نتایج جستجو برای: the validity and reliability of which have been tested by professionals opinions and cronbach

تعداد نتایج: 25268269  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1390

writing as a productive skill requires practice in the basic sub-skills of vocabulary and grammar. in fact, grammar has been viewed as the core of programs in writing classes to help the students put the elements of sentence together and combine sentences of specific lengths to come up with an error-free work of art. conceptualizing l2 writing in this way introduces writing as a product and enc...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان 1389

run-out-table (rot) is located between last finishing stand and down coiler in a hot strip mill. as the hot steel strip passes from rot, water jets impact on it from top and bottom and strip temperature decreases approximately from 800-950 °c to 500-750°c. the temperature history that strip experience while passing through rot affects significantly the metallurgical and mechanical properties, s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده حقوق 1389

abstract the third millennium has started, but the world is facing with serious challenges in achieving international security and peace. various human rights violations have lead the states to find means to protect human rights. also article 55 of the united nations charter introduces the respect to human rights and fundamental freedom as the most suitable ways to realize peace and security. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

in this thesis our aim is to construct vector field in r3 for which the corresponding one-dimensional maps have certain discontinuities. two kinds of vector fields are considered, the first the lorenz vector field, and the second originally introced here. the latter have chaotic behavior and motivate a class of one-parameter families of maps which have positive lyapunov exponents for an open in...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده زبانهای خارجی 1393

feminine voice and narratology in wuthering heights wuthering heights as a general "bronte" work has extraordinary dimensions to it which can make it focal to different ways of interpretation. among other differences the issue of narrative voice is essential in understanding the ultimate purpose of wuthering heights. emily bronte uses different narrators from various focal points speaking of m...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده ادبیات و علوم انسانی 1393

from its emergence till present time marxist principles has undergone great changes since their promulgation by marx. many theorists and thinkers set at rectifying marxist tenets and introducing those of their own while others advocated its main concepts and attempted at improving them. among marxist philosophers who had an intensive study of marxs ideology, is louis althusser whose reflections...

پایان نامه :0 1374

in fact, this study focused on the following questions: 1. is there any difference between the effect of functional/notional approach and the structural approaches to language teaching on the proficiency test of efl learners? 2. can a rather innovative language test referred to as "functional test" ge devised so so to measure the proficiency test of efl learners, and thus be as much reliable an...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1388

foreign policy takes root from complicated matters. however, this issue may be more truth about armenia. although the new government of armenia is less than 20 years, people of this territory are the first ones who officially accepted christianity. in very past times, these people were a part of great emperors like iran, rome, and byzantium.armenia is regarded as a nation with a privileged hist...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده هنر 1389

چکیده اهمیت اشیاء در نگاه انسان از آغاز پیدایش در زندگی جریان داشته و تاکنون نیز ادامه دارد. ساخت اشیاء از انواع کاربردی و آئینی آغاز و تا انواع الکترونیکی آن به همزیستی مسالمت آمیزی با انسان منتهی گشته است. حال اینکه این همزیستی در هر دوره ای از تاریخ چگونه خودنمایی می کند از اهمیت بسیاری برخوردار است.این رساله به بررسی موقعیت شی از جنبه های زیبایی شناسی، هویت مداری، نمادگرایی، جامعه شناسی ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید