|
|
|
 |
 |
|
 |
|
 |
|
Volume 3, Issue 2 (10-2019) |
 |
|
|
 |
Threat assessment of air targets, using probabilistic Rule based model |
P. 1-22 |
 |
Seyed Alireza Seyedin * , Seyed Mohammad tghi Mousavi shoushtari  |
|
Abstract
(2568 Views) |
Full-Text (PDF)
(695 Downloads)
|
 |
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. |
P. 23-39 |
 |
Ahmad Malekian Borujeni , Mahmood Fathy * , Nasser Mozayani  |
|
Abstract
(3405 Views) |
Full-Text (PDF)
(2298 Downloads)
|
 |
Traffic violation detection using Map/Reduce |
P. 40-54 |
 |
Shiva Asadianfam , Mahboubeh Shamsi * , Abdolreza Rasouli kenari  |
|
Abstract
(3347 Views) |
Full-Text (PDF)
(1693 Downloads)
|
 |
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects |
P. 55-71 |
 |
Hassan Amiri , Hosain Damghanian * , Abas Ebrahimi  |
|
Abstract
(2980 Views) |
Full-Text (PDF)
(2373 Downloads)
|
 |
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle |
P. 72-86 |
 |
Hamidreza Mohammadi , Seyed Mahmud Zanjirchi * , Seyed Habibollah Mirghafoori , Ali Morovati Sharifabadi  |
|
Abstract
(4062 Views) |
Full-Text (PDF)
(1285 Downloads)
|
 |
The most appropriate passive defense strategies for command and control network communication systems against the threat of electronic interception by enemy's communication intelligence sensors. |
P. 87-99 |
 |
|
|
Abstract
(2883 Views) |
Full-Text (PDF)
(3268 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|