نتایج جستجو برای: explicit criminalization of forced pregnancy as crime against humanity and war crime has been the first attempt of international criminal law that with the recognition of broad range of gender
تعداد نتایج: 25848441 فیلتر نتایج به سال:
there is less published research about how teachers in efl contexts respond to students who are relatively less mature and less competent l2 writers. while writing researchers have examined various issues concerning peer and teacher response in writing-oriented classes, little research has centered on the effect of collaborative tasks particularly dictogloss on writing skills. output collaborat...
it is definitely necessary to understand the concept and behavior of causation of life insurance policies and its determinants for insurance managers, regulators, and customers. for insurance managers, the profitability and liquidity of insurers can be increasingly influenced by the number of causation through costs, adverse selection, and cash surrender values. therefore, causation is a materi...
abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...
in this thesis, first the notion of weak mutual associativity (w.m.a.) and the necessary and sufficient condition for a $(l,gamma)$-associated hypersemigroup $(h, ast)$ derived from some family of $lesssim$-preordered semigroups to be a hypergroup, are given. second, by proving the fact that the concrete categories, semihypergroups and hypergroups have not free objects we will introduce t...
to discuss my point, i have collected quite a number of articles, anthologies, and books about "wuthering heights" applying various ideas and theories to this fantastic story. hence, i have come to believe that gadamer and jauss are rightful when they claim that "the individaul human mind is the center and origin of all meaning," 3 that reading literature is a reader-oriented activity, that it ...
abstract in first part of this project, the use of a new and biguanid-like catalyst supported on silica as a recyclable catalyst provides a new route for the synthesis of a variety of arylalkylidene rhodanine derivatives through knoevenagle reaction in at present of solvent at room temperature. rhodanine derivatives and especially arylalkylidene rhodanines have proven to be attractive compound...
this study investigated (a) the learners’ existing reading strategy repertoire, (b) the effect of instruction in reading strategies on learners’ strategic performance, and (c) the effect of explicit instruction in top-down reading strategies on reading comprehension ability of intermediate learners. the study was conducted with 40 intermediate efl learners in two groups of experimental and cont...
today, the route for economic development in most countries is the same as international open competitive economy. economic institutes well known that supportive public economy belonged on the past and they may compete in the global economy. it is obvious that if they have no competitive potency or not familiar with competition technique, they may be devastated. banking system aims to collect t...
abstract lexical knowledge of complex english words is an important part of language skills and crucial for fluent language use (nation, 2001). the present study, thus, was an attempt to assess the role of morphological decomposition awareness as a vocabulary learning strategy on learners’ productive and receptive recall and recognition of complex english words. so 90 sophomores (female and ma...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید