نتایج جستجو برای: one way speaking tasks
تعداد نتایج: 2433416 فیلتر نتایج به سال:
The bilingual voice: Vocal characteristics when speaking two languages across speech tasks Binna Lee & Diana Van Lancker Sidtis To cite this article: Binna Lee & Diana Van Lancker Sidtis (2017): The bilingual voice: Vocal characteristics when speaking two languages across speech tasks, Speech, Language and Hearing, DOI: 10.1080/2050571X.2016.1273572 To link to this article: http://dx.doi.org/10...
Involvement Load Hypothesis (ILH) and Technique Feature Analysis (TFA) are two frameworks which operationalize depth of processing of a vocabulary learning task. However, there is dearth of research comparing the predictive power of the ILH and the TFA across second language (L2) vocabulary learning tasks. The present study, therefore, aimed to examine this issue across four vocabulary learning...
Involvement Load Hypothesis (ILH) and Technique Feature Analysis (TFA) are two frameworks which operationalize depth of processing of a vocabulary learning task. However, there is dearth of research comparing the predictive power of the ILH and the TFA across second language (L2) vocabulary learning tasks. The present study, therefore, aimed to examine this issue across four vocabulary learning...
In this example, we reanalyze the soybean yield data, but treat the explanatory variable as a categorical (ordinal) variable with 4 levels and use one−way anova to test for a significant SO2 effect. We can think of the data as samples from four different populations, corresponding to the SO2 concentration the chambers received, with possibly different means. In each treatment group we have 3 ob...
Modern cryptographic practice rests on the use of one-way functions, which are easy to evaluate but difficult to invert. Unfortunately, commonly used one-way functions are either based on unproven conjectures or have known vulnerabilities. We show that instead of relying on number theory, the mesoscopic physics of coherent transport through a disordered medium can be used to allocate and authen...
Biology has been a rich source of inspiration for computer security professionals. The central dogma of biology contains intronization cipher and substitution cipher with three many-to-one mappings. In cryptography, substitution cipher has been used long before human identifies DNA. However, it seems that no enough attention has been paid to the intronization cipher because it alone does not ma...
In a forthcoming paper[2], we examine the security of the APCO Project 25 (“P25”)[3] two-way digital voice radio system. P25 is a suite of digital protocols and standards designed for use in narrowband shortrange (VHF and UHF) land-mobile wireless two-way communications systems. The system is used by law enforcement, national security, public safety, and other government users in the United Sta...
Diffraction gratings are elementary tools for much of optics and spectroscopy. Here, at microwave frequencies, we provide a new perspective on these fundamental structures. A transmission diffraction grating is presented that has diffracted beams emanating from one surface only. It can thus function either as a transmission grating with no reflected orders (other than zero) or, in the reverse c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید