نتایج جستجو برای: is the lack of liquidity to solve this problem

تعداد نتایج: 23671542  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1390

in this thesis, a better reaction conditions for the synthesis of spirobarbiturates catalyzed by task-specific ionic liquid (2-hydroxy-n-(2-hydroxyethyl)-n,n-dimethylethanaminium formate), calcium hypochlorite ca(ocl)2 or n-bromosuccinimide (nbs) in the presence of water at room temperature by ultrasonic technique is provided. the design and synthesis of spirocycles is a challenging task becaus...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1390

the debate whether esp teachers need to have knowledge of the specialized field they are teaching has been an issue in the literature over the last two decades. the aim of conducting this study was to explore iranian learners’ and instructors’ beliefs and attitudes concerning the role of specialized knowledge in teaching esp classes. a seventeen item questionnaire was administered to 400 esp le...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده حقوق و علوم سیاسی 1390

the author intend to by studying the historical causes of the appearance of the novation in the west and explanation of its legal nature from past to present of french law, proves on the one hand that the novation does not extracted from the french civil code and in the shiite jurisprudence with quite similar terms even before the enactment of iranian civil code, was considered by the shiite su...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده الهیات و معارف اسلامی شهید مطهری 1393

murder of wife during adultery: if a man sees his wifes adultery with another man, he can kill both of them. and he is not guilty in this murder. this sentence is the opinion of imami jurists and numerous comments on this issue are the main reasons for the sentence. that is the opinion of the sunni jurists too. murder of wife and the stranger man are permitted. but in contrast to these views, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

the thesis has been arranged into five chapters and mainly concerned with the baer-invariant of groups which is the generalization of the schur-multiplier with respect to the variety of groups. chapter one is devoted to collect some notation and background information which are needed in the next chapters. its also contains some important statements which will be generalized in this thesis. cha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده زبانهای خارجی 1392

abstract since heubners (1985) pioneering study, there have been many studies on (mis) use/ non-use of articles by l2 learners from article-less and article languages. the present study investigated how persian l2 learners of english produce and interpret english definite descriptions and demonstrative descriptions. it was assumed that definite and demonstrative descriptions share the same cen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

insurers have in the past few decades faced longevity risks - the risk that annuitants survive more than expected - and therefore need a new approach to manage this new risk. in this dissertation we survey methods that hedge longevity risks. these methods use securitization to manage risk, so using modern financial and insurance pricing models, especially wang transform and actuarial concepts, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید