نتایج جستجو برای: counter intelligence
تعداد نتایج: 147504 فیلتر نتایج به سال:
The purpose of this paper is to provide a counter-ideology framework as an alternative strategy defeat terrorists, military force has never been proven enough any terrorist group. analysis relies on secondary information for systematic examination and descriptive resulting in the use Counter Terrorism Strategy (CTS) model evaluate key assumption that acts recruits are connected deep politics id...
Pseudo gangs form the steely side of Hearts and Minds and were used with great effect in counter-insurgency campaigns in Kenya (1952-60) Malaya (1948-60) and Rhodesia (1964-1979). Although the use of pseudo gangs was not new to counter-insurgency tactics, with the British using a similar tactic in the Boer war (1899-1902), the use of such gangs was certainly perfected during these later campaig...
S. Pislak, P. Robmann and P. Tru ol, in collaboration with J. Egger, W. D. Herold, H. Kaspar, and H. Weyer, Paul{Scherrer{Institut, CH-5234 Villigen Brookhaven National Laboratory, Upton, NY-11973, USA University of New Mexico, Albuquerque, NM-87131, USA University of Pittsburgh, Pittsburgh, PA-15260, USA Yale University, Newhaven, CT-06511, USA Institute for Nuclear Research, Academy of Scien...
the nitrite ® nitro isomerization in nitritopentaamine cobalt (iii) halides has been known. in this paper, the effect of the size of the counter ions (noncoordinated groups) on the rate of isomerization in nitritopentaamine cobalt (iii) halides, is reported. the rate of isomerization is decreased by increasing the size of the counter ions. this decrease is explained on the basis of steric inter...
The key to the successful operation of any army is well-organized work its units responsible for counterintelligence. In Wehrmacht, this function was assigned abwehr-3 – one departments abwehr (German military intelligence and counterintelligence). source base based on captured German documents, a set which found in funds Central Archive Ministry Defense. scientific novelty study lies fact that...
In the early 1960s, there were several events in world and Hungary that posed adecisive impact on work of state security, including field counter intelligence. Political shifts socialist countries began second half 1950s, aconfrontation with former Stalinist system, need to win over society detecting crime, necessary broadening relations between two opposing blocs, all affected security; also r...
A comparison between a bit-level and a conventional VLSI implementation of a binary neural network is presented. This network is based on Correlation Matrix Memory (CMM) that stores relationships between pairs of binary vectors. The bit-level architecture consists of an n m array of bit-level processors holding the storage and computation elements. The conventional CMM architecture consists of ...
The past year has seen a rapid expansion of intelligence and law enforcement community efforts in the areas of Counter-terrorism and Homeland Defense, principally in the US, but also in most major democracies of the world. This has led to a corresponding increase in research and development activities in this area as well. Many of the problems in this area involve dealing with large amounts of ...
The aim of the present research was to examine the role of the big five personality factors (neuroticism, extroversion, openness to experience, agreeableness and conscientiousness) in the relationship between perceived organizational justice with counter productive behaviors in a sample of industries employees. Three hundred and six employees of these industries were included in this research. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید