نتایج جستجو برای: using religious characters and issues left obvious impression among poems of muslim poetscontemporary persian and arabic poets tried to use religious characters in their poems this researchis analyzed existent religious characters in poems of contemporary persian and arabic poets means nazik al
تعداد نتایج: 26662439 فیلتر نتایج به سال:
abstract the problems caused by the traditional system of criminal justice (which are based on remuneration and rehabilitation) such as, lack of attention to victim’s rights and position and society, underlie the emergence of restorative justice which had the victim-centered perspective, with respect to the role of the offender and participation of civil society. meanwhile, criminal mediation ...
this thesis aims to adduce an unmitigated and comprehensive explication concerning the relationship of three significant elements of fiction: setting, chracter and theme. my research is basically placed on two outstanding novels of the 19th century: emily brontes wuthering heights and thomas hardys return of the native. my endeavour lies in studying the correlation among the three above-mention...
plagiarism in esl/efl learning contexts has been established as a dynamic and multi-layered phenomenon and has become a topic engaging many researchers in a heated debate in recent years. comparisons of student-generated texts with their source texts have shown that students rely on source texts in their writings and copying is a major strategy used by both l1 and l2 writers. in our country a...
1.0 overview it seems that grammar plays a crucial role in the area of second and foreign language learning and widely has been acknowledged in grammar research. in other words, teaching grammar is an issue which has attracted much attention to itself, and a lot of teachers argue about the existence of grammar in language teaching and learning. this issue will remind us a famous sentence f...
this study attempted to explore if teaching english collocations through two different modes of awareness-raising and input flooding has any possible differential effect on immediate retention as well as retention in a delayed assessment. it also compared the possible differential effect of teaching english collocations implicitly and explicitly on actively using the items in writing. m...
abstract al- muntazam by ibn al -jawzi is one of the greatest the book ancient book of texts on history of islam in the 6th century.it is very important one;because of including rare reports which are not found any where.in addition to historical reports,his outlook , in which embodies information on mythologies, milal wa nihal (sects and creeds), geography, and political, social and religiou...
the present study was carried on to investigate the use of face-keeping strategies in reaction to complaints by male and female in two different cultures, persian and american english. to see if apology strategies are affected by cultural, contextual preferences and gender of interlocutors in two distinct languages of persian and american english. the hypotheses to be tested were 1) ifids, acce...
ii abstract the legend of human being’s refulgence was distorted completely in the age of modernity. this new age, had some drastic negative effects, besides its positive qualities. one significant negative effect of it was the emergence of neurosis in human beings. aldous huxley’s brave new world was one of the novels of the 02 th century that contained the prophecy of criticizing ...
the present study sought to investigate the impact of using mind-mapping technique instruction on female elementary efl learners reading comprehension; it also investigated their attitudes towards using mind-mapping technique as a tool to improve their reading comprehension. this study followed a quasi-experimental design with two intact groups as experimental, and control groups. the participa...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید