نتایج جستجو برای: one way speaking tasks

تعداد نتایج: 2433416  

Journal: :Italian Journal of Pediatrics 2012

2016
Binna Lee Diana Van Lancker Sidtis

The bilingual voice: Vocal characteristics when speaking two languages across speech tasks Binna Lee & Diana Van Lancker Sidtis To cite this article: Binna Lee & Diana Van Lancker Sidtis (2017): The bilingual voice: Vocal characteristics when speaking two languages across speech tasks, Speech, Language and Hearing, DOI: 10.1080/2050571X.2016.1273572 To link to this article: http://dx.doi.org/10...

Involvement Load Hypothesis (ILH) and Technique Feature Analysis (TFA) are two frameworks which operationalize depth of processing of a vocabulary learning task. However, there is dearth of research comparing the predictive power of the ILH and the TFA across second language (L2) vocabulary learning tasks. The present study, therefore, aimed to examine this issue across four vocabulary learning...

Involvement Load Hypothesis (ILH) and Technique Feature Analysis (TFA) are two frameworks which operationalize depth of processing of a vocabulary learning task. However, there is dearth of research comparing the predictive power of the ILH and the TFA across second language (L2) vocabulary learning tasks. The present study, therefore, aimed to examine this issue across four vocabulary learning...

1999

In this example, we reanalyze the soybean yield data, but treat the explanatory variable as a categorical (ordinal) variable with 4 levels and use one−way anova to test for a significant SO2 effect. We can think of the data as samples from four different populations, corresponding to the SO2 concentration the chambers received, with possibly different means. In each treatment group we have 3 ob...

Journal: :Science 2002
Ravikanth Pappu Ben Recht Jason Taylor Neil Gershenfeld

Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...

2009
Qinghai Gao Xiaowen Zhang Michael Anshel

Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...

2011
Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze

In a forthcoming paper[2], we examine the security of the APCO Project 25 (“P25”)[3] two-way digital voice radio system. P25 is a suite of digital protocols and standards designed for use in narrowband shortrange (VHF and UHF) land-mobile wireless two-way communications systems. The system is used by law enforcement, national security, public safety, and other government users in the United Sta...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2006
Matthew J Lockyear Alastair P Hibbins Kevin R White J Roy Sambles

Diffraction gratings are elementary tools for much of optics and spectroscopy. Here, at microwave frequencies, we provide a new perspective on these fundamental structures. A transmission diffraction grating is presented that has diffracted beams emanating from one surface only. It can thus function either as a transmission grating with no reflected orders (other than zero) or, in the reverse c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید