نتایج جستجو برای: based data

تعداد نتایج: 4588528  

Data sanitization is a process that is used to promote the sharing of transactional databases among organizations and businesses, it alleviates concerns for individuals and organizations regarding the disclosure of sensitive patterns. It transforms the source database into a released database so that counterparts cannot discover the sensitive patterns and so data confidentiality is preserved ag...

Lena Nemati Mojtaba Shakeri,

One of the most important artificial immune algorithms is negative selection algorithm, which is an anomaly detection and pattern recognition technique; however, recent research has shown the successful application of this algorithm in data classification. Most of the negative selection methods consider deterministic boundaries to distinguish between self and non-self-spaces. In this paper, two...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهرکرد - دانشکده ادبیات و علوم انسانی 1389

current studies in second language (l2) learning have revealed the positive role of corrective feedback (cf) in both oral and written forms in different language features. the present study was an attempt to investigate the effect of both direct and indirect written corrective feedback (wcf) on the use of grammatical collocations in l2 writing. the study also sought to examine whether the effec...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1389

within the components of communicative competence, a special emphasis is put on the “rules of politeness,” specifically the politeness strategies (brown and levinson, 1978) that speakers deploy when performing the request speech act. this is because the degree of imposition that making a request places upon one’s interlocutor(s) has been seen to be influenced by several factors among which, as ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده زبانهای خارجی 1391

the speech act of disagreement has been one of the speech acts that has received the least attention in the field of pragmatics. this study investigates the ways power relations, social distance, formality of the context, gender, and language proficiency (for efl learners) influence disagreement and politeness strategies. the participants of the study were 200 male and female native persian s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران - پژوهشکده علوم انسانی و اجتماعی 1391

the central purpose of this study was to conduct a case study about the role of self monitoring in teacher’s use of motivational strategies. furthermore it focused on how these strategies affected students’ motivational behavior. although many studies have been done to investigate teachers’ motivational strategies use (cheng & d?rnyei, 2007; d?rnyei & csizer, 1998; green, 2001, guilloteaux & d?...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1391

the application of e-learning systems - as one of the solutions to the issue of anywhere and anytime learning – is increasingly spreading in the area of education. content management - one of the most important parts of any e-learning system- is in the concern of tutors and teachers through which they can obtain means and paths to achieve the goals of the course and learning objectives. e-learn...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس - دانشکده برق و کامپیوتر 1390

one of the most important goals for increasing recognition and treatment revenue is transmitting vital data to medical care team, more quickly. nowadays, use of new technologies for transmitting data will deploy more and more daily. in this article, for transmitting electrocardiogram, first we code the signal into a suite of codes, then we will use bluetooth technology to transmit data from off...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1392

abstract the present study deals with a comparison between reactive and pre-emptive focus-on-form in terms of application and efficiency. it was conducted in an intermediate english class in shahroud. 15 male learners participated in this research and their age ranged from 18 to 25. a course book, new interchange 3, and a complementary book were used. every session the learners gave lectures o...

Journal: :International Journal of Advanced Computer Science and Applications 2023

With the rise in technology, a huge volume of data is being processed using mining, especially healthcare sector. Usually, medical consist lot personal data, and third parties utilize it for mining process. Perturbation health care highly aids preventing intruders from utilizing patient’s privacy. One challenges perturbation managing utility privacy protection. Medical has certain special prope...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید