نتایج جستجو برای: and untrustworthy interpretations present paper
تعداد نتایج: 16911335 فیلتر نتایج به سال:
learning a second or foreign language requires the manipulation of four main skills, namely, listening, reading, speaking, and writing which lead to effective communication. it is obvious that vocabulary is an indispensible part of any communication, so without a vocabulary, no meaningful communication can take place and meaningful communication relies heavily on vocabulary. one fundamental fac...
this study investigated the functions, types and frequencies of code switching in the teachers and students discourse in elt classrooms. to this end, the participants of this study including two groups of teachers and students were selected. the first group of participants were two efl teachers teaching general english courses (at two different levels of proficiency) in an institutional program...
the present study aimed to investigate the possible effects of focused highlighted error feedback on grammatical accuracy of writing among iranian intermediate efl learners. after selecting 52 homogenous participants from among 70 university students attending azad university of rasht and randomly dividing them into two intact groups of 26 students, the researcher exposed the participants of th...
Internet started some 25 years ago as a communication link between researchers. It was slow, unreliable and unsecure but nevertheless very efficient for its purpose. Nowadays, Internet plays an increasing role in the worldwide economy. Tens of millions of users and hundreds of thousands of companies rely on it for communication, marketing and commerce. This has been achieved by increasing Inter...
all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...
the present research study attempted to find out the extent to which two pre-task activities of “glossary of unknown vocabulary items” and “content related support” assisted efl language learners with their performance on listening comprehension questions across two different proficiency levels (low and high). data for this study were obtained from a total of 120 language learners, female and m...
Recent operating systems [12, 21, 26] have shown that decentralized information flow control (DIFC) can secure applications built from mostly untrusted code. This paper extends DIFC to the network. We present DStar, a system that enforces the security requirements of mutually distrustful components through cryptography on the network and local OS protection mechanisms on each host. DStar does n...
Differential neural responses to faces physically similar to the self as a function of their valence
Behavioral studies show that people self-enhance across a number of domains, including self-face recognition. We used functional magnetic resonance imaging (fMRI) to investigate whether response to physical similarity to the self would differ depending on whether the self-face was morphed with a positive (trustworthy) or negative (untrustworthy) novel face. Participants were presented with morp...
the present research was conducted to accomplish two purposes. firstly, it aimed to explore and describe schematic structure or what halliday and hassan (1989, p.64) have called “generic structure potential” (gsp) of american english, iranian persian and iranian english newspaper editorials within systemic functional linguistics. secondly, a quantitative cross-comparison was made to investigate...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید