نتایج جستجو برای: is neither to be defined as a literary text nor a poetic text the quran must be regarded merely as quran
تعداد نتایج: 20884320 فیلتر نتایج به سال:
the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
a novel and ultra low cost isfet electrode and measurement system was designed for isfet application and detection of hydronium, hydrazinium and potassium ions. also, a measuring setup containing appropriate circuits, suitable analyzer (advantech board), de noise reduction elements, cooling system and pc was used for controlling the isfet electrode and various characteristic measurements. the t...
a frame semantic approach to the study of translating cultural scripts in salingers franny and zooey
the frame semantic theory is a nascent approach in the area of translation studies which goes beyond the linguistic barriers and helps us to incorporate cognitive and cultural factors to the study of translation. based on rojos analytical model (2002b), which centered in the frames or knowledge structures activated in the text, the present research explores the various translation problems that...
there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...
the present research was conducted to explore the effect of employing two language teaching approaches, i.e. schema-based instruction (sbi) and translation-based instruction (tbi), on vocabulary knowledge, structure and reading comprehension ability of forty one female students learning english in grade one senior high school in rivash, kuhsorkh, iran. while sbi focuses on schemata, i.e. words ...
abstract the present study is concerned with the syntactic deviation in hafezs poetry. poems are known to be accompanied with various linguistic deviations. these deviations may be phonological, morphological and/or syntactic. the relatively high frequency of the cases of the syntactic deviation in hafezs poems makes this rhetorical feature as a main characteristic of his poetry. this thesis, ...
in iran we already use laminate tubes only in cosmetics industry. laminate tube manufacturers via using the most modern technology of the world, faced with the laminate tube market being saturated in cosmetics industry for packaging the cosmetic creams and toothpaste. but considering the great food market and therefore laminate tube features such as beautiful packaging, ease of use for the fina...
abstract part one: the electrode oxidation potentials of a series of eighteen n-hydroxy compounds in aqueous solution were calculated based on a proper thermodynamic cycle. the dft method at the level of b3lyp-6-31g(d,p) was used to calculate the gas-phase free energy differences ,and the polarizable continuum model (pcm) was applied to describe the solvent and its interaction with n-hydroxy ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید