Results 31 to 40 of about 437,959 (307)
The exponential growth of video surveillance systems in public and private spaces has heightened the demand for effective and automated abnormal behavior detection mechanisms.
Shunli Qiao, Honglin Liu
doaj +1 more source
Inside the proxy relationship: alignment between Iran and the Mahdi Army, 2003–2008
The 2003 U.S.-led invasion of Iraq brought increased international attention to regional dynamics in the Middle East. A key challenge for the U.S. was Iran’s support for regional proxy militias.
Margaret McWeeney, Kevin Harrington
doaj +1 more source
Jihad online : how do terrorists use the internet? [PDF]
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety among wide circles of the targeted population. This paper provides information about the ways terrorists are using the Internet. The threat of terrorism is
Cohen-Almagor, Raphael
core +2 more sources
‘Where are the adults?’: Troubling child‐activism and children's political participation
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley +1 more source
This systematic review consists of two parts. Part I seeks to synthesise evidence from primary or secondary research studies examining the implementation and effectiveness of case management tools and approaches currently being used to counter ...
James Lewis +7 more
doaj +1 more source
A Comparative Study of Extreme Religious Nationalist Terrorist Groups in the United States [PDF]
The aim of this paper is to conduct a comparative study of Radical Right Wing terrorism and Radical Islamic terrorism both of which are categorized under the Religious Nationalism/Extremism typology of terrorism.
Arthur, Colleen
core +1 more source
Abstract There is much interest in the potential for an alternative funding system for higher education students in England to support the spiritual and worldly needs of British Muslim students. At the heart of this issue lies a tension over whether the student financing system in English HE is haram, or forbidden under Islamic (Shari'ah) law, because ...
Richard Hall +2 more
wiley +1 more source
Traditional DRL-based resource allocation for cloud-edge-end computing primarily depends on known state parameters and real-time feedback rewards when making decisions. The traditional model, which heavily relies on prior knowledge and real-time feedback
Xiaoqi Zhang +3 more
doaj +1 more source
INTERNATIONAL REGULATION OF THE CHILD ABDUCTIONS [PDF]
The occurrence of international child abductions is not of a recent age, although the term “abduction” is of a relatively recent date. By studying ancient legal sources (Roman law, rights in ancient Greece, rights in Mesopotamia etc.) legal fragments ...
Miro Katić
doaj +1 more source
ABSTRACT The aim of this study is to examine the impact of corruption control, as a public institutional mechanism, on hazardous waste emissions of private sector entities. We also examine the extent to which Agenda 2030 moderates the relationship. We analyse data from the top 500 global companies.
Babajide Oyewo +3 more
wiley +1 more source

