نتایج جستجو برای: theory of rational emotional alice
تعداد نتایج: 21236710 فیلتر نتایج به سال:
In this paper we try to apply Technical Analysis methodology into the Behavior Theory for the large capitalization firms of the Athens Stock Exchange (ASE). In Behavioural and in Technical Theory we observe a combination between fundamental (rational) and psychological emotional (irrational) factors. We use standards tests in combination with bootstrap methodology under the AR(1) & GARCH(1,1)...
this study intends to investigate samuel beckett’s waiting for godot and endgame under the lacanian psychoanalysis. it begins by explaining the most important concepts of lacanian psychoanalysis. the beckettian characters are studied regarding their state of unconscious, and not the state of consciousness as is common in most beckett studies. according to lacan, language plays the sole role in ...
rested on sociocultural theory (sct), this study attempted to examine the effect of written corrective feedback (wcf) followed by producing written languaging on developing writing accuracy over new tasks. to this aim, two intact iranian efl classes at the low-intermediate level were randomly assigned to two experimental groups: direct (n = 25) and indirect (n = 25). both groups wrote on a numb...
We introduce what –if some kind of group action exists– is a truly (information-theoretically) safe cryptographic communication system: a protocol which provides zero information to any passive adversary having full access to the channel. 1. The false algorithm, simple version Assume Alice wants to share a secret s, which we assume for simplicity is a non-zero rational number s = p/q ∈ Q⋆. For ...
This study examined the relationship between changes in the level of client emotional involvement as measured by the Client Experiencing Scale and Strength of Feeling Scale-Reiiised. and occurrence of in-session therapeutic phenomena as measured by the Category System of Client Com! Moments, in Person-Centred and Rational-Emotive Therapy. Judges rated client statements in (i sessions conducted ...
Alice seeks an information-theoretically secure source of private random data. Unfortunately, she lacks a personal source and must use remote sources controlled by other parties. Alice wants to simulate a coin flip of specified bias α, as a function of data she receives from p sources; she seeks privacy from any coalition of r of them. We show: If p/2 ≤ r < p, the bias can be any rational numbe...
fuzzy logic has been developed over the past three decades into a widely applied techinque in classification and control engineering. today fuzzy logic control is one of the most important applications of fuzzy set theory and specially fuzzy logic. there are two general approachs for using of fuzzy control, software and hardware. integrated circuits as a solution for hardware realization are us...
corporations have a key role in economic development, growth of national security and financial competition. the key of power is in economy. so in the global village, the economic competition replaces military conflict. a new concept in criminal justice is corporate crime. these crimes as a kind of white collar crime are studied in light of critical criminology findings of this study shows that...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید