نتایج جستجو برای: some of the contents of this chapter are described with conceptualanalysis method
تعداد نتایج: 23784556 فیلتر نتایج به سال:
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...
abstract in aggregate, active forms of reactive silica with mineral names are sometimes associated with sand and gravel in concrete mixture. alkali hydroxides originated from alkalis in the cement or other resources form an alkaline silica gel with this reactive silica which becomes swallowed and expanded during time causing damage to concrete. there have been growing researches on alkaline r...
بررسی ارزش غذایی تاغ و عمل آوری آن با سود و آهک در مراحل مختلف رشدبا استفاده از روش کیسه های نایلونی
abstract this study is carried out to determine the chemical composition in the three vegetative stages of the haloxylon sp., degradation parameters, with adding naoh and ca(oh2 ). for this purpose, in may and october and january 2010 enough some haloxylon sp. of the ammary area was prepared. crude protein and ash percentage are decrease, neutral detergent fiber percentage with pragress stage ...
abstract the balvard metamorphic assemblage (bma) crops out at the northeastern margin of the southeastern part of the sanandaj-sirjan zone (ssz) in contacting to the dehshir-baft ophiolitic mélange. this location prepared a special situation to resolve some of the complicated tectonic problems of this part of iran. petrology, micro-tectonics and satellite image investigation were carried out ...
1- in a search directed to the reaction of compound)23(the cycloaddition reaction of 1,3- diphenylisobenzofurane)14(with p-benzoquinone)19(,followed by addition of cyclopentadiene was carried out.the specific spacial stracture of its ir,nmr,mass spectra. 2- in another attempt the kinetic stability and behavior of compounds)20(and)23(was studied.the main subject of this study was the highly reve...
the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...
the purpose of this study was to find the relationship between critical thinking and self-regulation with reading comprehension of iranian female elementary language learners. the present study is a correlational one having a descriptive design. two questionnaires, critical thinking questionnaire and self-regulation questionnaire which were valid and reliable questionnaires and four reading com...
this study investigated the potential role of age in inductive and deductive grammar learning among iranian foreign language learners. the experimental population consisted of our randomly selected samples including two groups of children (with age of exposure to english within 8-13), and two groups of adults (with age of exposure to english within 11-13). thus, the comparison was between ch...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید