نتایج جستجو برای: protocol analysis

تعداد نتایج: 3017806  

Journal: :journal of english language teaching and learning 2013
zia tajeddin elham yazdanmehr

this study aims to delve into the unobservable dimensions of deciding and acting in a pragmatically significant speech event. utilizing a discourse completion test questionnaire, it seeks to find out the structure and pragmatic functions that lie behind efl learners’ choice of specific wording while engaged in performing a recurrent speech act in iran i.e. compliments. to this aim, 30 efl learn...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract in a protocol analysis of second language writing from 20 adult english as a foreign language (efl) iranian students, this research observed how language-switching (l-s), i.e., first language use in l2 writing, was affected by l2 proficiency. switching interactively between first (l1) and second (l2) languages has been recognized as one of the salient characteristics of l2 writing....

Journal: :international journal of reproductive biomedicine 0
ensieh shahrokh tehrani nejad behnaz attar shakeri batool hoseini rashidi fatemeh ramezanzade mamak shariat

background: recently different studies suggested that discontinuation of gonadotrophin releasing hormone analogue (gnrha) at beginning of ovarian stimulation (improvement of ovarian response to gonadotrophins) may have some benefit to poor responder patients in invitro fertilization (ivf) cycles. objective:the efficacy of gnrha stop protocol in poor responder patients in ivf cycles was assessed...

Journal: :journal of family and reproductive health 0
batool hossein rashidi reproductive health research center, tehran university of medical sciences, tehran, iran tahereh behrouzi lak reproductive health research center, department of infertility, urmia university of medical sciences, urmia, iran ensiyeh shahrokh tehrani reproductive health research center, tehran university of medical sciences, tehran, iran fatemeh davari tanha department of obstetrics and gynecology, mohebeyas hospital, tehran university of medical sciences, tehran, iran

objective: this study was conducted to compare the results of fixed versus flexible gnrh antagonist protocols in controlled ovarian stimulation for intra cytoplasmic sperm injection (icsi) in patients with pcos. materials and methods: a randomized clinical trial was performed on 100 pcos women, who were admitted to a tertiary infertility clinic and were candidate for ivf/icsi. they were divided...

This study aims to delve into the unobservable dimensions of deciding and acting in a pragmatically significant speech event. Utilizing a Discourse Completion Test questionnaire, it seeks to find out the structure and pragmatic functions that lie behind EFL learners’ choice of specific wording while engaged in performing a recurrent speech act in Iran i.e. compliments. To this aim, 30 EFL learn...

Journal: :international journal of fertility and sterility 0

background: to compare a flexible, multi-dose gnrh antagonist protocol with a long gnrh .agonist protocol in poor respo materials and methods: a randomized clinical trial of 70 poor responder patients (35 patients in gnrh antagonist protocol and 35 patients in long gnrh agonist protocol) was performed at royan institute, tehran, iran. both groups were given a fixed dose of human menopausal gona...

Journal: :journal of reproduction and infertility 0

background: since increased lh in the early follicular phase in pcos patients especially in gnrh antagonist protocol could be associated with reduced oocyte quality and pregnancy and impared implantation. the current study was conducted to determine art outcomes in gnrh antagonist protocol (flexible) and long gnrh agonist protocol and compare them with adding gnrh antagonist in gnrh antagonist ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

2012
Fernand Gobet Tim Bayne Axel Cleeremans Patrick Wilken

Journal: :International Journal of Future Generation Communication and Networking 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید