نتایج جستجو برای: behavior and application of the offered method

تعداد نتایج: 25109035  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم انسانی 1390

in solvo-hydrothermal method, xrd pattern was indicated presence of intermediate of ammonium octatmolybdate and ammonium tetramolybdate, which were changed to stble phase of ?-moo3 annealing. sem images were indicated nanoparticle with semispheical morphology and tem image was demonstrated nanoparticles with a diameter size of 25nm. also in impregnate method. the xrd pattern was shown high crys...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد شاهرود - دانشکده علوم انسانی 1393

recent studies in scientific education as well as foreign and second language instruction suggest that thinking has rarely been an integral part of education and training in classroom. some scholars decried the lack of emphasis on thinking in the institutes and schools. they noted that memorization and drills were rewarded,while inquiry, reflection, and consideration of alternatives were frowne...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

the methods which are used to analyze microstrip antennas, are divited into three categories: empirical methods, semi-empirical methods and full-wave analysis. empirical and semi-empirical methods are generally based on some fundamental simplifying assumptions about quality of surface current distribution and substrate thickness. thses simplificatioms cause low accuracy in field evaluation. ful...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مدیریت 1392

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

پایان نامه :0 1374

chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

the present research has been deducted from a provincial research project which aims at determining the relationship of variables of variables of occupational self-concept, intelligence beliefs and metacognitive with entrepreneurship among the students of payame noor university of kurdistan. the volume of the samples was 1080 students (576 female and 504 male students). the research methodology...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

abstract the present thesis seeks to critically read george orwell’s nineteen eighty-four and animal farm in the light of louis althusser’s thought and theory. the present thesis proceeds to examine and demonstrate althusser’s major concepts including ideological state apparatuses (isas), repressive state apparatuses (rsas), the structure, the subject, and ideological interpellation which r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده علوم 1370

1- in a search directed to the reaction of compound)23(the cycloaddition reaction of 1,3- diphenylisobenzofurane)14(with p-benzoquinone)19(,followed by addition of cyclopentadiene was carried out.the specific spacial stracture of its ir,nmr,mass spectra. 2- in another attempt the kinetic stability and behavior of compounds)20(and)23(was studied.the main subject of this study was the highly reve...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract listening is a key and main tool in second language skill and its development is of prime concern to teachers and learners. furthermore, the application of technology in language classrooms has become more commonplace in the last fifty years. computer and the internet have made foreign language materials easy to access and use. so, the present study is an attempt to examine the effec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید