نتایج جستجو برای: each containing ten chapters ibadat acts of worship
تعداد نتایج: 21191801 فیلتر نتایج به سال:
according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...
چکیده یکی از مهمترین دغدغه های بزرگ جوامع بشری، از دیر باز تا کنون که ذهن پژوهشگران و متخصصان بهداشت روانی و اجتماعی و دولتها رابه خود مشغول داشته، مسأله ی بزهکاری می باشد. شناخت کامل پدیده ی بزهکاری و بزهکار، علل وعوامل سقوط یک انسان، چگونگی درمان وی و درنهایت پیشگیری ازبزهکاری ودریک کلام سالم سازی یک جامعه، رسالت عظیم، انسانی ومقدسی می باشد که با بررسی شخصیت مجرم یعنی[ انسانی که تحت شرای...
the purpose of this study was to investigate iranian efl learners’ beliefs about the role of rote learning (rl) in vocabulary learning strategies; besides, the study examined if english proficiency would influence learners’ vocabulary learning strategy use. this study addresses the need for a clear understanding of the role of rl in efl vocabulary learning by looking at iranian efl learners’ ow...
The book ('Slovenian Writers and Imperial Censorship in the Long Nineteenth Century') summarizes results of three years research which members project group from institutions (ZRC SAZU, UL UNG) collaborated with invited specialists on individual censorship topics. From perspective censorship, “long nineteenth century” was extremely dynamic. During this period, is symmetrically divided into two ...
introduction acetic acid bacteria are large group of obligate aerobic gram negative bacteria with the ability to oxidize ethanol to acetic acid (1). they are widely distributed in natural habitats and classified in family acetobacteraceae. members of this family are useful in industrial production of vinegar(2). acetic acid bacteria (aab) can use substrates as glucose, ethanol, lactate or glyc...
Introduction: Increasing the level of social welfare with access the poor to order and security, education and health services, social security, increase the capacity of the economy in the chapters of agriculture, water and electricity, industries and mines, business, energy, transportation, information technology is possible. Meanwhile, the extent of government presence in how public policies ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
This month, as the surest route to public embarassment, I decided to write about scientific heroes. Today’s world is full of talk of mentoring. Graduate students are told to find supervisors who will intellectually nourish them, emotionally support them, and teach them networking and grantspersonship. As I tap away, I can almost hear Uncle Syd muttering that the world is going to the dogs. In h...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید