نتایج جستجو برای: such as design law

تعداد نتایج: 6499796  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد علوم دارویی - پژوهشکده علوم 1392

purpose a metabolic abnormality such as obesity is a major obstacle in the maintenance of the human health system and causes various chronic diseases including type 2 diabetes, hypertension, cardiovascular diseases, as well as various cancers. this study was designed to summarize the recent scientific knowledge regarding the anti-obesity role of curcumin (diferuloylmethane), which is isolated f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان 1390

in iran we already use laminate tubes only in cosmetics industry. laminate tube manufacturers via using the most modern technology of the world, faced with the laminate tube market being saturated in cosmetics industry for packaging the cosmetic creams and toothpaste. but considering the great food market and therefore laminate tube features such as beautiful packaging, ease of use for the fina...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده کشاورزی 1389

abstract: since sugar consumption is directly related to diabetes and other illnesses such as obesity, the issue that will most heavily dominate the health food market is blood sugar management and low glycemic foods. using calcium chloride and gums such as sodium alginate and low ester pectin as thikener and a high-potency sweetener aspartame we were able to reduce sugar content of sour cherry...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

this study investigated how group formation method, namely student-selected vs. teacher-assigned, influences the results of the community model of teaching creative writing; i.e., group dynamics and group outcome (the quality of performance). the study adopted an experimental comparison group and microgenetic research design to observe the change process over a relatively short period of time. ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات 1390

this study is an outlook of iranians religious practices and customs in eras such as nasser one. it attempts to answer the main question, "religious practices and ceremonies in the society during naseri ruling" and other subsidiary questions with scientific and historical theories. iran was a traditional and religious community . people abided by their religious practices and duties within reli...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده علوم پایه 1390

abstract in this study, we synthesized a novel template polymer by using methacrylic acid (mma) as functional monomer, ethylene glycol dimethacrylate(egdma) as cross linker, 2,2-azobisisobutyronitrile (aibn) as initiator and olanzapine as targeted molecule in the presence of chloroform and acetonitrile as solvent. the products have been characterized and confirmed by (chn)elemental analysis,...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده علوم 1391

in this investigation the effect of external field on the electron density of nanostructures of cds, cdse, cdte, gaas and polymeric structure of three, four, five and six units of cds as a kind of nanosolar cells has been studied theoretically. as modeling this system in nanodimension, molecular structures has used. specific properties of molecular structures permit us to consider different sym...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید