نتایج جستجو برای: and this

تعداد نتایج: 16947784  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1390

the images of muslims in media, literature and politics have been mostly black and white portrayals of a people alien to modernity, civilization, rationality and pluralism. since the end of the cold war and the onset of deadly terrorist attacks in different areas of the world, especially in the united states, these representations show a palpable difference: muslims are represented not only as ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده علوم اجتماعی 1393

the present study is paid to the evaluation of the welfare program of the unemployment insurance in iran. the main purpose which was the main reason for performing this thesis, was the unemployment insurance plan’s challenges in iran such as financial problems of this plan, prolongation of the credit receipt for some insured people, unemployment slow exiting from the unemployment insurance fund...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1391

although there are studies on pragmatic assessment, to date, literature has been almost silent about native and non-native english raters’ criteria for the assessment of efl learners’ pragmatic performance. focusing on this topic, this study pursued four purposes. the first one was to find criteria for rating the speech acts of apology and refusal in l2 by native and non-native english teachers...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

in this study, scour of mashkid bridge pier located in mashkid river of saravan county has been studied and to measure the scour rate, the numerical model hec-ras 4.0 has been used. upon selection of mashkid river as the case study and whereas the studied zone is important with respect to the climatic conditions and showery monsoon raining and flowing the great and destructive floodwaters, ther...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده ادبیات و زبانهای خارجی 1391

translation studies have become an accepted academic subject and books, journals and doctoral dissertations appear faster than one can read them all (bassnet and lefevere, 1990). but this field also brought with itself so many other issues which needed to be investigated more, in the heart of which, issues like ideology, ethics, culture, bilingualism and multilingualism. it is reported that ove...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1391

according to cheng (1999), in recent esl/efl literature, asian (especially east asian) learners of english as a foreign/second language have been arguably reported as reticent and passive learners. the most common allegations are that these students are reluctant to participate in classroom discourse; they are unwilling to give responses; they do not ask questions; and they are passive and over...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید