نتایج جستجو برای: we always see an invisible

تعداد نتایج: 7807148  

2011
Hurriyet Babacan

This article focuses on how gender, as a socially constructed phenomenon, has been integrated into development practice. It examines the notion of “development” as generated by an economic paradigm that renders the work of women invisible. Further, it critiques the different ways in which women have been incorporated into development policies and program. An examination of issues facing women i...

Journal: :Religions 2021

Agnosticism has always had its fair amount of criticism. Religious believers often described the first agnostics as infidels and it is not uncommon to see them somewhat dull fence-sitters. Moreover, undecided agnostic stance on belief in gods compared with being unsure about such obviously false statements existence orbiting teapots, invisible dragons or even Santa Claus. In this paper, I maint...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this research we have studied the effect of some transition-metals (cu, ag and au) substitutions on two-electron reduction potential of flavins by application of dft method. all geometries have been optimized at blyp level of theory and “6-31+g** + lanl2dz” mixed basis set. the frequency job at the same method and basis sets has been performed to obtain gibbs free energy of compounds. it h...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :The Journal of Thoracic and Cardiovascular Surgery 2017

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید