نتایج جستجو برای: thus no inventory remains at the distribution center in this paper

تعداد نتایج: 21925773  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم پزشکی 1389

introduction: diabetes mellitus is an growing national and international public health concern. the number of people affected by diabetes in world by 2030 will be 69% in developing countries. regular physical activity plays a key role in the management of type 2 diabetes melitus, particularly glycemic control. it has been recommended that peoples with type 2 diabetes participate in moderate-int...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده زبانهای خارجی 1389

previous studies have aimed at testing a hypothesis but the present study is data-first research in which researcher tries to form a theory from data rather than the use of data to test a hypothesis. this study aims at exploring teachers perceptions of the strengths and weaknesses of the current syllabus for college preparatory course. eight experienced teachers were selected to collect data du...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

there is less published research about how teachers in efl contexts respond to students who are relatively less mature and less competent l2 writers. while writing researchers have examined various issues concerning peer and teacher response in writing-oriented classes, little research has centered on the effect of collaborative tasks particularly dictogloss on writing skills. output collaborat...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و علوم انسانی 1391

abstractof two mcall programs introducing 100 vocabulary items through two im the researcher of the present study was intrigued to compare the effects age modalities (pictures and streaming video) with those of a conventional method (teacher instruction) in an efl context. she set out to investigate whether such multimedia environments could provide a more effective environment for vocabulary...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1391

abstract lexical knowledge of complex english words is an important part of language skills and crucial for fluent language use (nation, 2001). the present study, thus, was an attempt to assess the role of morphological decomposition awareness as a vocabulary learning strategy on learners’ productive and receptive recall and recognition of complex english words. so 90 sophomores (female and ma...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده علوم انسانی 1389

abstract this study aimed at analyzing a corpus of emails gathered from iranian students studying in england. the corpus contained 996 emails that were investigated by employing the framework of chen (2006) to find common patterns in the discourse of these emails. another aim of the study was to find how two request acts (want statements and query preparatory) were used in the emails. the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید