نتایج جستجو برای: the current research has been developed in order to evaluate the status of happiness in one of the research
تعداد نتایج: 25838434 فیلتر نتایج به سال:
one of the most important number sequences in mathematics is fibonacci sequence. fibonacci sequence except for mathematics is applied to other branches of science such as physics and arts. in fact, between anesthetics and this sequence there exists a wonderful relation. fibonacci sequence has an importance characteristic which is the golden number. in this thesis, the golden number is observed ...
acknowledgements i wish to express my gratitude to all those who have helped me in preparing this thesis. i would like to express my deep gratitude to my respected advisor dr. kourosh akef, whose advice and comments helped me in the early stages of the research and throughout the writing process. i would also like to express my gratitude to dr. hajar khanmohammad whose invaluable guidance he...
investigation the archetype of mother can help the reader to understand poes works, especially his fiction, better, if not fully. motivated by internal and external drives to get into the universe in its manifold form poe was impelled to art and, from various modes of art, to symbolism. how much was poe successful to produce works of art has been a matter of dispute among critics. however, ther...
abstract the current study examined the role of emotional intelligence and motivation on language learning of efl learners in iranian context. the participants of this study were 162 female and 100 male junior high school students. these participants were selected by convenient sampling method. to carry out the study two questionnaires were administered to the participants. first, the adap...
textbooks play a crucial role in language learning classrooms. the problem is that among the great quantity of available textbooks on the market which one is appropriate for a specific classroom and a group of learners. in order to evaluate elt textbooks, theorists and writers have offered different kinds of evaluative frameworks based on a number of principles and criteria. this study evaluate...
this experimental study has been conducted to test the effect of oral presentation on the development of l2 learners grammar. but this oral presentation is not merely a deductive instruction of grammatical points, in this presentation two hypotheses of krashen (input and low filter hypotheses), stevicks viewpoints on grammar explanation and correction and widdowsons opinion on limited use of l1...
from historical facts to geo-political realities: relation between turkey and armenia ( 1915 – 2010)
armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...
some researches made in the field of agency problem issue, deal with the role of control systems regarding owners and managers. in this research the relationship between the two control mechanisms, namely the voluntary disclosure (external control mechanism) and outside directors (internal control mechanism), which are reductive of agency problems, has been studied. for this reason, a sample ...
saluk mount is selected for devonian biostratigraphy. this area located at southwest of bojnurd. in this study three sections are selected and two sections, chahar-borj and tabar sections with a thickness of 650 m, which consist mainly of calcareous sediments was studied in detailed but third section, qelli section, with a thickness of about 450m which consist mainly of sandstone and evaporates...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید