نتایج جستجو برای: the middle way

تعداد نتایج: 16086368  

Journal: :Journal of Indian and Buddhist Studies (Indogaku Bukkyogaku Kenkyu) 2008

Journal: :Japanese Journal of Religious Studies 1963

Journal: :Television & New Media 2008

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سمنان - دانشکده علوم انسانی 1393

postcolonial feminism, also dubbed as third world feminism, is an innovative approach, demonstrating the way women of colonized countries suffer from both native patriarchies and imperial ideology. also due to this double-colonization, postcolonial feminists contend that third world women are subjected to both colonial domination of empire and male domination of patriarchy. while western femini...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده ادبیات و زبانهای خارجی 1391

abstract lexical knowledge of complex english words is an important part of language skills and crucial for fluent language use (nation, 2001). the present study, thus, was an attempt to assess the role of morphological decomposition awareness as a vocabulary learning strategy on learners’ productive and receptive recall and recognition of complex english words. so 90 sophomores (female and ma...

Journal: :SHAHIH : Journal of Islamicate Multidisciplinary 2016

Journal: :Ars Disputandi 2001

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده زبانهای خارجی 1390

writing as a productive skill requires practice in the basic sub-skills of vocabulary and grammar. in fact, grammar has been viewed as the core of programs in writing classes to help the students put the elements of sentence together and combine sentences of specific lengths to come up with an error-free work of art. conceptualizing l2 writing in this way introduces writing as a product and enc...

2009
Sebastiaan Indesteege Bart Preneel

We illustrate how coding theory was applied in the design of the cryptographic hash function LANE [8]. The generic structure of the LANE compression function could potentially be vulnerable to a class of meet-in-the-middle attacks. While difficult to avoid at first sight, restating the problem in the domain of error correcting codes naturally leads to a simple and elegant solution. This ensures...

Journal: :IACR Cryptology ePrint Archive 2007
Markku-Juhani O. Saarinen

We show that a 2 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to existing published FORK-256 cryptanalysis work, yet is the best known result against the new, tweaked version of the hash. The attack is based on “splitting” the message schedule and compression function into two halves in a meet-in-the-middle attack. This in turn reduces t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید