نتایج جستجو برای: different defensive mechanisms such as back time
تعداد نتایج: 7653940 فیلتر نتایج به سال:
Nowadays, given different definitions and conceptions on development, territorial planning lends to for various economic, social and geographical aspects, however its defensive and security perspectives have been taken into account to less extent. The present research is aimed to specify passive defense legal requirements in Territorial planning through outlining the most important rules on pas...
Background & Aim: Ginger is common named Zingber officinale Roscoe. belongs to Zingiberaceae family which extensively used to pharmaceutic industries in addition to food industries uses. Dut to Iran is located at world saline lands, salinity is a main problem to native and nonnative plant species cultivation such as ginger and because in plants salinity induces antioxidative a...
Background & Aim: Ginger is common named Zingber officinale Roscoe. belongs to Zingiberaceae family which extensively used to pharmaceutic industries in addition to food industries uses. Dut to Iran is located at world saline lands, salinity is a main problem to native and nonnative plant species cultivation such as ginger and because in plants salinity induces antioxidative a...
The Iranian textures in the Safavid era are associated with some phenomena such as symbolism and myth. These textures contain some motifs that indicate the beliefs and ideas of the Iranian people, and these motifs have preserved the concepts over time. The dragon is one of these symbolic motifs whose presence can be traced back to the oldest literary sources in Iran's history. Dragon is referre...
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
We present new attacks and robust countermeasures for security-sensitive components, such as single sign-on APIs and client-side cryptographic libraries, that need to be safely deployed on untrusted web pages. We show how failing to isolate such components leaves them vulnerable to attacks both from the hosting website and other components running on the same page. These attacks are not prevent...
reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...
Objective: The purpose of the present study was to investigate the diagnostic role of object relations and defense mechanisms in individuals with opioid abuse, stimulants users, and normal individuals. Method: The research design was correlational. The study population consisted of all clients using stimulants, opiates and normal people who referred to Shiraz and Tehran addiction treatment clin...
How humans react to threats is a topic of broad theoretical importance, and also relevant for understanding anxiety disorders. Many animal threat reactions exhibit a common structure, a finding supported by human evaluations of written threat scenarios that parallel patterns of rodent defensive behavior to actual threats. Yet the factors that underlie these shared behavioral patterns remain unc...
feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید