نتایج جستجو برای: we have chosen qualitative approach and techniques.new theories of modernization and some of those related to interpretive sociology have been our guidance. we have used some of the theories especially engellhart’s theory of values in evolution
تعداد نتایج: 26949087 فیلتر نتایج به سال:
short story as an important literary genre in the recent decade is focused by many of young writers and literary critical with searching structure, content , artistic techniques and cognitive phenomenon of these works , we can show quantity of using some parts of storied literature from new literal techniques of the word and also we can show the usage of native, cultural and social foundation...
the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...
we have devided the thesis in to five chapters. the first recollects facts from purely algebraic theory of jordan algebras and also basic properties of jb and jb* - algebras which are needed in the sequel. in the second chapter we extend to jb* - algebras, a classical result due to cleveland [8]. this result shows shows the weakness of jb* - norm topology on a jb* - algebera. in chapter three, ...
chapter one is devoted to a moderate discussion on preliminaries, according to our requirements. chapter two which is based on our work in (24) is devoted introducting weighted semigroups (s, w), and studying some famous function spaces on them, especially the relations between go (s, w) and other function speces are invesigated. in fact this chapter is a complement to (32). one of the main fea...
this research is a study on indicators of listening instruction in iranian english as a foreign language (efl) curriculum at guidance school and high school educational levels. this thesis aims at determining: a) the indicators of listening instruction at guidance school and high school efl curriculum. b) the indicators of listening instruction in irans guidance school and high school efl curri...
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
target tracking is the tracking of an object in an image sequence. target tracking in image sequence consists of two different parts: 1- moving target detection 2- tracking of moving target. in some of the tracking algorithms these two parts are combined as a single algorithm. the main goal in this thesis is to provide a new framework for effective tracking of different kinds of moving target...
in this research we have studied the effect of some transition-metals (cu, ag and au) substitutions on two-electron reduction potential of flavins by application of dft method. all geometries have been optimized at blyp level of theory and “6-31+g** + lanl2dz” mixed basis set. the frequency job at the same method and basis sets has been performed to obtain gibbs free energy of compounds. it h...
when we return to the concept of poetry and the age-old discussion about the uselessness or the usefulness of the poets to the private and public state of human beings, originating from plato and aristotles views about poets respectively, there emerges the question of the role of poetry in human beings lives. in the same manner, with the advance of technology and the daily progress and improvem...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید