نتایج جستجو برای: a mathematical program tries to identify an extreme (i.e.

تعداد نتایج: 16352035  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده ادبیات و علوم انسانی 1390

this study explored reading strategy use of tefl ma students when they read academic research articles in english. the purpose of this study was to investigate how this group of readers typically approaches reading academic research articles related to their field of study, and also what they do in reading such research articles. the aim of the present study was bilateral. first, the researcher...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1391

this thesis seeks to present a critical reading of virginia woolf’s mrs. dalloway and michael cunningham’s the hours in terms of an intertextual approach, concentrating on dialogic imagination, negativity, transposition and allusion. this study attempts to evaluate cunninghams perception of woolfs life and work by adopting kristevas conception of intertextuality and her consideration of the hou...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1399

this study aimed to investigate the effects of listening strategy training on iranian efl learners listening comprehension and use of such strategies. this work, employing an experimental methodology, was conducted among 60 adult efl learners from a language institute in isfahan, iran, as participants. the participants, who were selected based on the results of a placement test, were assigned t...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

the changes in todays world organization, to the extent that instability can be characterized with the most stable organizations called this afternoon. if you ever change management component, an additional value to the organization was considered, today, these elements become the foundation the organization is survival. the definition of the entrepreneur to identify opportunities to exploit a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده هنر 1391

now-a-days graphic design plays a major role in influencing culture, society, business, and customers, in such a way that one could look upon every individual as a potential customer. graphic designers seek to identify customers needs and find an intelligent solution for them. correct identification and understanding of those needs is the first step towards achieving ones goals. marketing knowh...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و علوم انسانی 1391

abstractof two mcall programs introducing 100 vocabulary items through two im the researcher of the present study was intrigued to compare the effects age modalities (pictures and streaming video) with those of a conventional method (teacher instruction) in an efl context. she set out to investigate whether such multimedia environments could provide a more effective environment for vocabulary...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1390

this study investigated the functions, types and frequencies of code switching in the teachers and students discourse in elt classrooms. to this end, the participants of this study including two groups of teachers and students were selected. the first group of participants were two efl teachers teaching general english courses (at two different levels of proficiency) in an institutional program...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه الزهراء - دانشکده ادبیات، زبانهای خارجی و تاریخ 1389

recent years have witnessed an increased attention to form focused instruction and consciousness raising activities (ellis, 2002; doughty & williams, 1998) on the one hand and extensive and meaningful exposure to the target language (klapper & rees, 2003; day & bamford, 1998) on the other. due to significance attributed to above mentioned issues by scholars, this study attempted to bridge them ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید