Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2023
  • Volume: 

    2
  • Issue: 

    3 (پیاپی 5)
  • Pages: 

    51-61
Measures: 
  • Citations: 

    0
  • Views: 

    192
  • Downloads: 

    26
Abstract: 

Purpose: Food Security is a critical global challenge that is influenced by research and innovation in the field. Therefore, the objective of this study is to analyze the scientific output of developing countries in food Security and examine its relationship with patents and Gross Domestic Product (GDP).Methodology: This applied research utilized the Scientometric approach. A total of 8,416 papers published between 1992-2023 in the field of food Security by developing countries were included in the study using citation databases from Clarivate Analytics. Additionally, patent registrations from the WIPO database and GDP data from the World Bank were analyzed. Information was collected through note-taking, and the data was analyzed using Pearson's correlation coefficient.Findings: The findings reveal an upward trend in the publication and citation of scientific outputs related to food Security in developing countries. China has higher numbers of papers, patents, GDP, and food production index compared to Iran, Japan, and South Korea. There is also a positive correlation observed between population and the number of papers, gross production and the number of papers, food production and the number of published papers, as well as the number of patents and papers citing scientific outputs of countries.Conclusion: These results highlight the significant relationship between increasing scientific output, GDP, the number of patents, and food Security. Greater emphasis on food Security contributes to enhanced scientific output, GDP, and innovation. Similarly, increasing scientific output, GDP, and innovation positively impact food Security in countries.Value: This study emphasizes the importance of scientific outputs in driving technological advancements, innovations, and ultimately, ensuring food Security in developing countries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 192

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 26 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2020
  • Volume: 

    10
  • Issue: 

    35
  • Pages: 

    254-275
Measures: 
  • Citations: 

    0
  • Views: 

    578
  • Downloads: 

    0
Abstract: 

Today, with the complexity and chaos in the international system, regions are greatly affected by the logic of complexity. One of the important regions affected by the Security Order complexity is the Middle East. This descriptive-analytical study aims to explain the Middle East Security Order in a complex situation. According to the complexity theory, this study tries to explain the complexity in the regions and then the Middle East is presented as a case. The question is: What are the principles of the Middle East Security Order in a complex situation? Hence, it was assumed that nonlinearity, dynamics, and being in chaos are the main features of the Security Order complexity in the Middle East. The results reported that the Middle East Security Order is nonlinear and based on a novel fuzzy logic.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 578

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    9
  • Issue: 

    35
  • Pages: 

    45-67
Measures: 
  • Citations: 

    0
  • Views: 

    1385
  • Downloads: 

    0
Abstract: 

It is imperative that to be investigated and analyzed components, variables and important elements of Security, including political Islam in the Arab spring. On this basis, the political Islam is affecting discourses and the main challenger's movements in regional developments. Political Islam and Islamic movement’s behavior can be studied in three main categories. First of extremism and violence in the Middle East, with the advent of emerging trends Takfiri like ISIL. Second, inability to maintain power and sovereignty by the genuine political Islam movements like the Muslim Brotherhood. Third, change activism in the resistance movement.The main question is what is the position of political Islam in the development of Security Order in the Middle East? This article attempts to explore by exploring trends, driving forces and scenarios of political Islam and Islamic movements, and their role in shaping the regional Security Order in Middle East.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1385

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

VAFADAR H. | GHASRI M.

Issue Info: 
  • Year: 

    2010
  • Volume: 

    3
  • Issue: 

    3
  • Pages: 

    185-206
Measures: 
  • Citations: 

    0
  • Views: 

    1744
  • Downloads: 

    0
Abstract: 

Describing crisis for determining their size and volume and prediction of its occurrence are some of the important actions in crisis management. The purpose of the present article is to introduce a proper model for describing crisis in the field of Order and Security. The research method is descriptive-analytical and its nature is an applied one. The explorative study of the paper was conducted based on the library research. The statistical sample consisted of 25 experts in the field of police research. The results revealed that four factors of crisis features, crisis risk factors, features of under crisis systems, crisis fighting features are effective factors of crisis volume and 16 crisis levels described based upon their combination. Based on the relationship between crisis volume factors, it can be concluded that the proposed model is not limited to specific temporal and special conditions. Further, easy social phenomenon can be described and interpreted based on this 16 levels model for every crisis.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1744

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 6
Issue Info: 
  • Year: 

    2011
  • Volume: 

    2
  • Issue: 

    3
  • Pages: 

    53-65
Measures: 
  • Citations: 

    0
  • Views: 

    997
  • Downloads: 

    0
Abstract: 

Intelligent agents are considered as significant means towards realizing the semantic web vision. On the Semantic Web, integrating ontologies and rules enables software agents to interoperate between them, however, this leads to a problem, that no studies have focused on effective distributed reasoning for integrating ontologies and rules in multiple knowledge-bases. The methods that have been presented for distributed reasoning not only get a lot of times and memory, but also do not lead to a complete and sound reasoning. In this paper, to solve this problem, we present a distributed reasoning system that deals with the representation of the knowledge-base of Order sorted logic. This logic is able to describe the hierarchy of predicates and inheritance of expressions that there are in our natural language. To have a distributed reasoning, our proposed method uses the expansion of rigid and valid-non-rigid properties between knowledge-bases. Furthermore, with considering time and the situation of properties for reasoning, the non-rigid properties have not been ignored, in fact, in their valid time and situation, they are used. With this method, we achieve a complete reasoning and, moreover, the extracted knowledge is completely considered in the knowledge-bases and we have a distributed reasoning with high efficiency and sound without missing any information.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 997

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Firozi Sayed Mohammad | Yousufi Fawzia | Afzali Nasir Ahmad | Basharat Rahamani Mohammad Bay

Issue Info: 
  • Year: 

    2023
  • Volume: 

    5
  • Issue: 

    1
  • Pages: 

    105-128
Measures: 
  • Citations: 

    0
  • Views: 

    38
  • Downloads: 

    0
Abstract: 

Afghanistan is a multinational and multicultural country that has been plagued by war and inSecurity for over 14 decades. One of the main reasons for the continuation of war and inSecurity is the lack of attention given to the socio-cultural contexts and dimensions of inSecurity. The main goal of this article is to understand the contexts and socio-cultural foundations of Order and Security in Afghanistan. The research method used is qualitative with a grounded theory approach. The statistical population of this research is the social and cultural affairs experts of Afghanistan, and the samples were selected using the purposeful sampling method. Qualitative interviews were conducted with 18 people until theoretical saturation was reached. The data was analyzed using open, axial, and selective coding.The findings of the research have been deduced in the form of six main categories: lack of symbolic understanding and cultural disOrder, weak and tense interactions between ethnic groups, inequalities and discrimination in the distribution of national resources, militant cultural capital, social capital focused on the tribe and tribe, and lack of formation of the public arena. The central phenomenon of this research is the imprinting of Order and Security in the social and cultural contexts of Afghan society. It is concluded that the basic solution to ensure Order and Security in this country is to dismantle the cultural and social foundations of war and inSecurity.Destructive and ruinous wars started with the invasion of Afghanistan by the former Soviet army, and these wars continue under different names and forms. After the withdrawal of the Soviet army from Afghanistan, the government supported by them did not last, and jihadist groups supported by neighboring countries and western countries came to power. These ethnic groups and parties, who did not have the necessary experience, expertise, and governance methods, got involved after about a year. The wars of Jihadi parties and ethnic armed groups also destroyed the city of Kabul and some remaining facilities from the wars of these groups with the Soviet army, and millions of people were forced to migrate (domestic-foreign). This miserable situation led to the emergence of the Taliban group. The Taliban easily removed the Mojahedin groups from power and ruled over 95% of Afghanistan for about five years. Of course, during this period, scattered wars continued in the fronts of Panjshir, Dareh Souf-Samangan, parts of Bamyan, and in Balkhab-Sarpol. With Al-Qaeda's attack on the Twin Towers of New York, the equation was changed, and after obtaining permission from the United Nations Security Council, the United States invaded the Taliban government and overthrew it in about a month. The attack of the United States of America and NATO has been one of the most important military attacks in Afghanistan. The fall of the Taliban opened a new window to war and inSecurity, and the face of war changed. After 20 years, the Taliban returned to power, and this time, ISIS, the National Resistance Front, the United National Council Front, and several other fronts have promised to challenge the Taliban's rule. However, the ongoing wars and violence in this country have cultural, social, economic, and structural foundations that have been neglected in most analyses and discourses of war and inSecurity. If in the past, a plan and a decision were made to end the war, it was only looked at as a problem, and the dimensions and hidden layers and flames under the ashes of the war were ignored. Therefore, it is essential to investigate the software dimensions of war, that is the cultural and social dimensions of continuous wars in Afghanistan, as this issue has not received enough attention. The main goal of this research is to analyze the software aspects of war and inSecurity in Afghanistan.The main research question is: What are the social and cultural foundations of Order and Security in Afghanistan? The sub-questions of this research are: What are the cultural roots of inSecurity in Afghanistan? Why is the cultural and social capital of the Afghan people strengthened by disOrder and inSecurity? What direction do competitions and interactions of ethnic groups put the Security of Afghanistan in? How do social inequalities and discrimination threaten the Security of this country? 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 38

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2022
  • Volume: 

    14
  • Issue: 

    4
  • Pages: 

    143-170
Measures: 
  • Citations: 

    0
  • Views: 

    54
  • Downloads: 

    0
Abstract: 

Background and purpose: One of the important applications of flying equipment, as a smart tool, is to create Order and public Security. The current research was done with the aim of providing an Approach to using flying equipment in creating public Order and Security.Method: This study was compiled in terms of practical purpose, in terms of a mixed method, and in terms of collecting statistics and information in the field and through interviews in the qualitative part and distribution of valid and reliable questionnaires in the quantitative part. The participants of the qualitative part of the research, who were selected using the purposeful sampling method, included 18 experts until the theoretical saturation was reached, and the statistical population of the quantitative part was also all the experts and specialists who are proficient in the flight sciences and there were 44 people who Using full-count sampling method, they were selected. In this research, the thematic analysis method was used in the MAXQDA software platform to analyze the qualitative data, and the descriptive and inferential statistics method was used in the SPSS software platform to analyze the data obtained from the researcher-made questionnaire.Findings: The results of interviews with experts led to the identification of 70 basic themes, 10 organizing themes, and 2 overarching themes in Order to present an Approach to using flying equipment in creating public Order and Security. The validation of the findings of the qualitative section also showed that all the identified components with an error probability level of less than one percent are suitable predictors for the use of flying equipment in creating public Order and Security.Results: The findings showed that aircraft can provide Order and improve public Security in missions related to bOrder Security management, traffic management, riot control, drug fighting, and public assistance.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 54

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2009
  • Volume: 

    1
  • Issue: 

    3
  • Pages: 

    127-140
Measures: 
  • Citations: 

    1
  • Views: 

    3425
  • Downloads: 

    0
Abstract: 

A number of factors are involved in establishing Order and societal Security. One of these is the location or geographical factor.Unfortunately it was neglected in analyzing crimes and inSecurity. If we accept that all crimes and insecurities are happened in some location, the importance of these factors will be understood. The current research has done in Order to analyze the relationship of geographical, Order and societal Security factors. The method of research is survey model and with researcher made- questionnaire. Measurements of varies were done in tow dimension (human geographical factor and natural geographical factor. The statistical were the faculty members and lecturers of disciplinary, social science and geography education departments. The findings of research show: 1- there is meaningful relation between geographical and Order or Security factors.2-among geographical factors, the human geographical factors were more important.3- Human geographical factors have more relations with Order and Security which shows the relation of population density and crime. Among natural geographical factors, the locations of police sites were more important. First hypothesis which was the relation between human geographical and Order and Security factors. So H1 hypothesis (T tests value=7/3) with 99% were submitted. But the second hypothesis with T tests value=0/036 and meaningfulness value=0/971, so the H1 hypothesis were rebutted.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 3425

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 5
Issue Info: 
  • Year: 

    2024
  • Volume: 

    17
  • Issue: 

    1
  • Pages: 

    177-201
Measures: 
  • Citations: 

    0
  • Views: 

    10
  • Downloads: 

    0
Abstract: 

Introduction: The revolutionary uprisings that have occurred in many geopolitical territories of the Middle East and North Africa since December 2010 have highlighted signs of change in the Middle East Security system. The continued presence and influence of the United States in the Middle East and the follow-up of the European Union from American policies, the increase in the role of other trans-regional actors, especially rebuilding the role of Russia and strengthening China's soft balance, the escalation of geopolitical competition between Iran and Saudi Arabia and the increase in power and influence of non-state actors have played a central role in changing the balance of regional powers and the emergence of a new regional Order. In the meantime, the intensification of manipulation by the United States and the west in the process of Arab Spring developments, along with the appearance of the failure of Moscow’s follow-up policy in the crises of Tunisia, Egypt and Libya, convinced the Kremlin officials to adopt a relatively independent and proactive approach to the Security Order of the Middle East by entering the regional crisis management process.Research question: What are the characteristics of Russia's Middle East policy in the period after the Arab Spring and what consequences does such an approach have for the Security Order of the region?Research hypothesis: The hypothesis of the above-mentioned question is that Russia's approach to the Security system of the Middle East after the Arab Spring is based on signs of the simultaneous influence of two Security and economic factions that are organized together, the balance of power factor along with the economic interests constitute the motivations for the development of Russia's relations with the Middle East.Methodology and theoretical framework: The method used in this research is the method of Trend analysis and the type of the research is basic. The nature of this paper is also qualitative. The data collection has been library method, using internet resources, articles and documents. Since the Security Order of the Middle East has always been influenced by the arrangement, competitions and interactions of regional actors and the interventions of extra-regional powers, in this article, an attempt will be made to use the theoretical assumptions of Neo-realism to explain Russia's Middle East policy and its effects on the regional system. The Neo-realism model provides the possibility of examining the components of the country's external environment with more emphasis to explain Russia's Security strategy.Results and discussion: The abilities and capabilities of the country's leaders to play a role in a region and the possibility of accepting valid commitments are important determining factors for countries' strategies in regional systems, which in turn affect the type of regional system. The developments and the involvement of a wide range of regional and international actors in the Syrian crisis have convinced the Kremlin officials to use the direct balancing model with the United States. Based on this, Moscow was able to significantly improve its field of activity by using two strategies of soft balancing and direct balancing, while recovering its structural strength in the Middle East Order. By strengthening its relations with Iran, Syria, and even Hamas, and being close to the traditional allies of the United States in the Middle East, including Saudi Arabia, Qatar, the United Arab Emirates, Jordan, and Egypt, Russia is trying to balance regional powers with the United States in the Middle East. Overall, Russia’s reemergence has transformed the Middle East Security system in terms of structure, norms, agency, and patterns of interaction. Moscow intends to propose a new approach to the United States unilateral approach to the Middle East regional Order, in which a diverse range of actors and agendas can be proposed. Adopting a middle position on regional issues and programs and avoiding a holistic approach to Middle East actors is organized and implemented with this central goal in Moscow's strategic doctrine.Conclusion: The economic factor along with the balance of power is one of the main motivations for the development of Russia's relations with the Middle East. The economic variables influencing Moscow's intervention in the Syrian crisis in the aftermath of the crisis and instability and the transformation of political and military achievements into economic achievements have also been particularly prominent. Russian companies have won many concessions in the field of Syrian oil, gas, electricity and mining infrastructure. Russia's arms trade is also organized through arms deals with Egypt, Saudi Arabia, the United Arab Emirates, Libya and Syria. The scope of Russia's activity and role in the new regional Order of the Middle East includes a wide range of governments and regional actors.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 10

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

PRIVATE LAW STUDIES

Issue Info: 
  • Year: 

    2019
  • Volume: 

    49
  • Issue: 

    2
  • Pages: 

    177-195
Measures: 
  • Citations: 

    0
  • Views: 

    432
  • Downloads: 

    0
Abstract: 

Nowadays, Security for costs Order to prevent frivolous claims has been recognized in most national and arbitral institutions laws. Nevertheless, Iran’ s International Commercial Arbitration Act like Uncitral Model Law, 1985, has not mentioned it and so it has resulted in some questions in possibility and conditions to Order it in arbitrations covered this law. This study through a descriptive analytical and also comparative method provides clear meaning for Security for costs Order and address its possibility and conditions to Order it under Iran Law. The essay shows that although it is possible to Order this provisional measure, the conditions for awarding it should access with regard to lex mercatoria. Other procedural ambiguities are resolved referring to applicable rules on measure interims.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 432

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button