نتایج جستجو برای: there wasnt any spillover effect in monthly and seasonal returns and volatilities these results are against evidence of volatility spillovers in many stock markets that may be due to trading limits such as price limit and existence of base volume in tsejel classification c30
تعداد نتایج: 26737128 فیلتر نتایج به سال:
like any other learning activity, translation is a problem solving activity which involves executing parallel cognitive processes. the ability to think about these higher processes, plan, organize, monitor and evaluate the most influential executive cognitive processes is what flavell (1975) called “metacognition” which encompasses raising awareness of mental processes as well as using effectiv...
even though, to date, a lot of studies have been conducted on the subject of politeness theory, there are very few studies regarding the applicability of this theory to translation between english and persian which shows the reason behind conducting the present study. this study was carried out with the aim of highlighting whether there is any difference between english and persian methods of u...
today, the route for economic development in most countries is the same as international open competitive economy. economic institutes well known that supportive public economy belonged on the past and they may compete in the global economy. it is obvious that if they have no competitive potency or not familiar with competition technique, they may be devastated. banking system aims to collect t...
abstract: in the paper of black and scholes (1973) a closed form solution for the price of a european option is derived . as extension to the black and scholes model with constant volatility, option pricing model with time varying volatility have been suggested within the frame work of generalized autoregressive conditional heteroskedasticity (garch) . these processes can explain a number of em...
this study investigates the strategies native english and persian speakers employ for expressing gratitude in different situations. the strategies of persian efl learners are also compared with english strategies in order to find the differences that may exist between these two languages. social status and size of imposition of the favor are social variables which are investigated in detail for...
the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...
this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...
iv abstract this study examined the linguistic behaviors of two iranian efl teachers each of them teaching learners of two similar proficiency levels, a beginner level and an intermediate level, to investigate the relationship between the learners proficiency levels and the amounts and purposes for l1 use by the two teachers. the study was carried out to investigate whether there were differe...
to explore the idea the investingation proposed, aimed at finding whether the performances of the population of iranians students studying english in an efl context are consistent in l1 and l2 writing taks and whether there is a cross-linguistic transfer in this respect. in this regard the subjects were instructed to write four compositions-two in english and two in farsi-which consisted of an ...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید