نتایج جستجو برای: qaedaism todays many islamist terrorist groups use al

تعداد نتایج: 3344206  

Journal: :IACR Cryptology ePrint Archive 2011
Süleyman Kardas Mehmet Sabir Kiraz Muhammed Ali Bingöl Hüseyin Demirci

Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purposes. Distance bounding protocols are particularly designed as a countermeasure against these attacks. These protocols aim to ensure that the tags are in a distant area by measuring the round-trip delays during a rapid challenge-res...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - پژوهشکده علوم انسانی و اجتماعی 1391

the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...

2017
BRUNO S. FREY

Many governments as well as terrorist experts see the use of military and police forces as the only way to effectively counter terrorism. The most effective negative sanctions are considered to be military strikes, aggressive actions (including kidnapping and killing) against individuals known or suspected of being terrorists, or against persons supporting and harboring terrorists. Overt and co...

Journal: :International Journal of Man-Machine Studies 2007
Jialun Qin Yilu Zhou Edna Reid Guanpi Lai Hsinchun Chen

Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for ident...

2002
MARK WHEELIS ROCCO CASAGRANDE LAURENCE V. MADDEN

M of the concern over the last decade about US vulnerability to bioterrorism has focused on terrorist use of pathogens to attack the civilian population. This concern increased in the wake of the September 11 terrorist attacks on the World Trade Towers and the Pentagon and the anthrax letter attacks on US Senate offices and the media. However, a number of analysts have pointed out that terroris...

Journal: :Communications in Nonlinear Science and Numerical Simulation 2013

Journal: :Connections: The Quarterly Journal 2011

Journal: :international journal of group theory 2015
francesco de giovanni marco trombetti

it is proved here that if $g$ is a locally graded group satisfying the minimal condition on subgroups which are not locally supersoluble, then $g$ is either locally supersoluble or a vcernikov group. the same conclusion holds for locally finite groups satisfying the weak minimal condition on non-(locally supersoluble) subgroups. as a consequence, it is shown that any infinite locally graded gro...

2006
Nasrullah Memon Henrik Legind Larsen

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of netwo...

Journal: :CoRR 2013
Fredrick Romanus Ishengoma

The advancement in technology has brought a new era in terrorism where Online Social Networks (OSNs) have become a major platform of communication with wide range of usage from message channeling to propaganda and recruitment of new followers in terrorist groups. Meanwhile, during the terrorist attacks people use OSNs for information exchange, mobilizing and uniting and raising money for the vi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید