نتایج جستجو برای: horneyan defensive strategies
تعداد نتایج: 395881 فیلتر نتایج به سال:
If culture is seen as a framework of "should" and "should not", defensive culture isbased on issues, which are availablein the society. Issues that differ from one society to another and are influenced by the strategic culture of the countries. So, the present study aimed to answer the question that what are the most important components of a defensive culture in the framework of the strategic ...
in recent years, there has been a growing interest among researchers to investigate the relationship betweenteacher self-efficacy and classroom behavior management, especially students misbehavior. therefore, this study aimed to comparatively investigate english and arabic teachers’ use of different behavior managementstrategies, their self-efficacy, and their success in an iranian context. th...
Defensive forecasting is a method of transforming laws of probability (stated in game-theoretic terms as strategies for Sceptic) into forecasting algorithms. There are two known varieties of defensive forecasting: “continuous”, in which Sceptic’s moves are assumed to depend on the forecasts in a (semi)continuous manner and which produces deterministic forecasts, and “randomized”, in which the d...
In order to provide a safe and separate system on which to train, test, and teach computer and network security, a Reconfigurable Attack-Defend Instructional Computing Laboratory (RADICL) was designed and implemented at the University of Idaho Computer Science Department. The reconfigurable network system is relatively inexpensive to build even through it supports several operating systems in a...
As the NBA’s go-to offensive play, determining how to defend the ball screen is among the most critical decisions faced by NBA coaching staffs. In this paper, we present the construction and application of a tool for automatically recognizing common defensive counters to ball screens. Using SportVU player tracking data and supervised machine learning techniques, we learn a classi ier that label...
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources, or abusing protocols. Defending against networkbased attacks is a major focus area in the APOD (Application That Participate in Their Own Defense) project, which set out to develop technologies that increase an appli...
چکیده هدف اصلی این پژوهش تعیین رابطه استراتژیهای خود رهبری و خلاقیت اعضای هیات علمی دانشگاه علم و صنعت بوده است. در این پژوهش از روش توصیفی از نوع همبستگی استفاده شده است. جامعه آماری پژوهش کلیه اعضای هیات علمی دانشگاه علم و صنعت در سال تحصیلی 88-1387 بود که بالغ بر345 نفربودندو از این تعداد، 119 نفر استاد با استفاده از روش نمونه گیری تصادفی طبقه ای متناسب با حجم انتخاب شد. ابزار جمع آوری داده...
Unbalanced distribution of population in a country like Iran as well as accelerating urbanization and environmental degradation, both arising from incorrect location of industrial areas, are two problems that require appropriate industrial development policies to get resolved. Considering the expansion of industrial areas along with their role in contamination of the environment, it is necessar...
The objective of this research was to determine whether the tendency of highly avoidant adults not to recall attachment-related information is best explained through defensive strategies that operate on encoding or retrieval processes. In Study 1 participants listened to an emotionally evocative recording and were given both explicit and implicit tests of their memory for the material. Compared...
Despite their ambiguous historical record, conservation/development interventions the world over have remained a popular environmental governance tool. One of the latest global ‘trends’ are interventions to establish so-called ‘Transfrontier Conservation Areas’ (TFCAs): large contiguous spaces that are principally aimed at conserving biological diversity across national boundaries. In line with...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید