Korpusnik

Slovene corpus summarizer

Other options:  Loading...
Results shown for:
  • gen (residual)

  • Sources: Loading...
  • Frequency: Loading...

Main points

Korpusnik is searching in five different corpora, thus the preparation of the results may take a while...

Text type

The five corpora, in which Korpusnik conducts its searches, contain over 5.5 billion tokens...

Domains

The five corpora, in which Korpusnik conducts its searches, contain over 5.5 billion tokens...

Common keywords

Korpusnik is searching in five different corpora, thus the preparation of the results may take a while...

Year of publication

For frequent lemmas, obtaining the results can take a while...

Collocations

The five corpora, in which Korpusnik conducts its searches, contain over 5.5 billion tokens...

Examples

  • For the purpose of acquiring detailed data of the flow mentioned, GEN tables have been used.

    Vpliv odtoka meteornih voda iz urbanih območij na spreminjanje poplavne varnosti, Fakulteta za gradbeništvo in geodezijo, Bojan Jakopič, 2010

  • The Role of Online Social Network Travel Websites in Creating Social Interaction for Gen Y Travelers.

    Analiza omrežja vozlišč spletne strani Imgur, Fakulteta za družbene vede, Tim Kokošinek, 2021

  • New generation–great expectations Exploring the work attributes of gen y.

    Izzivi managementa talentov glede na zaposlitvena pričakovanja generacije Y, Ekonomska fakulteta, Katja Podrepšek, 2017

  • R. Weinberger, Implications of normal brain development for the pathogenesis of schizophrenia, Arch. Gen.

    Vpliv topoloških lastnosti kompleksnih mrež in dinamičnih lastnosti sklopljenih celičnih oscilatorjev na kolektivno dinamiko, Fakulteta za naravoslovje in matematiko, Rene Markovič, 2015

  • The reader supports ISO-C or EPC Gen protocol.

    Tiskana pametna embalaža z vključitvijo funkcionalnih elementov, Naravoslovnotehniška fakulteta, Urška Kavčič, 2016

  • Everything you need to know about next-gen endpoint security.

    Nevarnosti zlonamernega programja pri piratski programski opremi, Fakulteta za varnostne vede, Blaž Rajh, 2019

  • Tretja in verjetno tudi najbolj celovita rešitev pa je zaščita končnih točk nove generacije (angl. next-gen endpoint protection platform).

    Nevarnosti zlonamernega programja pri piratski programski opremi, Fakulteta za varnostne vede, Blaž Rajh, 2019

  • Exploring its influence on creating meaningful engagement for gen Y workers.

    Analiza sodobnih pristopov motiviranja na primeru Geodetske uprave Nova Gorica, Ekonomska fakulteta, Polona Zavrtanik, 2018