نتایج جستجو برای: armed attack

تعداد نتایج: 92853  

Journal: :Journal of global faultlines 2023

When Russia invaded Ukraine on 24 February 2022, there was global outrage, condemnation, and calls for a stop to the attack. Over six months have passed does not seem be an end conflict in sight. Of many reasons Russian state has given as impetus armed conflict, is countering of neo-Nazi extremism, radicalization, political violence. In this commentary piece, it will contended that military int...

Journal: :Religions 2022

The portrait statue of Fujiwara Kamatari (614–669) enshrined at Tōnomine is well known for its agency and mantic powers. Known to crack whenever the stability clan was under threat, icon carefully observed cared for. However, not one but two statues ancestor existed in Heian period, until destroyed infamous 1208 attack by armed supporters Kinpusen. This article proposes first investigate relati...

Journal: :Perspectives on Politics 2022

What are the determinants of ethnic violence? Existing research has forwarded a range often competing explanations, from political opportunism to economic competition state incapacity. We argue that this diversity accounts is attributable, in part, scholars’ tendency lump together distinct forms violence have different underlying determinants. propose scholars instead disaggregate and put forwa...

Journal: :Baltic yearbook of international law 2022

Discussion in the United Nations on how international law applies to cyberspace has lasted more than two decades. Initially, issue was raised by Russia and gained little attention Western States; today, however, question of state responsibility, applicability humanitarian thresholds intervention, use force or armed attack have become a high priority for all digitalised States. Debate matter has...

Journal: :Science-Business eXchange 2008

2015
Madhav Joshi

BACKGROUND Previous studies suggest that countries with a higher child mortality rate are more susceptible to armed conflict onset as well as recurrence. Studies do not explain conditions under which child mortality declines among post-armed conflict states. This article argues that where armed conflict is terminated through negotiation and implementation of comprehensive peace agreements (CPAs...

Journal: :ACM Transactions on Programming Languages and Systems 2021

We report on the process for formal concurrency modelling at Arm. An initial consistency model of Arm achitecture, written in cat language, was published and upstreamed to herd+diy tool suite 2017. Since then, we have extended original with extra features, example, mixed-size accesses, produced two provably equivalent alternative formulations. In this article, present a comprehensive review wor...

Journal: :فصلنامه تخصصی جنگ ایران و عراق 0
صالح رضایی محقق

preventing or minimizing life and property losses in different wars is the main and the most important aim for armed conflicts law. this branch of law pays attention to achieving this aim through observing military necessities and humanitarian principles simultaneously. military necessities explain the necessity of the war termination and humanitarian principles confine struggling and fighting ...

This article presents the key insights about the environment and security links in the context of the Persian Gulf region. This research paper focuses on the challenge of finding a balance among development, armed conflicts and environmental degradation in the Persian Gulf region. Environmental security challenges are human security, sustainable development and regional cooperation in the Persi...

Journal: :isecure, the isc international journal of information security 0
p. rastegari department of electrical and computer engineering, isfahan university of technology, isfahan, iran m. berenjkoub department of electrical and computer engineering, isfahan university of technology, isfahan, iran

certificateless public key cryptography (cl-pkc) is a useful method in order to solve the problems of traditional public key infrastructure (i. e. large amount of computation, storage and communication cost for managing certificates) and id-based public key cryptography (i. e. key escrow problem), simultaneously. a signcryption scheme is an important primitive in cryptographic protocols which p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید