Search Results

open access

Development of a high-throughput microfluidic integrated microarray for the detection of chimeric bioweapons.

Description: The advancement of DNA cloning has significantly augmented the potential threat of a focused bioweapon assault, such as a terrorist attack. With current DNA cloning techniques, toxin genes from the most dangerous (but environmentally labile) bacterial or viral organism can now be selected and inserted into robust organism to produce an infinite number of deadly chimeric bioweapons. In order to neutralize such a threat, accurate detection of the expressed toxin genes, rather than classification … more
Date: October 1, 2006
Creator: Sheppod, Timothy; Satterfield, Brent; Hukari, Kyle W.; West, Jason A. A. & Hux, Gary A.
Partner: UNT Libraries Government Documents Department
open access

Linguistic evaluation of terrorist scenarios: example application.

Description: In 2005, a group of international decision makers developed a manual process for evaluating terrorist scenarios. That process has been implemented in the approximate reasoning Java software tool, LinguisticBelief, released in FY2007. One purpose of this report is to show the flexibility of the LinguisticBelief tool to automate a custom model developed by others. LinguisticBelief evaluates combinations of linguistic variables using an approximate reasoning rule base. Each variable is comprised o… more
Date: March 1, 2007
Creator: Darby, John L.
Partner: UNT Libraries Government Documents Department

Challenges Encountered During Law Enforcement Investigations of Terrorist Use of Information Technology.

Description: The late 20th and early 21st centuries have seen a phenomenal growth in society's use of information technology. Criminals, including terrorists and terrorist organizations, have also adopted information technologies. Information technologies are used to enhance the efficiency, productivity, and effectiveness of terrorist activities and offenses. Investigating terrorist use of information technologies creates a number of challenges for law enforcement officials. While some of the challenges… more
Access: Restricted to UNT Community Members. Login required if off-campus.
Date: May 2005
Creator: Morgan, Deanne
Partner: UNT Libraries
open access

Determinants of International Terrorist Group Formation, 1968-1999

Description: Terrorism has become a focus of much political thought over the past few years, and with good reason, yet most quantitative studies of terrorism investigate the likelihood of a terrorist incident while ignoring the precursors to terrorist group formation. I examine cases of new terrorist group formations between the years 1968 and 1999 as a function of domestic demographic, geographic, governmental and societal factors. This is done by Poisson regression analysis, which determines the significa… more
Date: December 2007
Creator: Worrell, Blake
Partner: UNT Libraries
Back to Top of Screen