نتایج جستجو برای: many of failures depend on implementation contractor

تعداد نتایج: 21940355  

پایان نامه :0 1375

the significance of the study of deixis was then mentioned. the purpose of the present study from the outset was to provide a comprehensive overview of all kinds of deixis in persian, describing and defining each in true while considering them structurally and semantically. chapter two consisted of two main parts. a review of the english studies in this respect, besides presenting persian liter...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...

Journal: :مدیریت فناوری اطلاعات 0
امیرهوشنگ تاج فر استادیار مدیریت فناوری اطلاعات، دانشگاه پیام نور، تهران، ایران محمد محمودی میمند دانشیار مدیریت اجرایی و mba، دانشگاه پیام نور، تهران، ایران فاطمه رضاسلطانی کارشناس‎ارشد مدیریت فناوری اطلاعات، دانشگاه پیام نور تهران غرب، ایران پوریا رضاسلطانی دانشجوی دکتری سنجش و اندازه گیری، دانشگاه تهران، ایران

as information has the role of organization asset, its protection is the key to the survival of any organization. information security management system (isms) defines protection of information in three specific concepts: information confidentiality, accuracy, and availability. many failures in implementing isms rooted in organizational problems and lack of attention to the state of readiness o...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده ادبیات و علوم انسانی 1390

abstract the present study tried to investigate the effect of visual aids (films) on the development of the speech act of disagreement among iranian efl intermediate learners. to this end, the researcher selected 40 homogeneous intermediate learners based on their scores on oxford placement test. .the subjects then divided into control group and experimental group. both classes were tested by ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده زبانهای خارجی 1392

abstract since heubners (1985) pioneering study, there have been many studies on (mis) use/ non-use of articles by l2 learners from article-less and article languages. the present study investigated how persian l2 learners of english produce and interpret english definite descriptions and demonstrative descriptions. it was assumed that definite and demonstrative descriptions share the same cen...

Journal: :پژوهش های فقهی 0
سید یوسف علوی وثوقی استادیار گروه فقه و مبانی حقوق اسلامی دانشکده الهیات دانشگاه قم

dispute between contractor and broker over “the type and attribute of the wage” in contract leads to a controversy which many imamiehreligious experts believe that has no result but “bilateral oath-taking”. most important criteria of selecting bilateral oath-taking are: simultaneous positioning of contractor and broker in accuser and denier position, lack of common ground between the two sides ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :مدیریت فناوری اطلاعات 0
رضا سرخوش کارشناس‎ارشد مدیریت فناوری اطلاعات، دانشکدۀ مدیریت، دانشگاه تهران، تهران، ایران

the benefits of enterprise systems (es) are very varied and have been studied by scientists in this field over the years. but one aspect that is less noticed is the benefit result of the es implementation in the procurement process, which is very important to the contractor companies. the main objective and the purpose of this research is to address this important issue. other objective of the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید