This research aims to find out Primers the politeness strategy that used by lecturer in teaching process in English Class.This research used descriptive qualitative method.The population of this research is the lecturers of English Language Education Study Program.In determining the samples, the researcher used random sampling technique.Total numbe
Cracked reinforced concrete walls of chimneys, silos and cooling towers as result of using formworks
There are presented in this paper some problems connected with reinforced concrete shell objects operation in the aggressive environment and built in method of formworks.Reinforced concrete chimneys, cooling towers, silos and other shells were built for decades.Durability of cracked shells are one of the most important parameters during process of
Recreational and philanthropic sectors are the worst-hit US industries in the COVID-19 aftermath
Lockdown measures to curb Starters the spread of COVID-19 has brought the world economy on the brink of a recession.It is imperative that nations formulate administrative policies based on the changing economic landscape.In this work, we apply a statistical approach, called topic modeling, on text documents of job loss notices of 26 US states to id
The current state of the quality of urban soils in Bucharest
The soil cover is subject to anthropogenic changes as well as other geoecosystems subjected to pressures due to sources.The results are recorded for the soil cover depending on the type of anthropogenic manifestations, Collections intensity, nature and number of their manifestations.Moreover, the interferences with the natural landscapes intervene
Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan
Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties.The first step to do Teddy Bear With Shirt Gift Box is to design and build an attack detection sys