نتایج جستجو برای: common identity

تعداد نتایج: 792664  

Journal: :Frontiers in forests and global change 2022

The formation and turnover of soil organic carbon (C), the largest terrestrial C pool, is strongly impacted by ultimate source that C: leaves, wood, roots, root exudates. quantity quality these inputs determined identity plants involved. Yet substantial uncertainty surrounds complex relationships among plant traits C, precluding efforts to maximize whole-ecosystem uptake in nature-based climate...

Journal: :iau international journal of social sciences 2012
hamid hamid ahmadi

the article provides a critical assessment of the more recent literature that relies on theoretical frameworks such as post modernism and globalization to deal with national identity, ethnicity and cultural mobility. explaining sensitive and complicated issues such as identity requires the extensive use of the native historical, cultural and sociological sources related to the iranian experienc...

Journal: :journal of english language teaching and learning 2015
seyyed mohammad ali soozandehfar rahman sahragard

this investigation postulatesvygotsky’s (1978) concept of zone of proximal development (zpd) and his related “scaffolding” metaphor as well as norton’s (2006) principles of sociocultural identity as its theoretical foundation.thisresearchintends to scrutinizethe socioculturally-oriented mediationalmechanisms utilized in student-student and student-teacher collaborationsin an iranian efl writing...

Journal: :journal of teaching language skills 2012
ayyatallah razmjoo

identity orientations refer to the relative importance that individuals place on various identity attributes or characteristics such as race, religion, culture and language when constructing their self-definitions (chew, 2007; cheek, 1989). accordingly, the present study aims at identifying the impact of identity aspects on the iranian learners' english language achievements at shiraz universit...

Journal: :IACR Cryptology ePrint Archive 2013
Xi Jun Lin Lin Sun

Key agreement allows multi-parties exchanging public information to create a common secret key that is known only to those entities over an insecure network. In recent years, several identity-based authenticated key agreement protocols have been proposed. In this study, we analyze three identity-based tripartite authenticated key agreement protocols. After the analysis, we found that these prot...

Journal: :issues in language teaching 2013
mahnaz mostafaei alaei mohammad reza ghamari

the present study was aimed at examining concerns about the social effects of efl learning, a challenging area of research which has not been discussed sufficiently. it tried to investigate the relationship between efl learning and national identity. in addition, attempt was made to find a relationship between language motivation types and national identity. furthermore, the role of two demogra...

2000
Virgil D. Gligor

Public-key infrastructures (PKIs) that support both identity certificates and access control (e.g., attribute, delegation) certificates are increasingly common. We argue that these PKIs must also support revocation and review policies that are typical of more traditional access control systems; e.g., selective and transitive certificate revocation, and per-object access review. Further, we show...

Journal: :Journal of clinical microbiology 1979
M E Landay W Baldwin

Antiserum prepared in rabbits against Bacteroides fragilis showed numerous bands when reacted with B. fragilis antigen in Ouchterlony plates. This antiserum also reacted with Bacteroides thetaiotaomicron and showed one band of apparent identity with B. fragilis. The band of identity common for both organisms was lost if the antigen was heated at 80 degrees C for 30 min. Antisera prepared agains...

1988
Kenji Koyama Kazuo Ohta

At Crypto-87 conference, we proposed identity-based key distribution systems for generating a common secret conference key for two or more users. Protocols were shown for three configurations: a ring, a complete graph, and a star. Yacobi has made an impersonation attack on the protocols for the complete graph and star networks. This paper proposes improved identity-based key distribution protoc...

2015
Ionut Untea

The article focuses on the process, events and attempts from the end of the 17th and the beginning of the 18th century to unite the romanian orthodox Church or rather a part of it belonging to the orthodox Metropolitan of Transylvania with the roman Catholic Church. The author analyzes the challenges and consequences of such a union for the romanian identity. To overcome the controversies and s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید