Showing 1 - 20 results of 35 for search '"Massive Attack"', query time: 0.33s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    A CONTROL ALGORITHM FOR JOINT FLIGHT OF A GROUP OF DRONES by Elkhan SABZIEV

    Published 2021-03-01
    “…Using drones in groups in the military field is not a novel idea. A massive attack by a large amount of equipment is known to be very difficult to prevent. …”
    Get full text
    Article
  7. 7

    Concetti e strumenti per l’analisi critica dell’arretramento del modello sociale europeo by Maria Carmela Agodi

    Published 2012-09-01
    “…When used together they deploy their heuristic potentiality and contribute to the understanding both of the massive attack inferred to the European social model and the difficulty to effectively contrasting its downsizing by theoretical and especially political responses, as expressed in Gallino’s vivid reconstruction.…”
    Get full text
    Article
  8. 8

    Military logistics planning models for enemy targets attack by a swarm of combat drones by Oleg Fedorovych, Dmytro Kritskiy, Leonid Malieiev, Kseniia Rybka, Andrii Rybka

    Published 2024-02-01
    “…This study attempts to solve the task of operational-tactical planning of a massive attack on enemy targets with the help of combat drones, which have different combat potential characteristics. …”
    Get full text
    Article
  9. 9

    The control of Chagas' disease transmission in Mambaí, Goiás-Brazil (1980-1981) by Philip Davis Marsden, Domingos das Virgens, Cleudson Nery Castro, Ibiraci Pacífico Brasil, Raul Ferreira, Antonio Carlos Silveira, Carlos Alberto da Silveira Matos, Vanize Macedo, Aluizio Prata

    Published 1983-12-01
    “…T. sordida peridomestic populations persist and could pose a threat to interupting human transmission of T. cruzi The results of one massive attack spray application alone was compared with this application plus one selective application as regards the presence of T. infestans in houses oneyear later. …”
    Get full text
    Article
  10. 10
  11. 11

    Mycopopulation of marshmallow (Althaea officinalis L) by Pavlović Snežana Đ., Stojšin Vera B., Stojanović Saša D.

    Published 2007-01-01
    “…Leaves and stalks of marshmallow were from time to time under massive attack of Puccinia malvacearum, and that was the reason why leaves were unuseful as a herbal drug. …”
    Get full text
    Article
  12. 12

    Moderate Islam vis-a-vis Salafism in Indonesia: An Ideological Competition by Denny Febriansyah, Dawoud Sudqi el-Alami

    Published 2021-05-01
    “…This study reveals that the competition between these two groups has been taking place since the 1970s. With the massive attack from the Salafism group, the Moderate Islamic movement responded by introducing ‘Islam Nusantara’ (Islam that accommodates customs and cultures in the Indonesian archipelago) to strengthen the moderate style of Islam in Indonesia. …”
    Get full text
    Article
  13. 13

    Aspects of the Use of Force in Decisions of the International Court of Justice by A. S. Orbelyan

    Published 2008-06-01
    “…The Court does not believe that the concept of “armed attack” includes assistance to rebels in the form of the provision of weapons or logistical or other support.Furthermore, the exercise of collective self-defence is not legal in the absence of a request by the State which is a victim of the alleged attack.The Court has not ruled on the issue of the legality to exercise self-defence in case of the immanent threat of an armed attack or in case of a massive attack of irregular forces.The provisions mentioned above are sufficient, given that the UN Security Council is taking due actions in due time. …”
    Get full text
    Article
  14. 14

    Ambivalent features of consumerism ideology: philosophical aspect by E. L. Iakovleva

    Published 2022-12-01
    “…It stimulates the consumer’s buying activity through a massive attack with signs and symbols representing the brand. …”
    Get full text
    Article
  15. 15

    The control of Chagas' disease transmission in Mambaí, Goiás-Brazil (1980-1981) by Philip Davis Marsden, Domingos das Virgens, Cleudson Nery Castro, Ibiraci Pacífico Brasil, Raul Ferreira, Antonio Carlos Silveira, Carlos Alberto da Silveira Matos, Vanize Macedo, Aluizio Prata

    Published 1983-12-01
    “…T. sordida peridomestic populations persist and could pose a threat to interupting human transmission of T. cruzi The results of one massive attack spray application alone was compared with this application plus one selective application as regards the presence of T. infestans in houses oneyear later. …”
    Get full text
    Article
  16. 16

    NEW REMEDIES FOR PREVENTIVE AND TREATMENT MEASURES AGAINST IXODIDOSIS IN CATTLE IN LIVESTOCK FARMS OF DAGESTAN by M. V. Arisov, G. M. Magomedshapiev, K. G. Kurochkina, A. V. Uspensky, E. I. Malakhova, T. S. Novik, E. I. Koveshnikova, V. B. Yastreb

    Published 2016-05-01
    “…Efficacy of 5 % emulsion of D-cyphenothrin and Insakar-maxi applied against ix-odidosis in cattle in livestock farms «Shangoda» and «Yalgin» in Karabudakhkentensk region of Dagestan and economic efficiency of the held events are studied. 100 % efficacy of 5 % emulsion of D-cyphenothrin and Insakar-maxi used against massive attack of ixodid ticks on cattle was determined. …”
    Get full text
    Article
  17. 17

    PERJUANGAN RAKYAT SUKABUMI MELAWAN SEKUTU PADA MASA REVOLUSI 1945 – 1946 by Sulasman Sulasman

    Published 2012-06-01
    “…The highlight of the revolution in Sukabumi was the battle  against the Allies all the way Cigombong-Ciranjang followed by the battle of Bojongkokosan which led to bombardment of Cibadak by Allied Air Forces, the battle of Gekbrong and Serangan Umum (massive attack) involving soldiers, scholars, organizations and santri (Islamic school students). …”
    Get full text
    Article
  18. 18

    Leveraging Artificial Intelligence and Provenance Blockchain Framework to Mitigate Risks in Cloud Manufacturing in Industry 4.0 by Mifta Ahmed Umer, Elefelious Getachew Belay, Luis Borges Gouveia

    Published 2024-02-01
    “…The connectivity of industrial equipment and robots to the Internet opens cloud manufacturing to the massive attack risk of cybersecurity and cyber crime threats caused by external and internal attackers. …”
    Get full text
    Article
  19. 19

    Machine Learning With Variational AutoEncoder for Imbalanced Datasets in Intrusion Detection by Ying-Dar Lin, Zi-Qiang Liu, Ren-Hung Hwang, Van-Linh Nguyen, Po-Ching Lin, Yuan-Cheng Lai

    Published 2022-01-01
    “…However, the ML approach usually faces three challenges: massive attack variants, imbalanced data issues, and appropriate data segmentation. …”
    Get full text
    Article
  20. 20

    Distribution and abundance of the alien Xylosandrus germanus and other ambrosia beetles (Coleoptera: Curculionidae, Scolytinae) in different forest stands in central Slovenia by Hauptman T, Pavlin R, Grošelj P, Jurc M

    Published 2019-10-01
    “…The first economic damage was recorded in 2016 after a massive attack on recently felled logs of different tree species, spurring research into this non-native invasive species. …”
    Get full text
    Article