3,203 research outputs found
Al-Qaedaâs Persistent Sanctuary
With growing instability across the Arab world, it has become de rigueur to argue that the primary al-Qaeda threat now comes from the Persian Gulf or North Africa. While these regions certainly present a threat to Western security, al-Qaedaâs primary command and control structure remains situated in the Pakistan-Afghanistan border regions.
Since the mid-1990s, al-Qaedaâs senior leadership has enjoyed a sanctuary in Afghanistan and Pakistan. Today, al-Qaeda continues to present a grave threat from this region by providing strategic guidance, overseeing or encouraging terrorist operations, managing a robust propaganda campaign, conducting training and collecting and distributing financial assistance. As demonstrated over the past year, key al-Qaeda operatives such as Ilyas Kashmiri have been involved in plots to conduct Mumbai-style attacks in Europe, target a newspaper in Copenhagen that published cartoons of the Prophet Muhammad and bomb New York. The US, for example, has narrowly escaped several imminent attacks. Faisal Shahzad, who was trained in Pakistan, constructed several bombs, placed them in the back of his Nissan Pathfinder sports utility vehicle and drove into Times Square in New York City on a congested Saturday night in 2010. Only fortune intervened, since all three bombs malfunctioned. It may be tempting to focus predominantly on terrorist threats to the West from Libya, Yemen, Somalia, Egypt and other countries in the Arab world because of the widespread unrest and on-going violence, but this would be a dangerous mistake
A Better Deal Afghanistan Finish the Job
The article of record as published may be located at http://www.rand.org/pubs/periodicals/rand-review/issues/fall2008/deal03.htmlIt is time for the United States to finish what it started when it overthrew the Taliban in 2001. The United States and NATO must now proceed swiftly on multiple fronts simultaneously. The allies should increase their forces in Afghanistan, fortify Afghan security forces, support tribal groups, strengthen local governance, and work with neighboring Pakistan to eliminate the insurgent sanctuaries across the Afghan border
Islam & Islamic Radicalization Workshop / March 27th 2009
Instructors: Nadav Morag, PhD, Seth G. Jones, PhD, and Paul J. SmithThis document includes a Course Outline / Schedule as well as Biographies of Instructors
Quantum Process Tomography of the Quantum Fourier Transform
The results of quantum process tomography on a three-qubit nuclear magnetic
resonance quantum information processor are presented, and shown to be
consistent with a detailed model of the system-plus-apparatus used for the
experiments. The quantum operation studied was the quantum Fourier transform,
which is important in several quantum algorithms and poses a rigorous test for
the precision of our recently-developed strongly modulating control fields. The
results were analyzed in an attempt to decompose the implementation errors into
coherent (overall systematic), incoherent (microscopically deterministic), and
decoherent (microscopically random) components. This analysis yielded a
superoperator consisting of a unitary part that was strongly correlated with
the theoretically expected unitary superoperator of the quantum Fourier
transform, an overall attenuation consistent with decoherence, and a residual
portion that was not completely positive - although complete positivity is
required for any quantum operation. By comparison with the results of computer
simulations, the lack of complete positivity was shown to be largely a
consequence of the incoherent errors during the quantum process tomography
procedure. These simulations further showed that coherent, incoherent, and
decoherent errors can often be identified by their distinctive effects on the
spectrum of the overall superoperator. The gate fidelity of the experimentally
determined superoperator was 0.64, while the correlation coefficient between
experimentally determined superoperator and the simulated superoperator was
0.79; most of the discrepancies with the simulations could be explained by the
cummulative effect of small errors in the single qubit gates.Comment: 26 pages, 17 figures, four tables; in press, Journal of Chemical
Physic
Learning and reaction times in mouse touchscreen tests are differentially impacted by mutations in genes encoding postsynaptic interacting proteins SYNGAP1 , NLGN3 , DLGAP1 , DLGAP2 and SHANK2
The postsynaptic terminal of vertebrate excitatory synapses contains a highly conserved multiprotein complex that comprises neurotransmitter receptors, cell-adhesion molecules, scaffold proteins and enzymes, which are essential for brain signalling and plasticity underlying behaviour. Increasingly, mutations in genes that encode postsynaptic proteins belonging to the PSD-95 protein complex, continue to be identified in neurodevelopmental disorders (NDDs) such as autism spectrum disorder, intellectual disability and epilepsy. These disorders are highly heterogeneous, sharing genetic aetiology and comorbid cognitive and behavioural symptoms. Here, by using genetically engineered mice and innovative touchscreen-based cognitive testing, we sought to investigate whether loss-of-function mutations in genes encoding key interactors of the PSD-95 protein complex display shared phenotypes in associative learning, updating of learned associations and reaction times. Our genetic dissection of mice with loss-of-function mutations in Syngap1, Nlgn3, Dlgap1, Dlgap2 and Shank2 showed that distinct components of the PSD-95 protein complex differentially regulate learning, cognitive flexibility and reaction times in cognitive processing. These data provide insights for understanding how human mutations in these genes lead to the manifestation of diverse and complex phenotypes in NDDs
Clustering of childhood mortality in the Kintampo Health and Demographic Surveillance System in Ghana
Background: Childhood mortality in Ghana has generally declined in the last four decades. However, estimates tend to conceal substantial variability among regions and districts. The lack of population-based data in Ghana, as in other less developed countries, has hindered the development of effective programmes targeted specifically at clusters where mortality levels are significantly higher. Objective: This paper seeks to test for the existence of statistically significant clusters of childhood mortality within the Kintampo Health and Demographic Surveillance System (KHDSS) between 2005 and 2007. Design: In this study, mortality rates were generated using mortality data extracted from the health and demographic surveillance database of the KHDSS and exported into STATA. The spatial and spatio-temporal scan statistic by Kulldorff was used to identify significant clusters of childhood mortality within the KHDSS. Results: A significant cluster of villages with high under-five mortality in the south-eastern part of the KHDSS in 2006 was identified. This is a remote location where poverty levels are relatively higher, health facilities are more sparse and these are compounded by poor transport services in case of emergencies. Conclusion: This study highlights the potential of the surveillance platform to demonstrate the spatial dimensions of childhood mortality clustering. It is apparent, though, that further studies need to be carried out in order to explore the underlying risk factors for potential mortality clusters that could emerge later
Relinquishing and Governing the Volatile: The Many Afghanistans and Critical Research Agendas of NATO's Governance
This article invites academics and policy analysts to examine the mechanisms and legacy of NATO's security and development governance of Afghan social spaces by using critical theory concepts. It argues that such scholarly endeavors are growing in importance as the United States and NATO gradually pull their troops out of Afghanistan. Thus, the article suggests a broad twofold research agenda. First, it points out that researching social spaces such as towns, villages, marketplaces, and neighborhoods beyond the realm of intergovernmental politics can lead to thick descriptions of how such places have been governed from within by agents external to them. Second, the study argues for a multifaceted examination of instruments, strategies, and institutions of security governance, its conduct and social effects by deploying critical and Foucauldian concepts such as the rationality and apparatuses of power relations. Thereby, it proposes an inquiry into Provincial Reconstruction Teams and Afghan National Security Forces as spatially and temporally specific apparatuses of surveillance and security
Quantum search without entanglement
Entanglement of quantum variables is usually thought to be a prerequisite for
obtaining quantum speed-ups of information processing tasks such as searching
databases. This paper presents methods for quantum search that give a speed-up
over classical methods, but that do not require entanglement. These methods
rely instead on interference to provide a speed-up. Search without entanglement
comes at a cost: although they outperform analogous classical devices, the
quantum devices that perform the search are not universal quantum computers and
require exponentially greater overhead than a quantum computer that operates
using entanglement. Quantum search without entanglement is compared to
classical search using waves.Comment: 9 pages, TeX, submitted to Physical Review Letter
- âŚ