نتایج جستجو برای: analytical method for data collection we used researcher

تعداد نتایج: 12068827  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - دانشکده علوم انسانی 1390

iv abstract this study examined the linguistic behaviors of two iranian efl teachers each of them teaching learners of two similar proficiency levels, a beginner level and an intermediate level, to investigate the relationship between the learners proficiency levels and the amounts and purposes for l1 use by the two teachers. the study was carried out to investigate whether there were differe...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و زبانهای خارجی 1393

abstract this mixed method study examines whether there is any relationship among the variables of the study (job satisfaction, social capital and motivation). the researcher considered job satisfaction and social capital as independent variables; motivation is the dependent variable of the study. the researcher applied a questionnaire to assess each variable. to measure efl teachers’ job sati...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده برق و الکترونیک 1390

there are many approaches for solving variety combinatorial optimization problems (np-compelete) that devided to exact solutions and approximate solutions. exact methods can only be used for very small size instances due to their expontional search space. for real-world problems, we have to employ approximate methods such as evolutionary algorithms (eas) that find a near-optimal solution in a r...

پایان نامه :دانشگاه امام رضا علیه اسلام - دانشکده ادبیات و علوم انسانی 1393

this research aims at answering the questions about translation problems and strategies applied by translators when translating cultural concepts. in order to address this issue, qualitative and quantitative study were conducted on two groups of subjects at imam reza international university of mashhad. these two groups were assigned as beginner and advanced translation students (10 students). ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1392

this study investigates the relationships between iranian efl teachers’ perfectionism, burnout and their teaching style preferences, and also the difference between male and female efl teachers and their teaching style preferences. to this end, a sample of 99 efl teachers (46 males and 53 females), who had years of teaching experience, were selected. the measurement scales used in this study we...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract this quasi-experimental study was aimed at examining the impact of storyline complexity on the grammatical accuracy and complexity of advanced and intermediate efl learners. a total of 65 advanced and intermediate efl learners were selected from iran language institute (ili). an intact group including 35 intermediate participants and another intact group with 30 advanced participants ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1388

abstract sensitive and precise voltammetric methods for the determination of trace amounts of furaldehydes, mainly as furfural (f) and 5-hydroxymethyl-2-furaldehyde (hmf), in waste waters and other matrices is described. determination of total furaldehyde at < ?g g-1 levels in alkaline buffered aqueous media was individually investigated. by the use of ordinary swv and adsorptive square wave ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید