نتایج جستجو برای: who have new viewpoints

تعداد نتایج: 4663946  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده ادبیات و زبانهای خارجی 1390

bserved by many teachers that most of the time, mumbling and searching for their intended words, students complain why they have forgotten the words they have learned in the previous semesters. they ask for some new ways that may help them to recall and apply the learned words more efficiently, since as they declare one of the most important skills in foreign language learning is having a g...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1394

abstract there is not much sources about ancient carnival and ceremonies , but some information can be gain from documents . as a matter of fact the ceremonies were a part of zarartiyan principles which zartosht had taken them to his religion . it should be mentioned that the oldest ceremonies are about poster and agriculture principles this seasonal ceremonies were very important for agri...

ژورنال: Hormozgan Medical Journal 2013
Goodarzi, M.A. , Ghanizade, A. , Rastikerdar, N. , Taghavi, M.R. ,

Introduction: Concerning cognitivism, psychotic experiences (hallucination) of schizophrenic patiets have been hypothesized to originate from a fundamentally cognitive biases. Methods: To explor the idea that attribution bias may underlin appearance of auditory hallucination, in the current descriptive study, a source-monitoring task were used to compare healthy controles with relatives of indi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم انسانی 1391

from 1950s onward, new theories and critical approaches burgeoned across humanities. these theories were context-oriented; as a result, the analysis of discursive practices gained significance. thus, social, political, historical and cultural discourses that have been hitherto marginalized and considered inferior to literary texts, were introduced as important texts to be analyzed by critics. o...

Journal: :پژوهش های قرآن و حدیث 0
مهدی اکبر نژاد دانشگاه ایلام روح الله محمدی دانشگاه ایلام

one of the quranic concepts concerning the hereafter is the lofty barrier (araf) and their men regarding which the words of revelation of 46-49 in araf surah in the holy quran have pointed this concept. there are different viewpoints among commentators concerning what and where the lofty barrier is, and also who the men of the lofty barrier are. regarding this, different viewpoints have been ta...

Journal: :The American Journal of Psychology 1926

Journal: :European Psychiatry 2023

Introduction We research new neurological viewpoints of psychiatric syndromes in social cohesion regarding, especially the problematic lymbic system and amygdala adults. Nowadays, number use internet is higher than before COVID-19 pandemic. The development digital techniques impulsive, which can be main reason most dysfunctions change communication. Objectives In this presentation, we review st...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

ژورنال: حدیث پژوهی 2013

Ignaz Goldziher, a famous western orientalist, believes that Muslims' approach to criticize narrations is mostly limited to the critique of the chain of transmission (isnad). In addition, he argues that judgment about the content of narrations depends on the validity of the chain of transmission. After Goldziher, some orientalists have mentioned similar results and confirmed his views. Criticiz...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید