نتایج جستجو برای: using library techniques and domain studies people in these regions believe that human illnesses are caused by jins or satanic winds which penetrate in human body causing physical and mental disorders thus by performing certain ceremonies these winds or whispers could be destroyed
تعداد نتایج: 23148418 فیلتر نتایج به سال:
dendrimer synthesis strategies now provide virtual control of macromolecular nanostructures as a function of size and surface/interior functionality. these strategies involve the covalent assembly of hierarchical components reactive monomers , branch cells or dendron’s around atomic or molecular cores according to divergent/convergent dendrite branching principles.combinon of two or more dendri...
abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...
abstract the present study is concerned with the syntactic deviation in hafezs poetry. poems are known to be accompanied with various linguistic deviations. these deviations may be phonological, morphological and/or syntactic. the relatively high frequency of the cases of the syntactic deviation in hafezs poems makes this rhetorical feature as a main characteristic of his poetry. this thesis, ...
in this thesis, a structured hierarchical methodology based on petri nets is used to introduce a task model for a soccer goalkeeper robot. in real or robot soccer, goalkeeper is an important element which has a key role and challenging features in the game. goalkeeper aims at defending goal from scoring goals by opponent team, actually to prevent the goal from the opponent player’s attacks. thi...
since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...
abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...
1- in a search directed to the reaction of compound)23(the cycloaddition reaction of 1,3- diphenylisobenzofurane)14(with p-benzoquinone)19(,followed by addition of cyclopentadiene was carried out.the specific spacial stracture of its ir,nmr,mass spectra. 2- in another attempt the kinetic stability and behavior of compounds)20(and)23(was studied.the main subject of this study was the highly reve...
this study is an outlook of iranians religious practices and customs in eras such as nasser one. it attempts to answer the main question, "religious practices and ceremonies in the society during naseri ruling" and other subsidiary questions with scientific and historical theories. iran was a traditional and religious community . people abided by their religious practices and duties within reli...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید