نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

Journal: :JOURNAL OF INDIAN AND BUDDHIST STUDIES (INDOGAKU BUKKYOGAKU KENKYU) 1964

2015
Jens David Ohlin

I. THE COMBATANT’S PRIVILEGE IN NON-INTERNATIONAL ARMED CONFLICTS ................................... 342 A. Functional Requirements for Belligerency ........................................................................... 345 B. Belligerency Requirements for Regular Armed Forces ........................................................ 348 C. Policy Arguments in Favor of a NIAC Privilege ......

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

Journal: : 2023

As the military environment is characterized by high levels of physical activity, activity an important component action. The aim present study was to identify most physically demanding daily and training (expected battle) tasks performed in Latvian Army Land Force units (NAF LFU) through development application a questionnaire survey. results obtained were used start developing set NAF fitness...

Journal: :Legal issues in the digital age 2021

The development of information technologies in the modern world affects all spheres human activity, including sphere military activities states. current level allows us to talk about a new fifth possible theatre operations, namely, cyberspace. Tallinn Manual on International Law Applicable Cyber Operations, developed 2013 and updated 2017 by experts from NATO States, also confirms likelihood ar...

Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...

and A. Bakhshalipour, M. R. Soltani, M. Seddighi,

The blades of wind turbines are the most important parts in producing power output. In this study, a section of a 660 KW wind turbine blade will be installed in Iran in near future was tested in a wind tunnel. In addition to steady tests, various unsteady tests including the effects of reduced frequency, mean angle of attack, and amplitudes were carried out. The preliminary results show strong ...

Journal: :Lancet 2003
Francesco Checchi Gregory Elder Myrto Schäfer Emmanuel Drouhin Dominique Legros

Journal: :Revista de Direito Internacional 2023

According to the dominant view, supposedly state-centric concept of war has been successively replaced after Second World War by concepts use force, aggression, and armed attack in international security law, on one hand, concept(s) conflict humanitarian other. Based an analysis post-war codifications, particular, human rights this article argues that it is yet still too premature bid farewell ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید