نتایج جستجو برای: to hide their illegal relations

تعداد نتایج: 10872293  

2015
Manoj Kumar

As the digital multimedia are integrated via the network, large amount of data is transfer and circulated easily and becoming faster, easier, and require less effort to make exact copies. This progress will benefit multimedia product owners as sales will increase. The major obstruction is the lack of effective intellectual property protection of digital media to put off unauthorized copying and...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

colonialism is an important factor in cultural production and many of cultural constructs all over the world. english and english language teaching are at the center of the contemporary world. postcolonial literature, the genre achebe exercised, is a kind of historical text which has become central to different debates and criticisms. in this thesis, different elements related to the colonial...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده زبانهای خارجی 1391

abstract this study tried to investigate whether there was any significant relationship between technical translation quality of the senior english translation students and their levels of verbal-linguistic, visual-spatial and interpersonal intelligences. in order to investigate the research questions, the researcher selected a hundred senior english translation students from three universitie...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم انسانی و اجتماعی 1392

most specialists in the field of foreign language teachingconsiderreading skill as an interactive process between the reader’s prior knowledge and the text.accordingly, the activation of prior knowledge for an effective comprehension is very important. it is generally agreed that the pre-reading phase is the stage where this type of interaction and activation may be enhanced throughcertain stra...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک 1388

the world wide web becomes very popular recently and plays an influential role in english learning. by burgeoning role of source-based writing as partial fulfillment of tefl courses and vast use of the internet, lack of empirical studies to explore these areas is obvious. this study aimed to explore the effect of the amount of familiarity with the web (internet literacy) on junior english stude...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1390

one very decisive factor in students’ academic destiny is the result they get at final term examinations. because of its importance, both students and teachers are curiously anxious about them. as normally it is the case, these final term tests are prepared hurriedly in short time by teachers which result in students’ dissatisfaction, complaining on how the test was different from their expecta...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1389

abstract present research considered to examine and compare shahrray 14 years girls and boys narrative concerning with their responsibilities in this research, statistical society are 14 years girls and boys of shahrry . for performing this research. first, 14 years of 50 boys and 50 girls were selected in accidental method and have filled memati hormaled adolescents responsibility questioner...

2013
Amarjeet Kaur Supreet Singh

Digital Watermarking offers techniques to hide watermarks into digital content to protect it from illegal copy or reproduction. Existing techniques based on spatial and frequency domain suffer from the problems of low Peak Signal to Noise Ratio (PSNR) of watermark and image quality degradation in varying degree. In earlier papers, the author proposed only the watermark was embedded and extracte...

2007
Giannakis Antoniou Stefanos Gritzalis

Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who perform illegal actions through the Internet. The paper identifies the collision of these opposite-goal technologies and describes what happens in case they come across. Can a Netwo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید