scholarly journals Moving in small steps towards verb second: A case study

2011 ◽  
Vol 34 (3) ◽  
pp. 331-359 ◽  
Author(s):  
Christian Waldmann

This paper examines rule-based learning and item-based learning in relation to a Swedish child's acquisition of verb second in main clauses. While rule-based accounts assert that young children have access to syntactic structure and acquire a rule of generalized verb second, item-based accounts claim that young children are reproducing frequent word combinations in the input. The paper provides new and important data from one Swedish child, concluding that the acquisition of verb second is the result of rule-based learning.

1998 ◽  
Vol 13 (1) ◽  
pp. 23-27 ◽  
Author(s):  
Tom Lowrie

This article reports a case study involving a talented Year 1 (aged 6) child who was challenged to “take another person's point of view” when responding to a series of questions based on a well-known folk tale. It is argued that the use of effective questioning techniques allowed the child to develop a variety of metacognitive processes.


2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Shah Nazir ◽  
Sara Shahzad ◽  
Sher Afzal Khan ◽  
Norma Binti Alias ◽  
Sajid Anwar

Software birthmark is a unique quality of software to detect software theft. Comparing birthmarks of software can tell us whether a program or software is a copy of another. Software theft and piracy are rapidly increasing problems of copying, stealing, and misusing the software without proper permission, as mentioned in the desired license agreement. The estimation of birthmark can play a key role in understanding the effectiveness of a birthmark. In this paper, a new technique is presented to evaluate and estimate software birthmark based on the two most sought-after properties of birthmarks, that is, credibility and resilience. For this purpose, the concept of soft computing such as probabilistic and fuzzy computing has been taken into account and fuzzy logic is used to estimate properties of birthmark. The proposed fuzzy rule based technique is validated through a case study and the results show that the technique is successful in assessing the specified properties of the birthmark, its resilience and credibility. This, in turn, shows how much effort will be required to detect the originality of the software based on its birthmark.


Author(s):  
Ashu S. Kedia ◽  
D. Sowjanya ◽  
P. S. Salini ◽  
M. Jabeena ◽  
Bhimaji Krishnaji Katti

2021 ◽  
Vol 20 (01) ◽  
pp. 2150011
Author(s):  
Worapan Kusakunniran ◽  
Thearith Ponn ◽  
Nuttapol Boonsom ◽  
Suwimol Wahakit ◽  
Kittikhun Thongkanchorn

This paper develops the Scopus H5-Index rankings, using the field of computer science as a case study. The challenge begins with the inconsistency of conference names. The rule-based approach is invented to automatically clean up duplicate conferences and assign unique pseudo ID for each conference. This data cleansing process is applied on conference names retrieved from both Scopus and ERA/CORE, in order to share common pseudo IDs for the sake of correlation analysis. The proposed data cleansing process is validated using ERA 2010 and CORE 2018 as references and reports the very small errors of 0.6% and 0.4%, respectively. Then, the Scopus H5-Index 2006–2010 and Scopus H5-Index 2014–2018 rankings are constructed and compared with the existing ERA 2010 and CORE 2018 rankings, respectively. The results show that the correlation within the Scopus H5-Index rankings (i.e. Scopus H5-Index 2006–2010 and Scopus H5-Index 2014–2018) is at the top of the moderate correlation band, where the correlation within the ERA/CORE rankings (ERA 2010 and CORE 2018) is at the top of the strong correlation band. While the correlations across ranking systems (i.e. Scopus H5-Index 2006–2010 vs. ERA 2010, and Scopus H5-Index 2014–2018 vs. CORE 2018) are at the bottom and middle of the moderate correlation band. It can be said that the quality assessment using the Scopus H5-Index ranking is more dynamic and quickly up-to-date when compared with the ERA/CORE ranking. Also, these two ranking systems are moderately correlated with each other for both periods of 2010 and 2018.


2012 ◽  
Vol 66 (8) ◽  
pp. 1766-1773 ◽  
Author(s):  
J. Yazdi ◽  
S. A. A. S. Neyshabouri

Population growth and urbanization in the last decades have increased the vulnerability of properties and societies in flood-prone areas. Vulnerability analysis is one of the main factors used to determine the necessary measures of flood risk reduction in floodplains. At present, the vulnerability of natural disasters is analyzed by defining the various physical and social indices. This study presents a model based on a fuzzy rule-based system to address various ambiguities and uncertainties from natural variability, and human knowledge and preferences in vulnerability analysis. The proposed method is applied for a small watershed as a case study and the obtained results are compared with one of the index approaches. Both approaches present the same ranking for the sub-basin's vulnerability in the watershed. Finally, using the scores of vulnerability in different sub-basins, a vulnerability map of the watershed is presented.


2015 ◽  
Vol 789-790 ◽  
pp. 873-877 ◽  
Author(s):  
Phung Xuan Lan ◽  
Hoang Vinh Sinh

This paper presents an effective rule-based method for extracting and recognizing the machining features from 3D solid model. The machining feature is automatically recognized while considering the relationship between machining feature and machining process. This proposed method is capable of recognizing not only prismatic machining features but also multi-axis machining features from many kinds of complex design features in both protrusion and depression. It also succeeds in recognizing various types of interaction in a uniform way. The capability of the proposed method is demonstrated in one specific case study.


Sign in / Sign up

Export Citation Format

Share Document