Writing strategies for effective communication: a challenge among student teachers in universities in Kenya
The purpose of the study was to establish English student teachers’ knowledge of writing strategies to facilitate instruction of writing skills. The specific objectives were: to find out introduction strategies used by participants when writing essays, to establish strategies used by participants to ensure coherence of the written essay and to examine conclusion strategies used by the participants in essay writing. A total of 37 fourth year English student teachers’ were used in the study. The instrument used for data generation was document analysis of written essays. The study revealed that the student teachers lack sufficient knowledge of writing strategies. The study recommends that: English Language Teacher Educators should design a course about communication strategies for effective essay writing to be taught to student teachers specializing in English to equip them with both content and pedagogical knowledge for effective teaching. Examining of the course should include writing essays to motivate students to practice and master writing strategies for effective communication. English language teacher educators should coordinate and ensure that the content courses taught by other schools apart from the school of education are relevant and meet the needs of English Language Teaching in Kenya.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
The study of relationship between intellectual capital and its growth rate with earning management (in accepted companies in Tehran Stock Exchange)
Since the intellectual capital provide a new and perfect model to observation of organizations real value, therefore, the tendency to evaluation of intangible assets true value of intellectual capital has increased in companies, shareholders (investors) and other stakeholders. This study investigates the relationship between the intellectual capital and its growth rate with earning management in accepted companies in the Tehran Stock Exchange. The statistical society of study includes all Tehran Stock Exchange firms after put of certain conditions sampling was undertaken. Finally, during the period 2006 to 2013, 121 companies selected.The methodology of research is descriptive. Using a modified Jones discretionary accruals calculated as a measure to detect earnings management and then placed in the regression model defined earnings management, Hypotheses were tested. With the use of regression analysis the research hypotheses have been carried out. Also a number of control variables consist of Size and M/B have been used. The results of this study show that there is a significant relationship between intellectual capital and earnings management but there is a significant relationship between intellectual capital growth and earnings management.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Local Binary Pattern for Effective Moving Object Detection and Tracking in Video
Object detection, tracking and recognition currently generated much attention in computer vision community due to their real time applications. The main goal is to detect and track specific instances of an object or broader object classes, such as cars or pedestrians in images sequence. Due The potency of processing video database lies on the search techniques employed in the video processing system. Usage of improper search techniques will make the processing system feeble. This paper proposes unique object detection and tracking system where Local Binary pattern are employed to detect moving object and track them in successive frames. Detecting a specific object from video suing Local Binary Pattern is more suitable when, objects information is not available. Initially, the database video clips are segmented into diverse shots before the feature extraction process. The proposed system comprises two stages: (i) feature extraction and (ii) tracking of object in the video clips. In the feature extraction stage, the color feature is extracted first based on the color quantization. Next, the edge density feature is extracted for the objects present in the query video. Subsequently, the texture feature is extracted using LGXP (local Gabor XOR patterns) technique. Eventually, the object is detected based on those features extracted and the detected object is tracked by utilizing both forward and backward tracking method. The proposed methodology is proved to be more effectual and precise in object detection and tracking.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Gender-Oriented Scrutiny of Persian EFL Language Learners’ Attitudes towards an Effective Oral Presentation
The paper was in fact an attempt to investigate the point that if there is any gender-oriented differences between the Persian EFL language learners with regard to the factors influencing an oral presentation. To be more detailed, the study tried to shed light on first, what factors do the language learners think are most important for delivering an effective oral presentation. And second, if there is any significant difference between the male and female language learners in terms of their attitudes on the issue. To fulfill the purpose, 150 male and female EFL Persian language learners from Ahwaz universities were purposefully selected and required to fill in the developed questionnaire. The findings of the study indicated a significant difference between the male and females’ attitudes on the factors leading to a telling oral presentation. The study contributes significantly to the delivery of more effective oral presentations.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security risks facing the civil aviation sector in India: need for review of the existing law
Over the past one decade, the Indian Aviation sector has moved from being a closed, poorly managed and excessively regulated industry to a more open, liberalized and investor friendly sector. The growth in this sector has been threatened inter alia by a lot of challenges such as high fares, high operational costs, global slowdown and security and law and order issues. According to the estimates of Centre for Asia Pacific Aviation (CAPA) by 2020, Indian Airports in all probability be able to serve over 100 million passengers every year. The figures revealed by the Ministry of Civil Aviation also indicate that the number of International passengers are expected to increase to 50 million. In such a scenario, it is important to maintain a fool proof security paraphernalia which is capable of adequately dealing with the rapidly changing techniques adopted by the terrorists groups. The security mechanism in the aviation sector needs a reconditioning to bring it in tune with the constantly evolving terror issues. The Aircrafts Act has become obsolete, it does not contain any special provisions with regard to the security of the Aircrafts, it is often felt that a comprehensive legislation pertaining to Civil Aviation Security is required for setting up a legal framework to inter alia provide for deterrent punishment for such offences, a specially trained task force for dealing with such contingencies and a summary disposal of such cases. The paper makes a humble attempt to suggest the procedural and legislative changes in the light of the civil aviation security laws of the other nations. A critical analysis of the current law has been done to show the various anomalies present therein. It is the objective of this paper to suggest a reconciliation between the interests of the passengers and the security of the state.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Cyber crime against women and the Law: an analysis
In 2000, an MMS Scandal featuring a minor girl from a South Delhi Public School performing oral sex on her classmate was leaked online. The clip was reportedly put up without the girl’s consent. The scandal started a dangerous trend of video recording of intimate moments and uploading them on the Internet due to the monetary benefits associated with it or the ‘kick’ derived by a jilted Male partner in tarnishing the reputation of the female participant. The IT Law which was in its nascent stage at that time showed its total inability to counter this problem. A decade hence and after a comprehensive amendment to the statute, the Cyber Law in India still shows an eerie inability to prevent or punish such acts. Apart from this, women in the cyberspace are vulnerable to a variety of crimes such as Identity theft, Cyber Morphing, Obscene messaging, Cyber Defamation etc. Usually, the victim has little or no recourse against the criminal since such crimes are committed anonymously. This coupled with an untrained police, onerous enforcement mechanism, and lack of technology to undo the cyber attack and most importantly the stigma associated with the event leaves Women disempowered in the Cyber Space. Also, the patriarchal setup of the society sees them as a willing participant rather than a victim to the crime. The Anara Gupta Sex Scandal Case is one classic example of how difficult it is for a victim of Cyber Crimes to get justice in India. Against the foregoing backdrop, the paper will analyze some pertinent loopholes in the Cyber Law in India. The paper also attempts to suggest some structural reforms apart from the amendments in the substantive Law which need to be incorporated to improve the situation which is otherwise grim.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mechanism of tooth eruption & its clinical significance - A systematic review of literature
Tooth eruption is an important, complex and highly regulated process. It involves signaling from a large number of genes and molecules. This review outlines the possible mechanism of tooth eruption right from its development in the bony crypt to its eruption till the occlusal level. Active tooth eruption starts from intra-osseous stage when there is formation of eruption pathway. Colony stimulating factor (CSF-I)and monocyte chemotactic protein (MCP) plays an important role in osteo- clastogenesis. Inhibition of osteoproteigrin (OPG) transcription and enhancement of receptor activator of nuclear factor kappa B ligand (RANKL) is important . Paracrine signaling by parathyroid hormone-related protein(PTHrP) and Interleukin-1?produced in stellate reticulum may also play a role in regulating eruption. Wnt/?-catenin signaling plays a critical role in bone formation and regeneration and thus tooth eruption. Correct understanding of this important event is needed to diagnose and treat disorders of tooth eruption.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Digesting Vocabulary: Email vs. Context
From the first stages of learning a new language we were told the best way to learn and memorize vocabulary is through context. However, the way education is taking advantage of technology has made the conventional methods in question. This study is provided to investigate the effect of Email and Context on vocabulary learning in a comparative way. To this end, 16 first-year University students having French as their second language –divided into two groups of eight- were chosen. During 4 weeks of treatment one group was provided with two short stories, each containing 35 unfamiliar French vocabularies from the pre-test, and the same vocabularies were sent to the other group everyday by Email. The results were collected through post-test and a recall test, in addition with an interview for the Email receiving group to learn the participants’ opinions about their learning experience. The post test results did not show any significant difference between the two groups, however the recall test ten days after the experiment showed that the context receiving group was much better in recalling the studied vocabularies than the Email receiving group–although the Email participants were more interested in their learning method. It could be concluded that learning vocabulary through context is still a better help for language learners to store the learnt vocabularies in their memory.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Urban Dry Residue locating interchange stations in Mashhad city using GIS
Population Increasing, garbage producing and land decreasing for burial is problems and issues of today's big cities that the need for recycling and waste reduction techniques in production and landfill and is increasingly considered Day-to-day accordingly. One of the most useful methods in the field of reuse of dry garbage is to segregate from origin by Citizenries and create incentives for their participation increases. For example, the daily productions of 15 tons of paper in Mashhad shows more and more need to review and develop appropriate strategies to encourage citizens and separation of garbage. one of the activities of Mashhad ' municipality is in the field of solid waste transfer station so that in addition to encouraging citizens provide the receive possibility of suitable use of municipal Incorruptible substance solid waste . Thus the present paper is discussed the locating of the stations with respect to the criteria of population, their accessibility, physical analysis of garbage and determine distance to other stations in municipality 's zooms by using GIS software. The results of this research suggest the 1,11,9 and 8 zones as appropriate places to create new stations to collect dry waste.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]