|
|
|
|
|
|
|
|
|
|
Volume 3, Issue 2 (10-2019) |
|
|
|
|
Threat assessment of air targets, using probabilistic Rule based model |
P. 1-22 |
|
Seyed Alireza Seyedin * , Seyed Mohammad tghi Mousavi shoushtari |
|
Abstract
(2330 Views) |
Full-Text (PDF)
(641 Downloads)
|
|
The Scalable Architecture of Military Internet of Things for Real-Time Battlefield Management Using Edge Computing. |
P. 23-39 |
|
Ahmad Malekian Borujeni , Mahmood Fathy * , Nasser Mozayani |
|
Abstract
(3081 Views) |
Full-Text (PDF)
(2081 Downloads)
|
|
Traffic violation detection using Map/Reduce |
P. 40-54 |
|
Shiva Asadianfam , Mahboubeh Shamsi * , Abdolreza Rasouli kenari |
|
Abstract
(2971 Views) |
Full-Text (PDF)
(1519 Downloads)
|
|
Strategic foresight For Alignment Gradation of Human Resource Processes With Defense Organization Objects |
P. 55-71 |
|
Hassan Amiri , Hosain Damghanian * , Abas Ebrahimi |
|
Abstract
(2703 Views) |
Full-Text (PDF)
(2228 Downloads)
|
|
Application of a Comprehensive Model of Organizational Capabilities in the OODA Cycle |
P. 72-86 |
|
Hamidreza Mohammadi , Seyed Mahmud Zanjirchi * , Seyed Habibollah Mirghafoori , Ali Morovati Sharifabadi |
|
Abstract
(3635 Views) |
Full-Text (PDF)
(1173 Downloads)
|
|
The most appropriate passive defense strategies for command and control network communication systems against the threat of electronic interception by enemy's communication intelligence sensors. |
P. 87-99 |
|
|
|
Abstract
(2553 Views) |
Full-Text (PDF)
(3100 Downloads)
|
|
|
|
|
|
|
|
|
|
|
|