نتایج جستجو برای: through victim
تعداد نتایج: 1358857 فیلتر نتایج به سال:
the present study was conducted to investigate the effect of implicit focus on form through input flooding and the effect of noticing, explicit focus on form on linguistic accuracy. to fulfill the purpose of the study, 86 iranian pre-intermediate efl learners of one of the language institutes were chosen by means of administering ket as the homogeneity test. these learners were pretested throug...
Humor is hypothesized to be a social activity that alters the status of the humorist positively and that of the object or victim negatively. Of the two traditionally distingushed classes of humor, "ostracizing" humor singles out a victim, with others present or absent either incidental affiliates of the humorist (and one another) or unaffected. "AltBiative" humor, on the other hand, is focused ...
Series of briefings on violence prevention This briefing for advocates, programme designers and implementers and others is one of a seven-part series on the evidence for interventions to prevent interpersonal and self-directed violence. The other six briefings look at reducing access to lethal means; increasing safe, stable and nurturing relationships between children and their parents and care...
A defense strategy against denial-of-service attacks is to trace the source of every attack packet for the sake of penalizing the attacker or isolating him from the network. An IP traceback scheme proposed by the authors suggests that routers notify the victim of their presence in the attack path by inserting traceback information on routed packets. With the received information, the victim ini...
In this work, we examine how an adversary in control of a BGP speaker in a transit AS can cause a victim router in an arbitrary location on the Internet to become unstable. Through experimentation with both hardware and software routers, we look at the behavior of routers under abnormal conditions and come to four conclusions. First, routers placed in certain states behave in anything but a sta...
In this paper, we present a general description of the software architecture and algorithms to be used by the UC Merced team during the Virtual Robot Rescue Simulation Competition at RoboCup 2009. Building upon our good performance in the same competition last year, our framework and team description paper will closely resemble past work. Our goal is to concentrate on robotic cooperation and th...
Crime statistics are most frequently concerned with the incidence of crime (usually quoted as a rate per population), occasional statistics are concerned with prevalence (number or proportion of victims within the population) but the concentration of crime (number of crimes per victim) is rarely quoted. This paper aims to demonstrate the importance of all three indicators of crime, prevalence, ...
Detection of crosstalk induced glitch faults is important as they can result in erroneous output if the glitch effect propagates to a primary output or to an intermediate flipflop. A new method is thus presented in this paper to generate test patterns for crosstalk induced glitch faults followed by compaction of the test set. By considering the spatial and temporal aspects between the victim an...
The Aviation Disaster Family Assistance Act of 1996 requires the National Transportation Safety Board (NTSB), air carriers, and the American Red Cross (ARC) to provide an integrated family assistance center to offer support to family survivors of mass casualties. A central component of post-incident response is the timely identification of victims and their personal belongings. This identificat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید