Results 31 to 40 of about 437,959 (307)

Automatic classification of criminal activities for security surveillance by keyframes detection and advanced inception techniques

open access: yesScientific Reports
The exponential growth of video surveillance systems in public and private spaces has heightened the demand for effective and automated abnormal behavior detection mechanisms.
Shunli Qiao, Honglin Liu
doaj   +1 more source

Inside the proxy relationship: alignment between Iran and the Mahdi Army, 2003–2008

open access: yesCogent Social Sciences
The 2003 U.S.-led invasion of Iraq brought increased international attention to regional dynamics in the Middle East. A key challenge for the U.S. was Iran’s support for regional proxy militias.
Margaret McWeeney, Kevin Harrington
doaj   +1 more source

Jihad online : how do terrorists use the internet? [PDF]

open access: yes, 2016
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety among wide circles of the targeted population. This paper provides information about the ways terrorists are using the Internet. The threat of terrorism is
Cohen-Almagor, Raphael
core   +2 more sources

‘Where are the adults?’: Troubling child‐activism and children's political participation

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley   +1 more source

PROTOCOL: Case management interventions seeking to counter radicalisation to violence: A systematic review of tools and approaches

open access: yesCampbell Systematic Reviews, 2023
This systematic review consists of two parts. Part I seeks to synthesise evidence from primary or secondary research studies examining the implementation and effectiveness of case management tools and approaches currently being used to counter ...
James Lewis   +7 more
doaj   +1 more source

A Comparative Study of Extreme Religious Nationalist Terrorist Groups in the United States [PDF]

open access: yes, 2018
The aim of this paper is to conduct a comparative study of Radical Right Wing terrorism and Radical Islamic terrorism both of which are categorized under the Religious Nationalism/Extremism typology of terrorism.
Arthur, Colleen
core   +1 more source

The impact of the current student loans regime on Muslim student engagement and retention in English higher education

open access: yesBritish Educational Research Journal, EarlyView.
Abstract There is much interest in the potential for an alternative funding system for higher education students in England to support the spiritual and worldly needs of British Muslim students. At the heart of this issue lies a tension over whether the student financing system in English HE is haram, or forbidden under Islamic (Shari'ah) law, because ...
Richard Hall   +2 more
wiley   +1 more source

DT-aided resource allocation via generative adversarial imitation learning in complex cloud-edge-end scenarios

open access: yesScientific Reports
Traditional DRL-based resource allocation for cloud-edge-end computing primarily depends on known state parameters and real-time feedback rewards when making decisions. The traditional model, which heavily relies on prior knowledge and real-time feedback
Xiaoqi Zhang   +3 more
doaj   +1 more source

INTERNATIONAL REGULATION OF THE CHILD ABDUCTIONS [PDF]

open access: yesSTED Journal, 2019
The occurrence of international child abductions is not of a recent age, although the term “abduction” is of a relatively recent date. By studying ancient legal sources (Roman law, rights in ancient Greece, rights in Mesopotamia etc.) legal fragments ...
Miro Katić
doaj   +1 more source

Corruption Control and Corporate Hazardous Waste Emissions: Cross‐Country Evidence and the Moderating Role of Agenda 2030

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The aim of this study is to examine the impact of corruption control, as a public institutional mechanism, on hazardous waste emissions of private sector entities. We also examine the extent to which Agenda 2030 moderates the relationship. We analyse data from the top 500 global companies.
Babajide Oyewo   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy