نتایج جستجو برای: the cvi coastal vulnerability index method is used for coastal vulnerability assessment to sea

تعداد نتایج: 19794390  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1390

abstract this study attempted to investigate the strategies used to translate clichés of emotions in dubbed movies in iranian dubbing context for home video companies. the corpus of the current study was parallel and comparable in nature, consisting of five original american movies and their dubbed versions in persian, and five original persian movies which served as a touchstone for judging n...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1389

abstract this study aimed at analyzing a corpus of emails gathered from iranian students studying in england. the corpus contained 996 emails that were investigated by employing the framework of chen (2006) to find common patterns in the discourse of these emails. another aim of the study was to find how two request acts (want statements and query preparatory) were used in the emails. the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده علوم انسانی 1392

this study investigated how group formation method, namely student-selected vs. teacher-assigned, influences the results of the community model of teaching creative writing; i.e., group dynamics and group outcome (the quality of performance). the study adopted an experimental comparison group and microgenetic research design to observe the change process over a relatively short period of time. ...

پایان نامه :0 1375

to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1392

gol-e-gohar iron ore mine of sirjan in southern part of iran is a large open pit that operates below the groundwater table and during mining operation, dewatering is required to prevent operation processes from flooding. current operation is going on by digging wells in or out of the pit and pumping to prevent flooding. as a result of the former dewatering operation a vast deep cone of depressi...

2017
Yi Ge Wen Dou Ning Liu

This research offers a new framework for assessing social vulnerability to climate change. A social vulnerability assessment trial was carried out for Chinese coastal cities at the county level. First, the 10 factors having the most influence on social vulnerability were identified. They are “House with no lavatory”, “House with no bath facilities”, “Employees in primary industry”, “Houses with...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1375

chapter two presents three m-admissible function algebras ab, bd, and sl, to construct the universal abelian, band, and semilattice compactifications, respectively. the main results are (11.3), (12.3), and (12.4). some inclusion relationships between these function algebras and the other well-known ones, presented in section 8, are made via the devico of compactifications. chpter three is about...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده تربیت بدنی علوم ورزشی 1391

the purpose of this study is to describe and determine the relationship between relationship marketing, customer satisfaction and intention to revisited in mashhad’s women aerobics clubs. to do this,300 randomly customers from women aerobic clubs were chosen and data was collected through kim relationship marketing questionnaire(2008) and ?=0.92, lim satisfaction questionnaire(2008) and ?=0...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...

Journal: :Ecological applications : a publication of the Ecological Society of America 2010
Sarah J Teck Benjamin S Halpern Carrie V Kappel Fiorenza Micheli Kimberly A Selkoe Caitlin M Crain Rebecca Martone Christine Shearer Joe Arvai Baruch Fischhoff Grant Murray Rabin Neslo Roger Cooke

As resource management and conservation efforts move toward multi-sector, ecosystem-based approaches, we need methods for comparing the varying responses of ecosystems to the impacts of human activities in order to prioritize management efforts, allocate limited resources, and understand cumulative effects. Given the number and variety of human activities affecting ecosystems, relatively few em...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید