نتایج جستجو برای: this perfect and sublime couldnt be created all of sudden
تعداد نتایج: 24128690 فیلتر نتایج به سال:
all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...
study of cohesive devices in the textbook of english for the students of apsychology by rastegarpour
this study investigates the cohesive devices used in the textbook of english for the students of psychology. the research questions and hypotheses in the present study are based on what frequency and distribution of grammatical and lexical cohesive devices are. then, to answer the questions all grammatical and lexical cohesive devices in reading comprehension passages from 6 units of 21units th...
abstract: postmethod is a newly developed pedagogy which as an alternative to method rejects the notion of good or bad methods and the concept of best method that can be generalized and appropriate for all contexts. instead, it treats each context as unique and one of a kind which cant be compared with other cases. this study is a postmethod-oriented one which investigates whether and how far t...
cultural iran is a scope that is more extended than the political territories of iran as a political unit. this concept means that cultural geography(mehdi moghanlo-1383-1) of iran is greater than its political geography which, according to history, has a long history extending west-east from kandahar to the euphrates and north-south from the persian gulf to the caucasus including transoxiana a...
the present dissertation aims to investigate four-word lexical bundles in applied linguistics research articles by iranian and internationally-published writers. the aims of this study are two-fold: first of all, attempts have been made to create a comprehensive list of the most commonly used four-word lexical bundles categorized by their type and token frequency, their structural characteristi...
in this thesis, structural, electronical, and optical properties of inverse pervskite(ca3pbo) in cubic phase have been investigated.the calculation have been done based on density functional theory and according to generalized gradiant approximate (gga) as correlating potential. in order to calculate the configurations, implementing in the wien2k code have been used from 2013 version. first of ...
in this thesis, at first we investigate the bounded inverse theorem on fuzzy normed linear spaces and study the set of all compact operators on these spaces. then we introduce the notions of fuzzy boundedness and investigate a new norm operators and the relationship between continuity and boundedness. and, we show that the space of all fuzzy bounded operators is complete. finally, we define...
there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید