نتایج جستجو برای: and military attack

تعداد نتایج: 16841411  

Although the 2011 uprisings in Egypt led to the fall of Hosni Mubarak, they have not yet been able to change the nature of the country’s political system. A year after the country’s first non-military president took office, Egypt’s political situation became more or less similar to the way it had been before 2011. The structure of the relationship between the state and the society in Egypt, hig...

2011
Athanasios Theodore Markettos

The field of side-channel attacks on cryptographic hardware has been extensively studied. In many cases it is easier to derive the secret key from these attacks than to break the cryptography itself. One such side-channel attack is the electromagnetic side-channel attack, giving rise to electromagnetic analysis (EMA). EMA, when otherwise known as 'TEMPEST' or 'compromising eman-ations', has a l...

2007
Juliette A. Seeley Jonathan M. Richardson

The nation faces a growing concern that terrorists or state actors will resort to the use of chemical or biological warfare agents against military or civilian targets. The primary defensive action available for this threat is to detect the deadly agents before they contact their intended victims. Given advance warning, people can evacuate a contaminated area, administer prophylactic medication...

Mohammad Hasan Kargar Maher Nemat Bilan, Parinaz Habibi

IntroductionChildren with severe asthma attack are a challenging group of patients who could be difficult to treat and leading to significant morbidity and mortality. Asthma attack severity is qualitatively estimated as mild, moderate and severe attacks and respiratory failure based on conditions such as respiration status, feeling of dyspnea, and the degree of unconsciousness. part of which ar...

2015
Andrew Hill

This article examines the significance of culture as a moderator of innovation, and criticizes monolithic accounts of military resistance to innovation. It then describes a dimension of military culture focused on the concept of the ideal combatant, and how that concept relates to innovation. Military culture can be improved by: (1) engineering the competitive context for innovation, and (2) cr...

Journal: :Cogent Social Sciences 2023

The General Attack of March 1, 1949, conducted by the Emergency Government Republic Indonesia against Dutch remains an interesting issue in today because many its aspects are yet to be fully revealed. contemporary related event is omission Lt. Col. Suharto’s name, one key leaders struggle for independence, consideration Presidential Decree No. 2/2022 concerning Day Enforcement Sovereignty, whil...

2017
Aparna Raj Pankaj Kumar Vyas

The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks, for example...

Journal: : 2023

The article examines Russia’s military attack on Ukraine, and proposes actions to solve the crisis. It starts with an analysis of America’s relations Ukraine prior 2021–2022, explains why we have deal case begin with. Next, it describes primary drivers continued interest in invading Ukrainian territory. Finally, author analyses Biden’s foreign policies determines what type strategy should be ex...

A Ebadi , D farajzadeh, H Rostami, H Masoumbeigi, M Delkhosh, P Haratian ,

Background and purpose:Consumption of baking soda, as a primary material for preparation of bread dough, has been banned due to its health complications in Iran. So bread production in our country faced difficulties and one part of them is related to health issues which are bread production. Also, in some cases, baking soda is used in the bread production. This study was done to study the envir...

Journal: :Operations Research 2016
Katerina Papadaki Steve Alpern Tom Lidbetter Alec Morton

Patrolling games were recently introduced by Alpern, Morton and Papadaki to model the problem of protecting the nodes of a network from an attack. Time is discrete and in each time unit the Patroller can stay at the same node or move to an adjacent node. The Attacker chooses when to attack and which node to attack, and needs m consecutive time units to carry it out. The Attacker wins if the Pat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید