|
|
|
 |
 |
|
 |
|
 |
|
Volume 3, Issue 2 (10-2019) |
 |
|
|
 |
Threat assessment of air targets, using probabilistic Rule based model |
P. 1-22 |
 |
Seyed Alireza Seyedin * , Seyed Mohammad tghi Mousavi shoushtari  |
|
Abstract
(2899 Views) |
Full-Text (PDF)
(839 Downloads)
|
 |
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. |
P. 23-39 |
 |
Ahmad Malekian Borujeni , Mahmood Fathy * , Nasser Mozayani  |
|
Abstract
(3774 Views) |
Full-Text (PDF)
(2557 Downloads)
|
 |
Traffic violation detection using Map/Reduce |
P. 40-54 |
 |
Shiva Asadianfam , Mahboubeh Shamsi * , Abdolreza Rasouli kenari  |
|
Abstract
(3752 Views) |
Full-Text (PDF)
(1930 Downloads)
|
 |
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects |
P. 55-71 |
 |
Hassan Amiri , Hosain Damghanian * , Abas Ebrahimi  |
|
Abstract
(3317 Views) |
Full-Text (PDF)
(2619 Downloads)
|
 |
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle |
P. 72-86 |
 |
Hamidreza Mohammadi , Seyed Mahmud Zanjirchi * , Seyed Habibollah Mirghafoori , Ali Morovati Sharifabadi  |
|
Abstract
(4476 Views) |
Full-Text (PDF)
(1485 Downloads)
|
 |
The most appropriate passive defense strategies for command and control network communication systems against the threat of electronic interception by enemy's communication intelligence sensors. |
P. 87-99 |
 |
|
|
Abstract
(3256 Views) |
Full-Text (PDF)
(3530 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|