نتایج جستجو برای: such as discursive and chimerical instances
تعداد نتایج: 17338787 فیلتر نتایج به سال:
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
this research is a study on indicators of listening instruction in iranian english as a foreign language (efl) curriculum at guidance school and high school educational levels. this thesis aims at determining: a) the indicators of listening instruction at guidance school and high school efl curriculum. b) the indicators of listening instruction in irans guidance school and high school efl curri...
if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...
oxidative addition reactions of 1,4-diiodo-butane and 1,3-diiodo-propane with [ptme2(ph2phen)]; in which ph2phen=4,7-diphenyl-1,10-phenanthroline, were studied in different solvents such as acetone and benzene.oxidative addition reaction of [pt me2(ph2phen)] with i(ch2)4i and i(ch2)3i produced the [pt me2i(ch2)4(ph2phen)i] (1a) and [pt me2i(ch2)3(ph2phen)i] (1b).all the platinum (iv) products w...
as the canon is shaped by white male standards rewriting the canonical works of literature is one of the ways through which postcolonial writers subvert the authority of the masters. writing in the language of the masters the colonized writers use the very suppressive tool in the hands of the masters i.e. their language to question the validity of their norms. regarded by most critics to be the...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
abstract while task-based instruction is considered as the most effective way to learn a language in the related literature, it is oversimplified on various grounds. different variables may affect how students are engaged with not only the language but also with the task itself. the present study was conducted to investigate language and task related engagement on the basis of the task typolog...
wireless sensor networks (wsns) are one of the most interesting consequences of innovations in different areas of technology including wireless and mobile communications, networking, and sensor design. these networks are considered as a class of wireless networks which are constructed by a set of sensors. a large number of applications have been proposed for wsns. besides having numerous applic...
power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...
vocabulary as a major component of language learning has been the object of numerous studies each of which has its own contribution to the field. finding the best way of learning the words deeply and extensively is the common objective of most of those studies. however, one effective way for achieving this goal is somehow neglected in the field. using a variety of activities such as games can r...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید