نتایج جستجو برای: 1both in school and university to solve this problem

تعداد نتایج: 22689855  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1388

abstract following innovations in the field of elt, a new topic which has recently attracted a lot of attention is metaphor analysis. although this area of research is still in its infancy in elt, it seems that the idea can shed more light on the puzzle of english language learning and teaching. therefore, the major aim of this study is to analyze language learning and teaching in formal a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1389

there are two major theories of measurement in psychometrics: classical test theory (ctt) and item-response theory (irt). despite its widespread and long use, ctt has a number of shortcomings, which make it problematic to be used for practical and theoretical purposes. irt tries to solve these shortcomings, and provide better and more dependable answers. one of the applications of irt is the as...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد 1388

plagiarism in esl/efl learning contexts has been established as a dynamic and multi-layered phenomenon and has become a topic engaging many researchers in a heated debate in recent years. comparisons of student-generated texts with their source texts have shown that students rely on source texts in their writings and copying is a major strategy used by both l1 and l2 writers. in our country a...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان همدان - دانشکده ادبیات و علوم انسانی 1390

abstract this study is an attempt to determine the effect of nano- technology education on science lesson for fifth grade in primary school in the city of kermanshah. this research is experimental and is conducted in the from of pre-test and post- test for the control group. an achievement test was administered to determine the rate of learning in the students. the research is an applied one. ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1386

the purpose of the present study is to find out whether bilinguals of khuzestan-arab origin or monolinguals of iranian origin code-switch during learning or speaking english and which group is more susceptible to code-switch. to this end, the students of 24 classes from high schools and pre- university centers were screened out, and interviewed and their voices and code-switchings were recorded...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم بهزیستی و توانبخشی - دانشکده توانبخشی 1393

abstract objectives gradual increase length and complexity of utterance (gilcu) therapy method is a form of operant conditioning. this type of treatment is very precise and controlled that is done in 54 steps in 3 speech situations consisted of monologue, reading and conversation. this study aimed to examine the effects of gilcu treatment method on reduction of speech dysfluency of school-age...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1393

this study investigates the problem of translating religious allusions in persian literature, namely the ones borrowed from quranic verses and hadiths. the purpose of this study is to shed light on how different translators dealt with such a task and also to provide guidelines for translators in coping with religious allusions.

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان - دانشکده زبانهای خارجی 1389

abstract the current study sets out 1) to investigate the strategic needs of iranian efl learners in reading literary and non-literary texts; 2) to shed some light on the differences between reading literary and non-literary texts; and 3) to specify the differences in the interaction of participants with texts while reading two literary subgenres ( i.e., short story and literary essays). to ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید