نتایج جستجو برای: 2014 and the use of auxiliary variables dissolved oxygen do

تعداد نتایج: 25383126  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

a large number of single research studies on the effects of strategy-based instruction (sbi) in teaching english as a foreign or second language has been conducted so far. however, the lack of a comprehensive meta-analysis targeting the effectiveness of english language sbi is observed. moreover, the findings of experimental studies regarding the context of the english language, proficiency lev...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تهران 1370

the subjects of the study are only the tefl teachers and students at gilan university. to obtain the desired data, a questionnaire which was based on the theories and disecussions gathered, was used as the main data gathering instrument. to determine the degree of relationship between variables, covariance and pearson product moment correlation coefficient were the formulas applied. the data we...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1392

abstract due to the growing importance and influence of the self of the teacher in the field of educational and cognitive psychology, the current study intended to investigate the relationship between three teacher qualities and characteristics, i.e. teacher self efficacy, self regulation, and success as perceived by their learners. the study aimed at finding whether teacher self efficacy an...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده ادبیات و علوم انسانی 1389

abstract the primary purpose of this study was to explore the actual practices and cognitions of two groups of iranian eap teachers, i.e. language teachers and content teachers, with respect to teaching reading-comprehension and vocabulary. to this end, tehran university of medical sciences which authorizes both groups of teachers to teach eap courses was selected as the context of the study s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1393

the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...

پایان نامه :0 1374

having conducted the experiment and analysed the data, the researcher computed the groups mean scores and variances for the test relating to the research question. as the final atep, a t-test was conodonted for the hypothesis. as noted earlier, the significance level was determined at .05 and .01 respectively. the observed t-value was higher than the critical t-value at. 5 and .01 levels. conse...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه کاشان - دانشکده ادبیات و زبانهای خارجی 1394

cohesion is an indispensable linguistic feature in discourse analysis. lexicald such a differe cohesion and conjunction in particular as two crucial elements to textual cohesion and comprehension has been the focus of a wide range of studies up to now. yet the relationship between the open register and cohesive devices has not been thoroughly investigated in discourse studies. this study concen...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یاسوج - دانشکده ادبیات و علوم انسانی 1392

an investigation into oral interaction in language classes: a conversation analytic point of view the aim of this thesis is to analyze the interaction between language teachers and students in english language institutes. this work is done in the context of yasuj city. learning another language, which is in most cases english, involves many variables. one of these variables is the linguistic...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور مرکز - دانشکده زبانهای خارجی 1391

the primary goal of the current project was to examine the effect of three different treatments, namely, models with explicit instruction, models with implicit instruction, and models alone on differences between the three groups of subjects in the use of the elements of argument structures in terms of toulmins (2003) model (i.e., claim, data, counterargument claim, counterargument data, rebutt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید