نتایج جستجو برای: that the theoretical framework of this article has been based upon them

تعداد نتایج: 23155492  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1389

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ادبیات و علوم انسانی 1389

abstract this research has been carried out with the purpose of investigating the conditions and related elements of the employment of the educational sciences graduates of hamedan province universities in 1382-1387 academic years. it has been a descriptive research of a correlation kind, and the population number has been 1180 grduates of payam- e noor universites in asad – abaad, kaboudaraha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

today, scouring is one of the important topics in the river and coastal engineering so that the most destruction in the bridges is occurred due to this phenomenon. whereas the bridges are assumed as the most important connecting structures in the communications roads in the country and their importance is doubled while floodwater, thus exact design and maintenance thereof is very crucial. f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...

پایان نامه :دانشگاه بین المللی امام خمینی (ره) - قزوین - دانشکده علوم پایه 1390

abstract: the present study is about prophet ishmael, some parts of his life; his personality in the quran and the bible; and the comparison of the content of these two religious books. compilation of the study has been done with a new perspective and new presentation approach. since prophets have been human beings’ role model and their life has been a perfect example for humanity in all ages,...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده برق و کامپیوتر 1392

abstract nowadaysphotovoltaic solar cells (pvs) areacknowledged the fastest growing energy technology in the word, however, they only account for only fraction of current global renewable energy capacity. it isrecognized that this incomplete market penetration has been largely a result of the technology’sexcessive cost. so researchers are trying to find innovative, economic way with theaim of ...

پایان نامه :0 1374

chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...

پایان نامه :0 1375

investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید