Suggested Topics within your search.
Suggested Topics within your search.
- English 11
- English language 11
- Swahili language 10
- Dictionaries 5
- French 5
- French language 5
- Medicine 5
- Geography 3
- Swahili 3
- Synonyms and antonyms 3
- Banks and banking 2
- Biochemistry 2
- Finance 2
- Idioms 2
- Law 2
- Molecular biology 2
- Nursing 2
- Personnel management 2
- Accounting 1
- Biological Factors 1
- Biology 1
- Chemistry 1
- Cooking 1
- Dictionaries, Juvenile 1
- Dictionary 1
- Doctrines 1
- Drugs 1
- Engineering 1
- English language--New words 1
- Figures of speech 1
-
281
Un cas de grammaticalisation ratée ? Étude diachronique de l’emploi du verbe stand en anglais
Published 2014-10-01“…This article discusses the different uses of the verb stand in earlier stages of the English language, based on data from the Oxford English Dictionary. While Modern English does not use the posture verbs all that much compared to the other Germanic languages where these verbs have become basic locative verbs, the older uses show that English stand (as well as the other posture verbs sit and lie) was used in a way quite similar to what is found in other Germanic languages today. …”
Get full text
Article -
282
Corpus based study of verbs explain and clarify as an example of assistance in pedagogical settings
Published 2020-12-01“…This paper examines the usage of the two verbs by looking into corpus data and uses Sinclair's methodological procedure as an alternative to dictionary references. Also included is a discussion of aspects and criticisms of corpus linguistics, mentions (and uses of) computer technologies for the analysis of language by discovering usage patterns, significant exceptions and semantic prosody, and exploring whether using corpora in the classroom would be beneficial to language learners.…”
Get full text
Article -
283
Discovery and segmentation method in micro-blog topics based on public emotional engagement analysis
Published 2016-07-01“…To improve the discovery efficiency and quality of micro-blog topic,a method of rapid discovery and segmentation in micro-blog topics based on public emotional engagement analysis was proposed,it would prompt evolution of the topics,then generate new topics and gain emotional change trend.Firstly,common emotional words were mined from corpus to build emotional thesaurus based on emotional word dictionary and TFDF.Then,emotional text was extracted quickly and sigmoid function was utilized to detect the intensive period of emotional engagement,ensuring the validity of topic mining.Besides,an improved adaptive FCM was used to cluster and discover topics.The experimental results show that this method can enhance the efficiency and quality of topic discovery in mobile environment.…”
Get full text
Article -
284
Réflexions sur l’histoire globale et transnationale
Published 2013-04-01“…Akira Iriye, qui a dirigé avec Pierre-Yves Saunier le Palgrave Dictionary of Transnational History, paru en 2009, retrace comment, au fil du XXe siècle et particulièrement depuis les années 1990, la communauté historienne s’est de plus en plus intéressée au phénomène de la mondialisation et à l’histoire globale et transnationale. …”
Get full text
Article -
285
Complex Dynamics of an Adnascent-Type Game Model
Published 2008-01-01“…See Webster's Revised Unabridged Dictionary published in 1913 by C. & G. Merriam Co., edited by Noah Porter.) …”
Get full text
Article -
286
Printed Persian Subword Recognition Using Wavelet Packet Descriptors
Published 2013-01-01“…The obtained feature vectors yield a pictorial dictionary for which an entry is the mean of each group that consists of the same subword with 4 fonts in 3 sizes. …”
Get full text
Article -
287
Sentiment Analysis of International and Foreign Chinese-Language Texts with Multilevel Features
Published 2022-01-01“…This paper selects three features: dictionary-based sentiment value feature, expression feature, and improved semantic feature. …”
Get full text
Article -
288
A new mathematical model to improve encryption process based on Split-Radix Fast Fourier Transform algorithm
Published 2025-01-01“…Several types of cryptoanalysis attacks such as brute-forcing, autocorrelation and dictionary attacks are comparatively evaluated and the end result of SRFFT evaluation indicates that SRFFT is preferable in many practical encryption applications since SRFFT complexity increases with the range of split-radix computations thus eliminating the potential chances of cryptanalysis attacks.…”
Get full text
Article -
289
L’archive (re)dessinée : documents et souvenirs dans les bandes dessinées d’Alison Bechdel
Published 2017-11-01“…Within her autobiographical work, Bechdel uses many written documents, from family letters to dictionary extracts. These documents are all copied out, meaning they are integrated to the panel as images and not simply inserted or reproduced. …”
Get full text
Article -
290
The Romantics of 1909: Arthur Symons, Pierre Lasserre and T. E. Hulme
Published 2016-12-01“…Arthur Symons’s The Romantic Movement in English Poetry (1909) has elicited scant discussion. Part dictionary of British authors born before 1800, part series of portraits of canonical Romantic poets, The Romantic Movement remains perplexing with its unclear purpose and ungainly format. …”
Get full text
Article -
291
Les faux-amis dans les notices lexicales des dictionnaires bilingues au service de l’apprentissage du FLE
Published 2024-10-01“…The article is devoted to lexical notes concerning false friends found in two compact Polish-French and French-Polish general dictionaries that have been commercially available for about fifteen years. …”
Get full text
Article -
292
Neologisms in contemporary feminisms: For a redefinition of feminist linguistic activism
Published 2023-12-01“…Based on a collection of neologisms in a crowdsourced dictionary, it is found that only a small portion of these neologisms align with the initial definition. …”
Get full text
Article -
293
THE INGENUITY OF THE TONAL PLAN OF THE DEVELOPMENT SECTIONS OF THE SONATA FORMS OF PIANO SONATAS BY W. A. MOZART
Published 2011-06-01“…I opened the Explanatory Dictionary of the Romanian Language to look for ingenuity in order to fins out the explanation for myself. …”
Get full text
Article -
294
Calculer la sémantique avec le langage IEML
Published 2023-12-01“…The article explains its dictionary, its formal grammar, and its integrated tools for building semantic graphs. …”
Get full text
Article -
295
L’instituteur du Code Soleil : la vocation d’un prophète missionnaire
Published 2013-01-01“…More famous than Ferdinand Buisson’s Dictionary, the Code Soleil was an essential reference in the initial training and the daily life of teachers from 1923 to 1979. …”
Get full text
Article -
296
Celestial $w_{1+\infty}$ charges and the subleading structure of asymptotically-flat spacetimes
Published 2025-01-01“…We do so using both the Bondi–Sachs and the Newman–Penrose formalism, via a dictionary built from a preferred choice of tetrad. …”
Get full text
Article -
297
Two-factor authenticated key agreement protocol based on biometric feature and password
Published 2017-07-01“…A new two-factor authenticated key agreement protocol based on biometric feature and password was proposed.The protocol took advantages of the user’s biological information and password to achieve the secure communication without bringing the smart card.The biometric feature was not stored in the server by using the fuzzy extractor technique,so the sensitive information of the user cannot be leaked when the server was corrupted.The authentication messages of the user were protected by the server’s public key,so the protocol can resist the off-line dictionary attack which often appears in the authentication protocols based on password.The security of the proposed protocol was given in the random oracle model provided the elliptic computational Diffie-Hellman assumption holds.The performance analysis shows the proposed protocol has better security.…”
Get full text
Article -
298
İBN KUTEYBE (v.276/889) VE TARİHÇİLİĞİ
Published 2008-11-01“…His books contain numerous sciences such as language, dictionary, poetry, Qur’an and Hadith as well as Islamic jurisprudence and history. …”
Get full text
Article -
299
Personalized requirements oriented trustworthy services recommendation based on social network
Published 2013-12-01“…In current background of service computing and society computing,it is difficult to obtain the trustworthy Web services to meet users' personalized requirements.To olve the problem,the trustworthy services recommendation model was proposed which orients personalized requirements based on socia twork.The decomposing and matching algorithm was proposed for users' personalized requirements,and the algorithm utilizes the semantic dictionary to improve the se-mantic match of users' requirements.Based on personal zed functional requirements and social trust values of network nodes and the services' direct trust values and indirect trust values,a trustworthy service recommendation algorithm was designed which meets the personalized requirements.By analyzing the correlation among the social network and services' trust values,the method can improve the performance of trustworthy services collaborative recommendation.The analysis of algorithms and experiments' results show that the approach is effective and feasible.…”
Get full text
Article -
300
Multi-server identity authentication scheme based on biometric and chaotic maps
Published 2017-02-01“…Password-based user remote authentication system has been widely used in recent years,the study found that a single password system is so vulnerable to dictionary analysis and brute force attack as well as other attacks that the security is not high.Biometric and password combination authentication method gradually added to the remote authentication system in order to improve the security level of authentication system.However,the existing authentication systems work in a single server environment,if extended to a multi-server environment,biometric templates and passwords will encounter single point breakthrough and cross-crack problem.In order to overcome the above problems,a multi-server key authentication scheme based on biometric and chaotic map was proposed.The scheme was based on smart cards,passwords and biometrics,which could significantly improve the security and the ability of anti-password guessing of multi-server authentication systems.…”
Get full text
Article