نتایج جستجو برای: security in procedures

تعداد نتایج: 17020606  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

پایان نامه :0 1374

in fact, this study focused on the following questions: 1. is there any difference between the effect of functional/notional approach and the structural approaches to language teaching on the proficiency test of efl learners? 2. can a rather innovative language test referred to as "functional test" ge devised so so to measure the proficiency test of efl learners, and thus be as much reliable an...

Journal: :سیاست 0
احمد ساعی دانشیار گروه روابط بین¬الملل دانشکده حقوق و علوم سیاسی دانشگاه تهران مجید معصومی دانش آموخته دکتری علوم سیاسی از دانشگاه آزاد اسلامی واحد علوم تحقیقات تهران

as, the terrorism, nowadays, is an important and effective matter that affects different problems especially national security, it is tried to study an important aspect of interaction fields between national security and political development in developing countries and iran. an important point in this study is to consider terrorism as an strategic phenomenon that follows the procedures includi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

introruction khawf in(iran)-herat and mazaresharif and shirkhan bandar in (afghanistan)-dushanbe in (tajikistan)_(kirgizstan)-kashghar in(china) project railway network is under construction that it is as a significant corridor for revitalizing silk road corridor in the region .at the present there are three different gauge in the region central asia with 1,520 mm gauge and turkey-islamic repu...

پایان نامه :0 1374

this experimental study has been conducted to test the effect of oral presentation on the development of l2 learners grammar. but this oral presentation is not merely a deductive instruction of grammatical points, in this presentation two hypotheses of krashen (input and low filter hypotheses), stevicks viewpoints on grammar explanation and correction and widdowsons opinion on limited use of l1...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...

2012
Catherine A. Meadows Dusko Pavlovic

Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now increasingly expedited by computers, the problems of physical and social security are becoming t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - پژوهشکده علوم انسانی و اجتماعی 1390

this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract the current study set out to address the issue as to whether the implementation of portfolio assessment would give rise to iranian pre-intermediate efl learner autonomy. participants comprised 60 female in pre-intermediate level within the age range of 16-28.they were selected from among 90 language learners based on their scores on language proficiency test -key english test. then, t...

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید