rated health is an estimator of quality of life and a predictor of mortality seldom studied in immigrant populations. This work aimed to study self-rated health in relation to social capital, socioeconomic status, lifestyle and comorbidity in immigrants from Iraq - one of the largest non-European immigrant group in Sweden today - and to compare it with the self-rated health of native Swedes. The study was a cross-sectional population-based study conducted from 2010 to 2012 among citizens of Malmö, Sweden, aged 30-65 years and born in Iraq or Sweden. All participants underwent a health examination and answered questionnaires on self-rated health, social capital, comorbidity, lifestyle and socioeconomic status. In total, 1348 Iraqis and 677 Swedes participated. Poor self-rated health was identified in 43.9% of Iraqis and 21.9% of native Swedes ( psocial capital was highly prevalent in the immigrants. Female gender showed higher odds of poor self-rated health in Iraqis than in Swedes (OR 1.8, 95% CI 1.4-2.5, p interaction =0.024), independent of other risk factors connected to social capital, socioeconomic status, lifestyle or comorbidity. Although public health initiatives promoting social capital, socioeconomic status and comorbidity in immigrants are crucial, the excess risk of poor self-rated health in Iraqi women is not fully attributed to known risk factors for self-rated health, but remains to be further explored.

  1. Iraqi oil industry slowly returning to normal

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Iraq is making progress in putting its battered petroleum industry back together 1 1/2 years after the Persian Gulf war ended. OPEC News Agency (Opecna) reported the finish of reconstruction of Iraq's Mina al-Bakr oil terminal on the northern tip of the Persian Gulf, using Iraqi know-how and engineering personnel. The terminal, heavily damaged during the gulf conflict, has been restored to its prewar loading capacity of 1.6 million b/d at a cost of $16 million. Ninety per cent of the port had been damaged

  2. A Medical Logistics Officer Training Needs Assessment Utilizing Feedback from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    Waddick, James L

    2004-01-01

    ... their missions during the initial Operation Iraqi Freedom deployment (OIF 1). Additionally, the study sought to identify the potential benefit of additional training on key medical logistics tasks and training events...

  3. Breast-feeding and complementary feeding practices in the first 6 months of life among Norwegian-Somali and Norwegian-Iraqi infants: the InnBaKost survey.

    Science.gov (United States)

    Grewal, Navnit Kaur; Andersen, Lene Frost; Sellen, Daniel; Mosdøl, Annhild; Torheim, Liv Elin

    2016-03-01

    To examine breast-feeding and complementary feeding practices during the first 6 months of life among Norwegian infants of Somali and Iraqi family origin. A cross-sectional survey was performed during March 2013-February 2014. Data were collected using a semi-quantitative FFQ adapted from the second Norwegian national dietary survey among infants in 2006-2007. Somali-born and Iraqi-born mothers living in eastern Norway were invited to participate. One hundred and seven mothers/infants of Somali origin and eighty mothers/infants of Iraqi origin participated. Breast-feeding was almost universally initiated after birth. Only 7 % of Norwegian-Somali and 10 % of Norwegian-Iraqi infants were exclusively breast-fed at 4 months of age. By 1 month of age, water had been introduced to 30 % of Norwegian-Somali and 26 % of Norwegian-Iraqi infants, and infant formula to 44 % and 34 %, respectively. Fifty-four per cent of Norwegian-Somali and 68 % of Norwegian-Iraqi infants had been introduced to solid or semi-solid foods at 4 months of age. Breast-feeding at 6 months of age was more common among Norwegian-Somali infants (79 %) compared with Norwegian-Iraqi infants (58 %; P=0·001). Multivariate analyses indicated no significant factors associated with exclusive breast-feeding at 3·5 months of age. Factors positively associated with breast-feeding at 6 months were country of origin (Somalia) and parity (>2). Breast-feeding initiation was common among Iraqi-born and Somali-born mothers, but the exclusive breast-feeding period was shorter than recommended in both groups. The study suggests that there is a need for new culture-specific approaches to support exclusive breast-feeding and complementary feeding practices among foreign-born mothers living in Norway.

  4. Iraqi nuclear weapons development program. Final report, October 1, 1992--September 30, 1993

    International Nuclear Information System (INIS)

    1993-01-01

    This is an abstract of the final report focusing on the collection, collation, analysis, and recording of information pertaining to Iraqi nuclear weapons development and on the long term monitoring of Iraq

  5. Investigating the Speech Act of Correction in Iraqi EFL Context

    Science.gov (United States)

    Darweesh, Abbas Deygan; Mehdi, Wafaa Sahib

    2016-01-01

    The present paper investigates the performance of the Iraqi students for the speech act of correction and how it is realized with status unequal. It attempts to achieve the following aims: (1) Setting out the felicity conditions for the speech act of correction in terms of Searle conditions; (2) Identifying the semantic formulas that realize the…

  6. Exploring Electronic Communication Modes Between Iraqi Faculty and Students of Pharmacy Schools Using the Technology Acceptance Model.

    Science.gov (United States)

    Al-Jumaili, Ali Azeez; Al-Rekabi, Mohammed D; Alsawad, Oday S; Allela, Omer Q B; Carnahan, Ryan; Saaed, Hiwa; Naqishbandi, Alaadin; Kadhim, Dheyaa J; Sorofman, Bernard

    2017-06-01

    Objective. To explore for the first time the extent to which Iraqi pharmacy students and faculty use Facebook and university email for academic communications, and to examine factors influencing utilization within the framework of the Technology Acceptance Model (TAM). Methods. An electronic survey was administered to convenience samples of students and faculty of six Iraqi public schools and colleges of pharmacy in 2015. Results. Responses included 489 student and 128 faculty usable surveys. Both students and faculty use Facebook more than university email for academic communications. Less than a third of the faculty used university email. Students used Facebook for academic purposes twice as much as faculty. Conclusion. Absence of university email in Iraqi schools and colleges of pharmacy makes Facebook essential for faculty-student communications. The majority (71.1% to 82%) of respondents perceived that Facebook was easy to use. Three TAM variables (intention to use, attitude toward use and perceived usefulness) had significant positive associations with actual use of both Facebook messaging and university email.

  7. Message from Mr. R.A. Al-Kital, Commissioner of the Iraqi Atomic Energy Commission, received by the Director General on 23 October 1985

    International Nuclear Information System (INIS)

    1985-10-01

    The document reproduces the message from Mr. R.A. Al-Kital, Commissioner of the Iraqi Atomic Energy Commission received by the Director General of the IAEA on 23 October 1985 related to the Israeli attack against the Iraqi nuclear installations

  8. Beauty is in the Eye of the Beholder: A Tale of Strategic Context and Operational Art in Iraq, 2004-2008

    Science.gov (United States)

    2012-05-17

    hoping for chocolate ; the women dressed head to toe in black robes stared rigidly at the ground; the old men nodded with hard, empty eyes; and the...heading into 2008.51 The “ mood in Washington had shifted” in their favor and the “clocks in Baghdad and Washington” appeared closer to being in sync...protection forces are performing a wide variety of security missions.” 16 toward enhancing the Iraqi army and police forces.59 On January 30

  9. Legitimacy and Force in International Security : A Regionalist Approach on Multilateralism and the Role of Legitimacy in the Modern World

    OpenAIRE

    Arnesen, Ketil Vike

    2008-01-01

    This thesis will address the issue of legitimacy within international security, with a focus on the use of force by states. Using military force against other actors in the international system will initiate a debate on its perceived legitimacy by several different audiences. This investigation uses the Regional Security Complex Theory of Buzan and Wæver and the assumptions of Idealism to instigate the analytical framework on legitimacy. This thesis will analyse the role and importance of le...

  10. Neuropsychiatric disorders among Syrian and Iraqi refugees in Jordan: a retrospective cohort study 2012-2013.

    Science.gov (United States)

    McKenzie, Erica D; Spiegel, Paul; Khalifa, Adam; Mateen, Farrah J

    2015-01-01

    The burden of neuropsychiatric disorders in refugees is likely high, but little has been reported on the neuropsychiatric disorders that affect Syrian and Iraqi refugees in a country of first asylum. This analysis aimed to study the cost and burden of neuropsychiatric disorders among refugees from Syria and Iraq requiring exceptional, United Nations-funded care in a country of first asylum. The United Nations High Commissioner for Refugees works with multi-disciplinary, in-country exceptional care committees to review refugees' applications for emergency or exceptional medical care. Neuropsychiatric diagnoses among refugee applicants were identified through a retrospective review of applications to the Jordanian Exceptional Care Committee (2012-2013). Diagnoses were made using International Classification of Disease-10(th) edition codes rendered by treating physicians. Neuropsychiatric applications accounted for 11% (264/2526) of all Exceptional Care Committee applications, representing 223 refugees (40% female; median age 35 years; 57% Syrian, 36% Iraqi, 7% other countries of origin). Two-thirds of neuropsychiatric cases were for emergency care. The total amount requested for neuropsychiatric disorders was 925,674 USD. Syrian refugees were significantly more likely to request neurotrauma care than Iraqis (18/128 vs. 3/80, p = 0.03). The most expensive care per person was for brain tumor (7,905 USD), multiple sclerosis (7,502 USD), and nervous system trauma (6,466 USD), although stroke was the most frequent diagnosis. Schizophrenia was the most costly and frequent diagnosis among the psychiatric disorders (2,269 USD per person, 27,226 USD total). Neuropsychiatric disorders, including those traditionally considered outside the purview of refugee health, are an important burden to health among Iraqi and Syrian refugees. Possible interventions could include stroke risk factor reduction and targeted medication donations for multiple sclerosis, epilepsy, and

  11. Three Secondary School Teachers Implementing Student-Centred Learning in Iraqi Kurdistan

    Science.gov (United States)

    Burner, Tony; Madsen, Janne; Zako, Nadia; Ismail, Adham

    2017-01-01

    In Iraqi Kurdistan, the educational system is going through significant changes. The educational system influences the students' attitudes, and one wants the educational system to support the young democracy. In this study, student-centred learning (SCL) is seen as a first step to learning, but also to participation and engagement as a citizen.…

  12. Food and Nutrient Intake among 12-Month-Old Norwegian-Somali and Norwegian-Iraqi Infants.

    Science.gov (United States)

    Grewal, Navnit Kaur; Andersen, Lene Frost; Kolve, Cathrine Solheim; Kverndalen, Ingrid; Torheim, Liv Elin

    2016-09-28

    The aim of the present paper was to describe food and nutrient intake among 12-month-old Norwegian-Somali and Norwegian-Iraqi infants, with a focus on iron and vitamin D intake. A cross-sectional survey was conducted from August 2013 through September 2014. Eighty-nine mothers/infants of Somali origin and 77 mothers/infants of Iraqi origin residing in Eastern Norway participated in the study. Data were collected using two 24-h multiple-pass recalls. Forty percent of the Norwegian-Somali infants and 47% of the Norwegian-Iraqi infants were breastfed at 12 months of age ( p = 0.414). Median energy percentages (E%) from protein, fat and carbohydrates were within the recommended intake ranges, except the level of saturated fats (12-13 E%). Median intakes of almost all micronutrients were above the recommended daily intakes. Most of the infants consumed iron-enriched products (81%) and received vitamin D supplements (84%). The median intakes of iron and vitamin D were significantly higher among infants receiving iron-enriched products and vitamin D supplements compared to infants not receiving such products ( p food and nutrient intake of this group of infants in general seems to be in accordance with Norwegian dietary recommendations. Foods rich in iron and vitamin D supplements were important sources of the infants' intake of iron and vitamin D and should continue to be promoted.

  13. Developing Accounting Information System Course Content for Iraqi Higher Education Institution: An Instrument Design

    Directory of Open Access Journals (Sweden)

    Naseem Yousif Hanna Lallo

    2013-07-01

    Full Text Available In ensuring that competent graduates are produced in the universities, the course used embedding knowledge in the students, mindsets needs to be effective. However, the unusual circumstances that happened in Iraq were affected on a universities course. The revolution in information technology (IT affects most of our activations. As a result, it is important to consider the impact of IT on accounting careers. Developing accenting information system course content can generate an accountant who is armed with the knowledge and skills before entering accounting job. Also the development process required instructors have characteristics that make the integrating process of IT knowledge components in AIS course content more smoothly. Iraq is the country facing many difficulties that makes its higher education institutions (HEIs suffered from un updated learning environment and technological backwardness. This causes a low level of accounting graduates’ knowledge and in turn leads to led to consider the Iraqi accountant incapable of working with international organizations and companies or conducting was it professionally. The aim of this paper is to explain the role of IT knowledge elements in developing AIS course content in Iraqi HEIs with considering the moderate effect of the instructors’ characteristics. Furthermore, this paper discusses the development and validation of the quantitative instrument (questionnaire for IT knowledge elements in Iraqi HEIs. Moreover, the reliability of the constructs is also discussed.

  14. Chronic disease and disability among Iraqi populations displaced in Jordan and Syria.

    Science.gov (United States)

    Doocy, Shannon; Sirois, Adam; Tileva, Margarita; Storey, J Douglas; Burnham, Gilbert

    2013-01-01

    The Iraq conflict resulted in the largest displacement in the Middle East since the Palestinian crisis, and provision of health services to the displaced population presents a critical challenge. The study aimed to provide information on chronic medical conditions and disability to inform humanitarian assistance planning. Nationally representative cross-sectional surveys of Iraqi populations displaced in Jordan and Syria were conducted in late 2008 and early 2009. Clusters of 10 household were randomly selected using probability-based sampling; a total of 1200 and 813 Iraqi households in Jordan and Syria, respectively, were interviewed. The majority of respondents in both countries perceived healthcare as unaffordable but accessible; cost was an important barrier to care. In Jordan, most routine health expenditures were for medications where in Syria, expenses were divided between medical consultations and medication. Chronic disease prevalence among adults was 51.5% (confidence interval (CI): 49.4-53.5) in Syria and 41.0% (CI: 39.4-42.7) in Jordan, most common were hypertension and musculoskeletal problems. Overall disability rates were 7.1% (CI: 6.3-8.0) in Syria and 3.4% (CI: 3.0-3.9) in Jordan. In both countries, the majority of disability was attributed to conflict, prevalence was higher in men than women, and depression was the leading cause of mental health disability. Chronic illnesses, disabilities and psychological health are key challenges for the Iraqi population and the health systems in Jordan and Syria. Continued attention to the development of systems to manage conditions that require secondary and tertiary care is essential, particularly given reported difficulties in accessing care and the anticipated prolonged displacement. Copyright © 2012 John Wiley & Sons, Ltd.

  15. Organizing to Understand: How to Operate Effectively in the Human Domain

    Science.gov (United States)

    2015-05-21

    was both entering and creating when it overthrew Saddam Hussein and dismantled the Iraqi government and security forces. The research examines the...sponsored initiative to help tactical and operational level commanders understand the human terrain, the “social, ethnographic , cultural, economic, and...as an intelligence function within TRADOC “as the primary and enduring social science-based human domain research , analysis, and training capability

  16. National E-Learning Strategy to Enhance and Enrich the Iraqi Universities

    Science.gov (United States)

    Elameer, Amer Saleem; Idrus, Rozhan M.

    2011-01-01

    Nowadays, the HE (higher education) sector of Iraq has suffered severe disruption and mass destruction due to the war and, in general, only 10% of its remaining operational sectors are in the acceptable conditions. This research is an attempt to plan a PS (proposed strategy) for the Iraqi HE sector that can be executed easily in Iraq as a part of…

  17. "Seeing the Life": Redefining self-worth and family roles among Iraqi refugee families resettled in the United States.

    Science.gov (United States)

    Nelson, Matthew; Hess, Julia Meredith; Isakson, Brian; Goodkind, Jessica

    2016-08-01

    Social and geographic displacement is a global phenomenon that precipitates novel stressors and disruptions that intersect with longstanding familial and social roles. Among the displaced are war-torn Iraqi refugee families, who must address these new obstacles in unconventional ways. This study explores how such disruptions have influenced associations between gender and apparent self-worth experienced by Iraqi refugee families upon relocation to the United States. Further, the psychosocial mechanisms requisite of any novel approach to a new social construct are explored and reveal that production in the family is at the core of instability and shifting power dynamics during resettlement, preventing family members from "seeing the life" in the United States that they had envisioned prior to immigration. Over 200 semi-structured qualitative interviews with Iraqi participants and mental health providers were conducted over the course of the study, and demonstrate a plasticity among social roles in the family and community that transcends the notion of a simple role reversal, and illustrate the complex positionalities that families under stress must approximate during such physical and social displacement.

  18. Female genital mutilation in Iraqi Kurdistan: description and associated factors.

    Science.gov (United States)

    Saleem, Rozhgar A; Othman, Nasih; Fattah, Fattah H; Hazim, Luma; Adnan, Berivan

    2013-01-01

    The high prevalence of female genital mutilation has been a concern in Iraqi Kurdistan. This study was undertaken to estimate its prevalence and describe factors associated with its occurrence. A cross-sectional survey was undertaken from March to April 2011 of females aged up to 20 years using interviews and clinical examination. The survey included 1,508 participants with mean age of 13.5 years (SD 5.6). Overall female genital mutilation prevalence was 23%, and the mean age at which it had been performed was 4.6 years (SD 2.4). Type I (partial or total removal of the clitoris) comprised 76% of those who had had female genital mutilation; in 79% of cases the decision to perform it was made by the mother; and in 54% of cases it was performed by traditional birth attendants/midwives. Women aged 16 years and over were more likely to have had female genital mutilation compared to children aged below 6 years (OR 11.9, p Kurdistan region were more likely to have been circumcised. The study results show that female genital mutilation is a frequent practice in Iraqi Kurdistan. Attention and intervention is needed to address this aspect of the well-being of girls and women.

  19. From Serpent to CEO: Improving First-Term Security Forces Airman Performance Through Neuroscience Education

    Science.gov (United States)

    2017-06-09

    support procedures and decision - making processes. Creating awareness that limitations are present creates a natural motivation to want to reduce...law enforcement decision - making ? What cultural norms within Security Forces should be challenged to improve responses of young adults faced with...enforcement and combat decision - making processes is available. However, it is not uncommon for laboratory discoveries to enter clinical practice, not to

  20. Reproductive and Productive Performance of Iraqi Buffaloes as Influenced by Pre-Mating and Pre-Calving Concentrate Supplementation

    Directory of Open Access Journals (Sweden)

    Talal Anwer Abdulkareem*, Sawsan Ali Al-Sharifi, Sajeda Mahdi Eidan and R.G. Sasser1

    2012-06-01

    Full Text Available The objective of the present study was to investigate the influence of pre-mating and pre-calving concentrate supplementation of Iraqi buffaloes on some of the reproductive (estrus, mating, pregnancy and calving rates and productive (daily milk yield and calves birth weight traits. This study was carried out in 4 Iraqi South-central governorates using 596 pre-mating and 628 pregnant buffaloes (during the last two months of gestation. Pre-mating buffaloes were divided randomly into 496 concentrate-supplemented buffaloes (Flushing and 100 control ones. Additionally, pregnant buffaloes were also divided into 528 concentrate- supplemented buffaloes (Steaming up and 100 controls. Each buffalo within the flushing and steaming up groups were fed daily on 7 Kg of concentrate diet (13% crude protein and 1.70 Mcal of net energy for 60 days. The control buffaloes were nourished only on low-quality roughages of the area and wheat bran. Higher estrus (+15%, P<0.01, pregnancy (+23.8%, P<0.05 and calving rates (+30.8%, P<0.01 were observed in concentrate-supplemented buffaloes as compared with controls. An obvious increase in (P<0.05 calving rate (+14.7%, daily milk yield (+44.8% and calf birth weight (+25.6% were noted in steaming up buffaloes in comparison with control buffaloes. Results indicated that improvement in feeding schedule of Iraqi buffaloes during pre-mating and late gestation periods enhanced the reproductive performance and increased milk production of subsequent lactation and calf birth weight. These improvements increased owner income ($174=209,000 Iraqi dinar /buffalo from the sale of meat and milk.

  1. Epstein-Barr virus and breast cancer: Epidemiological and Molecular study on Egyptian and Iraqi women

    International Nuclear Information System (INIS)

    Zekri, A.N.; Mohamed, W.S.; Hafez, M.M.; Hassan, Z.K.; Bahnassy, A.A.; El-Kassem, F.A.; El-Khalidi, S.J.

    2012-01-01

    Background and purpose: The role of Epstein-Barr virus (EBV) in breast carcinogenesis is still controversial. Unraveling this relationship is potentially important for better understanding of breast cancer etiology, early detection and possibly prevention of breast cancer. The aim of the current study is to unravel the association between EBV and primary invasive breast cancer (PIBC) in two different Arab populations (Egyptian and Iraqi women). Patients and Methods: The study was done on paraffin-embedded tissues of 40 Egyptian and 50 Iraqi patients with PIBC in addition to 20 normal breast tissues as controls for each group. Both controls and neoplastic tissues were assessed for the expression of EBV genes and proteins (EBNA-1, LMP-1, and EBER) as well as CD21 marker by immunohistochemistry (IHC), in situ hybridization (ISH) and PCR techniques. Results: Our gold standard for EBV reactivity in breast cancer cases was positivity of both EBNA1 by PCR and EBER by in situ hybridization. EBV was detected in 18/40 (45%) and 14/50 (28%) of Egyptian and Iraqi women; respectively where p = 0.073, compared to 0/20 (0%) of their control groups (p < 0.05). Regarding the association between EBV positivity and tumor grade, there was not any statistical significant difference between EBV presence and tumor grade in both populations

  2. [Occupational risks among public safety and security forces].

    Science.gov (United States)

    Candura, S M; Verni, P; Minelli, C M; Rosso, G L; Cappelli, M I; Strambi, S; Martellosio, V

    2006-01-01

    The present paper tries to identify the occupational risk factors (physical, chemical, biological, psychological), variable depending on jobs and tasks, to which the heterogeneous public safety/security workers are exposed. The fight against criminality and public order maintenance imply (sometimes fatal) traumatic risks, and expose to psychophysical and sensorial tiring, unfavourable macro- and microclimatic conditions, the risk of baropathy (air navigation, underwater activities), noise (generated by firearms and several other sources), vibrations and shakings (automatic weapons, transport vehicles), the risk of electric injury, ionizing (X and gamma rays) and non-inonizing (ultraviolet rays, microwaves and radiofrequencies, electromagnetic fields) radiations. Chemical hazards include carbon monoxide and other combustion products (fires, urban traffic), substances released in chemical accidents, tear gases, lead (firing grounds, metal works, environmental pollution), solvents, lubrificants and cutting oils (mechanic repair and maintenance), laboratory materials and reagents, irritant and/or sensitizing agents contained in gloves. The main biological risks are tetanus, blood-borne diseases (viral hepatitis, AIDS), aerogenous diseases (e.g., tuberculosis, Legionnaire's disease, epidemic cerebrospinal meningitis), dog- or horse-transmitted zoonosis. Finally, emotional, psychosomatic and behavioural stress-related disorders (e.g., burn-out syndrome, post-traumatic stress disorder) are typically frequent. The presence of numerous and diversified hazards among public safety/security forces imposes the adoption of occupational medicine measures, including risk assessment, health education, technical and environmental prevention, personal protective devices, sanitary surveillance and biological monitoring, clinical interventions (diagnosis, therapy and rehabilitation of occupational accidents and illnesses), prompt medico-legal evaluation of occupational

  3. 48 CFR 252.225-7022 - Trade agreements certificate-inclusion of Iraqi end products.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Trade agreements... PROVISIONS AND CONTRACT CLAUSES Text of Provisions And Clauses 252.225-7022 Trade agreements certificate—inclusion of Iraqi end products. As prescribed in 225.1101(7), use the following provision: Trade Agreements...

  4. THE GODFATHER DOCTRINE SECURITY FORCE ASSISTANCE (SFA) TRAINING - AN OFFER THE MARINE CORPS CAN’T REFUSE

    Science.gov (United States)

    2016-02-16

    experience training military advisors suggests that the commander’s exposure to military advising has a direct affect on who is nominated to advise... Advisor : CAPT Patrick J McCormick, USN 16 February 2016 DISTRIBUTION A. Approved for public release: distribution unlimited. 2 DISCLAIMER The...SFA AT) leader / senior advisor . He advised an Iraqi National Police (INP) Port of Entry Director near the Iraq / Syria Border and Afghan

  5. Independent Auditors Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund

    Science.gov (United States)

    2015-07-31

    Independent Auditor’s Report on the Examination of DoD Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces...Execution of Afghanistan National Army Trust Fund Donations to the Afghanistan Security Forces Fund (Report No. DODIG-2015-154) We are providing this...046, “Independent Auditor’s Report on the Examination of DoD Execution of North Atlantic Treaty Organization Contributing Countries’ Donations to

  6. Demonstration of Security Benefits of Renewable Generation at FE Warren Air Force Base

    International Nuclear Information System (INIS)

    Warwick, William M.; Myers, Kurt; Seifert, Gary

    2010-01-01

    Report detailing field demonstration of security benefits of renewable generation at FE Warren Air Force Base. The 2006 National Defense Appropriations Act directed the Department of Defense (DOD) to coordinate the testing of a wind turbine (new to the U.S. market) at an Air Force installation as a follow on to analyses conducted by the Pacific Northwest National Laborabory (PNNL) as part of the 2005 DOD Renewable Assessment. The earlier study simulated the performance of renewable power produced from wind turbines, solar photovoltaics and geothermal energy as part of a Base-wide energy security solution. The simulation concluded that integration of renewable generating resources with emergency generators, typically diesel-fired, could significantly enhance energy security and extend power supplies during prolonged commercial grid power outages. A simulation is insufficient to convince skeptics of the reliability of renewable resources, especially those that produce power only intermittently, like wind and solar. Therefore, Congress requested a field demonstration be performed using a wind turbine because wind power is the most erratic of all renewable resources. Following this direction, the Air Force identified a site for the wind turbine demonstration and contracted with the Idaho National Laboratory (INL) and PNNL to conduct the demonstration and implement other provisions in the appropriation bill. INL identified a wind turbine that met the legislative requirements (the Gamesa G-80), and with the support of PNNL and the Air Force, selected FE Warren Air Force Base for the demonstration. FE Warren has an excellent wind resource and was already a host to two wind turbines and could accommodate a third. The G-80 is rated at 2 MWs versus the two existing 660 kW turbines, consequently wind production would more than double. Procurement, siting, and acceptance testing of the new turbine was completed in early 2010. The field test was conducted in late April 2010

  7. Pre- and Post-displacement Stressors and Body Weight Development in Iraqi Refugees in Michigan.

    Science.gov (United States)

    Jen, K-L Catherine; Zhou, Kequan; Arnetz, Bengt; Jamil, Hikmet

    2015-10-01

    Refugees have typically experienced stress and trauma before entering the US. Stressors and mental health disorders may contribute to obesity. The aim of this study was to investigate changes in the body mass index (BMI) in Iraqi refugees settled in Michigan in relationship to pre- and post-migration stressors and mental health. Anthropometric and demographic data were collected from 290 Iraqi refugees immediately after they arrived in Michigan and one year after settlement. Significant increases were observed in BMI (+0.46 ± 0.09 kg/m(2), p refugees suffering from hypertension (from 9.6 to 13.1%, p migration trauma and social support, were also observed. Linear regression analyses failed to link stressors, well-being, and mental health to changes in BMI. It is likely that acculturation to a new lifestyle, including dietary patterns and physical activity levels, may have contributed to these changes.

  8. The Military Dimension of the Niger Delta Crisis: Increasing the Effectiveness of Security Forces Through Information Operations

    Science.gov (United States)

    2010-06-11

    and over 250 ethnic groups, Nigeria is a mix of cultures , languages and interests. Nigeria got its name from the River Niger, the major river in the...largely Muslim Hausa/Fulani northern protectorate and the predominantly Christian Yoruba and Igbo southern protectorate (Gascoigne 2001). Nigeria gained...keen understanding of what he referred to as the demographic battlespace as well as ―the cultural intricacies that drive the Iraqi population‖ is

  9. History Education in Schools in Iraqi Kurdistan: Representing Values of Peace and Violence

    Science.gov (United States)

    Darweish, Marwan; Mohammed, Maamoon Abdulsamad

    2018-01-01

    The Kurdistan Regional Government has implemented a wide range of reforms in Iraqi Kurdistan's education system since its establishment in 2003. This qualitative study utilises critical discourse analysis to investigate the content of History Education (HE) textbooks (grades five to eight) and to assess how far peace education values and…

  10. “Seeing the Life”: Redefining self-worth and family roles among Iraqi refugee families resettled in the United States

    Science.gov (United States)

    Nelson, Matthew; Hess, Julia Meredith; Isakson, Brian; Goodkind, Jessica

    2017-01-01

    Social and geographic displacement is a global phenomenon that precipitates novel stressors and disruptions that intersect with longstanding familial and social roles. Among the displaced are war-torn Iraqi refugee families, who must address these new obstacles in unconventional ways. This study explores how such disruptions have influenced associations between gender and apparent self-worth experienced by Iraqi refugee families upon relocation to the United States. Further, the psychosocial mechanisms requisite of any novel approach to a new social construct are explored and reveal that production in the family is at the core of instability and shifting power dynamics during resettlement, preventing family members from “seeing the life” in the United States that they had envisioned prior to immigration. Over 200 semi-structured qualitative interviews with Iraqi participants and mental health providers were conducted over the course of the study, and demonstrate a plasticity among social roles in the family and community that transcends the notion of a simple role reversal, and illustrate the complex positionalities that families under stress must approximate during such physical and social displacement. PMID:28966556

  11. Perception of molar-incisor hypomineralisation (MIH) by Iraqi dental academics.

    Science.gov (United States)

    Ghanim, Aghareed; Morgan, Michael; Mariño, Rodrigo; Manton, David; Bailey, Denise

    2011-07-01

    The understanding and detection of molar-incisor hypomineralisation (MIH) is linked to its recognition by clinicians. No study has investigated dental clinicians' level of perception regarding MIH in the Middle East region including Iraq. To determine the perception of Iraqi academic clinicians about MIH prevalence, severity and aetiological factors. A questionnaire, based on previous European and Australian/New Zealand studies was administered to the academic dental staff of Mosul University. A response rate of 77.7% was reported. General dental practitioners represented 30.8% of the total respondents, whilst 65.1% were dentists with post-graduate qualification. The majority of the respondents (81.2%) encountered MIH in their clinical activities and 37.3% of them identified that the prevalence appeared to have increased in recent years. Fewer than half of the respondents observed MIH affected teeth on a monthly basis. The condition was less commonly seen in primary second molars than the first permanent molars. A variation in views was recorded about MIH specific aetiological factor/s. Respondents advocated the need for clinical training regarding MIH-aetiological and therapeutic fields. Molar-incisor hypomineralisation is a condition commonly diagnosed by Iraqi dental academics. No apparent consensus existed between the general and specialist dentists regarding the anticipated prevalence, severity and aetiology of this condition. © 2011 The Authors. International Journal of Paediatric Dentistry © 2011 BSPD, IAPD and Blackwell Publishing Ltd.

  12. E-government factors to reduce administrative and finance corruption in Arab countries: Case study Iraqi oil sector

    Science.gov (United States)

    Mohammed, M. A.; Eman, Y.; Hussein, A. H.; Hasson, A. R.

    2015-12-01

    Arab countries face the corruption issues in its several public organizations. The corruption in these countries is considered as the main challenge. The oil sector is one of the public sectors that have huge level of corruption. However, the Iraqi economy had become dependable on oil sector daring the last three decades, and on the contrary, of what other oil countries did. The capital is considered as one of the essential factor for economic development. The revenues of oil exports will stay the essential source for economic development in Iraq in the future in order to reduce being dependable on oil. Since the beginning of the 3rd thousands, the world witnessed great rise in the demand on oil, but the Iraqi exports of crude oil come to be less than its similarities in the seventeenths of last century. So our oil sector is still in need of deep study. This study focuses on technological technique that can make huge decrease for corruption in oil sector in Iraq. However, e-government is considered as the best techniques that can decrease the corruption. Thus, this study bases on challenges that effect on build successful e-government project in Iraqi oil industry.

  13. Measuring Stability and Security in Iraq

    Science.gov (United States)

    2008-03-01

    detention system. Overcoming corruption and criminal influence within the judicial and vi March 7, 2008 prison systems and maintaining...on the Rule of Law and Detention, support the Baghdad Operations Command (BOC) and its targeting cell, build Iraqi prison staff and capacity and...Other Inma successes are: over 20 Iraqi agribusi- nesses modernized and operating efficiently with sales revenue up by 150%, perennial horticulture

  14. Medical conditions among Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System

    Science.gov (United States)

    Carone, Marco; Al-Saedy, Huda; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Black, Robert E

    2012-01-01

    Abstract Objective To determine the range and burden of health services utilization among Iraqi refugees receiving health assistance in Jordan, a country of first asylum. Methods Medical conditions, diagnosed in accordance with the tenth revision of the International classification of diseases, were actively monitored from 1January to 31December 2010 using a pilot centralized database in Jordan called the Refugee Assistance Information System. Findings There were 27 166 medical visits by 7642 Iraqi refugees (mean age: 37.4 years; 49% male; 70% from Baghdad; 6% disabled; 3% with a history of torture). Chronic diseases were common, including essential hypertension (22% of refugees), visual disturbances (12%), joint disorders (11%) and type II diabetes mellitus (11%). The most common reasons for seeking acute care were upper respiratory tract infection (11%), supervision of normal pregnancy (4%) and urinary disorders (3%). The conditions requiring the highest number of visits per refugee were cerebrovascular disease (1.46 visits), senile cataract (1.46) and glaucoma (1.44). Sponsored care included 31 747 referrals or consultations to a specialty service, 18 432 drug dispensations, 2307 laboratory studies and 1090 X-rays. The specialties most commonly required were ophthalmology, dentistry, gynaecology and orthopaedic surgery. Conclusion Iraqi refugees in countries of first asylum and resettlement require targeted health services, health education and sustainable prevention and control strategies for predominantly chronic diseases. PMID:22690034

  15. Important considerations when providing mental health first aid to Iraqi refugees in Australia: a Delphi study.

    Science.gov (United States)

    Uribe Guajardo, Maria Gabriela; Slewa-Younan, Shameran; Santalucia, Yvonne; Jorm, Anthony Francis

    2016-01-01

    Refugees are one of the most vulnerable groups in Australian society, presenting high levels of exposure to traumatic events and consequently high levels of severe psychological distress. While there is a need for professional help, only a small percentage will receive appropriate care for their mental health concerns. This study aimed to determine cultural considerations required when providing mental health first aid to Iraqi refugees experiencing mental health problems or crises. Using a Delphi method, 16 experts were presented with statements about possible culturally-appropriate first aid actions via questionnaires and were encouraged to suggest additional actions not covered by the questionnaire content. Statements were accepted for inclusion in a guideline if they were endorsed by ≥90 % of panellists as 'Essential' or 'Important'. From a total of 65 statements, 38 were endorsed (17 for cultural awareness, 12 for cross-cultural communication, 7 for stigma associated with mental health problems, and 2 for barriers to seeking professional help). Experts were able to reach consensus about how to provide culturally-appropriate first aid for mental health problems to Iraqi refugees, demonstrating the suitability of this methodology in developing cultural considerations guidelines. This specific refugee study provided potentially valuable cultural knowledge required to better equip members of the Australian public on how to respond to and assist Iraqi refugees experiencing mental health problems or crises.

  16. Medical conditions among Iraqi refugees in Jordan: data from the United Nations Refugee Assistance Information System.

    Science.gov (United States)

    Mateen, Farrah J; Carone, Marco; Al-Saedy, Huda; Nyce, Sayre; Ghosn, Jad; Mutuerandu, Timothy; Black, Robert E

    2012-06-01

    To determine the range and burden of health services utilization among Iraqi refugees receiving health assistance in Jordan, a country of first asylum. Medical conditions, diagnosed in accordance with the tenth revision of the International classification of diseases, were actively monitored from 1 January to 31 December 2010 using a pilot centralized database in Jordan called the Refugee Assistance Information System. There were 27 166 medical visits by 7642 Iraqi refugees (mean age: 37.4 years; 49% male; 70% from Baghdad; 6% disabled; 3% with a history of torture). Chronic diseases were common, including essential hypertension (22% of refugees), visual disturbances (12%), joint disorders (11%) and type II diabetes mellitus (11%). The most common reasons for seeking acute care were upper respiratory tract infection (11%), supervision of normal pregnancy (4%) and urinary disorders (3%). The conditions requiring the highest number of visits per refugee were cerebrovascular disease (1.46 visits), senile cataract (1.46) and glaucoma (1.44). Sponsored care included 31 747 referrals or consultations to a specialty service, 18 432 drug dispensations, 2307 laboratory studies and 1090 X-rays. The specialties most commonly required were ophthalmology, dentistry, gynaecology and orthopaedic surgery. Iraqi refugees in countries of first asylum and resettlement require targeted health services, health education and sustainable prevention and control strategies for predominantly chronic diseases.

  17. The Stalled Recovery of the Iraqi Marshes

    Directory of Open Access Journals (Sweden)

    Richard H. Becker

    2014-01-01

    Full Text Available The Iraqi (Mesopotamian Marshes, an extensive wetlands system in Iraq, has been heavily impacted by both human and climate forces over the past decades. In the period leading up to the Second Gulf War in 2002, the marshlands were shrinking due to both a policy of draining and water diversion in Iraq and construction of dams upstream on the Tigris and Euphrates rivers. Following the war through 2006, this trend was reversed as the diversions were removed and active draining stopped. A combination of MODIS and GRACE datasets were used to determine the change in surface water area (SWA in the marshes, marshland extent and change in mass both upriver in the Tigris and Euphrates watersheds and in the marshlands. Results suggest that the post war dam removal and decreased pumping in 2003 provided only temporary respite for the marshlands (2003–2006 SWA: 1,477 km2 increase (600%, water equivalent depth (WED: +2.0 cm/yr.; 2006–2009: −860 km2 (−41% WED: −3.9 cm/yr.. Unlike in the period 2003–2006, from 2006 forward the mass variations in the marshes are highly correlated with those in the upper and middle watershed (R = 0.86 and 0.92 respectively, suggesting that any recovery due to that removal is complete, and that all future changes are tied more strongly to any climate changes that will affect recharge in the upper Tigris-Euphrates system. Precipitation changes in the watershed show a reduction of an average of 15% below the 15 yr mean in 2007–2011 This corresponds with published ensemble predictions for the 2071–2099 time period, that suggested similar marshland shrinkage should be expected in that time period.

  18. Jesuit Contributions to the Iraqi Education System in the 1930s and Later

    Science.gov (United States)

    Girling, Kristian

    2016-01-01

    This article will consider the significant role which the Society of Jesus had played in the Iraqi secondary and higher education systems in the period 1932-1968. The Jesuits' Baghdad-based school and university formed a part of the substantial Jesuit educational network established across the Middle East from the nineteenth century and this…

  19. Measuring Stability and Security in Iraq

    Science.gov (United States)

    2008-09-01

    The Office of the Transportation Attaché (OTA) is helping the Iraqi Ministry of Construction and Housing ( MoCH ) promote economic prosperity...through expansion of highway transport to strengthen Iraq’s links to the global economy and to provide mobility to Iraqi citizens. The MoCH and the OTA...work closely in setting national transport priorities, defining where the MoCH must focus in the short term, and identifying specific strategic

  20. Iraqi health system in kurdistan region: medical professionals' perspectives on challenges and priorities for improvement.

    Science.gov (United States)

    Shabila, Nazar P; Al-Tawil, Namir G; Tahir, Rebaz; Shwani, Falah H; Saleh, Abubakir M; Al-Hadithi, Tariq S

    2010-11-30

    The views of medical professionals on efficiency of health system and needs for any changes are very critical and constitute a cornerstone for any health system improvement. This is particularly relevant to Iraqi Kurdistan case as the events of the last few decades have significantly devastated the national Iraqi health system while the necessity for adopting a new health care system is increasingly recognized since 2004. This study aims to examine the regional health system in Iraqi Kurdistan from medical professionals' perspectives and try to define its problems and priorities for improvement. A survey questionnaire was developed and administered to a convenience sample of 250 medical professionals in Erbil governorate. The questionnaire included four items; rating of the quality of services and availability of resources in the health institutions, view on different aspects of the health system, the perceived priority needs for health system improvement and gender and professional characteristics of the respondents. The response rate to the survey was 83.6%. A high proportion of respondents rated the different aspects of services and resources in the health institutions as weak or very weak including the availability of the required quantity and quality of medicines (68.7%), the availability of sufficient medical equipment and investigation tools (68.7%), and the quality of offered services (65.3%). Around 72% of respondents had a rather negative view on the overall health system. The weak role of medical research, the weak role of professional associations in controlling the system and the inefficient health education were identified as important problems in the current health system (87.9%, 87.1% and 84.9%, respectively). The priority needs of health system improvement included adoption of social insurance for medical care of the poor (82%), enhancing the role of family medicine (77.2%), adopting health insurance system (76.1%) and periodic scientific

  1. 32 CFR 632.4 - Deadly force.

    Science.gov (United States)

    2010-07-01

    ..., is substantially important to national security. (See paragraph (b) of this section.) (iii) Escape of... security or an essential national defense mission. (2) Substantially important to national security based... INVESTIGATIONS USE OF FORCE BY PERSONNEL ENGAGED IN LAW ENFORCEMENT AND SECURITY DUTIES § 632.4 Deadly force. (a...

  2. Effect of gamma irradiation on sugars from Iraqi dates

    Energy Technology Data Exchange (ETDEWEB)

    Jaddou, H; Al-Hakim, M; Mhaisen, M D [Iraq Atomic Energy Commission, Baghdad. Nuclear Research Inst.

    1981-01-01

    The possibility of using gamma-irradiation for date preservation had been considered as an alternative method to fumigation. Two varieties of Iraqi dates (Zahdi and Sayer) had been used in the study, and three doses of 50, 100 and 150 krads. A combination of treatments of heat plus irradiation were also applied and tests were conducted at three maturation stages. Gas chromatographic analysis was used to fractionate sugars from dates after converting to their TMS - ether derivatives. No qualitative or quantitative changes were observed in sugar components in either Zahdi or Sayer dates within the doses used in the experiments.

  3. Role of U.S. Security Assistance in Modernizing the Portuguese Armed Forces: A Historical Analysis.

    Science.gov (United States)

    1986-09-01

    Portuguese Air Force Fiscal Year 1986 IMET/FMS Training Program Security Assistance Management Manual * "Portuguese Navy: A Naval Fleet that is...of the techniques of fiscal management and, within the limits that he had set for the regime, his program of economic recovery succeeded .... What...1984). Currency: Escudo * Agriculture: generally developed; 8.8,% of GDP; main crops - grains, potatoes, olives, grapes (wine); deficit foods - sugar

  4. From El Billar to Operations Fenix and Jaque: The Colombian Security Force Experience, 1998-2008

    Science.gov (United States)

    2009-12-01

    577–601. ———. Sostenibilidad De La Seguridad Democratica. Bogotá: Fundadcion Seguridad & Democracia, 23 February 2005. Rempe, Dennis M...Security Force Experience, 1998–2008 Robert D. Ramsey III Occasional Paper 34 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting ...Services, Directorate for Information Operations and Reports , 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be

  5. The pilot and evaluation of a postnatal support Group for Iraqi Women in the year following the birth of their baby

    Directory of Open Access Journals (Sweden)

    Vanessa eGent

    2014-01-01

    Full Text Available The current study involved conducting a pilot test of a culturally sensitive support group program developed to assist Iraqi women in the year following the birth of their baby (CSSG-B in Perth, Western Australia. The aim of this study was to evaluate the social validity of the program. It was hypothesised that women involved in the program would find the program to be socially valid and culturally appropriate, and will also report lower levels of depressive symptomatology and higher levels of social support, following the group intervention. Participants were twelve Iraqi Arabic speaking women, who had a child less than 12 months of age. The program was based on Iraqi women's explanatory models (Kleinman, 1978; Di Ciano, Rooney, Wright, Hay, & Robinson, 2010 of the birth and motherhood experience. Social validity ratings were obtained during the implementation of the program in order to assess the level of acceptability of the intervention. A one-group pretest-posttest design was used to determine if depressive symptoms had decreased during the course of the intervention and social support had increased. Results indicated that Iraqi Arabic speaking women found the support group intervention acceptable and relevant and there was a significant decrease in scores on the Edinburgh Postnatal Depression scale from pretest to posttest. These results that the culturally sensitive group intervention was culturally acceptable and was associated with decreased levels of depressive symptomatology.

  6. Prevalence of dyslipidemia in the Iraqi adult population

    International Nuclear Information System (INIS)

    Mula-Abed, Waad-Allah S.; Chilmeran, Saba K.

    2007-01-01

    Objective was to establish the prevalence of dyslipidemia in the Iraqi adult population in Mosul, according to the different recommended criteria. The study was carried out from October 2003 to April 2004, with 871 apparently healthy volunteers (413 males, 458 females) aged 20-70 year ([mean+- SD] 41.2+-13.8 year). Fasting blood specimens were collected from all subjects for measurement of serum lipid profile including triglycerides (TG), total cholesterol (TC), high density lipoprotein-cholesterol (HDL-C), low density lipoprotein-cholesterol (LDL-C), and ratios of cholesterol such as TC:HDL-C, LDL-C:HDL-C, and TG:HDL-C. Classification was carried out according to the different cut-off levels as recommended by the 2001 American National Cholesterol Education Program (NCEP) III using thresholds of TG>150mg/dl (2.0 mmol/L), LDL-C>100 mg/dl (2.6 mmol/L), LDL-C 130mg/dl (3.37 mmol/L). The criteria of the 1998 British Hyperlipidemia Association (BHA) were also followed using thresholds of TG>180mg/dl (2.4mmol/L), TC>194mg/dl (5.0 mmol/L), LDL-C>116mg/dl (3.0mmol/L), HDL-C 5.0, HDL-C: DL-C>2.5 and TG: HDL-C>3.0. Based on the American NCEPIII criteria, the dyslipidemic states were noted with high TG (41.6%), high LDL-C (57.8%), low HDL-C (49.9%) and high HDL-C (57.8%), low HDL-C (49.9%) and high non-HDL-C (56.8%) from the subjects. Based on BHA criteria, high TG24.5%), high TC (32.7%), high HDL-C (37.8%), high TC: HDL-C (30.9%), high LDL-C HDL-C (55.7%) and high TG: HDL-C (58.3%) were noted. Dyslipidemia is common in Iraqi population, and this was identified at different recommendation criteria. (author)

  7. The Inspection Process of the Army Reset Program for Equipment for Units Returning from Operation Iraqi Freedom

    National Research Council Canada - National Science Library

    2008-01-01

    The subject of this report directly applies to the work of DoD civilian and military personnel responsible for the reset of equipment provided to the warfighter deployed in support of Operation Iraqi Freedom...

  8. Out of Crisis: Reflections of an Iraqi and an American on Advocacy for Andragogy

    Science.gov (United States)

    Bright, Larry K.; Mahdi, Ghada S.

    2010-01-01

    Mahdi is an Iraqi doctoral candidate in adult and higher education and Bright is her doctoral advisor. The two have been involved in intensive dialogue about how they see their cultures, how they perceive the conflict in the Middle East, and how andragogical theory offers hope for changing learning and teaching approaches that can influence…

  9. Closing the Security Gap: Building Irregular Security Forces

    Science.gov (United States)

    2012-06-08

    had mutinied against the British during the Second Sikh War. Lawrence had the Punjabi regiments disarmed and then demobilized. The British initially...contributed to the security problem.118 The British were primarily concerned with control of the Punjabi plains because its economic and agricultural...classes were allowed to carry arms. The British recruited the following tribes from within India: Rajput, Hindustani and Punjabi Brahman, Punjabi

  10. Malaysia’s Participation in a United Nations Standing Force: A Question of National Security

    Science.gov (United States)

    2002-05-31

    Armed Forces Defence College and during a key note address at the National Security Conference, Malaysian Defense Minister, Dato’ Najib Tun Razak ...Oxford: Oxford University Press, 1999), 197-198. 9Speech by Dato’ Sri Mohd Najib Tun Abdul Razak , “Regional Insecurity: Preparing For Low to High...Resolution 15, No.2, (1971) Dato’ Sri Mohd Najib Tun Razak . “Executive Interview.” Asian Defence Journal (October 2001): 14-16. General Tan Sri Dato

  11. The Socioemotional Development of Orphans in Orphanages and Traditional Foster Care in Iraqi Kurdistan.

    Science.gov (United States)

    Ahmad, Abdulbaghi; Mohamad, Kirmanj

    1996-01-01

    A one-year follow-up study of children who had lost both parents and were placed in orphanages (n=19) or foster homes (n=18) in Iraqi Kurdistan investigated the orphans' situation and development. The children in orphanages were found to have higher frequency of post-traumatic stress disorder than the foster care children. (Author/CR)

  12. Validation of Scales from the Deployment Risk and Resilience Inventory in a Sample of Operation Iraqi Freedom Veterans

    National Research Council Canada - National Science Library

    Vogt, D. S; Proctor, S. P; King, D. W; King, L. A; Vasterling, J. J

    2008-01-01

    .... Although initial evidence for the reliability and validity of DRRI scales based on Gulf War veteran samples is encouraging, evidence with respect to a more contemporary cohort of Operation Iraqi Freedom (OIF...

  13. Simulation of a force on force exercise

    International Nuclear Information System (INIS)

    Terhune, R.; Van Slyke, D.; Sheppard, T.; Brandrup, M.

    1988-01-01

    The Security Exercise Evaluation System (SEES) is under development for use in planning Force on Force exercises and as an aid in post-exercise evaluation. This study is part of the development cycle where the simulation results are compared to field data to provide guidance for further development of the model. SEES is an event-driven stochastic computer program simulating individual movement and combat within an urban terrain environment. The simulator models the physics of movement, line of sight, and weapon effects. It relies on the controllers to provide all knowledge of security tactics, which are entered by the controllers during the simulation using interactive color graphic workstations. They are able to develop, modify and implement plans promptly as the simulator maintains real time. This paper reports on how SEES will be used to develop an intrusion plan, test the security response tactics and develop observer logistics. A Force on Force field exercise will then be executed to follow the plan with observations recorded. An analysis is made by first comparing the plan and events of the simulation with the field exercise, modifying the simulation plan to match the actual field exercise, and then running the simulation to develop a distribution of possible outcomes

  14. Energy and Security: future-oriented studies for the Swedish Armed Forces; Energi och saekerhet: framtidsinriktade omvaerldsanalyser foer Foersvarsmakten

    Energy Technology Data Exchange (ETDEWEB)

    Oestensson, Malin; Jonsson, Daniel K.; Magnusson, Roger; Dreborg, Karl Henrik

    2009-01-15

    The report provides a basis for the Armed Forces long-term planning, and how changes in the global energy supply may mean new challenges and threats, as well as the advantages and disadvantages that can be associated with different future energy solutions for Armed Forces own activities, primarily relating to fuel and power during operation. One conclusion is that the potential conflict between energy security and climate-security can lead to far-reaching security implications and that continued global fossil dependency contributes to increased safety of political and military focus on a number of potential conflicts. A new such area may be the Arctic, as in the wake of climate change will become available for exploitation. Large scale global renewable energy can bring greater geographical spread - and reduced pressure on existing 'hot-spots'. Nuclear power is unlikely to be influential in the overall global energy security, but security problems associated with the production of nuclear materials can spread and be strengthened. Furthermore, the energy problems of connected to gaps between rich and poor, which may lead to social friction and conflict. The trend toward increased nationalisation and politicization of the energy is in contrast to free trade and market liberalism and may lead to further militarization of energy resources. Bilateral energy contracts may result in division within the EU and create a hindrance to joint positions and actions, such as in international efforts. As for Armed Forces own future energy solutions, the knowledge of alternative fuels (eg alcohols, diesel variants, gaseous fuels) and energy converters (eg hybrid vehicles, fuel cells) is reviewed. The following alternative principle solutions fuel and power are discussed: 1. Power from small-scale electricity generation via solar cells and small wind farms and power stations with liquid fuel as a supplement. Transport with plug-in hybrid vehicles, i.e. liquid propellants in

  15. Legal constraints imposed on security force personnel

    International Nuclear Information System (INIS)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search

  16. Legal constraints imposed on security force personnel

    Energy Technology Data Exchange (ETDEWEB)

    Cadwell, J.J.

    1983-01-01

    It is argued that the penalty for most mistakes made by security is the payment of money by the utility. The security personnel has only to act reasonably and not in a negligent manner. Preventing of sabotage is more important than obtaining a conviction, so it is better to search and not get a conviction than it is not to search. (DLC)

  17. Iraqi architecture in mogul period

    Directory of Open Access Journals (Sweden)

    Hasan Shatha

    2018-01-01

    Full Text Available Iraqi architecture have many periods passed through it until now, each on from these periods have it is architectural style, also through time these styles interacted among us, to creating kind of space forming, space relationships, and architectural elements (detailed treatments, the research problem being from the multi interacted architectural styles causing some of confused of general characteristic to every style, that we could distinguish by it. Research tries to study architecture style through Mogul Conquest to Baghdad. Aim of research follow main characteristic for this architectural style in the Mogul periods on the level of form, elements, and treatments. Research depending on descriptive and analytical all buildings belong to this period, so from analyzing there style by, general form for building, architectural elements, and it architectural treatment, therefore; repeating this procedures to every building we get some similarities, from these similarities we can making conclusion about pure characteristic of the style of these period. Other side, we also discover some Dissimilar in the building periods, these will lead research to make what interacting among styles in this period, after all that we can drew clearly main characteristic of Architectural Style for Mogul Conquest in Baghdad

  18. Contract formation in cyberspace: a comparative study of Australian, American and Iraqi laws

    OpenAIRE

    Hadi, Iman Majeed

    2017-01-01

    Electronic commerce is an increasingly vital part of national economies and the global economy. The promotion of electronic commerce requires clear and effective laws. As electronic contracts are the building blocks for electronic commerce, it is essential for national laws, especially in developing countries, to be sufficiently certain and appropriately adapted to promote electronic commerce. This thesis formulates recommendations for reforming Iraqi contract law in order to promote the a...

  19. Negotiations of believing and belonging among Iraqi and Egyptian Christians in Denmark

    DEFF Research Database (Denmark)

    Galal, Lise Paulsen

    This presentation explores negotiations of belonging among Christian immigrants of Iraqi and Egyptian background in Denmark. Based on transnational and diaspora studies, experiences and practices of belonging are explored as multi-directional and situational springing from everyday encounters...... and personal life trajectory, political events in both the region of origin and in the receiving country (Denmark), as well as opportunity structures empowering Middle Eastern Christians as collective and individual actors....

  20. [Formula: see text]Determination of the smoking gun of intent: significance testing of forced choice results in social security claimants.

    Science.gov (United States)

    Binder, Laurence M; Chafetz, Michael D

    2018-01-01

    Significantly below-chance findings on forced choice tests have been described as revealing "the smoking gun of intent" that proved malingering. The issues of probability levels, one-tailed vs. two-tailed tests, and the combining of PVT scores on significantly below-chance findings were addressed in a previous study, with a recommendation of a probability level of .20 to test the significance of below-chance results. The purpose of the present study was to determine the rate of below-chance findings in a Social Security Disability claimant sample using the previous recommendations. We compared the frequency of below-chance results on forced choice performance validity tests (PVTs) at two levels of significance, .05 and .20, and when using significance testing on individual subtests of the PVTs compared with total scores in claimants for Social Security Disability in order to determine the rate of the expected increase. The frequency of significant results increased with the higher level of significance for each subtest of the PVT and when combining individual test sections to increase the number of test items, with up to 20% of claimants showing significantly below-chance results at the higher p-value. These findings are discussed in light of Social Security Administration policy, showing an impact on policy issues concerning child abuse and neglect, and the importance of using these techniques in evaluations for Social Security Disability.

  1. Prevalence of dyslipidemia in the Iraqi adult population

    Energy Technology Data Exchange (ETDEWEB)

    Mula-Abed, Waad-Allah S [Dept. of Chemical Pathology, Royal Hospital, Muscat (Oman); Chilmeran, Saba K [Dept. of Biochemistry, College of Medicine, Univ. of Mosul (Iraq)

    2007-07-01

    Objective was to establish the prevalence of dyslipidemia in the Iraqi adult population in Mosul, according to the different recommended criteria. The study was carried out from October 2003 to April 2004, with 871 apparently healthy volunteers (413 males, 458 females) aged 20-70 year ([mean+- SD] 41.2+-13.8 year). Fasting blood specimens were collected from all subjects for measurement of serum lipid profile including triglycerides (TG), total cholesterol (TC), high density lipoprotein-cholesterol (HDL-C), low density lipoprotein-cholesterol (LDL-C), and ratios of cholesterol such as TC:HDL-C, LDL-C:HDL-C, and TG:HDL-C. Classification was carried out according to the different cut-off levels as recommended by the 2001 American National Cholesterol Education Program (NCEP) III using thresholds of TG>150mg/dl (2.0 mmol/L), LDL-C>100 mg/dl (2.6 mmol/L), LDL-C<40mg/dl (1.04mmol/L) and non-HDL-C>130mg/dl (3.37 mmol/L). The criteria of the 1998 British Hyperlipidemia Association (BHA) were also followed using thresholds of TG>180mg/dl (2.4mmol/L), TC>194mg/dl (5.0 mmol/L), LDL-C>116mg/dl (3.0mmol/L), HDL-C<45mg/dl (1.15mmol/L), TC: HDL-C>5.0, HDL-C: DL-C>2.5 and TG: HDL-C>3.0. Based on the American NCEPIII criteria, the dyslipidemic states were noted with high TG (41.6%), high LDL-C (57.8%), low HDL-C (49.9%) and high HDL-C (57.8%), low HDL-C (49.9%) and high non-HDL-C (56.8%) from the subjects. Based on BHA criteria, high TG24.5%), high TC (32.7%), high HDL-C (37.8%), high TC: HDL-C (30.9%), high LDL-C HDL-C (55.7%) and high TG: HDL-C (58.3%) were noted. Dyslipidemia is common in Iraqi population, and this was identified at different recommendation criteria. (author)

  2. Pragmatic Difficulties in the Production of the Speech Act of Apology by Iraqi EFL Learners

    Science.gov (United States)

    Al-Ghazalli, Mehdi Falih; Al-Shammary, Mohanad A. Amert

    2014-01-01

    The purpose of this paper is to investigate the pragmatic difficulties encountered by Iraqi EFL university students in producing the speech act of apology. Although the act of apology is easy to recognize or use by native speakers of English, non-native speakers generally encounter difficulties in discriminating one speech act from another. The…

  3. Development a Teaching Methods using a Cloud ‎Computing Technology in Iraqi Schools ‎

    Directory of Open Access Journals (Sweden)

    Thair A. Kadhim

    2018-02-01

    Full Text Available The current state of education is mostly electronic. Factors such as servers, storage space, and software are more prominent than ever before. Cloud Computing is defined as an Internet-based computing space that allows its users to share resources, software and information. In the context of Iraq, increased educational spending has not translated into improved learning environments. This work intends to increase the efficiency of education in Iraq through reviewing the characteristics associated with cloud computing providers, such as Microsoft, Google and Amazon, in the context of enhancing the advantages to students, teachers, and other stakeholders. The work will also try to determine approaches that offered rich and affordable services and tools through posing a suitable Cloud Computing Model for Iraqi Schools (CCIS. This particular model is made up of three major parts; preparation, implementation and monitoring, and evaluating and reviewing. The CCIS model combines public and private clouds in the provision of multiple services to the students and enables the formation of links outside of schools. Problems associated with security and data privacy are quite low and under control in this model, as they are defended beyond firewalls alongside remote services, scalability, low costs, efficiency, and functional plug and play options. This study will also decrease the challenges faced by the model internally and externally via constant appraisals and review.

  4. The Usefulness of Automatic Speech Recognition (ASR Eyespeak Software in Improving Iraqi EFL Students’ Pronunciation

    Directory of Open Access Journals (Sweden)

    Lina Fathi Sidig Sidgi

    2017-02-01

    Full Text Available The present study focuses on determining whether automatic speech recognition (ASR technology is reliable for improving English pronunciation to Iraqi EFL students. Non-native learners of English are generally concerned about improving their pronunciation skills, and Iraqi students face difficulties in pronouncing English sounds that are not found in their native language (Arabic. This study is concerned with ASR and its effectiveness in overcoming this difficulty. The data were obtained from twenty participants randomly selected from first-year college students at Al-Turath University College from the Department of English in Baghdad-Iraq. The students had participated in a two month pronunciation instruction course using ASR Eyespeak software. At the end of the pronunciation instruction course using ASR Eyespeak software, the students completed a questionnaire to get their opinions about the usefulness of the ASR Eyespeak in improving their pronunciation. The findings of the study revealed that the students found ASR Eyespeak software very useful in improving their pronunciation and helping them realise their pronunciation mistakes. They also reported that learning pronunciation with ASR Eyespeak enjoyable.

  5. Dentoskeletal Overjet Measurements of Iraqi Adult Sample with Different Skeletal Jaw Relationship

    Directory of Open Access Journals (Sweden)

    Shahbaa A Mohammed

    2017-11-01

    Full Text Available Background: Many attempts were done to develop a method that actually reflects the sagittal jaw discrepancies without depending on cranial landmarks or dental occlusion. This study aimed to use one of these methods (dentoskeletal overjet for assessing the sagittal jaw relationships of Iraqi adult sample with different skeletal jaw relationship. Materials and method: The sample consisted of 90 digital true lateral cephalometric radiographs of Iraqi individuals with no previous orthodontic treatment. Cephalometric analysis of skeletal sagittal jaw relationship -ANB angle, beta angle and Wits appraisal- will perform for everyone to divide the sample into three groups (skeletal class I, II, III for which the dentoskeletal overjet will be measured. All cephalometric measurements will be done using AutoCAD. Results: Descriptive statistics of all variables with different skeletal jaw relationship showed that mean values of dentoskeletal overjet were (1.15, 3.91 and –2.01 mm for skeletal class I, class II and class III jaw relationship respectively. Accurate reproducibility of dentoskeletal overjet in assessment of jaw skeletal relationship showed that the lowest value was for assessment of skeletal class III jaw relationship (73% and the value for assessment of both skeletal class I and class II was higher (93%. Conclusions: Dentoskeletal overjet could be utilized in accurate representation of skeletal jaw relationship.

  6. Knowledge and perception about health risks of cigarette smoking among Iraqi smokers

    Directory of Open Access Journals (Sweden)

    Omar Thanoon Dawood

    2016-01-01

    Full Text Available Background: Smoking is a major public health problem, especially in Iraq. There is very little information had been documented regarding smoking risk factors and quit intention among Iraqi smokers. Objectives: The main objectives of this study are to determine smokers' knowledge and perception about smoking health risks; and to determine smoking behavior and quitting intentions among Iraqi smokers; as well as to predict the factors that may associate with quit intentions. Methods: A cross-sectional study was conducted at the outpatient clinic in Tikrit Teaching Hospital, Tikrit City, Iraq. Adult smokers who are smoking cigarette everyday and able to communicate with the researcher were invited to participate in the study. A self-administered questionnaire was used to collect data from 386 participants. Results: This study showed that smokers had low awareness about some risk effects of smoking such as lung cancer in nonsmokers (30.1%, impotence in male smokers (52.6%, premature ageing (64%, and stroke (66.3%. In addition, the high score of knowledge and perception was significantly associated with quitting intention. Conclusion: Smokers' knowledge and perception regarding smoking health effects were low, especially in terms of secondhand smokers. Many efforts needed from health policy-makers and health care professionals to disseminate information about the risks of smoking and health benefits of give up smoking.

  7. Gasoline, Ethanol and Methanol (GEM) Ternary Blends utilization as an Alternative to Conventional Iraqi Gasoline to Suppress Emitted Sulfur and Lead Components to Environment

    OpenAIRE

    Miqdam Tariq Chaichan

    2016-01-01

    Iraqi conventional gasoline characterized by its low octane number not exceed 82 and high lead and sulfur content. In this paper tri-component or ternary, blends of gasoline, ethanol, and methanol presented as an alternative fuel for Iraqi conventional gasoline. The study conducted by using GEM blend that equals E85 blend in octane rating. The used GEM selected from Turner, 2010 collection. G37 E20 M43 (37% gasoline + 20% ethanol+ 43% methanol) was chosen as GEM in present study. This blend u...

  8. Confirmation of the presence of Heniochus acuminatus (Linnaeus, 1758 (Chaetodontidae and Pomacanthus maculosus (Forsskål, 1775 (Pomacanthidae in Iraqi marine waters, Arabian Gulf

    Directory of Open Access Journals (Sweden)

    Jawad, L. A

    2014-09-01

    Full Text Available Two specimens (116,119 mm TL of Heniochus acuminatus (Linnaeus, 1758 and four specimens (171–190 mm TL of Pomacanthus maculosus (Forsskål, 1775 were collected from Iraqi marine waters of the Arabian Gulf. These findings confirm the presence of H. acuminatus and establish the first record of P. maculosus from Iraqi waters. The samples were captured by hook and line off the coasts of Al–Fao City Peninsula, southern Iraq. Arabian Gulf. morphometric and meristic data are provided and compared with data from other parts of the world.

  9. SOUTH AFRICA AND THE SADC STAND-BY FORCE

    African Journals Online (AJOL)

    hennie

    Such institutions depict the power relations prevailing at .... ministers responsible for foreign affairs, defence, public security and state security from each ...... 15 Force-to-force ratios measure how big an international force has to be to balance.

  10. Now and Then: Combat Casualty Care Policies for Operation Iraqi Freedom and Operation Enduring Freedom Compared With Those of Vietnam

    National Research Council Canada - National Science Library

    Cordts, Paul R; Brosch, Laura A; Holcomb, John B

    2008-01-01

    Between December 2004 and June 2007, 13 key Operation Iraqi Freedom/ Operation Enduring Freedom combat casualty care policies were published to inform medical practice in the combat theater of operations...

  11. Securing Document Warehouses against Brute Force Query Attacks

    Directory of Open Access Journals (Sweden)

    Sergey Vladimirovich Zapechnikov

    2017-04-01

    Full Text Available The paper presents the scheme of data management and protocols for securing document collection against adversary users who try to abuse their access rights to find out the full content of confidential documents. The configuration of secure document retrieval system is described and a suite of protocols among the clients, warehouse server, audit server and database management server is specified. The scheme makes it infeasible for clients to establish correspondence between the documents relevant to different search queries until a moderator won’t give access to these documents. The proposed solution allows ensuring higher security level for document warehouses.

  12. Force Protection Common Operational Picture/Common Tactical Picture

    National Research Council Canada - National Science Library

    Peter, Russell

    1998-01-01

    ... has taken an integrated approach to Force Protection. There is a recognition that Force Protection is not a Security Police operation; but is a Security Force oDeration. This exemplifies a mindset change and a movement away from pure.

  13. 14 CFR 1203b.106 - Use of deadly force.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 5 2010-01-01 2010-01-01 false Use of deadly force. 1203b.106 Section... AUTHORITY AND USE OF FORCE BY NASA SECURITY FORCE PERSONNEL § 1203b.106 Use of deadly force. Deadly force shall be used only in those circumstances where the security force officer reasonably believes that...

  14. KOSOVO FORCE (KFOR ORGANIZATION IMAGE: EMPIRICAL RESEARCH ON KOSOVO SECURITY FORCES (KSF

    Directory of Open Access Journals (Sweden)

    Korhan ARUN

    2014-10-01

    Full Text Available ABSTRACT: Comprehensive efforts to rebuild a society’s security and peace-enforcing have become an increasingly frequent activity of the NATO as KFOR (Kosovo Force, which is formed of many countries that its image results from these countries collateral relations. KFOR’s image has come to the fore because it affects the mission success and decisions about its existence in Kosovo. The image has two components, functional and emotional: Military symbols and uniforms of NATO (KFOR are functional and emotional relations of countries with Kosovo Security Forces (KSF members are emotional part. In this research; the main objective is finding out the effects that shape KFOR image. Sublevel objectives are the effects of Kosovo’s “connections”, KSF “personal links” and “perceived mission success” with KFOR member states in KFOR image. To study these effect 3 hypothesis are formed and empirical research is done with KSF members to get a foundation of emotional relationship which affects country image. Evaluating of questionnaires with linear regression, correlation and factor analysis, besides the important effects of ethnocentrism and patriotism, military personnel relations formed by countries military involvement and activities found as predictor factors in KFOR image. As a matter of course these base components of emotions about the image will enlighten future literature about building an organizational image. Keywords: Organizational Image, Country Image, Image, KFOR (Kosovo Force. ÖZ: Birçok ülkenin katkılarıyla oluşan ve imajı da bu ülkelerin tamamlayıcı ilişkileri sonucu ortaya çıkan NATO’nun uluslararası topluma yansıyan yüzü olarak Kosova Gücü (KFOR için toplumun güvenliğini yeniden tesis etmek ve barışı zorlama faaliyetleri gittikçe daha geniş kapsamlı bir çaba haline gelmektedir. KFOR’un imajının öne çıkmasının nedeni görevin başarılmasında ve Kosova’daki varlığıyla ilgili

  15. Regionalizing Immigration, Health and Inequality: Iraqi Refugees in Australia

    Directory of Open Access Journals (Sweden)

    Lenore Manderson

    2012-01-01

    Full Text Available Humanitarian immigrants and refugees face multiple adjustment tasks and post-settlement support services concentrated in metropolitan areas play an important role. As part of an ongoing commitment, the Australian Government has increasingly supported resettlement in rural and regional areas of the country. Drawing on the experience of Iraqi migrants in Victoria, Australia, we examine some of the conditions that characterize regional resettlement and raise key questions for public health policy. Structural vulnerabilities and discriminations impact upon physical, mental and social wellbeing, leading to further exclusion, with negative long-term implications. The discussion throws light on the issues that migrants and refugees may encounter in other parts within Australia, but are also germane in many countries and highlight the resulting complexity for policy-making.

  16. A full cost analysis of the replacement of Naval Base, Guantanamo Bay's Marine ground defense force by the fleet antiterrorism security team

    OpenAIRE

    Ordona, Placido C.

    2000-01-01

    Constrained defense budgets and manpower resources have motivated the United States Marine Corps and the United States Navy to seek initiatives that maximize the efficient use and allocation of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller, rotating unit consisting of two platoons from the Fleet Antiterrorism Security...

  17. Living with burn scars caused by self-immolation among women in Iraqi Kurdistan: A qualitative study.

    Science.gov (United States)

    Mirlashari, Jila; Nasrabadi, Alireza Nikbakht; Amin, Pakestan Mohammad

    2017-03-01

    Patients with burns have to live with a variety of long-term physical and psychosocial consequences. Burns lead to prolonged hospital stay, disfiguring scars, disability, and even death. Since self-immolation is common in women of Iraqi Kurdistan, the present study sought to explore the experiences of women living with scars caused by self-immolation. This paper was part of a qualitative research study. A purposive sample of 18 female self-immolation survivors from Iraqi Kurdistan was selected, and 21 individual interviews were conducted and analyzed using conventional content analysis. Four categories emerged during the data analysis: (1) feelings of disbelief, regret, and anger caused by post-burn scars; (2) desperately seeking solutions; (3) grief due to disappointment and surrender to despair; and (4) rejection and isolation. In conclusion, individuals with scars and disfigurements sometimes adopted inappropriate measures to deal with the psychological problems caused by others' behaviors and wrong perceptions. Educational and support programs are hence indicated to promote awareness levels of self-immolation survivors, their families, and the whole society. Copyright © 2016 Elsevier Ltd and ISBI. All rights reserved.

  18. A Full Cost Analysis of the Replacement of Naval Base, Guantanamo Bay's Marine Ground Defense Force by the Fleet Antiterrorism Security Team

    National Research Council Canada - National Science Library

    Ordona, Placido

    2000-01-01

    ... of these diminishing resources. One such initiative is the restructuring of the Marine security presence at Naval Station, Guantanamo Bay, Cuba, through the replacement of the 350 man Marine Ground Defense Force with a smaller...

  19. In the long term, the United States will have a relatively little influence on the Iraqi petroleum

    International Nuclear Information System (INIS)

    Noel, P.

    2003-01-01

    The author examines the US policy in the petroleum domain, the US intentions concerning the Iraqi petroleum, the Opec coherence facing the come back of the Iraq and the increase power of Russian and the demand increase (77 mb/d today for 115 mb/d in 2030). (A.L.B.)

  20. Collaboration with East African security organisations

    DEFF Research Database (Denmark)

    Nordby, Johannes Riber; Jacobsen, Katja L.

    2012-01-01

    of the concept. At the same time the three organisations represent different constellations of member nations and thus different national interests, and locally they have different legitimacy and political strength. Thus, when choosing collaboration partners for a security project it is not simply a question......When it comes to understanding the concept of security and the way fragile security situations should be solved, the difference is big. While EASF – the East African Standby Force – is a regular military force with a rather traditional, military perception of the concept of security, EAC (East...... African Community) and IGAD (Intergovernmental Authority on Development) have broader perceptions of the concept. According to EAC, security also concerns matters such as policy reform, legislation, education and infrastructure. IGAD considers food security and environmental and economic issues as part...

  1. Strategic planning and security analysis

    International Nuclear Information System (INIS)

    DePasquale, S.

    1991-01-01

    Nuclear security master planning is a deliberative process, founded on the premise that the broad scope of security must be analyzed before any meaningful determinations may be reached on an individual security aspect. This paper examines the analytical process required in developing a Security Master Plan. It defines a four stage process concluding with the selection of security measures encompassing physical security, policy and procedure considerations and guard force deployment. The final product orchestrates each security measure in a complementary and supportive configuration

  2. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L.) by using RAPD Technique

    OpenAIRE

    Muhanned Abdul Hasan Kareem; Ali Hmood Al-Saadi ‎; Hassan Fadhil Naji

    2018-01-01

    In this study provided all molecular markers of Random amplified polymorphic (RAPD) successfully with the sixty five Iraqi date palm (Phoenix dactylifera L.) cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592) bands, polymorphism per all primers were (%64.2),...

  3. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L.) by using RAPD Technique

    OpenAIRE

    Muhanned Abdul Hasan; Ali ‎ Hmood Al-Saadi; Hassan Fadhil Naji

    2017-01-01

    In this study provided all molecular markers of Random amplified polymorphic (RAPD) successfully with the sixty five Iraqi date palm (Phoenix dactylifera L.) cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592) bands, polymorphism per all primers were (%64.2),...

  4. Eidinemacheilus proudlovei, a new subterranean loach from Iraqi Kurdistan (Teleostei; Nemacheilidae).

    Science.gov (United States)

    Freyhof, Jörg; Abdullah, Younis Sabir; Ararat, Korsh; Ibrahim, Hamad; Geiger, Matthias F

    2016-10-04

    Eidinemacheilus proudlovei, new species, is described from subterranean waters in the Little Zab River drainage in Iraqi Kurdistan. After the discovery of E. smithi in 1976, E. proudlovei is the second troglomorphic nemacheilid loach found in the Middle East and the second species placed in Eidinemacheilus. Eidinemacheilus proudlovei is distinguished from E. smithi by having 8+8 or 8+7 branched caudal-fin rays, no adipose keel on the caudal peduncle, enlarged jaws and a fully developed head canal system. It furthers differs substantially in its DNA barcode (>8% K2P distance) from all other nemacheilid loaches in the Middle East, Europe and Western India.

  5. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  6. Evaluation of instruments to assess health literacy in Arabic language among Iraqis.

    Science.gov (United States)

    Al-Jumaili, Ali Azeez; Al-Rekabi, Mohammed Dakhil; Sorofman, Bernard

    2015-01-01

    Low health literacy is associated with lack of medical information, less use of preventive measures, low medication adherence rates, high health care costs and high risk of hospitalization. The aims were to compare the results of the three health literacy tests, to measure for the first time the health literacy level of Iraqis, to describe the use of standardized health literacy tests, to evaluate reliability and validity of the Arabic versions of these tests, and to investigate whether there is relationship between the participant characteristics and the health literacy level. A convenience sample of 95 subjects was studied in five community pharmacies in Al-Najaf and Babylon governorates, Iraq. Three health literacy tests, the Single Item Literacy Screener (SILS), the New Vital Sign (NVS) and the Short version of the Test of Functional Health Literacy in Adults (S-TOFHLA), were translated in the Arabic language and administered to the pharmacy customers. There were no statistically significant associations between age, gender, education and current education status and NVS score, but there were significant positive associations between the level of education and each one of SILS, New SILS, and S-TOFHLA scores. SILS has one subjective, possibly culturally biased question. Since Iraqis are generally not exposed to reading product labels, the NVS test might be not an accurate measure for them. S-TOFHLA was the most comprehensive test and gave equitable results. The Arabic version of S-TOFHLA can be used to measure health literacy in 22 Arabic speaking countries. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. A Security Checklist for ERP Implementations

    Science.gov (United States)

    Hughes, Joy R.; Beer, Robert

    2007-01-01

    The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…

  8. Oil for What?—Illicit Iraqi Oil Contracts and the U.N. Security Council

    OpenAIRE

    Paul Heaton

    2005-01-01

    The Oil-For-Food program was established by United Nations Security Council Resolution 986 in 1995 as a means of providing humanitarian relief to Iraq, which had been under U.N. economic sanctions since the Persian Gulf War in 1991. After the invasion of Iraq, considerable evidence emerged suggesting that Saddam Hussein was able to subvert the Oil-For-Food program to obtain hard currency as well as items on the United Nation's prohibited transfer list. In this paper, I use recently available ...

  9. Between Home and Exile: A Reading of the Exilic Experience of the Iraqi Poet Adnan Al-Sayegh

    Science.gov (United States)

    Ghena, Hana Khlaif

    2016-01-01

    This paper aims at exploring the exilic experience of the Iraqi poet, Adnan Al-Sayegh whose involuntarily departure from his homeland, Iraq, in the early 1990s made him suffer a strong sense of estrangement, nostalgia, self-fragmentation and disconnection. The paper is divided into three sections and a conclusion. Section one sheds light on the…

  10. "The Kurds and the Role of Kurdistan Region in Developing Iraq" Where are Iraq and the Iraqi Kurds heading?

    Science.gov (United States)

    Anonymous, Student Author

    Iraq remains one of the hot topics in world politics today and probably more so in the coming decades, with its Kurds as an ever-evolving puzzle of the country's domestic stability and regional conflict. In modern history, the Kurds' resistance to "occupiers" of their region became more evident with the collapse of the Ottoman Empire, following which they were promised their independence. Due to reasons explained in Chapter One--with energy and oil being some of these reasons--this independence, however, led to nothing but fading ink on dusty paper. Since the Kurds were only partially assimilated into their host states, they were treated as though they had a status apart from the host state, yet the host state denied Kurdish efforts to achieve self-determination. In some cases, the host state denied the very existence of the Kurdish culture. This created an ambiguous situation in which Kurds variously saw themselves as nationals of their host states or as Kurds or as both. For the purpose of this thesis, attention will be given mainly to Iraqi Kurds and their struggle for the right to self-determination which they were finally able to achieve following the Gulf War in early 1990s, leading to the establishment of a regional Kurdish government in Northern Iraq (explained in Chapter Two). Chapter Three will focus on what some of the ways to mediate such disputes may be, including the introduction of renewable energy such as wind and solar energy. It will demonstrate how Iraq can take advantage of wind and solar energy as alternative means to oil, by which the country's economy can diversify, and the security situation and ecological conditions can improve. This thesis will further focus on some of the potential challenges in Iraq that may surface in the future, and whether the Kurds can play a role in stabilising the country by remaining part of it, and if so, what may be some of the responsibilities of the Arabs of Iraq in order to provide the required incentives to

  11. Burden of typhoid fever in Sulaimania, Iraqi Kurdistan.

    Science.gov (United States)

    Dworkin, Jonathan; Saeed, Rebeen; Mykhan, Hawar; Kanan, Shwan; Farhad, Dlawer; Ali, Kocher Omer; Abdulwahab, Runak Hama Kareem; Palardy, John; Neill, Marguerite A

    2014-10-01

    Typhoid fever imposes a high disease burden worldwide, but resource limitations mean that the burden of typhoid fever in many countries is poorly understood. The authors conducted a prospective surveillance study at the adult and pediatric teaching hospitals in Sulaimania, Iraqi Kurdistan. All patients presenting with an undifferentiated febrile illness consistent with typhoid were eligible for enrollment. Enrolled patients had blood cultures and Brucella serologies performed. Incidence was calculated with reference to census data. Both typhoid fever and brucellosis were common, and the incidence of typhoid fever was 21 cases/100 000 patient-years. Classic disease symptoms were uncommonly observed. Cost-effective surveillance projects to calculate disease burden of typhoid fever are practical and replicable. Typhoid has successfully adapted to the healthcare environment in Sulaimania. Additional work in the region should focus on antibiotic resistance and other enteric pathogens such as Brucella spp. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.

  12. What Roles and Missions for Europe’s Military and Security Forces in the 21st Century?

    Science.gov (United States)

    2005-08-01

    Studies Dr. John L. Clarke vi Executive Summary Are armies the dinosaurs of the 21st Century, soon to become extinct in the new security environment? What...and 40-year old weapons systems. Dr. John L. Clarke 6 For many reasons , Europe’s armed forces are in a long-term period of decline, and this trend is...in a reasonable period of time and on a high level of interoperability. The capability of carrying out sophisticated operations with a high operational

  13. A glimpse at the intricate mosaic of ethnicities from Mesopotamia: Paternal lineages of the Northern Iraqi Arabs, Kurds, Syriacs, Turkmens and Yazidis.

    Directory of Open Access Journals (Sweden)

    Serkan Dogan

    Full Text Available Widely considered as one of the cradles of human civilization, Mesopotamia is largely situated in the Republic of Iraq, which is also the birthplace of the Sumerian, Akkadian, Assyrian and Babylonian civilizations. These lands were subsequently ruled by the Persians, Greeks, Romans, Arabs, Mongolians, Ottomans and finally British prior to the independence. As a direct consequence of this rich history, the contemporary Iraqi population comprises a true mosaic of different ethnicities, which includes Arabs, Kurds, Turkmens, Assyrians, and Yazidis among others. As such, the genetics of the contemporary Iraqi populations are of anthropological and forensic interest. In an effort to contribute to a better understanding of the genetic basis of this ethnic diversity, a total of 500 samples were collected from Northern Iraqi volunteers belonging to five major ethnic groups, namely: Arabs (n = 102, Kurds (n = 104, Turkmens (n = 102, Yazidis (n = 106 and Syriacs (n = 86. 17-loci Y-STR analyses were carried out using the AmpFlSTR Yfiler system, and subsequently in silico haplogroup assignments were made to gain insights from a molecular anthropology perspective. Systematic comparisons of the paternal lineages of these five Northern Iraqi ethnic groups, not only among themselves but also in the context of the larger genetic landscape of the Near East and beyond, were then made through the use of two different genetic distance metric measures and the associated data visualization methods. Taken together, results from the current study suggested the presence of intricate Y-chromosomal lineage patterns among the five ethic groups analyzed, wherein both interconnectivity and independent microvariation were observed in parallel, albeit in a differential manner. Notably, the novel Y-STR data on Turkmens, Syriacs and Yazidis from Northern Iraq constitute the first of its kind in the literature. Data presented herein is expected to contribute to further population

  14. A glimpse at the intricate mosaic of ethnicities from Mesopotamia: Paternal lineages of the Northern Iraqi Arabs, Kurds, Syriacs, Turkmens and Yazidis.

    Science.gov (United States)

    Dogan, Serkan; Gurkan, Cemal; Dogan, Mustafa; Balkaya, Hasan Emin; Tunc, Ramazan; Demirdov, Damla Kanliada; Ameen, Nihad Ahmed; Marjanovic, Damir

    2017-01-01

    Widely considered as one of the cradles of human civilization, Mesopotamia is largely situated in the Republic of Iraq, which is also the birthplace of the Sumerian, Akkadian, Assyrian and Babylonian civilizations. These lands were subsequently ruled by the Persians, Greeks, Romans, Arabs, Mongolians, Ottomans and finally British prior to the independence. As a direct consequence of this rich history, the contemporary Iraqi population comprises a true mosaic of different ethnicities, which includes Arabs, Kurds, Turkmens, Assyrians, and Yazidis among others. As such, the genetics of the contemporary Iraqi populations are of anthropological and forensic interest. In an effort to contribute to a better understanding of the genetic basis of this ethnic diversity, a total of 500 samples were collected from Northern Iraqi volunteers belonging to five major ethnic groups, namely: Arabs (n = 102), Kurds (n = 104), Turkmens (n = 102), Yazidis (n = 106) and Syriacs (n = 86). 17-loci Y-STR analyses were carried out using the AmpFlSTR Yfiler system, and subsequently in silico haplogroup assignments were made to gain insights from a molecular anthropology perspective. Systematic comparisons of the paternal lineages of these five Northern Iraqi ethnic groups, not only among themselves but also in the context of the larger genetic landscape of the Near East and beyond, were then made through the use of two different genetic distance metric measures and the associated data visualization methods. Taken together, results from the current study suggested the presence of intricate Y-chromosomal lineage patterns among the five ethic groups analyzed, wherein both interconnectivity and independent microvariation were observed in parallel, albeit in a differential manner. Notably, the novel Y-STR data on Turkmens, Syriacs and Yazidis from Northern Iraq constitute the first of its kind in the literature. Data presented herein is expected to contribute to further population and forensic

  15. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    Operation Iraqi Freedom succeeded in overthrowing Saddam Hussein, but Iraq remains violent and unstable because of Sunni Arab resentment and a related insurgency, as well as growing sectarian violence...

  16. Assessing the Effectiveness of Alternative Community-Led Security ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    While many believe the state has a monopoly on the legitimate use of force, realities on the ground challenge this assertion, particularly in conflict and ... It will document alternative sources of governance, security, and justice that urban communities apply when state security forces are weak, unresponsive, or abusive.

  17. Disabilities - Multiple Languages

    Science.gov (United States)

    ... page, please enable JavaScript. Arabic (العربية) Chinese, Traditional (Cantonese ... Iraqi Health Outreach Project: Social Security Disability (SSD) and Supplemental Security Income (SSI) ...

  18. Security Force Assistance: Cases and Policy

    Science.gov (United States)

    2018-02-02

    theory , cases, and policy implications presented. 3 Methods, Assumptions, and Procedures The analytical narrative method was used to test the...underlying theory --developed separately as a principal-agent model with capacity building in the DwP project. These two cases were chosen as part...the following implications for U.S. national security policy: o Use aid to create incentives , especially via conditionality. Avoid apolitical

  19. Reflections on Africa's Security Situation: An Examination of Nigeria ...

    African Journals Online (AJOL)

    One of the greatest challenges that twenty-first century African states face is that of security. Of the four arms of the state security system, namely, the Army, Air Force, Navy and Police, the latter has been the most taunted. Ordinarily, the Police Force, being the closest of all the forces to civilians, is expected to be the protector ...

  20. Sustainment of Army Forces in Operation Iraqi Freedom. Battlefield Logistics and Effects on Operations

    National Research Council Canada - National Science Library

    Peltz, Eric; Halliday, John M; Robbins, Marc L; Girardini, Kenneth J

    2005-01-01

    ..., with an emphasis on the period from the start of ground combat to the fall of Baghdad. The findings should be of interest throughout the Army as well as the broader Department of Defense supply chain, deployment planning, and force development communities...

  1. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2008-01-01

    Operation Iraqi Freedom overthrew Saddam Hussein's regime, but during 2004-2007 much of Iraq was wracked by violence caused by Sunni Arab resentment and a related insurgency, resulting Sunni-Shiite...

  2. Challenges and Opportunities of Operation Enduring Freedom/Operation Iraqi Freedom Veterans with Disabilities Transitioning into Learning and Workplace Environments

    Science.gov (United States)

    Ostovary, Fariba; Dapprich, Janet

    2011-01-01

    This article presents issues related to disabled military servicemen and women who are transitioning to civilian life. The emphasis is on the experience of veterans serving in the Operation Enduring Freedom (OEF) and Operation Iraqi Freedom (OIF) as they reintegrate into civilian workplace and learning environments. The authors begin with an…

  3. The strategic security officer.

    Science.gov (United States)

    Hodges, Charles

    2014-01-01

    This article discusses the concept of the strategic security officer, and the potential that it brings to the healthcare security operational environment. The author believes that training and development, along with strict hiring practices, can enable a security department to reach a new level of professionalism, proficiency and efficiency. The strategic officer for healthcare security is adapted from the "strategic corporal" concept of US Marine Corps General Charles C. Krulak which focuses on understanding the total force implications of the decisions made by the lowest level leaders within the Corps (Krulak, 1999). This article focuses on the strategic organizational implications of every security officer's decisions in the constantly changing and increasingly volatile operational environment of healthcare security.

  4. Measurement the concentration of polonium 210Po and find annual dose resulting from eating certain foods by the individual Iraqi

    International Nuclear Information System (INIS)

    Al-Emam, A. M.; Mhemeed, A.K.; Hasan, H.I.

    2012-12-01

    The present study aims to determine the concentration of polonium 2 10P o in some of the food consumed by the Iraqi individual collecting (27) sample produced within the country, including imported and available in local markets to some Iraqi provinces, and these foods included potatoes, wheat and fish. To find concentration of polonium 2 10P o method is used chemical separation and deposition on silver disc, and use surface barrier detector to find alpha particle spectrum for polonium and find concentrations ere at 7.15, 2.58, 6.86 Bq / kg, for each of potatoes, wheat and fish, respectively, Daily intake rate for polotuinm 2 10P o which found in the food under study was measured, and show that the annual dose resulting from eating foods that contain this element was at 4.55, 87,69, 0.298 μSv/ y for food stuff mentioned are compatible with universal values and within the permissible limits worldwide. (Author)

  5. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    system force and structure reliance – are discovered and tantamount with EU nations. Thusly I indicated reason viewpoints and figures of security of data structures it additionally relates to the reason of estimation of transient dangers of security of frameworks for that I begin my proposal with one of the fundamental class of data security which is Cyber security. Keyword : Cyber Security, IT

  6. Force 2025 and Beyond Strategic Force Design Analytic Model

    Science.gov (United States)

    2017-01-12

    focused thinking , functional hierarchy, task capability matching 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT U 18. NUMBER OF...describe and evaluate current organizational designs in terms of Force Employment and Force Design using the model to offer recommendations and analysis...developed to illuminate the current organizational design structure to better understand how the network of BCTs and enablers function in today’s steady

  7. Two new species of Oxynoemacheilus from the Tigris drainage in Iraqi Kurdistan (Teleostei: Nemacheilidae).

    Science.gov (United States)

    Freyhof, Jörg; Abdullah, Younis Sabir

    2017-03-02

    Two new species of Oxynoemacheilus are described from the Sirvan River drainage in Iraqi Kurdistan. Oxynoemacheilus gyndes, new species, is distinguished by having a very short lateral line, reaching behind the pectoral-fin base, no scales except on the posteriormost part of the caudal peduncle, a slightly emarginate caudal fin and no suborbital groove in males. Oxynoemacheilus hanae, new species, is distinguished by having a midlateral row of elongated blotches, isolated patches of dark-brown spots or blotches on lower flank, a deeply emarginate caudal fin and a suborbital groove in males.

  8. Medical Logistics Lessons Observed During Operations Enduring Freedom and Iraqi Freedom.

    Science.gov (United States)

    Dole, Mark J; Kissane, Jonathan M

    2016-01-01

    Medical Logistics (MEDLOG) is a function of the Army's integrated System for Health that provides the medical products and specialized logistics services required to deliver health protection and care under all operational conditions. In unified land operations, MEDLOG is an inherent function of Health Service Support (HSS), which also includes casualty care and medical evacuation. This paper focuses on a few key lessons observed during Operations Enduring Freedom and Iraqi Freedom with direct implications for the support of HSS in future operations as envisioned in the Army Operating Concept and the Joint Concept for Health Services. It also examines a few key enablers that helped mitigate these challenges that are not yet fully acknowledged in Army Medical Department doctrine, policy, and planning.

  9. Physical security of cut-and-cover underground facilities

    International Nuclear Information System (INIS)

    Morse, W.D.

    1998-01-01

    To aid designers, generic physical security objectives and design concepts for cut-and-cover underground facilities are presented. Specific aspects addressing overburdens, entryways, security doors, facility services, emergency egress, security response force, and human elements are discussed

  10. Hybrid Security Arrangements in Africa: Exploring the Implications ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    building. In the aftermath of war and conflict, state security forces and institutions are often severely weakened or decimated. When this happens, multiple state and non-state security actors and governance structures emerge to fill security vacuums.

  11. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  12. ON THE HORNS OF A DILEMMA: INTELLECTUALS BETWEEN THE REGIME AND THE PEOPLE AS REFLECTED IN IRAQI COMMUNIST LITERATURE

    Directory of Open Access Journals (Sweden)

    Hilla Peled-Shapira

    2012-12-01

    Full Text Available This paper deals with the way in which Communist writers in mid-twentieth-century Iraq used literature in order to, on the one hand express their tense relationship with the regime during times of severe political repression, and on the other hand sharply criticize the Iraqi people themselves for not taking responsibility for or caring about their fate—or, for that matter, for failing to internalize the social class discourse to which the Communists aspired.  The paper’s objective is to examine the connection between the writers’ ideology and the rhetorical and conceptual elements with which they expressed their dissatisfaction with the regime, the way Iraqi society was run, and the desires of both—intellectuals and society at large—to undergo change. In addition, this study will survey the esthetic and stylistic devices, which the writers under consideration chose, and consider both the meanings and motives behind their choices. These aspects will be examined in the framework of a proposed model of “circles of criticism.”

  13. Miniature Munitions: Is The US Military Prepared to Support Major Combat Operations

    Science.gov (United States)

    2016-08-01

    offensive as the only weapon. The number of weapons, cost, and production rate are compared to the Operation Iraqi Freedom (OIF) air campaign. The SDB...two major conflicts in Afghanistan and Iraq. In 2003, US and coalition forces began Operation Iraqi Freedom (OIF) with an aerial bombardment campaign...were able to advance into the Iraqi capital city of Baghdad with relative ease thanks in part to the support from the air campaign. Nearly 30,000

  14. Computer Security: SAHARA - Security As High As Reasonably Achievable

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    History has shown us time and again that our computer systems, computing services and control systems have digital security deficiencies. Too often we deploy stop-gap solutions and improvised hacks, or we just accept that it is too late to change things.    In my opinion, this blatantly contradicts the professionalism we show in our daily work. Other priorities and time pressure force us to ignore security or to consider it too late to do anything… but we can do better. Just look at how “safety” is dealt with at CERN! “ALARA” (As Low As Reasonably Achievable) is the objective set by the CERN HSE group when considering our individual radiological exposure. Following this paradigm, and shifting it from CERN safety to CERN computer security, would give us “SAHARA”: “Security As High As Reasonably Achievable”. In other words, all possible computer security measures must be applied, so long as ...

  15. The US Army in Kirkuk: Governance Operations on the Fault Lines of Iraqi Society, 2003-2009

    Science.gov (United States)

    2011-12-01

    point 16 repeatedly to the Baathist regime’s de-Kurdification of Kirkuk as prima facie justification for returning control of the city to the Kurds...Americans had a quid pro quo obligation to help them get their land back from the 10,000 squatting Arabs.23 Patrick Clawson of the Middle East Quarterly...beginning of the campaign, US Soldiers were gradu- ally passing these obligations to Iraqi government officials to manage their own internal and external

  16. Statistical Study to Check the Conformity of Aggregate in Kirkuk City to Requirement of Iraqi Specification

    OpenAIRE

    Ammar Saleem Khazaal; Nizar N Ismeel; Abdel fattah K. Hussein

    2018-01-01

    This research reviews a statistical study to check the conformity of aggregates (Coarse and Fine) was used in Kirkuk city to the requirements of the Iraqi specifications. The data of sieve analysis (215 samples) of aggregates being obtained from of National Central Construction Laboratory and Technical College Construction Laboratory in Kirkuk city have analyzed using the statistical program SAS. The results showed that 5%, 17%, and 18% of fine aggregate samples are passing sieve sizes 10 mm,...

  17. SOR/83-77, Physical Security Regulations

    International Nuclear Information System (INIS)

    1983-01-01

    These Regulations establish and require the maintenance of security systems, equipment and procedures to implement Canada's international obligations regarding security at those nuclear facilities. The Regulations, which determine the different areas in a nuclear facility, provide for the establishment of security barriers around the ''protected areas'' occupied by facilities and prescribe that the licensees (operators) are required to keep the facilities for which they hold a licence under constant surveillance. They must also make arrangements for a response force - a local, provincial or federal police force detachment or similar force - to provide assistance where necessary. No person may enter a protected area without written authorization from the licensee concerned. Inspectors appointed under the Atomic Energy Control Regulations or designated under an agreement between Canada and the IAEA may be granted an authorization to enter such areas to discharge their duties. The Regulations have been amended by SOR/84-81 of 12 January 1988 to add certain requirements concerning documentary evidence and the duties of the board; by SOR/85-1016 of 25 October 1985 to revise the definition of response force and provide other clarifications; by SOR/91-585 of 10 October 1991 to clarify wording in French. (NEA)

  18. War-related stressors as predictors of post-deployment health of Air Force women.

    Science.gov (United States)

    Pierce, Penny F; Lewandowski-Romps, Lisa; Silverschanz, Perry

    2011-01-01

    Little is known about the effects of combat exposure on women's health after service in Operation Iraqi Freedom (OIF). Our purpose was to describe the incidence and nature of physical heath symptoms reported by deployed women to identify problematic areas where early intervention or better surveillance might be directed. Using a random, stratified sample (theater vs. non-theater; parent vs. non-parent; and military component including active, guard, and reserve members) of 1,114 Air Force women, we provide descriptive statistics, group comparisons, and multiple regression models to identify health concerns and potential predictors of physical health outcomes. Findings revealed that those in the reserve/guard forces (vs. active duty) and those in the theater of operations (vs. elsewhere during the same time period) reported greater physical health problems (β = -0.07, p social functioning (β = 0.08, p war-related predictors of health among women serving in deployed locations around the world. Copyright © 2011. Published by Elsevier Inc.

  19. Tuberculosis in Sulaimaniyah, Iraqi Kurdistan: A Detailed Analysis of Cases Registered in Treatment Centers.

    Science.gov (United States)

    Karadakhy, Kamaran; Othman, Nasih; Ibrahimm, Faredun; Saeed, Akam Ali; Amin, Ari Abdul-Adheem Hama

    2016-01-01

    Tuberculosis (TB) remains a major public health problem especially in low and middle-income countries. The current study was undertaken to estimate the incidence of the disease and describe its epidemiological characteristics in Iraqi Kurdistan. A retrospective study was carried out on cases registered in the directly observed treatment-short course (DOTS) centers in Sulaimaniyah province. Information was collected from the summary reports of all cases registered in 2010 and detailed information was obtained from 307 cases in the main center. During 2010, a total of 530 new and relapsed cases were registered in the DOTS centers amounting to an annual incidence of 31 per 100,000. Over 73% of cases were pulmonary TB and 45% of all cases had positive smear. Most common symptoms were cough (58%), sweating (49%) and fever (48). Almost 43% of patients were diagnosed by direct swab examination, 30% by biopsy and 23% through clinical and radiologic examination. In relation to outcome, 89% of patients were treated successfully, 7% died and 3% defaulted. Mortality rate was 8% in pulmonary infection and 4% in extrapulmonary infection. Old age (65 years and over) was significantly associated with higher odds of death compared to people aged 34 years and younger (OR 6.7, 95% CI 1.3-36.1, P=0.03). The incidence of TB is still high in the Iraqi Kurdistan. The DOTS has been successful in treating the majority of cases but there are areas needing improvement especially record-keeping and patient follow-up during and after treatment.

  20. Operation Iraqi Freedom/Operation Enduring Freedom: exploring wartime death and bereavement.

    Science.gov (United States)

    Harrington Lamorie, Jill

    2011-01-01

    Military deaths are often sudden, unanticipated, traumatic, and/or violent in nature and involve the death of a young adult. More than 5,500 service members have died as a result of their service in the wars in Afghanistan (2001) and Iraq (2003) in combat- or non-combat- related incidences. As the death toll continues to rise, service members and their families struggle with the visible and invisible wounds of war. This article explores wartime death, trauma, and bereavement experienced by those survivors affected by service members who have died as a result of their military service in Operation Iraqi Freedom (OIF) and Operation Enduring Freedom (OEF). It recognizes the circumstantial and cultural factors of the death as well as the grief and trauma experiences of survivors. Resources and suggested interventions of support are highlighted.

  1. The Politics of Security Deployment of Security Operatives to Jos Metropolis, Plateau State, Nigeria 2001-2014

    Directory of Open Access Journals (Sweden)

    Dantani Umar

    2017-01-01

    Full Text Available The paper examines the politics of security deployment by the Federal Government of Nigeria to Jos, metropolis. A cross-sectional study was conducted and Public Opinion Theory adopted. Methodologically, mixed methods of data collection were conducted that involved the administration of 377 questionnaires to adult respondents, six In-Depth Interviews with religious and community leaders while three Key Informant Interviews with security personnel working with Special Task Force. The survey reveals that, the deployment of Mobile Police from 2001-2010 and the formation of Special Task Force in 2010 has generated mixed reactions and divergent perceptions among the residents of Jos metropolis. Majority of the ethnic groups that are predominantly Christians were more contented with the deployment of the Mobile Police whereas ethnic groups that are dominantly Muslims questioned the neutrality, capability, performance and strength of the Nigerian Police Force in managing the crises. The study recommends that, security personnel should display high degree of neutrality in order to earn the confidence of the residents and change their perceptions.

  2. Predictors of Coping Strategies Employed by Iraqi Refugees in Jordan.

    Science.gov (United States)

    Al-Smadi, Ahmed Mohammad; Tawalbeh, Loai Issa; Gammoh, Omar Salem; Ashour, Ala; Alzoubi, Fatmeh Ahmad; Slater, Paul

    2017-10-01

    The purpose of this study was to examine coping strategies used by Iraqi refugees in Jordan based on their demographic details. A cross-sectional design was used. A representative sample of 333 refugees living in Jordan participated in the study. The Cope inventory and the demographic details were compiled to produce and collate the relevant data. Being older, female, educated, single, and living with more than three family members was associated with greater use of the problem solving coping strategy. Being female, educated, and unemployed was associated with greater use of the active emotional coping strategy. In addition, being older, male, illiterate, unemployed, and living with less than three family members was associated with greater use of the avoidant emotional coping strategy. This study recommends a multidisciplinary approach intervention as being the best method of addressing and fulfilling the health and socioeconomic needs of older, male, illiterate, unemployed people.

  3. Response to nuclear and radiological terrorism - the viewpoint from the security forces

    International Nuclear Information System (INIS)

    Baciu, A.

    2005-01-01

    Full text: A threat of a malevolent act may be deemed to exist when information has been received that terrorists, criminals or other persons intend to: manufacture, use, transport, dispose radioactive materials in order to hide the nature of material; perpetrate a deliberate act to irradiate a person or persons; perpetrate a deliberate act to contaminate food or water supplies with radioactive materials; create and deploy a radiation dispersal device; perpetrate a deliberate act to contaminate a site or the environment with radioactive materials; or mount a sabotage attack upon a nuclear facility aimed at causing an uncontrolled release of radioactive materials. Security forces will be involved in all aspects of the response: at the scene, to lead, to control the crime scene and preserve evidence; at the hospitals, to identify and manage witnesses who may assist in the ensuing investigation, and to protect emergency medical personnel if perpetrators are part of the casualties; and at the regional and national coordination level, to manage the overall criminal investigation; to take under physical protection the seized materials. Law enforcement response: key considerations to all police (security and investigating) personnel at the scene of a terrorist act will include the following: do not approach the scene without proper radiological support; be aware of the possible presence of other radiological hazards; the radiological team will seek the removal of safety hazards. Work with that team to minimize hazards while not compromising the investigation. Minimize traffic through the scene: this will help reduce the spread of radioactive contamination, if present; people present at the scene need to be held for questioning. However, they will also have fears due to the presence of radiation. Work with the radiological team to minimize radiological hazards and fears while not compromising the investigation procedure. (author)

  4. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Auerback, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. This paper summarizes a study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) Legal Considerations, (2) Liability, (3) Staffing and Operations, (4) Costs, (5) Relationship to Off-site Forces, (6) Management and Control, (7) Transportation

  5. Evaluation of Inhibitors Blends Used in Iraqi Markets for Automobile Cooling System

    Directory of Open Access Journals (Sweden)

    Watheq Naser Hussein

    2017-08-01

    Full Text Available Detection the behavior of some metals ( carbon steel and copper that are widely used in automobiles cooling system in tap water and a cooling mixture for radiators was held. The purpose of this work is to check the performance of two types of mixtures that available in Iraqi markets, viz the Kuwait mixture and the Germany one and what are known as blue water by an electrochemical technique. The experiments were held at two values of temperatures of 17 and 80 ˚C-where these values of temperature almost represent the cases of idle and operating engine. The obtained results showed that the two types of mixtures have given good inhibition efficiency for the case of steel especially in presence of Germany mixture.

  6. Prepublication Review of Government Employee Speech: A Case Study of the Department of Defense and United States Air Force Security/Policy Review Programs.

    Science.gov (United States)

    Warden, Michael L.

    Since 1957 the Department of Defense has subjected all forms of speech of U.S. military personnel meant for publication to prepublication review based on security and policy criteria. The historical development of the Defense Department's prepublication review program and its specific implementation by the U.S. Air Force lead to questions of First…

  7. Measurable Changes in Pre-Post Test Scores in Iraqi 4-H Leader’s Knowledge of Animal Science Production Principles

    Directory of Open Access Journals (Sweden)

    Justen O. Smith

    2015-06-01

    Full Text Available The 4-H volunteer program is a new concept to the people of Iraq, for decades the country has been closed to western ideas. Iraqi culture and the Arabic customs have not embraced the volunteer concept and even more the concept of scientific animal production technologies designed to increase profitability for producers. In 2011 the USAID-Inma Agribusiness program teamed with the Iraq 4-H program to create youth and community entrepreneurship opportunities for widowed families. Iraq 4-H provided the youth members and adult volunteers and Inma provided the financial capital (livestock and the animal science training program for the volunteers. The purpose of this study was to measure the knowledge level gained through intensive animal science training for Iraqi 4-H volunteers. Researchers designed and implemented a pre and post test to measure the knowledge of fifteen volunteers who participated in the three day course. The pretest exposed a general lack of animal science knowledge of all volunteers; over 80% of the participants incorrectly answered the questions. However, the post-test indicated positive change in the participants understanding of animal science production principles.

  8. Study on defensive security concepts and policies

    International Nuclear Information System (INIS)

    1993-01-01

    The report begins by describing the background against which the proposal for the study emerged-the welcome developments brought about by the end of the cold war but also the emergence of new threats and the reappearance of long-standing problems. The study proceeds to examine current trends in the international security environment and how they may influence the peaceful settlement of dispute and the effecting of restraint and a defensive orientation in the development, maintenance and use of armed forces. A discussion of the substance and main features of defensive security concepts and policies follows. Existing studies and models designed to eliminate the offensive character of military force postures by effecting a defensive orientation of capabilities are surveyed. In addition, the study discusses political and military aspects of defensive security, pointing out how defensive security differs from those existing models

  9. Deployed Flight Test of the Iraqi Air Force Comp Air 7SLX (CA-7)

    Science.gov (United States)

    2014-02-28

    been built with a castering nose wheel mounted to the engine mount, a simple yet effective design. The team purchased new engine mounts and castering ...nose wheels from Aero Comp Inc. to solve these problems on all the CA-7s they refurbished, which Fred Webster called “a pretty big modification .”22...from a Cessna 310. The UAE had made numerous other modifications .2 The United States Central Command Air Forces (CENTAF) was working with the

  10. Stolen Vehicles for Export: A Major Concern for Domestic and International Security

    Science.gov (United States)

    2018-03-01

    xi LIST OF ACRONYMS AND ABBREVIATIONS AES Automated Export System BEST Border Enforcement Security Task Force CSI Container Security Initiative...motor vehicles, increase inspections of exports, and enhance enforcement capabilities. Unfortunately, this thesis was unable to establish a clear link...and a better understanding could only benefit law enforcement’s efforts to counter it. 14. SUBJECT TERMS Border Enforcement Security Task Force

  11. R229Q Polymorphism of NPHS2 Gene in Group of Iraqi Children with Steroid-Resistant Nephrotic Syndrome

    Directory of Open Access Journals (Sweden)

    Shatha Hussain Ali

    2017-01-01

    Full Text Available Background. The polymorphism R229Q is one of the most commonly reported podocin sequence variations among steroid-resistant nephrotic syndromes (SRNS. Aim of the Study. We investigated the frequency and risk of this polymorphism among a group of Iraqi children with SRNS and steroid-sensitive nephrotic syndrome (SSNS. Patients and Methods. A prospective case control study which was conducted in Al-Imamein Al-Kadhimein Medical City, spanning the period from the 1st of April 2015 to 30th of November 2015. Study sample consisted of 54 children having NS, divided into 2 groups: patients group consisted of 27 children with SRNS, and control group involved 27 children with SSNS. Both were screened by real time polymerase chain reaction for R229Q in exon 5 of NPHS2 gene. Results. Molecular study showed R229Q polymorphism in 96.3% of SRNS and 100% of SSNS. There were no phenotypic or histologic characteristics of patients bearing homozygous R229Q polymorphism and the patients with heterozygous R229Q polymorphism. Conclusion. Polymorphism R229Q of NPHS2 gene is prevalent in Iraqi children with SRNS and SSNS. Further study needs to be done, for other exons and polymorphism of NPHS2 gene in those patients.

  12. Mobile recommender application for promoting electricity saving among Iraqis

    Science.gov (United States)

    Sabri, Manhal Isam; Hussain, Azham

    2017-10-01

    Mobile utilization has rapidly expanded due to its feasibility in executing different applications that can be used in solving everyday problems. Common issues in daily life include electricity saving. In Iraq, the Ministry of Power seriously faces such issue. This is because most households have lack access to information regarding to sufficient power consumption, as well as applications that educate about such saving. Therefore, this study aims at developing a mobile application for Iraqi to help them understand the basis for reducing electricity consumption based on the meter data supplied by the users for square meter along with the active devices and period of usage. The proposed mobile application was evaluated by 50 households from the perspective of ease of use, usefulness, ease of learning, and satisfaction. The obtained result showed that majority of the participants found the application to be ease to use, useful, easy to learn, and were satisfied with its functionalities. The study findings provide some insights about the importance of using mobile application for promoting households in Iraq to manage their power consumption behavior.

  13. Impact of market forces on security of supply; Markedsgoerelse af forsyningssikkerhed

    Energy Technology Data Exchange (ETDEWEB)

    Klinge Jakobsen, H.; Kromann, M.T.; Hoermann, M. (and others)

    2010-05-15

    Marketisation of security of supply can result in efficiency in the overall energy system and cost savings for end users. The analyses show that savings may be gained, particularly in connection with the part of security of supply which is about sufficiency. With modern metering and communication equipment, it is realistic that all consumers have the opportunity to express an upper limit on the price of electricity. In the near future, selected consumption may be turned off at extremely high prices. Those parts of the security of supply, that relates to local networks and that are of the nature of a collective benefit, may be more difficult to make market-oriented. There is, however, already some marketisation, as firms with particularly critical use of electricity invest in backup power plants. The report describes methods for the regulation of grid companies, including cost control, which gives them an incentive to balance the investment in improvements to the security of supply against the cost. Marketisation of security of supply can be done in several steps. Here the following steps are analyzed: a) Cost visibility and reduction; b) Establishment of level of security of supply based on consumer preferences (cost of losses); c) Security of supply varying between consumers, duration and timing; d) Individual level of security of supply. It is at present generally difficult to judge how many of these steps it is appropriate to take. 3 simplistic cases are made of power reserves, transmission and distribution, which indicate how the costs of security of supply can be weighed against advantages. In all three cases it is concluded that supply element has costs for the consumers, but in a magnitude which might well be justified in relation to the benefits. The level of detail in the cases does not, however, justify actual conclusions about the relationship between costs and benefits. It is confirmed in this project through model analysis that savings can be achieved

  14. International and European Security Law

    Directory of Open Access Journals (Sweden)

    Jonathan Herbach

    2012-02-01

    Full Text Available Security law, or more comprehensively conflict and security law, on the international level represents the intersection of three distinct but interrelated fields: international humanitarian law (the law of armed conflict, jus in bello, the law of collective security (most identified with the United Nations (UN system, jus ad bellum and arms control law (including non-proliferation. Security in this sense is multifaceted - interest security, military security and, as is often referred to in the context of the EU, human security. As such, the law covers a wide range of specific topics with respect to conflict, encompassing the use of force, including choice of weapons and fighting techniques, extending to the rules applicable in peacekeeping and peace enforcement, and yet also dictating obligations outside the context of conflict, such as safeguarding and securing dual-use materials (those with both peaceful and military applications to prevent malicious use.

  15. Issues related to choosing a guard force structure

    International Nuclear Information System (INIS)

    Averbach, C.; Cusack, J.; Green, L.; Higinbotham, W.; Indusi, J.; Marcuse, W.; Weinstock, E.

    1975-01-01

    The establishment of a federal security force has been suggested as an additional step to protect nuclear material. The force would be given the responsibility for guarding nuclear facilities and shipments of nuclear materials. A study to identify the issues that are relevant to choosing between the private guard forces that are presently employed by industry or a guard force under federal authority is summarized. To examine the issues which would be relevant, three possible types of security force structures were selected for comparison: a federal force under central authority, a private guard force employed by or under contract to a facility, and a private arrangement to employ local police officers similar to the arrangement for armed guards at airports. The issues were divided into seven categories: (1) legal considerations, (2) liability, (3) staffing and operations, (4) costs, (5) relationship to off-site forces, (6) management and control, and (7) transportation. (U.S.)

  16. Lessons of the Iraqi De-Ba’athification Program for Iraq’s Future and the Arab Revolutions

    Science.gov (United States)

    2012-05-01

    with some of the Arab Spring militaries and has a particu- larly strong relationship with the Egyptian military. These bonds of trust, cooperation...suitable tomb for the co-founder of Ba’athism. Saddam was not a military man, and as a youth was rejected for entry into the Iraqi military academy due...Egypt. While parallels between Saddam Hussein’s Iraq and 64 these countries exist, differences vastly outnumber similarities. The Tunisian and Egyptian

  17. Characterization of Some Iraqi Archaeological Samples Using IBA, Analytical X-ray and Other Complementary Techniques

    International Nuclear Information System (INIS)

    Al-Sarraj, Ziyad Shihab; Damboos, Hassan I; Roumie, Mohamad

    2012-01-01

    The present work aimed at investigating the compositions and microstructures of some archaeological samples which dated back to various periods of the ancient Iraqi civilizations using PIXE, XRF, XRD, and SEM techniques. The models selected for the study (ceramics, glaze, etc.) were diverse in size and nature, therefore a limited number of samples were then butted from them by a small diamond wheel. Conventional powder metallurgy method was then used to prepare the samples. Dried samples were then coated with a thin layer of carbon, and analyzed using the ion beam accelerator of the LAEC. Three other groups of samples were also prepared for the purpose of analysis by X-ray fluorescence (XRF), X-ray diffraction (XRD), and scanning electron microscope (SEM). Analysis results of the chemical composition showed good agreement between the various techniques as well as for phases, while the fine structure analysis obtained by optical and scanning microscopy exhibited features of a structure where it got an intensified densification in the final stage of sintering and accompanied by quasi-homogeneous distribution of the closed pores. This will lead to the conclusion that the temperature used for sintering by ancient Iraqi was sufficient and it may fall in the range between 950-1200°C, also the mixes and the forming methods used by them, were both suitable to obtain good sintered bodies with even distribution of pores. A ring-shaped trace noticed in SEM micrographs need more work and study to explain what it is?

  18. Dutch National Security Reform Under Review : Sufficient Checks and Balances in the Intelligence and Security Services Act 2017?

    NARCIS (Netherlands)

    Quirine Eijkman; Nico van Eijk; Robert van Schaik

    2018-01-01

    In May 2018, the new Dutch Intelligence and Security Services Act 2017 (Wet op de Inlichtingen- en veiligheidsdiensten, Wiv) will enter into force. It replaces the previous 2002 Act and incorporates many reforms to the information gathering powers of the two intelligence and security services as

  19. Polar Bears in the Desert: A Case Study of the Operational and Strategic Impacts of the Iraq Surge on Tactical Units

    Science.gov (United States)

    2016-06-10

    COP Combat Outpost FM Field Manual FOB Forward Operating Base HHC Headquarters and Headquarters Company IED Improvised Explosive Device IP Iraqi...responsibility for security. Casey may have felt that the US troop presence incited violence but it was clear that Iraqis alone could not take care of...Second, Casey felt that sectarian violence was largely contained in all but four provinces allowing his command to start the process of transitioning

  20. Field Artillery And Fire Support At The Operational Level: An Analysis Of Operation Desert Storm and Operation Iraqi Freedom

    Science.gov (United States)

    2017-05-25

    assistance with editing and for supporting this endeavor, and to our two wonderful children , Olivia and Theodore. Our time here at Fort Leavenworth has been...Baathist regime. 7 Mary Kaldor, New and Old Wars: Organized Violence in a Global Era, 3d ed...II, 165. 33 television several hours later, denouncing the strike as a “criminal act” and calling on the Iraqi people to draw their swords

  1. Inhibiting and driving forces for the digitalization of security systems: security officers’ view on the issue

    OpenAIRE

    Lahtinen, Markus

    2007-01-01

    This memo reports on factors that drive and inhibit the digitalization of security systems. The reported factors are as follows: Technology-push factors • Need to lower costs on the end-user side, i.e. replacing labour with technology • Perceived convenience and ease-of-use of digital systems • Digital products can be connected to the current enterprise network; enabling an expanding set of security features • Firms holding the IP-capability (IP=Internet Protocol) and not h...

  2. Oil and international security: old and new issues

    International Nuclear Information System (INIS)

    Noel, P.

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  3. Gunshot Wounds in Military Working Dogs in Operation Enduring Freedom and Operation Iraqi Freedom: 29 cases (2003-2009)

    Science.gov (United States)

    2013-01-01

    oxygenmask held in proximity to the dog’s face or taped to a basket-style muzzle ) during evacuation to the VTF. None of the WIA dogs received IV crystalloid...military working dogs in Operation Enduring Freedom and Operation Iraqi Freedom: 29 cases (2003–2009) Janice L. Baker, DVM; Karyn A. Havas, DVM; Laura A...received on the battlefield, and ultimate outcome of U.S. military working dogs that incurred gunshot wound (GSW) injury in Operation Enduring Freedom

  4. Nuclear Security Management for Research Reactors and Related Facilities

    International Nuclear Information System (INIS)

    2016-03-01

    This publication provides a single source guidance to assist those responsible for the implementation of nuclear security measures at research reactors and associated facilities in developing and maintaining an effective and comprehensive programme covering all aspects of nuclear security on the site. It is based on national experience and practices as well as on publications in the field of nuclear management and security. The scope includes security operations, security processes, and security forces and their relationship with the State’s nuclear security regime. The guidance is provided for consideration by States, competent authorities and operators

  5. The 'virtual' national securities commission

    International Nuclear Information System (INIS)

    Campbell, G.A.; Benham, B.J.

    1998-01-01

    This paper describes the mandate of the Canadian Securities Administrators (CSA), a body established to ensure that Canada has an efficient and effective securities regulatory system to protect investors and a fair and efficient securities market. The CSA was created in 1937 and is comprised of the twelve provincial and territorial securities regulatory authorities. Some of the measures that the CSA has taken to improve regulatory efficiency are discussed. Among the measures highlighted are the creation of a task force on operational efficiencies in the administration of securities regulation, the development of a mutual reliance review system and a system for electronic document analysis and retrieval (SEDAR) to electronically file information to a central computer database. The CSA also adopted a system to expedite the review and receipt of short form prospectuses

  6. The Spanish Contribution to European Security and Defense

    Directory of Open Access Journals (Sweden)

    Félix Sanz

    2000-05-01

    Full Text Available The author examines Spain’s material and intellectual contributions to European security and defense. In the first place, he provides an overview of the changes in the personal qualifications of the Spanish Armed Forces and in the mentality of the military officials in adapting to the work of international organisms and to cooperation in broadlydefined schemes of security. On this point, he highlights the Spanish contribution to the missions carried out by the United Nations, OSCE and the WEU. With respect to NATO, Félix Sanz analyzes the Spanish participation before and after this country’s integrationin military structure and in the operative plans of the Alliance. Sanz also underscores the contribution made to multinational forces such as Eurocorps, Eurofor/Euromarfor, the Italian-Spanish amphibious force and, in the future, the European air group. He discussesSpain’s support for other bilateral forums for security, in particular the relation with the United States. In the area of intellectual contributions, the author underlines this country’sinterest in bringing about a convergence of defense forces, Spain’s support for a multinational military and its willingness to collaborate in the design of European defense.

  7. In Support of the Common Defense: A Homeland Defense and Security Journal. Volume 2

    Science.gov (United States)

    2013-06-01

    create a coast-to-coast, interoperable digital emergency communications network.36 Accordingly, Homeland Security Act 2002 and Homeland Security...or fixed monitor that depicts friendly forces on an easy-to-read digitized geospatial map. The number of assets being tracked directly determines...Common Defense diminished since Colombian security forces killed notorious Medellin cartel leader Pablo Escobar in 1993.74 There undeniably is an

  8. Special Report: Iraq and the Gulf States. The Balance of Fear

    National Research Council Canada - National Science Library

    Alterman, Jon B

    2007-01-01

    .... bilateral relations. The Institute is also sponsoring high-level, nonofficial dialogue between Iraqi national security and foreign policy officials and their counterparts from the neighboring countries...

  9. Willingness to Adopt Telemedicine in Major Iraqi Hospitals: A Pilot Study

    Directory of Open Access Journals (Sweden)

    Mohd Khanapi Abd Ghani

    2015-01-01

    Full Text Available The Iraqi healthcare services are struggling to regain their lost momentum. Many physicians and nurses left Iraq because of the current situation in the country. Despite plans of calling back the skilled health workforce, they are still worried by the disadvantages of their return. Hence, technology plays a central role in taking advantage of their profession through the use of telemedicine. Studying the factors that affect the implementation of telemedicine is necessary. Telemedicine covers network services, policy makers, and patient understanding. A framework that includes the influencing factors in adopting telemedicine in Iraq was developed in this study. A questionnaire was distributed among physicians in Baghdad Medical City to examine the hypothesis on each factor. The Statistical Package for the Social Sciences was utilized to verify the reliability of the questionnaire and Cronbach’s alpha test shows that the factors have values more than 0.7, which are standard.

  10. Kidnapping and Mental Health in Iraqi Refugees: The Role of Resilience.

    Science.gov (United States)

    Wright, A Michelle; Talia, Yousif R; Aldhalimi, Abir; Broadbridge, Carissa L; Jamil, Hikmet; Lumley, Mark A; Pole, Nnamdi; Arnetz, Bengt B; Arnetz, Judith E

    2017-02-01

    Although kidnapping is common in war-torn countries, there is little research examining its psychological effects. Iraqi refugees (N = 298) were assessed upon arrival to the U.S. and 1 year later. At arrival, refugees were asked about prior trauma exposure, including kidnapping. One year later refugees were assessed for posttraumatic stress disorder (PTSD) and major depression disorder (MDD) using the SCID-I. Individual resilience and narratives of the kidnapping were also assessed. Twenty-six refugees (9 %) reported being kidnapped. Compared to those not kidnapped, those who were had a higher prevalence of PTSD, but not MDD, diagnoses. Analyses examining kidnapping victims revealed that higher resilience was associated with lower rates of PTSD. Narratives of the kidnapping were also discussed. This study suggests kidnapping is associated with PTSD, but not MDD. Additionally, kidnapping victims without PTSD reported higher individual resilience. Future studies should further elucidate risk and resilience mechanisms.

  11. Bulk Electric Load Cost Calculation Methods: Iraqi Network Comparative Study

    Directory of Open Access Journals (Sweden)

    Qais M. Alias

    2016-09-01

    Full Text Available It is vital in any industry to regain the spent capitals plus running costs and a margin of profits for the industry to flourish. The electricity industry is an everyday life touching industry which follows the same finance-economic strategy. Cost allocation is a major issue in all sectors of the electric industry, viz, generation, transmission and distribution. Generation and distribution service costing’s well documented in the literature, while the transmission share is still of need for research. In this work, the cost of supplying a bulk electric load connected to the EHV system is calculated. A sample basic lump-average method is used to provide a rough costing guide. Also, two transmission pricing methods are employed, namely, the postage-stamp and the load-flow based MW-distance methods to calculate transmission share in the total cost of each individual bulk load. The three costing methods results are then analyzed and compared for the 400kV Iraqi power grid considered for a case study.

  12. Applications of nuclear safety probabilistic risk assessment to nuclear security for optimized risk mitigation

    Energy Technology Data Exchange (ETDEWEB)

    Donnelly, S.K.; Harvey, S.B. [Amec Foster Wheeler, Toronto, Ontario (Canada)

    2016-06-15

    Critical infrastructure assets such as nuclear power generating stations are potential targets for malevolent acts. Probabilistic methodologies can be applied to evaluate the real-time security risk based upon intelligence and threat levels. By employing this approach, the application of security forces and other protective measures can be optimized. Existing probabilistic safety analysis (PSA) methodologies and tools employed. in the nuclear industry can be adapted to security applications for this purpose. Existing PSA models can also be adapted and enhanced to consider total plant risk, due to nuclear safety risks as well as security risks. By creating a Probabilistic Security Model (PSM), safety and security practitioners can maximize the safety and security of the plant while minimizing the significant costs associated with security upgrades and security forces. (author)

  13. New records of xanthid crabs Atergatis roseus (Rüppell, 1830 (Crustacea: Decapoda: Brachyura from Iraqi coast, south of Basrah city, Iraq

    Directory of Open Access Journals (Sweden)

    Khaled Khassaf Al-Khafaji

    2017-06-01

    Full Text Available Specimens of the The Brachyuran crab Atergatis roseus (Ruppell, 1830, were collected for first times from Iraqi coast, south Al-Faw, Basrah city, Iraq, in coast of northwest of Arabian Gulf. Morphological features and distribution pattern of this species are highlighted and a figure is provided. The material was mostly collected from the shallow subtidal and intertidal areas using trawl net and hand.

  14. Arms Control and European Security

    Science.gov (United States)

    2012-08-01

    appraisals; • The nature of land warfare; • Matters affecting the Army’s future; • The concepts, philosophy, and theory of strategy; and • Other issues of...sophisticated Marxist theories of conflict, the balance or “correlation” of forces: political and psy- chological force fields generated in peacetime or...wider political 18 and economic considerations, within hygienic, legally enforceable, Kantian “Euro Atlantic Security Struc- tures,” the Holy Grail

  15. When Saddam falls ..

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    For much of the 1990s, one of the energy industry's most crucial questions was when would Iraqi crude return to the market. Today, that question has to be rephrased significantly, partly because so much Iraqi crude is already available under the UN Security Council's food-for-oil swap arrangements, and partly because it is not just the timing but the manner of any further liberalisation of the UN sanctions regime that needs to be considered. (author)

  16. Communications and Information: Emission Security

    National Research Council Canada - National Science Library

    1998-01-01

    The Air Force EMSEC process has experienced many changes. Although these changes were attempts to meet the variances of a dynamic world, they require security protection measures far beyond the needs of the average user...

  17. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  18. Advanced Interface for Tactical Security (AITS) Problem Analysis and Concept Definition

    National Research Council Canada - National Science Library

    Murray, S

    1999-01-01

    The Advanced Interface for Tactical Security (AITS) project was initiated to improve the task performance of security forces through technology and design improvements to information display systems...

  19. Physician Acceptance of Pharmacist Recommendations about Medication Prescribing Errors in Iraqi Hospitals

    Directory of Open Access Journals (Sweden)

    ALI AZEEZ ALI AL-JUMAILI

    2016-08-01

    Full Text Available The objectives of this study were to measure the incidence and types of medication prescribing errors (MPEs in Iraqi hospitals, to calculate for the first time the percentage of physician agreement with pharmacist medication regimen review (MRR recommendations regarding MPEs, and to identify the factors influencing the physician agreement rate with these recommendations. Methods: Fourteen pharmacists (10 females and 4 males reviewed each hand-written physician order for 1506 patients who were admitted to two public hospitals in Al-Najaf, Iraq during August 2015. The pharmacists identified medication prescribing errors using the Medscape WebMD, LCC phone application as a reference. The pharmacists contacted the physicians (2 females and 34 males in-person to address MPEs that were identified. Results: The pharmacists identified 78 physician orders containing 99 MPEs with an incidence of 6.57 percent of all the physician orders reviewed. The patients with MPEs were taking 4.8 medications on average. The MPEs included drug-drug interactions (65.7%, incorrect doses (16.2%, unnecessary medications (8.1%, contra-indications (7.1%, incorrect drug duration (2%, and untreated conditions (1%. The physicians implemented 37 (37.4% pharmacist recommendations. Three factors were significantly related to physician acceptance of pharmacist recommendations. These were physician specialty, pharmacist gender, and patient gender. Pediatricians were less likely (OR= 0.1 to accept pharmacist recommendations compared to internal medicine physicians. Male pharmacists received more positive responses from physicians (OR=7.11 than female pharmacists. Lastly, the recommendations were significantly more likely to be accepted (OR= 3.72 when the patients were females. Conclusions: The incidence of MPEs is higher in Iraqi hospitalized patients than in the U.S. and U.K, but lower than in Brazil, Ethiopia, India, and Croatia. Drug-drug interactions were the most common type of

  20. A review of video security training and assessment-systems and their applications

    International Nuclear Information System (INIS)

    Cellucci, J.; Hall, R.J.

    1991-01-01

    This paper reports that during the last 10 years computer-aided video data collection and playback systems have been used as nuclear facility security training and assessment tools with varying degrees of success. These mobile systems have been used by trained security personnel for response force training, vulnerability assessment, force-on-force exercises and crisis management. Typically, synchronous recordings from multiple video cameras, communications audio, and digital sensor inputs; are played back to the exercise participants and then edited for training and briefing. Factors that have influence user acceptance include: frequency of use, the demands placed on security personnel, fear of punishment, user training requirements and equipment cost. The introduction of S-VHS video and new software for scenario planning, video editing and data reduction; should bring about a wider range of security applications and supply the opportunity for significant cost sharing with other user groups

  1. Modernization of the Indian Air Force: Security Implications for South Asia

    National Research Council Canada - National Science Library

    2005-01-01

    This thesis analyzes the Indian Air Force's (IAF) robust modernization campaign and explores why the IAF is on the path to transforming itself from an air force dedicated to air defense to one capable of global force projection...

  2. DefenseLink: Securing Afganistan, Stabilization & Growth

    Science.gov (United States)

    since, the International Security Assistance Force, under NATO leadership, has taken charge of extensive conditions for the growth of an effective, democratic national government in Afghanistan. As the lead member

  3. Managing Transitions: Examining the Institutional Army’s Transformation Following the Vietnam War and Operation Iraqi Freedom

    Science.gov (United States)

    2015-05-23

    glance at the Middle East, especially the security of Israel and the access routes to the Persian Gulf oil .57...Anti-Air Defense (PVO-S) consisted of crudely developed aircraft, and minimally-trained pilots. Their aircraft consisted of Su-9, Su-15 and...doing so, the Army distilled the 2008 version of FM 3-0 into five simple rules. Army forces would win on the offense, initiate

  4. Japan and Iraq: A Comparison

    National Research Council Canada - National Science Library

    De For, Hans

    2007-01-01

    .... Security issues and a long-standing perception of illegitimacy for the entire operation continue to exacerbate the problem of fully and successfully transitioning to a democratic, friendly, Iraqi government...

  5. A Complex Systems Approach to More Resilient Multi-Layered Security Systems

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jones, Katherine A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Bandlow, Alisa [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Nozick, Linda Karen [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Waddell, Lucas [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Levin, Drew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Whetzel, Jonathan [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    In July 2012, protestors cut through security fences and gained access to the Y-12 National Security Complex. This was believed to be a highly reliable, multi-layered security system. This report documents the results of a Laboratory Directed Research and Development (LDRD) project that created a consistent, robust mathematical framework using complex systems analysis algorithms and techniques to better understand the emergent behavior, vulnerabilities and resiliency of multi-layered security systems subject to budget constraints and competing security priorities. Because there are several dimensions to security system performance and a range of attacks that might occur, the framework is multi-objective for a performance frontier to be estimated. This research explicitly uses probability of intruder interruption given detection (PI) as the primary resilience metric. We demonstrate the utility of this framework with both notional as well as real-world examples of Physical Protection Systems (PPSs) and validate using a well-established force-on-force simulation tool, Umbra.

  6. Security analysis of optical encryption

    OpenAIRE

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-01-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  7. Security analysis of optical encryption

    Science.gov (United States)

    Frauel, Yann; Castro, Albertina; Naughton, Thomas J.; Javidi, Bahram

    2005-10-01

    This paper analyzes the security of amplitude encoding for double random phase encryption. We describe several types of attack. The system is found to be resistant to brute-force attacks but vulnerable to chosen and known plaintext attacks.

  8. Perspectives on Energy Security

    International Nuclear Information System (INIS)

    Carlsson-Kanyama, Annika; Holmgren, Aake J.; Joensson, Thomas; Larsson, Robert L.

    2007-05-01

    A common notion of 'Energy Security' is that it includes access to energy resources without risking the the survival of the state. 'Security of supply' is most often the concept emphasized in the political discourse on energy security and it includes both production as well as secure and safe delivery of energy to the end consumers. Another aspect of energy security is the need for reducing energy consumption by improving energy efficiency. In this report, eight chapters covering these and other perspectives on energy security are presented. Six of the chapters deal with the supply perspective. Included topics cover power politics and geopolitical perspectives regarding large infrastructure projects and the ambitions of the EU in this regard. Further, methods and approaches for conducting risk analyses of electricity supply systems as well as for improving the security of digital control systems are discussed. As climate change will affect the supply and distribution of energy, one chapter presents an overview of this topic. The consumption perspective is discussed against the backdrop of research about household consumption practices and the role of climate change for future consumption levels. Finally, the role of armed forces as a large energy users is touched upon, as well as how so-called 'future studies' have dealt with energy as a topic

  9. FTO gene polymorphisms (rs9939609 and rs17817449) as predictors of Type 2 Diabetes Mellitus in obese Iraqi population.

    Science.gov (United States)

    Younus, Laith A; Algenabi, Abdul Hussein A; Abdul-Zhara, Mohammed S; Hussein, Majid K

    2017-09-05

    The variation of the SNPs in FTO (fat mass and obesity associated) gene are improved to be associated with obesity and type 2 diabetes (T2DM) in some ethnic groups for example in European while, this consistency is controversial in Asians and there were few studies in Iraqi population about the effect of this gene on the development of T2DM in obese patients. Therefore, the objective of this study is to investigate the impact of the two common FTO gene variants in the development of T2DM in obese Iraqi patients. A case-control study in which the FTO gene variants rs9939609 and rs17817449 were genotyping in a total of 800 individuals, 400 T2DM obese patients (patients group) and 400 healthy control obese volunteers (control group) to explore the relation of these SNPs with T2DM in obese Iraqi population. The patients group was enrolled from diabetic clinic in Al Najaf al Ashraf based on WHO guidelines of T2DM. From whole blood the DNA was extraction and genotyped by using ScaI and AlwNI enzymes respectively in the PCR-RFLP technique. Multinomial logistic regression was applied to compare the proportions of genotypes and alleles. The odd's ratio, t-test P value at 95% confidence interval were measured before and after adjustment of BMI, age and sex adjustment. The genetic power, Hardy Weinberg equilibrium and haplotype analysis were tested in the present study. It was observed that the presence of T allele in the two SNPs rs9939609 and rs17817449 in the FTO gene polymorphisms was associated with increased risk for the development of T2DM in Iraqi obese individuals. The minor allele (T) in rs9939609 was significantly higher (P=0.0001) in T2DM (31.25%) when compared with that of the control obese group (20%). The Homozygous genotype (TT) significantly (OR=3.25, CI 95% 1.87-5.64, P=0.000) increased the risk of T2DM by three folds with respect to those of wild type (AA) after adjustment for age, sex and BMI, furthermore, it was significantly increased the risk in the

  10. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  11. Perceptions of Job Security in Europe's Ageing Workforce

    Science.gov (United States)

    Hank, Karsten; Erlinghagen, Marcel

    2011-01-01

    Using data from the 2004 Survey of Health, Ageing and Retirement in Europe, this paper investigates older workers' perceptions of job security in eleven countries. We describe cross-national patterns and estimate multilevel models to analyse individual and societal determinants of self-perceived job security in the older labour force. While there…

  12. Effect of gamma irradiation on the sugar and protein composition of Iraqi dates

    International Nuclear Information System (INIS)

    Auda, H.; Khalaf, Z.; Mirjan, J.

    1978-01-01

    Completely ripened date fruits of several Iraqi varieties were irradiated with 30, 70, 100, 270 and 500krad of gamma irradiation and stored at a temperature of 25-35 0 C in wooden boxes or in plastic bags. At various intervals samples were taken and analysed by paper-chromatography, gas-chromatography and spectrophotometry for quantitative and qualitative changes in carbohydrates. The results showed no effect of gamma irradiation on reducing sugar and major carbohydrate components. The formation of malonaldehyde under gamma irradiation of dates and solid standard sugars was also studied up to 500krad. The results showed no formation of malonaldehyde in irradiated date samples as well as standard sugars. Gamma irradiation showed no effect on the protein content of dates. However, storage showed some reduction in the protein content of both unirradiated and irradiated samples. (author)

  13. Environmental Assessment for Proposed Security Forces Operations Facility, Buckley Air Force Base, Colorado

    National Research Council Canada - National Science Library

    Meyer, Elizabeth; Myklebust, Jessica; Denier, James; Christner, Jennifer; Fontaine, Kathyrn

    2006-01-01

    The United States Air Force (USAF) has prepared this EA in accordance with the National Environmental Policy Act to evaluate the potential environmental and social impacts from the construction and operation of the proposed SFOF...

  14. The Future Nuclear Arms Control Agenda and Its Potential Implications for the Air Force

    Science.gov (United States)

    2015-08-01

    US AIR FORCE INSTITUTE FOR NATIONAL SECURITY STUDIES USAF ACADEMY, COLORADO INSS OCCASIONAL PAPER AUGUST 2015 70 Dr. Lewis A. Dunn The Future...Implications for the Air Force Dr. Lewis A. Dunn INSS Occasional Paper 70 August 2015 USAF Institute for National Security Studies USAF

  15. Private Military and Security Contractors

    DEFF Research Database (Denmark)

    In Private Military and Security Contractors: Controlling the Corporate Warrior a multinational team of 16 scholars and a practitioner from political science, sociology, and law address a developing phenomenon: controlling the use of privatized force by states in international politics. Robust...

  16. The pharmaceuticalisation of security: Molecular biomedicine, antiviral stockpiles, and global health security.

    Science.gov (United States)

    Elbe, Stefan

    2014-12-01

    Pharmaceuticals are now critical to the security of populations. Antivirals, antibiotics, next-generation vaccines, and antitoxins are just some of the new 'medical countermeasures' that governments are stockpiling in order to defend their populations against the threat of pandemics and bioterrorism. How has security policy come to be so deeply imbricated with pharmaceutical logics and solutions? This article captures, maps, and analyses the 'pharmaceuticalisation' of security. Through an in-depth analysis of the prominent antiviral medication Tamiflu , it shows that this pharmaceutical turn in security policy is intimately bound up with the rise of a molecular vision of life promulgated by the biomedical sciences. Caught in the crosshairs of powerful commercial, political, and regulatory pressures, governments are embracing a molecular biomedicine promising to secure populations pharmaceutically in the twenty-first century. If that is true, then the established disciplinary view of health as a predominantly secondary matter of 'low' international politics is mistaken. On the contrary, the social forces of health and biomedicine are powerful enough to influence the core practices of international politics - even those of security. For a discipline long accustomed to studying macrolevel processes and systemic structures, it is in the end also our knowledge of the minute morass of molecules that shapes international relations.

  17. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  18. Fact Sheet on Sources and Uses of U.S. Funding Provided in Fiscal Year 2006 for Iraq Relief and Reconstruction

    National Research Council Canada - National Science Library

    2007-01-01

    ... about $5.4 billion, in additional non-IRRF funding made available in FY 2006, to four separate funds, for various relief and reconstruction projects in Iraq, including training of Iraqi security...

  19. Iraq: Impediments to Democracy and the Role of Coalition Forces

    National Research Council Canada - National Science Library

    McChesney, Warren

    2004-01-01

    As USCENTCOM commander General Tommy Franks suspected might be the case when he urged planners to anticipate the possibility of catastrophic victory, the military outcome of Operation Iraqi Freedom was never in doubt...

  20. Improving Energy Security for Air Force Installations

    Science.gov (United States)

    2015-09-01

    equipment, and habitat destruction from general construction (DoE, “ Wind Turbine Interactions with Birds , Bats, and Their Habitats,” pgs 2-4). Another...utility-resource-efficiency>, accessed 16 December 2014. Department of Energy, Wind Turbine Interactions with Birds , Bats, and Their Habitats... Wind power is a mature technology, with wind turbines first being used for electricity in the late 19th century. The Air Force operates two wind

  1. An integrated approach to validation of safeguards and security program performance

    International Nuclear Information System (INIS)

    Altman, W.D.; Hunt, J.S.; Hockert, J.W.

    1988-01-01

    Department of Energy (DOE) requirements for safeguards and security programs are becoming increasingly performance oriented. Master Safeguards and Security Agreemtns specify performance levels for systems protecting DOE security interests. In order to measure and validate security system performance, Lawrence Livermore National Laboratory (LLNL) has developed cost effective validation tools and a comprehensive validation approach that synthesizes information gained from different activities such as force on force exercises, limited scope performance tests, equipment testing, vulnerability analyses, and computer modeling; into an overall assessment of the performance of the protection system. The analytic approach employs logic diagrams adapted from the fault and event trees used in probabilistic risk assessment. The synthesis of the results from the various validation activities is accomplished using a method developed by LLNL, based upon Bayes' theorem

  2. Secure Transmission of Cooperative Zero-Forcing Jamming for Two-User SWIPT Sensor Networks.

    Science.gov (United States)

    Tang, Xuanxuan; Cai, Yueming; Yang, Wendong; Yang, Weiwei; Chen, Dechuan; Hu, Junquan

    2018-01-24

    In this paper, the secrecy performance of the two-user simultaneous wireless information and power transfer (SWIPT) sensor networks is studied and a novel secure transmission scheme of cooperative zero-forcing (ZF) jamming is proposed. The two sensors opportunistically conduct the SWIPT and cooperative ZF jamming, respectively, where the energy required for jamming the eavesdropper is provided by the SWIPT operation so as to keep the energy balance at the sensors in the long run. By deriving the exact closed-form expressions of the secrecy outage probability and the secrecy throughout, we provide an effective approach to precisely assess the impacts of key parameters on the secrecy performance of the system. It has been shown that the secrecy outage probability is a monotonically increasing function of the growth of secrecy rate ( R s ), and a monotonically decreasing function of the increase of the transmit signal-to-noise ratio ( γ S ), and energy conversion efficiency ( η ). Furthermore, the secrecy throughput could be enhanced when η increases, which becomes especially obvious when a large γ S is provided. Moreover, the existence of an optimum R s maximizing the secrecy throughput is depicted, which also grows with the increase of γ S . Simulations are provided for the validation of the analysis.

  3. What happened to the Iraqi Marsh Arabs and their land?:the myth about Garden of Eden and the noble savage

    OpenAIRE

    Adriansen, Hanne Kirstine

    2004-01-01

    In the aftermath of the 2003 war against Iraq, the newspapers are full of stories about the monstrosities of Saddam Hussein’s regime. One example is the destruction of the Iraqi marshlands leading to severe consequences for the human and wildlife population. While the responsibility for the atrocity against the Marsh Arabs is Saddam Hussein’s, the desiccation of the marsh environment can be ascribed to a number of the hydro-political decisions made in the catchment area of the Euphrates and T...

  4. Expeditionary Border Security Operations: Eliminating the Seams

    National Research Council Canada - National Science Library

    Zinno, Michael J

    2008-01-01

    .... This convergence greatly expands the scope and capability of each individual terrorist or criminal organization and the cumulative effect can overwhelm the security forces of many nations and provide...

  5. Net-Centric Sustainment and Operational Reach on the Modern Battlefield

    Science.gov (United States)

    2012-05-17

    Halliday, Marc L. Robbins , and Kenneth J. Girardini. "Sustainment of Army Forces in Operation Iraqi Freedom: Battlefield Logistics and Effects on Operations... Robbins , Kenneth J. Girardini, Rick Eden, John M. Halliday, and Jeffrey Angers. "Operation Iraqi Freedom: Major Findings and Recommendations...Timothy P. Williams, Tony R. Sherrill, Amy R. McGrath, Morris G. Hayes, Antoniette C. McGrady, and John M. Sheckler. "Logistics Command and Control

  6. Hard Lessons: The Iraq Reconstruction Experience

    Science.gov (United States)

    2009-02-01

    only the top three levels of the Ba’ath Party should have been subject to the order. It would have had a far “less disen- franchising impact” if it had...of the Iraqi military, and give Iraqis a sense of ownership of security in their communities.42 CJTF-7 began training the first six ICDC battalions...scheduled for 2005. During Negroponte’s tenure, the U.S. government reallocated $4.41 billion of IRRF 2.3 IRMO vs . PCO Negroponte took the helm of a

  7. The Study on Progression for Consolidating the Nuclear Security Legislative System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jae San; Jung, Myung Tak [Korea Institute of Nuclear Nonproliferation and Control, Daejeon (Korea, Republic of)

    2015-05-15

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next.

  8. The Study on Progression for Consolidating the Nuclear Security Legislative System

    International Nuclear Information System (INIS)

    Kim, Jae San; Jung, Myung Tak

    2015-01-01

    One is the International Convention for Suppressing Acts of Nuclear Terrorism (ICSANT) and the other is amendment to the Convention on Physical Protection of Nuclear Material (CPPNM). ICSANT and CPPNM were proposed by the UN and IAEA, respectively to strengthen the international framework of nuclear security. The ICSANT was entered into force in 2007, but CPPNM amendment is pending in force because the shortage of countries who ratify it. For going into effect this convention, it needs the two-thirds of the States Parties to the CPPNM. It is not completed, yet. So, various initiatives such as nuclear security summit, GICNT, UN ministerial conference, etc. treated that those two conventions were the primary basis to strengthen the global nuclear security architecture. The Republic of Korea (ROK) continuously has made an effort to consolidate the nuclear security legislative framework since the 2010. The purpose of this paper is to provide what we did to strengthen the nuclear security legal framework and what should we do next

  9. Iraq: Post-Saddam Governance and Security

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2006-01-01

    ..., %%Strategy for Victory," the Bush Administration indicates that U.S. forces will remain in Iraq until the country is able to provide for its own security and does not serve as a host for radical Islamic terrorists...

  10. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-01-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur

  11. Safety/security interface assessments at commercial nuclear power plants

    International Nuclear Information System (INIS)

    Byers, K.R.; Brown, P.J.; Norderhaug, L.R.

    1985-07-01

    The findings of the Haynes Task Force Committee (NUREG-0992) are used as the basis for defining safety/security assessment team activities at commercial nuclear power plants in NRC Region V. A safety/security interface assessment outline and the approach used for making the assessments are presented along with the composition of team members. As a result of observing simulated plant emergency conditions during scheduled emergency preparedness exercises, examining security and operational response procedures, and interviewing plant personnel, the team has identified instances where safety/security conflicts can occur. 2 refs

  12. The Flask Security Architecture: System Support for Diverse Security Policies

    Science.gov (United States)

    2006-01-01

    Flask microkernel -based operating sys­ tem, that successfully overcomes these obstacles to pol- icy flexibility. The cleaner separation of mechanism and...other object managers in the system to en- force those access control decisions. Although the pro­ totype system is microkernel -based, the security...mecha­ nisms do not depend on a microkernel architecture and will easily generalize beyond it. The resulting system provides policy flexibility. It sup

  13. Nuclear security from cradle to grave

    International Nuclear Information System (INIS)

    Raja Adnan, Raja Abdul Aziz

    2016-01-01

    On 8 May 2016, the Amendment to the Convention on the Physical Protection of Nuclear Material (CPPNM) finally entered into force, almost eleven years after its adoption. The world will be a more secure place as a result of the commitments that States party to the Amendment have made. The Amendment establishes legally binding commitments for countries to protect nuclear facilities as well as nuclear material in domestic use, storage and transport. Under the Amendment, countries are required to establish appropriate physical protection regimes for nuclear material. They also take on new obligations to share information on sabotage, including on credible threats of sabotage. The entry into force of the Amendment demonstrates the international community’s resolve to act together to strengthen nuclear security globally. It also helps reduce the risk of an attack involving nuclear material, which could have catastrophic consequences.

  14. A security/safety survey of long term care facilities.

    Science.gov (United States)

    Acorn, Jonathan R

    2010-01-01

    What are the major security/safety problems of long term care facilities? What steps are being taken by some facilities to mitigate such problems? Answers to these questions can be found in a survey of IAHSS members involved in long term care security conducted for the IAHSS Long Term Care Security Task Force. The survey, the author points out, focuses primarily on long term care facilities operated by hospitals and health systems. However, he believes, it does accurately reflect the security problems most long term facilities face, and presents valuable information on security systems and practices which should be also considered by independent and chain operated facilities.

  15. Iraqi, Syrian, and Palestinian Refugee Adolescents' Beliefs About Parental Authority Legitimacy and Its Correlates.

    Science.gov (United States)

    Smetana, Judith G; Ahmad, Ikhlas; Wray-Lake, Laura

    2015-01-01

    This study examined intra- and interindividual variations in parental legitimacy beliefs in a sample of 883 Arab refugee adolescents (M(age) = 15.01 years, SD = 1.60), 277 Iraqis, 275 Syrians, and 331 Palestinians in Amman, Jordan. Confirmatory factor analyses showed distinct latent factors for moral-conventional, prudential, and personal legitimacy items. Older adolescents rated legitimacy lower for personal issues, but higher for prudential issues. Beliefs were associated with socioeconomic status (fathers' education, family size), particularly for personal issues, but were more pervasively associated with displacement-related experiences. Greater war trauma was associated with less prudential legitimacy for all youth and more authority legitimacy over moral-conventional issues for Syrian youth. Greater hopefulness was associated with more authority legitimacy over all but personal issues. © 2015 The Authors. Child Development © 2015 Society for Research in Child Development, Inc.

  16. The pilot and evaluation of a postnatal support group for Iraqi women in the year following the birth of their baby

    OpenAIRE

    Rooney, Rosanna M.; Kane, Robert T.; Wright, Bernadette; Gent, Vanessa; Di Ciano, Taralisa; Mancini, Vincent

    2014-01-01

    The current study involved conducting a pilot test of a culturally sensitive support group program developed to assist Iraqi women in the year following the birth of their baby (CSSG-B) in Perth, Western Australia. The aim of this study was to evaluate the social validity of the program. It was hypothesised that women involved in the program would find the program to be socially valid and culturally appropriate, and will also report lower levels of depressive symptomatology and higher levels ...

  17. Security assessment in harbours: parameters to be considered

    Energy Technology Data Exchange (ETDEWEB)

    Romero Faz, D.; Camarero Orive, A.

    2016-07-01

    The ports are the main node in the supply chain and freight transportation. The terrorist attacks of September 11, 2001 marked a turning point in global security. Following this event, and from then on, there is a widespread fear of an attack on commercial ports. The development of the International Ship and Port Facility Security (ISPS) Code of the International Maritime Organization (IMO), and the implementation of the measures derived from it, have significantly improved security at port facilities. However, the experience in recent decades indicates the need for adjustments in the security assessment, in order to improve risk assessment, which is sometimes either underestimated or overestimated. As a first result of the investigation, new parameters for assessing security are proposed considering new aspects on the basis of an analysis of the main methodologies specific to port facilities, the analysis of surveys of the responsible managers for the security of the Spanish port system, and the analysis of the security statistics obtained through security forces. (Author)

  18. Labor force activity after 60

    DEFF Research Database (Denmark)

    Pedersen, Peder J.; Larsen, Mona

    2015-01-01

    of reference. Main emphasis is given to the development in two distint age groups, i.e. people in the first half of the 60s of which many are eligible for early retirement programs and people older than 65 mostly eligible for social security retirement programs. For these two age groups the actual development...... in labor force participation is described based on register data and on labor force surveys along with indicators of cohort relevant changes in education and health. Focus in the paper includes also the gender aspect to accommodate stronger cohort effects for women than for men. The impact on labor force...

  19. The African Standby Force and Regional Security Integration

    DEFF Research Database (Denmark)

    Mandrup, Thomas

    2015-01-01

    the challenges facing the region? The regional enmities between the states seem to be widespread, deep-rooted and of a nearly chronic nature. In June 2015 the African Union and its member-states announced that they expected the five regionally based standby brigades to be fully operational by December 2015....... The readiness is to be tested at a continental field exercise, Amani Africa 11 to take place in South Africa October 2015. (Defence Web, 2015) The article will start by mapping out the security dynamics and architecture in East Africa, including its membership circles and priorities. The article...

  20. Engagement and Implications for Future National Security Strategies: Can the Services Adapt

    National Research Council Canada - National Science Library

    Hodge, Michael

    2000-01-01

    ...: mission profiles beyond the design of US armed forces, debate over the role of US armed forces within an "engagement" construct, debate over the future nature of US Security Policy and doctrinal...

  1. Understanding Southern Influence in Cyberspace Security and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... it a matter of national security - is perhaps the most important force shaping global communications today. ... The project will provide evidence of the benefits of openness in cyberspace that can inform international ... Training materials.

  2. Pre- and post-displacement stressors and time of migration as related to self-rated health among Iraqi immigrants and refugees in Southeast Michigan.

    Science.gov (United States)

    Jamil, Hikmet; Nassar-McMillanb, Sylvia; Lambert, Richard; Wangd, Yun; Ager, Joel; Arnetz, Bengt

    2010-01-01

    The objective of this study was to determine whether perceived health status of Iraqi immigrants and refugees residing in the United States was related to pre-migration environmental stress, current unemployment, and if they had emigrated before or after the 1991 Gulf War. A random sample of Iraqis residing in Southeast Michigan, US, was interviewed using an Arab language structured survey. The main outcome measure was self-rated health (SRH). Major predictors included socioeconomics, employment status, pre-migration environmental stress, and health disorders. Path analysis was used to look at mediating effects between predictors and SRH. We found that SRH was significantly worse among participants that had left Iraq after the 1991 Gulf War. Unemployment and environmental stress exposure were inversely related to SRH. There was a direct path between Gulf War exposure and poor health. In addition, there were indirect paths mediated through psychosomatic and psychiatric disorders to SRH. Another path went from Gulf War exposure, via environmental stress and somatic health to poor health. Unemployment had a direct path, as well as indirect paths mediated through psychiatric and psychosomatic disorders, to poor self-rated health. In conclusion, these results suggest that pre- as well as post-migration factors, and period of migration, affect health.

  3. Security and Stability in Africa: A Development Approach

    Science.gov (United States)

    2010-01-01

    Dar el Salaam in 1998, and against Israeli interests in Kenya in 2002. Wars, lawlessness, and corruption have also fostered international crime on...operations are an important way for military forces to foster stability and security through economic and political development. These operations show...security and exports of unwisely breaking up large commercial farms. Within families, such dualism also exists, which is a legacy of colonial policies

  4. Metabolic syndrome in Iraqi female patients with major β-thalassemia

    Directory of Open Access Journals (Sweden)

    Shaemaa Hadi Abdulsada

    2017-02-01

    Full Text Available Patients with β-thalassemia may have an increased risk for diabetes mellitus and cardiovascular diseases due to high level of iron which may lead to insulin resistanceand metabolic syndrome. So this study aimed to evaluate the levels of lipids profile in Iraqi female patients with β-thalassemia. Forty twofemale (age 15-30 years were enrolled in this study. Blood was collected and the sera were separated from (22 female patients with β-thalassemia who were attended the Ibn-Al-Baladi hospital from September 2012 to January 2013 and (20 healthy subject as a control group. Body mass index (BMI, lipid profile, FSG, insulin, insulin resistance, insulin sensitivity, B-cell function, iron, atherogenic index of serum were estimated. The results showed the presence of a significant increase in serum iron and significant decrease in insulin, B-cell function, LDL, VLDL, and TC in serum of patients with β-thalassemia when compared with control group. BMI also showed a significant decrease in patients when compared with the controls. Serum Insulin resistance, insulin sensitivity, HDL, TG, AIS, and FSG showed no-significant differences in patients with β-thalassemia when compared with control group. We concluded there was no metabolic syndrome in female patients with β-thalassemia.

  5. The Australian Defence Force: Broadened Concepts of Security Operations

    National Research Council Canada - National Science Library

    Wing, Ian

    1998-01-01

    ...-fighting role and could result in fundamental force structure and resource changes. More Australian Government policy changes are possible, and increased participation in counter-drug operations has been foreshadowed...

  6. U.S.-Iraq Strategic Framework and Status of Forces Agreement: Congressional Response

    National Research Council Canada - National Science Library

    Weed, Matthew C

    2008-01-01

    On November 26, 2007, President Bush and Iraqi Prime Minister Nouri al Maliki co-signed the Declaration of Principles for a Long-Term Relationship of Cooperation and Friendship Between the Republic...

  7. The evolution of civil society and the rule of law regarding female genital mutilation in Iraqi Kurdistan.

    Directory of Open Access Journals (Sweden)

    R. Cardone

    2015-04-01

    Full Text Available International human rights law relies on state sovereignty to localize suggested policy with codification and enforcement in an attempt to reconcile universalism with particularity. However, amidst domestic governance developments from post-conflict state building and self-determination, governmental instability complicates and often overlooks priorities of international human rights for more tangible domestic infrastructure, such as basic human needs rather than seemingly suggested rights ideals. This does not diminish the significance of human rights, though, pertaining to the rights of the child in addressing gender-based violence through the elimination of female genital mutilation, for example. While state-centric localization is currently prioritized for implementing international law, the rule of law is more integrated throughout the realms of societal structure, culture, and institutions in addition to the legal realm. If the legal realm is disrupted with instability, violence, and discontinuity, how does society internalize and integrate international human rights law over time, and can it be sustainable despite instability? This research evaluates the development of the rule of law, and its effectiveness, regarding female genital mutilation (FGM as a case study in Iraqi Kurdistan from the end of the Iran-Iraq War in 1988 until 2013, the early years of the Kurdistan Regional Government’s parliament. Comprehensive rule of law evolution can be measured through comparing domestic legal developments through state-centric policy and enforcement, or lack thereof, with cultural internalization and non-governmental engagements. By studying the legal and cultural realms’ interaction with the anti-FGM discourse over Iraqi Kurdistan’s past two decades, this research will determine the role of a continuous society overlaid by intermittent legal structures in the sustainability of negotiating cultural relativity with universal human rights.

  8. Reproductive Fecundity of Iraqi Awassi Ewes Immunized against Synthetic Inhibin-α Subunit or Steroid-Free Bovine Follicular Fluid.

    Science.gov (United States)

    Al-Saaidi, Jabbar Abbas Ahmed; Khudair, Khalisa Khadim; Al-Kafaji, Sura Safe Aubaes

    2018-03-02

    The present study was conducted to investigate the impacts of active and passive immunization against synthetic inhibin and steroid-free bovine follicular fluid, respectively, on reproductive fecundity out of breeding season in Iraqi Awassi ewes. Follicular fluid was aspired from mature bovine follicles, treated with activated charcoal, and used for immunization of male rabbits for obtaining steroid free bovine follicular fluid (SFBFF) antiserum. Forty non-pregnant Awassi ewes were allocated into 4 groups (n = 10 each). At day 38 of experiment, ewes were treated with intra-vaginal MPA sponge (60 mg for 12 days). Ewes were treated at 0, 28, and 50 days with 4, 2 and 2 ml of normal saline (control; C-ve), 400, 200 and 200 µl of ovalbumine (C+ve), 400, 200 and 200 µl of inhibin (SI group), and 4 ml of normal saline at 0 day, and 4ml and 2ml of SFBFF antiserum, at 28, and 50 days (AI group). After mating with Awassi rams, pregnancy and embryo number were diagnosed using ultrasonography. Blood samples were collected at 30, 60, 90, and 120 days of pregnancy, for assessment of estradiol-17β (E2) and progesterone (P4) levels. After parturition, numbers of delivered lambs were recorded. The results revealed significant increase of P4 and significant decrease of E2 levels in SI and AI pregnant ewes than controls at 30, 60 and 90 day. Newborn number increased significantly in SI and AI treated than control ewes. Active or passive immunization against endogenous inhibin could augment reproductive fecundity out of breeding season in Iraqi Awassi ewes.

  9. Communications and Integration Enhancements to Improve Homeland Security

    National Research Council Canada - National Science Library

    Sando, Terrance W

    2007-01-01

    .... Homeland Security responses. These technology enhancements and processes combined with the force capabilities that the National Guard has recently created, when integrated with other national capabilities, will greatly improve...

  10. Mobile Detection Assessment and Response Systems (MDARS): A Force Protection, Physical Security Operational Success

    National Research Council Canada - National Science Library

    Shoop, Brian; Johnston, Michael; Goehring, Richard; Moneyhun, Jon; Skibba, Brian

    2006-01-01

    ... & barrier assessment payloads. Its functions include surveillance, security, early warning, incident first response and product and barrier status primarily focused on a depot/munitions security mission at structured/semi-structured facilities...

  11. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  12. Impact of Population Aging on Military and Security Policy

    Directory of Open Access Journals (Sweden)

    Martina Šimková

    2014-12-01

    Full Text Available Population ageing is among the most important problems of developed European countries and the most frequently discussed social issues. The Czech Republic also faces population ageing and we cannot expect a different trend in the future. Life expectancy has increased due to better health care while current lifestyle often leads to lower natality, resulting in a negative rate of natural increase and a decreasing proportion of young people in population in the future. This problem affects all spheres of life and social and economic development. Population ageing may pose a threat to the security of the population in different ways. The functioning of the security system may be threatened due to decreasing workforce. Population ageing may undercut resources for military budgets. Young recruits represent an important part of military forces and the latter are competing in the labour market with more attractive occupations. Especially ensuring the stability of the personnel needed for securing crisis situations would be a significant problem of near future. This paper presents a demographic perspective on staffing and correct operation of military forces in the context of population ageing. It describes the current situation of human resources in the military policy of the Czech Republic and determines the negative impact of population ageing on recruitment potential. It deals with the sustainability of human resources for security forces.

  13. Countering North Korean Special Purpose Forces

    National Research Council Canada - National Science Library

    Krause, Troy

    1999-01-01

    As United States and Republic of Korea forces stand to defend against a DPRK attack, one of the most formidable tasks is how to counter a second front in the Joint Rear Security Area of the Republic of Korea...

  14. Breaking a chaos-noise-based secure communication scheme

    Science.gov (United States)

    Li, Shujun; Álvarez, Gonzalo; Chen, Guanrong; Mou, Xuanqin

    2005-03-01

    This paper studies the security of a secure communication scheme based on two discrete-time intermittently chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) The key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-plaintext attacks. The first two defects mean that the scheme is not secure enough against brute-force attacks, and the third one means that an attacker can easily break the cryptosystem by approximately estimating the secret key once he has a chance to access a fragment of the generated keystream. Yet it remains to be clarified if intermittent chaos could be used for designing secure chaotic cryptosystems.

  15. Diversity Intersects with National Security.

    Science.gov (United States)

    Chew, Cassie

    2003-01-01

    Describes how the United Negro College Fund's Institute for International Public Policy is preparing to host a series of open-ended discussions with top government and business officials on the importance of a diverse work force as a national security imperative, as well as a competitive advantage in a global economy. (EV)

  16. Modelling mobility aspects of security policies

    NARCIS (Netherlands)

    Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.; Barthe, G.; Burdy, L.; Huisman, Marieke; Lanet, J.-L.; Muntean, T.

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of

  17. Air Force Strategy: Sovereign Options for Securing Global Stability and Prosperity

    National Research Council Canada - National Science Library

    2008-01-01

    ... competition for resources and influence. This strategic context demands that we retain our position of international political and military leadership because security and economic health closely intertwine with international political...

  18. Secure and documented screwing down of Castor containers

    International Nuclear Information System (INIS)

    Yilmaz, Asir; Junkers, Patrick

    2011-01-01

    The castor container is sealed using a multiple lid system comprising a primary lid and a secondary lid. The two lids are positioned one above the other and screwed securely to the body of the container. In addition, the tightness of the lids is guaranteed by a special metal seal. A further steel plate is screwed securely over the lids providing additional protection for the lids from moisture and various influences. The central element connecting the lids to the container comprises fixed threaded connections which must be accurately tightened with a torque of 900 Nm, 1500 Nm or more. The basic function of a threaded connection, in terms of a positive fit and detachable joint, is to join together two or more parts in such a way that they always behave as a single part whatever operational forces are present. This can only be achieved by means of an accurate and sufficient pre-tensioning force. This pretensioning force is transferred to the threaded connection with the help of a particular torque and presses the components together. This loading brought about by the pretensioning force is referred to as the prestress. In order to create a correct and high quality connection, this prestress must be arrived at in an optimum manner. The prestress must therefore be high enough to withstand the full loading for which the connection is designed. In addition the connection should not come loose unintentionally if it is exposed to externally acting forces. Since under no circumstances should threaded connections on a castor container fail, a suitable screwing process must guarantee that this does not happen. The securing of threaded joints can only be ensured by introducing and maintaining a constant and accurate prestress. VDI Guideline 2230, Part 1, mentions various threaded connection or tightening processes, including torque-controlled tightening, angle-controlled tightening and yield-controlled tightening. (orig.)

  19. Secure and documented screwing down of Castor containers

    Energy Technology Data Exchange (ETDEWEB)

    Yilmaz, Asir; Junkers, Patrick [HYTORC - Barbarino und Kilp GmbH, Krailling (Germany)

    2011-07-01

    The castor container is sealed using a multiple lid system comprising a primary lid and a secondary lid. The two lids are positioned one above the other and screwed securely to the body of the container. In addition, the tightness of the lids is guaranteed by a special metal seal. A further steel plate is screwed securely over the lids providing additional protection for the lids from moisture and various influences. The central element connecting the lids to the container comprises fixed threaded connections which must be accurately tightened with a torque of 900 Nm, 1500 Nm or more. The basic function of a threaded connection, in terms of a positive fit and detachable joint, is to join together two or more parts in such a way that they always behave as a single part whatever operational forces are present. This can only be achieved by means of an accurate and sufficient pre-tensioning force. This pretensioning force is transferred to the threaded connection with the help of a particular torque and presses the components together. This loading brought about by the pretensioning force is referred to as the prestress. In order to create a correct and high quality connection, this prestress must be arrived at in an optimum manner. The prestress must therefore be high enough to withstand the full loading for which the connection is designed. In addition the connection should not come loose unintentionally if it is exposed to externally acting forces. Since under no circumstances should threaded connections on a castor container fail, a suitable screwing process must guarantee that this does not happen. The securing of threaded joints can only be ensured by introducing and maintaining a constant and accurate prestress. VDI Guideline 2230, Part 1, mentions various threaded connection or tightening processes, including torque-controlled tightening, angle-controlled tightening and yield-controlled tightening. (orig.)

  20. Norwegian Security Determinants: Deterrence and Reassurance.

    Science.gov (United States)

    1984-03-01

    September 1979, pp. 20-25; Rear Admiral 104 |eve Roy Breivik , R.N.N., Inspector General, "Assuring the Security of Reinforcements to Norway," NATO’s Fift...2-15; a:zc $ Patrick Wall, "The Third Battle of the Atlantic," i Power, July 1981, pp. 52-57. 11 Richard K. Betts, "Surprise Attack: NATO’s...Force," NATO’s Fifteen Nations, December 1977-January 1978, pp. 81-89. 186 Breivik , Pear Admiral Roy, R.N.N., "Assuring the Security: of Reinforcements

  1. Physical security workshop summary: entry control

    International Nuclear Information System (INIS)

    Eaton, M.J.

    1982-01-01

    Entry control hardware has been used extensively in the past to assist security forces in separating the authorized from the unauthorized at the plant perimeter. As more attention is being focused on the insider threat, these entry control elements are being used to extend the security inspectors' presence into the plant by compartmentalizing access and monitoring vital components. This paper summarizes the experiences expressed by the participants at the March 16 to 19, 1982 INMM Physical Protection Workshop in utilizing access control and contraband detection hardware for plant wide entry control applications

  2. Sustainment in the Army 2020: Using the Army’s Sustainment Principles to Identify and Mitigate Risks Associated with Organizational Change

    Science.gov (United States)

    2015-06-12

    2003. Accessed February 2, 2015. http://articles.latimes.com/ 2003/jul/24/world/fg-troops24. Silverman , David . Interpreting Qualitative Data: A Guide...IraqiFreedomText.pdf. 127 Gregory Fontenot, E. J. Degen, and David Tohn, On Point–The United States Army in Operation Iraqi Freedom (Fort...ground forces in OIF I and shows the axis of advance for both the 1st MEF and V Corps. Source: Gregory Fontenot, E. J. Degen, and David Tohn, On

  3. European security and defense policy and its implications for Turkey

    OpenAIRE

    Özköse, Ö Faruk

    2002-01-01

    Cataloged from PDF version of article. The “European Security and Defense Policy” is an evolving process. Since the Maastricht Treaty (1991), the European Union members have been trying to constitute a common security and defense policy within the framework of Common Foreign and Security Policy, second pillar of the European Union. The efforts to create “separable but not separate” European forces within NATO have increased speed in the last years and changed direction towar...

  4. ECONOMIC SECURITY – NEW APPROACHES IN THE CONTEXT OF GLOBALIZATION

    Directory of Open Access Journals (Sweden)

    Gabriel ANDRUSEAC

    2015-08-01

    Full Text Available Nowadays, more than ever, economic relations between states are the ones that define the general character of the relations between them and establish economic security as a concept which cannot be neglected anymore. Globalization, the process that shapes the international environment, undermines the old definition of economic security and forces its redefinition. The article aims to identify and analyse the effects of globalization on economic security and the new approaches it takes in this context.

  5. Cold Vacuum Dryer (CVD) Facility Security System Design Description. System 54

    International Nuclear Information System (INIS)

    WHITEHURST, R.

    2000-01-01

    This system design description (SDD) addresses the Cold Vacuum Drying (CVD) Facility security system. The system's primary purpose is to provide reasonable assurance that breaches of security boundaries are detected and assessment information is provided to protective force personnel. In addition, the system is utilized by Operations to support reduced personnel radiation goals and to provide reasonable assurance that only authorized personnel are allowed to enter designated security areas

  6. Operation Iraqi Freedom: DOD Should Apply Lessons Learned Concerning the Need for Security over Conventional Munitions Storage Sites to Future Operations Planning

    National Research Council Canada - National Science Library

    D'Agostino, Davi M

    2007-01-01

    The Government Accountability Office (GAO) is releasing a report today on lessons learned concerning the need for security over conventional munitions storage sites that provides the basis for this testimony...

  7. It’s Not New: Historical U.S. Army Security Forces Assistance Efforts

    Science.gov (United States)

    2012-12-06

    obligation.30 In a recent article published by Small Wars Journal, Kip Whittington , a research associate at the National Defense University...operations in Afghanistan, Whittington believes that building capable indigenous national security institutions meets U.S. and international security...29Ibid., 11. 30Ibid. 31Kip Whittington , “An Afghanistan Without Institutions: A World Without Rest,” Small Wars Journal 8, no. 2 (February 2012

  8. Denial technology, the neglected security element

    International Nuclear Information System (INIS)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection

  9. Privatisation of Security: Private Military Contractors Serving Governments

    Directory of Open Access Journals (Sweden)

    Jarosław Piątek

    2017-12-01

    Full Text Available Privatisation of security did not appear in the process of revolution. Under conditions of deepening international relations, as well as integration and globalisation processes, security of the state, as well as other entities, is subject to a number of dependencies. The article casts some doubt on how much states are prepared to take such actions, while not losing the attribute of monopoly on violence. Moreover, the article presents doubts about the ranks of modern armed forces. Private Military Firms (PMFs are new actors the actions of which affect the security. The contemporary image of the PMF functioning is a phenomenon on a global scale. In the twenty-first century, small businesses can have a huge impact on the reality and international affairs. Leaving military firms without state control proves that they do not understand the dynamics, range, risks and challenges posed by cooperation with entities that are allowed to use force. Furthermore, despite devastating consequences that occurred during the state stabilisation operations, these firms continued to outsource services to contractors, while not creating any legal control over them.

  10. Mental health challenges of LGBT forced migrants

    Directory of Open Access Journals (Sweden)

    Ariel Shidlo

    2013-04-01

    Full Text Available Many LGBT forced migrants have significant and sometimesincapacitating psychological scars. Mental health providers can assistin documenting the psychological impact of anti-LGBT persecutionand its impact on the ability to secure refugee status.

  11. Defense Science Board Task Force on Mobility

    National Research Council Canada - National Science Library

    Tuttle, Jr, William G

    2005-01-01

    .... national security objectives as it is today. Both the 2001 and 2005 National Defense Strategy objectives place greater emphasis than in the past on the nation's worldwide commitments, increasing the demand for responsive forces capable...

  12. Inside the Wire: American Security and Cyber Warfare

    Science.gov (United States)

    2017-03-01

    Roberts, Kerry V. " SUN TZU and The Art of Cyber Warfare." Journal of Counterterrorism & Homeland Security International 19, no. 1(Spring 2013): 12-4...12. REPORT TYPE 3. DATES COVERED (From - To) 01-03-2017 Bibliography 4. TITLE AND SUBTITLE Sa. CONTRACT NUMBER Inside the Wire: American Security...MCDERMOTT LIBRARY U.S. AIR FORCE ACADEMY 11. SPONSOR/MONITOR’S REPORT USAF ACADEMY CO 80840-6214 NUMBER(S) Special Bibliography Series # 119 12

  13. Monte Carlo study of holding forces for tank cars on grades

    Science.gov (United States)

    2013-04-15

    This paper describes a numerical procedure to examine the holding forces needed to secure a cut of railroad tank cars staged on a grade during loading and unloading operations. Holding forces are created by applying emergency brake systems and blocki...

  14. Securing military information systems on public infrastructure

    CSIR Research Space (South Africa)

    Botha, P

    2015-03-01

    Full Text Available to set up in time for scenarios which require real time information. This may force communications to utilise public infrastructure. Securing communications for military mobile and Web based systems over public networks poses a greater challenge compared...

  15. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  16. The development and significance of the DOE Safeguards and Security standards and criteria

    International Nuclear Information System (INIS)

    Toman, J.

    1987-01-01

    In October 1985, the DOE Assistant Secretary for Defense Programs created a task force to develop inspection standards and criteria for Safeguards and Security. These standards and criteria (S/C) would provide the DOE Inspection and Evaluation (I and E) teams with the guidance needed to assess the security posture of DOE's nuclear and other important facilities. The Lawrence Livermore National Laboratory was designated the lead management organization for the structuring, administration, and execution of the overall task force effort and appointed the Executive Secretary. The Office of Security Evaluations (OSE) became the responsible DOE organization, and its Director assumed the role of Chairman of the Task Force Executive Committee. At its peak, the Task Force consisted of approximately 200 people who were considered to be experts in eight major topical areas. The composition of the experts was almost evenly divided between DOE and contractor employees. The collective wisdom of these experts was used in a consensus process to develop the S/C that are now published in draft form. These S/C have been used in more than ten inspections since May 1986 with much success. This paper discusses the process used to achieve the desired end result and the significance of the Task Force's accomplishments

  17. The aesthetic of the configuration of the contemporary Iraqi ceramics جماليات أنظمة التكوين في الخزف العراقي المعاصر

    Directory of Open Access Journals (Sweden)

    Ali Kareem Abdul-Hadi Al-Rawaf م.م. علي كريم عبد الهادي الرواف

    2015-01-01

    Full Text Available the Current search Address (The aesthetic of the configuration of the contemporary Iraqi ceramics contents of the beauty of art through the methods of treatment , reconstructive methods, and artistic techniques . the current research problem has been summarized by the following question : (what are the configuration systems in the contemporary Iraqi ceramics ? The research has been divided into four chapters , the first one is about the definition of the research problem, its importance and the need for it, the aim of the research was summarized ( defining the configuration systems in the contemporary Iraqi ceramics , it also Included definition about the limits of the research and determine the terms contained in it . The second chapter is the theoretical frame of the research , and it has been divided into two topics : The first topic is about ( the artistic configuration and the system concept . The second topic is about ( the formative foundations of the Iraqi contemporary ceramics. And it also included indicators of the theoretical framework and previous studies. While the third chapter included the procedures of the research, its samples, its methodology, and analyzing this sample. The forth chapter contained the conclusion of the research,and among the findings that the researcher had found : The Iraqi contemporary ceramics derived a set of cultural regimes to Harmonizes the expressive topic with configurations vocabulary, the most important ones are the human cultural heritage , the Islamic heritage and the local heritage. The colorimetric processes had ascertained unity in the diversity within the structure of the overall work by the chromatic contrast, the harmony, and the consistency in the value of any single color according to the pure subjective vision. The research ends with the most important recommendations, suggestions, sources, and summary.

  18. Using military friendships to optimize postdeployment reintegration for male Operation Iraqi Freedom/Operation Enduring Freedom veterans.

    Science.gov (United States)

    Hinojosa, Ramon; Hinojosa, Melanie Sberna

    2011-01-01

    Social relationships are important to health out comes. The postdeployment family reintegration literature focuses on the role of the civilian family in facilitating the transition from Active Duty military deployment to civilian society. The focus on the civilian family relationship may miss other important personal connections in veterans' lives. One such connection is the relationship many veterans have with former military unit members who served with them when deployed. Drawing on interviews with male Operation Iraqi Freedom/Operation Enduring Freedom veterans conducted from 2008 to 2009, we argue that the members of a military unit, especially during armed conflict, should be considered a resource to help the "family" reintegration process rather than impede it. This research has implications for current reintegration policy and how best to assist veterans transitioning into civilian society.

  19. Greening Existing Buildings in Contemporary Iraqi Urban Reality/ Virtual Model

    Directory of Open Access Journals (Sweden)

    Saba Jabar Neama Al-Khafaji

    2015-11-01

    Full Text Available The approach of greening existing buildings, is an urgent necessity, because the greening operation provides the speed and optimal efficiency in the environmental performance, as well as keeping up with the global green architecture revolution. Therefore, greening existing buildings in Iraq is important for trends towards renewable energies, because of what the country went through economic conditions and crises and wars which kept the country away from what took place globally in this issue. The research problem is: insufficient knowledge about the importance and the mechanism of the greening of existing buildings, including its environmental and economic dimensions, by rationalization of energy consumption and preserving the environment. The research objective is: clarifying the importance of greening existing buildings environmentally and economically, providing a virtual experience for greening the presidency building of Baghdad University, through advanced computer program. The main conclusions is: there is difference representing by reducing the disbursed thermal loads amount for cooling in summer and heating in winter through the use of computerized program (DesignBuilder and that after the implementation of greening operations on the building envelope, which confirms its effectiveness in raising the energy performance efficiency inside the building. Hence, the importance of the application of greening existing buildings approach in Iraq, to bring back Iraqi architecture to environmental and local track proper.

  20. Civilian Joint Task Force’ (CJTF – A Community Security Option: A Comprehensive and Proactive Approach of Reducing Terrorism

    Directory of Open Access Journals (Sweden)

    Oluwaseun Bamidele

    2016-06-01

    Full Text Available Since the Boko Haram uprising in 2009, the Nigerian government has employed various strategies as counter-terrorism measures to stem the atrocities of the group. These strategies include amnesty negotiations, implementation of emergency law in the northeast, increase in security spending to the deployment of military force. In the midst of these security measures, the civilian Joint Task Force (JTF emerged, first as a community effort, and later as a joint effort with the security forces to help fight Boko Haram. The civilian JTF has helped recover towns and villages from Boko Haram, rescued women in the northeast and helped identify Boko Haram members shielded by some local people. Although doubts have been expressed in some quatres that the civilian JTF could transform into ethnic militias, the Boko Haram security threat neutralized by the group indicates an untapped security potential in Nigerian communities. However, one approach that has yet to be pursued is community security option. Community security option is a model built around proactive citizen-driven communal response. This article explains the role of civilian JTF and how civilian JTF can be used to investigate terrorism in Nigeria. This article will contribute to the discourse on the imperative of African-inspired mechanisms to solving African security problems.

  1. Climate Change and Risks to National Security

    Science.gov (United States)

    Titley, D.

    2017-12-01

    Climate change impacts national security in three ways: through changes in the operating environments of the military; by increasing risks to security infrastructure, specifically bases and training ranges; and by exacerbating and accelerating the risks of state collapse and conflict in regions that are already fragile and unstable. Additionally there will be unique security challenges in the Arctic as sea-ice melts out and human activities increase across multiple dimensions. Military forces will also likely see increased demand for Humanitarian Assistance and Disaster Relief resulting from a combination of increased human population, rising sea-level, and potentially stronger and wetter storms. The talk will explore some of the lesser known aspects of these changes, examine selected climate-driven 'wild cards' that have the potential to disrupt regional and global security, and explore how migration in the face of a changing climate may heighten security issues. I will assess the positions U.S. executive and legislative branches with respect to climate & security, and how those positions have evolved since the November 2016 election, sometimes in counter-intuitive ways. The talk will close with some recommended courses of action the security enterprise can take to manage this climate risk.

  2. Space and Air Force: Rhetoric or Reality

    National Research Council Canada - National Science Library

    Cashin, James

    1999-01-01

    ... to meet requirements set forth in the National Security Strategy (NSS). Joint Vision 2010, the Air Force's Global Engagement, and several long-range plans all establish requirements that can only be fulfilled through the application of spacepower...

  3. Escalation and Intrawar Deterrence During Limited Wars in the Middle East

    Science.gov (United States)

    2009-09-01

    Regional Security ( ACRS ) Track 2 talks, which are part of the Middle East Peace Process. He also served as a member of the military and security...documents relating to the Iraqi BW program at his chicken farm in Iraq. The UN Special Commission (UNSCOM) which helped to monitor the WMD and missile...6. Zeev Maoz, Defending the Holy Land: A Critical Analysis of Israel’s Security & Foreign Policy, Ann Arbor : University of Michigan Press, 2009, p

  4. Minimizing the Moisture Damage and Drain down of Iraqi SMA Mixtures Using Waste Additives

    Directory of Open Access Journals (Sweden)

    Ali Al-Hadidy

    2013-04-01

    Full Text Available This research deals with the viability of using polyester fiber (PF, crumb rubber tire (CRT and cellulose fiber (CF as stabilizing waste additives in producing Iraqi SMA mixtures that sustain drain down phenomenon and moisture damage sensitivity. Different ratios of these additives (0.1, 0.2, and 0.3% by weight of aggregate and filler were mixed with 40/50 paving asphalt by means of dry process. Unmodified and modified SMA mixtures were subjected to drain down, Marshall, static indirect tensile strength, tensile stiffness modulus, static compressive strength, tensile strength ratio and index of retained strength tests. A set of regression equations between these tests were established. In addition, an optimization table based on these tests, which can be used to select the type or amount of additive for any field applications has been determined and reported. The results indicated that the inclusion of these additives in SMA mixtures can satisfy the performance requirement of high temperature and much rain zone.

  5. A Periphery Becomes a Center? Shopping Malls as Symbols of Modernity in Iraqi Kurdistan

    Directory of Open Access Journals (Sweden)

    Schluwa Sama

    2015-11-01

    Full Text Available Being labelled and framed as a remote periphery of Iraq, the Kurdistan Region of Iraq is transforming since 2003 into a center attracting investments worth billions of dollars. Investigating this transformation, I scrutinize one of the visible outcomes of the investments, namely shop- ping malls, as examples and symbols of “modernity” and “progress.” The recently built shopping malls are thereby analyzed as the built materialization and symbols of neoliberal transformation and socio-economic change. Engaging with representatives of shopping malls as well as with the experiences of young female shopping-mall-goers, it will be illustrated how modernity and progress is framed within the Kurdish nationalist narrative and how this is taken up by young Kurdish female mall-goers. Thus, it will be contended that a historical narrative of past sufferings comes to legitimize the new liberal “freedoms” that are available through the full connection to and participation of Iraqi Kurdistan in the capitalist economic world system.

  6. A Security Compliance Study of the Air Force Data Services Center Multics System

    Science.gov (United States)

    1976-12-01

    with thPpate T DErscit requiyfremns oanswe this qungeeto AFysC comsinepo netk alestdroi cosms ivtisicn Afetrs oteAF)CMtcsyswIthteapial Manualm 52ir... effect on them, since AFDSC already has a secure environment. Therefore, requirements for physical security and administrative policy are only reviewed...if the addition of Multics might have some effect on the controls already in effect at the AFDSC. The remainder of this report is divided into two

  7. Perspectives on the International and Internal Nuclear Security Regime

    International Nuclear Information System (INIS)

    Jang, Sung Soon

    2015-01-01

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime

  8. Perspectives on the International and Internal Nuclear Security Regime

    Energy Technology Data Exchange (ETDEWEB)

    Jang, Sung Soon [Korea Nuclear Non-proliferation and Control, Daejeon (Korea, Republic of)

    2015-10-15

    The term, 'Nuclear Security' became more familiar to Korean public after the government hosted 2012 Seoul Nuclear Security Summit. Nuclear Security is prevention of, detection of and response to criminal or intentional unauthorized acts involving or directed at nuclear material, other radioactive material, associated facilities, or associated activities. Nuclear Security includes physical protection, security of radioactive sources, nuclear forensics, nuclear smuggling prevention, border monitoring, and cyber security with regard to nuclear and other radiological materials. This abstract will review recent international trends and discuss the nuclear security regime in the Republic of Korea (ROK). The international Nuclear Security Regime has been strengthened. The upcoming Chicago Summit in 2016 and the entry into force of the Amendment of Convention on Physical Protection of Nuclear Materials (CPPNM) will bring major changes in nuclear security. The Republic of Korea hosted the 2012 Seoul Summit and strengthened domestic regime to meet international standards. The ROK has worked hard to contribute to the international security regime and to establish a robust domestic security regime against terrorist threats. Even if the nuclear security regime is robust, Risk-informed Nuclear Security management should be established to meet international standards and to implement effective as well as an efficient nuclear security regime.

  9. Proposing C4ISR Architecture Methodology for Homeland Security

    National Research Council Canada - National Science Library

    Farah-Stapleton, Monica F; Dimarogonas, James; Eaton, Rodney; Deason, Paul J

    2004-01-01

    This presentation presents how a network architecture methodology developed for the Army's Future Force could be applied to the requirements of Civil Support, Homeland Security/Homeland Defense (CS HLS/HLD...

  10. A deeper look at climate change and national security.

    Energy Technology Data Exchange (ETDEWEB)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  11. Solving the Principal - Agent Problem in Iraq: Economic Incentives Create a New Model for Security

    National Research Council Canada - National Science Library

    Cole, Verlan R; Cramer, Jayson L; Hollingsworth, L. S

    2007-01-01

    .... Using the Alaska Permanent Fund dividend as a potential model for Iraq, two key criteria were formulated for comparison and contrast with other alternatives currently available to the Iraqi government...

  12. Gaining Control of Iraq's Shadow Economy

    National Research Council Canada - National Science Library

    Ramirez, David S

    2007-01-01

    .... These conditions fuel a sprawling, decades-old shadow economy manipulated by elements of organized crime, militias, and insurgents to fund attacks on Coalition forces, infrastructure and innocent Iraqi civilians...

  13. Master planning for successful safeguard/security systems engineering

    International Nuclear Information System (INIS)

    Bruckner, D.G.

    1987-01-01

    The development and phased implementation of an overall master plan for weapons systems and facilities engaged in the complexities of high technology provides a logical road map for system accomplishment. An essential factor in such a comprehensive plan is development of an integrated systems security engineering plan. Some DOD programs use new military regulations and policy directives to mandate consideration of the safeguard/security disciplines be considered for weapons systems and facilities during the entire life cycle of the program. The emphasis is to make certain the weapon system and applicable facilities have complementary security features. Together they must meet the needs of the operational mission and, at the same time, provide the security forces practical solutions to their requirements. This paper discusses the process of meshing the safe- guards/security requirements with an overall the master plan and the challenges attendant to this activity

  14. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  15. Concentration of uranium in human cancerous tissues of Southern Iraqi patients using fission track analysis

    International Nuclear Information System (INIS)

    Al-Hamzawi, A.A.; Al-Qadisiyah University, Qadisiyah; Jaafar, M.S.; Tawfiq, N.F.

    2015-01-01

    The technique of nuclear fission track analysis with solid state nuclear track detectors CR-39 has been applied to determine concentrations of uranium in cancerous samples of human tissues that excised from patients in the three key southern Iraqi governorates namely, Basrah, Dhi-Qar, and Muthanna. These provinces were the sites of intensive military events during the Gulf Wars in 1991 and 2003. The investigation was based on the study of 24 abnormal samples and 12 normal samples for comparing the results. These samples include four types of soft tissues (kidney, breast, stomach and uterus). The results show that uranium concentrations in the normal tissues ranged between (1.42-4.76 μg kg -1 ), whereas in the cancerous tissues ranged between (3.37-7.22 μg kg -1 ). The uranium concentrations in the normal tissues were significantly lower than in the abnormal tissues (P < 0.001). (author)

  16. Consequence Management: A Disconnect Between National Security Policy and Force Structure?

    Science.gov (United States)

    2001-03-15

    effects or the consequences of a detonated and/or released weapon(s) has only recently been given much attention. Despite several warnings of the...with the exposure ? Second, the time required to establish and field a regional JTF would prevent the force from having a strong positive effect on the... outcome of the situation. One of the critical missions of a successful consequence management force is its ability to provide a strong deterrent

  17. America's Mercenaries: War by Proxy

    National Research Council Canada - National Science Library

    Collins, Kevin G

    2006-01-01

    Although the government's reliance on contractors to support military forces is not a new phenomenon, the degree to which contractors are involved in Operations Enduring Freedom and Iraqi Freedom (OIF...

  18. The Canadian Forces Use of Private Security in Afghanistan: A Consequence of National Decisions

    Science.gov (United States)

    2013-12-10

    should bind PSCs actions.21 This document laid out guiding principles and best practices but fell...use the terms in this 28Stanley, 168. 29Major Kevin Clarke, “ Microeconomics , Private Security and the Significance to Operational Planning...Clarke, Kevin. “ Microeconomics , Private Security and the Significance to Operational Planning.” Master’s thesis, School of Advanced Military Studies

  19. Security Analysis of DTN Architecture and Bundle Protocol Specification for Space-Based Networks

    Science.gov (United States)

    Ivancic, William D.

    2009-01-01

    A Delay-Tolerant Network (DTN) Architecture (Request for Comment, RFC-4838) and Bundle Protocol Specification, RFC-5050, have been proposed for space and terrestrial networks. Additional security specifications have been provided via the Bundle Security Specification (currently a work in progress as an Internet Research Task Force internet-draft) and, for link-layer protocols applicable to Space networks, the Licklider Transport Protocol Security Extensions. This document provides a security analysis of the current DTN RFCs and proposed security related internet drafts with a focus on space-based communication networks, which is a rather restricted subset of DTN networks. Note, the original focus and motivation of DTN work was for the Interplanetary Internet . This document does not address general store-and-forward network overlays, just the current work being done by the Internet Research Task Force (IRTF) and the Consultative Committee for Space Data Systems (CCSDS) Space Internetworking Services Area (SIS) - DTN working group under the DTN and Bundle umbrellas. However, much of the analysis is relevant to general store-and-forward overlays.

  20. (Human Security in Central America: A Return to the Past?

    Directory of Open Access Journals (Sweden)

    Jordi Urgell García

    2007-02-01

    Full Text Available After having become one of the principal scenarios of the Cold War, the pacification and democratisation of Central America in the 1990s were forged under the protection of the Esquipulas Process and the birth of the concept of human security. The resulting model of security was founded on the Framework Treaty on Democratic Security, which incorporated some of the basic postulates of human security and became one of its first institutional implementations. Nevertheless, the performance of this model has been eclipsed and questioned by the evolution of events in Central America (such as the impact of 9-11 on security agendas or the emergence of new forms of violence in the region, which open the door to a new security instrument (the Rapid Reaction Force, generate fears about an eventual regression of Central America in the area of security and raise doubts about the habitual assumptions of human security.

  1. Reasons for medical evacuations of soldiers serving in International Security Assistance Force (ISAF) operation in Afghanistan.

    Science.gov (United States)

    Korzeniewski, Krzysztof; Gregulski, Robert

    2014-01-01

    The article presents the results of a research study into the reasons for medical evacuations of Polish military personnel taking part in the International Security Assistance Force (ISAF) operation in Afghanistan from 2007 to 2013. The authors have analysed medical records of 485 soldiers who were medically evacuated out of a combat zone in Afghanistan for battle injuries, non-battle injuries and diseases. Each medically evacuated Polish soldier was subjected to statistical analysis. The study population comprised 25,974 soldiers assigned to the Polish Military Contingent Afghanistan in the given period. From 2007 to 2013, 1.9% of the Polish military personnel (n = 485) participating in the ISAF operation in Afghanistan were evacuated for medical reasons before the scheduled termination of their contract. 40.6% of all medical evacuations were due to battle injuries, 32.4% due to non-battle injuries, and 27.0% due to diseases. ISAF is an example of a combat operation, in which battle injuries remain the leading health problem in mission participants. 3 of 4 Polish soldiers who were medically evacuated from Afghanistan were no longer fit for military service in the area of operations due to the traumas they had suffered.

  2. 14 CFR 1203b.105 - Use of non-deadly physical force when making an arrest.

    Science.gov (United States)

    2010-01-01

    ... Use of non-deadly physical force when making an arrest. When a security force officer has the right to... believes to be the use or threat of imminent use of non-deadly physical force by the offender. Verbal abuse...

  3. Privatisation of security:

    DEFF Research Database (Denmark)

    use of violence as being the domain of the modern state, which as a natural consequence, delegitimises non-state providers of security. Legitimacy is, therefore, tied to the formal state. Th e international debate concerning the role of PMSCs has been split primarily into two segments. One argues...... to control confl icts has led to low-intensity confl icts (LIC), which can be witnessed, for instance, in Uganda, the Democratic Republic of Congo, Colombia and Sri Lanka (O’Brien, 1998, p. 80). Since the end of the Cold War it has been common for weak state rulers with formal state legitimacy...... security contractors have led, both historically and at the present day, to fi erce academic and public debate. As Sarah Percy argues, the anti-mercenary discourse has two basic elements. One focuses on the fact that mercenaries use force outside what is considered to be legitimate, authoritative control...

  4. Psychological trauma and help seeking behaviour amongst resettled Iraqi refugees in attending English tuition classes in Australia.

    Science.gov (United States)

    Slewa-Younan, Shameran; Mond, Jonathan M; Bussion, Elise; Melkonian, Maral; Mohammad, Yaser; Dover, Hanan; Smith, Mitchell; Milosevic, Diana; Jorm, Anthony Francis

    2015-01-01

    To examine levels of psychological distress and help seeking behaviour in resettled refugees attending English tuition classes in Australia, and their associations with participants' demographic characteristics. Data was collected by bilingual interviewers between March and November 2013. A volunteer sample of attendees of Adult Migrant English Programs (AMEP) in Western Sydney were recruited. Participants were two hundred and twenty five Iraqi refugees resettled in Western Sydney, who had left Iraq no earlier than 1991, were fluent in Arabic and/or English, and were between the ages of 18 and 70. The chief outcome measures used were the Kessler Psychological Distress Scale (K-10) as well as The Harvard Trauma Questionnaire (HTQ). On the K-10, 39.8% of participants had severe psychological distress, 19.4% moderate distress, and 40.7% had low to mild distress. Ninety-five percent of participants reported having experienced one or more potentially traumatic event (PTE) as defined by the HTQ prior to leaving Iraq, with a mean of 14.28 events (SD = 8.69). Thirty-one percent of participants met the threshold (≥2.5) for clinically significant PTSD symptomatology, with a significantly higher occurrence among participants with lower education attainment (χ (2) (3) = 8.26, p = .04). Of those participants with clinically significant PTSD symptomatology according to the HTQ, only 32.9% reported ever having ever sought help for a mental health problem. The high level of distress found in this sample, combined with low uptake of mental health care, highlights the need for programs targeted to promote help-seeking among Iraqi refugees who have resettled in Australia. Further, the higher level of PTSD symptomatology found amongst those with lower education attainment has mental health promotion and treatment implications. Specifically, in designing service and treatment programs, consideration should be given to the possible impact excessive levels of psychological

  5. The Response of Iraqi buffaloes to standardized diet

    Directory of Open Access Journals (Sweden)

    J.M. Khlef

    2010-02-01

    Full Text Available This Experiment was conducted in the Newashi village of Thiqar province in the south of Iraq from 15 October till 31 December 2006. A sample of 50 milking buffaloes in 1st to 7th lactation were randomly choosed in three nearby herds , then divided into two equal groups for the treatment and the control. After 10 days of adaptation, the treated group was fed the standardized diet which was consisted of: Alfa Alfa hay ,12 kg/day, concentrates, 8 kg/day. The concentrate consists of barley grains 37%, maize grain 15%, wheat bran 40%, rice bran 5%,calcium carbonate 2% and food salt 1% .The control group was fed -as it is usual in the region –reed roughages , rice straws, dray bred and some wheat bran. Daily milk yield for the whole sample, cream( ghiamer and fat percent rom randomly choosed individuals from each group were measured . Simple linear model was used to detect the effect of the lactation, herd, calf sex and milking time on the traits . Duncan test was used to compare the differences between means . The results obtained showed that the lactation , herd, sex of calf and milking time had significant effect on the traits (p< 0.001. The diet had significantly affected daily milk yield , cream and fat percent ( 8.40 ± 1.75 vis 5.67 ± 1.41,21± 6.6 vis 9.79 3.24, and 12.4.11 vis 5.88±1.95 for the treated group vis. the control group (p<0.001.Accordingly, it can be assumed that the Iraqi buffaloes have good potential to produce more milk and fat under standardized feed condition.

  6. Physical security of nuclear facilities

    International Nuclear Information System (INIS)

    Dixon, H.

    1987-01-01

    A serious problem with present security systems at nuclear facilities is that the threats and standards prepared by the NRC and DOE are general, and the field offices are required to develop their own local threats and, on that basis, to prepared detailed specifications for security systems at sites in their jurisdiction. As a result, the capabilities of the systems vary across facilities. Five steps in particular are strongly recommended as corrective measures: 1. Those agencies responsible for civil nuclear facilities should jointly prepare detailed threat definitions, operational requirements, and equipment specifications to protect generic nuclear facilities, and these matters should be issued as policy. The agencies should provide sufficient detail to guide the design of specific security systems and to identify candidate components. 2. The DOE, NRC, and DOD should explain to Congress why government-developed security and other military equipment are not used to upgrade existing security systems and to stock future ones. 3. Each DOE and NRC facility should be assessed to determine the impact on the size of the guard force and on warning time when personnel-detecting radars and ground point sensors are installed. 4. All security guards and technicians should be investigated for the highest security clearance, with reinvestigations every four years. 5. The processes and vehicles used in intrafacility transport of nuclear materials should be evaluated against a range of threats and attack scenarios, including violent air and vehicle assaults. All of these recommendations are feasible and cost-effective. The appropriate congressional subcommittees should direct that they be implemented as soon as possible

  7. Air traffic security act unconstitutional

    International Nuclear Information System (INIS)

    Heller, W.

    2006-01-01

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1 st Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  8. Chosen Ciphertext Security with Optimal Ciphertext Overhead

    Science.gov (United States)

    Abe, Masayuki; Kiltz, Eike; Okamoto, Tatsuaki

    Every public-key encryption scheme has to incorporate a certain amount of randomness into its ciphertexts to provide semantic security against chosen ciphertext attacks (IND-CCA). The difference between the length of a ciphertext and the embedded message is called the ciphertext overhead. While a generic brute-force adversary running in 2t steps gives a theoretical lower bound of t bits on the ciphertext overhead for IND-CPA security, the best known IND-CCA secure schemes demand roughly 2t bits even in the random oracle model. Is the t-bit gap essential for achieving IND-CCA security? We close the gap by proposing an IND-CCA secure scheme whose ciphertext overhead matches the generic lower bound up to a small constant. Our scheme uses a variation of a four-round Feistel network in the random oracle model and hence belongs to the family of OAEP-based schemes. Maybe of independent interest is a new efficient method to encrypt long messages exceeding the length of the permutation while retaining the minimal overhead.

  9. Audit of the management and cost of the Department of Energy`s protective forces

    Energy Technology Data Exchange (ETDEWEB)

    1994-07-01

    The Department of Energy`s safeguards and security program is designed to provide appropriate, efficient, and effective protection of the Department`s nuclear weapons, nuclear materials, facilities, and classified information. These items must be protected against theft, sabotage, espionage, and terrorist activity, with continuing emphasis on protection against the insider threat. The purpose of the audit was to determine if protective forces were efficiently managed and appropriately sized in light of the changing missions and current budget constraints. The authors found that the cost of physical security at some sites had grown beyond those costs incurred when the site was in full production. This increase was due to a combination of factors, including concerns about the adequacy of physical security, reactions to the increase in terrorism in the early 1980s with the possibility of hostile attacks, and the selection of security system upgrades without adequate consideration of cost effectiveness. Ongoing projects to upgrade security systems were not promptly reassessed when missions changed and levels of protection were not determined in a way which considered the attractiveness of the material being protected. The authors also noted several opportunities for the Department to improve the operational efficiency of its protective force operations, including, eluminating overtime paid to officers prior to completion of the basic 40-hour workweek, paying hourly wages of unarmed guards which are commensurate with their duties, consolidating protective force units, transferring law enforcement duties to local law agencies, eliminating or reducing paid time to exercise, and standardizing supplies and equipment used by protective force members.

  10. Taming the wounded lion: Transforming security forces in West Africa

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-02-01

    Feb 1, 2011 ... Solidarity networks of language and culture link ethnic groups ... policymaking process, financial management issues, defence forces, ... Related articles ... of the developing world's brightest scientists find new ways to improve ...

  11. Eghterab’ in Iraqi Emigrants\\' Poetry: The Case of Ahmad Matar

    Directory of Open Access Journals (Sweden)

    سید عدنان اشکوری

    2009-12-01

    Full Text Available ‘Eghterab’ in Iraqi Emigrants' Poetry: The Case of Ahmad Matar    Jafar Delshad *  Seyyed Adnan Eshkewaree **    Abstract  The word ‘eghterab’ in human sciences has different concepts which could be classified into three groups: 1 Westernization and tending to western culture or being alien with eastern authenticity 2 nostalgia and homesickness caused by being away from his/her motherhood land and hometown. Most of this group of poets are emigrants or are in exile and 3 having the sense of nostalgia but being in home country. It means that this group of poets have very high ideals which no one in their homeland can take and bare these ideals. The poet perceives that ideals which are essential for him/her are higher than the society in which he/she lives can grasp. This essay makes an attempt to study the various concepts of ‘eghterab’ by focusing on Ahmad Matar as a prominent poet with regard to the third concept and deal with the third concept of Eghterab from three points of view: political, social and spiritual. This article examines some samples of these three parts in Ahmad Matar's poetry.    Key words: nostalgia, poetry, emigration, Ahmad Matar, Iraq   * Assistant Professor, Department of Arabic Language and Literature, University of IsfahanE-mail: delshad@fgn.ui.ir  ** Assistant Professor, University for Teacher Training, E-mail: eshkewaree@yahoo.com.

  12. The everyday violence of forced displacement : community, memory and identity politics among Kurdish internal forced migrants in Turkey

    NARCIS (Netherlands)

    Geerse, M.T.

    2011-01-01

    Kurds in Turkey: the everyday violence of their forced displacement. Roughly fifteen years ago, more than one million Kurds were forcibly displaced from their villages in Southeast Turkey, mostly by Turkish security troops, who were engaged in a violent struggle with the PKK, an armed organization

  13. 77 FR 10806 - Designation of One Entity Pursuant to Executive Order 13224 of September 23, 2001, “Blocking...

    Science.gov (United States)

    2012-02-23

    .... nationals or the national security, foreign policy, or economy of the United States; (3) persons determined... the south, and Iraqi Street on the east, Tehran, Iran; Ministry of Intelligence, Second Negarestan Street, Pasdaran Avenue, Tehran, Iran [SDGT]. Dated: February 16, 2012. Barbara C. Hammerle, Acting...

  14. Building Partner Capacity/Security Force Assistance: A New Structural Paradigm

    National Research Council Canada - National Science Library

    Wuestner, Scott G

    2009-01-01

    ...), which would function much like our military reserve. It would ease the burden on the Armed Forces by allowing the hiring of civilians with critical skills to serve on missions abroad when America needs...

  15. FINANCIAL SECURITY OF MILITARY JUDGES IN SOUTH AFRICA ...

    African Journals Online (AJOL)

    Abstract. The status of military courts within the South African judicial system is ... that the question of financial security of military judges is a complex one and ...... that the force of the recommendations of the Commission is weak, as it is entirely.

  16. The Main Features of and Response to The Current Asian Security Situation

    Institute of Scientific and Technical Information of China (English)

    Hu; Shisheng

    2015-01-01

    I.The Main Features of the Current Asian Security Situation The strategic game between China and the United States becomes the most powerful driving force to change the Asian traditional security situation.The United States has tried its best to delay China’s rising pace or"to standardize"China’s rising path by using its huge military advantage and forward military deployment and strengthening its security network of alliance and friends,so as to maintain its dominant position in

  17. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  18. Oil and international security: old and new issues; Petrole et securite internationale: de nouveaux enjeux

    Energy Technology Data Exchange (ETDEWEB)

    Noel, P

    1998-09-01

    This paper questions the effectiveness of the link between international oil and (inter)national security. First, it explains an acknowledge the rise and decline of the traditional case of this link: the threat that so called ''oil dependence'' inflicts upon the national economy, hence the problem it raises for government. The reason for that decline is looked for in the emergence of multiple forms of competition in oil and energy markets, making the ''oil weapon'' less credible and its use less desirable and less possible. In oil like in any other commodity, the normal situation is the competition between suppliers for access to markets. For all basic economics tells us and experience has confirmed, analyses and policies (at least in France) are still strongly influenced by the ''oil security'' thinking shaped in the eve of the 1970 crises. Yet, those fallacies may be the strongest obstacle to the acknowledgment of the real oil security issues we face. The main one is the possible political destabilization of the Middle East due to oil competition between its members in an increasingly competitive world market. The consequences on regional antagonisms of the come back of Iraqi oil to the market on one hand, the internal stability of Iran and Saudi Arabia in a situation of lasting low oil revenues on the other hand, are reviewed as the main possible factors of regional destabilization in a context of strong competition in the world oil market. A large scale political burst with major oil producers concerned would certainly hurt developed and developing economy. That leads us to this paradoxical situation: the very cause of the decline of the traditional oil dependence issue is, due to Middle East situation, the main cause of possible destabilization of world oil market today. (author)

  19. Secure amplify-and-forward untrusted relaying networks using cooperative jamming and zero-forcing cancelation

    KAUST Repository

    Park, Kihong

    2015-12-03

    In this paper, we investigate secure transmission in untrusted amplify-and-forward half-duplex relaying networks with the help of cooperative jamming at the destination (CJD). Under the assumption of full channel state information (CSI), conventional CJD using self-interference cancelation at the destination is efficient when the untrusted relay has no capability to suppress the jamming signal. However, if the source and destination are equipped with a single antenna and the only untrusted relay is equipped with N multiple antennas, it can remove the jamming signal from the received signal by linear filters and the full multiplexing gain of relaying cannot be achievable with the conventional CJD due to the saturation of the secrecy rate at the high transmit power regime. We propose in this paper new CJD scheme where neither destination nor relay can acquire CSI of relay-destination link. Our proposed scheme utilizes zero-forcing cancelation based on known jamming signals instead of self-interference subtraction, while the untrusted relay cannot suppress the jamming signals due to the lack of CSI. We show that the secrecy rate of the proposed scheme can enjoy a half of multiplexing gain in half-duplex relaying while that of conventional CJD is saturated at high transmit power for N ???2. The impact of channel estimation error at the destination is also investigated to show the robustness of the proposed scheme against strong estimation errors.

  20. Specific trauma subtypes improve the predictive validity of the Harvard Trauma Questionnaire in Iraqi refugees.

    Science.gov (United States)

    Arnetz, Bengt B; Broadbridge, Carissa L; Jamil, Hikmet; Lumley, Mark A; Pole, Nnamdi; Barkho, Evone; Fakhouri, Monty; Talia, Yousif Rofa; Arnetz, Judith E

    2014-12-01

    Trauma exposure contributes to poor mental health among refugees, and exposure often is measured using a cumulative index of items from the Harvard Trauma Questionnaire (HTQ). Few studies, however, have asked whether trauma subtypes derived from the HTQ could be superior to this cumulative index in predicting mental health outcomes. A community sample of recently arrived Iraqi refugees (N = 298) completed the HTQ and measures of posttraumatic stress disorder (PTSD) and depression symptoms. Principal components analysis of HTQ items revealed a 5-component subtype model of trauma that accounted for more item variance than a 1-component solution. These trauma subtypes also accounted for more variance in PTSD and depression symptoms (12 and 10%, respectively) than did the cumulative trauma index (7 and 3%, respectively). Trauma subtypes provided more information than cumulative trauma in the prediction of negative mental health outcomes. Therefore, use of these subtypes may enhance the utility of the HTQ when assessing at-risk populations.

  1. Specific Trauma Subtypes Improve the Predictive Validity of the Harvard Trauma Questionnaire in Iraqi Refugees

    Science.gov (United States)

    Arnetz, Bengt B.; Broadbridge, Carissa L.; Jamil, Hikmet; Lumley, Mark A.; Pole, Nnamdi; Barkho, Evone; Fakhouri, Monty; Talia, Yousif Rofa; Arnetz, Judith E.

    2014-01-01

    Background Trauma exposure contributes to poor mental health among refugees, and exposure often is measured using a cumulative index of items from the Harvard Trauma Questionnaire (HTQ). Few studies, however, have asked whether trauma subtypes derived from the HTQ could be superior to this cumulative index in predicting mental health outcomes. Methods A community sample of recently arrived Iraqi refugees (N = 298) completed the HTQ and measures of posttraumatic stress disorder (PTSD) and depression symptoms. Results Principal components analysis of HTQ items revealed a 5-component subtype model of trauma that accounted for more item variance than a 1-component solution. These trauma subtypes also accounted for more variance in PTSD and depression symptoms (12% and 10%, respectively) than did the cumulative trauma index (7% and 3%, respectively). Discussion Trauma subtypes provided more information than cumulative trauma in the prediction of negative mental health outcomes. Therefore, use of these subtypes may enhance the utility of the HTQ when assessing at-risk populations. PMID:24549491

  2. The Text of the Agreement between Iraq and the Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Exchange of Letters between the Government of the French Republic and the Government of the Republic of Iraq Supplementary to the Franco-Iraqi Co-Operation Agreement for the Peaceful Utilization of Nuclear Energy Signed on 18 November 1975

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1979-09-15

    The text of the exchange of letters of 11 September 1976 between the Government of the French Republic and the Government of the Republic of Iraq supplementary to the Franco-Iraqi cooperation agreement for the peaceful utilization of nuclear energy of 18 November 1975 is reproduced in this document for the information of all Members by agreement with the French and Iraqi Governments.

  3. The Text of the Agreement between Iraq and the Agency for the Application of Safeguards in connection with the Treaty on the Non-Proliferation of Nuclear Weapons. An Exchange of Letters between the Government of the French Republic and the Government of the Republic of Iraq Supplementary to the Franco-Iraqi Co-Operation Agreement for the Peaceful Utilization of Nuclear Energy Signed on 18 November 1975

    International Nuclear Information System (INIS)

    1979-09-01

    The text of the exchange of letters of 11 September 1976 between the Government of the French Republic and the Government of the Republic of Iraq supplementary to the Franco-Iraqi cooperation agreement for the peaceful utilization of nuclear energy of 18 November 1975 is reproduced in this document for the information of all Members by agreement with the French and Iraqi Governments

  4. No Security Without Us: Tribes and Tribalism in Al Anbar Province, Iraq

    Science.gov (United States)

    2014-06-01

    applies as payments for rights to safe passage through tribal territory. Payment of diyya does not necessarily signify an admission of guilt . Eqrar...honor, pride , dignity, and respect—and the converse (avoidance of shame, disgrace, and humiliation)—are key to the ethos of Iraqi tribal society.25

  5. Investigation of index finger triggering force using a cadaver experiment: Effects of trigger grip span, contact location, and internal tendon force.

    Science.gov (United States)

    Chang, Joonho; Freivalds, Andris; Sharkey, Neil A; Kong, Yong-Ku; Mike Kim, H; Sung, Kiseok; Kim, Dae-Min; Jung, Kihyo

    2017-11-01

    A cadaver study was conducted to investigate the effects of triggering conditions (trigger grip span, contact location, and internal tendon force) on index finger triggering force and the force efficiency of involved tendons. Eight right human cadaveric hands were employed, and a motion simulator was built to secure and control the specimens. Index finger triggering forces were investigated as a function of different internal tendon forces (flexor digitorum profundus + flexor digitorum superficialis = 40, 70, and 100 N), trigger grip spans (40, 50, and 60 mm), and contact locations between the index finger and a trigger. Triggering forces significantly increased when internal tendon forces increased from 40 to 100 N. Also, trigger grip spans and contact locations had significant effects on triggering forces; maximum triggering forces were found at a 50 mm span and the most proximal contact location. The results revealed that only 10-30% of internal tendon forces were converted to their external triggering forces. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Potentially traumatic events and mental health problems among children of Iraqi refugees: The roles of relationships with parents and feelings about school.

    Science.gov (United States)

    Trentacosta, Christopher J; McLear, Caitlin M; Ziadni, Maisa S; Lumley, Mark A; Arfken, Cynthia L

    2016-01-01

    This study examined mental health problems among children of Iraqi refugees, most of whom were Christian. Exposure to potentially traumatic events was hypothesized to predict more symptoms of depression and traumatic stress. Moreover, youth reports of supportive relationships with parents and positive feelings about school were examined in relation to mental health problems. These promotive factors were expected to mitigate the hypothesized association between traumatic event exposure and mental health problems. Participants were 211 youth recruited from agencies and programs serving Iraqi refugees in a large metropolitan area in the United States. The hypotheses were partially supported. Youth who reported experiencing more potentially traumatic events endorsed more traumatic stress and depression symptoms. After accounting for exposure to potentially traumatic events and other covariates, youth who reported more positive feelings about school endorsed fewer symptoms of traumatic stress, and youth who reported more supportive relationships with parents endorsed fewer symptoms of depression. In addition, there was an interaction between potentially traumatic events and relationships with parents when predicting depression symptoms. Youth endorsed higher levels of depression symptoms when they reported less supportive relationships, regardless of the amount of traumatic event exposure, whereas youth endorsed lower levels of depression symptoms when they reported more supportive relationships with parents, but only at low levels of traumatic event exposure. Otherwise, the main effects were not qualified by interactions between potentially traumatic event exposure and the promotive factors. The findings from this study have implications for future research, policy, and practice with children of refugees. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  7. Sustained Forced Sale Value Opinion Advice in Nigerian Valuation ...

    African Journals Online (AJOL)

    Sultan

    volume of secured lending by commercial banks. ... Keywords: Forced sale value, mortgage valuation, Nigeria, valuation ... fact that given the rather large set of unknowns .... Besides the primary data .... mortgage lending value add anything.

  8. A TALE OF TWO CULTURES: BREXIT AND THE FUTURE OF UK-EUROPEAN SECURITY COOPERATION

    Science.gov (United States)

    2017-06-01

    states were particularly sensitive to this issue given the lack of clear UN Security Council authorization and the fact that the purpose of intervention ...Finnemore, The Purpose of Intervention : Changing Beliefs About the Use of Force (Cornell Studies in Security Affairs) (Cornell University Press, 2004...position in all other international organizations, including within the UN Security Council as appropriate. Furthermore, Title V establishes a

  9. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  10. Transformation in the Developing World: An Analysis of Colombia's Security Transformation

    National Research Council Canada - National Science Library

    Sprunk, Darren

    2004-01-01

    This thesis examines security force transformation issues germane to developing countries, in their attempt to counter emerging threats of international terrorism, insurgency, WMD proliferation and organized crime...

  11. Protecting Commercial Space Systems: A Critical National Security Issue

    Science.gov (United States)

    1999-04-01

    systems. Part two will describe, at the operational level , this author’s theory for space protection and recommend a course of action to work...minimal loss of life. These factors force us to conclude this is a critical national security issue just as many in high- level government positions...Command and Staff College Operational Forces Coursebook (Academic Year 1999), 35. 3 The USCG is not a Title 10 Service, thus Posse Comitatus is not a

  12. Colombia: Surveillance, Private Security and Gun Control 1994 -2013

    Directory of Open Access Journals (Sweden)

    María Stella Baracaldo Méndez

    2014-11-01

    Full Text Available The culture of reglating behavior in the defense of human life is as ancient as social interaction itself. Both are necessarily mutually related in order to achieve coexistence, security, and justice, according to the covenants established in each society. In the modern State, the Universal Declaration of the Rights of Man, and the Citizen led to institutionalizing public force to achieve these objectives. In the western world, this operates from the principle of “monopoly of legitimate physical violence” postulated by Weber. This is the political device for the distribution and conservation of power.However, the great transformation, “during the second half of the twentieth century, involving the global economic markets and the system of nation states through daily life and the psychological dynamic of families and individuals,” according to David Garland (2005, p. 141 generated a shift in the matters handled by the State, including people’s security, tranquility, care for their assets, and elements in the environment that make life possible.In Colombia, the force of law and order predominantly focuses its attention on high-impact crime, and very little on citizen conflicts affecting coexistence. Meanwhile, private surveillance and security have skyrocketed in caring for the integrity and assets of private citizens, through mechanisms and means such as firearms, which had formerly been forthe exclusive use of the members of forces of law and order.DOI: http://dx.doi.org/10.5377/rpsp.v4i1.1576

  13. [Radiative and hygienic certification in Armed Forces, problems of its implementation and ways of perfection].

    Science.gov (United States)

    Rusakov, V N; Cherkashin, A V; Shishkanov, A P; Ian'shin, L A; Gracheva, T N

    2010-12-01

    Radiative and hygienic passportization is one of the most actual pattern of socio and hygienic monitoring in Armed Forces. Radiative and hygienic passport is the main document which characterizes the safety control in military unit and uses the sources of ionizing radiation. Sanitary and epidemiologic institutions were imputed to control the formation of radiative and hygienic passports, analysis and generalization of its data, formation of conclusions about the condition of radiation security in the military units. According to radiative and hygienic passportization, which took place in 2009, the radiation security in the Armed Forces and organizations is satisfactory, but there are some problems of providing of radiation security of personnel under the professional and medical radiation. The salvation of its problems requires the effective work of official functionary of radiac object and institutions of state sanitary and epidemiological supervision in Armed Forces of Russian Federation.

  14. Induction New Suitable Soybean Genotypes for Iraqi Environmental Conditions

    International Nuclear Information System (INIS)

    Khudhair, H.; Jaim, A.; Nassralla, A.; Suhail, A.; Abass, H.; Hassan, A.; Hussain, A.; Mahmood, J.

    2002-01-01

    Mutation breeding programme was conducted to improve soybean (Glycine max. L. merrill) yield and oil Seeds were irradiation with 0,100,200,300 Gray of gamma ray Co 60 Selection of genetic variants started from M2 and continued to M8. Eight variants were selected in M8 generation that were characterized with high yield and desirable morphological characters. Preliminary comparison experiments of M9 and M10 with check variety (Lee74) were conducted at two locations (Twaitha and Lattifya). Three promising variants were selected for high yield and low percentage of seed shrinkage as compared with the check variety (Lee74) and other mutants. The same selected variants were planted in large scale comparison experiments with check variety (LEE 74) and two introduced varieties (Coker335 and Gasoy17) in two locations (Twaitha and lattifya) for two seasons (1998,1999). Variants H134 and H39 were superior in their yield components and earliness in maturity compared with the variant H226 and the other check varieties . The average yield and oil percentage in the two seasons(1998,1999) was 3195, 3115kg/ha and 18.2%, 19.3% respectively for the variants H134 and H39 compared with the yield and the percentage of oil for the check variety (Lee74) that was 2794 kg/ha and 18.3% respectively. These two variants were also superior in their protein percentage. According to these promising results of the variants H134 and H39 they were submitted for registration. They were registered under the names TAKA1 and TAKA-2 as suitable varieties for Iraqi environmental conditions. (authors) 13 refs., 5 tabs

  15. Summary of Independent Assessment of the Afghan National Security Forces

    Science.gov (United States)

    2014-02-01

    Afghan National Police (ANP), which are the Afghan Border Police ( ABP ), Afghan National Civil Order Police (ANCOP), Afghan Uniform Police (AUP...intentionally left blank 43 Acronyms AACP Afghan Anti-Crime Police AAF Afghan Air Force ABP Afghan Border Police ALP Afghan

  16. Acculturation and post-migration psychological symptoms among Iraqi refugees: A path analysis.

    Science.gov (United States)

    LeMaster, Joseph W; Broadbridge, Carissa L; Lumley, Mark A; Arnetz, Judith E; Arfken, Cynthia; Fetters, Michael D; Jamil, Hikmet; Pole, Nnamdi; Arnetz, Bengt B

    2018-01-01

    Refugees frequently experience symptoms of posttraumatic stress and depression, which impede their acculturation in the new host country where they are resettling. There are few longitudinal studies investigating predictors of mental health and acculturation during the early postmigration period. We conducted a longitudinal study of 298 Iraqi refugees, assessing them upon arrival to the U.S. and 1 year after migration. Premigration trauma was associated with increased PTSD and depressive symptoms at baseline, and with decreased acculturation 1 year later. Resilience was associated with depressive symptoms at 1-year follow-up, but not with other resettlement outcomes (PTSD symptoms, English-language skills, or acculturation). PTSD and depressive symptoms at baseline predicted the same symptoms at 1-year follow-up, but not any other resettlement outcomes. The number of chronic diseases at baseline predicted worse PTSD and depressive symptoms, acculturation, and English language skills at 1-year follow up. Postmigratory exposure to daily stressors and less social support predicted worse 1-year outcomes. Results suggest that interventions that aim to improve mental health and promote acculturation among refugees should assess their history of trauma, chronic disorders, and psychological symptoms soon after migration, and promptly provide opportunities for social support. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  17. Unemployment in Iraqi Refugees: The Interaction of Pre and Post-Displacement Trauma

    Science.gov (United States)

    Wright, A. Michelle; Dhalimi, Abir; Lumley, Mark A.; Jamil, Hikmet; Pole, Nnamdi; Arnetz, Judith E.; Arnetz, Bengt B.

    2016-01-01

    Previous refugee research has been unable to link pre-displacement trauma with unemployment in the host country. The current study assessed the role of pre-displacement trauma, post-displacement trauma, and the interaction of both trauma types to prospectively examine unemployment in a random sample of newly-arrived Iraqi refugees. Participants (N=286) were interviewed three times over the first two years post-arrival. Refugees were assessed for pre-displacement trauma exposure, post-displacement trauma exposure, a history of unemployment in the country of origin and host country, and symptoms of posttraumatic stress disorder (PTSD) and depression. Analyses found that neither pre-displacement nor post-displacement trauma independently predicted unemployment 2 years post-arrival; however, the interaction of pre and post-displacement trauma predicted 2-year unemployment. Refugees with high levels of both pre and post-displacement trauma had a 91% predicted probability of unemployment, whereas those with low levels of both traumas had a 20% predicted probability. This interaction remained significant after controlling for sociodemographic variables and mental health upon arrival to the U.S. Resettlement agencies and community organizations should consider the interactive effect of encountering additional trauma after escaping the hardships of the refugee's country of origin. PMID:27535348

  18. Air & Space Power Journal. Volume 19, Number 1, Spring 2005

    Science.gov (United States)

    2005-03-01

    and engineers constructed a life-size mock-up of wood and canvas in Florida that they could quickly disassemble before Soviet spy satellites made...including those that were simply government-neutral and thus tolerant of the insurgents); a smaller US fingerprint on Iraqi internal security; and greater

  19. Saddam Hussein's Decision to Invade Kuwait - Where Was Plan B

    National Research Council Canada - National Science Library

    Culpepper, Frances R

    1997-01-01

    ... in his decision to invade Kuwait in August 1990 Surveying the damage to the Iraqi economy following the Iran-Iraq war, Saddam knew that insufficient resources would force hum to shelve any domestic program...

  20. Developing cyber security architecture for military networks using cognitive networking

    OpenAIRE

    Kärkkäinen, Anssi

    2015-01-01

    In recent years, the importance of cyber security has increased. Cyber security has not become a critical issue only for governmental or business actors, but also for armed forces that nowadays rely on national or even global networks in their daily activities. The Network Centric Warfare (NCW) paradigm has increased the significance of networking during last decades as it enables information superiority in which military combat power increased by networking the battlefield actors from perspe...

  1. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  2. Personnel Security during Joint Operations with Foreign Military Forces

    Science.gov (United States)

    2013-08-01

    century society into the twenty-first century encounters a number of obstacles. Illiteracy and innumeracy rates are high, and repressive social values are...force of more than 4,500 British soldiers dispatched by the governor of India . Shortly thereafter, British imperialism prompted two more Anglo-Afghan...socialist change on a traditional society, in part by redistributing land and bringing more women into government. The at- tempt at rapid modernization

  3. Department of Energy security program needs effective information systems

    International Nuclear Information System (INIS)

    1991-10-01

    Although security is an important, nearly billion-dollar-a-year function in the Department of Energy (DOE), key information systems that hold important data about security weaknesses and incidents have limited analytical capabilities and contain unreliable information. The resultant difficulty in identifying patterns and trends reduces managers' ability to ensure the effectiveness of the security program. Resources are also wasted because DOE has deployed incompatible systems that are unable to electronically share or transfer data, often forcing employees to manually re-enter data that are already stored in computers elsewhere. Finally, continuing data problems with other important security information systems, such as those used to track security clearances and classified documents, indicate that information system deficiencies are extensive. A major reason for these problems is that DOE has not done a comprehensive, strategic assessment of its information and information technology needs of the security program. DOE's efforts are fragmented because it has not assigned to any organization the leadership responsibility to determine security information needs and to plan and manage security information resources Department-wide. This paper reports that a number of changes are needed to correct these problems and take advantage of information technology to help strengthen the security program

  4. Towards an African Peace and Security regime: Continental ...

    African Journals Online (AJOL)

    The anticipated establishment of an African Standby Force (ASF) in 2015 and the interim African Capacity for Immediate Response to Crises (ACIRC), in the midst of new and continuing conflicts, have sparked renewed interest in the underpinnings of, and prospects for, the African Peace and Security Architecture.

  5. Astronomy in Iraq

    Science.gov (United States)

    Alsabti, A. W.

    2006-08-01

    The history of modern Iraqi astronomy is reviewed. During the early 1970's Iraqi astronomy witnessed significant growth through the introduction of the subject at university level and extensively within the school curriculum. In addition, astronomy was popularised in the media, a large planetarium was built in Baghdad, plus a smaller one in Basra. Late 1970 witnessed the construction of the Iraqi National Observatory at Mount Korek in Iraqi Kurdistan. The core facilities of the Observatory included 3.5-meter and 1.25-meter optical telescopes, and a 30-meter radio telescope for millimetre wavelength astronomy. The Iraqi Astronomical Society was founded and Iraq joined the IAU in 1976. During the regime of Saddam Hussain in the 1980's, the Observatory was attacked by Iranian artillery during the Iraq-Iran war, and then again during the second Gulf war by the US air force. Years of sanctions during the 1990's left Iraq cut off from the rest of the international scientific community. Subscriptions to astronomical journals were halted and travel to conferences abroad was virtually non-existent. Most senior astronomers left the country for one reason or another. Support from expatriate Iraqi astronomers existed (and still exists) however, this is not sufficient. Recent changes in Iraq, and the fall of Saddam's regime, has meant that scientific communication with the outside world has resumed to a limited degree. The Ministry of Higher Education in Baghdad, Baghdad University and the Iraqi National Academy of Science, have all played active roles in re-establishing Iraqi astronomy and re-building the damaged Observatory at Mount Korek. More importantly the University of Sallahudin in Erbil, capital of Iraqi Kurdistan, has taken particular interest in astronomy and the Observatory. Organized visits to the universities, and also to the Observatory, have given us a first-hand assessment of the scale of the damage to the Observatory, as well as the needs of astronomy teaching

  6. Defining Commercial Space's Place in the Battlespace

    National Research Council Canada - National Science Library

    DeMello, Bruce

    2004-01-01

    ... (to include ALLIED FORCE, ENDURING FREEDOM and IRAQI FREEDOM), the U.S. has needed to extend beyond the capabilities of dedicated DoD and national space assets, relying on the commercial space sector to provide...

  7. Iraq Radiosonde Launch Records

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Iraqi upper air records loaned to NCDC from the Air Force 14th Weather Squadron. Scanned notebooks containing upper air radiosonde launch records and data. Launches...

  8. Redefining Human Security for Vulnerable Migrants in East Asia

    Directory of Open Access Journals (Sweden)

    Jiyoung Song

    2015-01-01

    Full Text Available This article proposes human security as an analytical framework to understand the current trends of irregular migration (both forced and unauthorised in East Asia and revisits the seven pillars of human security defined in the 1994 Human Development Report by the United Nations Development Programme (UNDP. It explains how the concepts of human security are parallel to those prescribed in international human rights conventions but different in terms of the attitude towards states. Human security does not directly challenge state authority and adds a sense of urgency and moral authority that requires extra-legal measures by the states. The author argues that human security is the securitisation of human rights and is a better framework and policy discourse than human rights to engage with state and non-state actors, especially in East Asia where political leaders are more receptive to the former idea. The study draws examples from stateless Rohingyas, undocumented sex workers in Thailand and Singapore, trafficked brides from Vietnam and Cambodia, and smuggled North Korean refugees in China to demonstrate the nexus between human security and irregular migration.

  9. Operation Allied Force: Setting a New Precedent for Humanitarian Intervention?

    National Research Council Canada - National Science Library

    Walsh, Thomas

    2000-01-01

    .... Operation Allied Force was conducted without the explicit authorization of the United Nations Security Council, but was justified by NATO allies as a means to bring peace and stability to Kosovo...

  10. Reassessing U.S. National Security Strategy: The Kurdistan Worker's Party (PKK)

    National Research Council Canada - National Science Library

    Clark, Perry

    2008-01-01

    The Kurdistan Worker's Party (PKK), a terrorist-insurgent group with ties to lucrative transnational criminal organizations throughout Europe, continues to threaten Turkey-Iraq regional stability by attacking Turkish Security Forces...

  11. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  12. Security assurances and regional stability

    International Nuclear Information System (INIS)

    Sanders, B.

    1995-01-01

    This paper discusses whether and how security assurances affect political stability in geographic regions. Before embarking on what is necessarily a limited analysis of a complex subject, I point out that the subject is by no means new. For centuries, vast areas of the world have been affected by forces used against them by more powerful States, which at one time or another incorporated large parts of them into overseas colonies or contiguous empires. The new factors are the emancipation of those areas into independent regions, made up of States that play their own parts in international affairs, and the possession by a handful of Powers, outside or on the edge of those regions, of a specific form of superior force: nuclear weapons. (author)

  13. Activity-based costing of security services for a Department of Energy nuclear site

    International Nuclear Information System (INIS)

    Togo, D.F.

    1997-01-01

    Department of Energy (DOE) nuclear facilities are being encouraged to reduce costs but the accounting data typically in use by the financial organizations at these laboratories cannot easily be used to determine which security activities offer the best reduction in cost. For example, labor costs have historically been aggregated over various activities, making it difficult to determine the true costs of performing each activity. To illustrate how this problem can be solved, a study was performed applying activity-based costing (ABC) to a hypothetical DOE facility. ABC is a type of cost-accounting developed expressly to determine truer costs of company activities. The hypothetical facility was defined to have features similar to those found across the DOE nuclear complex. ABC traced costs for three major security functions - Protective Force Operations, Material Control and Accountability, and Technical Security - to various activities. Once these costs had been allocated, we compared the cost of three fictitious upgrades: (1) an improvement in training or weapons that allows the protective force to have better capabilities instead of adding more response forces; (2) a change in the frequency of inventories; and (3) a reduction in the annual frequencies of perimeter sensor tests

  14. THz and Security Applications

    CERN Document Server

    Sizov, Fedir; Detectors, Sources and Associated Electronics for THz Applications

    2014-01-01

    These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives represents one of the most appealing technologies to have recently emerged in dealing with terrorist attacks encountered by civil security and military forces throughout the world. Discussed are the most advanced technologies and developments, the various points of operational strength and weaknesses as well as are suggestions and predictions the best technological solutions to  overcome current operational limits.  The current status of various levels of cooling in THz detectors, sources and associated electronics are also addressed. The goal was to provide a clear view on the current technologies available and the required advances needed in order to achieve more efficient systems. This goal was outlined in part by establishing the baseline of current uncertainty estimations in physics-based modelling and the identification of key areas which require additi...

  15. Post-conflict development in Liberia: Governance, security, capacity ...

    African Journals Online (AJOL)

    the global system that led to the escalation of violence and human casualties. ... forces, their reintegration into the civilian life and the destruction of their ..... community leaders to set up intelligence security committees to monitor early warning ..... should move beyond the artificial separation between 'conflict as belonging to.

  16. The UN Security Council and prevention of displacement

    Directory of Open Access Journals (Sweden)

    Sanjula Weerasinghe

    2012-12-01

    Full Text Available Respecting the prohibitions against forced and arbitrary displacementcould significantly reduce the risk of, or prevent, displacement insituations of armed conflict, as could insisting on accountabilityfor violations of these prohibitions that amount to war crimes orcrimes against humanity. The UN Security Council has only partiallyaddressed these issues.

  17. 78 FR 50047 - 36(b)(1) Arms Sales Notification

    Science.gov (United States)

    2013-08-16

    ... support will not alter the basic military balance in the region. The principal contractor will be Raytheon... logistics support. (iv) Military Department: U.S. Army (UFS) (v) Prior Related Cases, if any: None (vi... the foreign policy and national security of the United States by improving the Iraqi military's...

  18. The Campus Executive's Role in Security and Liability Issues.

    Science.gov (United States)

    Bromley, Max; Territo, Leonard

    1986-01-01

    Executives at institutions of higher education have become increasingly concerned about serious crimes being committed on their campuses. The liability issue, criminal activity information, physical security and design issues, student patrol escorts, crime prevention training, and task force development are discussed. (MLW)

  19. Air Force Civil Engineer, Volume 14, Number 2, 2006

    Science.gov (United States)

    2006-01-01

    homes located off base), reimburs - able service agreements are created between the housing development’s project owner and both the Air Force...Just as with security, fire protection is provided by the on-base fire department on a reimbursable basis. At a recent fire at Hanscom AFB, Mass... reimbursable clients; and programming functions. Input of this “living record” allows the database to manage the 5-Year Plan so 16 AIR FORCE CIVIL

  20. Inclusive Security for the Muslim World

    Science.gov (United States)

    2016-03-01

    building national security structures in most Muslim countries while neglecting social development , particu- larly gender equality . Governments from...tries remain hostage to traditional views on gender issues. While some Muslim-majority countries have inducted women into their armed forces, at... Development (OECD): The average median age in the MENA countries is 25 years, well below the aver- age of other emerging regions such as Asia (29 years

  1. Treatment of radioactive liquid waste (Co-60) by sorption on Zeolite Na-A prepared from Iraqi kaolin

    International Nuclear Information System (INIS)

    Mustafa, Yasmen A.; Zaiter, Maysoon J.

    2011-01-01

    Highlights: ► Iraqi synthetic zeolite type Na-A has been suggested as ion exchange material to treat cobalt-60 in radioactive liquid waste which came from neutron activation for corrosion products. ► The ability of Na-A zeolite to remove cobalt from wastewater was checked for high cobalt concentration (822 mg/L) in addition to low cobalt concentration in the source sample (0.093 mg/L). ► The effects of important design variables on the zeolite column performance were studied these include initial concentration, flow rate, and bed depth. ► The experimental results show that high sorption capacity can be obtained at high influent concentration, low flow rate, and high bed depth. ► Higher column performance was obtained at higher bed depth. - Abstract: Iraqi synthetic zeolite type Na-A has been suggested as ion exchange material to treat cobalt-60 in radioactive liquid waste which came from neutron activation for corrosion products. Batch experiments were conducted to find out the equilibrium isotherm for source sample .The equilibrium isotherm for radioactive cobalt in the source sample showed unfavorable type, while the equilibrium isotherm for the total cobalt (the radioactive and nonradioactive cobalt) in the source sample showed a favorable type. The ability of Na-A zeolite to remove cobalt from wastewater was checked for high cobalt concentration (822 mg/L) in addition to low cobalt concentration in the source sample (0.093 mg/L). A good fitting for the experimental data with Langmuir equilibrium model was observed. Langmuir constant qm which is related to monolayer adsorption capacity for low and high cobalt concentration was determined to be 0.021 and 140 mg/g zeolite . The effects of important design variables on the zeolite column performance were studied these include initial concentration, flow rate, and bed depth. The experimental results have shown that high sorption capacity can be obtained at high influent concentration, low flow rate, and

  2. Security in transnational interoperable PPDR communications: Threats and requirements

    NARCIS (Netherlands)

    Ferrús, R.; Sallent, O.; Verkoelen, C.; Fransen, F.; Saijonmaa, J.; Olivieri, C.; Duits, M.; Galin, A.; Pangallo, F.; Modi, D.P.

    2015-01-01

    The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery

  3. Joining Forces for Food Security - Linking Earth Observation and Crowd-sourcing for improved Decision-support

    Science.gov (United States)

    Enenkel, M.; Dorigo, W.; See, L. M.; Vinck, P.; Papp, A.

    2014-12-01

    Droughts statistically exceed all other natural disasters in complexity, spatio-temporal extent and number of people affected. Triggered by crop failure, food insecurity is a major manifestation of agricultural drought and water scarcity. However, other socio-economic precursors, such as chronically low levels of disaster preparedness, hampered access to food security or a lack of social safety nets are equally important factors. We will present the first results of the SATIDA (Satellite Technologies for Improved Drought-Risk Assessment) project, which advances three complementary developments. First, an existing drought indicator is enhanced by replacing in-situ measurements on rainfall and surface air temperature with satellite-derived datasets. We identify the vegetation status via a new noise-corrected and gap-filled vegetation index. In addition, we introduce a soil moisture component to close the gap between rainfall deficiencies, extreme temperature and the first visible impacts of atmospheric anomalies on vegetation. Second, once calibrated, the index is forced with seasonal forecasts to quantify their uncertainty and added value in the regions of interest. Third, a mobile application is developed to disseminate relevant visualizations to decision-makers in affected areas, to collect additional information about socio-economic conditions and to validate the output of the drought index in real conditions. Involving Doctors without Borders (MSF) as a key user, SATIDA aims at decreasing uncertainties in decision-making via a more holistic risk framework, resulting in longer lead times for disaster logistics in the preparedness phase.

  4. Benefits of an Air Force Contracting Warrant Officer Program

    Science.gov (United States)

    2011-12-01

    M., & Berry, J. W. (2011). The necessity of others is the mother of invention: instrinsic and prosocial motivations , perspective taking, and...Capital, Organizational Behavioral Assessment, Implementation Plan, Air Force 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT Unclassified...10 3. Motivation

  5. Public security and peace building operations in post-armed conflict periods

    OpenAIRE

    Aguilar, Sérgio Luiz Cruz

    2012-01-01

    The article shows how contemporary peace operations conducted bythe United Nations (UN) to manage and/or resolve armed conflicts have dealt withthe issue of public security. As part of the effort to establish a lasting peace in theseterritories, the activities of the Organization include the security sector reform andthe structuring of a democratic police force as part of a broader process of peacebuilding. Based on specialized literature on the subject, UN documents and personalobservations,...

  6. Capital Improvement Program Environmental Assessment, Dyess Air Force Base, Texas

    Science.gov (United States)

    2010-09-01

    Counsel • Air Force Office of Special Investigations • Air Force Audit Agency • Boeing Aerospace Operations Inc . • Defense Security Service...this corresponds to a factor of 10 in relative sound energy (Bolt, Beranek, and Meuman, Inc . 1973). Table 4-1 shows the dBA scale of commons...configuration for the B-47. Intact -Interior shop upgraded for Nike Hercules in 1961. 5020 Field Maintenance Hangar Large Aircraft Maintenance Dock

  7. Iranian Strategy in Iraq: Politics and 'Other Means'

    National Research Council Canada - National Science Library

    Felter, Joseph H; Fishman, Brian

    2008-01-01

    .... Second, Iran uses the Iranian Revolutionary Guard Corps (IRGC) and Qods Force (QF) to provide aid in the form of paramilitary training, weapons, and equipment to various Iraqi militant groups, including Moqtada al-Sadr's Jaysh al-Mahdi (JAM...

  8. Collective Security Treaty Organization: Origins of the Multidimensional Mandate and Modern Means for its Implementation

    Directory of Open Access Journals (Sweden)

    Golub K.

    2018-03-01

    Full Text Available This article examines the historically contradictory development of the Collective Security Treaty Organization (CSTO following its 15th anniversary, and evaluates its political potential from the point of view of its assigned mandate. The evolution of international stability at the beginning of the century forced the contracting parties of the CSTO to formalize their mainly declarative interactions through the creation of a valid regional security organization. This new collective security forum enriched the cooperation mandate by establishing additional areas for mutual coordination including counterterrorism activities, measures to combat illegal migration and drug trafficking, strategies to respond to natural disasters and cybersecurity. The creation of the multitasking Collective Rapid Reaction Forces was the first significant step on the way to the practical realization of the CSTO. The Collective Security Strategy for the period ending in 2025 organizes the CSTO instruments of international cooperation within the CSTO crisis management framework and thus works to reduce the fragmentary nature of the CSTO. Despite the availability of the Collective Rapid Reaction Forces and the Collective Peace-Keeping Forces, the CSTO’s crisis management approach gives priority to political approaches and negotiation. Consequently, the multifunctional mandate of the CSTO predetermines its strategic role in Eurasia and allows it to achieve its political goals related to conservation of the common military and strategic area, the creation of a constraining effect, the facilitation of cooperation among law enforcement and intelligence agencies and the ability to contribute to the settlement of regional and local conflicts.

  9. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    International Nuclear Information System (INIS)

    Rogers, E.; deBoer, G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-01-01

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC and A). Though MPC and A systems can significantly upgrade nuclear security, they do not eliminate the 'human factor.' Gen. Eugene Habiger, a former 'Assistant Secretary for Safeguards and Security' at the U.S. Department of Energy's (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that 'good security is 20% equipment and 80% people.' Although eliminating the 'human factor' is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  10. Self-Reliability and Motivation in a Nuclear Security Culture Enhancement Program

    Energy Technology Data Exchange (ETDEWEB)

    Rogers,E.; deBoer,G.; Crawford, C.; De Castro, K.; Landers, J.

    2009-10-19

    The threat of nuclear terrorism has become a global concern. Many countries continue to make efforts to strengthen nuclear security by enhancing systems of nuclear material protection, control, and accounting (MPC&A). Though MPC&A systems can significantly upgrade nuclear security, they do not eliminate the "human factor." Gen. Eugene Habiger, a former "Assistant Secretary for Safeguards and Security" at the U.S. Department of Energy’s (DOE) nuclear-weapons complex and a former commander of U.S. strategic nuclear forces, has observed that "good security is 20% equipment and 80% people." Although eliminating the "human factor" is not possible, accounting for and mitigating the risk of the insider threat is an essential element in establishing an effective nuclear security culture. This paper will consider the organizational role in mitigating the risk associated with the malicious insider through monitoring and enhancing human reliability and motivation as well as enhancing the nuclear security culture.

  11. Security of material. The changing context of the IAEA's programme

    International Nuclear Information System (INIS)

    Nilsson, Anita

    2001-01-01

    When the IAEA established its programme on the Security of Material about five years ago, the prospect that nuclear or other radioactive materials could fall into the wrong hands was a main concern. Among the major driving forces behind the Agency's action then was an alarming increase in reported cases of illicit nuclear trafficking in the early and mid-1990s, and the recognition that States needed better and more coordinated assistance in their efforts to combat the problem. Today, the dimensions and perceptions of nuclear security are being shaped by additional driving forces, specifically the spectre of nuclear terrorism. The terrorist attacks on the United States in September 2001 have elevated issues of security to unprecedented heights of international concern and they have prompted a broad-based global response. The attacks made it clear that terrorism has new and far-reaching international dimensions and that its aim of inflicting mass casualties is a serious threat for all States. In the nuclear sphere, the IAEA has taken a leading role in international efforts directed at combating nuclear terrorism. Initiatives taken by the Agency aim to upgrade levels of security for nuclear facilities and the protection of nuclear and other radioactive materials. Toward these ends, the IAEA Board of Governors is considering proposed measures for strengthening the Agency's activities relevant to preventing nuclear terrorism. In this new and challenging context, it is worth reviewing some fundamental aspects of the IAEA programme on Security of Material as it has been developed over the years. The programme is part of a wider framework of Agency activities related to nuclear security, safety, and safeguards. In reviewing the programme's evolution, this article principally focuses on the major components and elements of the planned 2002-2003 programme, while pointing to directions ahead in light of additional measures being considered for prevention of nuclear terrorism

  12. Irradiation applications for homeland security

    International Nuclear Information System (INIS)

    Desrosiers, Marc F.

    2004-01-01

    In October 2001, first-class mail laced with anthrax was sent to political and media targets resulting in several deaths, illnesses, significant mail-service disruption, and economic loss. The White House Office of Science and Technology Policy established a technical task force on mail decontamination that included three key agencies: National Institute of Standards and Technology with responsibility for radiation dosimetry and coordinating and performing experiments at industrial accelerator facilities; the Armed Forces Radiobiology Research Institute with responsibility for radiobiology; and the US Postal Service with responsibility for radiation-processing quality assurance and quality control. An overview of the anthrax attack decontamination events will be presented as well as expectations for growth in this area and the prospects of other homeland security areas where irradiation technology can be applied

  13. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L. by using RAPD Technique

    Directory of Open Access Journals (Sweden)

    Muhanned Abdul Hasan Kareem

    2018-01-01

    Full Text Available In this study provided all molecular markers of Random amplified polymorphic (RAPD successfully with the sixty five Iraqi date palm (Phoenix dactylifera L. cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592 bands, polymorphism per all primers were (%64.2, primer efficiency was 0.1, and discriminatory value was (%0.09, which revealed a high percentage similarity about %67 to %100 between cultivars belong to the same variety. There are relationships with twenty four genotypes, divided in to two clusters, clusterΙ ranged distance from 0.74 to 1.30 represented(Maddany, Ashrasi, Greatli, Smeasmi and sukkary and clusterII ranged distance from 0.25 to 0.60 which divided into three sub group, there are sub group I represented (Sultana, Khestawi, Breem, Sabb Drrah, Hamrawi, Brban, and Khadrawi, sub groupiesII represented (Zahdi, Tebarzal, Maktom, brahi, Chipchab and Fom Alrman, sub groupies III represented (Usta Umran, Nersi, Najdi, Guntar, Shwethi and Ghanami Ahmer.

  14. Genetic Diversity of Iraqi Date Palm (Phoenix ‎dactylifera L. by using RAPD Technique

    Directory of Open Access Journals (Sweden)

    Muhanned Abdul Hasan

    2017-12-01

    Full Text Available In this study provided all molecular markers of Random amplified polymorphic (RAPD successfully with the sixty five Iraqi date palm (Phoenix dactylifera L. cultivars, which collected from Hilla city in Iraq, to determine fingerprinting, polymorphic value, and relationships among varieties of date palm cultivars, and also with the same type of cultivars. Data analysis of ten RAPD has been revealed. Number of amplified DNA fragments were (592 bands, polymorphism per all primers were (%64.2, primer efficiency was 0.1, and discriminatory value was (%0.09, which revealed a high percentage similarity about %67 to %100 between cultivars belong to the same variety. There are relationships with twenty four genotypes, divided in to two clusters, clusterΙ ranged distance from 0.74 to 1.30 represented(Maddany, Ashrasi, Greatli, Smeasmi and sukkary and clusterII ranged distance from 0.25 to 0.60 which divided into three sub group, there are sub group I represented (Sultana, Khestawi, Breem, Sabb Drrah, Hamrawi, Brban, and Khadrawi, sub groupiesII represented (Zahdi, Tebarzal, Maktom, brahi, Chipchab and Fom Alrman, sub groupies III represented (Usta Umran, Nersi, Najdi, Guntar, Shwethi and Ghanami Ahmer.  

  15. Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DoD Software

    National Research Council Canada - National Science Library

    2007-01-01

    The Defense Science Board (DSB) Task Force on Mission Impact of Foreign Influence on DoD Software examined areas in software security, security architecture, and risk mitigation and received briefings from industry, academia...

  16. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  17. The National Guard Meeting Its Obligation to Provide Capable Forces for Homeland Security

    National Research Council Canada - National Science Library

    Sellars, Thomas J

    2006-01-01

    ... (warfighting versus domestic support/homeland security) be harmonized to best posture the Guard to meet both its state obligations and at the same time continue to play a pivotal role in joint warfighting and stability operations...

  18. Issues of Safety and Security: New Challenging to Malaysia Tourism Industry

    OpenAIRE

    Mohd Ayob Norizawati; Masron Tarmiji

    2014-01-01

    The safety and security issues nowadays become one of the forces causing changes in tourism industry in era of millennium. The main concern of this issues more focus on crime rates, terrorism, food safety, health issues and natural disaster. This topic gained the popularity in tourism research after 9/11 tragedy and since then the academicians and practitioners started seeking the best solution in ways to mitigate these negative impacts. For Malaysia, the image as safety and secure destinatio...

  19. The North Atlantic Treaty Organization and the European Union’s Common Security and Defense Policy: Intersecting Trajectories

    Science.gov (United States)

    2011-07-01

    Lieutenant General, Canadian Forces, Canadian Military Repre- sentative to NATO Elizabeth Race, Deputy Defence Policy Advisor, Canadian Joint...Ruehle, Head, Energy Security Section, Emerging Security Challenges Division, NATO ( Brus - sels) Patrick Nash, Lieutenant General, Irish Army, for- mer

  20. Haiti’s Army, Stabilization and Security Sector Governance

    Directory of Open Access Journals (Sweden)

    Geoff Burt

    2016-09-01

    Full Text Available Haiti’s long and difficult security sector reform (SSR process has entered a new phase. The reinstatement of the Haitian armed forces, nearly 20 years after former President Jean-Bertrand Aristide disbanded them, adds a new set of actors and more complexity to a process already struggling to deliver results amidst a seemingly endless series of political crises. The armed forces must be an impartial and apolitical institution if they are to contribute to stability in Haiti – an uncertain proposition given their past inability to stay out of the political arena. Building on a summary of the latest developments in the reinstatement process, this paper discusses its implications for Haiti’s prolonged international engagement. In particular, the paper focuses on the process to develop a new White Paper on Defence and National Security in Haiti. This process has the potential to contribute to two of the most significant shortcomings of SSR in Haiti, a limited focus on security sector governance and a lack of local ownership. The reinstatement process has been an interesting test case of the international donor community’s commitment to the concept of local ownership, long held to be a moral and practical pillar of international engagement. Though reinstatement has been driven by Haitian authorities, the process has struggled to make progress without donor support, raising questions about the appropriate role of international actors in strategic decision-making at the national level. Regardless of their initial reaction to reinstatement, Haiti’s international donors risk missing an opportunity to influence the development of an important pillar of Haiti’s post-MINUSTAH security sector by choosing to remain on the sidelines.

  1. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  2. Flexibility and security : National social models in transitional labour markets

    NARCIS (Netherlands)

    Muffels, R.J.A.; Crouch, Colin; Wilthagen, A.C.J.M.

    2014-01-01

    Aggregate and individual data are used to test the association between employment performance and different ways of reconciling flexibility and security in European labour markets. Particular use is made of statistics on individuals’ labour market transitions as revealed by national labour force

  3. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  4. Air traffic security act unconstitutional; Luftsicherheitsgesetz verfassungswidrig

    Energy Technology Data Exchange (ETDEWEB)

    Heller, W.

    2006-05-15

    In the interest of more effective protective measures against terrorist attacks, the German federal parliament inter alia added a clause to the Air Traffic Security Act (Sec. 14, Para. 3, Air Traffic Security Act) empowering the armed forces to shoot down aircraft to be used as a weapon against human lives. In Germany, this defense possibility has been discussed also in connection with deliberate crashes of hijacked aircraft on nuclear power plants. The 1{sup st} Division of the German Federal Constitutional Court, in its decision of February 15, 2006, ruled that Sec. 14, Para. 3, Air Traffic Security Act was incompatible with the Basic Law and thus was null and void (file No. 1 BvR 357/05) for two reasons: - There was no legislative authority on the part of the federal government. - The provision was incompatible with the basic right of life and the guarantee of human dignity as enshrined in the Basic Law. (orig.)

  5. Making Peace Pay: Post-Conflict Economic and Infrastructure Development in Kosovo and Iraq

    Science.gov (United States)

    probability that a post-conflict state will return to war. Additionally, consecutive presidential administrations and joint doctrine have declared...and Iraqi Freedom as historical case studies to demonstrate that the armed forces possess unique advantages, to include physical presence and

  6. Iraq: United Nations and Humanitarian Aid Organizations

    National Research Council Canada - National Science Library

    Coipuram, Jr, Tom

    2003-01-01

    The war with Iraq, which began on March 19, 2003, has now moved into a new phase as a result of coalition forces controlling all of the major cites in Iraq and the demise of the Iraqi political and military leadership...

  7. التجارة العراقية 1921-1958 دراسة تاريخية Iraqi Trade 1921-1958 Historical Study

    Directory of Open Access Journals (Sweden)

    Nadia Jassim Kadhim Al-Shammari نادية جاسم كاظم الشمري

    2016-03-01

    Full Text Available The study showed that trade represents a vital artery that connects the Iraqi economy, the economies of countries in the world and represented the phenomenon of the trade imbalance problem is evident in the structure of the Iraqi economy during the period of the twenties of the twentieth century, was the deficit and the clear distinction between the value of import and export, and we found out the underlying causes of this phenomenon, which is the novelty of the State First, inexperience apparatus specialized management, and lack of infrastructure Secondly, backwardness in agricultural and industrial production and characterized Iraq's foreign trade control of Britain on the import and export of Iraq and to him, then India and the rest of the other countries, and included most of Iraq's imports from Britain fabrics, cotton and woolen and silk types, machinery and materials construction, were either India imports include coffee, tea, soap, either Iraq's exports are limited in the major agricultural production goal of Baltimore, and livestock production goal of hides and wool

  8. Determining the efficacy of nuclear security through computer simulation

    Energy Technology Data Exchange (ETDEWEB)

    Chornobo, N.; Waller, E., E-mail: nicholas.chornoboy@uoit.ca [University of Ontario Institute of Technology, Oshawa, ON (Canada)

    2015-07-01

    Currently when creating new security regimes or analyzing current ones it is difficult to determine how effective they are or will be. This leads to many decisions being made using subjective expert opinion or expensive live exercises. While these are useful for determining the effectiveness it would be ideal to have an easy way to simulate and attack through software in order to allow rapid testing of many different scenarios simply. This work focuses on modifying the force on force simulator stage to run these kinds of tests. (author)

  9. A Survey on Password Security Systems

    OpenAIRE

    Ms. A. G. Khairnar; Prof. N. L. Bhale

    2013-01-01

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc. This paper gives review on different methods which were introduced for protection of password on a network. This paper also includes work don...

  10. Enhancing Security and Stability in Afghanistan

    Science.gov (United States)

    2015-12-01

    Helmand and Kandahar, were as expected, but the ANDSF were also forced to confront insecurity at a higher level than expected in other parts of the...creating a sense of insecurity that undercuts perceptions of the Afghan government’s ability to provide security. The increase in violence over the...able to defeat the ANDSF on the battlefield in 2016, countering insurgent propaganda will remain a challenge as the insurgents advertise the perceived

  11. Nuclear power: energy security and supply assurances

    International Nuclear Information System (INIS)

    Rogner, H.H.; McDonald, A.

    2008-01-01

    Expectations are high for nuclear power. This paper first summarizes recent global and regional projections for the medium-term, including the 2007 updates of IAEA projections plus International Energy Agency and World Energy Technology Outlook projections to 2030 and 2050. One driving force for nuclear power is concern about energy supply security. Two potential obstacles are concerns about increased nuclear weapon proliferation risks, and concerns by some countries about potential politically motivated nuclear fuel supply interruptions. Concerning supply security, the paper reviews different definitions, strategies and costs. Supply security is not free; nor does nuclear power categorically increase energy supply security in all situations. Concerning proliferation and nuclear fuel cut-off risks, the IAEA and others are exploring possible 'assurance of supply' mechanisms with 2 motivations. First, the possibility of a political fuel supply interruption is a non-market disincentive discouraging investment in nuclear power. Fuel supply assurance mechanisms could reduce this disincentive. Second, the risk of interruption creates an incentive for a country to insure against that risk by developing a national enrichment capability. Assurance mechanisms could reduce this incentive, thereby reducing the possible spread of new national enrichment capabilities and any associated weapon proliferation risks. (orig.)

  12. Forced Engagements: Water Security and Local Rights Formalization in Yanque, Colca Valley, Peru

    NARCIS (Netherlands)

    Boelens, R.A.; Seemann, M.

    2014-01-01

    For vulnerable groups in society, water insecurity and deficient water availability for food production commonly reflect unequal distribution of water volumes, quality, and services within unequal power structures. Water security is necessarily a political dilemma. Policy debates, however, tend to

  13. European Security and Defense Policy (ESDP) After Ten Years - Current Situation and Perspectives

    Science.gov (United States)

    2010-01-01

    Reconnaissance and Observation ( MUSIS ), enhancement of the use of the EU Satellite-Center (EUSC), enhancement of Unmanned Armed Vehicles (UAV), Maritime Mine...stipulated by the capability declaration of 2008, are within the responsibility of the agency. Specific capabilities initiatives, such as the MUSIS ...Product ISAF = International Security Assistance Force KFOR = NATO Kosovo Force MUSIS = Multinational Space-Based Imaging System for Surveillance

  14. Security analysis of a chaos-based image encryption algorithm

    Science.gov (United States)

    Lian, Shiguo; Sun, Jinsheng; Wang, Zhiquan

    2005-06-01

    The security of Fridrich's algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem.

  15. Final Nellis Air Force Base Capital Improvements Program Environmental Assessment

    Science.gov (United States)

    2013-08-01

    pathology, radiology, dietetic and nutritional medicine, medical benefits and information. The 99th Security Forces Squadron provides flight-line...parking lots RKMF070024 Construct Soccer Field Parking Lot Roads/parking lots RKMF110155 Construct Solar Lighting At Hospital Track Recreation

  16. Joint Force Quarterly. Issue 70, 3rd Quarter, July 2013

    Science.gov (United States)

    2013-07-01

    hepatitis, typhoid fever, plague, malaria, or cholera .7 During Operations Iraqi Freedom and Enduring Freedom from 2001 to 2006, evacu- ations for...troops as the 1885–1886 Geronimo Campaign used operating over the same terrain in northern Mexico —11,000 versus 5,000. Yet it was the earlier...partnership with Pakistan was critical for operational success. As with Mexico during the Punitive Expedition and Honduras during the Sandino affair

  17. Critical Care Air Transport Team severe traumatic brain injury short-term outcomes during flight for Operation Iraqi Freedom/Operation Enduring Freedom.

    Science.gov (United States)

    Boyd, L Renee; Borawski, J; Lairet, J; Limkakeng, A T

    2017-10-01

    Our understanding of the expertise and equipment required to air transport injured soldiers with severe traumatic brain injuries (TBIs) continue to evolve. We conducted a retrospective chart review of characteristics, interventions required and short-term outcomes of patients with severe TBI managed by the US Air Force Critical Care Air Transport Teams (CCATTs) deployed in support of Operation Iraqi Freedom and Operation Enduring Freedom between 1 June 2007 and 31 August 2010. Patients were cared for based on guidelines given by the Brain Trauma Foundation and the Joint Theater Trauma System by non-neurosurgeon physicians with dedicated neurocritical care training. We report basic characteristics, injuries, interventions required and complications during transport. Intracranial haemorrhage was the most common diagnosis in this cohort. Most injuries were weapon related. During this study, there were no reported in-flight deaths. The majority of patients were mechanically ventilated. There were 45 patients who required at least one vasopressor to maintain adequate tissue perfusion, including four patients who required three or more. Some patients required intracranial pressure (ICP) management, treatment of diabetes insipidus and/or seizure prophylaxis medications. Air transport personnel must be prepared to provide standard critical care but also care specific to TBIs, including ICP control and management of diabetes insipidus. Although these patients and their potential complications are traditionally managed by neurosurgeons, those providers without neurosurgical backgrounds can be provided this training to help fill a wartime need. This study provides data for the future development of air transport guidelines for validating and clearing flight surgeons. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  18. Translating Legal Collocations in Contract Agreements by Iraqi EFL Students-Translators

    Directory of Open Access Journals (Sweden)

    Muntaha A. Abdulwahid

    2017-01-01

    Full Text Available Legal translation of contract agreements is a challenge to translators as it involves combining the literary translation with the technical terminological precision. In translating legal contract agreements, a legal translator must utilize the lexical or syntactic precision and, more importantly, the pragmatic awareness of the context. This will guarantee an overall communicative process and avoid inconsistency in legal translation. However, the inability of the translator to meet these two functions in translating the contract item not only affects the contractors’ comprehension of the contract item but also affects the parties’ contractual obligations. In light of this, the purpose of this study was to find out how legal collocations used in contract agreements are translated from Arabic into English by student-translators in terms of (1 purely technical, (2 semi-technical, and (3 everyday vocabulary collocations. For the data collection, a multiple-choice collocation test was used to be answered by 35 EFL Iraqi undergraduate translator-students to decide on the aspects of weaknesses and strengths of their translation, thus decide on the aspects of correction. The findings showed that these students had serious problems in translating legal collocations as they lack the linguistic knowledge and pragmatic awareness needed to achieve the legal meaning and effect. They were also unable to make a difference among the three categories of legal collocations, purely technical, semi-technical, and everyday vocabulary collocations. These students should be exposed to more legal translation practices to obtain the required experience needed for their future career.

  19. Does political ideology moderate stress: the special case of soldiers conducting forced evacuation.

    Science.gov (United States)

    Shechner, Tomer; Slone, Michelle; Bialik, Gadi

    2007-04-01

    This study examined the moderating role of political ideology on psychological outcomes for Israeli soldiers participating in the forced evacuation of Jewish settlements from Gaza. Change in psychopathology and well-being was assessed for 3 concurrent mission groups differing in their political ideological contentiousness--forced evacuation, Gaza security, and Northern border security. After soldiers in each mission group were classified on the basis of relatively left- or right-wing political ideological tendencies, the authors examined differential impact of each mission on soldiers of differing political ideology. Results confirmed strong moderation effects of political ideology on psychological outcomes in these extreme contexts. Implications for research, prevention, and treatment are discussed. 2007 APA, all rights reserved

  20. United States and Israeli Homeland Security: A Comparative Analysis of Emergency Preparedness Efforts

    National Research Council Canada - National Science Library

    Pockett, Consuella B

    2005-01-01

    This paper will provide a comparative analysis of the United States (U.S.) Department of Homeland Security's Emergency Preparedness and Response directorate and the Israel Defense Forces Home Front Command...