نتایج جستجو برای: constantly represents signs
تعداد نتایج: 259764 فیلتر نتایج به سال:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Biobank is a very sophisticated system that consists of a programmed storage of biological material and corresponding data. Biobanks are created to be used in medical research, in clinical and translational medicine, and in healthcare. In the past 20 years, a large number of biobanks have been set up around the world, to support the modern research directions in medicine such as omix and person...
Bullying is a complex phenomenon that the school constantly faces, whether it known and identified or not. It about what we call teasing repeated harassment applied to others verbally, emotionally physically. Because bullying represents an asymmetric relationship between aggressor victim because those involved are children teenagers, necessary adults in their lives, i.e. teachers parents, well ...
Alcohol urban environment has been associated with individual alcohol behaviors. We are constantly exposed to a wide variety of alcohol products, its marketing and promotion and signs of alcohol consumption that may influence alcohol-drinking behaviors. In this photo-essay, we include photographs that visually explain the exposure to alcohol in the urban streetscape of Madrid. These photographs...
In this paper, we shall argue that games, being textual systems, can be understood semiotically signs, or units, are being constantly renegotiated within the game due to their ergodicity. However, the mythologies outside of them remain, leading to a potential discrepancy between what is and what is understood. An understanding of player mythologies can, on one hand, help us formulate a better s...
Cryptographic protocols are constantly exposed to new attack methods. When some cryptographic protocol gets exposed there is a need to replace it. This is hard because most cryptographic protocols are hard coded in applications. Applications should implement a way of negotiating cryptographic protocols used. In that way old and vulnerable protocols could be easily replaced with new ones. The ag...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید