نتایج جستجو برای: sheikh heidar in meshkinshahr and barda turbatsi in the republic of azerbaijan many of these tomb towers such as the tomb of sheykh safi aldin ardebili underwent basic changes in safavid period especially in tile works and paintings ornaments and changed its nature of early ilkhanid architecture all three mausoleums which wer the subject of the present study belong to tomb towers which are the most common type of tombs in islamic period of iran in terms of overall architectural characteristics
تعداد نتایج: 27144231 فیلتر نتایج به سال:
cultural iran is a scope that is more extended than the political territories of iran as a political unit. this concept means that cultural geography(mehdi moghanlo-1383-1) of iran is greater than its political geography which, according to history, has a long history extending west-east from kandahar to the euphrates and north-south from the persian gulf to the caucasus including transoxiana a...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
colonialism is an important factor in cultural production and many of cultural constructs all over the world. english and english language teaching are at the center of the contemporary world. postcolonial literature, the genre achebe exercised, is a kind of historical text which has become central to different debates and criticisms. in this thesis, different elements related to the colonial...
target tracking is the tracking of an object in an image sequence. target tracking in image sequence consists of two different parts: 1- moving target detection 2- tracking of moving target. in some of the tracking algorithms these two parts are combined as a single algorithm. the main goal in this thesis is to provide a new framework for effective tracking of different kinds of moving target...
in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...
this study examined the effects of collaborative strategic reading and direct instruction in persuasion on iranian high school students persuasive writing and attitudes. students in three intact classes were assigned to one of three treatment conditions: collaborative strategic reading and direct instruction in persuasion or direct instruction in persuasion or a control group. treatment effects...
in this thesis, phosphorus ylides [phbppy], [no2bppy] and [brbppy] have been synthesized through the formation of phosphonium salt and dihydrogenation, followed by the reaction of pd(oac)2 and the orthopalladated dinuclear complexes [pd(?-cl)(phbppy)]2, [pd(?-cl)(no2bppy)]2 and [pd(?-cl)(brbppy)]2 have been produced. the reaction of dinuclear complexes and bidentate ligands [l = bipy (2,2-bipyr...
power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...
learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید