نتایج جستجو برای: their vulnerability varies further

تعداد نتایج: 2914344  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان 1388

abstract recent studies suggest that prelistening activities play an important role in the development of listening comprehension (e.g. long 1990;chiang and dunkel 1992; schmidt-rinehart 1994; jensen and hansen 1995; robinson et al., 1995; buck, 1995; foster and skehan,1996; teng 1996; robinson, 2001; chang and read 2006). in line with previous studies and to shed light on a new aspect of sche...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی و اجتماعی 1388

abstract the present study was conducted to examine the effect of proficiency on students interaction while carrying out the grammar-based task(s) in collaboration. in particular, the study examines whether the level of proficiency affects the learners’ focus of attention to grammatical and lexical features. the study takes a further step and examines whether there is any difference in the use...

2015
Mrs Deepika Sharma Miss Anita Rana

The antiquities of Jammu and Kashmir reveal that women might have enjoyed a high status as elsewhere in India. But ,there was a marked deterioration in the position of women. Female children were not much desired and their sufferings became endless with the beginning of inroads of Turko-Afghan tribes for whom carrying away of women formed the prized item of booty. This situation gave new dimens...

راغفر, حسین , صانعی, لیلا ,

Objective: Poverty alleviation is an essential step to achieve economic development. This is why identification exercise is so crucial. Traditionally, different aspects of insecurities have not be taken into poverty measurement. Many types of insecurities have adverse impacts on household welfare. Identifying vulnerability of household can serve identification of the poor households. Meth...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1389

abstract: country’s fiber optic network, as one of the most important communication infrastructures, is of high importance; therefore, ensuring security of the network and its data is essential. no remarkable research has been done on assessing security of the country’s fiber optic network. besides, according to an official statistics released by ertebatat zirsakht company, unwanted disconnec...

Hesamedin Gholami Mojtaba Sookhtanlo Seyyed Reza Es’haghi

Identification and analysis of farmers’ vulnerability associated with their risk aversion degree is one of the necessary requirements for planning and reducing impacts of drought in Iran. So, this study was investigated three risk vulnerability parameters (economic, social and technical) among wheat farmers categorized in accordance with their risk aversion degree in the Mashhad County (Iran) b...

Journal: :محیط شناسی 0
احمد نوحه گر استاد گروه مرتع و آبخیزداری، دانشکدۀ منابع طبیعی و کشاورزی دانشگاه هرمزگان فاطمه ریاحی کارشناس ارشد مهندسی آبخیزداری دانشگاه هرمزگان

introduction drastic model is an index and overlapping model that has been designed for producing vulnerability scores for different points by combining several thematic layers. overlapping distinguished methods are themost applicable methods for evaluatingvulnerability of aquifers because they are cheap, they can directly reach a defined goal, the used data in the methods are accessible or can...

2017

The impact of the Mongol invasions of the Middle East has been the subject of extensive research, especially in the last few decades. Scholars have evaluated the damage and the benefits brought by the Mongols to the Islamic world in different fields such as the military, religion, politics, economy and culture. Despite this, in the case of Anatolia, the Mongol period is still under-studied when...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید