نتایج جستجو برای: theory can be named 32
تعداد نتایج: 5487765 فیلتر نتایج به سال:
in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...
background: there are two main methods employed for the evaluation of the reading comprehension ability of students of esp; one using specialized english texts, and the other with general english texts. purpose: to determine whether or not there is a correlation between the two methods. methods: in the regular competency for academic purposes.
study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour
this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...
the present study reports an analysis of response articles in four different disciplines in the social sciences, i.e., linguistics, english for specific purposes (esp), accounting, and psychology. the study has three phases: micro analysis, macro analysis, and e-mail interview. the results of the micro analysis indicate that a three-level linguistic pattern is used by the writers in order to cr...
In modern Japanese houses, there are many cases in which rooms connected by openings and creating a unique sense of space depth. We presented schematization analyzing method relationship between multilayered apertures using graph theory. Applying the to 32 we extracted partial connection relations nodes paths, were named gaze continuity graphs, created data about number each type. It was shown ...
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید