نتایج جستجو برای: we can develop the suitable strategies including defensive

تعداد نتایج: 16229969  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

postcolonial feminism, also dubbed as third world feminism, is an innovative approach, demonstrating the way women of colonized countries suffer from both native patriarchies and imperial ideology. also due to this double-colonization, postcolonial feminists contend that third world women are subjected to both colonial domination of empire and male domination of patriarchy. while western femini...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

in chapter one we will describe definitions and preliminary results to provide the global context of our own results to be presented in detail in the subsequent chapters in chapter two we consider degree-one maps of the circle and we study their rotation set. our main result in this chapter says that if the map is topologically mixing then its rotation interval is nontrivial (that is, not reduc...

Aims & Backgrounds: Strategic planning identifies the objectives of political management of space in accordance with its mission and through environmental studies, so that more realistic goals can be determined and implemented. Political managers of geographical space at the level of the cities to carry out their local tasks are bound to formulate strategic plans. The aim of this research is pr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده ادبیات و علوم انسانی 1392

an investigation into oral interaction in language classes: a conversation analytic point of view the aim of this thesis is to analyze the interaction between language teachers and students in english language institutes. this work is done in the context of yasuj city. learning another language, which is in most cases english, involves many variables. one of these variables is the linguistic...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1391

with the introduction of communicative language teaching, a large number of studies have concerned with students’ oral participation in language classrooms. although the importance of classroom participation is evident, some language learners are unwilling to engage in oral activities. this passivity and unwillingness to participate in language classroom discussions is known as “reticence”. rev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1390

we commence by using from a new norm on l1(g) the -algebra of all integrable functions on locally compact group g, to make the c-algebra c(g). consequently, we find its dual b(g), which is a banach algebra so-called fourier-stieltjes algebra, in the set of all continuous functions on g. we consider most of important basic theorems about this algebra. this consideration leads to a rather com...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1389

here, we report analysis of in vitro and in vivo drug release from an in situ formulation consisting of triamcinolone acetonide (tr) and poly(d,l-lactide-co-glycolide) (plga) and the additives glycofurol and hydroxyapatite nanoparticles (ha). we found that these additives enhanced drug release rate. we used the taguchi method to predict optimum formulation variables to minimise the initial burs...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...

Journal: :Journal of Neurology, Neurosurgery & Psychiatry 2002

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید