نتایج جستجو برای: which the compositions and methods tailored to the tragic and sad polluted environment has benefited although poverty in nabatieh may keep him from addressing social problems and it has been modified
تعداد نتایج: 25047258 فیلتر نتایج به سال:
during natural gas processing, water in natural gas may cause to hydrates formation in pipelines which may lead to serious damages to process equipments. given the problems raised by present of water in natural gas, glycol solvent uses to remove water.in contact of glycol with gas always an amount of btex and voc absorb along with water, which on glycol recovery process, these substances separa...
ibn nabatah, one of the most popular poets in the mamluk period is compared with his contemporaries. in most issues, language is open to complain in his poems on various subjects, such as life, death, poverty and infectious diseases investigated note this article explains ibn nabatah poverty in food, housing, clothing and supplies, which the compositions and methods tailored to the tragic and s...
abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
in the name of allah , the compassionate the merciful abstract shath ( blasphemic utterace made during spiritual ) is a complicated concept that deserves reflection in gnosticism and sufism ( mysticism ) and estem and westem scholars have alwaya paid attention to it. although principal essence of gnostic belief is the holy divine law ,gnosticism has pure and unique thoughts . by glancing at t...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
the present study has tried to accomplish an analysis of margaret atwood’s novels oryx and crake, and the year of the flood in the light of posthuman and cyborg theories. considering posthumanism as a critical reading of some notions of humanism focus of which in this thesis has been identity, new definitions for humanity and human identity are formed. haraway’s cyborg, as one possible new figu...
1.0 overview it seems that grammar plays a crucial role in the area of second and foreign language learning and widely has been acknowledged in grammar research. in other words, teaching grammar is an issue which has attracted much attention to itself, and a lot of teachers argue about the existence of grammar in language teaching and learning. this issue will remind us a famous sentence f...
why some learners are willing to communicate in english, concurrently others are not, has been an intensive investigation in l2 education. willingness to communicate (wtc) proposed as initiating to communicate while given a choice has recently played a crucial role in l2 learning. it was hypothesized that wtc would be associated with language learning orientations (llos) as well as social suppo...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید