نتایج جستجو برای: the term of service or using time zemestan

تعداد نتایج: 23217593  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

this thesis deals essentially (but not from all aspects) with the extension of the notion of semigroup compactification and the construction of a general theory of semitopological nonaffine (affine) transformation semigroup compactifications. it determines those compactification which are universal with respect to some algebric or topological properties. as an application of the theory, it is i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1376

in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

toury (1978:200) believes that translation is a kind of activity which inevitably involves at least two languages and two cultural traditions. being polite while asking for something takes place differently in different cultures and languages, therefore various strategies may be applied for making requests and also translation of them in order not to disturb or threaten the face or better to sa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران 1381

‏‎the purpose of the present study was to investigate the latent pattern underlying reading ability . some 272 male and female participants. english majors at the ba level , participated in the study. two valid tests were used in this study, the reading test developed exclusively for the purpose of this project and academic reading section of ielts. to investigate the possible latent underlying...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم انسانی 1389

abstract this study evaluated and compared medical terminology and english for the students of medicine (ii) as two representatives of the textbooks available on the iranian market for teaching english to the students of medicine. this research was performed on the basis of a teacher’s and a number of students’ attitudes and the students’ needs analysis for two reasons: first, to investigate...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

a novel silver (ag) nanocomposite electrode was proposed that fabricated from metal nanostructures and ionic liquids. the combined application of unique properties of nanomaterials and ionic liquids in the design of this ag nanocomposite results in electrodes with interesting advantages compared to the conventional metal disk electrode. in the first part of this thesis, the elecrocatalytic eff...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :0 1374

the present study investigated the effect of the two vocabulary teaching techniques in est, namely the use of translation and the use of visual aids as two separate vocabulary teaching techniques. to answer the question of the study, a pretest (michigan test) was administered to the 58 randomly selected est students at khajeh nasiredin tusi university, faculty of mechanics. after the homogeneit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید