نتایج جستجو برای: we can say that after identification technique
تعداد نتایج: 8733448 فیلتر نتایج به سال:
simplification universal as a universal feature of translation means translated texts tend to use simpler language than original texts in the same language and it can be critically investigated through common concepts: type/token ratio, lexical density, and mean sentence length. although steps have been taken to test this hypothesis in various text types in different linguistic communities, in ...
in this article, we have focused one some basic and productive information about the properties of spectrum and singular values related to compact operators which are ideals in a c*-algebra of bounded operators. considering a two-sided connection between the family of symmetric gauge functions on sequence of singular values of compact operators and symmetric norms on finite dimensional ope...
the present study sought to investigate the impact of using mind-mapping technique instruction on female elementary efl learners reading comprehension; it also investigated their attitudes towards using mind-mapping technique as a tool to improve their reading comprehension. this study followed a quasi-experimental design with two intact groups as experimental, and control groups. the participa...
in order to be attracted, each work of must encounter viewer in its environment. at first it is virtual and is the result of sensitive subjectivity of the artist, and then it will be changed to objectivity and forms a piece of artwork. the artist of filmmaker is changing the virtual environment of the film; the virtual situation which is made in the mind of the scriptwriter and himself; and use...
Occupational therapists have many intervention tools available for working with clients having a neurological injury; however, some of the most innovative and effective methods have not gained acceptance by many clinicians. Emerging research and new technologies provide occupational therapists with a multitude of treatment strategies and novel devices, but incorporation of those tools into clin...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید