نتایج جستجو برای: we will try to indicate that the gushe

تعداد نتایج: 17464178  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract because of the many geopolitical, geo economical and geo strategically potentials and communicational capabilities of eco region, members can expand the convergence and the integration in base of this organization that have important impact on members development and expanding peace in international and regional level. based on quality analyzing of library findings and experts interv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم اجتماعی و اقتصادی 1389

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم و معارف قرآن کریم - دانشکده علوم قرآنی قم 1389

worship is submission and humitility with believe to divinity in fornt of god. in jewish religion ,worship is submission of the god inall the ordes and devosion tohim .worshio is not only so widely in islam and jew and does not include pray and fast and etc but also is every action that human does with divine intention and to content him. worship has huge and excellent rank in qoran and old te...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1389

methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1389

one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده علوم ریاضی 1387

فرض کنید g یک گروه متناهی باشد به طوری که مربع هر درجه کاراکتر تحویل ناپذیر آن اندیس مرکز گروه را عاد می کند. آیا می توان نتیجه گرفت که گروه پوچتوان یا حتی حلپذیر است؟ همچنین در مورد بعضی از تعمیمهای فوقالذکر بحث خواهیم کرد. همچنین، تا چه اندازه ساختار یک گروه حلپذیر توسط بزرگترین درجه کاراکتر تحویل ناپذیر گروه تحت تاثیر قرار میگیرد مورد بحث قرار خواهد گرفت. let g be a finite group such tha...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات و علوم انسانی 1387

abstract the present study is concerned with the syntactic deviation in hafezs poetry. poems are known to be accompanied with various linguistic deviations. these deviations may be phonological, morphological and/or syntactic. the relatively high frequency of the cases of the syntactic deviation in hafezs poems makes this rhetorical feature as a main characteristic of his poetry. this thesis, ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

target tracking is the tracking of an object in an image sequence. target tracking in image sequence consists of two different parts: 1- moving target detection 2- tracking of moving target. in some of the tracking algorithms these two parts are combined as a single algorithm. the main goal in this thesis is to provide a new framework for effective tracking of different kinds of moving target...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید