نتایج جستجو برای: that promoting a sui generis system

تعداد نتایج: 14187970  

Journal: :Universitas: Relações Internacionais 2011

Journal: :Advances in Social Sciences Research Journal 2019

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1389

abstract abstract of thesis (includes summary, goals, execution methods, and results) story “al-obnosat al-bayza” is one of the short stories from “hanna mineh” collection. this story is a selection of lives of some humans during a voyage together, each of them is a symbol of human nature (love, mind, kindness) and examine social, cultural, and political aspects of governing system, and it...

Journal: :Journal of the International Neuropsychological Society : JINS 2017
Adolfo M García Lucas Sedeño Natalia Trujillo Yamile Bocanegra Diana Gomez David Pineda Andrés Villegas Edinson Muñoz William Arias Agustín Ibáñez

OBJECTIVES The worldwide spread of Parkinson's disease (PD) calls for sensitive and specific measures enabling its early (or, ideally, preclinical) detection. Here, we use language measures revealing deficits in PD to explore whether similar disturbances are present in asymptomatic individuals at risk for the disease. METHODS We administered executive, semantic, verb-production, and syntactic...

Journal: :Zeitschrift für die gesamte Strafrechtswissenschaft 1921

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و - پژوهشکده علوم نانو 1392

among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید