1,948 research outputs found

    Review of Anna Wierzbicka’s “Semantics, Culture & Cognition Universal Human Concepts in Culture-Specific Configurations”

    Get PDF
    The under view article is a venture to pin down the key features of Anna Wierzbicka’s book bringing to light the chief traits of her inscriptional fashion, diction and handling of the structures bearing in mind her mechanics as a linguistic-author. The prime intent of this shot is to have an improved conception of the underlying thoughts and intentions for which the book is written. Through lexemes of diverse lingoes she put forwards distinctive conceptual cosmos. It can be a handy tool for researchers and students of linguistics. This concise review of the book is accomplished from broad-spectrum area of expertise to structural and methodological analysis in conjunction with inclusive epitome and few remarks about the writer

    Pedagogical Implications of VARK Model of Learning

    Get PDF
    Current study aims at to analyze phenomenal features of an illustrious learning style VARK. The study categories four types of learners i.e. visual, auditory, kinesthetic and read write learners on the basis of individual differences bearing in mind the chief traits of each category of learners along with what strategies are imperative as far as effective and productive learning with respect to their need and essentialities are concerned. The study underlines the fact that all the learners can’t learn in the same fashion. Each one has one or the other striking factor which dominates and directs their modes of learning that discrete them from others at one hand and unearths the mode and medium the instructors require getting them practice in a productive and systemic fashion. For the said intent, amalgam of skills and techniques are essential to keep in view as for as teaching learning process is concerned. Keywords: Learning, VARK, visual, aural, kinesthetic, learners, styl

    Distinction Between Language Acquisition and Language Learning: A Comparative Study

    Get PDF
    The study aspires at to pencil in a disparity between two seemingly alike but distinctive apart phenomenon i.e. language learning (LL) and language acquisition (LA). LA is an intuitive route that transpires naturally devoid of any exertion or intention. During that process, the acquirer of the language is unaware of the grammatical conventions or the syntactic structure of the language involved. All through the expansion of LA the learner necessitates a source of natural communication. It puts down emphasis on the memo and not the form that is why it is entitled communicative. Its deep-seated objective is to pass on the message or converse with the people around the apprentice. Language learning is cognizant or intentional activity of erudition a language for one or the erstwhile drive. A learner must contrive a laborious and systematic exertion to become skilled at or master a language unlike LA which he gets hold off exclusive of any methodical or even conscious involvement. The shot is qualitative in approach keeping in view the stratagems and dynamics affecting LL and LA. Keywords: Language learning, L acquisition, learning strategies, factors affecting learning

    Online Art Gallery

    Get PDF
    Online art gallery is an e-commerce application which connects artists with their customers, this website will help the artists to showcase their art in this website by helping them to sell it to prospective customers also it will help the customers to discover and search the art which they like and they will have an option to buy the art if they want. There will be three types of user’s roles in the website, the first one is buyer who can search and discover the art without any need to register or login but if they want to buy any art they have to register and login to buy the art and second one is a seller who has to register and login to post their art works for exhibiting and selling on the website and third user is admin who specifies authority and restrictions on the users. There will be a separate console for artist, buyer and administrator. Software Requirements/Tools:Operating System: Windows XP/2010.User Interface: HTML5, CSS3, Bootstrap.Client-side Scripting: JavaScript.IDE/Workbench: NetBeans.Database: MySQL. Modules: Admin Login module. Admin Order Management module. Add Artist information module. Add System user module. Artist Login module. Customer Login Module. Customer Payment Module. Advanced Search module

    Stylistics Analysis of Sylvia Plath’s Poem Poppies in October

    Get PDF
    Paper under view intends to evaluate Sylvia Plath’s poem Poppies in October (1962) from the perspective of stylistic analysis. It is carried out on Graphlogical, Morphological, Syntactical and Phonological levels. The poem is a blend of classicism with modernism; imagery, images, colours, irony and symbolism being chief features of the poem. This study is ready to lend a hand to examine the structure and style of Sylvia Plath’s poetry, her themes, style, and natural treatment. Keywords: Stylistics, nature, poppies, red, death

    Design and characterization simulation of Ti: sapphire-based femtosecond laser system using Lab2 tools in the NI LabView

    Full text link
    We report on the 825-nm center wavelength, 9.17 mJ pulse energy Ti:sapphire-based femtosecond laser system simulation carried out by Lab2 tools in LabVIEW (National Instruments, Inc.). The design investigation and characterization of stretched, amplified and compressed pulses made by intensity module and second harmonic generation (SHG) frequency-resolved optical gating (FROG) module in Lab2. The minimum pulse duration of ~37.80 fs at the output of the compressor end obtained by simulations. The variation of pulse energy, FWHM and central wavelength versus number of passes in the amplifier are computed. The lab2 tools help to design and characterize laser system before to set up on the optical table. The simulation results save time to calculate parameters which are essential in femtosecond laser system designing. The Lab2 simulation tools, along with financial constraints, it is easier, simple and efficient to obtain results in short time

    A M-Service Implementation in Large Government Organisation: A Case Study on an M-app in Australia

    Get PDF
    With the rapid diffusion of smartphones among citizens, government service providers have shifted their service-delivery focus toward mobile applications. However, its applications and implementations remained uneven throughout various public sectors. The scarce research in the area prevented the generation of a sound knowledge base for m-service implementation. This paper reports the investigation of a mobile application service in a large government organisation in Australia. Findings show that an m-service implementation, which does not follow a stage-wise model, is a complex phenomenon, wherein multiple actions and players are involved at different levels. This study indicates that the cumulative knowledge and experience of various stakeholders within an organization contribute to getting an innovation off the ground, wherein the conducive environment supported by appropriate policies and strategies, the readiness of customers and organizations, and the capability of the internal Information and Communication Technology (ICT) team and the influence of management are important drivers

    The Secure Data Storage in Mobile Cloud Computing

    Get PDF
    Cloud computing is a technology of delivering facilities such as software, and hardware (virtual as well) and bandwidth over the internet or network to the customers worldwide. Mobile devices are enabled in order to explore especially, Smartphone. Apple, Google, Facebook and Amazon with rich user. The mobile cloud computing technology is growing rapidly among the customers and at the same time it aware us the new security threats. Customers can access their data in any time, at any place, even with any device including mobile devices by using the cloud storage services, although these properties offers flexibility and scalability in controlling data, security issues are overcomes by proper handling. This paper, will give an awareness regarding cloud computing security issue through encryption and decryption methods when it is explored. If a cloud is performing a task of storage and encryption and decryption of data over the cloud then there can be chance of getting access to the private information without authorization result whole process creates risk of security. I proposed solution regards troubleshooting how to store secure data storage over the cloud with some encryption methods hacker or unauthorized cannot access confidential data owing to encrypted form. Keywords:cloud computing, security, data security, AES Encryption, Eclipse IDE
    • …
    corecore