نتایج جستجو برای: and directions for further research

تعداد نتایج: 19146896  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...

Journal: : 2023

This article is presented in form of a current literature review on bacterial complications the early post-liver transplantation period and promising areas for studying effect flora patients after liver transplantation. The paper describes problem emergence, spread, pathogenesis various complications, as well concepts complication’s impact results ventilatorassociated pneumonia are given. A the...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1392

this thesis examines the significances and implications of inflicted physical pain in waiting for the barbarians (1980) by john maxwell coetzee (1940 - ). the researcher tries to show how body becomes a site for exercising violence. in this way, the government’s representatives turn bodies of the barbarians into blank pages through torturing in order to create the truth of the empire. in this p...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم انسانی 1389

abstract this study evaluated and compared medical terminology and english for the students of medicine (ii) as two representatives of the textbooks available on the iranian market for teaching english to the students of medicine. this research was performed on the basis of a teacher’s and a number of students’ attitudes and the students’ needs analysis for two reasons: first, to investigate...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

even though, to date, a lot of studies have been conducted on the subject of politeness theory, there are very few studies regarding the applicability of this theory to translation between english and persian which shows the reason behind conducting the present study. this study was carried out with the aim of highlighting whether there is any difference between english and persian methods of u...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1389

the current study examined iranian undergraduate efl students’ willingness to communicate with regard to their vocabulary knowledge. in general, participants were somewhat willing to communicate in english. the total mean score of 730 university students’ perception of willing to communicate was 83.53 out of 135. results, regarding four parts of willingness to communicate, revealed that part...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید