نتایج جستجو برای: beings as a conclusion
تعداد نتایج: 14014417 فیلتر نتایج به سال:
this study was an attempt to investigate and compare the effect of lexical inferencing and concept mapping on developing vocabulary retention of iranian language learners. sixty homogeneous students from different intact classes who were being taught as intermediate learners in sokhan english institute participated in this study. they were in different classes. a teacher made test as a pre-test...
if the precise implementation of the principle of proportion and:balance between the violation and the penalty as well as the other dimensions could be considered as a stick yard for the imptementation of justice any lack of preciseness in carrying out such principle would not indeed be much too far from injustice . naturally ,if it would be imagined that the objective of balance between...
Experiments with the Fuzzy ACC under various traffic conditions have shown that the fuzzy approach is very robust especially with regard to the inevitable sensor noise. The modular architecture facilitates fine-tuning of the fuzzy controller for the different situation-specific components and minimizes interference of those components during operation. The approach to adaptation has two main go...
14 On the receipt of the service request, the QoS manager translates this request on one or more logical configurations based on the profile concept, and produces the corresponding configurations by accessing the system information repository (4). To decide about the possibility of the establishment of a configuration which is the mapping result of a logical configuration, the QoS manager asks ...
abstract a fundamental study of “historio-graphic metafiction” and “literary genres”, as introduced in “new historical philosophy”, and tracing them in the works of julian barnes having studied the two novels, the porcupine and arthur & george, by julian barnes, the researcher has applied linda hutcheon’s historio-graphic metafictional theories to them. the thesis is divided into five cha...
The Security functionality provided by the protocols is almost equivalent. While the FTAM and RDA authentication and authorisation mechanisms are a mere mapping to those of the accessed file system or database, DFR defines own mechanisms. No sound statements on efficiency and reliability issues of the protocols can be made right now. These have to be derived from experiences with trial implemen...
A reliable multicast protocol enables a process to multicast a message to a group of processes in a way that ensures that all honest destination-group members receive the same message, even if some group members and the multicast initiatorare maliciously faulty. Reliable multicast has been shown to be useful for building multiparty cryptographic protocols and secure distributed services. We pre...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید