Counter-IED Efforts
Counter-IED efforts are done primarily by military and law enforcement (led by intelligence efforts) with the assistance of the diplomatic and financial communities. It involves a comprehensive approach of countering the threat networks that employ improvised explosive devices (IEDs), defeating the devices themselves, and training others. Counter-IED, or C-IED, is usually part of a broader counter-terrorism, counter-insurgency, or law enforcement effort. Because IEDs are a subset of a number of forms of asymmetric warfare used by insurgents and terrorists, C-IED activities are principally against adversaries and not only against IEDs. C-IED treats the IED as a systemic problem and aims to defeat the IED threat networks themselves. This IED threat network requires multiple actions and resources in order to stage an IED Event. The IED threat network may be either hierarchical or non-hierarchical but it will contain nodes such as personnel, resources and other actions that are lin ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Mastiff And Panama Remote Controlled Vehicle MOD 45159065
A mastiff is a large and powerful type of dog. Mastiffs are among the largest dogs, and typically have a short coat, a long low-set tail and large feet; the skull is large and bulky, the muzzle broad and short (brachycephalic) and the ears drooping and pendant-shaped. European and Asian records dating back 3,000 years show dogs of the mastiff type. Mastiffs have historically been guard dogs, protecting homes and property, although throughout history they have been used as hunting dogs, war dogs and for blood sports, such as fighting each other and other animals, including bulls, bears and even lions. Historical and archaeological evidence suggests that mastiffs have long been distinct in both form and function from the similarly large livestock guardian dogs from which they were most likely developed; they also form separate genetic populations. The Fédération Cynologique Internationale and some kennel clubs group the two types together as molossoid dogs; some modern livesto ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Choke Point
In military strategy, a choke point (or chokepoint) is a geographical feature on land such as a valley, defile or bridge, or maritime passage through a critical waterway such as a strait, which an armed force is forced to pass through in order to reach its objective, sometimes on a substantially narrowed front and therefore greatly decreasing its combat effectiveness by making it harder to bring superior numbers to bear. A choke point can allow a numerically inferior defending force to use the terrain as a force multiplier to thwart or ambush a much larger opponent, as the attacker cannot advance any further without first securing passage through the choke point. Historical examples Some historical examples of the tactical use of choke points are King Leonidas I's defense of the Pass of Thermopylae during an invasion led by Xerxes I of Persia; the Battle of Stamford Bridge in which Harold Godwinson defeated Harald Hardrada; William Wallace's victory over the English at t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Fundraising
Fundraising or fund-raising is the process of seeking and gathering voluntary financial contributions by engaging individuals, businesses, charitable foundations, or governmental agencies. Although fundraising typically refers to efforts to gather money for non-profit organizations, it is sometimes used to refer to the identification and solicitation of investors or other sources of capital for-profit enterprises. Traditionally, fundraising has consisted mostly of asking for donations through face-to-face fundraising, such as door-knocking. In recent years, though, new forms such as online fundraising or reformed version of grassroots fundraising have emerged. Organizations Fundraising is a significant way that non-profit organizations may obtain the money for their operations. These operations can involve a very broad array of concerns such as religious or philanthropic groups such as research organizations, public broadcasters, political campaigns and environmental issues. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Donation
A donation is a gift for charity, humanitarian aid, or to benefit a cause. A donation may take various forms, including money, alms, services, or goods such as clothing, toys, food, or vehicles. A donation may satisfy medical needs such as blood or organs for transplant. Charitable donations of goods or services are also called ''gifts in kind''. Donating statistics In the United States, in 2007, the Bureau of Labor Statistics found that American households in the lowest fifth in terms of wealth, gave on average a higher percentage of their incomes to charitable organizations than those households in the highest fifth. Charity Navigator writes that, according to Giving USA, Americans gave $298 billion in 2011 (about 2% of GDP). The majority of donations were from individuals (73%), then from bequests (about 12%), foundations (2%) and less than 1% from corporations. The largest sector to receive donations was religious organizations (32%), then education (13%). Giving has ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Charitable Organization
A charitable organization or charity is an organization whose primary objectives are philanthropy and social well-being (e.g. educational, Religion, religious or other activities serving the public interest or common good). The legal definition of a charitable organization (and of charity) varies between countries and in some instances regions of the country. The Charity regulators, regulation, the tax treatment, and the way in which charity law affects charitable organizations also vary. Charitable organizations may not use any of their funds to profit individual persons or entities. (However, some charitable organizations have come under scrutiny for spending a disproportionate amount of their income to pay the salaries of their leadership). Financial figures (e.g. tax refund, revenue from fundraising, revenue from sale of goods and services or revenue from investment) are indicators to assess the financial sustainability of a charity, especially to charity evaluators. This ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Money Laundering
Money laundering is the process of concealing the origin of money, obtained from illicit activities such as drug trafficking, corruption, embezzlement or gambling, by converting it into a legitimate source. It is a crime in many jurisdictions with varying definitions. It is usually a key operation of organized crime. In US law, money laundering is the practice of engaging in financial transactions to conceal the identity, source, or destination of illegally gained money. In UK law the common law definition is wider. The act is defined as "taking any action with property of any form which is either wholly or in part the proceeds of a crime that will disguise the fact that that property is the proceeds of a crime or obscure the beneficial ownership of said property". In the past, the term "money laundering" was applied only to financial transactions related to organized crime. Today its definition is often expanded by government and international regulators such as the US Offic ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Center Of Gravity (military)
The center of gravity (CoG) is a concept developed by Carl Von Clausewitz, a Prussian military theorist, in his work ''On War''. United States The definition of a CoG, as given by the United States Department of Defense, is "the source of power that provides moral or physical strength, freedom of action, or will to act." Thus, the center of gravity is usually seen as the "source of strength". The United States Army tends to look for a single center of gravity, normally in the principal capability that stands in the way of the accomplishment of its own mission. In short, the army considers a "friendly" CoG as that element—a characteristic, capability, or locality—that enables one's own or allied forces to accomplish their objectives. Conversely, an opponent's CoG is that element that prevents friendly forces from accomplishing their objectives. For example, according to US Army Counterinsurgency Field Manual 3-24, the center of gravity in a counterinsurgency is the protectio ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Functional Analysis
Functional analysis is a branch of mathematical analysis, the core of which is formed by the study of vector spaces endowed with some kind of limit-related structure (e.g. Inner product space#Definition, inner product, Norm (mathematics)#Definition, norm, Topological space#Definition, topology, etc.) and the linear transformation, linear functions defined on these spaces and respecting these structures in a suitable sense. The historical roots of functional analysis lie in the study of function space, spaces of functions and the formulation of properties of transformations of functions such as the Fourier transform as transformations defining continuous function, continuous, unitary operator, unitary etc. operators between function spaces. This point of view turned out to be particularly useful for the study of differential equations, differential and integral equations. The usage of the word ''functional (mathematics), functional'' as a noun goes back to the calculus of variati ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Connected-component Labeling
Connected-component labeling (CCL), connected-component analysis (CCA), blob extraction, region labeling, blob discovery, or region extraction is an algorithmic application of graph theory, where subsets of connected components are uniquely labeled based on a given heuristic. Connected-component labeling is not to be confused with segmentation. Connected-component labeling is used in computer vision to detect connected regions in binary digital images, although color images and data with higher dimensionality can also be processed. When integrated into an image recognition system or human-computer interaction interface, connected component labeling can operate on a variety of information. Blob extraction is generally performed on the resulting binary image from a thresholding step, but it can be applicable to gray-scale and color images as well. Blobs may be counted, filtered, and tracked. Blob extraction is related to but distinct from blob detection. Overview A graph, co ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Flow Network
In graph theory, a flow network (also known as a transportation network) is a directed graph where each edge has a capacity and each edge receives a flow. The amount of flow on an edge cannot exceed the capacity of the edge. Often in operations research, a directed graph is called a network, the vertices are called nodes and the edges are called arcs. A flow must satisfy the restriction that the amount of flow into a node equals the amount of flow out of it, unless it is a source, which has only outgoing flow, or sink, which has only incoming flow. A network can be used to model traffic in a computer network, circulation with demands, fluids in pipes, currents in an electrical circuit, or anything similar in which something travels through a network of nodes. Definition A network is a graph , where is a set of vertices and is a set of 's edges – a subset of – together with a non-negative function , called the capacity function. Without loss of generality, we may assume that ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Targeting (warfare)
Targeting is the process of selecting objects or installations to be attacked, taken, or destroyed in warfare. Targeting systematically analyzes and prioritizes targets and matches appropriate lethal and nonlethal actions to those targets to create specific desired effects that achieve the joint force commander's (JFC's) objectives, accounting for operational requirements, capabilities, and the results of previous assessments. The emphasis of targeting is on identifying resources (targets) the enemy can least afford to lose or that provide him with the greatest advantage (high-value target VT, then further identifying the subset of those targets which must be acquired and engaged to achieve friendly success (high-payoff target PT. Targeting links the desired effects to actions and tasks. The targeting process can be generally grouped into two categories: deliberate and dynamic. Deliberate targeting prosecutes anticipated or known targets within a given operational area and time ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Social Network Analysis Software
Social network analysis software (SNA software) is software which facilitates quantitative or qualitative analysis of social networks, by describing features of a network either through numerical or visual representation. Overview Networks can consist of anything from families, project teams, classrooms, sports teams, legislatures, nation-states, disease vectors, membership on networking websites like Twitter or Facebook, or even the Internet. Networks can consist of direct linkages between nodes or indirect linkages based upon shared attributes, shared attendance at events, or common affiliations. Network features can be at the level of individual nodes, dyads, triads, ties and/or edges, or the entire network. For example, node-level features can include network phenomena such as betweenness and centrality, or individual attributes such as age, sex, or income. SNA software generates these features from raw network data formatted in an edgelist, adjacency list, or adjacency ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |