نتایج جستجو برای: the right of withdrawal in these two

تعداد نتایج: 25338236  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی شیمی 1391

attempts have been made to study the thermodynamic behavior of 1,3 butadiene purification columns with the aim of retrofitting those columns to more energy efficient separation schemes. 1,3 butadiene is purified in two columns in series through being separated from methyl acetylene and 1,2 butadiene in the first and second column respectively. comparisons have been made among different therm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه دریانوردی و علوم دریایی چابهار - دانشکده مدیریت 1393

within communicative, interactive, and learner-centered framework of language teaching and learning, students need to learn four skills of listening, speaking, reading, and writing for their educational success. but of all the language skills, reading enjoys a paramount significance in so many second or foreign language academic contexts. in spite of its importance, language learners still have...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1388

abstract the present study was conducted to examine the effect of proficiency on students interaction while carrying out the grammar-based task(s) in collaboration. in particular, the study examines whether the level of proficiency affects the learners’ focus of attention to grammatical and lexical features. the study takes a further step and examines whether there is any difference in the use...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1390

section{introduction} the concept of {sl cartan geometry} appeared at the beginning of the twentieth century, when {e}lie cartan was working on the so-called {sl equivalence problem}, the aim of which is to determine whether two given geometric structures can be mapped bijectively onto each other by some diffeomorphism. this problem can be considered in many different contexts, such as ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده علوم انسانی 1389

abstract amino acids are building blocks of proteins, and play a vital role in living beings existence and their functionality. the interaction of these compounds with metal ions is of great importance to biochemists, and chemists, because their functions can be utilized as a model in understanding enzymes mechanism for transport of metal ions to tissues. among twenty essential amino acids w...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1382

‏‎the main purpose of this research was to:1.develop a coking model for thermal cracking of naphtha.2.study coke inhibition methods using different coke inhibitors.developing a coking model in naphtha cracking reactors requires a suitable model of the thermal cracking reactor based on a reliable kinetic model.to obtain reliable results all these models shall be solved simultaneously.for this pu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

this study compared the different effects of form-focused guided planning vs. meaning-focused guided planning on iranian pre-intermediate students’ task performance. the study lasted for three weeks and concentrated on eight english structures. forty five pre-intermediate iranian students were randomly assigned to three groups of guided planning focus-on-form group (gpfg), guided planning focus...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1385

the present study was carried on to investigate the use of face-keeping strategies in reaction to complaints by male and female in two different cultures, persian and american english. to see if apology strategies are affected by cultural, contextual preferences and gender of interlocutors in two distinct languages of persian and american english. the hypotheses to be tested were 1) ifids, acce...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید