نتایج جستجو برای: 2005 moreover

تعداد نتایج: 497482  

Nassim Shangarffam Neda Rahnama Roud Poshti

The present study was an attempt, in the first place, to observe whether there was any significant relationship among teachers’ critical thinking, self-efficacy, and perception of effective teaching. Moreover, the researchers tried to examine which variable was a better predictor of perception of effective teaching. To this end, the measures of the critical thinking ability of 143 EFL teachers ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک 1388

the world wide web becomes very popular recently and plays an influential role in english learning. by burgeoning role of source-based writing as partial fulfillment of tefl courses and vast use of the internet, lack of empirical studies to explore these areas is obvious. this study aimed to explore the effect of the amount of familiarity with the web (internet literacy) on junior english stude...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده ادبیات و علوم انسانی 1391

during the process of reading, sometimes learners use ineffective and inefficient strategies and some factors may influence their use of strategies. perhaps critical thinking is one of these factors. this study aims to identify those categories of reading strategies that are mostly used by iranian efl learners and to see if there is any significant relationship between the critical thinking abi...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1391

abstract this study investigates the teachers’ correction of students’ spoken errors of linguistic forms in efl classes, aiming at (a) examining the relationship between the learners’ proficiency level and the provision of corrective feedback types, (b) exploring the extent to which teachers’ use of different corrective feedback types is related to the immediate types of context in which err...

Journal: :The Journal of Object Technology 2005

2007
Bettina Schrader Jonas Kuhn

Parallel corpora have proven useful for a variety of purposes, including but not limited to statistical machine translation (SMT) (cf. Brown et al. 1993) and ``annotation projection'' across languages as training data for NLP­tools of various kinds (cf. Yarowsky et al. 2001, Hwa et al. 2002, Mitkov and Barbu 2004, Pado and Lapata 2005). Moreover, if the corpora's annotations include manual word...

Journal: :Proceedings. Biological sciences 2001
I Djemai J Casas C Magal

The sensory ecology of predator detection by prey has been little studied for any arthropod prey predator system, in contrast to the sensory ecology of prey finding by predators. The aim of this study was to quantify the foraging signals produced by the parasitoid Sympiesis sericeicornis (Hymenoptera: Eulophidae) and the sensory ecology of enemy detection and the avoidance behaviour of the leaf...

2011
Danijel Milicevic Matthias Goeken

Information technology has had a significant impact on business operations and allowed the emergence of new business models. These IT-enabled processes and businesses however depend on secure information systems which need to be managed. The management of information systems security (ISS) is a highly dynamic and complex task due to constant change in the information technology domain. In this ...

2007
Stig Ole Johnsen Rune Ask Randi Roisli

Remote operations are commonly employed in oil and gas installations in the North Sea and elsewhere. The use of information and communications technologies (ICT) has resulted in process control systems being connected to corporate networks as well as the Internet. In addition, multiple companies, functioning as a virtual organization, are involved in operations and management. The increased con...

Journal: :CoRR 2012
Heru Susanto Fahad Bin Muhaya Mohammad Nabil Almunawar Yong Chee Tuan

It is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their information assets. ISMS starts with a set of policies that dictate the usage of computer resources. It starts with the “21 essential security controls” of ISO 27001, which give the basic standard requirements of information security management. Our research is concerned with the ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید