نتایج جستجو برای: in a comparative
تعداد نتایج: 20407202 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
abstract nowadaysphotovoltaic solar cells (pvs) areacknowledged the fastest growing energy technology in the word, however, they only account for only fraction of current global renewable energy capacity. it isrecognized that this incomplete market penetration has been largely a result of the technology’sexcessive cost. so researchers are trying to find innovative, economic way with theaim of ...
this study was conducted to investigate the impact of podcasts as a learning and teaching tool on iranian efl learners’ motivation for listening as well as on their listening comprehension ability. the study also investigated the learners’ perception towards listening to podcasts and examined whether the learners were likely to accept podcasts. out of fifty-five intermediate learners studying e...
in this thesis, using concepts of wavelets theory some methods of the solving optimal control problems (ocps). governed by time-delay systems is investigated. this thesis contains two parts. first, the method of obtaining of the ocps in time delay systems by linear legendre multiwavelets is presented. the main advantage of the meth...
the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...
adaptation of the lord of the rings is considered by many to be among the greatest, most successful and at the same time most popular of the above mentioned trend so far. it is my intention to look at the success and popularity of this epic fantasy in the light of the 9/11 attacks and the war on terror context of g. w. bush’s aura. in so doing i aim at bringing into the light the determining fa...
methodology non-native participants in this study were sixty ba students majoring in english literature and teaching english as a foreign language at khayyam university of mashhad. they were senior students, between 21 to 24 years old, who had studied english for at least three and a half years and had passed several courses including grammar, reading, conversation, and writing. this was assum...
in this thesis, we exploit a simple and suitable method for immobilization of copper(ii) complex of 4?-phenyl-terpyridine on activated multi-walled carbon nanotubes [amwcnts-o-cu(ii)-phtpy]. this nanostructure was characterized by various physico-chemical techniques. to ensure the efficiency and fidelity of copper species, the implementation of three-component strategies in click-chemistry all...
abstract: the present study is an attempt to find out cultural exophoric references in iranian high-school elt textbooks and touch stone series to compare the frequency of occurrence of such references in these books. the purpose is to find out which of the series of the books under investigation impose a greater referential burden on efl learners as far as their reading comprehension of the ...
in the first part of this thesis we explored wetting and its dynamics for small droplets. first, we showed how a simple feature of water droplets on a surface, i.e. laplace pressure, can be exploited to build a micropump. we investigated capillary pumping in microchannels both experimentally and numerically. putting two droplets of different sizes at the in/outlet of a microchannel, will ge...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید