نتایج جستجو برای: and military attack

تعداد نتایج: 16841411  

ژورنال: Hormozgan Medical Journal 2014
Khoshdel, Alireza, Barati, Mohammad, Dabbagh Moghadam, Arasb, Hosseini Shokouh, Seyed javad, Noorifard, Mahtab, Salehi-Moghadam, Abdoreza, Totonchian, Mohsen,

Introduction: During the embossed war, cutaneous leishmaniasis (CL) was considered as a major health problem in war zones, particularly in the South West region of the country. According to this history, monitoring the disease is necessary for military health services. The aim of this study was to determine CL prevalence and temporal condition and mapping of disease between military personnel u...

Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

Cooperative Spectrum Sensing (CSS) is an effective approach to overcome the impact of multi-path fading and shadowing issues. The reliability of CSS can be severely degraded under Byzantine attack, which may be caused by either malfunctioning sensing terminals or malicious nodes. Almost, the previous studies have not analyzed and considered the attack in their models. The present study introduc...

Recently, Baghery et al. [1, 2] presented some attacks on two RFID protocols, namely Yoon and Jung et al. protocols, and proposed the improved version of them. However, in this note, we show that the improved version of the Jung et al. protocol suffers from desynchronization attack and the improved version of the Yoon's protocol suffers from secret disclosure attack. The succe...

2012
D. Devi Aruna Dr. P. Subashini

A mobile ad hoc network is an infrastructure less network, fast emerging today for deployment in variety of applications. During deployment, security emerges as a central requirement due to many attacks that affects the performance of the ad hoc networks. Particularly Denial of Service attack is one such severe attack against network and physical layer which is a challenging one to defend again...

Al -e- Muhtaj were one of the local rulers of Chaghanian region in upper part of the Oxus (Amu Darya) that had autonomy concurrent with period of Amir Ismaʽil Samani (279-295 AH) in their dominated area, i.e. parts of  Khorasan and Rey. This local dynasty as puppet of Samanids, had effective role in political and military power of that state. Honesty and courage of emirs of this clan, including...

Journal: :international journal of pediatrics 0
mohammad hasan kargar maher pediatrician, pediatric health research center, tabriz university of medical sciences, tabriz, iran. parinaz habibi pediatrician, pediatric health research center, tabriz university of medical sciences, tabriz, iran. nemat bilan pediatric pulmonologist, pediatric health research center, tabriz university of medical sciences, tabriz, iran.

introductionchildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...

Donyavi, Vahid, Rahnejat, Amir Mohsen , Sepahvand, Ramin, Shahed Hagh Ghadam, Haleh, Taghva, Arsia,

Military psychologists and mental health professionals live and work alongside their potential patients. For the most important concerns of military psychologists are multiple relationships, confidentiality, sudden role shifts and avoiding harm. The purpose of this study was to explore experiences of the military psychologists regarding ethical challenges in the counseling centers of one of the...

ژورنال: مجله طب نظامی 2022

Background and Aim: Improving the performance appraisal system in the armed forces health care system is one of the challenges for managers in this field. Therefore, this study aimed to develop performance evaluation indicators of nurses working in military medical centers in Iran. Methods: The present study is an applied and multi-stage research that was conducted in three general phases durin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید