نتایج جستجو برای: behavior and dress code
تعداد نتایج: 16912318 فیلتر نتایج به سال:
this study was designed to investigate the impacts of teachers self-disclosure on students foreign language classroom anxiety, attitude to english language learning and their achievement scores at the end of the term. there were 48 female learners of intermediate level. they were not randomly selected. there were one experimental group with 21 students and one control group with 27 students.the...
In general, computer aided design support systems have got an approach of artificial intelligence, which statistically analyzes data such as the behavior of designer, to extract formal design behavior. This approach, however, can neither deal with continuous change of fashion nor reflect personal taste well, as it depends on large amount of collected data. To overcome this problem, this paper a...
Abstract Parallel with the emergence of modern national identity and culture, from late 18th to early 20th century an emphasized consciousness underlined attempt create a ‘national’ dress. In court cultures Europe, shift in style representation ‘international’ ‘regional/ethnic’ served aim updating monarch's role. Royals reaffirmed their sense belonging own ‒ or adopted nations through conscious...
the present study aimed at investigating the relationship between iranian efl teachers’ classroom management orientations and their teaching styles. additionally, the difference between male and female teachers’ teaching styles and classroom management orientations and their relationship with experience and age were explored. three hundred efl teachers filled in attitudes and beliefs on classro...
The dress code of paper wasps, like that of humans, is related to their social habits: species with a flexible nest-founding strategy have highly variable black-and-yellow markings. This color polymorphism facilitates individual recognition and might have been selected to permit complex social interactions.
embedded systems are becoming a suggestive target for code injection attacks in recent years. software protection mechanisms in general computers are not usually applicable in embedded systems as they come with limited resources like memory and processor. in this paper we investigate side channel characteristics of embedded systems and their usability in code injection attack detection. the arc...
1- in a search directed to the reaction of compound)23(the cycloaddition reaction of 1,3- diphenylisobenzofurane)14(with p-benzoquinone)19(,followed by addition of cyclopentadiene was carried out.the specific spacial stracture of its ir,nmr,mass spectra. 2- in another attempt the kinetic stability and behavior of compounds)20(and)23(was studied.the main subject of this study was the highly reve...
bekenstein and hawking by introducing temperature and every black hole has entropy and using the first law of thermodynamic for black holes showed that this entropy changes with the event horizon surface. bekenstein and hawking entropy equation is valid for the black holes obeying einstein general relativity theory. however, from one side einstein relativity in some cases fails to explain expe...
The purpose of this research was to provide a critical review of key research areas within the social psychology of dress. The review addresses published research in two broad areas: (1) dress as a stimulus and its influence on (a) attributions by others, attributions about self, and on one's behavior and (2) relationships between dress, the body, and the self. We identify theoretical approache...
nanotechnology is a general term which is related with field of all advanced science term that generally predicates with all modern technologies which consider nanoscales. improvement in the quality of products by adding some nanoparticles and study of their behavior in the presence of these nanoparticles have been obtained in many researches. on the other hand numerous demands for sowing ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید