نتایج جستجو برای: and military attack
تعداد نتایج: 16841411 فیلتر نتایج به سال:
dār al-funūn is the first center for systematic modern science education and new military training in iran. as far as the military disciplines are concerned, theoretical and practical training of the steudents, as well as troops and officers, authoring and translating books on military disciplines, regular examinations and upbringing a generation of students in new military tactics are the most...
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
OVER THE LAST 25 years the United States has become increasingly dependent on space-based systems to support its military forces, and this trend is likely to continue for some time. Satellite systems have become an integral part of nuclear deterrence by providing strategic warning of an attack, tactical warning of missile launches, reliable communications between command authorities and nuclear...
Hybrid microcircuit packages are multicomponent electronics devices used in high tech military equipment. They also find application in medical devices for implant in humans to abort the attack of many life threatening illnesses. These are electroplated with limited thicknesses of nickel (1.25 8.75pm) and gold (1.25 5.6pm). In addition there are post plate baking and steam aging requirements as...
The Egypt revolution managed to overthrow the Mubarak regime but soon after, the military took possession of the political atmosphere through the military coup against Mohammad Morsi’s government. In the post-revolution space, whatever has shaped the civil-military relations in Egypt is the method of interactions between the Supreme Council of Armed Forces with the Muslim Brotherhood and other ...
The growing awareness of the possibility that a terrorist organization might use a biologic agent in an attack on a civilian target in the United States raises important questions about our capability as a nation to respond effectively to the threat and to deal with the consequences of an attack. The article by Kaufmann et al. in this issue of Emerging Infectious Diseases describes three possib...
We consider a military mission planning problem where a given fleet of aircraft should attack a number of ground targets. At each attack, two aircraft need to be synchronized in both space and time. Further, there are multiple attack options against each targets, with different target effects. The objective is to maximize the outcome of the entire attack, while also minimizing the mission times...
Wireless Sensor Networks (WSN) are being increasingly used due to their wide range of applications in military and civilian domains. These networks are prone to security attacks. Some of the inherent features like limited battery and low memory make sensor networks infeasible to use conventional solutions of security, which needs complex calculations and more memory. There are many types of att...
Mixed-signal integrated circuits (ICs) play an eminent and critical role in design and development of the embedded systems leveraged within smart weapons and military systems. These ICs can be a golden target for adversaries to compromise in order to function maliciously. In this work, we study the security aspects of a tunnel field effect transistor (TFET)-based first-order one-bit delta-sigma...
Around 700 BCE, a new military formation called the phalanx was established in ancient Greece: a tight column of heavy infantry carrying long spears, or pikes, used in a single prong of attack. Later, in the battle of Marathon described by Herodotus, the Greeks learned the advantages of multipronged attacks, a strategy still used in modern warfare. Is the immune system similar in its approach t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید