نتایج جستجو برای: soviet conditions in regions such as central asia in the discussion on these three concepts
تعداد نتایج: 22625215 فیلتر نتایج به سال:
the present study aimed to investigate representation of discourse markers and metadiscourse markers in conversations and readings of general elt coursebook series used in the language centers of iran. to this aim, four elt coursebooks popularly taught in language centers of this country were analyzed based on fung and carter’s (2007) framework regarding discourse markers and hyland’s (2005) fr...
the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...
from historical facts to geo-political realities: relation between turkey and armenia ( 1915 – 2010)
armenias geopolitics and its historical experience have had a determining impact on the character of its foreign policy .present-day armenia is a small, landlocked country with _11,620 square miles area armenias landlocked nature makes it dependent on the benevolence of its neighbors for access to the outside world a fact that gives it a sense of isolation and vulnerability. as it was indic...
this study investigated how group formation method, namely student-selected vs. teacher-assigned, influences the results of the community model of teaching creative writing; i.e., group dynamics and group outcome (the quality of performance). the study adopted an experimental comparison group and microgenetic research design to observe the change process over a relatively short period of time. ...
abstract:assume that y is a banach space such that r(y ) ? 2, where r(.) is garc?a-falset’s coefficient. and x is a banach space which can be continuously embedded in y . we prove that x can be renormed to satisfy the weak fixed point property (w-fpp). on the other hand, assume that k is a scattered compact topological space such that k(!) = ? ; and c(k) is the space of all real continuous ...
foreign policy takes root from complicated matters. however, this issue may be more truth about armenia. although the new government of armenia is less than 20 years, people of this territory are the first ones who officially accepted christianity. in very past times, these people were a part of great emperors like iran, rome, and byzantium.armenia is regarded as a nation with a privileged hist...
hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...
a professional is someone whose work involves performing a certain function with some degree of expertise. but a narrower definition limits the term to apply to people such as teachers and doctors, whose expertise involves not only skill and knowledge but also the exercise of highly sophisticated judgment, and whose accreditation necessitates extensive study, often university-based as well as p...
a novel acrylic acid-functionalized fe3o4 magnetic nanoparticle with a core-shell structure was developed for utilization as a heterogeneous organosuperacid in chemical transformations. the structural, surface, and magnetic characteristics of the nanosized catalyst were investigated by various techniques such as transmission electron microscopy (tem), thermogravimetric analysis (tga), and ft-ir...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید