نتایج جستجو برای: spying operation
تعداد نتایج: 211944 فیلتر نتایج به سال:
Purpose – This paper aims to assist investigators and attorneys addressing the legal aspects of cyber incidents, and allow them to determine the legality of a response to cyber attacks by using the Worldwide web securely. Design/methodology/approach – Develop a decision support legal whiteboard that graphically constructs legal arguments as a decision tree. The tree is constructed using a tree ...
The Line follower robot is a mobile machine that can detect and follow the line drawn on the floor. Generally, the path is predefined and can be either visible like a black line on a white surface with a high contrasted colour. Light Dependent Resistor (LDR) sensors that installed under the robot.This paper presents a real time detection of mobile phone in restricted area. Mobile transmission d...
This paper presents a context-aware guidance and messaging system for large buildings and surrounding venues. Smart Signs are a new type of electronic doorand way-sign based on wireless sensor networks. Smart Signs present in-situ personalized guidance and messages, are ubiquitous, and easy to understand. They combine the easiness of use of traditional static signs with the flexibility and reac...
This fascinating and highly topical subject has a history dating back to the secret world of 1970s Cold War espionage, when the US military and Central intelligence agencies, aided by the latest mainframe systems, were the first to use computer forensics techniques in counterintelligence. In the decades since, cybercrime has emerged from the obscurity of low-level prosecution evidence to become...
Officially organized, spectator driven eSport tournaments occur within the notoriously transgressive and ruthless game EVE Online. In these tournaments spying, bribing and throwing matches is commonplace. Based on results from interviews with competitors and spectators, this paper discusses the appeal of this unique eSport and explores the way in which the relatively ‘unbounded’ approach in EVE...
Recent research has been focused on the ability to manipulate a light beam in such a way to hide, namely to cloak, an event over a finite time or localization in space. The main idea is to create a hole or a gap in the spatial or time domain so as to allow for an object or data to be kept hidden for a while and then to be restored. By enlarging the field of applications of this concept to telec...
Scanned stereoscopic spying photography of a Hexagon KH-9 mission in 1973 as well as high resolution stereo imagery of ALOS-PRISM from 2009 was used to generate multi-temporal Digital Terrain Models for the estimation of glacier thickness changes of Kekesayi glacier situated at the Mustag Ata massif at the northwestern end of the Tibetan Plateau. Glacier surface velocities were estimated by amp...
Abstract We analyze price leadership in a Stackelberg game with incomplete information and imperfect commitment. Sequential play is induced by an system, represented spy, that reports the of one firm to its rival before latter chooses own price. However, leader may secretly revise some probability. Therefore, spy’s message only signal. This gives rise complex signaling problem where both sender...
background: the objectives of an educational system in a society are based on society's requirements. since personnel knowledge and skill are not qualified with the advantages of science and invention of new tools, new needs are arisen. comparing the curriculum of undergraduate course of operating room of our country with international societies, it seems that this curriculum is not a good one ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید