نتایج جستجو برای: women in battles and women caliphate issues

تعداد نتایج: 21769505  

2013
Khawar Mumtaz

This paper seeks to provide an input towards developing the proposal for the research project, “Pathways of Women’s Empowerment” to investigate the determinants of women’s empowerment where and when it occurs. It primarily attempts to give an overview of the trends in research, thinking and programmes in Pakistan from 1975 onwards in the area of women’s empowerment and bodily integrity in order...

2011
Sajjad Ali Khan

Empowerment is the most recent policy approach to women in development. It takes into account not only both the practical and strategic gender needs of women but also recognizes their triple role in development. In doing so it follows a bottom-up approach. Empowerment has a number of dimensions with political participation as being one of them. The political presence of women in politics, howev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده زبانهای خارجی 1392

to teach english adequately, qualified teachers are needed. unfortunately, there are still teachers who are teaching english without an academic degree in tefl. it is necessary for teachers to have a major in english to have subject knowledge, but it is not sufficient. teachers need to have an understanding of the social, cultural, moral, ethical, and pedagogical issues of education and practic...

2013
Lori A. Clarke

She is a Fellow of the ACM and IEEE, and a board member of the Computing Research Association’s Committee on the Status of Women in Computing Research (CRA-W). She is a former vice chair of the Computing Research Association (CRA), co-chair of CRA-W, IEEE Publication Board member, associate editor of ACM TOPLAS and IEEE TSE, member of the CCR NSF advisory board, and ACM SIGSOFT chair. Awards in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :Health care for women international 2009
Joellen W Hawkins Lois A Haggerty Carole W Pearce Ursula Kelly Kelly Grady

The purpose of this study was to test the psychometric properties of a vertical version of horizontally oriented three Appraisal of Violent Situation scales that elicit women's subjective appraisals of severity, dangerousness, and controllability of violence. Construct validity of the vertical scale eliciting 64 abused women's perceptions of severity of violence experienced was supported by a l...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

Journal: :فصلنامه علمی پژوهشی تاریخ اسلام 0
مصیب چراغی کارشناس ارشد تاریخ و تمدن ملل اسلامی - دانشگاه تهران

al-mansour mohammad ibn-e abi amer was the mighty chamberlain of hisham (moayyad), the omavite caliph of andalusia (caliphate 366-399). his period is simultaneous with the beginning of the moslems' military weakness and the anarchic circumstances in the rule of moslems over andalusia, as the christians dared to transgress the borderlines of, andalusia, and plunder and kill people there. al...

The crown prince position was one of the most influential institutions in the Abbasid caliphate system. In the second period of the Abbasids (232-334 AH), unlike the first period (132-232 AH) when the heirs to the throne were largely independent, the magnitude of influence of this institution on increasing the power of caliphate was lost. Findings of the present research, which uses a descripti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید