نتایج جستجو برای: system of the present international system from its beginning as gatt in 1947
تعداد نتایج: 25819530 فیلتر نتایج به سال:
feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...
purpose a metabolic abnormality such as obesity is a major obstacle in the maintenance of the human health system and causes various chronic diseases including type 2 diabetes, hypertension, cardiovascular diseases, as well as various cancers. this study was designed to summarize the recent scientific knowledge regarding the anti-obesity role of curcumin (diferuloylmethane), which is isolated f...
among the low–dimensional allotropes of carbon, nanotubes and graphene have attracted very much attention from nano–science and nanotechnology specialists. they have been proposed as building blocks in nanometer device engineering. however, these structures are not defect–free. in this thesis, we focused on defective carbon nanotubes and graphene, and studied the effect of couple of very common...
abstract: proverbs are of the language materials which of the food of any language depends on the quality and quantity of these same materials. in the present research, the researcher tried to present the ramsarian proverbs according to four variables of color, fruit, plantsand animals that selected from the book of the members of each of these four variables, put them into the spss system fo...
peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...
the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
from historical facts to geo-political realities: relation between turkey and armenia ( 1915 – 2010)
armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...
abstract abstract of thesis (includes summary, goals, execution methods, and results) story “al-obnosat al-bayza” is one of the short stories from “hanna mineh” collection. this story is a selection of lives of some humans during a voyage together, each of them is a symbol of human nature (love, mind, kindness) and examine social, cultural, and political aspects of governing system, and it...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید