نتایج جستجو برای: with emphasis on gratuitous evil

تعداد نتایج: 13061359  

2008
Joonsung Bae Joo-Young Kim Hoi-Jun Yoo

This paper presents a high speed and low energy transceiver for 10mm long minimum width on-chip global interconnects. To improve the link bandwidth, the transmitter employs a capacitive-resistive pre-emphasis technique and the receiver employs the AC-coupled Resistive Feedback Inverter (RFI) de-emphasis technique. Exploiting two emphasis techniques, the proposed interconnect achieves 1.26GHz ba...

2012
Xiajun Hu Jing Guo

The view of evil human nature is important in Chinese and western cultures. The thesis chooses evil human in St. Augustine’s thoughts and Hsun Tzu’s thoughts to compare and analyze evil in these two. St. Augustine, who is called “the Saint of God”, views the definition of evil, the resource of it, and salvations of it from the aspect of religious beliefs. He considers that evil is the privation...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

chapters 1 and 2 establish the basic theory of amenability of topological groups and amenability of banach algebras. also we prove that. if g is a topological group, then r (wluc (g)) (resp. r (luc (g))) if and only if there exists a mean m on wluc (g) (resp. luc (g)) such that for every wluc (g) (resp. every luc (g)) and every element d of a dense subset d od g, m (r)m (f) holds. chapter 3 inv...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1391

building on previous studies on intellectual features and learners’ grammar learning, the present study aimed at investigating whether intelligence criterion had any impact on efl learners’ english grammar learning across two intelligence levels. in the current study, the participants were divided into two experimental and control groups by administration of raven i.q. test. this led to the for...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی 1393

abstract: the present study is an attempt to find out cultural exophoric references in iranian high-school elt textbooks and touch stone series to compare the frequency of occurrence of such references in these books. the purpose is to find out which of the series of the books under investigation impose a greater referential burden on efl learners as far as their reading comprehension of the ...

2003
Currie v Misa

The doctrine of consideration, with its emphasis upon exchange, and its general rejection of 'more for the same', seems inadequate for the modern environment in which flexible rewards may reflect the employer's concern that the importance of individual staff to an enterprise may not remain constant and may alter as the commercial context in which their work is performed fluctuates. Although ver...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1389

this thesis is a study on insurance fraud in iran automobile insurance industry and explores the usage of expert linkage between un-supervised clustering and analytical hierarchy process(ahp), and renders the findings from applying these algorithms for automobile insurance claim fraud detection. the expert linkage determination objective function plan provides us with a way to determine whi...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده ادبیات و زبانهای خارجی 1390

this study investigated the effects of planning on second-language written production with regard to task type. the participants were 75 iranian learners of english as a foreign language attending a private foreign language institution. they were asked to complete two different types of writing tasks (expository writing task and argumentative writing task) in different planned conditions (indiv...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده علوم انسانی 1390

this study investigated the effects of manipulating the cognitive complexity of tasks along +/- few elements and the time limits on l2 learners writing performance. to conduct the study, 60 iranian efl learners with two levels of proficiency, low and high intermediate, were selected and assigned to three groups based on the time devoted to task completion. the participants performed both a simp...

2010
Yimin Song Chao Yang Guofei Gu

In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users’ Internet access. Existing evil twin detection solutions are mostly for wireles...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید