نتایج جستجو برای: defense power
تعداد نتایج: 560627 فیلتر نتایج به سال:
Let C ⊂ Pn be a rational normal curve and let `O : Pn+1 99K Pn be any tangential projection form a point O ∈ TAC where A ∈ C. In this paper we relate the minimum number r of addenda that are needed to write a binary form p of degree (n + 1) and defined over an algebraically closed field of characteristic zero as linear combination of (n+1)-th powers of linear binary forms L1, . . . , Lr, with t...
Do women’s political gains in office translate into substantive differences in foreign policy outcomes? Previous research shows that men and women hold different national security policy preferences and that greater representation by women in the legislature reduces conflict behavior. But are these relationships an artifact of confounding variables? To answer this question, we analyze the defen...
Autonomous, Distributed Real-Time Embedded (DRE) defence systems are typically characterized by hard constraints on space, weight, and power. These constraints have a strong impact on the nonfunctional properties of the final system, especially its performance. System execution modeling tools permit early prediction of the performance of model-driven systems; however, the focus to date has been...
objectives: the purpose of the study is to predict the psychological well-being of nurses based on personality traits and defense mechanisms. methods: the research method was correlational and the statistical population consisted of all married female nurses in hospitals of the qom city. the sample size estimated by tabachnik and fidel method 114 and with overestimate attain to 120 people. thes...
We propose using spectral analysis to identify normal TCP traffic so that it will not be dropped or rate-limited in defense against denial of service (DoS) attacks. The approach can reduce false positives of attacker identification schemes and thus decrease the associated unnecessary slowdown or stoppage of legitimate traffic. For the spectral analysis, we use the number of packet arrivals of a...
Mobile Adhoc NETwork (MANET) is a collection of mobile nodes which can communicate directly with other nodes within its transmission range and use multihop routing for nodes outside its transmission range. The inherent features of MANETs like dynamic topology, limited network resources (bandwidth, memory and battery power) and lack of centralized trusted authority makes it more vulnerable to at...
The relevance of the study is due to counteraction armed aggression Russian Federation, in particular by power state body - National Security and Defense Council Ukraine, which has intensified its activities under leadership President Ukraine as Supreme Commander-in-Chief Armed Forces repel enemy liberate occupied territories. purpose this examine peculiarities administrative legal status provi...
Centralized network security management is the practice of funneling the vast amount of security-related data from the various sources in the network through a centralized process and personnel. This effort ensures a comprehensive view of the network security status. It promotes good communication and redundancy in analysis. Centralized network security management also provides the capability t...
An experimental testbed has been created for developing and evaluating Global Navigation Satellite System (GNSS) signal authentication techniques. The testbed advances the state of the art in GNSS signal authentication by subjecting candidate techniques to the strongest publicly-acknowledged GNSS spoofing attacks. The testbed consists of a real-time phase-coherent GNSS signal simulator that act...
For over a half century, the United States space program has been a leading contributor to the health and growth of our nation from the perspectives of science, technology, economy, and defense. Given the nature and purpose of past, present, and future spacecraft, from earth science to space science and exploration to defense surveillance, one of the most critical needs and daunting challenges ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید