نتایج جستجو برای: theory can be named 32

تعداد نتایج: 5487765  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی علوم پایه زنجان - دانشکده فیزیک 1392

in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...

Journal: :journal of medical education 0
m ahmadi

background: there are two main methods employed for the evaluation of the reading comprehension ability of students of esp; one using specialized english texts, and the other with general english texts. purpose: to determine whether or not there is a correlation between the two methods.     methods: in the regular         competency for academic purposes.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم انسانی 1389

this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - پژوهشکده ادبیات 1389

the present study reports an analysis of response articles in four different disciplines in the social sciences, i.e., linguistics, english for specific purposes (esp), accounting, and psychology. the study has three phases: micro analysis, macro analysis, and e-mail interview. the results of the micro analysis indicate that a three-level linguistic pattern is used by the writers in order to cr...

Journal: :Journal of architecture,planning and environmental engineering 2023

In modern Japanese houses, there are many cases in which rooms connected by openings and creating a unique sense of space depth. We presented schematization analyzing method relationship between multilayered apertures using graph theory. Applying the to 32 we extracted partial connection relations nodes paths, were named gaze continuity graphs, created data about number each type. It was shown ...

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید