نتایج جستجو برای: based one specifically

تعداد نتایج: 4544800  

پایان نامه :0 1370

all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

just as motivation is important in sla research, demotivation constitutes an important factor, too. there are many studies done on demotivation and burnout of teachers. many of these studies have been conducted on one or two aspects of english instruction. consequently, there are few studies which have been done on more than two aspects of english teaching. the aim of this study is to find out ...

ژورنال: مواد پرانرژی 2019

A way to increase the specific impulse of solid propellants is using the energetic components as energetic binder or energetic plasticizer in the propellant formulations. Hydroxy terminated poly butadiene (HTPB) is the one of pre-polymer which was specifically synthesized for its use as a propellant. Incorporating of PEG into HTPB chains lead to increasing the polarity of binder and maybe preve...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده علوم تربیتی و روانشناسی 1391

abstract: research purpose: the purpose of this research is to identify academic databases assessment factors and criteria at law and political science majors. the necessity of this research is to distinguish academic databases assessment factors and criteria and to identify the most important ones and rank them in order to select an appropriate database according to students’ and faculty memb...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات 1390

this study is an outlook of iranians religious practices and customs in eras such as nasser one. it attempts to answer the main question, "religious practices and ceremonies in the society during naseri ruling" and other subsidiary questions with scientific and historical theories. iran was a traditional and religious community . people abided by their religious practices and duties within reli...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1391

in this thesis protic and aprotic ammonium-based ionic liquids were synthesized and their surface tensions were measured in the range of 298-373k. the protics are alkyl ammonium-based ils with the carboxylate (formate, acetate, propionate) anion and aprotics are quaternary ammonium-based ils with bis(trifluoromethylsulfonyl)imide anion. capillary rise method was used for surface tension measure...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1391

according to cheng (1999), in recent esl/efl literature, asian (especially east asian) learners of english as a foreign/second language have been arguably reported as reticent and passive learners. the most common allegations are that these students are reluctant to participate in classroom discourse; they are unwilling to give responses; they do not ask questions; and they are passive and over...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعت آب و برق (شهید عباسپور) - دانشکده مهندسی برق و کامپیوتر 1392

abstract according to increase in electricity consumption in one hand and power systemsreliability importance in another , fault location detection techniqueshave beenrecentlytaken to consideration. an algorithm based on collected data from both transmission line endsproposed in this thesis. in order to reducecapacitance effects of transmission line, distributed parametersof transmission line...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید