نتایج جستجو برای: illegal connection and unauthorized usage of water
تعداد نتایج: 24098878 فیلتر نتایج به سال:
1. to determine whether difference in birth body mass influenced growth performance in pipistrellus kuhlii we studied a total of 12 captive-born neonates. bats were assigned to two body mass groups: light birth body mass (lbw: 0.89 ± 0.05, n=8) and heavy birth body mass (hbw: 1.35 ± 0.08, n=4). heavier body mass at birth was associated with rapid postnatal growth (body mass and forearm length) ...
abstract: proverbs are of the language materials which of the food of any language depends on the quality and quantity of these same materials. in the present research, the researcher tried to present the ramsarian proverbs according to four variables of color, fruit, plantsand animals that selected from the book of the members of each of these four variables, put them into the spss system fo...
Di erent security policy models have been developed andpublished in the past. Proven security policy models, if correctly im-plemented, guarantee the protection of data objects from unauthorizedaccess or usage or prevent an illegal information ow. To verify that asecurity policy model has been correctly implemented, it is importantto de ne and execute an exhaustive list of t...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
in new management approaches, in the organizations with inflexible structure, existing of red tapes and interruptions caused by limitations and also non-compliance with environmental changes, create demotivation among staff. with regard to the influence of job motivational potential and its relationship to the type of organizational structure( enabling and dissuasive), the goal of this research...
in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...
the ability of composing a coherent and extended piece of writing in second language is considered as a fundamental factor to convey information and ideas of learners through the academic issues. although learners may achieve a perfect academic writing skill through assigning the l2 tasks in content based instruction, but demonstration of their abilities may be related to their ability in l1 es...
In this paper, a high dimensional chaotic systems based mixed keystream generator is proposed to secure the voice data. As the voice-based communication becomes extensively vital in the application areas of military, voice over IP, voice-conferencing, phone banking, news telecasting etc. It greatly demands to preserve sensitive voice signals from the unauthorized listening and illegal usage ove...
a major concern in the last few years has been the fact that the cultural centers are keeping distance with what they have been established for and instead of reproducing the hegemony, they have turned into a place for resistance and reproduction of resistance against hegemony. because the cultural centers, as urban public spaces in the last two decades, have been the subject of ideological dis...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید