نتایج جستجو برای: they would attack other cities

تعداد نتایج: 2851631  

Journal: :Sustainability 2021

Current concerns about environmental issues have led to many new trends in technology and financial management. Within this context of digital transformation sustainable finance, Fintech has emerged as an alternative traditional institutions. This paper, through a literature review case study approach, analyzes the relationship between sustainability, different areas collaboration from both the...

2017
Thang S. Han Elon Correa Michael E. J. Lean David M. Lee Terrence W. O’Neill György Bartfai Gianni Forti Aleksander Giwercman Krzysztof Kula Neil Pendleton Margus Punab Martin K. Rutter Dirk Vanderschueren Ilpo T. Huhtaniemi Frederick C. W. Wu Felipe F. Casanueva

Diversity in lifestyles and socioeconomic status among European populations, and recent socio-political and economic changes in transitional countries, may affect changes in adiposity. We aimed to determine whether change in the prevalence of obesity varies between the socio-politically transitional North-East European (Łódź, Poland; Szeged, Hungary; Tartu, Estonia), and the non-transitional Me...

Journal: :IACR Cryptology ePrint Archive 2015
Trupil Limbasiya Nishant Doshi

In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common session key by authenticating each other. Recently in 2014, Kumari et al. proposed the efficient scheme for remote user authentication. However in this paper, we show that the Kumari et al.’s scheme is v...

Journal: :Bulletin of the Ecological Society of America 2023

Photo 1. Mellisodes sp. attacking Danaus plexippus. credit: Robert Root-Bernstein. 2. Xylocopa virginica a Bombus 3. Colletes (upside down) and altercating over flower. 4. Agapostemon Polites coras. 5. Agpostemon wrestling with These photographs illustrate the article “Flower visitor insects display an interspecific dominance hierarchy on flowers” by Thomas Renaud Meredith Root-Bernstein publis...

رخشانی نسب, حمیدرضا, ضرّابی, اصغر,

Objective: Today some of the problems and difficulties in developing countries are related to the manner of their internal migrations. Each year millions of the rural population in the developing countries decided to migrate to the urban areas of these countries and this phenomenon has had negative consequences in the cities. In fact the migration that itself is created by many factors is a...

A. Akbari A. Patooghy E. Aerabi M. Fazeli M. Kaykha

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

Journal: :جستارهای ادبی 0
وحید رویانی منیره فرضی شوب

abstract bazel mashadi′s heydary attack is one of the earliest and most famous attack epics written in the twelfth century. bazel exploits the style and format of shahname in his masnavi, composed in twenty to thirty thousand verses. the poet, after chanting the praise of god, prophet and his successor (vali), verses the history of islam beginning from the prophet’s mission (be’sat) to the orde...

Ayda Doostkam, Kamyar Iravani, Mitra Amini,

Introduction. This study was designed to measure the attitude of the medical students’ of Jahrom school of medical sciences in basic and clinical stages and the approach they have to their course of study and future occupation. Methods. A Questionnaire was handed out in which some items such as sex, final high school scores, term average scores, patient’s education and the assigned students w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید