نتایج جستجو برای: unpublished documents in possession of the writer.
تعداد نتایج: 25292346 فیلتر نتایج به سال:
a study of the crime of hostage-taking in iranian law,and in international documents
this study purported to compare and contrast the use of self-mention and evidentials as two mtadiscourse features in opinion columns of persian and english newspapers. the theoretical basis of this study is the idea that metadiscourse features vary across cultural boundaries. for this purpose, 150 persian and 150 english opinion columns were collected based on three factors of topic, audience a...
this study considers the level of increase in customer satisfaction by supplying the variant customer requirements with respect to organizational restrictions. in this regard, anp, qfd and bgp techniques are used in a fuzzy set and a model is proposed in order to help the organization optimize the multi-objective decision-making process. the prioritization of technical attributes is the result ...
in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...
chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
this thesis attempts to study the representations of the third-world intellectuals in three fictional works by the british-educated trinidadian nobel-winner v. s. naipaul: the mimic men, a bend in the river, and magic seeds. the first one recounts the story of ralph singh’s sense of alienation, his experiences as a colonial politician, and his struggle to give order to his disorderly world thro...
abstract there is not much sources about ancient carnival and ceremonies , but some information can be gain from documents . as a matter of fact the ceremonies were a part of zarartiyan principles which zartosht had taken them to his religion . it should be mentioned that the oldest ceremonies are about poster and agriculture principles this seasonal ceremonies were very important for agri...
this thesis seeks to present a critical reading of virginia woolf’s mrs. dalloway and michael cunningham’s the hours in terms of an intertextual approach, concentrating on dialogic imagination, negativity, transposition and allusion. this study attempts to evaluate cunninghams perception of woolfs life and work by adopting kristevas conception of intertextuality and her consideration of the hou...
hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید