نتایج جستجو برای: religious resources of this period

تعداد نتایج: 21236016  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات 1394

abstract the purpose of this study was to find out the effect of applying the principles of group-dynamic assessment (g-da) on learning of conditional structures in english by iranian efl learners at the intermediate level, which according to the formal educational system in iran, includes students who are in their second year of studying in high schools of koohdasht city. this study was a qua...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

this thesis examines the significances and implications of inflicted physical pain in waiting for the barbarians (1980) by john maxwell coetzee (1940 - ). the researcher tries to show how body becomes a site for exercising violence. in this way, the government’s representatives turn bodies of the barbarians into blank pages through torturing in order to create the truth of the empire. in this p...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1389

there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1389

one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1392

this research has been taken among the students of high school in karaj city during the years 1391 and 1392. this is a survey research and data gathering is through questionnaires. studying the “an analysis of students’ tendency toward non-native reference groups in karaj”. the questionnaire was distributed among 260 of these students who were chosen through multi step cluster sampling. conside...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1390

sange siyah dam is located two kilometers down the kabod khani village. the environ of ghorrve city in kurdestan province. this is an clay core dam. in this dam instrumentation is performed in three section and consist of electrical piezometers, total pressure cells, settlement cells and so on. the main objective of instrumentation is to control the behavior of dam body and foundation, end else...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم 1393

in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

abstract: about 60% of total premium of insurance industry is pertained?to life policies in the world; while the life insurance total premium in iran is less than 6% of total premium in insurance industry in 2008 (sigma, no 3/2009). among the reasons that discourage the life insurance industry is the problem of adverse selection. adverse selection theory describes a situation where the inf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید