نتایج جستجو برای: in this study the environmental problems has been studied in south east of tehran bibi shahrbanou mount 31 sediment samples were taken from 10
تعداد نتایج: 25745854 فیلتر نتایج به سال:
abstract this study aimed at analyzing a corpus of emails gathered from iranian students studying in england. the corpus contained 996 emails that were investigated by employing the framework of chen (2006) to find common patterns in the discourse of these emails. another aim of the study was to find how two request acts (want statements and query preparatory) were used in the emails. the...
after test and review results and analysis of farm data, the following results were obtained. the review examined farms was done and the results obtained in this study was to determine the effectiveness of vaccines hatchpak avinew (frozen) and hatchpak ib h120 with spray in broilers a day in factories incubation and at least,they can be as vaccines avinew and bioral h120 ability to create saf...
this thesis aims at putting together two of the vestest areas of study there is in humanities: bioethics and literature. the two novels in question, oryx and crake and the year of the flood, are considered as some of the most succssful examples of spculative fiction. in these novels the biological and environmental issues raised as looked at from a bioethics point of view.
abstract global financial crisis has created too many problems in relations among governments. among these problems, the issue of global monetary management, more than every time in the past four decades, has been moved in the center of international economic attentions. a problem which is specially known with the monetary hostility between united states and public republic of china. where ar...
in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...
within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...
this study was conducted to investigate the effect of favorite-text on iranian intermediate efl learners’ vocabulary development. sixty learners from nour-al-mahdi english institute participated in the present study. having been homogenized by oxford placement test (opt), they were randomly assigned into two groups of 30, control and experimental. then both groups sat for a pre-test which was a...
sange siyah dam is located two kilometers down the kabod khani village. the environ of ghorrve city in kurdestan province. this is an clay core dam. in this dam instrumentation is performed in three section and consist of electrical piezometers, total pressure cells, settlement cells and so on. the main objective of instrumentation is to control the behavior of dam body and foundation, end else...
abstract in written mode of language, metadiscourse markers are used commonly to help writers in general and academic writers in particular to produce coherent and professional texts. the purpose of the present study was to compare introduction sections of applied linguistics and physics articles regarding their use of interactive and interactional metadiscourse markers based on the model pro...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید