نتایج جستجو برای: to estimate the vulnerability by contamination

تعداد نتایج: 18254821  

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1389

abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1394

abstract previous studies on willingness to communicate (wtc) have shown the influence of many individual or situational factors on students’ tendency to engage in classroom communication, in which wtc has been viewed either at the trait-level or situational level. however, due to the complexity of the notion of willingness to communicate, the present study suggests that these two strands are ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1389

abstract this study aimed at analyzing a corpus of emails gathered from iranian students studying in england. the corpus contained 996 emails that were investigated by employing the framework of chen (2006) to find common patterns in the discourse of these emails. another aim of the study was to find how two request acts (want statements and query preparatory) were used in the emails. the...

پایان نامه :0 1374

this thesis is going to delineate the concept of the reader as implied in 18th century literary theory; based on the study of the major reader oriented elements of criticism of the age-taste, the sublime, and aesthetic pleasure-its aim is to explain what sott of reader is implied and what kind of response on the part of the reader is proposed in 18th century english literary theory and aestheti...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده ریاضی 1390

the main objective in sampling is to select a sample from a population in order to estimate some unknown population parameter, usually a total or a mean of some interesting variable. a simple way to take a sample of size n is to let all the possible samples have the same probability of being selected. this is called simple random sampling and then all units have the same probability of being ch...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

after the soviet union dissolution, a chaotic period was begun in the russia. russia lost its glory and felt disgrace. the first group of elites came to power under yeltsin; they tried to re-define russia’s identity as a european country and build a foreign policy on this baseline. therefore russia tried to become closer with the west especially with the u.s. according to their view the sovie...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و زبانهای خارجی 1390

the present paper offers a postcolonial reading of two of the best novels by v. s. naipaul – half a life and the mimic men – in five chapters. the focus of this research is on different notions of postcolonial criticism and their application on the two novels as discussed from homi bhabha’s and frantz fanons points of view. having introduced the life and literary career of v. s. naipaul in th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه پلیمر و پتروشیمی ایران - پژوهشکده پتروشیمی 1389

this is an original study on the effect of a polyisobutylene – polydimethylsiloxane (pibpdms) block copolymer modifier used as an interfacial active agent on the dynamics behaviour of single newtonian drops suspended in a polyisobutylene (pib) newtonian matrix. the results were divided in two sections. the first part included the experiments carried out on the non-modified and 2% block cop...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید