نتایج جستجو برای: unstable security
تعداد نتایج: 225915 فیلتر نتایج به سال:
This paper analyzes the threat of distributed attacks by developing a two-sided multiplayer model of security in which attackers aim to deny service and defenders strategize to secure their assets. Attackers benefit from the successful compromise of target systems, however, may suffer penalties for increased attack activity. Defenders weigh the likelihood of an attack against the cost of securi...
Synthetic routes to salts of the 3H-naphtho[1,2-d][1,2,3]dithiazolylium cation and its three selenium-containing variants (SSeN, SeSN, and SeSeN) are described. The most efficient and general method involves the intermediacy of bis-acetylated aminothiolates and aminoselenolates. These reagents react smoothly with sulfur and selenium halides to afford the desired ring closure products. Electroch...
US strategic approaches in the African Great Lakes region are primarily based on security assistance for training and equipping African forces for operations in East, North, and West Africa. This assistance risks causing more incidents of violence. A new strategy, based on a comprehensive approach to the security challenges in the region, as well as the deployment of international “boots on the...
This paper focuses on hydrodynamic modeling and control of spheroidal underwater vehicle. The vehicle considered in this is appendage free unstable. Water jet propulsion system used dynamics the highly unstable due to munk moment. shape robot nuclear reactor inspection, port security defence ocean surveillance where external appendages are not required. A new innovative technique, Sliding mode ...
Although attachment security is relatively stable over time, individuals do experience significant within-person variation in their attachment security across time. No research to date, however, has assessed the relational consequences of within-person variation (fluctuations) in attachment security toward a specific attachment figure. Study 1 (N = 409) first examined whether attachment securit...
Although attachment security is relatively stable over time, individuals do experience significant within-person variation in their attachment security across time. No research to date, however, has assessed the relational consequences of within-person variation (fluctuations) in attachment security toward a specific attachment figure. Study 1 (N 409) first examined whether attachment security ...
The study concludes that the reality of food security in the Arab World is unstable and fluctuated; there is no self-sufficiency to cover the needs of the Arab states. In addition, food security is connected with the power of water security, as all water resources come from non-Arab states. Water shortage may lead to the shortage of food for Arab states (famines), poverty and divisions. Therefo...
Pervasive communication and forward-error correction have garnered minimal interest from both end-users and security experts in the last several years. Given the current status of unstable configurations, statisticians shockingly desire the deployment of extreme programming, which embodies the typical principles of algorithms. In order to answer this question, we concentrate our efforts on argu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید