نتایج جستجو برای: or tehran against other cities of the province or other cities of the country or even against the world
تعداد نتایج: 22943841 فیلتر نتایج به سال:
based on the latest records of typhlops vermicularis merrem, 1820 from iran, this species is distributed in the northern and southern regions of the country. in this study, new records of typhlops vermicularis are presented and it is shown that distribution range of this species is extended towards the eastern and western iran, and according to the new distribution map, it can be assumed that t...
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
the geopolitics of afghanistan after september 11, 2001, and its impact on iranian national security
abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...
run-out-table (rot) is located between last finishing stand and down coiler in a hot strip mill. as the hot steel strip passes from rot, water jets impact on it from top and bottom and strip temperature decreases approximately from 800-950 °c to 500-750°c. the temperature history that strip experience while passing through rot affects significantly the metallurgical and mechanical properties, s...
abstract the present thesis seeks to critically read george orwell’s nineteen eighty-four and animal farm in the light of louis althusser’s thought and theory. the present thesis proceeds to examine and demonstrate althusser’s major concepts including ideological state apparatuses (isas), repressive state apparatuses (rsas), the structure, the subject, and ideological interpellation which r...
this thesis deals essentially (but not from all aspects) with the extension of the notion of semigroup compactification and the construction of a general theory of semitopological nonaffine (affine) transformation semigroup compactifications. it determines those compactification which are universal with respect to some algebric or topological properties. as an application of the theory, it is i...
the purpose of the present study was to investigate the latent pattern underlying reading ability . some 272 male and female participants. english majors at the ba level , participated in the study. two valid tests were used in this study, the reading test developed exclusively for the purpose of this project and academic reading section of ielts. to investigate the possible latent underlying...
it is definitely necessary to understand the concept and behavior of causation of life insurance policies and its determinants for insurance managers, regulators, and customers. for insurance managers, the profitability and liquidity of insurers can be increasingly influenced by the number of causation through costs, adverse selection, and cash surrender values. therefore, causation is a materi...
این پایان نامه به بررسی و مقایسه دو موضوع مطابقه میان فعل و فاعل (از نظر شخص و مشار) و هسته عبارت در دو زبان انگلیسی و آذربایجانی می پردازد. اول رابطه دستوری مطابقه مورد بررسی قرار می گیرد. مطابقه به این معناست که فعل مفرد به همراه فاعل مفرد و فعل جمع به همراه فاعل جمع می آید. در انگلیسی تمام افعال، بجز فعل بودن (to be) از نظر شمار با فاعلشان فقط در سوم شخص مفرد و در زمان حال مطابقت نشان میدهند...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید