نتایج جستجو برای: iranist party participating in protests
تعداد نتایج: 16981604 فیلتر نتایج به سال:
By happenstance, we found ourselves in Istanbul, Turkey in early June 2013 only days after a mass anti-government protest developed in and around Gezi Park. In addition to informal discussions and interviews with academics and others, we visited the protest site and traveled throughout Istanbul to directly experience the atmosphere and events. We also conducted two studies of Turks’ participati...
the theory of efficient breach states that it is socially useful to breach a contract whenever the breach would leave no party worse off, while leaving at least one party better off. in other words, economic analyses of breach are mainly concerned with situations in which breach is pareto-superior, rather than just overall profit-maximizing. in contrast with moral theories that hold that breach...
abstract the feminist movement in the united states like other countries has tried to establish equality for women. from the first attempts to gain constitutional right for vote, up to the current radical demands, feminists have struggled to make changes in the u.s. party politics and obtain their rights within the parties. one of the important issues in which women played a key role in party p...
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are under-studied fields of research, with practical importance. We examine MFE scenarios where every participant has some item, and at the end of the protocol, either every participant receives every other participant’s item, or no participant receives anything. This is a particularly hard scenario, even though...
Wakeboarding is a sport increasing in popularity in the UK and the rest of the world. It is known to be associated with a high incidence of relatively minor injuries to the participating sportsperson. The authors present the case of a traumatic hand amputation to an associated third party and highlight the potential for serious injuries to all those directly involved with the sport. The authors...
A provably secure password-authenticated protocol for group key establishment in the common reference string (CRS) model is presented. Our construction assumes the participating users to share a common password and combines smooth hashing as introduced by Cramer and Shoup with a construction of Burmester and Desmedt. Our protocol is constant-round. Namely, it is a three-round protocol that can ...
Parties as one of the most important social forces shaped by social Cleavages and seek to manage them. Less society can be found that has not social divide. In Turkey, as a legacy of a plural society, there are several social Cleavage are generally active. Purpose of this research is addressing the AKP experience in managing social Cleavage by examining the historical process is the formation o...
This study examines Positive-self and Negative-other representation expressed in the Syrian president Bashar Al-Assad’s first political speech March 2011. investigates way Al-Assad uses language as a tool to express his ideology attitudes towards protests world’s leading countries, thus win conflicts gain power. Therefore, this scrutinises negative-other of opponents rival parties what ideologi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید