نتایج جستجو برای: selected to represent the three different typologies linear

تعداد نتایج: 17632880  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده علوم 1392

the history of plant’s used for mankind is as old as the start of humankind. initially, people used plants for their nutritional proposes but after the discovery of medicinal properties, this natural ?ora became a useful source of disease cure and health improvement across various human communities. berberis vulgaris is one of the medicinal plants used in iranian traditional medicine. berberis ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - پژوهشکده ادبیات 1391

the major purpose of this study was to develop the translation teacher competency test (ttct) and examine its construct and predictive validity. the present study was conducted in two phases: a qualitative phase as well as a quantitative phase. in the first phase of the study, the author attempted to find out the major areas of competency required for an academic translation teacher. the second...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی 1393

asymmetric membranes are widely used in many industrial membrane separation processes. the major advantage of membrane filtration over the conventional process is its ability to remove a wider spectrum of particles without using any chemicals. hollow fiber configuration offer many advantages over flat-sheet or tubular membranes. the spinning process of hollow fiber may look simple, yet it is te...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم انسانی 1390

the main purpose of this study was to investigate any relationship between high school efl teachers metaphorical understandings of their role in class and their self-efficacy beliefs. teachers metaphors were elicited through two different prompts: one picturing what they believed a language teacher should be like in class, and the other demonstrating what they are actually like in class; such...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

abstract tasks nowadays are at the center of attention in sla research. task types is one of the critical issues in this regard, their effectiveness and suitability to any particular context, their characteristics and the result they yield are among some of these issues. on the other hand, discourse markers (dms) have been very much investigated and their effectiveness in conveying the meaning...

پایان نامه :0 1374

this thesis aims to adduce an unmitigated and comprehensive explication concerning the relationship of three significant elements of fiction: setting, chracter and theme. my research is basically placed on two outstanding novels of the 19th century: emily brontes wuthering heights and thomas hardys return of the native. my endeavour lies in studying the correlation among the three above-mention...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

abstract pragmatics is the study of communicative action in its sociocultural context. communicative action includes not only using speech acts (such as apologizing, complaining, complimenting, and requesting), but also engaging in different types of discourse and participating in speech events of varying length and complexity. the present study aimed to investigate the assessment of pragm...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1392

abstract this study investigated the predictability of variables from a motivational framework as well as individuals qualities to predict three non-linguistic outcomes of language learning. gardners socio-educational model with its measures has been used in the current study. individual qualities presented in this study include (1) age, (2) gender, and (3) language learning experience. the...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

today, information technology and computers are indispensable tools of any profession and translation technologies have become an indispensable part of translator’s workstation. with the increasing demands for high productivity and speed as well as consistency and with the rise of new demands for translation and localization, it is necessary for translators to be familiar with market demands an...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید