نتایج جستجو برای: in each era

تعداد نتایج: 17020252  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

this study attempted to explore if teaching english collocations through two different modes of awareness-raising and input flooding has any possible differential effect on immediate retention as well as retention in a delayed assessment. it also compared the possible differential effect of teaching english collocations implicitly and explicitly on actively using the items in writing. m...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مهندسی عمران 1391

deployable scissor type structures are composed of the so-called scissor-like elements (sles), which are connected to each other at an intermediate point through a pivotal connection and allow them to be folded into a compact bundle for storage or transport. several sles are connected to each other in order to form units with regular polygonal plan views. the sides and radii of the polygons are...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

phatic communion is a cultural concept which differs across cultures. according to hofstede (2001), the u.s. tends to have individualistic culture; however, asian countries tend to have collectivistic cultures. these cultures view phatic communion differently. in individualistic cultures like u.s., phatic communion reflects speakers’ socio-cultural relationships in conversations. to see whether...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده ادبیات و علوم انسانی 1393

this study investigates the effect of teacher’s repetition as an input enhancement technique in explicit teaching of vocabulary items on efl learners’ later retrieval. to this end, 66 persian speaking english learners, aged 18 - 29, homogenized through a standard proficiency test (opt), were chosen and put into two experimental and control groups, each 33 learners. general service list (gsl), a...

2003
M. P. Chipperfield

Mid-latitude ozone changes: studies with a 3-D CTM forced by ERA-40 analyses W. Feng, M. P. Chipperfield, M. Dorf, and K. Pfeilsticker Institute for Atmospheric Science, School of Earth and Environment, University of Leeds, Leeds, UK Institute für Umweltphysik, University of Heidelberg, Heidelberg, Germany Received: 3 April 2006 – Accepted: 21 April 2006 – Published: 17 July 2006 Correspondence...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد شاهرود - دانشکده ادبیات و علوم انسانی 1389

چکیده : نظریه ی شیوه ی تولید آسیایی ، اولین بار توسط مارکس و سپس در تأیید نظریات او ، در آثار انگلس مطرح شد . این نظریه علاوه بر شیوه تولید ، به بحث درباره ی ماهیت دولت در جوامع آسیایی می پردازد . در این پژوهش ، وجه تولید آسیایی و نظریات پیرامون آن در توسعه نیافتگی ایران ، مورد بحث و بررسی قرار می گیرند . مهمترین نظ the asian production theory was first introduced by marx and then was suppo...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1388

abstract: the present thesis includes ; one preface and 11speeches , that each speech considered in different researches . the prefact part , studied grammer back ground , the first speech considered a brief description about grammatical credits . the second speech considered the different typs of sentences , from structure and meaning points of view . the third speech considered the verb es...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید