نتایج جستجو برای: and lessee has a lease certified or whose date is certain

تعداد نتایج: 20695248  

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

2012
Jongsang Park Uday Rajan

Firms can use capital that they either purchase or lease, but these alternatives are treated differently for tax purposes. This paper derives the demand for leased capital as a function of tax parameters, and uses the model to estimate the responsiveness of leasing to the introduction of bonus depreciation in 2002, finding strong evidence that depreciation allowances influence leasing patterns....

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان 1388

textbooks play a crucial role in language learning classrooms. the problem is that among the great quantity of available textbooks on the market which one is appropriate for a specific classroom and a group of learners. in order to evaluate elt textbooks, theorists and writers have offered different kinds of evaluative frameworks based on a number of principles and criteria. this study evaluate...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده حقوق 1393

what has been discussed here has been a study of international immigration law. this branch of law has not been a major player in the field of international law. no collective law exists, and no codification has been carried out as yet. however, the need for such a set of laws has forced the international community to pay more attention to this issue. the need for a better life in the so-call...

پایان نامه :دانشگاه رازی - کرمانشاه - دانشکده ادبیات و علوم انسانی 1393

in recent years, there has been a growing interest among researchers to investigate the relationship betweenteacher self-efficacy and classroom behavior management, especially students misbehavior. therefore, this study aimed to comparatively investigate english and arabic teachers’ use of different behavior managementstrategies, their self-efficacy, and their success in an iranian context. th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه هنر - دانشکده سینما و تئاتر 1387

since the modern art is chosen to discuss, it means a wide expansion of art courses are affected by modernism that enter to the new realms. because of expanded subject, lack of sources and also the close relationship between painting and animation, this thesis emphasizes on the painting and it is recommended to use the phrase “modern painting” instead of modern art (which is more general). thi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده ادبیات و علوم انسانی 1392

an investigation into oral interaction in language classes: a conversation analytic point of view the aim of this thesis is to analyze the interaction between language teachers and students in english language institutes. this work is done in the context of yasuj city. learning another language, which is in most cases english, involves many variables. one of these variables is the linguistic...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید