نتایج جستجو برای: he tried to prove an interpretation of the problem of determinism and free will philosophy and its relation to islamic truths based on motazelian theology it seems that the very theological assumptions and choosing the narrative
تعداد نتایج: 26158183 فیلتر نتایج به سال:
the major purpose of this study was to develop the translation teacher competency test (ttct) and examine its construct and predictive validity. the present study was conducted in two phases: a qualitative phase as well as a quantitative phase. in the first phase of the study, the author attempted to find out the major areas of competency required for an academic translation teacher. the second...
translation studies have become an accepted academic subject and books, journals and doctoral dissertations appear faster than one can read them all (bassnet and lefevere, 1990). but this field also brought with itself so many other issues which needed to be investigated more, in the heart of which, issues like ideology, ethics, culture, bilingualism and multilingualism. it is reported that ove...
we have devided the thesis in to five chapters. the first recollects facts from purely algebraic theory of jordan algebras and also basic properties of jb and jb* - algebras which are needed in the sequel. in the second chapter we extend to jb* - algebras, a classical result due to cleveland [8]. this result shows shows the weakness of jb* - norm topology on a jb* - algebera. in chapter three, ...
plagiarism in esl/efl learning contexts has been established as a dynamic and multi-layered phenomenon and has become a topic engaging many researchers in a heated debate in recent years. comparisons of student-generated texts with their source texts have shown that students rely on source texts in their writings and copying is a major strategy used by both l1 and l2 writers. in our country a...
in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...
abstract nowadays, industries cannot play a crucial role in national and international competitions. the tourism industry is no exception. tourism industry development as the most important economic sector and income generation is one of the key challenges of economic development in the world. therefore, countries were successful that take advantage of the capabilities of tourism sector using ...
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید