您好,欢迎光临本网站![请登录][注册会员]  

搜索资源列表

  1. GIS and disasters

  2. Recent events, including the Indian Ocean tsunami, the hurricanes of the 2005 season, and the 7/7 and 9/11 terrorist attacks, have made us all acutely aware of the vulnerability of modern society. Knowing where such events have occurred and the geog
  3. 所属分类:专业指导

    • 发布日期:2009-05-05
    • 文件大小:61440
    • 提供者:sunbonaparte
  1. Geographic Profiling of Terrorist Attacks

  2. Through the use of a computerized geographic profiling system and two case studies, this chapter examines the applicability of geographic profiling in the context of terrorist attacks. The findings of this examination are somewhat mixed with a final
  3. 所属分类:专业指导

    • 发布日期:2010-02-24
    • 文件大小:359424
    • 提供者:wsdsgfuqiang
  1. Cyber Adversary Characterization Auditing the Hacker Mind(syngress安全图书)

  2. The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intru
  3. 所属分类:硬件开发

    • 发布日期:2010-04-05
    • 文件大小:4194304
    • 提供者:sunxianbin
  1. Image Steganography and Steganalysis

  2. Steganography is the art of hiding information within other information in such a way that it is hard or even impossible to tell that it is there. There are many different carriers for steganography but the most popular is digital images. Recently,
  3. 所属分类:其它

    • 发布日期:2011-07-21
    • 文件大小:3145728
    • 提供者:kevin___lee
  1. Criminal_network_analysis

  2. A great deal has been written over the last four years regarding how academics have contributed possible technological solutions for uncovering terrorist networks to enhance public safety and national security. Both the public and the Pentagon have
  3. 所属分类:互联网

    • 发布日期:2013-01-08
    • 文件大小:2097152
    • 提供者:xiaoxsmile
  1. Criminal network analysis

  2. A great deal has been written over the last four years regarding how academics have contributed possible technological solutions for uncovering terrorist networks to enhance public safety and national security. Both the public and the Pentagon have
  3. 所属分类:互联网

    • 发布日期:2013-01-08
    • 文件大小:2097152
    • 提供者:xiaoxsmile
  1. extjs4---job10和job11

  2. 测试EXTJS4中的特性:config, extend, statics, mixins。 测试EXTJS自定义事件:当恐怖分子(Terrorist)在火车站掏刀时,触发一个砍人事件。警察将抓捕他。 群众(Person)看到砍人吓坏了。
  3. 所属分类:Javascript

    • 发布日期:2014-05-20
    • 文件大小:3145728
    • 提供者:xu982604405
  1. Spark Graphx in Action

  2. Note that for the generic terms spark and graphs we had to substitute the overly spe- cific Apache Spark and edges and vertices, but the trends can still be seen. A couple of these technologies, machine learning and graphs, have long histories withi
  3. 所属分类:Actionscript

    • 发布日期:2016-12-26
    • 文件大小:17825792
    • 提供者:68040277
  1. Global-Terrorist-Attacks

  2. 对GTD全球反恐数据集进行分析和数据挖掘,挖掘和分析哪些攻击是经常发生的,在哪些地方发生。并预测未有组织宣称的事件是哪个组织负责的。
  3. 所属分类:机器学习

    • 发布日期:2018-09-20
    • 文件大小:3145728
    • 提供者:x_uhen
  1. Citespace案例运行结果.pdf

  2. Citespace案例PPT,对于使用Citespace有帮助。第一次上传017年8月6日下午9时3分46协 o S: B: \Ubers \Jerry\. sitespaseLExampl es wo STerrorism390-2003\data 31.1s38·2003[ lilY Selection Criteria Top 50 per slice, LRF=-1, LBY=1,e=2.0 rtyQ=2.5959 Mean SilHouette=0,5Co? ENDERS W(199#
  3. 所属分类:其它

    • 发布日期:2019-09-19
    • 文件大小:5242880
    • 提供者:u013595679
  1. solaris10学习

  2. NULL 博文链接:https://asi12.iteye.com/blog/814440Copyright 2004 Sun Microsystems, InC, 4150 Network Circle, Santa Clara, California 95054, U.S.A. All rights reserved This product or docunent is protected by copyright and distributed under licenses restri
  3. 所属分类:其它

    • 发布日期:2019-07-29
    • 文件大小:1048576
    • 提供者:weixin_38669628
  1. 1917800(提交).pdf

  2. 2019年美国大学生数学建模大赛D题逃离卢浮宫 根据卢浮宫的结构,绘制了一个有向图,(指示基于图论的疏散路径),【Floyd-Warshall算法】用于搜索从亭组到出口的最短路径。 通过运行算法,得到疏散矩阵,(工作人员使用疏散矩阵指导访客通过每条计划路径安全到达出口);鉴于排队理论,当疏散时,访问者将在出口处排队,排队参数(例如队列长度和等待时间)。 【粒子群优化用于优化模型】疏浚这些瓶颈,优化后,最终平均疏散时间为3秒,出口平均排队长度为3米,队列等待时间为3秒,比以前减少10%。 在对模型
  3. 所属分类:专业指导

    • 发布日期:2019-07-27
    • 文件大小:7340032
    • 提供者:weixin_44121283
  1. Vulnerabilityanalysis and critical areas identification of the power systems under terrorist attacks

  2. Vulnerabilityanalysis and critical areas identification of the power systems under terrorist attacks
  3. 所属分类:其它

    • 发布日期:2021-02-11
    • 文件大小:1048576
    • 提供者:weixin_38746442
  1. Detection of chemical warfare agents based on quantum cascade laser cavity ring-down spectroscopy

  2. Chemical warfare agents (CWAs) are recognized as serious threats of terrorist acts against the civilian population. Minimizing the impact of these threats requires early detection of the presence of CWAs. Cavity ring-down spectroscopy (CRDS) is an ex
  3. 所属分类:其它

    • 发布日期:2021-02-09
    • 文件大小:352256
    • 提供者:weixin_38526208