Suggested Topics within your search.
Suggested Topics within your search.
- English language 101
- Rhetoric 63
- Report writing 43
- Grammar 42
- College readers 19
- English 18
- French language 18
- Swahili language 12
- Handbooks, manuals, etc 11
- Problems, exercises, etc 11
- Usage 11
- Study and teaching 10
- Sociolinguistics 9
- Academic writing 8
- Language 8
- Law 8
- Language and languages 7
- History 6
- Readers 6
- Spanish language 6
- Foreign speakers 5
- French 5
- Business writing 4
- History and criticism 4
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 4
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 4
- Linguistics 4
- Semantics 4
- Syntax 4
- kiswahili language 4
-
7281
À quel(s) public(s) s’adresse Darwin ? L’Origine des Espèces, entre ouvrage scientifique, œuvre littéraire, et texte de vulgarisation
Published 2010-06-01“…Darwin uses a conversational style to create a special closeness with his reader, as well as popular language and images to convince as wide an audience as possible while flattering his reader’s humanist appetencies thanks to various literary devices. …”
Get full text
Article -
7282
Is Every Theory about Photography a Critical Action? Looking at the Book “Photography: A Critical Introduction”
Published 2020-04-01“…Moreover, the translation of this book to Persian language is reliable. Every section of the book does not depend on another section, so every section can be regarded as a book. …”
Get full text
Article -
7283
THE CHORAL FRAMEWORK IN THE OPERA DECEBAL BY TEODOR ZGUREANU
Published 2013-06-01“…For the most part, he uses rhythmic-melodic elements specific to the folkloric melodicity, elements that draw their essence from the century-long experience of the folk artist that he decants by subjecting them to his own, unmistakable language. The multiple-level contrasts (dynamic, rhythmic, timbral, of registers), the vitality, energy, tension, harshness and density are the main characteristics of this opera, in which we find clarity and self-confidence in composition, build-ups and tensions disrupted by breaks or by contrasting sections, but also a persistency in using melodic-rhythmic cells of folk origin. …”
Get full text
Article -
7284
Ovarian Mature Cystic Teratoma: Challenges of Surgical Management
Published 2016-01-01“…The search was limited to articles in English language, humans, and female. The two authors conducted the search independently. …”
Get full text
Article -
7285
Measuring Cardiovascular Disease Risk Perception: Translation and Validation of the Indonesian ABCD Risk Questionnaire
Published 2024-01-01“…However, this questionnaire is not available in Indonesia language. Methods. The original questionnaire was translated in both directions forward and backward. …”
Get full text
Article -
7286
Tjieng Tjang Tjerries and other stories by Jolyn Phillips
Published 2023-07-01“…She stays true even to the mix of English and Afrikaans spoken in the town, and code-switches from one language to the other regularly and unapologetically so. …”
Get full text
Article -
7287
Coding-aware secure routing for multi-hop wireless networks
Published 2012-06-01“…To address security issues of DCAR in“coding+routing”discovery,a new security destination was proposed and a distributed coding-aware secure routing(DCASR)was designed.DCASR guarantees discovery of correct coding opportunity and establishment of trusted routes by using cryptography.To analyze the properties of DCASR,LS2(logic of security systems)was extended,and a new logic LS2-RP(LS2 for routing protocol)was proposed.In LS2-RP,the concepts of location and neighboring location of thread were introduced.The dynamic topology of multi-hop wireless networks was described by the set of neighbors for thread.The broadcast rule of neighboring location threads modeled the feature of wireless broadcast communication.Finally,DCASR was described by programming language of LS2-RP and security properties were defined by predicates and modal formulas of LS2-RP.Security of DCASR was analyzed by using the proof system of LS2-RP.DCASR can satisfy our secure destination.…”
Get full text
Article -
7288
Put'-doroga ('Along the road')
Published 2017-10-01“…The conceptual meaning of the word becomes a hyperonym of the literary language as a compound with the largest number of distinguishing features.…”
Get full text
Article -
7289
“True fiction” – the memory and the postmemory of traumatic war events in a picturebook
Published 2016-05-01“…The picturebook, like other types of art, operates through the language of fiction to tell the truth. Art is one of the languages of historical narration. …”
Get full text
Article -
7290
Leches a base de plantas: Coco
Published 2020-11-01“…This is the Spanish language version of: Andreo, Celia, Daniela Rivero-Mendoza, and Wendy Dahl. 2020. …”
Get full text
Article -
7291
Grammatical aspect in Polish and the perception of event duration
Published 2021-12-01“…In the study reported here, we conducted an experiment examining whether the same effect can be observed in Polish, a language with a morphologically realised perfective vs. imperfective distinction. …”
Get full text
Article -
7292
Evaluación del Daño y Restauración de los Árboles Después de un Huracán
Published 2006-10-01“…Duryea, Eliana Kampf, Traci Jo Partin, Astrid Delgado, and Carol Lehtola is the Spanish language version of ENH-1036, "Assessing Damage and Restoring Trees after a Hurricane", funded by the Florida Division of Forestry and the USDA Forest Service, Southern Region as part of the Urban Forest Hurricane Recovery Program. …”
Get full text
Article -
7293
„In der englischen Sprache zu schreiben war eigentlich eine Zumutung für mich“
Published 2019-12-01“…Contrary to other protagonists of the German intercultural literature, Tabori, who fled the Nazi terror, didn’t (re)find his way back in German language even though he moved in the Federal Republic of Germany in the beginning of the 1970s. …”
Get full text
Article -
7294
From Ambiguity to Deceptiveness: the Case of Hybrid since- Subordinates in English
Published 2012-03-01“…Such cases call for the grammar of any given language to allow for a ‘remainder’, to borrow Jean-Jacques Lecercle’s term.…”
Get full text
Article -
7295
Forecast and Simulation of the Public Opinion on the Public Policy Based on the Markov Model
Published 2021-01-01“…In response to this problem, this paper integrates the internet, public information, market credit information, and other data, uses hidden Markov models and natural language processing technology, and establishes a modern government public policy and public opinion monitoring and early warning model to evaluate government credit in real time; the government can formulate relevant policies based on the evaluation results to improve the government’s governance capabilities. …”
Get full text
Article -
7296
Pitones Birmanas en Florida del Sur: Soporte Científico para el Manejo de Especies Invasoras
Published 2008-09-01“…Mazzotti and translated by Marianna Domínguez, is the Spanish language version of WEC-242, Burmese Pythons in South Florida: Scientific Support for Invasive Species Management. …”
Get full text
Article -
7297
EFMDR-Fast: An Application of Empirical Fuzzy Multifactor Dimensionality Reduction for Fast Execution
Published 2018-12-01“…However, EFMDR is relatively slow, because it is implemented by R script language. Therefore, in this study, we implemented EFMDR using RCPP (c++ package) for faster executions. …”
Get full text
Article -
7298
Robots poètes chez Stanisław Lem : réflexions sur la nécessaire étrangeté de la langue littéraire en contexte soviétique
Published 2020-12-01“…The short story is then one example of « Esopic language », whose aim was to deliver hidden messages to the reader via a change in setting or the use of a fable. …”
Get full text
Article -
7299
The development of children's Web searching skills - a non-linear model
Published 2005-01-01“…In this case the respondents have also commented upon the result.The students regard six different skills as fundamental: language, knowledge about the technology, knowledge about different ways of information seeking, how search engines work, setting goals and being critical.…”
Get full text
Article -
7300
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…The large number of software and the enhancement of complexity have brought severe challenges to the research of software security vulnerabilities.The efficiency of manual research on security vulnerabilities is low and cannot meet the needs of cyberspace security.Therefore,how to apply artificial intelligence techniques such as machine learning and natural language processing to the study of security vulnerabilities has become a new hot spot.Artificial intelligence technology can intelligently process vulnerability information,which can assist in the research of security vulnerabilities and improve the efficiency of research on security vulnerabilities such as vulnerability mining.Firstly,the key technologies of automatic mining,automatic assessment,automatic exploitation and automatic repair of security vulnerabilities were analyzed,which pointed out that the automation of security vulnerability mining was the key of the application of artificial intelligence in the field of security vulnerability.Then,the latest research results of applying artificial intelligence technology to the research on security vulnerabilities was analyzed and summarized in recent years,which pointed out some problems in the application and gave corresponding solutions.Finally,the development trend of intelligent research on security vulnerabilities was prospected.…”
Get full text
Article