نتایج جستجو برای: oriented and teleological in teleological system

تعداد نتایج: 21928463  

Journal: :Palgrave frontiers in philosophy of religion 2022

This Open Access book devises an original deductive formulation of the Teleological Argument and combines it with Kalam Cosmological Argument.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده فنی مهندسی 1389

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1389

abstract abstract of thesis (includes summary, goals, execution methods, and results) story “al-obnosat al-bayza” is one of the short stories from “hanna mineh” collection. this story is a selection of lives of some humans during a voyage together, each of them is a symbol of human nature (love, mind, kindness) and examine social, cultural, and political aspects of governing system, and it...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

2016
Ryan Wasserman Nick Kroll

In “Teleological Dispositions,” Nick Kroll offers a novel theory of dispositions in terms of primitive directed states. Kroll is clear that his notion of directedness “outstrips talk of goals, purposes, design, and function” (##), and that it commits him to “primitive teleological facts” (##). This notion may strike some as outdated and unscientific, but Kroll argues that it has an important th...

2008
Gloria H. W. Liu Eric T. G. Wang

The employee-centered thinking bears the hallmark of a postindustrialization era, which culminates in the attempt to manage and measure intangible assets. Nevertheless, invisibility of the IC construct per se generates insurmountable divisions ontologically and methodologically. We adopt a teleological perspective to classify and simplify extant IC metrics so as to single out the fundamental is...

2007
Jeffrey K. McDonough

This essay examines one of the cornerstones of Leibniz’s defense of teleology within the order of nature. The first section explores Leibniz’s contributions to the study of geometrical optics, and argues that his introduction of the “Most Determined Path Principle” or “MDPP” allows him to bring to the fore philosophical issues concerning the legitimacy of teleological explanations by addressing...

Journal: :Consciousness and cognition 2003
Jessica Heineman-Pieper Amanda Woodward

The article by Kiraly and colleagues (henceforth KJPAG) is an important contribution to an age-old debate: what can a person know about another person s mind, and on what grounds can he or she know it? KJPAG focus this question on the initial character of infants understanding of intentional actions and the course and causes of the development of that understanding. Any approach to these questi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید