نتایج جستجو برای: they would attack other cities
تعداد نتایج: 2851631 فیلتر نتایج به سال:
Current concerns about environmental issues have led to many new trends in technology and financial management. Within this context of digital transformation sustainable finance, Fintech has emerged as an alternative traditional institutions. This paper, through a literature review case study approach, analyzes the relationship between sustainability, different areas collaboration from both the...
Diversity in lifestyles and socioeconomic status among European populations, and recent socio-political and economic changes in transitional countries, may affect changes in adiposity. We aimed to determine whether change in the prevalence of obesity varies between the socio-politically transitional North-East European (Łódź, Poland; Szeged, Hungary; Tartu, Estonia), and the non-transitional Me...
In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common session key by authenticating each other. Recently in 2014, Kumari et al. proposed the efficient scheme for remote user authentication. However in this paper, we show that the Kumari et al.’s scheme is v...
Photo 1. Mellisodes sp. attacking Danaus plexippus. credit: Robert Root-Bernstein. 2. Xylocopa virginica a Bombus 3. Colletes (upside down) and altercating over flower. 4. Agapostemon Polites coras. 5. Agpostemon wrestling with These photographs illustrate the article “Flower visitor insects display an interspecific dominance hierarchy on flowers” by Thomas Renaud Meredith Root-Bernstein publis...
Objective: Today some of the problems and difficulties in developing countries are related to the manner of their internal migrations. Each year millions of the rural population in the developing countries decided to migrate to the urban areas of these countries and this phenomenon has had negative consequences in the cities. In fact the migration that itself is created by many factors is a...
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
abstract bazel mashadi′s heydary attack is one of the earliest and most famous attack epics written in the twelfth century. bazel exploits the style and format of shahname in his masnavi, composed in twenty to thirty thousand verses. the poet, after chanting the praise of god, prophet and his successor (vali), verses the history of islam beginning from the prophet’s mission (be’sat) to the orde...
Introduction. This study was designed to measure the attitude of the medical students’ of Jahrom school of medical sciences in basic and clinical stages and the approach they have to their course of study and future occupation. Methods. A Questionnaire was handed out in which some items such as sex, final high school scores, term average scores, patient’s education and the assigned students w...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید