نتایج جستجو برای: time and the territorial limits of this policy

تعداد نتایج: 25099816  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام صادق علیه السلام - دانشکده الهیات و معارف اسلامی 1391

muhammad ibn muhammad ibn numan, known as "shaykh mufid," one of the great imamiye theologians and jurists in the fourth and early fifth century , had comprehensive mastery of both rational and traditional topics and exerted his influence upon both his contemporary and future scholors. he is considered to be one of the top imamiye scholars who spent his lifetime teaching, learning and authorin...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

abstract tasks nowadays are at the center of attention in sla research. task types is one of the critical issues in this regard, their effectiveness and suitability to any particular context, their characteristics and the result they yield are among some of these issues. on the other hand, discourse markers (dms) have been very much investigated and their effectiveness in conveying the meaning...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

peace and national security protection and ironic solving of international conflicts become the preliminary foundation of the united nations charter and had been considered as the main responsibilities of the security council, after world war ii and the establishment of united nations organization. therefore, the security council enables to analyze every kind of conflicts and challenges which ...

پایان نامه :0 1374

this thesis is going to delineate the concept of the reader as implied in 18th century literary theory; based on the study of the major reader oriented elements of criticism of the age-taste, the sublime, and aesthetic pleasure-its aim is to explain what sott of reader is implied and what kind of response on the part of the reader is proposed in 18th century english literary theory and aestheti...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1390

this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده زبانهای خارجی 1393

writing an academic article requires the researchers to provide support for their works by learning how to cite the works of others. various studies regarding the analysis of citation in m.a theses have been done, while little work has been done on comparison of citations among elt scopus journal articles, and so the dearth of research in this area demands for further investigation into citatio...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید