نتایج جستجو برای: in a new way and based on the contemporary mythological theories
تعداد نتایج: 26357385 فیلتر نتایج به سال:
today, information technology and computers are indispensable tools of any profession and translation technologies have become an indispensable part of translator’s workstation. with the increasing demands for high productivity and speed as well as consistency and with the rise of new demands for translation and localization, it is necessary for translators to be familiar with market demands an...
this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...
an investigation into oral interaction in language classes: a conversation analytic point of view the aim of this thesis is to analyze the interaction between language teachers and students in english language institutes. this work is done in the context of yasuj city. learning another language, which is in most cases english, involves many variables. one of these variables is the linguistic...
a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...
postcolonial feminism, also dubbed as third world feminism, is an innovative approach, demonstrating the way women of colonized countries suffer from both native patriarchies and imperial ideology. also due to this double-colonization, postcolonial feminists contend that third world women are subjected to both colonial domination of empire and male domination of patriarchy. while western femini...
abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید