نتایج جستجو برای: creating security means creating an opportunity and a special situation for protecting individual rights against threats imposed upon people
تعداد نتایج: 22336168 فیلتر نتایج به سال:
Although, the history of login of secondary victimization notions in Iran criminology discourse return to more than a decade ago, but these ideas has been adopted in Iran legislative politics by enacting Code of Criminal Procedure in 2013 and in this act has been considered numerous mechanisms for supporting them in order to reduce their hardship. The victim's sick people have more specific nee...
Terrorism is an offensive action which violates human rights and always invades to people’s rights. Given the high incidence of this type of global action and the widespread violations of human rights and peace and security, countering terrorism will be important. The existence of financial resources is an essential element of terrorism and Preemptive measures and their success in blocking fina...
The security concerns that come with using mobile agents is the main reason why the mobile agent paradigm has not been widely adopted. A number of new security problems are introduced with the use of mobile agents. Both, the host computer that executes an agent and the agent, need security mechanisms to protect against the threats posed by malicious agents and hosts. The issue of protecting a m...
nowadays, the development of anti cancer drugs is an important subject in pharmacology. bisphosphonates (b.p) are a great choice for design and production of the types of drugs which not only could perform as anti cancer agents but also could inhibit the function of acetyl cholinesterase (ache). ache hydrolyzes the acetylcholine (which is a neurotransmitter in nervous system) using the oh in i...
monumental changes occurring on a daily basis have altered the world into a global village of expanding technology and shrinking geography in which preparing language learners for intercultural communication seems to be a sine qua non for modern language education. employing a cross-sectional design in its first phase, this study investigated the intercultural sensitivity and language proficien...
abstract in first part of this project, the use of a new and biguanid-like catalyst supported on silica as a recyclable catalyst provides a new route for the synthesis of a variety of arylalkylidene rhodanine derivatives through knoevenagle reaction in at present of solvent at room temperature. rhodanine derivatives and especially arylalkylidene rhodanines have proven to be attractive compound...
individuals create different links through their interaction with environment. during this connection, unknown spaces become places by meanings which people attach to them. it seems that the meaning, play an important role in sense which people percept from a place. in environment psychology, concepts such as sense of place and place attachment investigate as an emotional relationship between p...
to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...
abstract ion selective electrodes (ises) are electrochemical sensors that respond selectivity to the activity of ionic species. an ion-selective electrode is an electrochemical device that uses a thin selective membrane or film as the recognition element, and is an electrochemical half-cell equivalent to other half-cells of the zeroth (inert metal in a redox electrolyte). in common methods o...
When security of a given network architecture is not properly designed from the beginning, it is difficult to preserve confidentiality, authenticity, integrity and nonrepudiation in practical networks. Unlike traditional mobile wireless networks, ad hoc networks rely on individual nodes to keep all the necessary interconnections alive. In this article we investigate the principal security issue...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید