نتایج جستجو برای: e hamidi by hamid al
تعداد نتایج: 7895866 فیلتر نتایج به سال:
Lavâyeh is one of the most famous Persian mystical texts. The treatise has been written following the example of Sheikh Ahmad Ghazzāli’s Savāneh. Devotion of ‘Eyn al-Qozāt of Hamadān to the author of Savāneh and relation of them with each other, and some other factors, caused that Lavāyeh be known by the name of ‘Eyn al-Qozāt’s, and even once has been published by his name in Iran. This untru...
having briefly been reviewed the historical process of changing the formulae for determining the times of islamic prayers, two newly found formulae and a new rule for establishing the times of prayers would be discussed. these matters have been exploited from four texts, still preserved as manuscript: (1) siyyid ¾?y? al-d?n sh?shtar?’s ¼ad b?b dar macrifa al-a½??rl?b, (2) b?r?n?’s ’ist?c?b f? c...
Back, Jung Ho, Hamid Reza Rezvani, Yucui Zhu, Véronique Guyonnet-Duperat, Mohammad Athar, Desiree Ratner, and Arianna L. Kim From Departments of Dermatology, Columbia University Medical Center, New York, NY 10032; Inserm 1035, Bordeaux, F-33076, France; Université Bordeaux Segalen, Bordeaux, F-33076, France; SFR TransBioMed, Plateforme de vectorologie, Université Bordeaux Segalen, Bordeaux, F33...
The cover image is based on the Research Article A modified strain gradient beam constraint model by Mohammad Arhami and Hamid Moeenfard et al., https://doi.org/10.1002/mma.8700.
Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their deployment. An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید