نتایج جستجو برای: however it is symbolically
تعداد نتایج: 7855281 فیلتر نتایج به سال:
this study attempts to investigate the effect of peers’ revision in comparison to that of the teacher, and whether peers’ comments and teachers’ comments facilitate students’ revision? if yes, which one is more effective? also attempts have been made to see which aspects of language are more highlighted by peers versus teachers when commenting. besides, it is investigating the student’s attitud...
toury (1978:200) believes that translation is a kind of activity which inevitably involves at least two languages and two cultural traditions. being polite while asking for something takes place differently in different cultures and languages, therefore various strategies may be applied for making requests and also translation of them in order not to disturb or threaten the face or better to sa...
hedging is a multi-purpose rhetorical strategy which is usually used in scientific arguments to secure ratification of claims, reduce the risk of negation, avoid conflict, manage disagreement and leave room for the audience to assess presented information. hedges are frequently used in research articles to mitigate the findings of research endeavors. the present research aims to investigate the...
the current thesis is composed in five chapters in the following fashion: chapter two encompasses the applied framework of the project in details; the methodology of carl gustav jung to explain the process of individuation, the major archetypes and their attributes and his techniques to assess the mind’s strata are all explained. moreover, the austrian psychoanalysts, heinz kohut’s models of a...
in the first chapter we study the necessary background of structure of commutators of operators and show what the commutator of two operators on a separable hilbert space looks like. in the second chapter we study basic property of jb and jb-algebras, jc and jc-algebras. the purpose of this chapter is to describe derivations of reversible jc-algebras in term of derivations of b (h) which are we...
In the field of security protocol analysis, a class of automated methods relies upon the use of symbolic techniques. We illustrate this approach by focusing on one such method. We outline the underlying protocol model, the concept of symbolic execution and the resulting verification method. We then discuss the benefits of the symbolic approach when contrasted with traditional methods baded on f...
Methods from computer algebra, mostly so called Grr obner bases from commutative algebra, are used to solve the algebraic Riccati equation (ARE) symbolically. The methods suggested allow us to track the innuence of parameters in the system or penalty matrices on the solution. Some non-trivial aspects arise when addressing the problem from the point of view commutative algebra, for example the o...
The SEILS Dataset: Symbolically Encoded Scores in Modern-Early Notation for Computational Musicology
The automatic analysis of notated Renaissance music is restricted by a shortfall in codified repertoire. Thousands of scores have been digitised by music libraries across the world, but the absence of symbolically codified information makes these inaccessible for computational evaluation. Optical Music Recognition (OMR) made great progress in addressing this issue, however, early notation is st...
in the area of vocabulary teaching and learning although much research has been done, only some of it has led to effective techniques of vocabulary teaching and many language learners still have problem learning vocabulary. the urge behind this study was to investigate three methods of teaching words. the first one was teaching words in context based on a traditional method of teaching that is,...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید