نتایج جستجو برای: all dimensions of e
تعداد نتایج: 21694847 فیلتر نتایج به سال:
in this research we have studied the effect of some transition-metals (cu, ag and au) substitutions on two-electron reduction potential of flavins by application of dft method. all geometries have been optimized at blyp level of theory and “6-31+g** + lanl2dz” mixed basis set. the frequency job at the same method and basis sets has been performed to obtain gibbs free energy of compounds. it h...
abstract this study aimed at investigating the effect of bilingual teaching of cognate words (persian-english) on iranian upper intermediate efl learners’ knowledge of lexical development. for this purpose,100 subjects participated in this study out of which 40 learners were selected for this study and they were assigned into two groups, control and experimental. cross-language cognates (wor...
a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...
information technology has been considered the greatest innovation of the new era because it has a lot of fruitful social economic and scientific impacts. e-marketing joins creative and technical aspects of the internet, including: design, development, advertising and sales. this research aims to design an e-marketing framework by using meta-synthesis method. in order to design and explain a co...
this thesis attempts to measure learning styles, self efficacy and intrinsic motivation as predictors of iranian ielts reading comprehension. in order to address this issue, a quantitative study was conducted on some randomly selected intact students at ferdowsi university. these two groups were assigned as they were undergraduate (ba=91) and graduate (ma =74) students; they were all aged betwe...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
A combination of state-of-the-art temporal and spatial shaping techniques enables pulsed laser light in all dimensions a correlated manner, paving the way for new classes on-demand space–time wavepackets.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید