Telegram Group & Telegram Channel
منابع داستان نویسی.pdf
1.5 MB
📚منابع مورد استفاده برای داستان نویسی

•درهم تنیدگی کوانتومی
°اصل عدم قطعیت هایزنبرگ
•تداخل
°تله پورتیشن کوانتومی
•انجماد کوانتومی
°پدیده دوگانگی موج و ذره
•اثر کوانتومی زنو
°اثر هونگ-او-مندل


@astronomy_ikiu



group-telegram.com/physicsconvocation/551
Create:
Last Update:

📚منابع مورد استفاده برای داستان نویسی

•درهم تنیدگی کوانتومی
°اصل عدم قطعیت هایزنبرگ
•تداخل
°تله پورتیشن کوانتومی
•انجماد کوانتومی
°پدیده دوگانگی موج و ذره
•اثر کوانتومی زنو
°اثر هونگ-او-مندل


@astronomy_ikiu

BY انجمن علمی فیزیک


Warning: Undefined variable $i in /var/www/group-telegram/post.php on line 260

Share with your friend now:
group-telegram.com/physicsconvocation/551

View MORE
Open in Telegram


Telegram | DID YOU KNOW?

Date: |

Ukrainian forces successfully attacked Russian vehicles in the capital city of Kyiv thanks to a public tip made through the encrypted messaging app Telegram, Ukraine's top law-enforcement agency said on Tuesday. "Someone posing as a Ukrainian citizen just joins the chat and starts spreading misinformation, or gathers data, like the location of shelters," Tsekhanovska said, noting how false messages have urged Ukrainians to turn off their phones at a specific time of night, citing cybersafety. In 2014, Pavel Durov fled the country after allies of the Kremlin took control of the social networking site most know just as VK. Russia's intelligence agency had asked Durov to turn over the data of anti-Kremlin protesters. Durov refused to do so. Given the pro-privacy stance of the platform, it’s taken as a given that it’ll be used for a number of reasons, not all of them good. And Telegram has been attached to a fair few scandals related to terrorism, sexual exploitation and crime. Back in 2015, Vox described Telegram as “ISIS’ app of choice,” saying that the platform’s real use is the ability to use channels to distribute material to large groups at once. Telegram has acted to remove public channels affiliated with terrorism, but Pavel Durov reiterated that he had no business snooping on private conversations. The perpetrators use various names to carry out the investment scams. They may also impersonate or clone licensed capital market intermediaries by using the names, logos, credentials, websites and other details of the legitimate entities to promote the illegal schemes.
from br


Telegram انجمن علمی فیزیک
FROM American