1,046 research outputs found
Hypothesis of Interaction: Reflections on its Theoretical and Practical Contributions for Second Language Acquisition (SLA)
This article is about one of the most influential hypothesis in the fields of applied linguistics and language learning. It is based on the work of a number of scholars who contributed to the understanding of this hypothesis such as Steve Krashen, Mike Long, Teresa Pica and Merrill Swain. It starts with a brief introduction about the significance of interaction hypothesis generally in language learning in general and its central role in second language acquisition (SLA). The next section reviews some of the fundamental works and studies that have investigated the theoretical and practical understanding of this phenomenon and its relationship to learnersรขโฌโข achievement. It also highlights the contribution of interaction hypothesis to learning in two basic areas: noticing and feedback. There are explanatory examples presented in the following section in order to show how interactional modification techniques are used by learners. The last section presents some concluding thoughts pertaining to this topic with a focus on how it can be employed in language learning classrooms
Design of digital electricity meter
Common Electricity meters, which are currently used in houses, shops and some factories are bulky
expensive and inaccurate. Such features are incompatible with modern technological trends of
miniaturization accuracy and neat devices. This project presents the design and the model of a low cost
digital energy meter to overcome the short comings of the present meters. It is anticipated that a new neat
design based on integrated circuit technology employing digital measurement techniques will have a great
impact on electricity meters locally and worldwide. With a data storage capability and some form of
processing, it can provide the consumers with vital information on the trend of their energy consumption.
Such information will assist them in rationalizing their consumption. Intelligent energy meters may be
seen as most suitable and efficient way to facilitate easy solutions to the problem of rational consumption
Errors Analysis of Solving Linear Inequalities among the Preparatory Year Students at King Saud University.
The purpose of This study aims to investigate the errors classes occurred by the Preparatory year students at King Saud University, through analysis student responses to the items of the study test, and to identify the varieties of the common errors and ratios of common errors that occurred in solving inequalities. In the collection of the data, the researcher employed the open-ended questions test consisted of nine items distributive on three types of inequalities (linear, involve absolute value and fractional). In the data analysis, descriptive analysis method was used. The result shoยญwed that some students had some misconceptions and misunderstanding in solving types of inequalities. The greatest common errors ratio was (20%) in solving linear inequality come from the class โErrors in basic algebraic operations and deletion. But the ratio (22%) were the greatest common errors ratio in solving fractional and involving absolute value inequalities come from the class errors in absent meaning of inequality. Keywords: inequality, Common Errors, Misconception, Mathematics Education
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
Reliability evaluation of scalable complex networks through delta-star conversion
Exact reliability evaluation of large size complex networks becomes intractable with conventional techniques due to the exponential scaling of the computation complexity as the size of network scales up. In this paper we develop a scalable model for the exact evaluation of system reliability of scalable complex networks of the n-tuple bridge type based on scaled delta-star conversion. The number of steps as well as the computation overhead is kept within practical limits as they scale up linearly with the size of the network. The proposed model enables simple numerical evaluation either manually or through spread-sheets
Recovery modeling in MPLS networks
Transmission of QoS based traffic over packet switched network typically requires resource reservation or differentiated treatment to guarantee an acceptable level of performance. But it is also essential to bound the disruption caused by failure of nodes or links for a real time traffic to a limit that is acceptable by the application. In this paper, a simulation platform models the impact of the MPLS recovery/protection schemes on the QoS traffic parameters including disruption time and number of out of order packets arriving at the destination. The simulation considers measures to alleviate drawbacks caused by recovery process
Satellite TVRO system reception under tropical weather conditions effects
TVRO systems suffers from the tropical weather conditions effects. This paper evaluate the system based on its effects of that conditions. This paper presents a Satellite TVRO system reception with regard to various weather conditions effects such as day time, night time as well as clear sky and rain sky conditions have been highlighted. The Geo arc that has been derived from such system represent the application of TVRO. The TVRO structures a Geo-arc formation and formulation in terms of satellite signals losses
Intelligent Dynamic Traffic Light Sequence Using RFID
The proposed RFID traffic control avoids problems that usually arise with standard traffic control systems, especially those related to image processing and beam interruption techniques. This RFID technique deals with a multi-vehicle, multilane, multi road junction area. It provides an efficient time management scheme, in which a dynamic time schedule is worked out in real time for the passage of each traffic column. The real time operation of the system emulates the judgment of a traffic policeman on duty. The number of vehicles in each column and the routing are proprieties, upon which the calculations and the judgments are based
Ubiquitous RFID network for highway monitoring and management
A simplified approach for the implementation of ubiquitous RFID networks in a Highway Management System is presented. The technique aims at deploying tagging identification in transport statistical analysis. The RFID network architecture has been designed as part of an existing system to make it more cost effective with a higher reliability. The usefulness and the merits of this easy access and user friendly approach are identified and discussed
Real time tracking in 3D space by robotic vision
A digital real time auto tracking robotic system is designed and analyzed. The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction
algorithm. The control signals derived from the video signal set the azimuth ? and elevation f of the camera position to track the centroid of the target on the screen. The time development of the aim point in successive images represents the tracking path. Non-linear prediction determines the location of the target in the next TV frame by extrapolation. For distant objects a range finder can be mounted with the camera to determine the coordinate, r. Hence, a set of spherical coordinates (r, ?, f) for the target are determined
- โฆ