نتایج جستجو برای: eap students

تعداد نتایج: 322090  

One of the main concerns of scholars working in the field of EAP over the last 2decades has been raising the awareness of EAP students and publishers of genreconventions in academic journals. In line with the above concern, many studies haveaimed at exploring the general characteristics of research articles (RAs) in the field.Among these features, it seems that the generic moves and textuality ...

2010
AbdulMahmoud Idrees Ibrahim

English for Specific Purposes, so far, is probing its way in our Sudanese universities. It is taught as a university requirement. Unfortunately, our students are disappointed when they graduate confronting the real situation in the workplace to use their ESP background. Most of the students feel they discontent with the syllabus which had been taught, because it doesn’t meet their needs. Furthe...

2005
J. Walker

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Pro...

1999
D Simon

The EAP-TLS Authentication Protocol Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstr...

2014
Devane Satish

Remote EAP-SIM authentication has an overwhelming impact on the authentication delay. RADIUS protocol can be used for local authentication which reduces authentication latency. However, in case of EAP-SIM authentication, where triplets are to be retrieved from a remote authentication gateway (AuC), this does not help much. An Improved EAP-SIM authentication method was proposed in [2]. In this p...

2006
T. Clancy

Extensible Authentication Protocol (EAP) Password Authenticated Exchange Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document defines an Extensible Authentication Protocol (EAP) method called EAP-PAX (Password Authenticated eXchange). This method is a li...

Journal: :ELT journal 2022

Abstract The increasing use of digital educational technologies in higher education (HE) means that the nature communication may be shifting. Assessments English for academic purposes (EAP) need to reconceptualized accordingly reflect new and complex ways which language is used HE. With a view inform EAP assessments, our study set out identify key trends related using scoping review literature....

Journal: :Brazilian journal of otorhinolaryngology 2005
Mariana Cardoso Guedes Rubens V Brito Neto Maria Valéria S Goffi Gomez Sandra B Giorgi Sant'Anna Cristina G Ornelas Peralta Arthur Menino Castilho Ricardo Ferreira Bento

UNLABELLED Cochlear implantation has been recommended for children under 24 months of age. The use of objective measures is needed to help speech processor programming. The electrically evoked compound potential (EAP), which can be assessed by neural response telemetry (NRT), is one of those objective measures. AIM to determine how often the EAP can be recorded by NRT system during surgery an...

Journal: :IJICS 2007
Khidir M. Ali Thomas J. Owens

IEEE 802.1X is a key part of IEEE802.11i. By employing Extensible Authentication Protocol (EAP) it supports a variety of upper layer authentication methods each with different benefits and drawbacks. Any one of these authentication methods can be the ideal choice for a specific networking environment. The fact that IEEE 802.11i leaves the selection of the most suitable authentication method to ...

2016
Natalia M. Arzeno Haris Vikalo

When data are acquired at multiple points in time, evolutionary clustering can provide insights into cluster evolution and changes in cluster memberships while enabling performance superior to that obtained by independently clustering data collected at different time points. Existing evolutionary clustering methods typically require additional steps before and after the clustering stage to appr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید