نتایج جستجو برای: this type of interaction between project
تعداد نتایج: 21545593 فیلتر نتایج به سال:
investigating the feasibility of a proposed model for geometric design of deployable arch structures
deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...
why some learners are willing to communicate in english, concurrently others are not, has been an intensive investigation in l2 education. willingness to communicate (wtc) proposed as initiating to communicate while given a choice has recently played a crucial role in l2 learning. it was hypothesized that wtc would be associated with language learning orientations (llos) as well as social suppo...
abstract the aim of this study was threefold: (1) to investigate the relationship between knowledge of semantic prosody and efl learners general language proficiency; (2) to examine the relationship between qualitative as well as quantitative knowledge of words, and (3) to compare the performance of efl learner on receptive and productive measures of semantic prosody. the study is based on a...
we have two part in this thesis, at first: the interaction of native calf thymus dna (ct-dna) with two anthraquinones including quinizarin (1,4- dihydroxy anthraquinone) and danthron (1,8- dihydroxy anthraquinone) in a mixture of 0.04 m brittone-robinson buffer and 50% of ethanol were studied at physiological ph by uv-vis absorption, florescence, circular dichroism spectroscopic methods, viscos...
the present study was concerned with exploring the frequency and linguistic focus of corrective feedback types given by novice and experienced female teachers working with young learners and compared it with those of elementary classes for adults. moreover, it aimed at measuring learners’ acknowledgement of teachers’ corrective feedback in the form of uptake in relation to linguistic coverage o...
in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...
we describe here a suitable approach for the synthesis of n-unsubstituted monocyclic b-lactams under mild reaction conditions by the annelation of imines with substituted acetylchlorides. in this method the reaily available phtalimidoacetyl chloride were allowed to react with - dibenzylideneiminotoluene (hydrobenzamide) in the presence of an equimolar amount of triethylamine in refluxing toluen...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
abstract this study evaluates the iranian pre-university english textbook in terms of needs, objectives, content, and methodology. the study was designed on the qualitative- quantitative survey basis using interviews and questionnaires, a researcher-made textbook evaluation checklist and a needs analysis questionnaire. the textbook evaluation questionnaire was used in this study to elicit the ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید