نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
Wireless Mesh Networks (WMNs) have emerged as a promising technology because of their wide range of applications. Wireless mesh networks wireless mesh networks (WMNs) are dynamically self – organizing, self – configuring, self – healing with nodes in the network automatically establishing an adHoc network and maintaining mesh connectivity. Because of their fast connectivity wireless mesh networ...
The main objective of this paper is to investigate the impact of corruption on the military burden of developing countries during the 2000-2015 period. To achieve this goal, a general model of military expenditures , two indexes of corruption including corruption perceptions and control of corruption, Panel Co-integration analysis and two-stage system generalized method of moment estimator (SGM...
Wireless sensor networks (WSNs) contain numerous sensors. These sensors communicate with a vast number of small nodes via radio links. Therefore, WSNs have the most security attacks cause the limited cpacity of sensor nodes. The security attacks impact to many applications ...
Although adequate sleep is an important factor in daily performance and health of all civilians, with regard to nature of their job, military forces are prone to sleep disorders and insomnia and low sleep quality are common problem in military. Combat readiness is a broad concept and is influenced by several factors such as infrastructures and equipment, supporting agents and the quality of the...
Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...
Background and Aim: Military staff are exposed to high levels of stress, and as such, and their mental health has long been an area of focus. The purpose of this study was to investigate and compare mental health promotion programs and strategies used in American, British and Russian military organizations, to those used in Iranian military organizations. Methods: This study was a systematic re...
Introduction: Biological attack a phenomenon which has seriously started in the 20th- century and is expanding every day. Plague agent is one of factors listed as a biological weapon by the disarmament convention. Therefore, the risk of biological or bioterrorism applications is probable and serious. The purpose of this study was to update health professionals' information on plague and bioterr...
The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...
Military Information Extraction techniques are interested for military managers and commanders. But usual information extraction techniques cannot be used for that domain, because military corpus has special structure that differs from non-military corpus. In this paper the military documents structure is compared with non-military documents structure. Moreover a new classification is proposed ...
Introduction: Biological attacks are a phenomenon that started on a serious note in the twentieth century and such weapons are being developed every day.The agent of plague is one of those listed as biological weapons by the Weapons Convention. So, the danger of its biological or bioterrorist applications by the enemy is possible and poses a serious threat. The purpose of compiling this article...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید