4,233 research outputs found

    Teaching Body Image to EFL Teenagers

    Get PDF
    An extract of an Upper-Intermediate EFL coursebook for teenage learners I designed in partial requirement for MA Applied Linguistics & English Language Teaching.\ud \ud The material is centred about the topic of 'Body Image' and includes a focus on learner training; infinitives & gerunds; skimming and scanning reading tasks; intensive listening practice; giving opinions/speculating; rhyming words

    Teacher's Book for Body Image

    Get PDF
    This is the teacher's book that accompanies the Body Image unit.\ud \ud There are the answers to the activites, as well as a rationale and suggestions for classroom activities

    Data Hiding using Emoticons

    Get PDF
    In 21st century Digital communication has become a very essential part of day to day life of every human. It has continuously evolved over the year. It has made communication easier. People can communicate anywhere and anytime large amount of data is transmitted every day, every second. Here data security comes into picture. Each and every individual want their data to be secure and doesn’t want it to be used in an unauthorized way. There are various techniques to provide data security such as cryptography and steganography. Cryptography is the science of encompassing the principles and methods of transforming a plain text message into one that is unintelligible and then, that message back to its original form. Steganography is the art and science of hiding information by embedding messages into other messages. Steganography means “Covered Writing” in Greek. Both the techniques have their own limitations; to overcome those limitations, here in this paper, we are combining both the techniques to enhance data security

    Lessons Learned: Reflections On Training Student Tutors

    Get PDF
    As an academic institution that is still in its early phases of organisational growth, Monash University, South Africa does not have a pool of postgraduate students that can be utilised for teaching assistance in units with large groups of students. This necessitated the selection of high-calibre honours candidates and third-year students that could be trained to become tutors. The tutor training, upon which this study is based, originated from a practical need that arose within the context of teaching at a small higher education institution. The researchers developed the training with the intention of providing the necessary skills enhancement needed for tutors to conduct successful tutorials. Due to the novelty of this endeavour, the research questions emerged with the formulation of the original content of the training course. There were three main research questions. Firstly, to verify whether the topics covered in the training did in fact provide the requisite real-world knowledge and skills development. Secondly, to evaluate the quality of the training that was provided. Thirdly, to ascertain other gaps in knowledge and skill that exist and that need to be addressed. A mixed methodological approach was followed in this study. Action research and group-administered questionnaires were utilised. Action research was used both in the data collection and in the data analysis phases. Group-administered questionnaires facilitated data triangulation to enhance the validity of the research findings. The research method utilised in this study to evaluate the efficacy of the training and to identify further training needs, presented a unique opportunity for reflective practice. The content of the training was set up to address needs identified by the researchers, based on their own teaching and tutoring experiences. To ensure continuous improvement and efficacy, the content was refined once the participants were given an opportunity to provide feedback. The researchers reflected on what transpired in each training session and developed new insights into potential gaps that needed filling. The participants responded positively to the unique learning situation that was created and felt that the training equipped them with the basic skills they needed as novice tutors. The researchers found that reflective practice effectively enabled the participants to identify the individual value gained from the learning experience

    Child illness and parental mental health and well-being

    Get PDF
    Section A: This report aimed to provide an updated review of the literature on parent sleep in the context of having a child with a physical illness. It focused on psychological factors that may explain sleep difficulties and explores potential consequences of sleep disturbance. A systematic search of four databases yielded 36 studies that were eligible for review. Studies showed a high proportion of parents experiencing sleep disruptions and explored the relationship between parent sleep and mental health. Factors associated with sleep disruption included child illness-related factors, environmental and social factors. Section B: Infant Gastroesophageal Reflux Disease (GORD) occurs when symptoms of reflux require medical intervention. Parents whose infants experience some of the symptoms of GORD are at risk of poorer mental health. This study aimed to estimate the prevalence of mental health difficulties in this population, to test predictors of parental mental health, and to explore differences between different types of GORD. Participants reported significantly higher rates of anxiety and depression than those found in perinatal or general population samples. Results provided support for the predictive power of self-compassion, illness perceptions and illness uncertainty, above and beyond parent satisfaction with sleep, social and relationship support and infant feeding

    SOSIALISASI PENTINGNYA KESADARAN HUKUM TERHADAP PINJAMAN ONLINE

    Get PDF
    Abstrak Dinamika globalisasi dan transformasi teknologi informasi yang semakin berkembang pesat telah mengubah tatanan sosial dan ekonomi, kecanggihan teknologi membuat orang dengan mudah mendapatkan akses informasi yang diinginkan salah satunya yakni dengan menggunakan Layanan Jasa Pinjam Meminjam Uang Berbasis Teknologi Informasi. Pinjaman Online adalah fasilitas pinjaman uang oleh penyedia jasa keuangan yang beroperasi secara online. Penyedia pinjaman online tersebut dikenal dengan sebutan fintech, pinjaman online yang dananya dapat langsung dicairkan dan tanpa jaminan merupakan solusi alternatif bagi masyarakat yang membutuhkan dana tunai tanpa harus mengajukannya secara tatap muka. Metode pendekatan yang digunakan dalam penulisan ini adalah normatif empiris dengan berlandaskan Peraturan Otoritas Jasa Keuangan Nomor 77/PJOK.01/2016 Tahun 2016 tentang Layanan Pinjaman Meminjam Uang Berbasis Tekhnologi Informasi ("PJOK 77/2016"). Selain menjadi solusi sementara, pinjaman online memiliki dampak dan resiko yang seringkali tidak diketahui dan tidak disadari oleh masyarakat. Tujuan dari kegiatan PKM ini adalah membangun kesadaran hukum terhadap dampak dan resiko yang muncul dari pinjaman online khususnya pada ibu-ibu majelis taklim musholah Nurul Iman Pamulang. Dengan adanya kegiatan ini diharapkan masyarakat mampu menyikapi secara bijak dalam memanfaatkan aplikasi-aplikasi pinjaman online baik yang legal maupun illegal. Kata kunci: Pinjaman Online, Legal, Illega

    GPS Based Ambulance Tracking & Traffic Control System

    Get PDF
    India rank no one within the whole world just in case occurance of road accidents main cause for such accidents is undisplined driving &roads with twists and turns. throughout 1991--2000, the foremost recent year that information were obtainable, three hundred fatal crashes occurred involving occupied ambulances, leading to the deaths of eighty two motorcar occupants and 275 occupants of alternative vehicles and pedestrians. The three hundred crashes concerned a complete of 816 motorcar occupants. Ambulances area unit most likely one in all the foremost essential vehicles individuals have faith in in times of want. Whenever a private is hurt or injured, paramedics area unit referred to as to the scene of the accident, crime, or scenario to produce quality care and facilitate the individual in hassle. On several occasions, the paramedics driving the ambulances will look like angels. What individuals might not recognize is that ambulances area unit hi-tech, mobile, transportation and communication centers able to assist virtually any health connected issue on the spot, and currently with the introduction of GPS tracking systems, ambulances have became even additional technologically refined. If their were ever a vehicle that would take pleasure in employing a GPS tracking system associate degree motorcar would be the one. GPS tracking systems permit hospitals to grasp the precise location of motorcar fleets after they area unit within the field, associate degreed if the hospital receives communication that an motorcar are returning in, doctors will apprehend the precise time the motorcar can show up. This helps hospital employees prepare before the victim inbound

    Miss Ruby Hendking and Miss Carrie Jones to Mr. Meredith (28 September 1962)

    Get PDF
    https://egrove.olemiss.edu/mercorr_pro/1585/thumbnail.jp

    Securing User's Data on Cloud Using AES

    Get PDF
    Data security is a major issue in our day to day life in IT field, but in cloud it is particularly of serious concern since data is scattered at different places all over the globe. To this trustworthy environment there is lot usage of cloud done for scattered environment. Cloud computing security or, more simply, cloud security is an evolving around sub-domain of environment in cloud computing paradigm, Rajkumar Buyya Wiley publications in, more broadly way, information security. It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing

    Smart Ration Card System using RFID and Embedded System

    Get PDF
    In the present days many immoral activities are taking place in ration shop, which are meant to distribute the commodities to the people who are in below the poverty line, as the distribution process is manually operated and due to which it consumes a lots of time. To overcome this problem we one can use RFID technology. In this report RFID tags are introduced, the RFID card are used instead of ration cards, which consists of all the details about the card holder like family details, type of card and its validity etc. In this report we are going to discuss different types of automatic ration distribution system implemented for the automatic ration distribution
    • …
    corecore