نتایج جستجو برای: validating and reliability

تعداد نتایج: 16842325  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1392

بررسی رابطه بین یادگیری سازمانی و توانمندسازی مدیران و معاونین مدارس شهرستان میانه دکتر محمد اورکی1، دکتر هاشم نعمتی، گلسیما عزیزی* استادیار گروه علوم تربیتی ، دانشگاه پیام نور تهران جنوب استادیار گروه علوم تربیتی. ، دانشگاه پیام نور مشهد دانشجوی کارشناسی ارشد مدیریت آموزشی ، دانشگاه پیام نور تهران جنوب [email protected] میانه- دانشگاه پیام نور میانه مدیر آموزشی، 2226062 – 0423، ت...

Journal: :educational research in medical sciences 0
nasrin jalilian reza pourmirza kalhori mansour rezaei nahid jalilian

introduction: objective structured clinical examination (osce) is used for the evaluation of the clinical competence in medicine for which it is essential to measure validity and reliability. this study aimed to investigate the validity and reliability of osce for residents of obstetrics and gynecology at kermanshah university of medical sciences in 2011. methods: a descriptive-correlation stud...

Background and Objective: Chronic obstructive pulmonary disease (COPD) is a common disease that causes 6% of deaths, 90% of which occur in low- and middle-income countries. Improving these patients' quality of life (QOL) is one of the primary treatment goals. The St. George's Respiratory Questionnaire (SGRQ) is used to measure the health status of patients with respiratory problems. This resear...

Journal: :Journal of Biological Chemistry 2012

ژورنال: اعتیاد پژوهی 2016
جاهدی, نسیم, رحیمیان بوگر, اسحق, طالع پسند, سیاوش,

Objective: The present study aimed at validating partners' checklist among the family members of drug abusers. Method: A descriptive research design was used in this study. The number of 397 participants of the families referring to addiction clinics in Semnan Province was randomly selected as the sample units. Results: Reliability in the frequency range was variable from .57 (healthy) to .81 (...

2015
Chris FLETCHER

Utilities and Manufacturers continually deploy new technologies on their systems with the goal of either providing new functionality or improving reliability. Although these devices can be tested in the lab, these results need to be confirmed by field experience. The traditional anonymous Control group approach is often not possible in the Utility context as installations are made when possible...

Journal: :I. J. Network Security 2011
Mina Malekzadeh Abdul Azim Abdul Ghani Subramaniam Shamala Jalil M. Desa

Despite current 802.11i security protocol, wireless networks are vulnerable to Denial of Service (DoS) attacks. Sending a continuous stream of forgery control frames by an attacker can easily flood wireless channel so that the network cannot be available for its associated users. These attacks are possible because wireless control frames do not carry any cryptographic mechanism to detect and di...

2009
Viviane Torres da Silva Christiano Braga

Norms describe the permissions, prohibitions and obligations of agents in multi-agent systems in order to regulate their behavior. In this paper we propose a normative modeling language that makes possible the modeling of norms motivating the modeling of such norms together with the nonnormative part of the system. In addition, we also propose a mechanism to validate the norms at design time, i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید