نتایج جستجو برای: they are critical infrastructure
تعداد نتایج: 5614551 فیلتر نتایج به سال:
this study investigates the strategies native english and persian speakers employ for expressing gratitude in different situations. the strategies of persian efl learners are also compared with english strategies in order to find the differences that may exist between these two languages. social status and size of imposition of the favor are social variables which are investigated in detail for...
the present dissertation aims to investigate four-word lexical bundles in applied linguistics research articles by iranian and internationally-published writers. the aims of this study are two-fold: first of all, attempts have been made to create a comprehensive list of the most commonly used four-word lexical bundles categorized by their type and token frequency, their structural characteristi...
abstract foreign and iranian cultures are far distinct in the constraints imposed on writing and translating for children, since the iranian literary system is mainly concerned with cultural and religious instructions which lead to manipulation of translated texts. this study sought to identify the cultural and social constraints and norms which determined the strategies applied in the transl...
august wilson is undoubtedly one of the rare black playwrights whose works have attracted streams of attention and worldwide audience. the present study aims at analyzing fences and piano lesson which are two of the most successful plays in his pittsburgh cycle from the perspective of michel foucault’s theories and ideas. studying these two plays from foucault’s perspective opens new windows in...
We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...
Patients are filtered by rigorously defined study selection criteria for recruitment into research; this is necessary to improve signal detection, internal validity, reduce study-related risks, and meet ethical standards. Research patients assessed managed in ways that differ from usual practice. So, neither nor the treatment environment resembles everyday treated This diminishes generalizabili...
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...
the present study aimed at investigating how different news agencies using the concept of legitimation/delegitimation represent the same event differently. to this end, van leeuwens (2008) legitimatory/delegitimatory framework was applied to the data gleaned from the iranian state-run news agency fars news, british state-run news agency bbc, and also american state-run news agency voa. the resu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید