LEADER 02612nam 2200649 450 001 9910820402303321 005 20230725040407.0 010 $a0-8018-9750-5 035 $a(CKB)3170000000047018 035 $a(PromptCat)40018078473 035 $a(MH)012532440-5 035 $a(SSID)ssj0000605950 035 $a(PQKBManifestationID)11379708 035 $a(PQKBTitleCode)TC0000605950 035 $a(PQKBWorkID)10581527 035 $a(PQKB)11008451 035 $a(MiAaPQ)EBC4398314 035 $a(OCoLC)864793199 035 $a(MdBmJHUP)muse1405 035 $a(Au-PeEL)EBL4398314 035 $a(CaPaEBR)ebr11161031 035 $a(EXLCZ)993170000000047018 100 $a20090814d2010 uy| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt 182 $cc 183 $acr 200 14$aThe limits of U.S. military capability $elessons from Vietnam and Iraq /$fJames H. Lebovic 210 1$aBaltimore :$cJohns Hopkins University Press,$d2010. 215 $a1 online resource (x, 297 p. ) 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8018-9472-7 320 $aIncludes bibliographical references and index. 327 $aLeveraging the adversary's forces: the wars in Vietnam and Iraq -- Leveraging the adversary's support base: states, populations, and societies -- Leveraging the adversary's leaders: the balance of resolve and US exhaustion -- Leveraging host governments: the challenges of institution-building -- Conclusions: Vietnam and Iraq, Afghanistan, and the future. 606 $aVietnam War, 1961-1975 606 $aIraq War, 2003-2011 606 $aMilitary readiness$vCase studies 606 $aMilitary planning$zUnited States$vCase studies 606 $aAsymmetric warfare$vCase studies 607 $aUnited States$xMilitary policy 607 $aUnited States$xArmed Forces$xOperational readiness 615 0$aVietnam War, 1961-1975. 615 0$aIraq War, 2003-2011. 615 0$aMilitary readiness 615 0$aMilitary planning 615 0$aAsymmetric warfare 676 $a355/.033273 700 $aLebovic$b James H.$0921395 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820402303321 996 $aThe limits of U.S. military capability$94108070 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress LEADER 04085nam 22007215 450 001 9910872192703321 005 20240705125449.0 010 $a9789819726141 010 $a981972614X 024 7 $a10.1007/978-981-97-2614-1 035 $a(MiAaPQ)EBC31518256 035 $a(Au-PeEL)EBL31518256 035 $a(CKB)32658280700041 035 $a(DE-He213)978-981-97-2614-1 035 $a(MiAaPQ)EBC31521852 035 $a(Au-PeEL)EBL31521852 035 $a(OCoLC)1446268561 035 $a(EXLCZ)9932658280700041 100 $a20240705d2024 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of 4th International Conference on Frontiers in Computing and Systems $eCOMSYS 2023, Volume 2 /$fedited by Dipak Kumar Kole, Shubhajit Roy Chowdhury, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee 205 $a1st ed. 2024. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2024. 215 $a1 online resource (694 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v975 311 08$a9789819726134 311 08$a9819726131 327 $aChapter 1: An Optimal Edge Server Placement Algorithm based on Glow-Worm Swarm Optimization Technique -- Chapter 2: A 6G-enabled edge-assisted Internet of Drone Things ecosystem for fire detection -- Chapter 3: An automated secure smart-contract driven KYC solution -- Chapter 4: Enhancing PopSAD: A New Approach to Shilling Attack Detection in Collaborative Recommenders -- Chapter 5: Coverless Steganography: A Comprehensive Study on Concealing Data without a Cover Medium -- Chapter 6: IRS-assisted Wireless Systems: Phase Setting and BER Analysis -- Chapter 7: Secured Authentication Scheme for E-Healthcare in SIoT using ECC and Improved Hash function -- Chapter 8: Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing -- Chapter 9: Anomaly Detection based Resource Autoscaling Mechanism for Fog Computing -- Chapter 10: On Coverage and Connectivity with Reduced Sensing Redundancy based on Genetic Algorithm. etc. 330 $aThis book gathers high-quality research papers presented at the 4th International Conference on Frontiers in Computing and Systems (COMSYS 2023) held at Indian Institute of Technology Mandi, Himachal Pradesh, India, during 16?17 October 2023. The book is divided into two volumes, and it covers research in ?cyber-physical systems for real-life applications? pertaining to AI, machine learning and data science; devices, circuits, and systems; computational biology, biomedical informatics, and network medicine; communication networks, cloud computing, and IoT; image, video, and signal processing; and security and privacy. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v975 606 $aTelecommunication 606 $aArtificial intelligence 606 $aComputational intelligence 606 $aBioinformatics 606 $aCommunications Engineering, Networks 606 $aArtificial Intelligence 606 $aComputational Intelligence 606 $aComputational and Systems Biology 615 0$aTelecommunication. 615 0$aArtificial intelligence. 615 0$aComputational intelligence. 615 0$aBioinformatics. 615 14$aCommunications Engineering, Networks. 615 24$aArtificial Intelligence. 615 24$aComputational Intelligence. 615 24$aComputational and Systems Biology. 676 $a621.382 700 $aKole$b Dipak Kumar$01743547 701 $aRoy Chowdhury$b Shubhajit$01743548 701 $aBasu$b Subhadip$01380275 701 $aPlewczynski$b Dariusz$01380276 701 $aBhattacharjee$b Debotosh$01380277 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910872192703321 996 $aProceedings of 4th International Conference on Frontiers in Computing and Systems$94171713 997 $aUNINA