17,046 research outputs found

    Understanding Language Death in Czech-Moravian Texas

    Get PDF
    Based on several decades of personal interaction with Texas speakers of Czech, the author's article attempts to correlate social change with some specific stages of language obsolescence and language death. Many instances of language change in that community, as well as cultural and social change, may be explained by the linguistic model known as the wave theory. One hundred and fifty years passed between the introduction of Czech and the death of that language in Texas. From the mid-nineteenth through the mid-twentieth century, the Czech-Moravians represented a closed community in which individuals defined their identity primarily by the Czech language, ethnicity, and culture. In the final five decades of the twentieth century, as the social template representing Texas speakers of Czech disintegrated, spoken Czech ceased to function as a living language, and much of the ancestral culture connected with the language was lost. Today some among the elderly, described as semi-speakers, terminal speakers, or "rememberers" of language, retain a limited knowledge, but the ancestral language now has only a symbolic function

    Review : Linguistic Imperialism Continued

    Get PDF

    Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11

    Get PDF
    Global e-learning market is projected to reach $107.3 billion by 2015 according to a new report by The Global Industry Analyst (Analyst 2010). The popularity and growth of the online programmes within the School of Computer Science obviously is in line with this projection. However, also on the rise are students’ dishonesty and cheating in the open and virtual environment of e-learning courses (Shepherd 2008). Institutions offering e-learning programmes are facing the challenges of deterring and detecting these misbehaviours by introducing security mechanisms to the current e-learning platforms. In particular, authenticating that a registered student indeed takes an online assessment, e.g., an exam or a coursework, is essential for the institutions to give the credit to the correct candidate. Authenticating a student is to ensure that a student is indeed who he says he is. Authenticating a student’s work goes one step further to ensure that an authenticated student indeed does the submitted work himself. This report is to investigate and compare current possible techniques and solutions for authenticating distance learning student and/or their work remotely for the elearning programmes. The report also aims to recommend some solutions that fit with UH StudyNet platform.Submitted Versio

    Retail fees of depository institutions, 1994-99

    Get PDF
    Under legislative mandate, the Federal Reserve Board has for many years sponsored annual surveys of the retail fees charged by depository institutions. Analysis of the data for the most recent six years (1994-99) shows that for the most common types of depository accounts surveyed, few of the fees and minimum balances changed by a statistically significant amount. However, the most common types of ATM fees and the fees for certain special actions, such as stop-payment orders, increased significantly and by more than the rate of consumer price inflation over the period. In addition, for almost all of the fees charged for seven common services and special actions, banks that were part of multistate banking organizations on average charged significantly higher fees than single-state banks, and large banks charged significantly more than small banks. Although they narrowed, the differences remained statistically significant after analyses that controlled for the general location of the institutions, for size (in the case of the multistate versus single-state comparison), and for multistate operations (in the case of the large versus small comparison).Banks and banking - Service charges

    Retail fees of depository institutions, 1997-2001

    Get PDF
    Since 1990, the Federal Reserve Board has reported annually on changes in the availability of retail banking services and in the level of the associated fees. The most recent report, covering the Board's survey conducted in 2001, was released in June 2002. Information on selected fees for each of the years from 1997 through 2001 is presented in this article. Analysis of the data for the 1997-2001 period shows that for the various types of checking and savings accounts tracked, monthly fees tended to rise by statistically significant amounts, as did the minimum balances that depositors had to maintain to avoid the fees. Fees associated with special actions, such as those imposed on checks returned for insufficient funds, also exhibited increases that were statistically significant. Fees imposed for withdrawals by an institution's depositors from other institutions' automated teller machines (ATMs) and for the use of the institution's ATMs by nondepositors became much more common by the end of the period, and average levels increased by statistically significant amounts. Finally, comparisons of the fees charged by institutions of different sizes in 2001 indicate that, in general, the incidence and level of fees were higher at larger institutions.Banks and banking - Service charges

    The battle for energy independence: how much of a good thing?

    Get PDF
    Energy development - United States

    Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks

    Get PDF
    Chaminda Alocious, Hannan Xiao, B. Christianson, 'Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks' paper presented at the 2016 IEEE Wireless Communications and Networking Conference (IEEE WCNC). Doha, Qatar. 3-6 April 2016Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding of protocol vulnerabilities in existing protocol architectures. However, providing security requirements are not just limited to confidentiality and integrity, also availability and fairness are important security elements. IEEE 802.11 MAC protocol is one of the most common standard in modern day networks and has been designed without a consideration for providing security protection at MAC layer. IEEE 802.11 assumes all the nodes in the network are cooperative. However, nodes may purposefully misbehave in order to obtain extra bandwidth, conserve resources and disrupt network performance. This research proposes a Misbehaviour Detection MAC protocol (MD-MAC) to address the problematic scenarios of MAC layer misbehaviours, which takes a novel approach to detect misbehaviours in Mobile Adhoc Networks (MANETs). The MD-MAC modifies the CSMA/CA protocol message exchange and uses verifiable backoff value generation mechanism with an incorporated trust model which is suitable for distributed networks. The MD-MAC protocol has been implemented and evaluated in ns2, simulation results suggest that the protocol is able to detect misbehaving wireless nodes in a distributed network environment

    Relative service differentiation for mobile ad hoc networks

    Get PDF
    A relative bandwidth service differentiation scheme is proposed for mobile ad-hoc networks (MANETs).Peer reviewe

    A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance

    Get PDF
    The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention for providing security and with the assumption that all the nodes in the wireless network adhere to the protocol. However, nodes may purposefully show misbehaviours at the MAC layer in order to obtain extra bandwidth con-serve resources and degrade or disrupt the network performance. This research proposes a secure MAC protocol for MAC layer which has integrated with a novel misbehaviour detection and avoidance mechanism for Mobile Ad Hoc Networks (MANETs). The proposed secure MAC protocol the sender and receiver work collaboratively together to handshakes prior to deciding the back-off values. Common neighbours of the sender and receiver contributes effectively to misbehaviours detection and avoidance process at MAC layer. In addition the proposed solution introduces a new trust distribution model in the network by assuming none of the wireless nodes need to trust each other. The secure MAC protocol also assumes that misbehaving nodes have significant levels of intelligence to avoid the detectio
    corecore