نتایج جستجو برای: due to the greater vulnerability

تعداد نتایج: 17384128  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

as the canon is shaped by white male standards rewriting the canonical works of literature is one of the ways through which postcolonial writers subvert the authority of the masters. writing in the language of the masters the colonized writers use the very suppressive tool in the hands of the masters i.e. their language to question the validity of their norms. regarded by most critics to be the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1393

abstract foreign and iranian cultures are far distinct in the constraints imposed on writing and translating for children, since the iranian literary system is mainly concerned with cultural and religious instructions which lead to manipulation of translated texts. this study sought to identify the cultural and social constraints and norms which determined the strategies applied in the transl...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1370

the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1393

abstract target-oriented approaches to translation studies are regarded as recent theories of translation. one of the most famous theories among these approaches is descriptive translation studies presented by toury (1995). this theory gives a new dimension to translation studies and gives importance to the descriptive rather than prescriptive studies. it also identifies three sets of transla...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

this thesis examines the significances and implications of inflicted physical pain in waiting for the barbarians (1980) by john maxwell coetzee (1940 - ). the researcher tries to show how body becomes a site for exercising violence. in this way, the government’s representatives turn bodies of the barbarians into blank pages through torturing in order to create the truth of the empire. in this p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1393

this study aimed at examining the effects of iranian efl learners’ anxiety, ambiguity tolerance, and gender on their preferences for corrective feedback (cf, henceforth). the effects were sought with regard to the necessity, frequency, and timing of cf, types of errors that need to be treated, types of cf, and choice of correctors. seventy-five iranian efl students, twenty-eight males and forty...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده جغرافیا 1392

adolescents and young adults and their problems is an issue whose importance is obvious to anyone because youth are the founders of our countrys future and requires proper planning to be on leisure. given the importance of leisure,this study to investigate needs assessment and planning how adolescents and young adults spend their leisure time in urban of case study of high school girls and boys...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید