نتایج جستجو برای: net calls reduces as mobile operators charge a premium for off

تعداد نتایج: 16508969  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات 1391

this study investigated the effects of three kinds of gloss conditions, that is traditional non-call marginal gloss, audio gloss, and extended audio gloss, on reading comprehension and vocabulary gain of iranian upper- intermediate efl learners. to this end, three experimental and one control groups, each comprising 15 participants, took part in the current study. in order to ensure that the pa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده ادبیات و علوم انسانی 1391

1.1 introduction “i see translation as the attempt to produce a text so transparent that it does not seem to be translated. a good translation is like a pane of glass. you only notice that it’s there when there are little imperfections- scratches, bubbles. ideally, there shouldn’t be any. it should never call attention to itself.” “norman shapiro” (venuti, 1995:1) edward fitzgerald is the br...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده ادبیات و علوم انسانی 1392

the purpose of this study is to investigate and explore the causes of identity crisis as one of the debilitating consequences of colonial project after the withdrawal of colonial power. in order to do justice to the full-length severity of displacement that was the fruit of indentureship, v. s. naipauls west indian epic, a house for mr biswas, has been scrutinized with the main focus being the ...

Journal: :journal of mining and environment 2012
p. masoudi b. tokhmechi a. zahedi m. ansari jafari

distinguishing productive zones of a drilled oil well plays a very important role for petroleum engineers to decide where to perforate to produce oil. conventionally, net pay zones are determined by applying a set of cut-offs on perophysical logs. as a result, the conventional method finds productive intervals crisply. in this investigation, a net index value is proposed, then; diffusivity equa...

Journal: :journal of artificial intelligence in electrical engineering 0

the ability to discover services in mobile ad hoc network (manet) is a major prerequisite. cluster basedcross layer intelligent service discovery for manet (cbisd) is cluster based architecture, caching ofsemantic details of services and intelligent forwarding using network layer mechanisms. the cluster basedarchitecture using semantic knowledge provides scalability and accuracy. also, the mini...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1389

the purpose of this study is to investigate the relationships between teachers’ immediacy behaviors and iranian students’ willingness to talk in english classes. analysis of the results from willingness to talk scale represents a relatively high level of willingness to talk in english classrooms among iranian language learners. the total mean score of students’ willingness to talk was 66.3 ou...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید