• Title/Summary/Keyword: encouraging language

Search Result 36, Processing Time 0.039 seconds

Negotiation in Conversations between Native Instructors and Non-native Students of English (영어원어민 강사와 비원어민 학생 간의 대화에서 의사소통을 위한 협상)

  • Cha, Mi-Yang
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.158-165
    • /
    • 2022
  • Journal of Convergence for Information Technology. This study explores how native speakers (NSs) and non-native speakers (NNSs) of English negotiate meanings during conversational interactions to achieve successful communication. This study involved 40 participants: 20 native English speakers and 20 Korean university students. The participants were divided into 20 pairs, with each pair consisting of one NS and one NNS. Tasks for conversation were given and the execution recorded in order to collect data. 37 recorded conversations were transcribed and used for analysis, including statistical analyses. Results showed that both NSs and NNSs mutually put in effort for successful communication. While NSs mostly played the role of leading the natural flow of the conversation, encouraging their non-native interlocutors to speak, NNSs used various strategies to compensate for their lack of linguistic competence in the target language. NNSs employed a wide range of communicative strategies to keep the conversation going. The results of this study contribute to a better understanding of interactions between NSs and NNSs and yield pedagogical implications.

A Study on the Comparative study for the Four-year Collegiate Career Preparation Behavior by Grade Level : The case of C University (4년제 대학생들의 학년별 취업준비행동 비교연구 -C 대학을 사례로-)

  • Ji, Ke-Yung;Han, Jin-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.33-41
    • /
    • 2016
  • In this study, it was to prepare a plan for improving the employment rate of college students after identifying employment preparation behavior by grade level. Based on data collected in this study, frequency analysis was analyzed and in order to find out the difference of employment preparation behavior between grade level, Cross-analysis was performed. The results, all items showed that significant differences by grade level in preparation for employment actions such as choice of a double major, workers' experience in college education services, language training experience in foreign countries, setting career in college education services, setting a goal for employment, seeking for employment in college education services, participation in employment activity for researching job, education/training-related job, having an official license. Implications for activation direction of employment preparation of college student by grade level is as follows. First, it is necessary for encouraging actively employment intention of the students. Second, there is a need for institutional support for certification and expanding language training opportunities. Third, in the case of a local university, it is necessary for enhancing competency for employment through the promotion of basic education for students.

The effect of reading strategies developing through reciprocal teaching on reading comprehension, metacognition, self efficacy (상보적 수업을 활용한 읽기전략 훈련이 독해력, 초인지, 자기효능감에 미치는 효과)

  • Kim, Mi-Jeong;Eun, Hyuk-Gi
    • The Korean Journal of Elementary Counseling
    • /
    • v.11 no.2
    • /
    • pp.299-320
    • /
    • 2012
  • We have information through a variety of media such as language, pictures and internet. Since we get information through texts mostly, we can say that reading ability which enables a person to read a text and understand its meaning basically is the most essential for people to possess. Taking the advantage of the fact that a school is a place where learning and daily-life guidance can be made at the same time, we need to try encouraging students to involve in learning process and feel a sense of accomplishment by adding consultation between a teacher and a student or between a student and a student in Korean subject. This study selected two fifth grade classes of an elementary school of small and medium-sized city as an experimental group and a control group respectively and applied reading strategy program by using interaction of complementary lesson as the number of ten times during five weeks. It focused on making students interested in complementary class and encouraging them to become active participants. This study's goal is to see if the reading strategy program affects students' reading comprehension, metacognition and a sense of self-efficacy The results of the study are as in the following: first, the reading strategy program of complementary lesson is effective in students' reading comprehension and a range of factual understanding and sentimental understanding. Second, the reading strategy program of complementary lesson is effective in adjustment area as a subordinate factor of metacognition. Third, the reading strategy program of complementary lessonis effective in students' sense of self-efficacy. It is shown that experience of using new reading strategy and successful experience and help in peer-group members have a positive effects on a student's sense of self-efficacy. Forth, as the result of satisfaction evaluation over the program with the students' activity report and researchers' observation results, the study shows that the organization and operation of the program influences on students' effort and participation to reach the goal together positively. Through the results as above, we can say that the reading strategy program of complementary lesson have a positive effect on a student's reading comprehension, metacognition and a sense of self-efficacy.

  • PDF

The Effects of Hot Temperature on Impulsive Behaviors: The Role of Product Types as a Moderator

  • Ahn, Hee-Kyung
    • Asia Marketing Journal
    • /
    • v.14 no.3
    • /
    • pp.27-48
    • /
    • 2012
  • Temperature and weather are all around us, quite literally. Furthermore, temperature and weather not only permeate our atmosphere, constantly affecting our visceral states of warmth and coldness, but they metaphorically permeate our language. People, products, and ideas can all be "hot" or "cold." Given this ubiquity, it is perhaps surprising that relatively little research has systematically examined the influence of temperature on choice and judgment. Temperature-related words such as "hot" and "cold" are often used to describe impulsive and calculated behaviors, respectively. These metaphoric connotations of thermal concepts raise the question as to whether temperature, psychological states and decision making are related to each other, and if so, how. The current research examines these questions and finds support for a relationship. Across one field study and one laboratory experiment, I demonstrate that both hot ambient room temperature (Spa) and hot temperature primes (words) trigger decision outcomes in line with the metaphoric association between hot temperature and impulsivity. In the field study, participants were recruited in hot (40-50 degrees Celsius) and cold (10 degrees Celsius) rooms at a spa. Participants were simply asked to indicate their willingness-to-pay (WTP) for three product categories (travel package, birthday dinner, and cell phone). The results showed that participants in the hot room in comparison to those in the cold room were willing to pay more for the same products. Next, I tested if our results would go beyond ambient temperature and would hold if I were to prime temperature concepts by using a different priming method (i.e., subliminal vs. supraliminal). In line with the previous findings in the spa, participants in the hot priming condition were more likely to choose the wrong answer for the bat and baseball question than those in the cold priming condition. In addition, product type (e.g., pleasure vs. necessity) can moderate the effect of hot temperature on impulsivity. Mood and arousal did not mediate participants' responses. My findings seem to suggest that the effects of temperature on decision outcomes can be attributed to metaphoric associations rather than incidental mood or arousal. The current research applies a novel perspective in understanding the relationship between temperature and judgment and decision making. Also, the results have practical implications for packaging, advertising, merchandising, and pricing of goods and services, as well as for public policy and awareness. One of the most natural implications of my findings would be that retailers would be better off carrying more impulse purchase items on hot days. Furthermore, point-of-purchase promotions encouraging impulse purchase is more likely to be effective in retail environments with higher temperature than with lower temperature. In addition, advertisements and product packages evoking hot temperature associations (e.g., beach, sunshine, summer) might lead consumers to pay higher price for the advertised product than those with cold temperature associations.

  • PDF

The Standard of Judgement on Plagiarism in Research Ethics and the Guideline of Global Journals for KODISA (KODISA 연구윤리의 표절 판단기준과 글로벌 학술지 가이드라인)

  • Hwang, Hee-Joong;Kim, Dong-Ho;Youn, Myoung-Kil;Lee, Jung-Wan;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.6
    • /
    • pp.15-20
    • /
    • 2014
  • Purpose - In general, researchers try to abide by the code of research ethics, but many of them are not fully aware of plagiarism, unintentionally committing the research misconduct when they write a research paper. This research aims to introduce researchers a clear and easy guideline at a conference, which helps researchers avoid accidental plagiarism by addressing the issue. This research is expected to contribute building a climate and encouraging creative research among scholars. Research design, data, methodology & Results - Plagiarism is considered a sort of research misconduct along with fabrication and falsification. It is defined as an improper usage of another author's ideas, language, process, or results without giving appropriate credit. Plagiarism has nothing to do with examining the truth or accessing value of research data, process, or results. Plagiarism is determined based on whether a research corresponds to widely-used research ethics, containing proper citations. Within academia, plagiarism goes beyond the legal boundary, encompassing any kind of intentional wrongful appropriation of a research, which was created by another researchers. In summary, the definition of plagiarism is to steal other people's creative idea, research model, hypotheses, methods, definition, variables, images, tables and graphs, and use them without reasonable attribution to their true sources. There are various types of plagiarism. Some people assort plagiarism into idea plagiarism, text plagiarism, mosaic plagiarism, and idea distortion. Others view that plagiarism includes uncredited usage of another person's work without appropriate citations, self-plagiarism (using a part of a researcher's own previous research without proper citations), duplicate publication (publishing a researcher's own previous work with a different title), unethical citation (using quoted parts of another person's research without proper citations as if the parts are being cited by the current author). When an author wants to cite a part that was previously drawn from another source the author is supposed to reveal that the part is re-cited. If it is hard to state all the sources the author is allowed to mention the original source only. Today, various disciplines are developing their own measures to address these plagiarism issues, especially duplicate publications, by requiring researchers to clearly reveal true sources when they refer to any other research. Conclusions - Research misconducts including plagiarism have broad and unclear boundaries which allow ambiguous definitions and diverse interpretations. It seems difficult for researchers to have clear understandings of ways to avoid plagiarism and how to cite other's works properly. However, if guidelines are developed to detect and avoid plagiarism considering characteristics of each discipline (For example, social science and natural sciences might be able to have different standards on plagiarism.) and shared among researchers they will likely have a consensus and understanding regarding the issue. Particularly, since duplicate publications has frequently appeared more than plagiarism, academic institutions will need to provide pre-warning and screening in evaluation processes in order to reduce mistakes of researchers and to prevent duplicate publications. What is critical for researchers is to clearly reveal the true sources based on the common citation rules and to only borrow necessary amounts of others' research.

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF