نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
The attack of the Seljuk Turks affected Iranian society and economy and caused an economic downturn of the society for some decades. Nizam al-Mulk Tusi (408-485 AH) was one of the Iranian bureaucrats during the Seljuk period who had valuable experiences of the economic and peasant traditions of Iran and by writing Siyar al-mulûk took an active approach and action in both the theoretical and pra...
Biotechnology has an increasingly extensive use for military purposes. With the upcoming age of biotechnology, military operations are depending more on biotechnical methods. Judging from the evolving law of the theory of command, the command of biotechnology is feasible and inevitable. The report discusses some basic characteristics of modern theories of command, as well as the mature possibil...
Wireless Sensor Network platforms are less expensive and more powerful having tiny electronic devices called Motes (sensor nodes). Wireless sensor networks enhance its popularity in military and health centric research areas; now it is also popular in industrial area. This paper describes the security requirements as WSNs are easily prone to more attacks than wired networks. This paper studies ...
Dengue is a major cause of illness among travelers and a threat to military troops operating in areas to which it is endemic. Before and during World War II, dengue frequently occurred in US military personnel in Asia and the South Pacific. From the 1960s into the 1990s, dengue often occurred in US troops in Vietnam, the Philippines, Somalia, and Haiti. We found attack rates as high as 80% and ...
BACKGROUND Simultaneous acute gastroenteritis (AGE) outbreaks occurred at two military camps. This study details the epidemiological findings, explores possible origins, and discusses preventive measures. METHODS Investigations included attack rate surveys, symptom surveys, hygiene inspections, and the testing of water, food, and stool samples. DNA/RNA was extracted from stool samples and amp...
The authors present a Case Study conducted in a Portuguese military organization, to answer the following research questions: (1) what are the most relevant dimensions and categories of information security controls applied in military organizations? (2) What are the main scenarios of information security incidents that are expected to occur? (3) What is the decision process used for planning a...
is somewhat exploratory. An experimental game with options to attack and to retaliate was presented to 196 college students. A 2 X 3 factorial design explored the effects of accidental attack, expected iteration, social influence, and timing conditions upon the incidence of retaliation. Measures of authoritarianism, orientation to military-political strategy, and attitudes relating to nuclear w...
This paper considers the reported attack ratio arising from outbreaks of influenza in enclosed societies. These societies are isolated from the wider community and have greater opportunities for contact between members which would aid the spread of disease. While the particular kind of society (prison, care home, school, barracks, etc.) was not a significant factor in an adjusted model of attac...
Wireless sensor networks passes a practical and Economically feasible alternative to manual data association in general and military scenarios, providing a means of surveillance of a region of field and providing warning of any threats. In common wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless association with high-bandwidth low-latency bo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید