نتایج جستجو برای: defense style
تعداد نتایج: 140349 فیلتر نتایج به سال:
Background: The aim of the present study was to investigate the mediating role of defense mechanisms in the relationship between behavioral brain systems and Alexithymia in students of Sari Farhangian University. Method: The statistical population of this study was all students of Farhangian University of Sari in the academic year of 2018-2019. From this statistical population, a sample of 2...
In this discussion note on Michal Pruski and Richard C. Playford’s “Artificial Wombs, Thomson Abortion – What Might Change?,” I consider whether the prospect of ectogenesis technology would make abortion impermissible. argue that a Thomson-style defense may not become inapplicable due to right life being conceived as negative right. Further, if defenses do inapplicable, those who claim be an ob...
In this paper, we address the problem of optimizing the style of textual content to make it more suitable to being listened to by a user as opposed to being read. We study the differences between the written style and the audio style by consulting the linguistics and journalism literatures. Guided by this study, we suggest a number of linguistic features to distinguish between the two styles. W...
abstract: literature is said beautiful words of poetry or prose that excites reader’s or listener’s feel. certainly, to be effective, such a text should have certain characteristics. the four elements of the literature: thought, imagination, emotion and style make a text to be literary and effective. emotion and imagination are specific elements of literary texts, while thought and style a...
aim and background: cognitive investigations of emotional disorders proposed that cognitive biases have at least a role as maintenance factors in psychopathology. this study aimed to compare the styles of attribution in a group of students with borderline personality traits and a normal group. methods and materials: this was a cross-sectional survey. through stratified random sampling, 330 stud...
Invasive Computing enables a resource-aware programming style, which includes adapting to external resource changes similar to malleability. We introduce asynchronously-malleable applications, which can adapt at any time without synchronizing the whole application, in contrast to specific synchronization points. We show how master-slave applications meet the requirements for asynchronous mallea...
This paper describes some preliminary work on the use of SCR-style speci cation as a tool for Independent Veri cation and Validation (IV&V). Our intention is to use formal methods not as a part of the development process itself, but as a `shadow' activity, performed by an independent team of experts. Our long-term expectation is that this approach will turn out to be a less painful way of intro...
to recognize and introduce the excellence works in the field of holy defense, the holy defense book festival is held yearly by bonyad-e hefz-e asar va arzshha-ye defae moqaddas. of the 2563 works published during the years 2011 to 2013, 9 titles from the publications of the center for holy defense documentation and research have nominated and commended to the jury to be rewarded or appreciated ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید