Suggested Topics within your search.
Suggested Topics within your search.
- Syntax 4
- French language 2
- Grammar, Comparative and general 2
- Context (Linguistics) 1
- LANGUAGE ARTS & DISCIPLINES / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 1
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Syntax 1
- Perspective (Linguistics) 1
- Semantics 1
- Subjectivity (Linguistics) 1
-
281
Gender Differences in the Communication Styles of Vice-Chancellors: A Case Study of Professor (Mrs.) Rita Akosua Dickson and Professor Kwasi Obiri-Danso
Published 2024-10-01“…This study highlights the complexity of gendered language use, urging future research to consider broader speaker samples, specific language element functions, and social contexts in analysing gender differences in English syntax.…”
Get full text
Article -
282
Evaluation of the low-cost depth cameras for non-destructive testing
Published 2025-01-01“…Relatively, multiple differential approaches gave a less accurate result of a 15% error mainly due to syntax errors. Results suggest that the ZED depth camera is an effective tool for robust detection and measurement of cracks in concrete surfaces. …”
Get full text
Article -
283
Babachahi and Linguistic Components of Postmodern Poetry
Published 2021-05-01“…The following components would be dealt with in Babachahi poems: avoiding syntax; distracted language structure, the emphasis put on bypassing the wisdom, lack of integration and certainty, etc.…”
Get full text
Article -
284
Share on vk Share on google_plusone_share Share on twitter Share on email More Sharing Services The Swedish language of formal communication in the modern and contemporary times
Published 2020-10-01“…A fundamental change took place in the 20th century and is associated with the spelling reform of 1906, as well as significant changes in such elements of the Swedish business language as syntax, morphology, and vocabulary that emerged mostly in the second half of the 20th century. …”
Get full text
Article -
285
Evolution and Influencing Factors of Township Spatial Form: A Two-Dimensional Perspective
Published 2020-01-01“…This study used the fractal theory, center-of-gravity model, and spatial syntax to analyze the spatial and temporal evolution of Shenyang Ciyutuo Subdistrict and its influencing factors based on geospatial data from 2009‒2019, from the perspectives of internal characteristics and external morphological changes. …”
Get full text
Article -
286
Service Oriented Integration of Distributed Heterogeneous IT Systems in Production Engineering Using Information Standards and Linked Data
Published 2017-01-01“…While design of production systems based on digital models brings benefits, the communication of models comes with challenges since models typically reside in a heterogeneous IT environment using different syntax and semantics. Coping with heterogeneity requires a smart integration strategy. …”
Get full text
Article -
287
DESIGN ANDROID APPLICATION REMO PUTRI GAYA TAWI DANCE FOR VOCATIONAL STUDENTS
Published 2023-12-01“…The android design of the application in remo dance learning places interactive learning knowledge and skills of Tawi style princess remo dance based on 4 kinds of Tawi style princess remo movements and collaborates with project based learning syntax fosters student activity, interest, creativity and understanding so that mastery of the material both in practice and theory becomes very good i.e. 4.5, 4.7, and 4.8. …”
Get full text
Article -
288
CORRELATION OF PROPERTIES OF VITA-MEDIUM AND THEIR INTERPRETATIONS IN INTELLIGENT MODEL
Published 2017-05-01“…It is shown that the maximally full description of vita-medium with “the substantially sensor system” on the basis of expressed syntax properties implies introduction of complex assertions of experts built on elementary estimates. …”
Get full text
Article -
289
OLD RUSSIAN SUBORDINATE CLAUSE WITH A PARTICIPLE AS THE ONLY PREDICATIVE: A DIACHRONIC ASPECT
Published 2024-12-01“…Its relevance is expressed in the great importance of these constructions, in understanding the originality of Old Russian syntax in general and the features of the evolution of the syntactic functions of nominal active participles on the way of their transformation into gerunds in particular, and in the inconsistency of linguistic interpretation of their structure, functions, and genesis by various researchers. …”
Get full text
Article -
290
A Foreign Speech Accent in a Case of Conversion Disorder
Published 2005-01-01“…The foreign qualities of her speech did not only relate to pronunciation, but also to the lexicon, syntax and pragmatics. Structural as well as functional neuroimaging did not reveal evidence that could account for the behavioural symptoms. …”
Get full text
Article -
291
Investigating and Analyzing the Reflection of Folklore (Proverb) in the Novels of Jalal al-Ahmad
Published 2017-08-01“…In general, the folkloric elements used in al-Ahmad's stories can be divided into five main categories - proverbial, proverbial terms (Such as dialects), storytelling parables, popular vocabulary and syntax. This article seeks to study the position of this type of literary works in the works of Jalal al-Ahmad and presenting some of the proverbs and rulings contained in his works and explaining and explaining them the aspects of public literature or parts of it in contemporary stories, and in particular The work of Al-Ahmad, and the importance of this type of application in establishing the relationship with the reader and the general acceptability of his work.…”
Get full text
Article -
292
Subtitle Translation: Cultural Components in the Translation of the Film Qu'est-ce qu'on a fait au bon Dieu?
Published 2018-12-01“…In subtitle translation, which is a type of both intralingual and interlingual translations, audiovisual elements in the source text should be translated in a simple, clear and effective way in a short time in accordance with grammar and syntax rules of the target language. What the audience reads in the target language is what they hear in the source language. …”
Get full text
Article -
293
Post-verbal agreement and obligatory presence of particle to in Polish dual copula clauses
Published 2024-12-01“…It argues that to must be present because the syntax cannot successfully establish the φ-Agree relation between T and the post-verbal nominative expression (NPNOM2). …”
Get full text
Article -
294
ERROR ANALYSIS OF INDONESIAN STUDENTS IN LEARNING TIME ASPECT "着 ZHE" AT NANCHANG UNIVERSITY IN CHINA
Published 2020-10-01“…Mandarin language learners at the University of Nanchang, China, which had received writing, grammar and structure, and syntax courses. The purpose of this technique is to obtain relevant data in order to solve the problem of learning Mandarin, especially regarding the time aspect “着 zhe”. …”
Get full text
Article -
295
Lack of Correct Writing and Critical Attitude in Expressing Syntactic Principles Critique of Form and Content in the Book of Syntactic Theory in the Form of Argumentative Commenta...
Published 2021-04-01“…As one of the meanings of critique in the Arabic word is to take the bird’s grain and beak it to remove the healthy grain and to remove the defective and rotten grain. The science of syntax as one of the important disciplines of linguistics has been a strategic weapon of explorers of literary texts, and has always been considered by thinkers to provide critique and to write about scientific compositions. …”
Get full text
Article -
296
De la logique à l’algorithme : la traduction dans le design de programmes
Published 2022-07-01“…While the analytical models are similar, the linguistic goals are quite different : from the machine standpoint, automated translation focuses on syntax, and from a human standpoint, it focuses particularly on semantics. …”
Get full text
Article -
297
Optimization strategies for multi‐block structured CFD simulation based on Sunway TaihuLight
Published 2025-01-01“…In this article, we proposed several optimization strategies to improve the computing efficiency of multi‐block structured CFD simulation based on Sunway TaihuLight super computing system, including: (1) a load balancing decomposition approach combined with recursive segmentation of undirected graphs and block mapping for multi‐structured blocks, (2) two‐level parallelism that utilizes MPI + OpenACC2.0* hybrid parallel paradigms with various performance optimizations such as data preprocessing, reducing unnecessary loops of subroutine calls, collapse, and tile syntax, memory access optimization between the main memory and local data memory (LDM), and (3) a carefully orchestrated pipeline and register communication strategy between computing processor elements (CPEs) to tackle the dependence of LU‐SGS (Lower‐Upper Symmetric Gauss–Seidel). …”
Get full text
Article -
298
KATEGORINIŲ SAKINIŲ SEMANTIKA PORT ROYALIO LOGIKOJE
Published 2004-01-01“…Their semantics of categoricals is analysed in three aspects: understanding of syntax, interpretation of elementary parts and dependence on context. …”
Get full text
Article -
299
Automated deobfuscation and family classification system for Excel 4.0 macros
Published 2024-06-01“…XLMRevealer was architected upon abstract syntax trees and execution simulation, encompassing 138 comprehensive macro function handlers. …”
Get full text
Article -
300
Deep learning vulnerability detection method based on optimized inter-procedural semantics of programs
Published 2023-12-01“…In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon rules defined by experts, suffer from a high false negative rate.Deep learning-based methods have the capability to automatically learn potential features of vulnerable programs.However, as software complexity increases, the precision of these methods decreases.On one hand, current methods mostly operate at the function level, thus unable to handle inter-procedural vulnerability samples.On the other hand, models such as BGRU and BLSTM exhibit performance degradation when confronted with long input sequences, and are not adept at capturing long-term dependencies in program statements.To address the aforementioned issues, the existing program slicing method has been optimized, enabling a comprehensive contextual analysis of vulnerabilities triggered across functions through the combination of intra-procedural and inter-procedural slicing.This facilitated the capture of the complete causal relationship of vulnerability triggers.Furthermore, a vulnerability detection task was conducted using a Transformer neural network architecture equipped with a multi-head attention mechanism.This architecture collectively focused on information from different representation subspaces, allowing for the extraction of deep features from nodes.Unlike recurrent neural networks, this approach resolved the issue of information decay and effectively learned the syntax and semantic information of the source program.Experimental results demonstrate that this method achieves an F1 score of 73.4% on a real software dataset.Compared to the comparative methods, it shows an improvement of 13.6% to 40.8%.Furthermore, it successfully detects several vulnerabilities in open-source software, confirming its effectiveness and applicability.…”
Get full text
Article