نتایج جستجو برای: cooperation and friction with other traditions. each tradition is trying to explain a method of socio

تعداد نتایج: 26578367  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مدیریت 1392

data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1391

abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...

Journal: :سیاست 0
سیدرحیم ابوالحسنی دانشگاه تهران

there are different approaches to the question of developments in contemporary iran. this research is an attempt to introduce communitarianism theory whilst at the same time use it to examine the history of political thought in contemporary iran. today this theory is one of the most important approaches of post modernist era which has challenged liberalism and some tenets of modernity. using th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پایه 1391

bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده اقتصاد و علوم اجتماعی 1389

چکیده: پژوهش حاضر به بررسی تطبیقی اعتماد اجتماعی در بین دبیران زن و مرد مقطع راهنمایی شهر ایلام می پردازد. امروزه در جوامع شاهد گسترش ارتباطات هستیم و با توجه به این که دامنه کنش های اجتماعی از حد روابط با آشنایان و دوستان فراتر رفته و به تعامل با کنشگران غربیه و نا آشنا گسترش یافته است، لزوم وجود اعتماد، بیش از پیش احساس می شود. اما با توجه به نقش دبیران در نهادهای آموزشی، در انتقال ارزش ها و...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی 1390

iv abstract this study examined the linguistic behaviors of two iranian efl teachers each of them teaching learners of two similar proficiency levels, a beginner level and an intermediate level, to investigate the relationship between the learners proficiency levels and the amounts and purposes for l1 use by the two teachers. the study was carried out to investigate whether there were differe...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید