نتایج جستجو برای: 2075 and 2100 then by using of the idw in geographical information system

تعداد نتایج: 26870747  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract in written mode of language, metadiscourse markers are used commonly to help writers in general and academic writers in particular to produce coherent and professional texts. the purpose of the present study was to compare introduction sections of applied linguistics and physics articles regarding their use of interactive and interactional metadiscourse markers based on the model pro...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده علوم پایه 1392

‎in this article‎, ‎we have focused one some basic and productive information about the properties of spectrum and singular values related to compact operators which are ideals in a c*-algebra of bounded operators‎. ‎considering a two-sided connection between the family of symmetric gauge functions on sequence of singular values of compact operators and symmetric norms on finite dimensional ope...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

the aim of this study was to identify the problems of translating markedness structures from english to persian in order to look closely at what possible difficulties translators may face. it also seeks to probe the strategies applied accordingly by iranian translators in translating them. from three translation of blindness novel, the sentences with marked structures were elicited and also the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1391

abstract: one of the most visited & important spaces in different countries by tourist are urban areas. the old tehran which major part is located in district 12 is historical showcase of the capital, but, its hiidden cultural attraction is not used as it should be. this thesis occasionally engage in studying the efficacy of correct installation of travel guide boards in welfare & easily acc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده فیزیک 1392

in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی برق و کامپیوتر 1391

this thesis is presented 10 ghz voltage controlled ring oscillator for high speed application. the voltage controlled ring oscillator was designed and fabricated in 0.13یm cmos technology. the oscillator is 7-stages ring oscillator with one inverter replaced by nand-gate for shutting down in the ring oscillator during idle mode. tri-state inverter was used to control of 126 bit vector in ri...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

this study gives a rough notional method to find their textual placing and valuating in the text, narrows the board of vision to mystic items and finally lists the strategies used by the translators of mathnawi to present solutions for preserving the additional values. at last, as the sum-up, strategies in comparison would be presented. it should be noted that by extending the translations from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید