نتایج جستجو برای: é ahmad

تعداد نتایج: 42110  

Journal: :دراسات الادب المعاصر 0
عارف خصافی طالب الماجستیر فی جامعة آزاد الإسلامیة، آبادان. علی سپهیار طالب الماجستیر فی جامعة آزاد الإسلامیة، آبادان. سهاد جادری عضو هیئة التدریس فی جامعة آزاد الإسلامیة، آبادان(استاذ مساعد).

abu ahmad askari - the scholar, philologist and hadith teller - was living in askar makram city that unfortunately this city and his literary works have lost. he wished to meet the scientist – saheb ibn abad. but why the works of abu ahmad and his hometown scientists were lost while they caused the progress of literature especially in elementary literary criticism and created a dam against the ...

Journal: :JOURNAL OF INDIAN AND BUDDHIST STUDIES (INDOGAKU BUKKYOGAKU KENKYU) 1982

Journal: :Ri'ayah: Jurnal Sosial dan Keagamaan 2021

Journal: :Optimization Letters 2008
Z. Husain Izhar Ahmad

In this paper, we point out some inconsistencies in the earlier work of Ahmad and Husain (Appl. Math. Lett. 18, 721–728, 2005), and present the correct forms of their strong and converse duality theorems.

2015
Akram Ahmad Muhammad Umair Khan Lakhya Jyoti Gogoi Manabendra Kalita Atul Prasad Sikdar Sureshwar Pandey Sameer Dhingra

Copyright: © 2015 Ahmad et al. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

2008
ROKKAM MADHAVI

The monorchiid trematode Huridostomum formionis Mamaev, 1970 originally described from the black pomfret, Apolectus niger, from the Gulf of Tonkin by Mamaev (1970) is redescribed based on material collected from the same host from the Visakhapatnam coast, Bay of Bengal. The redescription provides additional information on the arrangement of the enlarged spines on the anterodorsal region of the ...

2007
Neil Cooke Lee Gillam Ahmet Kondoz

This paper presents the use of corpus linguistics techniques on supposedly “clean” corpora and identifies potential pitfalls. Our work relates to the task of filtering sensitive content, in which data security is strategically important for the protection of government and military information, and of growing importance in combating identity fraud. A naïve keyword filtering approach produces a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید