Preparing for Terrorist Attacks that Use Next-Generation Pathogens (open access)

Preparing for Terrorist Attacks that Use Next-Generation Pathogens

None
Date: January 6, 2005
Creator: Fitch, J P
System: The UNT Digital Library
AnisWave2D: User's Guide to the 2d Anisotropic Finite-DifferenceCode (open access)

AnisWave2D: User's Guide to the 2d Anisotropic Finite-DifferenceCode

This document describes a parallel finite-difference code for modeling wave propagation in 2D, fully anisotropic materials. The code utilizes a mesh refinement scheme to improve computational efficiency. Mesh refinement allows the grid spacing to be tailored to the velocity model, so that fine grid spacing can be used in low velocity zones where the seismic wavelength is short, and coarse grid spacing can be used in zones with higher material velocities. Over-sampling of the seismic wavefield in high velocity zones is therefore avoided. The code has been implemented to run in parallel over multiple processors and allows large-scale models and models with large velocity contrasts to be simulated with ease.
Date: January 6, 2005
Creator: Toomey, Aoife
System: The UNT Digital Library
Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery (open access)

Data Sciences Technology for Homeland Security Information Management and Knowledge Discovery

The Department of Homeland Security (DHS) has vast amounts of data available, but its ultimate value cannot be realized without powerful technologies for knowledge discovery to enable better decision making by analysts. Past evidence has shown that terrorist activities leave detectable footprints, but these footprints generally have not been discovered until the opportunity for maximum benefit has passed. The challenge faced by the DHS is to discover the money transfers, border crossings, and other activities in advance of an attack and use that information to identify potential threats and vulnerabilities. The data to be analyzed by DHS comes from many sources ranging from news feeds, to raw sensors, to intelligence reports, and more. The amount of data is staggering; some estimates place the number of entities to be processed at 1015. The uses for the data are varied as well, including entity tracking over space and time, identifying complex and evolving relationships between entities, and identifying organization structure, to name a few. Because they are ideal for representing relationship and linkage information, semantic graphs have emerged as a key technology for fusing and organizing DHS data. A semantic graph organizes relational data by using nodes to represent entities and edges …
Date: January 6, 2005
Creator: Kolda, T.; Brown, D.; Corones, J.; Critchlow, T.; Eliassi-Rad, T.; Getoor, L. et al.
System: The UNT Digital Library