نتایج جستجو برای: and military attack

تعداد نتایج: 16841411  

Journal: :تاریخ علم 0
اکبر فلاحی دانشجوی دکتری تاریخ علم دورۀ اسلامی، پژوهشگاه علوم انسانی و مطالعات فرهنگی غلامحسین رحیمی استاد گروه مهندسی مکانیک، دانشگاه تربیت مدرس

dār al-funūn is the first center for systematic modern science education and new military training in iran. as far as the military disciplines are concerned, theoretical and practical training of the steudents, as well as troops and officers, authoring and translating books on military disciplines, regular examinations and upbringing a generation of students in new military tactics are the most...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

2000
Steve Fetter Edmund S. Muskie

OVER THE LAST 25 years the United States has become increasingly dependent on space-based systems to support its military forces, and this trend is likely to continue for some time. Satellite systems have become an integral part of nuclear deterrence by providing strategic warning of an attack, tactical warning of missile launches, reliable communications between command authorities and nuclear...

2003
S. K. Jalota

Hybrid microcircuit packages are multicomponent electronics devices used in high tech military equipment. They also find application in medical devices for implant in humans to abort the attack of many life threatening illnesses. These are electroplated with limited thicknesses of nickel (1.25 8.75pm) and gold (1.25 5.6pm). In addition there are post plate baking and steam aging requirements as...

The Egypt revolution managed to overthrow the Mubarak regime but soon after, the military took possession of the political atmosphere through the military coup against Mohammad Morsi’s government. In the post-revolution space, whatever has shaped the civil-military relations in Egypt is the method of interactions between the Supreme Council of Armed Forces with the Muslim Brotherhood and other ...

Journal: :Emerging Infectious Diseases 1997
P. K. Russell

The growing awareness of the possibility that a terrorist organization might use a biologic agent in an attack on a civilian target in the United States raises important questions about our capability as a nation to respond effectively to the threat and to deal with the consequences of an attack. The article by Kaufmann et al. in this issue of Emerging Infectious Diseases describes three possib...

Journal: :Optimization Letters 2015
Nils-Hassan Quttineh Torbjörn Larsson

We consider a military mission planning problem where a given fleet of aircraft should attack a number of ground targets. At each attack, two aircraft need to be synchronized in both space and time. Further, there are multiple attack options against each targets, with different target effects. The objective is to maximize the outcome of the entire attack, while also minimizing the mission times...

2014
Jaspreet Singh Anuj Gupta

Wireless Sensor Networks (WSN) are being increasingly used due to their wide range of applications in military and civilian domains. These networks are prone to security attacks. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional solutions of security, which needs complex calculations and more memory. There are many types of att...

2017
Shayan Taheri

Mixed-signal integrated circuits (ICs) play an eminent and critical role in design and development of the embedded systems leveraged within smart weapons and military systems. These ICs can be a golden target for adversaries to compromise in order to function maliciously. In this work, we study the security aspects of a tunnel field effect transistor (TFET)-based first-order one-bit delta-sigma...

Journal: :The Journal of Experimental Medicine 2005
David N. Posnett Manuel E. Engelhorn Alan N. Houghton

Around 700 BCE, a new military formation called the phalanx was established in ancient Greece: a tight column of heavy infantry carrying long spears, or pikes, used in a single prong of attack. Later, in the battle of Marathon described by Herodotus, the Greeks learned the advantages of multipronged attacks, a strategy still used in modern warfare. Is the immune system similar in its approach t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید