tekyeh dowlt and it’s religious ceremonies

نویسندگان

مهدی گلجان

استادیار گروه تاریخ، دانشگاه تربیت مدرس سپیده افشاررضائی

دانشجوی دکتری تاریخ، دانشگاه پیام نور تهران

چکیده

the safavid dynasty's government, formally of shi'ism in iran, a new style called rozeh-khaany of mourning and religious representation with poems and texts related to an event of karbala to create tekyeh, there was a mosque and endowments. these rituals to gain legitimacy in the qajar period, was followed by severe and more widespread, in this time of mourning for the social class and guild tried to build support and dedication of the earthly and heavenly reward earn a name its good to leave. shah said that has ordered the construction tekyeh dowlt. after his death, his heirs because of the constitutional actions, the influence of the european theater and opposition to some scholars, not quite as good as the shah's government tekyeh erecting and waned quite a time, until the command its destruction in 1325 ad, in order to build a branch of the national bank of the market, was issued. in this paper, we attempt to build motivation, architecture, and state the reasons for the decline of the ceremonies tekyeh dowlt a deal.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Layered Analysis of Security Ceremonies

A security ceremony expands a security protocol with everything that is considered out of band for it. Notably, it incorporates the user, who, according to their belief systems and cultural values, may be variously targeted by social engineering attacks. This makes ceremonies complex and varied, hence the need for their formal analysis aimed at their rigorous understanding. Formal analysis in t...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

Ceremonies for End-to-End Verifiable Elections

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

متن کامل

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023