نتایج جستجو برای: qaedaism todays many islamist terrorist groups use al
تعداد نتایج: 3344206 فیلتر نتایج به سال:
there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...
Lie detection procedures typically aim at determining the guilt or innocence of a single suspect. The Concealed Information Test (CIT), for example, has been shown to be highly successful in detecting the presence or absence of crime-related information in a suspect's memory. Many of today's security threats, however, do not come from individuals, but from organized groups such as criminal orga...
Performance optimization remains one of the key issues in parallel computing. Many parallel applications do not benefit from the continually increasing peak performance of todays massively parallel computers, mainly because they have not been designed to operate efficiently on the 1000s of processors of todays top of the range systems. Conventional performance analysis is typically restricted t...
The looming danger of radical Islamism and religious struggles for hegemony effectively converged in the local Ukrainian context case Hizb ut-Tahrir al-Islami (HTI), or Islamic Party Liberation. For want a more notorious Islamist group Ukraine, this organization became treated various media as main embodiment extremist terrorist threat. Likewise, despite fact that actual number HTI’s followers ...
one of the applications of nanotechnology is use of carbon nanotubes for the targeted delivery of drug molecules. to demonstrate the physical and chemical properties of biomolecules and identify new material of drug properties, the interaction of carbon nanotubes (cnts) with biomolecules is a subject of many investigations. cnts is a synthetic compound with extraordinary mechanical, thermal, el...
Terrorist groups maintain their finances from different sources which is difficult to track. In various studies it came out that individuals, organizations donate money terror outfit. These of financing were not easily traceable. Due technological advances, has become very easy send without exposing the sources. However, governments have taken measures halt these Despite efforts seems quite imp...
abstract since heubners (1985) pioneering study, there have been many studies on (mis) use/ non-use of articles by l2 learners from article-less and article languages. the present study investigated how persian l2 learners of english produce and interpret english definite descriptions and demonstrative descriptions. it was assumed that definite and demonstrative descriptions share the same cen...
From Keywords to Discursive Legitimation: Representing 'kuffar' in the Jihadist Propaganda Magazines
The research in this paper was carried out as part of a research project funded by Swansea University and directed by professors Stuart Macdonald and Nuria Lorenzo-Dus. The project examined jihadist propaganda from different disciplinary perspectives, including Terrorism Studies and Linguistics. All available online publications of five jihadist magazines released between January 2009 and the e...
Many policymakers and scholars have discussed concerns regarding terrorist group use of cryptocurrency in recent years. While some argue that the threat is still limited, others current usage does not match entirety features groups require desire. In end, it critical to recognize used for financing frequently depends on several influencing factors. This study aims (i) investigate utilization by...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید