نتایج جستجو برای: new governance in Middle East2
تعداد نتایج: 17361149 فیلتر نتایج به سال:
Changes in the international system, along with crises in the Middle East and the emergence of inefficient states coexisting with religious and racial groups in the region, make one wonder about the nature of the state in today’s systematic world, in general, and the nature of the state in the Middle East, in particular. The present study provides a theoretical framework based on quantum mechan...
the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
abstract governing was disorganized for years, when mongols attached to iran and it caused to clearing way for interference of mongols princes. dispatching of holaku to the west culminated in establishing iilkhanan government. holakus activities in destruction of abbaasis government and activities which shows his staying in iran, made force oulus juji to comparison against iilkhanis gover...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
the outcome of this research is a practical framework for “idea generation phase of new product development process based on customer knowledge”. in continue, the mentioned framework implemented in a part of iran n.a.b market and result in segmenting and profiling this market. also, the critical new product attributes and bases of communication message and promotion campaigns extracted. we have...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
abstract in first part of this project, the use of a new and biguanid-like catalyst supported on silica as a recyclable catalyst provides a new route for the synthesis of a variety of arylalkylidene rhodanine derivatives through knoevenagle reaction in at present of solvent at room temperature. rhodanine derivatives and especially arylalkylidene rhodanines have proven to be attractive compound...
ii abstract the legend of human being’s refulgence was distorted completely in the age of modernity. this new age, had some drastic negative effects, besides its positive qualities. one significant negative effect of it was the emergence of neurosis in human beings. aldous huxley’s brave new world was one of the novels of the 02 th century that contained the prophecy of criticizing ...
the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید