نتایج جستجو برای: referential subjects
تعداد نتایج: 337049 فیلتر نتایج به سال:
Rostral anterior cingulate cortex (rACC) plays a central role in the pathophysiology of major depressive disorder (MDD). As we reported in our previous study (Wagner et al., 2006), patients with MDD were characterized by an inability to deactivate this region during cognitive processing leading to a compensatory prefrontal hyperactivation. This hyperactivation in rACC may be related to a defici...
the purpose of this study was to investigate the effect of task repetition on accuracy of iranian efl learners ’speaking ability. in order to achieve this purpose, a null hypothesis was developed: there is no statistically significant difference between accuracy speaking ability in iranian efl learners by use of task repetition. ; of course i should mention that, beside this null hypothesis, an...
Two event-related brain potential experiments were conducted to investigate the functional interplay between discourse-level referential processing and local syntactic/semantic processing of phrases. We manipulated both the syntactic/semantic coherence of a noun phrase (NP) and the referential ambiguity of the same NP. Incoherence of the NP elicited a P600 effect in both experiments. Referentia...
Directed forgetting (DF) assists in preventing outdated information from interfering with cognitive processing. Previous studies pointed that self-referential items alleviated DF effects due to the elaboration of encoding processes. However, the retrieval mechanism of this phenomenon remains unknown. Based on the dual-process framework of recognition, the retrieval of self-referential informati...
Referential integrity, which guarantees that named resources can be accessed when referenced, is an important property for reliability and security. In distributed systems, however, the attempt to provide referential integrity can itself lead to security vulnerabilities that are not currently well understood. This paper identifies three kinds of referential security vulnerabilities related to t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید