نتایج جستجو برای: digit isic classification over the period 2002

تعداد نتایج: 16188038  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1388

since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...

اسکروچی, رقیه, بیدختی, حسین, حسینی, فاطمه, علی بیگ, محمدرضا,

  Background and Aim: Evidence Based Medicine (EBM) emphasizes on proper usage of the results of scientific research in the bedside for patients. This study evaluated the levels of clinical evidence in published articles in Iranian scientific medical journals over a fifteen-year period (1994-2008).   Materials and Methods: In this descriptive study, the years 1997, 2002 and 2007 were selecte...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1387

vocabulary as a major component of language learning has been the object of numerous studies each of which has its own contribution to the field. finding the best way of learning the words deeply and extensively is the common objective of most of those studies. however, one effective way for achieving this goal is somehow neglected in the field. using a variety of activities such as games can r...

Journal: :تحقیقات اقتصادی 0
غلامرضا کشاورز دانشیار گروه اقتصاد، دانشگاه صنعتی شریف یونس گلی دانشجوی دکتری اقتصاد، دانشگاه رازی کرمانشاه محمدرضا عابدین مقانکی استادیار مؤسسة مطالعات و پژوهش های بازرگانی

this study examins effects of trade liberalization on the wage inequality across industries and between genders within these industries by utilizing the data of micro-level households’ income and expenditures surveys and trade statistics over 2001-2011. the analysis is carried based on the heckscher–ohlin’s theory in international trade and baker’s taste discrimination theory at firms. we use q...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1390

acknowledgements i wish to express my gratitude to all those who have helped me in preparing this thesis. i would like to express my deep gratitude to my respected advisor dr. kourosh akef, whose advice and comments helped me in the early stages of the research and throughout the writing process. i would also like to express my gratitude to dr. hajar khanmohammad whose invaluable guidance he...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1392

abstract the present study deals with a comparison between reactive and pre-emptive focus-on-form in terms of application and efficiency. it was conducted in an intermediate english class in shahroud. 15 male learners participated in this research and their age ranged from 18 to 25. a course book, new interchange 3, and a complementary book were used. every session the learners gave lectures o...

Assessment of land use spatiotemporal changes provide valuable data for managers to elaborate plans. Land use change modeling is one of the methods used by planers to manage land use changes. Detection of such changes may help decision makers and planners to understand the factors in land use and land cover changes in order to take effective and useful measures. Remote sensing (RS) and geograph...

Journal: :CoRR 2017
Songtao Guo Yixin Luo Yanzhi Song

This manuscript briefly describes an algorithm developed for the ISIC 2017 Skin Lesion Classification Competition. In this task, participants are asked to complete two independent binary image classification tasks that involve three unique diagnoses of skin lesions (melanoma, nevus, and seborrheic keratosis). In the first binary classification task, participants are asked to distinguish between...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید