نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
British Military Hospital Dharan provides the surgeon with an opportunity, unparalleled anywhere in the United Kingdom to observe and manage a range of malignancies. The historical and contemporary reasons for this are outlined. The paper illustrates the military hospital experience and mode of presentation of a wide range of malignant conditions treated during the tour. Differences from United...
The clinical experience of an army surgeon in a military hospital in East Nepal is discussed. The truly general nature of the work load is highlighted and the need for a broad based general training in surgery for such a task is well illustrated. A high degree of interdisciplinary cooperation was experienced and was indeed essential for good clinical practice. The health problems of a developin...
The armed forces and the army are main elements of national power. Military readiness gives real significance to the geography, natural resources, and industrial power. Military elements of national power include military purposes, military doctrines, military strategies and policies (defensive and non-defensive), forces, training, command, military technology, weapons and equipment, military o...
To investigate the attack rate and risk factors for probable dengue fever, a cross-sectional study was conducted of an Italian military unit after its deployment to East Timor. Probable dengue was contracted by 16 (6.6%) of 241 army troops and caused half of all medical evacuations (12/24); no cases were detected among navy and air force personnel.
The Battle of Midway is widely regarded as the most important naval battle of the Pacific Campaign of World War II. Between 4 and 7 June 1942, approximately one month after the Battle of the Coral Sea, two months after Doolittle's Raid and six months after Japan's attack on Pearl Harbor, the United States Navy decisively defeated an Imperial Japanese Navy (IJN) attack against Midway Atoll, infl...
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point of time. This generic characteristic of MANET has rendered it vulnerable to security attacks. In this paper, we address the problem of coordinated attack by multiple black holes acting in group. We present a technique ...
The present study examined the relation between disengagement of moral self–sanctions and support of military force. The modes of moral disengagement included moral sanctioning of lethal means, disavowal of personal responsibility for detrimental effects accompanying military campaigns, minimization of civilian casualties, and attribution of blame and dehumanization of one’s foes. The responden...
Wireless Sensor Networks (WSNs) continue to grow and become widely used in many applications in military, ecological, home automation and health-related areas. Due to distributed nature of sensor networks security becomes fundamental requirement for communication among sensor nodes. The inclusion of wireless communication among various sensor nodes suffers from various types of security threats...
We use ideas from game theory to transform two families of authentication protocols so that even if an intruder attacks a protocol, its payoff will still be lower than when it does not. This is particularly useful in resisting or discouraging a powerful and rational intruder (as present in military applications) who makes many attempts to break a protocol because (1) even if the intruder fails,...
OBJECTIVES In December 2010, there was an outbreak of acute febrile respiratory disease in many Korean military camps that were not geographically related. A laboratory analysis confirmed a number of these cases to be infected by the pandemic influenza A(H1N1) 2009 (H1N1pdm09) virus. Because mass vaccination against H1N1pdm09 was implemented at the infected military camps eleven months ago, the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید