نتایج جستجو برای: known viewpoints and criticizing them

تعداد نتایج: 16849263  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...

Introduction: Curriculum revision is the basis and a necessity for development of education. The goal of General Dentistry curriculum is to train dentists with minimum expected competencies. Considering the importance of this field in promoting society’s health, this study was carried out in Isfahan University of Medical Sciences in 2017 with the purpose of criticizing the general dentistry cur...

Journal: :IEEE Trans. Pattern Anal. Mach. Intell. 2003
Andrea Bottino Aldo Laurentini

3D shapes can be reconstructed from 2D silhouettes by back-projecting them from the corresponding viewpoints and intersecting the resulting solid cones. However, in many practical cases as observing an aircraft or an asteroid, the positions of the viewpoints with respect to the object are not known. In these cases, the relative position of the solid cones is not known, and the intersection cann...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم اجتماعی و اقتصادی 1389

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1389

this study purported to compare and contrast the use of self-mention and evidentials as two mtadiscourse features in opinion columns of persian and english newspapers. the theoretical basis of this study is the idea that metadiscourse features vary across cultural boundaries. for this purpose, 150 persian and 150 english opinion columns were collected based on three factors of topic, audience a...

ژورنال: مطالعات عرفانی 2009

In the process of Islamic mysticism, the seventh century, because of the confluence of various mystical methods and viewpoints is of a special importance. One of the distinguished figures of the period is Sa‘d al-din Hamouye (d.649 Lunar) that in spite of his significant place in the Islamic mysticism, these is not sufficient information about him. Without doubt any scientific source which he...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده حقوق 1391

abstract when in administrative law the matter of administrative offences are raised, these offences would have legal nature if they are force able, some of these offences are related to administrative law, where as some other pelts are common in civil or penal law. the current research intends not only to consider the concept and foundation of administrative execution rules but also compares...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

august wilson is undoubtedly one of the rare black playwrights whose works have attracted streams of attention and worldwide audience. the present study aims at analyzing fences and piano lesson which are two of the most successful plays in his pittsburgh cycle from the perspective of michel foucault’s theories and ideas. studying these two plays from foucault’s perspective opens new windows in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

Journal: :education policy analysis archives 1998

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید