نتایج جستجو برای: its form and extent

تعداد نتایج: 16922068  

ژورنال: فلسفه 2009

What follows is an attempt to see Otto the phenomenologist within wider developments in the field, and to take account of some recent criticisms. Everything that is said falls under the general headingof 'introduction to the study of religion'(or 'meta-religionswissenschaft') Within this wide field, we shall be specifically concerned with the possibility of a systematic phenomenology of religio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام صادق علیه السلام - دانشکده الهیات و معارف اسلامی 1391

muhammad ibn muhammad ibn numan, known as "shaykh mufid," one of the great imamiye theologians and jurists in the fourth and early fifth century , had comprehensive mastery of both rational and traditional topics and exerted his influence upon both his contemporary and future scholors. he is considered to be one of the top imamiye scholars who spent his lifetime teaching, learning and authorin...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this thesis, we exploit a simple and suitable method for immobilization of copper(ii) complex of 4?-phenyl-terpyridine on activated multi-walled carbon nanotubes [amwcnts-o-cu(ii)-phtpy]. this nanostructure was characterized by various physico-chemical techniques. to ensure the efficiency and fidelity of copper species, the implementation of three-component strategies in click-chemistry all...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

this thesis examines the significances and implications of inflicted physical pain in waiting for the barbarians (1980) by john maxwell coetzee (1940 - ). the researcher tries to show how body becomes a site for exercising violence. in this way, the government’s representatives turn bodies of the barbarians into blank pages through torturing in order to create the truth of the empire. in this p...

Journal: :The Japanese journal of ergonomics 1968

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم تربیتی و روانشناسی 1388

on- the-job training on of the most effective tools for managers to cope with the changing organizational environment. it grantess suitable services to customers, particularly in public service enterprises. if such training os goal oriented, planned systematically, and tailored to the employees, job content, then not only it could increase employees and organizational performance, but also it c...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران - دانشکده علوم 1372

in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...

Any historical monument may have lost some fragments due to various factors. The extent of defects, whether in quantity or quality, directly relates to the loss of identity and integrity of the building, and reduces the accuracy of its physical or virtual reconstruction. On the other hand, a lack of understanding of the complete form of a building affects the degree of justification for its con...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید