نتایج جستجو برای: commercial paper is an unsecured
تعداد نتایج: 9381464 فیلتر نتایج به سال:
chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...
abstract the purpose of this study is twofold: on the one hand, it is intended to see what kind of noticing-the –gap activity (teacher generated vs. learner generated) is more efficient in teaching l2 grammar in classroom language learning. on the other hand, it is an attempt to determine which approach of the noticing-the-gap- activity is more effective in the long- term retention of grammar...
the construct of self-efficacy has received increasing attention in research over the past two decades. many studies have been carried out 1.3 significance of the study this study has pedagogical implications since improving students’ self- efficacy and autonomy is important for promoting actual performance on classroom academic tasks. in academic settings, it has been shown that self-effi...
the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the networ...
the purpose of the research is to examine if integrating cooperative learning into vocabulary learning helps to increase word recognition of students in an elementary school in iran. it tries to investigate whether cooperative learning approach enables students to improve their language learning. this research used stad (students team achievement division) as a cooperative model in this study. ...
this thesis seeks to present a critical reading of virginia woolf’s mrs. dalloway and michael cunningham’s the hours in terms of an intertextual approach, concentrating on dialogic imagination, negativity, transposition and allusion. this study attempts to evaluate cunninghams perception of woolfs life and work by adopting kristevas conception of intertextuality and her consideration of the hou...
We use a heterogeneous-agent model, in which labor income is risky and markets are incomplete, to analyze consumer debt portfolios of secured and unsecured debt in the US. Compared with previous research, we emphasize the role of durables which not only generate utility but also serve as debt collateral. This allows a meaningful joint analysis of secured and unsecured debt and introduces endoge...
Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the networ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید