نتایج جستجو برای: we concentrate on its different types in maqamat
تعداد نتایج: 19362199 فیلتر نتایج به سال:
hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...
abstract nowadaysphotovoltaic solar cells (pvs) areacknowledged the fastest growing energy technology in the word, however, they only account for only fraction of current global renewable energy capacity. it isrecognized that this incomplete market penetration has been largely a result of the technology’sexcessive cost. so researchers are trying to find innovative, economic way with theaim of ...
the outcome of this research is a practical framework for “idea generation phase of new product development process based on customer knowledge”. in continue, the mentioned framework implemented in a part of iran n.a.b market and result in segmenting and profiling this market. also, the critical new product attributes and bases of communication message and promotion campaigns extracted. we have...
the images of muslims in media, literature and politics have been mostly black and white portrayals of a people alien to modernity, civilization, rationality and pluralism. since the end of the cold war and the onset of deadly terrorist attacks in different areas of the world, especially in the united states, these representations show a palpable difference: muslims are represented not only as ...
from historical facts to geo-political realities: relation between turkey and armenia ( 1915 – 2010)
armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...
for several years, researchers in familiarity of efl teachers with post-method and its role in second and foreign language learners’ productions have pointed out that the opportunity to plan for a task generally develops language learners’ development (ellis, 2005). it is important to mention that the critical varies in language teaching was shown is the disappearances of the concept of method ...
during natural gas processing, water in natural gas may cause to hydrates formation in pipelines which may lead to serious damages to process equipments. given the problems raised by present of water in natural gas, glycol solvent uses to remove water.in contact of glycol with gas always an amount of btex and voc absorb along with water, which on glycol recovery process, these substances separa...
in this thesis, we consider a mathematical model of cancer with completely unknown parameters. we study the stability of critical points which are biologically admissible. then we consider a control on the system and introduce situations at which solutions are attracted to critical points and so the cancer disease has auto healing. the lyapunov stability method is used for estimating the un...
1. to determine whether difference in birth body mass influenced growth performance in pipistrellus kuhlii we studied a total of 12 captive-born neonates. bats were assigned to two body mass groups: light birth body mass (lbw: 0.89 ± 0.05, n=8) and heavy birth body mass (hbw: 1.35 ± 0.08, n=4). heavier body mass at birth was associated with rapid postnatal growth (body mass and forearm length) ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید