5 research outputs found

    Computers’ impact on students’ writing skills

    Get PDF
    Nowadays, technology has become one of the most dominant factors that assist second language learning and teaching process. Thus, its use has become widely spread in classroom settings as it provides a stimulant, interactive and creative learning environment. Particularly, the expansion of technology has brought significant improvements in students’ writing skills. Hence, the main aim of this paper is to explain computers’ impact on students writing, that is to say, how computers assist students in creating more concise and qualitative texts. In order to prove my hypothesis, an experiment was carried out with two groups of first year students, at the South East European University in Macedonia, during a period of one semester. One group of students used computers in their writing process and the other group was exposed to traditional paper and pencil writing by having the teacher as the only source of instruction. The results indicated that students who used computers in their writing process made less spelling and grammar mistakes and made more revisions. In addition, their writings were longer and better organized. Also, by the end of the experiment, students using computers in their writings had a more positive attitude towards writing, in general

    Internal Democracy in Albanian Political Parties

    Get PDF
    Political pluralism in Albania came relatively late, in 1990, after a prolonged lack of democratic experience. Consequently, democratic political parties are relatively new institutions created essentially with the knowledge of past non-democratic models. Democratic practices were almost inexistent, so the evolution of political parties towards a functioning democratic model started practically from zero and incorporated on the way, rules and behaviors imported from abroad or extracted from the internal context. The process of institutionalization of the parties was long and problematic. Currently parties are still looking for a reference model for their political organization of the future. Their internal functioning was initially inspired more by the desire and aspiration to be a democratically functioning party, than by establishing and applying statutory mechanisms and the respective implementation procedures, as a trusted guide and impartial protector of the party democratic norms. In the political debate within the parties or in the public on political parties and their role in society, the concept of internal democracy is treated mainly through its perceived role and importance, than through its sanctioning in the official statute. A certain number of regulations and guidelines fill that gap by completing and / or detailing the daily activities. However the focusing on the written rules often hides the aspect of their implementation. It is these two aspects affecting the internal party democracy that have been selected by the researchers, in order to assess and analyze the indicators of this phenomenon in Albanian political parties. The analysis of internal democracy in Albanian political parties consists of two parts. The first part starts with the description of the concepts of internal democracy; continues with a historical perspective of the birth and development of democratic pluralism and political parties in Albania

    Web application penetration testing

    Get PDF
    Safety of information is needed either in private sector or business for protection from market with competitive secrets or only for privacy. Advantages of internet and web applications is that they are accessible from everyone, but in business word data should be safe, reliable accessible. Although these are not new problems and always had different solutions to these problems, we always need to be on the cutting edge with new attacks that appear every day and to try to achieve a greater security. In this paper we present some of the most dangerous forms of risk which are risking web applications in year 2015/2016.we will demonstrate step by step how to achieve unauthorized access from web application inside server system and we will explain why is happened for our analysis that we have done. In testing stages we used some parts of real tests that we have done on several web applications, with Penetration Testing Methods which is procedure for testing and documentations including infrastructure of Networks, servers, Web applications, Wireless communications and all other technological parts. Penetration Testing is Testing Procedure for Web applications usually made on port 80 and 443.In this paper we will explain the real analyzing of tests with all the procedures for one web applications, including all the attached stages which are used in real life for testing the safety of web applications from safety testers

    STRATEGIC DECISION MAKING “Game Theory” Case study: “Viva Fresh Store and ETC market”

    Get PDF
    Abstract The decision making is a process which affects and includes people with vision, but to make this process more effective we have studied from the prospective of the Game Theory as an option to simplify the decision making process. The game theory is a structural mathematic to calculate options and opportunities before individuals or institutions takes decisions. Game theory, analyzes subject’s opportunities but at the same time analyzes the responses of the opponent, furthermore there is no game with a single player that’s why we have to think also in opponent perspective. At the beginning of last century many mathematicians have started to develop their theories about Game Theory, but John Nash was one of them who achieved to bring something new and useful for every decision maker. We use Game theory every time but businesses are the community which is most affects with decisions in daily or weekly bases. This research for over six months in the perspective of Business Administration, at the two subjects of our study thesis Viva Fresh Store and ETC are potential companies to start using Game theory to increase their profits. While we have a lot of companies which operates in Kosovo’s market this model will be a new perspective to structure the market. Viva Fresh Store and ETC are expressing their commitment to use Game Theory in marketing companies because that will reduce costs of marketing. But, both firms are using Game theory in most of their decisions even if they don’t know that they are taking decisions in Game Theory perspective. Furthermore, Viva Fresh Store and ETC or other companies with same performance are collaborate when they can and compete when they must game theory will be easily used

    Surgical approach and arch placement of impacted maxillary canines

    No full text
    Introduction: Maxillary canines are the second most frequently impacted teeth after molars with an incidence ranging from 1% to 2.5%. It is more often found on the palatine side, it appears twice more in women than in men - 1.17% : 0.51%. Impactions are most often unilateral, but 8% to 10% of cases are bilateral. The causes of impaction can be local or general. The positioning of the canines in the arch depends on: depth in the bone, position, size, angle, etc. If all of these are favorable, then preservation and arch placement of the impacted canines is indicated. Purpose: The purpose of this paper is to show the surgical approach to impacted maxillary canines in cases where their preservation and placement in the arch is indicated. Material and methods: This paper is a review of the literature on the surgical approach of impacted maxillary canines. The research was done using the central databases PubMed, Scopus, Google scholar, etc. Result: Impacted canines can be in 5 possible positions: 1. Palatal localization, 2. Palatal localization of the crown and labial root, 3. Labial crown and palatal localization of the root, 4. Labial, 5. Ectopic. The surgical approach for the purpose of arching the impacted canines can be done in two surgical ways: 1. Closed technique and 2. Open techniqu
    corecore