نتایج جستجو برای: and supercritical water technology has gained lots of attention in recent years in this research paper the application of subcritical and supercritical water technology for destruction of pharmaceutical compounds carbamazepine
تعداد نتایج: 27287778 فیلتر نتایج به سال:
in this thesis, a new optically active poly(amide-imide) (pai) was synthesized by the indirect polycondensation reaction of the l-phenylalanine based diacid chloride and 4,4?-diaminodiphenylether in the presence of triethylamine in n-methyl-2-pyrrolidone. the formation of pai was confirmed by ftir, 1h nmr and elemental analysis. in next step, the surface of titanium dioxide (tio2) nanoparticles...
teachers’ beliefs greatly influence their performance in the classroom, their choice of instructional strategies, their way of controlling the class, their dealing with the students, and their general goals and objectives. one of these beliefs is teachers’ sense of efficacy which is viewed as an important construct and has shown to be positively correlated with students’ achievement (ross, 1992...
in this thesis, first the notion of weak mutual associativity (w.m.a.) and the necessary and sufficient condition for a $(l,gamma)$-associated hypersemigroup $(h, ast)$ derived from some family of $lesssim$-preordered semigroups to be a hypergroup, are given. second, by proving the fact that the concrete categories, semihypergroups and hypergroups have not free objects we will introduce t...
in this thesis, a structured hierarchical methodology based on petri nets is used to introduce a task model for a soccer goalkeeper robot. in real or robot soccer, goalkeeper is an important element which has a key role and challenging features in the game. goalkeeper aims at defending goal from scoring goals by opponent team, actually to prevent the goal from the opponent player’s attacks. thi...
the purpose of this two-phase, sequential mixed methods study was to find out whether there were any decencies between male and female ma students’ theses regarding the common features of academic writing such as syntactic complexity, means of integrating cited information, and organizing arguments. i chose 10 male written theses and 15 female written theses in tefl and linguistics. in the firs...
reinsurance is widely recognized as an important instrument in the capital management of an insurance company as well as its risk management tool. this thesis is intended to determine premium rates for different types of reinsurance policies. also, given the fact that the reinsurance coverage of every company depends upon its reserves, so different types of reserves and the method of their calc...
according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...
despite the different criticisms on contrastive analysis it has been proved that the results of it(when processed) can be useful in a tefl environment, specially at the level of phonology.this study is an attempt to compare and contrast the sound systems of kurdish and english for pedagogical aims.the consonants,vowels,stress and intonation of the two languages are described by the same model...
in this article, we have focused one some basic and productive information about the properties of spectrum and singular values related to compact operators which are ideals in a c*-algebra of bounded operators. considering a two-sided connection between the family of symmetric gauge functions on sequence of singular values of compact operators and symmetric norms on finite dimensional ope...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید