نتایج جستجو برای: researchers and scientists are seeking to access only relevant and quality information that have mainly worthy of their attention nowadays
تعداد نتایج: 24838880 فیلتر نتایج به سال:
bserved by many teachers that most of the time, mumbling and searching for their intended words, students complain why they have forgotten the words they have learned in the previous semesters. they ask for some new ways that may help them to recall and apply the learned words more efficiently, since as they declare one of the most important skills in foreign language learning is having a g...
adolescents and young adults and their problems is an issue whose importance is obvious to anyone because youth are the founders of our countrys future and requires proper planning to be on leisure. given the importance of leisure,this study to investigate needs assessment and planning how adolescents and young adults spend their leisure time in urban of case study of high school girls and boys...
cognitive studies of translation process have recently been awarded a great deal of attention. there exists a psychological angle to almost all translation activities. the present study, thus, deals with analysing the relationships between iranian prospective translators tolerance for ambiguity (ta) and their willingness to translate (wtt). the research was conducted as a mixed methods study, d...
based on the latest records of typhlops vermicularis merrem, 1820 from iran, this species is distributed in the northern and southern regions of the country. in this study, new records of typhlops vermicularis are presented and it is shown that distribution range of this species is extended towards the eastern and western iran, and according to the new distribution map, it can be assumed that t...
we have devided the thesis in to five chapters. the first recollects facts from purely algebraic theory of jordan algebras and also basic properties of jb and jb* - algebras which are needed in the sequel. in the second chapter we extend to jb* - algebras, a classical result due to cleveland [8]. this result shows shows the weakness of jb* - norm topology on a jb* - algebera. in chapter three, ...
the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...
with the introduction of communicative language teaching, a large number of studies have concerned with students’ oral participation in language classrooms. although the importance of classroom participation is evident, some language learners are unwilling to engage in oral activities. this passivity and unwillingness to participate in language classroom discussions is known as “reticence”. rev...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
efl/esl textbooks have been regarded as essential language teaching materials with which the learners spend about 70 up to 90 percent of their class time. the important role they play and their vast use make them not only influential in learning the language but also in shaping values and attitudes. put it another way, textbooks socialize learners using their contents (i.e. texts, illustrations...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید