نتایج جستجو برای: regional security
تعداد نتایج: 379811 فیلتر نتایج به سال:
The Gulf War of 1989-1990 unleashed a regional dialogue concerning what security arrangements hould be established to discourage a repetition of this bloody encounter and to foster regional security. Predictably, many of the most affected states scurried in various and sometimes opposite directions in the hurried search for security. Numerous happenings reveal a region engaged in an intense deb...
As the land ecosystem provides the necessary basic material resources for human development, land ecological security (LES) plays an increasingly important role in sustainable development. Given the degradation of land ecological security under rapid urbanization and the urgent LES requirements of urban populations, a comprehensive evaluation method, named Double Land Ecological Security (DLES)...
Electronic communication of healthcare related information (in the framework of Regional Healthcare Information Networks), introduces a number of security risks with regard to confidentiality, integrity and availability, which can become quite crucial taking into account its sensitive nature. Public Key Infrastructure (PKI) is acknowledged as an appropriate means for dealing with such risks, as...
Almost two decades since conflict broke out between Republic of Azerbaijan and Armenia, two northern neighbors of Iran, in Nagorno – Karabakh region. Although military conflict in this region has minimized with the existing ceasefire, and reaching a sustainable agreement is likely to be happened by the two parties. Close regional and international cooperation seems necessary more than ever in o...
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...
This study aims at analyzing the characteristics of the food need in the area of Jombang and Probolinggo regencies as well as developing a model of local superiority-based policy to achieve the food security. This study employs descriptive qualitative approach. This study is carried out in eight months in March to October 2015. The respondent of the study is the governmental staff of Jombang an...
The purpose of this paper is to examine the Persian Gulf system of cybernetics and the possibility of Iran's role and influence on the future of security arrangements in the Persian Gulf region. In this regard, the author describes the cybernetic theory in regional studies as a conceptual framework of the research to implement the hegemonic security system of the Persian Gulf. Then, by showing ...
The precarious nature of the evolving global security order and emergence associated new buzzwords both in academia policy circles clearly suggest that international environment has changed substantially. Regional hazards have further diluted situation around world. States taken a number measures to cope with challenges strategic uncertainties, largely unsatisfactory outcomes. In our view, bett...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید