intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Reference english

Xem 1-20 trên 279 kết quả Reference english
  • The concept of linguistic capital is pivotal within the sphere of sociolinguistics and has significant implications for the language learning process. Originating from Bourdieu's broader sociological framework which delineates various forms of capital—economic, social, cultural, and symbolic—linguistic capital specifically refers to the mastery of and facility with language that confers power and status within a given social sphere (Bourdieu, 1991).

    pdf10p vijiraiya 19-05-2025 1 1   Download

  • Lecture Cryptography: Introduction to Cryptography Courses is designed for students beginning their journey into the field of cryptology. The lecture provides an overview of the course structure, syllabus, and resources available for study and practice. It also explains expectations for assessments and how students can engage in hands-on projects and labs. Please refer to the lecture for more details!

    ppt19p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Cryptology Overviews introduces the fundamental concepts of cryptography and its applications. The lecture explores core terminologies, classical cipher systems, and the evolution of algorithms in cryptographic science. It sets the stage for understanding the practical use of cryptography in securing information. Please refer to the lecture for more details!

    ppt60p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Modern Symmetric Ciphers (Part 1) focuses on classical symmetric cipher algorithms and introduces modern techniques. The lecture explores block ciphers, stream ciphers, and provides an in-depth analysis of the Data Encryption Standard (DES). This serves as a foundation for understanding advanced symmetric encryption. Please refer to the lecture for more details!

    ppt64p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Modern Symmetric Ciphers (Part 2) delves into the Advanced Encryption Standard (AES) and modes of operation. The lecture explains how AES improves upon previous methods and introduces multiple techniques for secure encryption processing. It also examines how data can be handled in different cipher modes. Please refer to the lecture for more details!

    ppt74p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Modern Asymmetric Ciphers (Part 1) transitions to asymmetric cryptography, offering a review of stream ciphers, DES, and AES. The lecture sets the groundwork for more complex public-key cryptography systems. It also touches on potential enhancements like dynamic AES. Please refer to the lecture for more details!

    ppt44p hoatrongguong03 15-05-2025 3 1   Download

  • Lecture Cryptography: Modern Asymmetric Ciphers (Part 2) introduces core public-key algorithms such as the ElGamal cipher and Diffie-Hellman key exchange. These methods are critical for secure communication in decentralized environments. The lecture emphasizes their mathematical foundations and security properties. Please refer to the lecture for more details!

    ppt22p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Asymmetric Ciphers (Part 3) extends into advanced asymmetric systems, including logarithm-based encryption and elliptic curve cryptography. It also introduces quantum-resistant algorithms, emphasizing future-oriented cryptographic security. This lecture highlights ongoing innovations in public-key systems. Please refer to the lecture for more details!

    ppt42p hoatrongguong03 15-05-2025 2 1   Download

  • Lecture Cryptography: Authentication (Part 1) introduces digital signature concepts and signature schemes including ElGamal and Schnorr methods. It explores motivations for authentication and standard practices in digital identity verification. This lecture emphasizes the role of trust and integrity in communication. Please refer to the lecture for more details!

    ppt47p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Authentication (Part 2) continues with hash functions and message authentication codes. The lecture highlights how cryptographic hashes play a role in verifying data integrity and origin. It also presents practical tools used to ensure authenticity in digital communications. Please refer to the lecture for more details!

    ppt36p hoatrongguong03 15-05-2025 1 1   Download

  • Lecture Cryptography: Authentication (Part 3) continues the exploration of message authentication and hash functions. The lecture reinforces key cryptographic tools to prevent tampering and verify message legitimacy. It provides practical perspectives on implementing secure communications. Please refer to the lecture for more details!

    ppt32p hoatrongguong03 15-05-2025 5 1   Download

  • Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!

    ppt62p hoatrongguong03 15-05-2025 3 1   Download

  • Lecture Cryptography: Cryptography Applications (Part 2) explores modern applications of cryptography in blockchain systems. It covers secure transactions, consensus mechanisms, and network architecture. This lecture illustrates how cryptography underpins the security and trust of decentralized platforms. Please refer to the lecture for more details!

    ppt46p hoatrongguong03 15-05-2025 2 1   Download

  • Hypertension is one of the most common cardiovascular diseases, often referred to as the silent killer. The prevalence of hypertension is increasing globally. This study investigates certain clinical and subclinical characteristics, cardiovascular risk factors in hypertensive patients, and evaluates the correlation between these risk factors and target organ damage with systolic and diastolic blood pressure.

    pdf8p vijiraiya 19-05-2025 3 1   Download

  • The current study aimed to investigate the effectiveness of using "Baamboozle" in enhancing student participation in EMI classes at a public university in Vietnam. Specifically, this study was conducted over ten weeks and used research tools including a questionnaire survey of 50 students and classroom observation.

    pdf9p vijiraiya 19-05-2025 1 1   Download

  • From years to years, reading remains a lifelong learning skill essential both in academic settings and throughout life. This paper aims to serve as a reference by providing a suggested procedure to apply KWL approach in reading activities for English majors at Thuyloi university.

    pdf3p vimaito 11-04-2025 1 1   Download

  • Dam Safety Practice refers to the safe operation and management of dams and their reservoirs for all stages of the dam’s lifecycle that follow construction and commissioning. Considering the safety of dams once they commence operation is necessary to protect people, property and the environment from the potentially catastrophic impacts of a dam failure or uncontrolled release from the impounded reservoir.

    pdf10p vimaito 11-04-2025 2 1   Download

  • The study’s outcome can be utitlised as references for further research to elaborate and validate the theoretical framework of storytelling genre or applied in other fields such as pedagogy, literature or contrastive linguistics.

    pdf15p viling 11-10-2024 3 1   Download

  • This research aims to enhance comprehension of legal texts by applying Talmy's (2017) threestep process for identifying and integrating referents from contextual cues into linguistic forms. Drawing on pragmatics, discourse analysis, cognitive semantics, and Talmy's force dynamics notion, a qualitative content analysis investigates the cognitive processes readers use for cue detection, attention allocation, and semantic integration when reading court indictments.

    pdf13p viling 11-10-2024 4 1   Download

  • The paper explores how university financial autonomy policy information is presented and emphasized in various online newspapers using Agenda-Setting Theory and Framing Theory in the field of communication. The study analyzed 289 journalistic works from three newspapers, namely Giao duc and Thoi dai Online Newspaper, Giao duc Vietnam Online Magazine, and Dan tri Online Newspaper, covering the period from July 2017 to December 2020.

    pdf18p viengfa 28-10-2024 4 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

 

Đồng bộ tài khoản
147=>0