نتایج جستجو برای: the right to have a lawyer

تعداد نتایج: 20545706  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ایلام 1388

the present study was an attempt to determine the types of motivation and levels of foreign language learning anxiety among efl students studying at azad and state universities in kermanshah and to determine the relationship between these two factors and language proficiency and gender. to this end, the foreign language learning motivation scale, by deci and ryan )1985(, were administered to 12...

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - دانشکده زبانهای خارجی 1393

previous studies regarding teachers’ beliefs have revealed that teachers’ beliefs have influence on their classroom practices. the current study aimed to investigate the effect of teachers’ beliefs about teaching reading strategies on students’ motivation and success in reading comprehension in the context of english teaching as a foreign language in high schools of mazandaran, iran. data were ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

the concepts of similarity and dissimilarity have been the interest of many researchers. basically, in the studies the similarity between two objects or phenomena, has been discussed. in this thesis, we consider the case when the resemblance or similarity among three objects or phenomena of a set, 3-similarity in our terminology, is desired. later we will extend our definitions and propos...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1390

learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1392

abstract although music possesses some kind of power and using it has been welcome by many students in language classrooms, it seems that they take a non-serious image of the lesson while listening to songs and they may think that it is a matter of fun. the main objective of the present study was to investigate whether learning a foreign language through musical texts (songs) can have an impac...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

even though, to date, a lot of studies have been conducted on the subject of politeness theory, there are very few studies regarding the applicability of this theory to translation between english and persian which shows the reason behind conducting the present study. this study was carried out with the aim of highlighting whether there is any difference between english and persian methods of u...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند - دانشکده ادبیات و علوم انسانی 1391

1.1 introduction “i see translation as the attempt to produce a text so transparent that it does not seem to be translated. a good translation is like a pane of glass. you only notice that it’s there when there are little imperfections- scratches, bubbles. ideally, there shouldn’t be any. it should never call attention to itself.” “norman shapiro” (venuti, 1995:1) edward fitzgerald is the br...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

the quest for power has formed much of the world history especially in 20th and 21st centuries. oil (energy) particularly after industrial revolution has been a tool for conquest and power and has been transformed to a geopolitical issue. from a geopolitical point of view this has been the case for the last two centuries in central asia and caucasus. central asia and caucasus has always been...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید