نتایج جستجو برای: e hamidi by hamid al

تعداد نتایج: 7895866  

ژورنال: مطالعات عرفانی 2009

Lavâyeh is one of the most famous Persian mystical texts. The treatise has been written following the example of Sheikh Ahmad Ghazzāli’s Savāneh. Devotion of ‘Eyn al-Qozāt of Hamadān to the author of Savāneh and relation of them with each other, and some other factors, caused that Lavāyeh be known by the name of ‘Eyn al-Qozāt’s, and even once has been published by his name in Iran. This untru...

Journal: :فقه و مبانی حقوق اسلامی 0
سید محمد مظفری عضو مرکز تحقیقات نجوم واختر فیزیک مراغه احمد بادکوبه دانشیار دانشگاه تهران

having briefly been reviewed the historical process of changing the formulae for determining the times of islamic prayers, two newly found formulae and a new rule for establishing the times of prayers would be discussed. these matters have been exploited from four texts, still preserved as manuscript: (1) siyyid ¾?y? al-d?n sh?shtar?’s ¼ad b?b dar macrifa al-a½??rl?b, (2) b?r?n?’s ’ist?c?b f? c...

Journal: :TAJDID : Jurnal Ilmu Keislaman dan Ushuluddin 2019

2011
Jung Ho Hamid Reza Rezvani Yucui Zhu Véronique Guyonnet-Duperat Mohammad Athar Desiree Ratner Arianna L. Kim

Back, Jung Ho, Hamid Reza Rezvani, Yucui Zhu, Véronique Guyonnet-Duperat, Mohammad Athar, Desiree Ratner, and Arianna L. Kim From Departments of Dermatology, Columbia University Medical Center, New York, NY 10032; Inserm 1035, Bordeaux, F-33076, France; Université Bordeaux Segalen, Bordeaux, F-33076, France; SFR TransBioMed, Plateforme de vectorologie, Université Bordeaux Segalen, Bordeaux, F33...

Journal: :MAGHZA: Jurnal Ilmu Al-Qur'an dan Tafsir 2018

Journal: :Mathematical Methods in The Applied Sciences 2023

The cover image is based on the Research Article A modified strain gradient beam constraint model by Mohammad Arhami and Hamid Moeenfard et al., https://doi.org/10.1002/mma.8700.

Journal: :Annales des Télécommunications 2009
Md. Abdul Hamid Choong Seon Hong

Since wireless sensor networks are emerging as innovative technologies for realizing a variety of functions through a number of compact sensor nodes, security must be justified and ensured prior to their deployment. An adversary may compromise sensor nodes, forcing them to generate undesired data, and propagation of these data packets through the network results in wasteful energy consumption. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید