1,039 research outputs found

    Hypothesis of Interaction: Reflections on its Theoretical and Practical Contributions for Second Language Acquisition (SLA)

    Get PDF
    This article is about one of the most influential hypothesis in the fields of applied linguistics and language learning. It is based on the work of a number of scholars who contributed to the understanding of this hypothesis such as Steve Krashen, Mike Long, Teresa Pica and Merrill Swain. It starts with a brief introduction about the significance of interaction hypothesis generally in language learning in general and its central role in second language acquisition (SLA). The next section reviews some of the fundamental works and studies that have investigated the theoretical and practical understanding of this phenomenon and its relationship to learnersรขโ‚ฌโ„ข achievement. It also highlights the contribution of interaction hypothesis to learning in two basic areas: noticing and feedback. There are explanatory examples presented in the following section in order to show how interactional modification techniques are used by learners. The last section presents some concluding thoughts pertaining to this topic with a focus on how it can be employed in language learning classrooms

    Design of digital electricity meter

    Get PDF
    Common Electricity meters, which are currently used in houses, shops and some factories are bulky expensive and inaccurate. Such features are incompatible with modern technological trends of miniaturization accuracy and neat devices. This project presents the design and the model of a low cost digital energy meter to overcome the short comings of the present meters. It is anticipated that a new neat design based on integrated circuit technology employing digital measurement techniques will have a great impact on electricity meters locally and worldwide. With a data storage capability and some form of processing, it can provide the consumers with vital information on the trend of their energy consumption. Such information will assist them in rationalizing their consumption. Intelligent energy meters may be seen as most suitable and efficient way to facilitate easy solutions to the problem of rational consumption

    Errors Analysis of Solving Linear Inequalities among the Preparatory Year Students at King Saud University.

    Get PDF
    The purpose of This study aims to investigate the errors classes occurred by the Preparatory year students at King Saud University, through analysis student responses to the items of the study test, and to identify the varieties of the common errors and ratios of common errors that occurred in solving inequalities. In the collection of the data, the researcher employed the open-ended questions test consisted of nine items distributive on three types of inequalities (linear, involve absolute value and fractional). In the data analysis, descriptive analysis method was used. The result shoยญwed that some students had some misconceptions and misunderstanding in solving types of inequalities. The greatest common errors ratio was (20%) in solving linear inequality come from the class โ€œErrors in basic algebraic operations and deletion. But the ratio (22%) were the greatest common errors ratio in solving fractional and involving absolute value inequalities come from the class errors in absent meaning of inequality. Keywords: inequality, Common Errors, Misconception, Mathematics Education

    Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques

    Full text link
    The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42

    Reliability evaluation of scalable complex networks through delta-star conversion

    Get PDF
    Exact reliability evaluation of large size complex networks becomes intractable with conventional techniques due to the exponential scaling of the computation complexity as the size of network scales up. In this paper we develop a scalable model for the exact evaluation of system reliability of scalable complex networks of the n-tuple bridge type based on scaled delta-star conversion. The number of steps as well as the computation overhead is kept within practical limits as they scale up linearly with the size of the network. The proposed model enables simple numerical evaluation either manually or through spread-sheets

    Recovery modeling in MPLS networks

    Get PDF
    Transmission of QoS based traffic over packet switched network typically requires resource reservation or differentiated treatment to guarantee an acceptable level of performance. But it is also essential to bound the disruption caused by failure of nodes or links for a real time traffic to a limit that is acceptable by the application. In this paper, a simulation platform models the impact of the MPLS recovery/protection schemes on the QoS traffic parameters including disruption time and number of out of order packets arriving at the destination. The simulation considers measures to alleviate drawbacks caused by recovery process

    Satellite TVRO system reception under tropical weather conditions effects

    Get PDF
    TVRO systems suffers from the tropical weather conditions effects. This paper evaluate the system based on its effects of that conditions. This paper presents a Satellite TVRO system reception with regard to various weather conditions effects such as day time, night time as well as clear sky and rain sky conditions have been highlighted. The Geo arc that has been derived from such system represent the application of TVRO. The TVRO structures a Geo-arc formation and formulation in terms of satellite signals losses

    Intelligent Dynamic Traffic Light Sequence Using RFID

    Get PDF
    The proposed RFID traffic control avoids problems that usually arise with standard traffic control systems, especially those related to image processing and beam interruption techniques. This RFID technique deals with a multi-vehicle, multilane, multi road junction area. It provides an efficient time management scheme, in which a dynamic time schedule is worked out in real time for the passage of each traffic column. The real time operation of the system emulates the judgment of a traffic policeman on duty. The number of vehicles in each column and the routing are proprieties, upon which the calculations and the judgments are based

    Ubiquitous RFID network for highway monitoring and management

    Get PDF
    A simplified approach for the implementation of ubiquitous RFID networks in a Highway Management System is presented. The technique aims at deploying tagging identification in transport statistical analysis. The RFID network architecture has been designed as part of an existing system to make it more cost effective with a higher reliability. The usefulness and the merits of this easy access and user friendly approach are identified and discussed

    Real time tracking in 3D space by robotic vision

    Get PDF
    A digital real time auto tracking robotic system is designed and analyzed. The tracking is based on passive detection using live TV imaging. The target coordinates are determined by an image processing technique and non-linear prediction algorithm. The control signals derived from the video signal set the azimuth ? and elevation f of the camera position to track the centroid of the target on the screen. The time development of the aim point in successive images represents the tracking path. Non-linear prediction determines the location of the target in the next TV frame by extrapolation. For distant objects a range finder can be mounted with the camera to determine the coordinate, r. Hence, a set of spherical coordinates (r, ?, f) for the target are determined
    • โ€ฆ
    corecore