نتایج جستجو برای: an attempt has been made to consider the characteristics of the development banks thus
تعداد نتایج: 23844188 فیلتر نتایج به سال:
the issue of curriculum and syllabus evaluation and revision has been in center of attention right from when curriculum came into attention of educational institutions. thus everywhere in the world in educational institutions curricula and syllabi are evaluated and revised based on the goals, the needs, existing content, etc.. in iran any curriculum is designed in a committee of specialists and...
abstract nowadays, industries cannot play a crucial role in national and international competitions. the tourism industry is no exception. tourism industry development as the most important economic sector and income generation is one of the key challenges of economic development in the world. therefore, countries were successful that take advantage of the capabilities of tourism sector using ...
chapter i provides an overview of structural linguistics and touches upon the saussurean dichotomies with the final goal of exploring their relevance to the stylistic studies of literature. to provide evidence for the singificance of the study, chapter ii deals with the controversial issue of linguistics and literature, and presents opposing views which, at the same time, have been central to t...
this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...
from historical facts to geo-political realities: relation between turkey and armenia ( 1915 – 2010)
armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...
data envelopment analysis (dea) is a powerful tool for measuring relative efficiency of organizational units referred to as decision making units (dmus). in most cases dmus have network structures with internal linking activities. traditional dea models, however, consider dmus as black boxes with no regard to their linking activities and therefore do not provide decision makers with the reasons...
despite the different criticisms on contrastive analysis it has been proved that the results of it(when processed) can be useful in a tefl environment, specially at the level of phonology.this study is an attempt to compare and contrast the sound systems of kurdish and english for pedagogical aims.the consonants,vowels,stress and intonation of the two languages are described by the same model...
the application of a comprehensive model of communicative language ability (cla) to language teaching and testing has always been an imperative in l2 education since hymess proposal of communicative competence in the 1970s. recent l2 research has clearly underscored the importance of sufficient pragmatics representation as an essential component of cla in pedagogical and testing practices in l2...
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید