نتایج جستجو برای: especially ṯolṯ and nastaʿlīq supplanted the earlier kufic and its variants in all but the essentially decorative repeat patterns in secondary positions there are no systematically recorded or analyzed collections of inscriptions for this period
تعداد نتایج: 27718798 فیلتر نتایج به سال:
abstract: advertisements are the most accessible type of authentic materials, and this is one reason why they are used more and more in english teaching classes. for this cause, studies in the field of advertisements are very widespread nowadays. for pun is one aspect which makes advertisements more interesting, it is used more than before in advertisements. use of puns makes an advertisement m...
writing an academic article requires the researchers to provide support for their works by learning how to cite the works of others. various studies regarding the analysis of citation in m.a theses have been done, while little work has been done on comparison of citations among elt scopus journal articles, and so the dearth of research in this area demands for further investigation into citatio...
calligraphy, as a prominent art incorporated into persian and islamic architecture, supplys messages and brings beauty to the eyes of the beholder. the most important messages in architecture are directly expressed by inscriptions. different types of inscriptions are shaped in the form of mosaic works, multiple painted patterns, tiles, bricks or plaster techniques. although in qajar period trad...
the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...
abstract pragmatics is the study of communicative action in its sociocultural context. communicative action includes not only using speech acts (such as apologizing, complaining, complimenting, and requesting), but also engaging in different types of discourse and participating in speech events of varying length and complexity. the present study aimed to investigate the assessment of pragm...
based on the latest records of typhlops vermicularis merrem, 1820 from iran, this species is distributed in the northern and southern regions of the country. in this study, new records of typhlops vermicularis are presented and it is shown that distribution range of this species is extended towards the eastern and western iran, and according to the new distribution map, it can be assumed that t...
according to cheng (1999), in recent esl/efl literature, asian (especially east asian) learners of english as a foreign/second language have been arguably reported as reticent and passive learners. the most common allegations are that these students are reluctant to participate in classroom discourse; they are unwilling to give responses; they do not ask questions; and they are passive and over...
the ability to speak two languages in the world is a remarkable achievement. there is a good reason to believe that bilingualism is the norm for the majority of people in the world because 70% of the earth’s population are supposed to be bilingual or multilingual. various investigations have shown that the native language impacts foreign word recognition, and this influence is adapted by the de...
all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید