نتایج جستجو برای: but poor control of common mallow

تعداد نتایج: 21341527  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه 1377

‏‎applications such as high definition viedeo reproduction, portable computers, wireless, and multimedia demand, and ever-increasing need for ligh-frequency high-resolution and low-power analog-to-digital converters. flash, two-step flash, and pipeline convertors are fast but consume large amount of power and require large area. to overcome these problems, successive approximation converter blo...

Journal: :Journal of Agriculture and Food Sciences 2022

Jute mallow, (Corchorus olitorius L.) is an important vegetable grown in most part of subsaharan Africa and classified as Neglected Underutilized Species (NUS). But insect pests are serious hindrance to its production. The present research was conducted at the teaching farm Ibrahim Badamasi Babangida University, Lapai, Niger State growing season 2017 - 2018. aimed evaluating efficacy three plan...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1390

abstract the variables affecting the nature of reading comprehension can be classified into two general categories: reader’s variables, and text variables (alderson, 2000). despite the wave of research on vocabulary knowledge as reader’s variable, the role of this knowledge in c-test as a text-dependent test and its interaction with lexical cohesion of the test as a text feature has remained a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده زبانهای خارجی 1391

abstract this study tried to investigate whether there was any significant relationship between technical translation quality of the senior english translation students and their levels of verbal-linguistic, visual-spatial and interpersonal intelligences. in order to investigate the research questions, the researcher selected a hundred senior english translation students from three universitie...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - پژوهشکده علوم انسانی و اجتماعی 1390

this study was an attempt to investigate and compare the effect of lexical inferencing and concept mapping on developing vocabulary retention of iranian language learners. sixty homogeneous students from different intact classes who were being taught as intermediate learners in sokhan english institute participated in this study. they were in different classes. a teacher made test as a pre-test...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

this study investigated the effects of manipulating the cognitive complexity of tasks along +/- few elements and the time limits on l2 learners writing performance. to conduct the study, 60 iranian efl learners with two levels of proficiency, low and high intermediate, were selected and assigned to three groups based on the time devoted to task completion. the participants performed both a simp...

پایان نامه :موسسه آموزش عالی غیردولتی رودکی تنکابن - دانشکده ادبیات و زبانهای خارجی 1393

abstract this study aimed at investigating the effect of bilingual teaching of cognate words (persian-english) on iranian upper intermediate efl learners’ knowledge of lexical development. for this purpose,100 subjects participated in this study out of which 40 learners were selected for this study and they were assigned into two groups, control and experimental. cross-language cognates (wor...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1393

in this research the focus of the researcher is on the influence of american myths that have long been held and offered by the american culture and ideologies. sam shepard is conceived to be one of the greatest playwrights of the contemporary american theater. in his works he depicts broken characters who are struggling to keep up with the national expectations but are ceaselessly borne back to...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1390

abstract:‎ literature is said beautiful words of poetry or prose that excites reader’s or listener’s feel. certainly, to ‎be effective, such a text should have certain characteristics. the four elements of the literature: thought, ‎imagination, emotion and style make a text to be literary and effective. emotion and imagination are ‎specific elements of literary texts, while thought and style a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید