نتایج جستجو برای: confidential self
تعداد نتایج: 531047 فیلتر نتایج به سال:
In Japanese, subjective emotion predicates such as kanashii ‘sad’ and tsurai ‘painful’ are exclusively used to describe the inner state of the speaker, reflecting a highly subjective construal. This study investigates systematically how emotion is expressed in formal but confidential narrative texts, in which the egocentric perspective normally conveyed by these predicates would be inappropriat...
the construct of self-efficacy has received increasing attention in research over the past two decades. many studies have been carried out 1.3 significance of the study this study has pedagogical implications since improving students’ self- efficacy and autonomy is important for promoting actual performance on classroom academic tasks. in academic settings, it has been shown that self-effi...
the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...
In this paper, we study the secrecy capacity region for the 3-receiver broadcast channel (BC) with degraded message sets, where a confidential message is kept secret from one of the receivers. This model is more general than the previously studied degraded broadcast channel (BC) with confidential messages, as the wiretap receiver is supposed to receive the common message. Our main results are t...
this thesis is about the effect of self-confidence and educational motivation on oral translation quality.
Abstract— A generalized multiple access channel (GMAC) with one confidential message set is studied, where two users (users 1 and 2) attempt to transmit common information to a destination, and user 1 also has confidential information intended for the destination. Moreover, user 1 wishes to keep its confidential information as secret as possible from user 2. A deterministic GMAC is first studie...
We discuss the problem of accountability when multiple parties cooperate towards an end result, such as companies in a supply chain or departments government service under different authorities. In cases where fully trusted central point does not exist, it is difficult to obtain audit trail workflow each individual participant unaccountable all others. propose AudiWFlow, auditing architecture t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید