نتایج جستجو برای: in basins such as caspian

تعداد نتایج: 17577659  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده منابع طبیعی و علوم دریایی 1388

this research was conducted in two protect and destroy region in the middle zagros, in illam province. in order to identification of ecological species group and evaluate density of regeneration, effect of many factors such as protection, vegetation, physiographic factors, physical and chemical properties of soil in study locations were studied. to achieve these purpose number of 54 plots using...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان 1390

in iran we already use laminate tubes only in cosmetics industry. laminate tube manufacturers via using the most modern technology of the world, faced with the laminate tube market being saturated in cosmetics industry for packaging the cosmetic creams and toothpaste. but considering the great food market and therefore laminate tube features such as beautiful packaging, ease of use for the fina...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده علوم 1391

in this investigation the effect of external field on the electron density of nanostructures of cds, cdse, cdte, gaas and polymeric structure of three, four, five and six units of cds as a kind of nanosolar cells has been studied theoretically. as modeling this system in nanodimension, molecular structures has used. specific properties of molecular structures permit us to consider different sym...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد علوم دارویی - پژوهشکده علوم 1392

purpose a metabolic abnormality such as obesity is a major obstacle in the maintenance of the human health system and causes various chronic diseases including type 2 diabetes, hypertension, cardiovascular diseases, as well as various cancers. this study was designed to summarize the recent scientific knowledge regarding the anti-obesity role of curcumin (diferuloylmethane), which is isolated f...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات 1390

this study is an outlook of iranians religious practices and customs in eras such as nasser one. it attempts to answer the main question, "religious practices and ceremonies in the society during naseri ruling" and other subsidiary questions with scientific and historical theories. iran was a traditional and religious community . people abided by their religious practices and duties within reli...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1392

a novel acrylic acid-functionalized fe3o4 magnetic nanoparticle with a core-shell structure was developed for utilization as a heterogeneous organosuperacid in chemical transformations. the structural, surface, and magnetic characteristics of the nanosized catalyst were investigated by various techniques such as transmission electron microscopy (tem), thermogravimetric analysis (tga), and ft-ir...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید