نتایج جستجو برای: keywords autonomy

تعداد نتایج: 1996956  

Journal: :TEION KOGAKU (Journal of Cryogenics and Superconductivity Society of Japan) 2008

Journal: :Communications on Applied Electronics 2015

Journal: :Proceedings of the AAAI Conference on Artificial Intelligence 2020

Journal: :Journal of Memory and Language 2014

Journal: :Computer and Information Science 2013

Journal: :Journal of Law, Policy and Globalization 2023

The purpose of this study is to analyze the factors that influence implementation land and building tax payments in perspective regional autonomy. And formulate regulations on Land Building Tax autonomy realizing public welfare. research method used juridical empirical. This a qualitative research, type data primary secondary data. technique collecting through literature field focus group discu...

Journal: :Cultural Studies 2021

This article pursues two tasks. The first is to clarify the value and productivity of Williams’s Keywords: a vocabulary culture society (first edition 1976, second expanded 1983a) for project Cultural Studies. clarification helped, I argue, by reading it alongside Vološinov’s Marxism philosophy language (published in Russian 1929, translated into English 1973). related task speculative developm...

2009
Mingming Zhou Wei Ji Ma Edward L. Deci

a r t i c l e i n f o Keywords: Motivation in China Autonomous motivation for learning Autonomy-supportive teaching Self-determination theory Two studies applied self-determination theory (SDT) to investigate the motivation for learning of rural Chinese children. The aim was to test whether findings from studies in western individualist cultures would hold up within a very different, eastern co...

Journal: :I. J. Network Security 2013
Cheng-Chi Lee Shih-Ting Hsu Min-Shiang Hwang

We study the development of conjunctive keyword searchable scheme which enables one to search encrypted documents by using more than one keyword. The notion of conjunctive keyword searching was presented by Golle et al. in 2004. However, their security model was constructed in a symmetric-key setting which is not applicable for the overall applications in the reality. So Park et al. extended Go...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید