نتایج جستجو برای: the mine vulnerability and seismic risk for this site
تعداد نتایج: 22673083 فیلتر نتایج به سال:
in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...
to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...
abstract venlafaxine, 1–[2–(dimethylamino)–1–(4–methoxyphenyl) ethyl]cyclohexanol hydrochloride is a novel non-tricyclic antidepressant. venlafaxine is a second generation antidepressant drug, has a neuropharmacologic profile distinct from that of existing antidepressants including tricyclic compounds, selective serotonin reuptake inhibitors and monoamine oxidase inhibitors. venlafaxine impart...
abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...
due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
abstract due to the growing importance and influence of the self of the teacher in the field of educational and cognitive psychology, the current study intended to investigate the relationship between three teacher qualities and characteristics, i.e. teacher self efficacy, self regulation, and success as perceived by their learners. the study aimed at finding whether teacher self efficacy an...
this research is a study on indicators of listening instruction in iranian english as a foreign language (efl) curriculum at guidance school and high school educational levels. this thesis aims at determining: a) the indicators of listening instruction at guidance school and high school efl curriculum. b) the indicators of listening instruction in irans guidance school and high school efl curri...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید