نتایج جستجو برای: eg concealing or distorting the truth
تعداد نتایج: 16212564 فیلتر نتایج به سال:
the purpose of the present study was to investigate the latent pattern underlying reading ability . some 272 male and female participants. english majors at the ba level , participated in the study. two valid tests were used in this study, the reading test developed exclusively for the purpose of this project and academic reading section of ielts. to investigate the possible latent underlying...
this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...
in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...
The research background is "On the Essence of Truth", a monograph on philosophical by famous German philosopher Heidegger, which compiled from his lecture notes. Its main content that Heidegger gave own answer to question essence truth studying works ancient Greek Plato, especially "Reign" and "Theaetetus".The goal this paper try reveal core Nature Truth" freedom, freedom reveals itself as Bein...
this thesis deals essentially (but not from all aspects) with the extension of the notion of semigroup compactification and the construction of a general theory of semitopological nonaffine (affine) transformation semigroup compactifications. it determines those compactification which are universal with respect to some algebric or topological properties. as an application of the theory, it is i...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
Though James Lind is renowned as a pioneer of the clinical trial, he records the 1747 trial aboard the Salisbury in passing, never followed up on it, never campaigned for clinical trials as a means of medical discovery, and eventually pronounced scurvy an insoluble enigma. The case can be made that in confessing his lack of an unfailing remedy for scurvy and his trouble making sense of the dise...
since esp received universal attention to smooth the path for academic studies and productions, a great deal of research and studies have been directed towards this area. swales’ (1990) model of ra introduction move analysis has served a pioneering role of guiding many relevant studies and has proven to be productive in terms of helpful guidelines that are the outcome of voluminous productions ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید