نتایج جستجو برای: attacking afghanistan

تعداد نتایج: 9950  

Journal: :Current opinion in critical care 2013
Jeffrey A Bailey Jonathan J Morrison Todd E Rasmussen

PURPOSE OF REVIEW This review focuses on development and maturation of the tactical evacuation and en route care capabilities of the military trauma system in Afghanistan and discusses hard-learned lessons that may have enduring relevance to civilian trauma systems. RECENT FINDINGS Implementation of an evidence-based, data-driven performance improvement programme in the tactical evacuation an...

2010
Edwin L. Cooper

Diabetes 2, once reserved for those who are aging, is now rampant in adolescents in the USA. Obesity is the culprit brought on by poor eating habits, lack of exercise and a general malaise paradoxically due to wealth and not poverty (at least material). In our penultimate issue of eCAM supported by OUP, I aim to show certain advancements in evidence-based approaches. Diabetes is a condition in ...

Journal: :The Journal of Experimental Medicine 2007
Hema Bashyam

Axons have an Achilles’ heel that antibodies can attack to cause multiple sclerosis (MS), Mathey et al. show on page 2363. MS is triggered when T cells breach the blood–brain barrier and produce inflammatory cytokines that activate myelin-scavenging macrophages, causing damage to the myelin sheath. Myelin-specific antibodies that enter the brain in the T cells’ wake enhance the destruction of t...

2004
Anders Wiehe Ole Kasper Olsen

We leave our fingerprints behind everywhere like when going to a café for a coffee or a soda, yet we never think of the possibilities that others might steal our prints from the cup or glass we just drank from. In this report we have conducted several experiments of lifting such latent fingerprints, and later having used them to create artificial reproductions. We have tried to use several diff...

Journal: :Electr. Notes Theor. Comput. Sci. 2015
Ashish Tiwari

We consider the problem of generating sensor spoofing attacks on feedback controllers. The attacker has the option of remaining in a stealth mode – wherein it spoofs some sensor but only by an amount that is indistinguishable from noise. Later, the attacker can launch a full attack and try to force the system to get into an unsafe region. Using bounded model checking on an example adaptive crui...

Journal: :Parameters 2023

In the fifth installment of SRAD Director’s Corner, “Afghanistan: The Logic Failing, Fast and Slow,” George Shatzer focuses on failure US-led war reconstruction campaign in Afghanistan. He reviews Forty-year War Afghanistan: A Chronicle Foretold by Tariq Ali Fifth Act: America’s End Afghanistan Elliot Ackerman. brings personal experience to bear his review, painting a picture why United States ...

Journal: :CoRR 2017
Monireh Dabaghchian Amir Alipour-Fanid Kai Zeng Qingsi Wang Peter Auer

In a cognitive radio network, a secondary user learns the spectrum environment and dynamically accesses the channel where the primary user is inactive. At the same time, a primary user emulation (PUE) attacker can send falsified primary user signals and prevent the secondary user from utilizing the available channel. The best attacking strategies that an attacker can apply have not been well st...

2011
Jeffrey Sachs

President Barack Obama’s strategy in Afghanistan does not pass the tests for war that he offered in his Nobel Lecture. Afghanistan is being preyed upon by a limited insurgency that feeds on Afghanistan’s poverty and desperation. Most Afghans do not support the Taliban or Al-Qaeda, but are vulnerable to their pressures. Young unemployed men often join militant factions out of the need to earn a ...

1996
John Clark

The past two decades have seen an enormous increase in the development and use of networked and distributed systems, providing increased functionality to the user and more efficient use of resources. To obtain the benefits of such systems parties will cooperate by exchanging messages over the network. The parties may be users, hosts or processes; they are generally referred to as principals in ...

2004
Radu Sion Mikhail J. Atallah

This paper discusses inherent vulnerabilities of digital watermarking that affect its mainstream purpose of rights protection. We ask: how resistant is watermarking to un-informed attacks ? There are a multitude of application scenarios for watermarking and, with the advent of modern content distribution networks and the associated rights assessment issues, it has recently become a topic of inc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید