نتایج جستجو برای: exceptions have developed over the years

تعداد نتایج: 16201048  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان 1390

seismic retrofit strategies have been developed in the past few decades following the introduction of new seismic provisions and the availability of advanced materials and methods. it can be observed that new approaches to deal with more lateral forces are more innovative and more energy absorbent. in line with this, there is a growing trend toward the use of steel shear walls as a system with ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ایلام 1388

the present study was an attempt to determine the types of motivation and levels of foreign language learning anxiety among efl students studying at azad and state universities in kermanshah and to determine the relationship between these two factors and language proficiency and gender. to this end, the foreign language learning motivation scale, by deci and ryan )1985(, were administered to 12...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1390

supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...

پایان نامه :0 1370

all analytical methods are generally based on the measurement of a parameter or parameters which are somehow related to the concentration of the species.an ideal analytical method is one in which the concentration of a species can be measured to a high degree precision and accuracy and with a high sensitivity. unfortunately finding such a method is very difficult or sometimes even impossible.in...

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - پژوهشکده زبان و گویش 1393

abstract the purpose of this study is twofold: on the one hand, it is intended to see what kind of noticing-the –gap activity (teacher generated vs. learner generated) is more efficient in teaching l2 grammar in classroom language learning. on the other hand, it is an attempt to determine which approach of the noticing-the-gap- activity is more effective in the long- term retention of grammar...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز 1389

in reality, most structures involved in geotechnical engineering are three dimensional in nature, and although in many, plane strain or axisymmetric approximations are reasonable, there are some, for which 3-d treatment is required. the quantity of data, and the size of the various vectors and matrices involved in such analysis, increase dramatically. this has sever implications for computer r...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی و تربیت بدنی 1389

teachers’ beliefs greatly influence their performance in the classroom, their choice of instructional strategies, their way of controlling the class, their dealing with the students, and their general goals and objectives. one of these beliefs is teachers’ sense of efficacy which is viewed as an important construct and has shown to be positively correlated with students’ achievement (ross, 1992...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده علوم انسانی 1390

this study investigated the functions, types and frequencies of code switching in the teachers and students discourse in elt classrooms. to this end, the participants of this study including two groups of teachers and students were selected. the first group of participants were two efl teachers teaching general english courses (at two different levels of proficiency) in an institutional program...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم 1390

a novel silver (ag) nanocomposite electrode was proposed that fabricated from metal nanostructures and ionic liquids. the combined application of unique properties of nanomaterials and ionic liquids in the design of this ag nanocomposite results in electrodes with interesting advantages compared to the conventional metal disk electrode. in the first part of this thesis, the elecrocatalytic eff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید