نتایج جستجو برای: functions of code switching
تعداد نتایج: 21216094 فیلتر نتایج به سال:
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
the debate whether esp teachers need to have knowledge of the specialized field they are teaching has been an issue in the literature over the last two decades. the aim of conducting this study was to explore iranian learners’ and instructors’ beliefs and attitudes concerning the role of specialized knowledge in teaching esp classes. a seventeen item questionnaire was administered to 400 esp le...
The Afrikaans speech community is characterized by a long-standing rift between Whites and Coloureds, for large part bilingual, with English being increasingly integrated in its stylistic repertoire. Yet, the history of different across White/Coloured divide, as particular terms diffusion ideological associations. question we wish to ask twofold. First, how far may there be ethnic norms Afrikaa...
Title of Thesis: RELATIONSHIP BETWEEN PROPERTIES OF PARENTAL CODE SWITCHING BEHAVIOR AND PARENT REPORT OF CHILDREN’S LEXICAL ACQUISITION Amelie Bail, Master of Arts, 2013 Thesis directed by: Professor Rochelle Newman Department of Hearing and Speech Sciences This study investigated the code switching behavior of bilingual parents when speaking to their children, and the relationship between thi...
in chapter 1, charactrizations of fragmentability, which are obtained by namioka (37), ribarska (45) and kenderov-moors (32), are given. also the connection between fragmentability and its variants and other topics in banach spaces such as analytic space, the radone-nikodym property, differentiability of convex functions, kadec renorming are discussed. in chapter 2, we use game characterization...
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
This research analyzed the language codes used in song lyrics of an Indonesian group called Un1ty. The purposes this were to identify types code-switching and code-mixing reasons for using songs. descriptive qualitative method data theory Hoffman (1991) investigate code switching mixing find lyrics. results indicated that there 31 points. For type code-switching, researchers found 21 data, name...
Using a cross-modal naming paradigm this study investigated the effect of sentence constraint and language use on the expectancy of a language switch during listening comprehension. Sixty-five Algerian bilinguals who habitually code-switch between Algerian Arabic and French (AA-FR) but not between Standard Arabic and French (SA-FR) listened to sentence fragments and named a visually presented F...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید