نتایج جستجو برای: have in order

تعداد نتایج: 17138705  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

this dissertation has six chapter and tree appendices. chapter 1 introduces the thesis proposal including description of problem, key questions, hypothesis, backgrounds and review of literature, research objectives, methodology and theoretical concepts (key terms) taken the literature and facilitate an understanding of national security, national interest and turkish- israeli relations concepts...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم پایه 1391

food safety is considered as an important world concern. the detection of pathogen and toxic materials in food has an important role in public health care. in recent years, the applications of microbial biosensor have been developed as a new approach for toxicity control. luminescent microbial biosensor is an appropriate biological tool for protection of natural environment. this type of biosen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this thesis, we exploit a simple and suitable method for immobilization of copper(ii) complex of 4?-phenyl-terpyridine on activated multi-walled carbon nanotubes [amwcnts-o-cu(ii)-phtpy]. this nanostructure was characterized by various physico-chemical techniques. to ensure the efficiency and fidelity of copper species, the implementation of three-component strategies in click-chemistry all...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1393

abstract: the present study is an attempt to find out cultural exophoric references in iranian high-school elt textbooks and touch stone series to compare the frequency of occurrence of such references in these books. the purpose is to find out which of the series of the books under investigation impose a greater referential burden on efl learners as far as their reading comprehension of the ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه علوم انسانی و مطالعات فرهنگی - دانشکده ادبیات، زبانهای خارجی و تاریخ 1391

abstract english language learning in iran has become significant in recent years, and english has been included in the curriculum of iranian schools and universities, and considerable attention has been paid to this language in our society. nevertheless, teaching and learning english in iranian schools has not been able to satisfy the specified goals, so different efl institutes have been est...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

the purpose of the present study was to investigate the effect of instruction through debate on male and female efl learners’ reading comprehension, to examine the differences between the performance of male and female participants on the five dimensions of cctst including analysis, evaluation, inference, deductive reasoning, and inductive reasoning, and to examine the differences between male ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات 1391

this study investigated the effects of three kinds of gloss conditions, that is traditional non-call marginal gloss, audio gloss, and extended audio gloss, on reading comprehension and vocabulary gain of iranian upper- intermediate efl learners. to this end, three experimental and one control groups, each comprising 15 participants, took part in the current study. in order to ensure that the pa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید