نتایج جستجو برای: why and how the use and evolution of swastika designs in islamic architecture has been studied this motif is one of the beautiful designs used in pre
تعداد نتایج: 26701013 فیلتر نتایج به سال:
abstract since heubners (1985) pioneering study, there have been many studies on (mis) use/ non-use of articles by l2 learners from article-less and article languages. the present study investigated how persian l2 learners of english produce and interpret english definite descriptions and demonstrative descriptions. it was assumed that definite and demonstrative descriptions share the same cen...
abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...
learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...
flow in natural river bends is a complex and turbulent phenomenon which affects the scour and sedimentations and causes an irregular bed topography on the bed. for the reason, the flow hydralics and the parameters which affect the flow to be studied and understand. in this study the effect of bed and wall roughness using the software fluent discussed in a sharp 90-degree flume bend with 40.3cm ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
abstract this research is about a longitudinal case study of english morpheme acquisition by a persian speaking child l2 learner of english (2 .9-3).the goal of this research has been discovery of the child ‘s ability in acquiring of english morphemes in a persian context while only one person (the child’ s father)has been talking to her.this child has also been exposed to english languag...
abstract: in the paper of black and scholes (1973) a closed form solution for the price of a european option is derived . as extension to the black and scholes model with constant volatility, option pricing model with time varying volatility have been suggested within the frame work of generalized autoregressive conditional heteroskedasticity (garch) . these processes can explain a number of em...
the purpose of this study was to investigate the relationship between family functioning and marital adjustment humor couples are due to the nature and objectives of the research and application of methods for its implementation correlation was used. the study population consisted of all the couples in the city who uses random cluster sampling of 200 students were selected as sample. data from ...
now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید