نتایج جستجو برای: tacitly support those actions that are called theft however

تعداد نتایج: 8280640  

Journal: :Energies 2023

Theft of electricity poses a significant risk to the public and is most costly non-technical loss for an electrical supplier. In addition affecting quality energy supply strain on power grid, fraudulent use drives up prices honest customers creates ripple effect economy. Using data-analysis tools, smart grids may drastically reduce this waste. Smart-grid technology produces much information, in...

Journal: :Education Review 2020

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز 1379

‏‎for the first time nakayama introduced qf-ring. in 1967 carl. faith and elbert a. walker showed that r is qf-ring if and only if each injective right r-module is projective if and only if each injective left r-modules is projective. in 1987 s.k.jain and s.r.lopez-permouth proved that every ring homomorphic images of r has the property that each cyclic s-module is essentialy embeddable in dire...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...

2007
Ronald Leenes

Identity theft is often perceived as one of the major upcoming threats in crime. However, there is no commonly accepted definition of ‘identity theft’ or ‘identity fraud’, and it is impossible to study the real threat of this phenomenon without conceptual clarity. In this article, we attempt to provide a starting point for policy and research by proposing some definitions. We indicate that what...

Journal: :J. Economic Theory 2010
Daniel Sanches Stephen D. Williamson

We study the interplay among imperfect memory, limited commitment, and theft, in an environment that can support monetary exchange and credit. Imperfect memory makes money useful, but it also permits theft to go undetected, and therefore provides lucrative opportunities for thieves. Limited commitment constrains credit arrangements, and the constraints tend to tighten with imperfect memory, as ...

2018
Alan A. Myers Jim K. Lowry

A response is given to criticisms in a recent paper of the validity of the amphipod suborder Senticaudata. The tacitly assumed status of truth implied in some molecular higher phylogenies is called in to question.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

a major concern in the last few years has been the fact that the cultural centers are keeping distance with what they have been established for and instead of reproducing the hegemony, they have turned into a place for resistance and reproduction of resistance against hegemony. because the cultural centers, as urban public spaces in the last two decades, have been the subject of ideological dis...

Journal: :Ankara Barosu Dergisi 2022

The responsibility of the vehicle operators stolen or usurped motor vehicles and way to eliminate this are shown in first paragraph article 107 Highway Traffic Law No: 2918. According aforementioned paragraph, can escape liability pay compensation by proving that they persons for whose actions responsible have no misbehaviors related theft usurpation vehicles. In study, correlation between exam...

Journal: :Brain and language 2010
David Kemmerer Javier Gonzalez-Castillo

Verbs have two separate levels of meaning. One level reflects the uniqueness of every verb and is called the "root". The other level consists of a more austere representation that is shared by all the verbs in a given class and is called the "event structure template". We explore the following hypotheses about how, with specific reference to the motor features of action verbs, these two distinc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید