نتایج جستجو برای: Multiple identities
تعداد نتایج: 781070 فیلتر نتایج به سال:
this ethnographic case study research was carried out in a private school setting in the context of iran. the research tried to explore the analysis and identity construction of a group of learners and teachers along with the content analysis of books on the basis of four types of commodified, political, national and narrative identities. how english language learners and teachers in an informa...
although university efl students represent a wide array of social and cultural identities, their multiple and diverse identities are not usually considered in foreign language classrooms. this qualitative case study attempted to examine identity conflicts experienced by iranian efl learners at the university context. to this end, two shiraz university students' identities were investigated. sem...
Although university EFL students represent a wide array of social and cultural identities, their multiple and diverse identities are not usually considered in foreign language classrooms. This qualitative case study attempted to examine identity conflicts experienced by Iranian EFL learners at the university context. To this end, two Shiraz University students' identities were investigated. Sem...
A remarkable multiple analogue of the Stirling numbers of the first and second kind was recently constructed by the author. Certain summation identities, and related properties of this family of multiple special numbers are investigated in the present paper.
An overview is given of effective gravitational field theories with fixed background fields that break spacetime symmetry. The behavior of the background fields and the types of excitations that can occur depend on whether the symmetry breaking is explicit or spontaneous. For example, when the breaking is spontaneous, the background field is dynamical and massless Nambu–Goldstone and massive Hi...
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید