نتایج جستجو برای: military policies

تعداد نتایج: 163789  

2009
Indrakshi Ray Indrajit Ray

With the growth of wireless networks and mobile devices, we are moving closer towards an era of cyberphysical systems (CPSs). Such systems have the potential to benefit numerous applications in areas as diverse as military, financial, and health care. However, security issues must be addressed before CPSs can be widely deployed. The problem is serious because CPSs involve interactions between a...

Journal: :Military medicine 2010
Walker S C Poston Richard R Suminski Kevin M Hoffman Nattinee Jitnarin Joseph Hughey Harry A Lando Amelia Winsby Keith Haddock

Despite progress in policy changes, tobacco use rates are still high in the military. Little is known about the views of those who create and implement tobacco control policies within the Department of Defense. These individuals determine what policy initiatives will be developed, prioritized, and implemented. We conducted key informant interviews with 16 service-level policy leaders (PLs) and ...

Due to rapid growth of urbanization and economic demand, we are continuously losing our fields,our free lands, open sky, ponds, lakes; actually our breathing spaces. Sometimes for zoning policies, migration ortransferal of a particular business or activity, a place like waterfronts, body of water, military or industrial sites can lostits importance, kept vacant and become a dead place. These ar...

The United States’ relations with Cuba are rooted in the US intervention in the process of Cuba’s independence from Spain in the 1890s. The US preserved its interest-based approach towards Cuba during the first half of the 20th century, which culminated in the Cuba’s counter-hegemonic revolution in 1959. This revolution led to more than fifty years of hostility between two countries, which took...

2009
Indrakshi Ray

Pervasive computing technology has the potential to benefit applications in the military, financial, and health care domain. Although pervasive computing technology looks promising, one critical challenge needs to be addressed before it can be widely deployed – security. The problem is serious because pervasive computing applications involve interactions between a large number of entities that ...

2010
Murat Sensoy Daniele Masato Timothy J. Norman Martin J. Kollingbaum Chris Burnett Katia P. Sycara Jean Oh

Forming ad-hoc coalitions between military forces and humanitarian organisations is crucial in mission-critical scenarios. Very often coalition parties need to operate according to planning constraints and regulations, or policies. As a consequence, they find themselves not only in need to consider their own goals, but also to support coalition partners to the extent allowed by such regulations...

2013
Philip B. K. Potter

Conventional wisdom holds that large margins of electoral victory contribute to presidential power. How does this variation in power impact U.S. foreign policy? I argue here that presidents who win elections by a substantial margin authorize the use of substantial military force more regularly, but do so at the expense of personal diplomacy and low-level crisis engagement. This distinction stem...

2006
José Achache

Between February 20 and 27, 2003, under the code name ‘Schriever II’, friendly ‘blue’ forces faced ‘red’ enemy forces during 8 days of a fierce battle in outer space. More than 300 military and civilian experts from more than 30 US agencies participated in this space war that took place 14 years in the future. Schriever II was only a war game, set in the year 2017! It took place at Schriever Ai...

1999
Ouri Wolfson Liqin Jiang A. Prasad Sistla Sam Chamberlain Naphtali Rishe Minglin Deng

In this paper we consider databases representing information about moving objects (e.g. vehicles), particularly their location. We address the problems of updating and querying such databases. Specifically, the update problem is to determine when the location of a moving object in the database (namely its database location) should be updated. We answer this question by proposing an information ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید