Search Results

You are looking at 1 - 10 of 31 items for :

  • Engineering, other x
Clear All
Open access

Marius Pricopi

of Academic Research, vol. 2, no. 5, pp. 312-314. Premium Times. (2016). Nigerian military reveals Boko Haram’s new tactics to bomb Nigerians. Premium Times, January 30. Retrieved from: http://www.premiumtimesng.com/news/headlines/197681-nigerian-military-reveals-boko-harams-new-tactics-bombnigerians.html, accessed on June 1, 2016. Searcey, D. (2016). Boko Haram Turns Female Captives Into Terrorists. The New York Times, April 7. Retrieved from: http://www.nytimes.com/2016/04/08/world/africa/bokoharam-suicide-bombers.html, accessed on

Open access

Milan Sopóci and Lubomír Matta

Abstract

The article deals with the settlement of the Ground Forces in history to the present day. It confronts this information with actual trends of development of some branches of the armed forces, weapons systems, techniques, and new requirements on tactics, combat and operational use. From the armed conflicts in the last years which took place in Irak, Afghanistan, Islam state, we can conclude that the crucial tasks in battles and conflicts require the involvement of forces from other branches (Air forces, Special forces). The paper focuses on the necessity and importance of providing more and more intelligence, education, preparation and global more knowledge for regular soldiers.

Open access

Ivan Avramov

References [1] Vuchkov, V. (2006). Publishing House Sofia Feneia Evidences in the criminal proceedings, pp. 73-76. [2] Tsekov, Ts. Publishing: Science and Art (1971). Tactics of identification in the pre-trial proceedings, pp. 56-58 [3] Bobev, K. (2006). Publishing House "St. Kliment Ohridski" Criminalistics, pp. 222-224. [4] Belenski, R. (2008). Ciela Publishing House Criminalistics. [5] Brus, B. & Horgan J. (2001). Ciela Publishing House Criminalistics.

Open access

Luděk Rak, Jan Drozd and Zdeněk Flasar

Abstract

The paper focuses on the analysis of the current highly dangerous tools of destruction, used mostly by insurgents and terrorists, especially in asymmetric warfare. Vehicles usually loaded with explosives (mostly homemade explosive), driven by suicide bombers are a significant threat to troops and the civilian population, not only in high risk areas. Analysis of the available incidents of this type, and available response to an incident mentioned in this article, it becomes the basic portfolio data for the design of effective elimination or at least reduction of the destructive effect, especially on soft targets.

Open access

Michal Hrnčiar

Abstract

The current security environment is evolving towards a global complexity of unpredictable events. The risk of state and non-state actors attempting to achieve their goals through destabilization exists. In the operating environment, this implies a blurring of the boundaries between state and nonstate actors (such as insurgents, terrorists and criminals) and NATO may confront an adversary who uses traditional (conventional), irregular warfare or both (hybrid warfare). The aim of the article is to find, analyze and describe the key elements that fundamentally different irregular of traditional (conventional) and hybrid warfare.

Open access

Mihail Smurov and Nikolajs Sulima

-Core Tactics for Market Domination. New York: Broadway Books. 4. DroneDeploy: How to price your drone mapping services - https://blog.dronedeploy.com/how-toprice-your-drone-mapping-services-b5fc31c86934/. Retrieved 10 November 2016 5. Dronelife: 7 advice aerial photography company - http://dronelife.com/2015/05/12/7-advice-aerialphotography-company/. Retrieved 10 November 2016. 6. Federal Aviation Administration: Drones in America Must Now Be Registered. Here's What You Need to Know. Inc. - https

Open access

Marcel Rolf Pfeifer

for%20direct%20Manufacture%20paper_final.pdf [5] Ijioui, R., Emmerich, H., Ceyp, M.: Strategies and Tactics in Supply Chain Event Mana-gement. Springer Verlag: Berlin, Heidelberg. 368 pages. 2007. [6] Manzini, R., Regattieri, A., lberto - Pham, Hoang - Ferrari, E.: Maintenance forIndustrial Systems. Springer Verlag: London. 479 pages. 2010. ISBN: 1848825757, 9781848825758. [7] Sedlák, J., Píša, Z.: Výroba master modelů technologií rapid prototyping na cnc stroji pomocí tiskové hlavy. In: STROJÍRENSKÁ TECHNOLOGIE, BŘEZEN 2007, ROČNÍK XII. Univerzita

Open access

M. Rebezova, N. Sulima and R. Surinov

. Jones, C. Stolen Mile. (2010, October, 05). USA Today. "Gold Rush" in the air and on the ground. (2010, February). Airline Weekly. An Offer You Cannot Refuse, from http://www.traveldailynews.gr http://www.ryanair.com http://www.ideaworkscompany.com Plank, W. The Wall Street Journal online. 5 February 2010 Cross, R. (1997). Revenue Management: Hard-Core Tactics for Market Domination. New York: Broadway Books

Open access

Emil Augustyn and Adam Kadziński

mechanika lotu samolotu odrzutowego w tym wysokomanewrowego, Instytut Techniczny Wojsk Lotniczych, Warszawa 2009. [18] Młyńczak M., Metodyka badań eksploatacyjnych obiektów mechanicznych, Oficyna Wydawnicza Politechniki Wrocławskiej, Wrocław 2012. [19] NATO Standarization Agency, NATO Glossary of Terms and Definitions (AAP-6), Brussels 2014. [20] Sobol E. (red., Słownik wyrazów obcych. Wydanie nowe, Wydawnictwo Naukowe PWN, Warszawa 1999. [21] United States Air Force - Air Education and Training Command, AETC Tactics Techniques and Procedures 11

Open access

Jan Hora and Jan Žižka

, Prague, Grada Publishing, 253 s. ISBN 80-95824-46-9. (in Czech) LAYMAN, L. 1940: Fundamentals of Firefighting Tactics , New York, USA, Magruder publishing company. NOSIKIEVIČ, J.; ŠŤÁVA, P. 1986: Extinguish agents – supply , VSB – Technical University of Ostrava, Faculty of Mining and Geology, 186 s. (in Czech) PROKEŠ, O. 2012: Analysis of Thermal Load on the Firefighting Suit During Training , Diploma thesis, Ostrava, VSB – Technical University of Ostrava, Faculty of Safety Engineering, 63 s. (in Czech) QUANTIERE, J.G. 1998: Principles of