نتایج جستجو برای: din ardebili we can name this new style as the style of mausoleums of azerbaijani theosophists that combined early seljuk tomb towers in damghan and mazandaran and late seljuk tomb towers in west azerbaijan with basic specifications of ilkhanid architecture and local architecture of the region among remarkable samples of this style are mausoleums of sheikh safi al
تعداد نتایج: 27254536 فیلتر نتایج به سال:
abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...
since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...
this thesis seeks to present a critical reading of virginia woolf’s mrs. dalloway and michael cunningham’s the hours in terms of an intertextual approach, concentrating on dialogic imagination, negativity, transposition and allusion. this study attempts to evaluate cunninghams perception of woolfs life and work by adopting kristevas conception of intertextuality and her consideration of the hou...
the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...
the purpose of this study is to investigate the relationships between teachers’ immediacy behaviors and iranian students’ willingness to talk in english classes. analysis of the results from willingness to talk scale represents a relatively high level of willingness to talk in english classrooms among iranian language learners. the total mean score of students’ willingness to talk was 66.3 ou...
hydrochlorothiazide (hct) is a diuretic agent which is shown to be effective in the treatment of hypertension. literature reports have demonstrated that urinary excretion data may be used to assess the bioavailability of various formulations containing this thiazide. also hct consumption by the athletes is one of the drugs which should be regulated by world anti-doping agency (wada), because of...
the major aim of this study was to investigate the relationship between social and cultural capital and efl students’ critical thinking skills. this study takes this relationship in to account to see if people with different sociocultural status are different regarding their critical thinking skills. to this end, 160 university students majoring in english language and literature, english trans...
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
it is definitely necessary to understand the concept and behavior of causation of life insurance policies and its determinants for insurance managers, regulators, and customers. for insurance managers, the profitability and liquidity of insurers can be increasingly influenced by the number of causation through costs, adverse selection, and cash surrender values. therefore, causation is a materi...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید