نتایج جستجو برای: period model
تعداد نتایج: 2520312 فیلتر نتایج به سال:
Possessors may occupy a DF position within DP, either in SPEC DP, or adjoined to NP, in line with Bresnan’s (2011) Endocentric Mapping Principles. Their default discourse function is that of ANCHOR. This accounts for phenomena such as possessor doubling, and alternative positions for possessors with different semantic and pragmatic constraints.
In this paper we prove that all the hyperbolic components of the family λ tan z except the punctured unit disk are simply connected. Then, restricting λ to the imaginary axis, We show that there is a “Sharkovskii-like” ordering of the periods of the hyperbolic components. Finally, again for λ in the imaginary axis, we show that period doubling phenomena occur.
Four experiments used the psychological refractory period logic to examine whether integration of multiple sources of phonemic information has a decisional locus. All experiments made use of a dual-task paradigm in which participants made forced-choice color categorization (Task 1) and phoneme categorization (Task 2) decisions at varying stimulus onset asynchronies. In Experiment 1, Task 2 diff...
It is difficult to perform two tasks at the same time. Such performance limitations are exemplified by the psychological refractory period (PRP): when participants make distinct motor responses to two stimuli presented in rapid succession, the response to the second stimulus is increasingly slowed as the time interval between the two stimuli is decreased. This impairment is thought to reflect a...
Visuospatial attention can be deployed to different locations in space without movement of the eyes. A large body of human electrophysiological studies reveals enhanced sensory-perceptual responses to stimuli that appear at an attended location. However, it is not clear that the mechanisms that underlie visuospatial attention are under the control of attention mechanisms that limit central proc...
Suppose we are given a particular fixed-length hash function h : 256-bits→ 128-bits. How can we use h to compute a 128-bit strong collision-free hash of a 512-bit input block? We consider several possible ways to extend h to a hash function H : 512-bits→ 128-bits. In the following, we suppose that m is 512-bits long, and we write m = m1m2, where m1 and m2 are 256 bits each. Method 1 Define H(m)...
The Clifford tori in S3 constitute a one-parameter family of flat, twodimensional, constant mean curvature (CMC) submanifolds. This paper demonstrates that new, topologically non-trivial CMC surfaces resembling a pair of neighbouring Clifford tori connected at a sub-lattice consisting of at least two points by small catenoidal bridges can be constructed by perturbative PDE methods. That is, one...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید