نتایج جستجو برای: or follows a special pattern beyond the conventional trends the article adopts the regional security complexes theory as its analytical basis
تعداد نتایج: 20287981 فیلتر نتایج به سال:
termination of the cold war was followed by considerable developments in international relations, including the emergence and gradual empowerment of new political actors. china was one of these actors whose process of empowerment, which actually started many years before the end of the cold war, has drawn attention from many analysts. central asia is one of the regions with which china has had ...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
the present study reports an analysis of response articles in four different disciplines in the social sciences, i.e., linguistics, english for specific purposes (esp), accounting, and psychology. the study has three phases: micro analysis, macro analysis, and e-mail interview. the results of the micro analysis indicate that a three-level linguistic pattern is used by the writers in order to cr...
a frame semantic approach to the study of translating cultural scripts in salingers franny and zooey
the frame semantic theory is a nascent approach in the area of translation studies which goes beyond the linguistic barriers and helps us to incorporate cognitive and cultural factors to the study of translation. based on rojos analytical model (2002b), which centered in the frames or knowledge structures activated in the text, the present research explores the various translation problems that...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...
abstract because of the many geopolitical, geo economical and geo strategically potentials and communicational capabilities of eco region, members can expand the convergence and the integration in base of this organization that have important impact on members development and expanding peace in international and regional level. based on quality analyzing of library findings and experts interv...
cultural iran is a scope that is more extended than the political territories of iran as a political unit. this concept means that cultural geography(mehdi moghanlo-1383-1) of iran is greater than its political geography which, according to history, has a long history extending west-east from kandahar to the euphrates and north-south from the persian gulf to the caucasus including transoxiana a...
the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید