Sunday, March 31, 2019

Night by Elie Wiesel

Night by Elie WieselKurtis MayesNight by Elie Wiesel is a howling(a) but powerful autobiography. Eliezer or Elie Wiesel was born in the town of Sighet in Transylvania. He was just a teenager when he was moved to the ghetto then sent a focal point to the dumbness camps. many an(prenominal) events in the orbit hold been captured in history books but among the sensations that we have heard ab expose, the holocaust is the ane that most of us remember.A holocaust is a destruction or slaughter on a mass scale. The Jewish Holocaust was a controlled, state financed torture and killing of roughly six million Jews by the Nazi government led by Adolf Hitler. Apart from the Jews, other groups considered outclassed or anti-establishment such as Ro human beingss and Gypsies were killed. Moshe the Beadle was the front character introduced in the book Night. Moshe, some may say, served as a replacement for Elie Wiesel. Night derriere be read as an attack averse to belt up. Many clock in the book evil is preserved by a dumb lack of resistance. In this case, the repeated disregarding of Moshes warning about what hazard lies ahead for the Jewish sight. The Nazis most by all odds interact the Jewish batch as less than human. The Nazis doctors experimented on the Jewish concourse in an tackle to create a superior race of man. The Nazis also crammed the Jewish people in to cattle cars to transport them from place to place, or they forced marched them. If superstar of the people fell or went to the ground, they were killed. In the first chapter, Elie describes his father as a rather unsentimental man and told us of how He is more than concerned with others than with his own family. Right away you see that Elie and his father were non that close. Elies father was bingle of the leading men in the community and did non approve of Elie reading the Kabbalah. The Kabbalah is the ancient Jewish tradition of transcendental interpretation of the Bible, which forme d a barrier of separation between Elie and his father. The first bond that Elie had with his father is when they reach the concentration camp know as Auschwitz. The first orders yelled at them is Men to the left Women to the right. At this point, Elie did not know he was to be separated from his mother and terzetto sisters forever. It is now that Elie and his father start the terrifying and miserable journey of breeding in the camps together. Later in the book Elies mother and three sisters snuff it at Auschwitz but Elie and his father were reinstated at Buchenwald. When Elie arrived at Auschwitz, he motto the mis distributement of killed Jews being burned in mass graves. The book states that Elie witnessed an old man getting beat with a revolver that a SS soldier owned. He knew at that point that this journey had to go through was not breathing out to be easy and it wasnt going to be stress discontinue. Men, women, and childrens bodies were tossed into huge wads of bodies an d burned. For the Jews, meal times were the most important event of each day. after sunup roll call, the Jewish people would be given their morning meal which was an imitation coffee or herbal tea. For lunch prisoners may have been given watery soup. If they were lucky, they might get a very(prenominal) tiny piece of a turnip or a potato peel. In the evening prisoners may have been given a small piece of black bread they may also have veritable a tiny piece of sausage, or some marmalade or cheese. Marmalade was mostly a fruit preserve made from the juice and peel of citrus fruits boiled with sugar and water. The bread was supposed to last the prisoners for the morning also, so prisoners would try to hide it with them while the slept so that no one would remove their food and so that they can eat small bits at a time without getting yelled at or beaten. Hunger was one of the greatest problems. The deficient rations were merely intended to keep the prisoners alive. The Nazis d id not yield prisoners with sufficient nutrition to carry out heavy manual work. Many thousands died from starvation or illnesses brought on by lack of nutrition.The Nazis crammed the Jews in very poorly made barracks to sleep. The Nazis spit on the Jews and they treated them worse than the Blacks were treated in the USA during the early years of building America. One of Wiesels strengths in Night is to show the expert terror of dehumanisation, the Jews had to go through.It is something that the Nazis perpetrated against the people they imprisoned. The tattooing of verse on the prisoners, something that Elie notes, is important. A- 7713 is by definition an example of dehumanization because it steals the human out of the word humanity. The brutality that the Nazis committed on their prisoners is another example of dehumanization. The globe beatings, the hanging of prisoners and making others walk past them, as well as the selection process ar all examples of dehumanization. Whe n Elie had to run at full speed to avoid being noticed during one of the selection processes, it is a reminder, it shows just how large dehumanization played a role in the Holocaust. Even in actions that the Nazis took towards Jewish people before the extermi population, dehumanization was present. human being forced to wear the Yellow Star and the dramatic and almost quick forced movements into the ghettos are all examples of dehumanization that the Nazis executed. Wiesel shows the true horror of dehumanization to impact the relationships between Jewish people. Wiesel makes the claim that the terror of the Holocaust existed in how everyone dehumanized one another. Moshe the Beadle one of the first characters that get brought up in this book. His Role was not just a little boy in a book that got banished for severaliseing myths. Moshe the Beadle is a symbol of dehumanization. During the first a few(prenominal) chapters he is dehumanized by the people of Sighet. When he comes ba ck to tell them what he experienced, he is dehumanized in the way that he is dishonored and banished. Moshe the Beadle represents barbarize within Germany by the treatment he receives. This process continues in the train when the men on the train beat up Madame Schchter. When she exclaims that she sees fire, she is not heard. Rather, she is told to shut up and then forcibly beaten into silence. Once again, dehumanization is evident in how victims of evil treat one another. Throughout the camps, examples of children abandoning parents, people betraying one another, and aloneness dominating human actions until survival is all that be are examples of dehumanization in the book. These examples show that the Holocaust happened because individuals dehumanized one another. In seeing, human beings as less than human beings, individuals were able to treat one another with a lack of dignity and voice. Elie struggled with his faith is a conflict in the book. In the beginning, His faith in go d was undoubtedly pure. His belief in an almighty, benevolent God is unconditional, and he cannot imagine aliveness without faith in a supreme higher power. During the Holocaust, His faith was definitely shaken up by the events that he had to endure. Elies belief in the presage and that God is good, his studies taught him, God is everywhere in the world, therefore the world essential(prenominal) therefore be good. Elies faith in the good will of the world is irreversibly shaken, however, by the cruelty and evil he endured during the Holocaust. He imagines that the concentration camps are unbelievable, disgusting cruelty could possibly reflect divinity. He thinks that if the world is so disgusting and cruel, then God either must be disgusting and cruel or must not exist at all. In one of Nights most famous passages, Eliezer states, Never shall I allow that nocturnal silence which deprived me, for all eternity, of the desire to live. It is the idea of Gods silence that he finds most troubling, as this description of an event at Buna reveals as the Gestapo hangs a young boy, a man asks, Where is God? yet the that response is total silence throughout the camp.After reading this book, I noticed that Wiesels work indicates that anytime voice is silenced, dehumanization is the result. This becomes its own end that must be stopped at all costs. Elie has a powerful way to explain what he had to go through to become a free person again. It just makes you wonder what pushes someone to mass murder a group of people or to turn a whole nation against one group or kind of people just because they are different.

Vocabulary Learning Through Computer Assisted Language English Language Essay

lexicon t individuallying Through Computer Assisted Language position Language endeavorAbstractThe importance of breaking English as an international row requires the scholarship of verbiage as the basic and necessary skill. By the returns of engineering, and data processor in particular, numerous researches argon done to understand the modulate of technology on intelligence operationing scholarship. This literary review is done to show the importance as well.IntroductionMichael Levy defined Computer-assisted Language eruditeness ( treat) in his book as the search for and necessitate of applications of the computer in speech teaching and light uponing (p.1). It is recognizable in the academic publications for virtually the last thirty years. watch rallying cry has been made possible by invention and evolution of the computer. They developed from large mainframe computers to smaller, faster, and easier ones. For all those who go to create new border material s, points of departure range dramatically from top-down approaches centered perhaps upon a surmisal of lecture or lyric poem learn, or a curriculum specification, succession early(a)s might develop make materials from the bottom up, perhaps by using the computer to address a particular classroom problem. otherwise points of departure might include a culture strategy , a macroskill, computer conferencing, or an exploration of aspects of the technology itself. There are practical issues to considerfor example, the selection of the hardware and packet phylogenesis as wellls for the project, Hypercard, Authorware, Toolbook, CALIS, C, and Visual Basic, or a mark-up language to enable publishing on the orbit Wide Web much(prenominal) as Hypertext or practical(prenominal) Reality Mark-up Languages (HTML and VRML), are just a handful of legion(predicate) options now available. (Michael Levy, Oxford Linguistic Computer-Assisted Language learn Context and Conceptualization , p.3)an interdisciplinary perspective on shout shows it to be a relation backly new field of study that has been subject to the influence of a military issue of early(a) discip parameter. In sum to the fields of computing and language teaching and learning, real and potential influences in the development of CALL included aspects of psychology, artificial intelligence, computational linguistics, instructional design, and benevolent-computer interaction. umpteen of these disciplines are relatively new in themselves, having developed signifi imbedationtly since World War II. They each buy off their own perspective and frame of reference, they practically overlap and interrelate, and the extent to which any one discipline should influence the development of CALL has non been de destinationined. At various times, CALL workers book cal take upon each of these fields to guide their own work in around way. (the same, p.7) cultivation of CALLJing-hua suggested in his paper p resented It is commonly known that the development of CALL mainly experiences tether phases, namely, behavioristic CALL, communicative CALL, and integrative CALL. Each devise is marked by distinct language teaching theories. For example, Behaviousristic CALL is establish on the dominant behaviorist theories of learning and teaching of that time, which emphasizes the formation of address habit, thus, courseware mainly foc holds on practice and drill of language patterns. After behaviorism lost its dominance, cognitive psychology began to gain popularity. Communicative CALL rejects the flavor of habit-formation and foc economic consumptions much on creative language do. So software at that time stressed the importance of communication and creative use of language instead of manipulation of language forms. Under the influence of constructivism, integrative CALL began to gain prominence. Constructivism focuses more than on the connection between old noesis and new familiarity and learners are taken as active participators who bed engage in creative thinking rather than follow active made familiarity. The development of internet provides learners with enormous amount of authentic materials and too a platform where they go off put up a real confabulation with peers, teachers or native speakers. The integration of the four skills becomes possible and learners individual postulate are satisfied to round extent. Studies on computer assisted vocabulary learning have touched upon diametric aspects of vocabulary learning, among which a line of research is to experience the marrows of electronic or online dictionary use or the cause of look-up behavior or the click behavior on word retentivity (p.60,61).What Does Vocabulary Mean?Vocabulary .. is an essential heart of interchanging ideas and of acquiringnew experiences Mans growth in ideas has al ship canal been accompanied by acorresponding expansion of his vocabulary. (Gray 1939, p.1).When a pupi l admits and learns the meaning of well-known(prenominal) address by context, there isreason to believe that the knowledge go away be genuine and important. (Thorndike 1934, p.11).The commonest way and perhaps the take up way to resurrect growth of content in oral communication is to allow the child to realise the meaning from context (Chambers 1904, p.50).Vocabulary Acquisition and L2/FL variation ComprehensionReading is an active skill that involves the reader, the text, and the interaction between the deuce. Reading in a L2 or FL is a dynamic and interactional process, during which learners make use of a variety of skills and strategies, combined with background knowledge, L1-related knowledge and real-world knowledge to arrive at an understanding of written material (Aebersold and Field, 1997 ix).Constantinescu (2007) suggests that several researchers have argued that vocabulary plays a major part in reading proficiencyAside from wise(p) how to use the appropriate rea ding strategies, Grabe (1991, as cited in providedler-Pascoe and Wiburg, 2003 124) argues that fluent L2/FL readers look at to know closely 2,000 to 7,000 lyric and or sotimes even more if they essential to reach native-like fluency. Similarly, Groot (2000 62) argues that an adequate understanding of academic texts requires a vocabulary of at least 7,000 words. Generally, L2/FL readers need to separate approximately 95 per cent of the words in a precondition text in order to wrap up its meaning and they need to know the different meanings of words according to context, as well as words grammatical properties.What are Language Learning Strategies?Seglar (2001) remarked, Language Learning Strategies could be any set of operations, steps, plans, routines employ by the learner which affect this process (p,26).There are two ways for the second language vocabulary acquisition.S. Prell suggested in his articles wo ways for the second language vocabulary acquisition (p.2)The seto ff manner, the experi rational order acting, is CAVOCA.The second method is a more familiar approach to the learners, called the bilingual word list.Prell remarked, The first method is the bilingual word list presentation. The second is the Computer Assisted Vocabulary Acquisition (CAVOCA) program.The CAVOCA method attempts to replicate the way the first language is acquired, which is by an incremental process that gradually develops with repeated exposure and constant interaction between the various stages (Groot, 2000, p. 64). The program has four sections, which include storing the word in reminiscence using the word in several sentences to learn the spell and meaning giving examples for long-term memory and a self-assessment.The second method is a more familiar approach to the students, called the bilingual word list. This method takes less time and produces favorable short-term results (Prell). Prell conducted some experiments and found that some(prenominal)(prenominal) of them wre expensive, yet through some experiments it was proved that they were different from each new(prenominal)In the first two experiments, the bilingual word list yielded good higher results with the speedy tests given than the CAVOCA program. However, in examen the students two to three weeks later, the CAVOCA method produced better results for the retention of the vocabulary. In the third and fourth experiments, the bilingual word list did not show significant differences in the immediate tests from the first two experiments. However, the CAVOCA method showed higher rates of retention for the tests given two to three weeks after the initial test.Information ProcessingIheanacho (1997) remarked in his research suggests that cognitive theorists assume that any complete theory of human cognition mustiness include an analysis of the plans or strategies people use for thinking, remembering, understanding and producing language (p.18).Iheanacho (1997) remarked in his researc h The memory arrangement formulates the interrelation among the three main storehouse structures of the brain Sensory register, Short term memory (STM), and Longterm memory (LTM) (p.2).According to Schwartz and Reisberg (1991), the STM provides a small storagerepository where the info is repeated over and over through a maintenancerehearsal process. When a piece of schooling is repeated and rehearsed, the opportunityof retaining that information can increase. only when the STM is limited in how oftentimesinformation it can hold. The maintenance rehearsal helps to transfer the excessinformation which is not yet needed to an other storage called Long-Term depot(LTM). LTM provides a storage place of great size containing information that is notimmediately active so that the information can be retrieved when needed. According toMiller (1989), LTM helps people to recall events, solve problems and recognize patterns.It is the repository in which we carry out all that we know (Sc hwartz Reisberg 1991).The interrelation between STM and LTM explains how visual informationcan enhance retention and recall. According to Posner (1969), visual information canpersist in STM after the stimulus is diminished. Additionally, visual information can beactivated and retrieved from the LTM. The information affect model can account forthe specialty of visuals in learning.Visual researchHeinich, Molenda and Russell (1993) proposed that learning is facilitated when instruction follows a taking over from actual experience to iconic representation, and then to symbolic or swindle representation. Visuals make abstract information more concrete and are accommodate for analogical reasoning (Levie, 1987).Pictures and prose can be used to help both complete and unskilled readers to enhance their reading skills ( Holmes, 1987). Holmes studied the tycoon of 116 fifth and sixth grade students to answer inferential questions. Three hosts were established. The first theme used pictures, the second group used prints, and the third group used a combination of prints and pictures. His purpose was to examine skilled and unskilled readers to call if there would be a significant difference in their ability to answer questions in each approach. He found that pictures enabled both skilled and unskilled readers to answer inferential questions. Holmes therefore suggested using pictures to initially purify inferential reading, and then gradually advancing to using print only. resource and vocabulary acquisitionFurthermore, a study conducted by Paivio and his associates (1971) revealed thatwhen learners are instructed to use images to commit a list of words to memory, recall isfacilitated dramatically. In the study, subjects were necessitate to learn pairs of words byrehearsing each pair, by devising up a sentence for each pair of words, and by forming amental image for each pair of words, with the image combining the words. They foundthat subjects who intenti onal through imagery performed better on a recall test.Dual-coding theoryDual-coding theory contends that pictures and words activate independent visual codes (imagens) and literal codes (logogens). The oral system is language-like and specializes in linguistic activities associated with words and sentences, whereas, the visual system is estimation of as a code for images and other picture-like representations (Rieber, 1994 Rieber, 1992). Rieber further explains that both verbal and visual subsystems have unique properties. Whereas logogens are stored in the verbal system as discrete elements, resembling words and sentences, imagens are stored as continuous units in the visual system.According to (Paivio, 1986 Rieber, 1992 Rieber, 1994), dual coding theoryassumes that three levels of processing can occur within the verbal and visual systems.These are representational connections, associative structure, and denotive connections. Representational connections occur between incoming stimuli and either the verbal or visual system. Whereas verbal stimuli activate verbal memory codes, visual stimuli activate visual memory codes.Rieber (1994) explained that the important aspect of referential connections between the verbal and visual systems are not one to one, moreover can be one to many. For example, seeing a picture of a computer may invoke many verbal responses, much(prenominal) as an Applecomputer, an IBM computer or a Laptop computer. This concept can be applied when using pictures to learn vocabulary.Associative structures refer to activation or processing of information within anyof the systems. The processing of information in the verbal system is assumed to besequential or elongated whereas, processing of information in the visual system is believed to be latitude or synchronous. The separate coding systems, however, can aid each other so that something coded in both picture and verbal forms can be easily remembered (Rieber, 1994).The probability of recall is increase due to the availability of two mental representations instead of one. If one memory trace is lost, the other is doubtlessness available (Rieber Kini, 1991).multimedia CALL and vocabulary acquisitionStudies (Reid, 1996 Davis Lyman-Hager, 1997 Zimmerman, 1997) showed the tellingness of multimedia CALL on vocabulary learning in particular and languagelearning in common. Based upon this review, multimedia CALL programs that use campaignpictures, alleviate pictures, and text can help ESL students to improve their vocabulary skills.But it is not clear if a multimedia program with motion pictures or the one with stillpictures will be more government issueive for modal(a) level ESL students. More empiricalstudies to investigate the effectiveness of multimedia CALL with motion pictures and still pictures on vocabulary acquisition of ESL students can need to the development of more effective methods for vocabulary acquisition.Motion graphics and still graphicsMan y studies (Rieber Kini 1991 Siribodhi, 1995 Rieber, 1990 Rieber, 1996) have shown that computer graphics are effective for gaining attention. Furthermore, Iheanacho (1997) suggested that computer graphics can encourage students to create mental images that in turn make it easier for them to learn certain guinea pigs of information. The difference between motion graphics and still graphics is that motion creates the illusion of movement which helps to explain abstract concepts (Bricken, 1991 Rieber, 1994).In 1996, Rieber conducted a study to explore how users interact and learn during a computer-based simulation given graphical and textual forms of feedback. He found that subjects learned more when provided with animated graphical feedback than with textual feedback. Rieber hypothesized that interactive forms of multimedia, such(prenominal) as computer.simulations will promote different levels of processing depending on the type ofrepresentation used (e.g. text, graphics, motion an d sound). In an earlier study, Rieber Kini (1991) contended that in melody to static graphics, animated graphics can provideusers with additional information through two important visual attributes motion andtrajectory. They also added that brio can provide information about whether theobject is moving or whether the objects motion changes over time. fluid or staticpictures, on the other hand, lack motion and are more abstract than motion pictures. Stillpictures suggest motion whereas motion pictures show life in action, can be used to studyspecific elements, and can bring us close to the point of visual contact (Dale, 1969).EXPERIMENTS ON COMPUTER-ASSISTED VOCABULARY achievement IN THE ESL CLASSROOMRESEARCH QUESTIONSPelletreau (2006) conducted an experiment Of chief importance in this study was the degree to which students would take return of computer-assisted opportunities for incidental vocabulary learning while performing online reading tasks. The study necessarily addresse d a more fundamental question How would students learn new words in the course of completing computer-based reading tasks? Lastly, and most importantly for this study, how was the learning of non- sucker words related to the learning of steer words? (p.16).In an earlier study (see Juffs et al., April, 2006), students frequently used the online dictionary to look up the meanings of target words. In fact, students accessed 71% of all the definitions available to them on average, and yet, such behavior did not correlate with restraint of words (r = .16, n.s.). The beaver predictor of word mastery (as defined by 2 correctly answered post-reading vocabulary questions) was number of texts read (r = .86, p .0001). In other words, students reading more texts mastered more words, though the time spent clicking on hints had almost no effect on word mastery (Juffs et al., April, 2006). If students were not benefiting from looking up target words, it may have been because they were not actu ally making use of target-word definitions. But what were they doing while reading? They were either unable or unwilling to learn target-word definitions. It became apparent that students were not gaining a substantial learning advantage by using the online dictionary. In other words, students were not achieving a desired learning outcome. They resisted their language-learning task and instead participated in a counter-task (Lantolf Thorne, 2006, p. 238)In this context, a purpose was made to allow students to look up any word in the online dictionary. Perhaps students had been focusing their attention on non-target words, or maybe they had other preferred (and unknown) methods of using the program. It was clear that students were likely not using the cast program the way they had been expected to, and it was also apparent that the instruments to gather info about students behavior in the LMC were lacking. As a result, REAP was circumscribed to allow students to look up the mean ing of any word, and the number of clicks of both target and non-target words was recorded.Because quantitative data alone would provide an neither picture of student vocabulary-learning behavior, qualitative data collection instruments were introduced. Students could be valuable sources of information about their own vocabulary-learning techniques. The acquisition of target vocabulary was sight to depend on student comprehension of non-target words. It was hypothesized that students would use information about non-target words to assist them in their target-vocabulary tasks. It may have been the case that knowledge of non-target words environ target words would aid students in making lexical and semantic connections that facilitated target-word acquisition. In line with such reasoning, a firm positive correlation between non-target and target-vocabulary acquisition was posited, at least up to a particular critical threshold. For those students who knew the meanings of very few o f the words surrounding target words, it was reasoned, target-word acquisition would be minimal. In such a scenario, such students would have too many gaps in their word knowledge and too few resources to be able to acquire a considerable number of target words.In effect, students learning more non-target words were predicted to learn more target words, though only up to a point. Student the true on measures of target vocabulary knowledge should have correlated powerfully with non-target vocabulary acquisition up to some critical point.After a certain threshold, the acquisition of additional non-target words might have led to a decrease in the number of target words acquired. such a threshold may have depended in part on the general language proficiency of the student (measured in this case by the MTELP score). The finite nature of the students language-learning resources, including processing power, attention and memory, may also have been important.It was thought that students s pending much of their time learning as many non-target words as they possibly could would likely perform as ailing with respect to target-word acquisition as those who paid little or no attention to non-target words. In such cases, it was plausible that temporal and cognitive constraints (Sweller, 1988 1994) would involve to students acquiring relatively fewer target words.In effect, the distribution of target words acquired versus non-target words acquired should have been more or less nonlinear. That is, target-word learning should have reached some maximum prise for a moderate value of non-target word learning. Additionally, the amount of non-target word acquisition occurring in the study should have been much less, on average, than that of target-word acquisition. While there may have been some exceptions, the transparent instructions to focus on target words bring together with the way the words appeared should have led to relatively greater student attention to target wor ds. It should also be pointed out that students answered cloze questions testing their knowledge of target words (for which they received feedback) after each reading, while they answered no such questions and received no feedback pertaining to non-target words. Greater attention and in general, more cognitive resources devoted to target words should have translated to first derivative target and non-target vocabulary learning. In terms of predicting how many target and non-target words students learned, general language proficiency should have provided some indication of such information.Pelletreau (2006) concluded in this experimenr, Non-target word lookups did not correlate with target word acquisition. Students did not appear to learn target words faster or better by attending to non-target words. As a result, the relationship between the explicit and incidental learning students engaged in remains unclear. The relative effectiveness of each, as well as the optimal balance of e xplicit and incidental learning in such a context, is an open question.Benefits of CALL for Vocabulary Acquisition and Reading ComprehensionAccording to Constantinescu (2007) multimedia refers to computer-based systems that use various types of content, such as text, audio recording, video, graphics, animation, and interactivity.Constantinescu (2007) mentioned in his article Most research on vocabulary acquisition and CALL has focused on the effects of multimedia glosses, and the same is true for reading comprehension, since vocabulary and reading are closely and reciprocally related. This reciprocal relationship also accounts for the fact that many research studies on vocabulary development and CALL also examine reading comprehension, and vice versa.multimedia Glosses and Vocabulary DevelopmentOne of the first to examine the effects of multimedia glosses for vocabulary development were Lyman-Hager and Davis (1996), who integrated a computer program into the French foreign language curriculum and discussed vocabulary acquisition and students glossing choices for 262 intermediate level students studying French. Two conditions were used in this study computerized reading and non-computerized reading using an excerpt of Oyonos Une Vie de Boy. both groups had access to glosses the computer group had access to multimedia annotations, whereas the overcome group could consult printed text with the same glosses. As to whether or not computer treatment offered significant benefits to FL students, the results of the written recall protocol indicated that the experimental group who used the computer program to read the text significantly outperformed the control group who used the glossed reading in the print form.Using Multimedia for Vocabulary-buildingConstantinescu (2007) mentioned in his article However, multimedia is not used only for glossing texts. Multimedia is a central component of good computer-assisted skill-building software. Thus, Chanier and Selva (1998) stressed the benefits of multimedia support for learning L2/FL vocabulary and presented ALEXIA, a lexical learning milieu for French as a L2/FL, which includes a corpus of texts, a general and a personal dictionary, and a lexical activities unit. After reviewing various viewpoints about the effectiveness of multimedia for vocabulary learning, they propose useful criteria for evaluating the quality of a visual representation in a lexical environment. Groot (2000) presented another multimedia-enhanced computer-assisted word acquisition program, called CAVOCA, whose aim was to speed up the vocabulary acquisition process. CAVOCA is an interactive program that takes learners through different stages of vocabulary development deduction, consolidation, and long-term retention.Benefits of Multimedia-enhanced DictionariesOther research that focused on vocabulary development with technology argued for the increased effectiveness of multimedia-enhanced electronic dictionaries designed specif ically for English language learners, and which have several built-in aids that their book counterparts cannot provide (e.g. the Longman Interactive English Dictionary, the Oxford Picture Dictionary Interactive, etc.) (Butler-Pascoe and Wiburg, 2003 126-12)Benefits of Multimedia for Reading ComprehensionThe positive effect that multimedia has on reading comprehension comes, according to Busch (2003 278), from the great advantage that online readers have over traditional printed readers the opening to enhance computerized texts with glosses in multimedia format.The effects of multimedia glossing received increased attention as researchers considered the possibility that computer-aided reading could create more proficient readers by offering a choice of various types of glosses to develop better vocabularies, greater background knowledge surrounding the text, and more effective reading strategies (Lyman-Hager and Davis, 1996 775).Constantinescu (2007) remarked some principles for inst ructors to increase the faculty of the introduced strategiesFirst Principle Instructors Should Pay More Attention to the Existence of miscellaneous Teaching ToolsFor vocabulary acquisition, instructors could make great use of technology by using multimedia glossed texts, electronic dictionaries, corpora and concordance software, as well as various vocabulary-building software.Second Principle Instructors Should Introduce Multimedia-glossed Texts into Their Vocabulary/Reading ClassesMultimedia glossing triggers better results when compared to print glosses. Moreover, full glossing seems to be the best facilitator of vocabulary acquisition and reading comprehension, as opposed to little or non-glossed texts. In addition, best results in retention are triggered by picture + text annotations, whereas pronunciation, video, and audio glosses seem to correlate negatively with reading comprehension.Third Principle Instructors Should Be Acquainted with the Criteria for Software and Coursew are Evaluation (e.g. goals, presentation, appropriateness, outcomes), As Well As carry Into Consideration Two Very Important Factors Time and EffortTeachers must be aware that there are many different types of software or online materials available for ESL / EFL, however, not all of them are valuable for classroom instruction. Some materials focus on specific skills, while others focus on a wide range of skills and strategies. Moreover, instructors should also ensure that the materials used in class are motivating for students and are at an optimum, i+1 difficulty level, so that progress can be attained. Teachers should also pay attention to students level of familiarity with computers and keep in mind whether the chosen software will trigger the desired outcomes.Fourth Principle Instructors Should Keep Up with Current Methodology and Make Best Use of Visuals and Multimedia near(a) CALL programs should make best use of visual elements and multimedia glossing, as well as generate st udents participation. The programs should be interactive, allowing the students to make choices. Also, they should consist of a wide range of different types of exercises in which students not only take up the right answers but also type in answers.SummaryL2 comprehention depends largely on acquiring vocabulary at least 7,000 words as was mentioned by Groot (2000 62). Due to the importance of vocabulary acquisition some ways were discussed, and through some experiments by Prell it becomes clear taht the CAVOCA method produced better results for the retention of the vocabulary (p,3). So, in continuation, my research focused on the influence of different models of Call strategies on accelerating vocabulary learning and how the instructors should use them in the best way to increase their efficiencies.ConclusionAmong different forms of computerized ways of vocabulary learning, some ways were mentioned. While being different from each other, it is proved that some of them are more eff icient that others. All in all, CALL can be a useful instrument for both teachers and students in think to the priority it has to the difficult traditional ways.

Saturday, March 30, 2019

Fall Of The Magan Civilization

line of descent Of The Magan CivilizationThe transition of charitableity from primitive life which emerged hunting and forum with agri kitchen-gardening, and living in with sm completely group during the Neolithic to establish metropolis states under administrative authorities in the Chalcolithic ,was a trem destroyous springinessin the spiritual rebirth of humanity, which beat significant impact on civilizations flourished in the dye Age.This transition had a positive impact on the circulate of human knowledge in various fields. Menon ( 2010) in his book distinguishes this maturate by six characteristics (i) bulls eye and bronze from the age takes its name (ii) harnessing of animals creator (iii) wheeled vehicles (iv)the sailboat(v) the potters wheel and (vi) bricks (p5).These improvements formd the structure of society. Cities became a center of saving, politic, culture and religions. Societies form depended on a hierarchical system. On top pecking order was king, p riests and armies commanders and in middle farmers, artists and crafts plenty and in the bottom slaves. Their economy flourished as top of diversity of occupations as well as religion system which compete role to demonstrate people .Finally, Knowledge of writing led kings to move into economic transactions and affectionate events(Duiker and Spielovgel,p8).11Emergence of civilizationsThe earliest city states in the world emergence on the banks of rivers in the Nile in Egypt, the Tigris and Euphrates in Iraq, Indus in India and the Yellow river in China. They prospered as emergence of availability of natural resources, make out activities and an increase of knowledge (Menon , 2010,p6). These led their neighbors to emergence as result of good deal and increased demand on materials which were not available in those civilization.12Emergence of Magan civilizationDue to knowledge of Mesopotamia and Harappa and Iran states , many other states emergence and grew as result of merchan dise activities much(prenominal) as Magan ( present day in Sultanate of Oman and unite Arab Emirates) , Meluhha (India) and Delmon (Bahrain) (. From first half of the third millenary BC, clay tablets from Mesopotamia recoded trade relations between Mesopotamians estates with these civilizations. Land Oman peninsula unrivalled of these states witnessed, from the end of fourth millennium B.C birth of the new civilization called Magan in Sumerian cuneiform and Makan in Akadian cuneiform(Weisgerber 2007,p197,198). The Magan was a major partner in intra-regional trade with the other civilizations analogous Mesopotamia, Syria, Iran , Indus civilization, Yemen and Horn of Africa by export bull and diorite Magan civilization which marked in the history of trading with (Cleuziou ,Tosi,2007,p213).Clay tablets which were run aground in south of Mesopotamia indicated that they obtained crap from Magan in the tertiary millennium BC. Texts from the reign of King Sargon about 2350 BC sta ted that Magan and Dilmun (Bahrain) and Meluhha (Indus) ships anchored at harbors of his capital Akkad , loaded and purchased goods including bulls eye, silver, oils, beans, textiles and leather products. atomic number 29 was the adept and only(a) outstanding goods that was much required by Mesopotamias states to use it in social and religious purpose. Due to h obsolescent in availability of this metal, they importeeed it from their neighbors especially from Magan (Weisgerber 2007, p197,198). gigantic investigations in the Oman peninsula have situated many archeologic posts be farseeing to Magan civilization. The identifys Archeologists called this stage Hafit which is attri simplyed to the first site that was discovered on the border of Oman and United Arab Emirates by Danish expedition. The archaeological researches presented the first phases of Magan civilization which as followThe archaeological studies have shown that the era of Magan civilization which extended from t he end of 4th millennium BC to the end of sec millennium BC, encountered growth and declined in its economy which reflected to communitys remains which they were found whether in settlements or wickeds. This essay will crosscut the traces of rise and fall of the Magan civilization from two aspects, dig and copper smelting and tombs of the people of this civilization.2. The development of pig productionEven though , the chemical synopsis for composition of copper samples ,found in the Mesopotamia which have proved that their source was Oman peninsula(Berthoud and Clezuiou,1983,p239,v6,p2), thither be some views have tried to link name of Magan to eastern hemisphere coast of Iran. The main reason for their orientation is that copper were produced in Iranian side (Clezuiou and Mery,2002,p275). However, Cannot be denied that the copper had a role in the renaissance of civilization in the peninsula of Oman.Investigations and archaeological studies in Oman and the United Arab Emi rates over ultimately the years, have indicated that the of Oman mountains range contain a large proportion of copper ore which exists in Ophiolites rocks, extending from Musandam in the north to Masirah island in the south. Therefore, more than 150 copper sites have been found, exploited since the Bronze age until the Medieval ( Hauptmann, Weisgerber and Bachmann, p35). Most of these sites localize in Sumail in interior region, Wadi Andam, Wadi Ibra and Lasail in Sohar (Potts 1978, p35).Archaeological studies of a bout of mining and smelting sites have shown that mining and smelting copper were similar in all the Calcholithic and Bronze Age sites. Moreover, the techniques of extraction and production was advanced since the end of the Chalcolithic halt, that authority they were influenced from Neighbors in the Near East (Weisgerber,2006,p193,194).These technique began with digging and extracting cupriferous mineral Malachite and Azurite sources by exploitation st iodine or met al hammers. afterwards collecting ore, it was grim on stone pestles to minuscular pieces to be able to smelt them later. Then, they were smelted in pear incarnationd furnaces do of clay (Weisgerber, 2007, p 197,198), with 50 cm diameter and 60-80 cm height and provided by blowpipes, made of leather use for ventilation. At a temperature of more than 1100c fluid copper flowed into hole the world of furnaces and formed as bun shape metal bar or ingot when they start cooled. Thus, the product is ready for exploiting, whether for local use or for exporting (Weisgerber, 2007, p197,198).Copper ingots which were prepared for exporting were transferred to number of ports by employ donkeys. Umm-an-Nar in Abu Dhabi in the United Arab Emirates was one of the important ports of Magan civilization. Merchants from Mesopotamia obtained their copper ingot with 1 to 2 kg weight. It qualification also, at that place was a inside interlocking trade ,connected internal settlements with thos e in coastal line which it has still followed in present time .Serg Cleuziou ( 1996,p161) states to this kind of trade network fish bear upon on various ways (salted ,smoked ,dried) already travelled to the interior and that the coastal settlements moved from a subsistence oriented production to a larger outdo export oriented production ,thus becoming fully integrated into the replacement system built around the exportation of copper.Through surveys and studies of archaeological in many mining of copper sites, made possible to make timeline for the development for this industry from 3200 1300 BC.21 Copper production Hafit head (Chalcolithic 3200-2500BC)Copper industry in this period began with simple production. A few of mining and smelting sites were found, but often it is difficult to identify them from other sites, belonging to concomitant periods because of continued exploitation of these sites (Weisgerber,v6/2,p270). However, archaeologists were able to follow attacks of this period through the figments of furnaces and dissipation (slag) of copper production or through artifacts such as needles which found in tomb at Maysar -25 , halberd from Bat site and fish- hocks in Ras-Al-Hamra site RH-5 Ras al-Hadd HD-6 (Cleuziou,1996,p160) . across-the-board studies in mining sites, which were carried out by the German mission from Bochum Museum have indicated that, copper production in this period might be poorly developed and it was fluctuating over the period. In profit, they sight that copper smelting sites were far from mines. This indicates that copper ore could be transferred to settlements by smelters and donkeys. For example, At Batin site in the Ibra state, which was dated to 2660 BC, many heaps of slag, furnaces fragments and hammer stones ( used for quelling ore and slag) are spread on develop of settlement , but mines are not exist in same area(Weisgerber, 2006,p192) .22 Copper productions in the Umm-an-Nar period (Early Bronze Age 2500-2000 BC)Outset of half of the 3rd millennium BC marked to an enormous increase in human activity in copper production. This is indicated by the mining sites which are regain in the mountains of the peninsula, stretching from Al-Safawir in the united Arab Emiratis to Masirah Island in Oman ( Hauptmann ).It can be seen also through Mesopotamian clay tablets which began to point out to Megans copper.Copper industrial in this age progresed forward by alloying tin factor with copper to produce bronze, which is harder than the copper ( Prang and Hauptman,p75). It also appears that the Magan and Dilmon have played a role in tin and copper trade in the Bronze Age. This was indicated by the analytical studies of copper and bronze assemblages found in Oman and the United Emiratis. This Scientific evidence dissented previous opinion which said that region did not know has this kind of trading( Weeks,2003,p116). Despite this scientific fact, there some archaeologists such as Michael Prange and Andr eas Hauptmann believe that0 tin bronze production started late in central of Oman in the game millennium BC, but it was known in one site in the United Arab Emirates(Yule and Weisgerber,2001,p75). Although this view based on archaeological excavations in some mining sites in central of Oman, there are many other mining sites which have been not analyse yet and could give a clear image about stemma of tin bronze production in central Oman.23 Copper productions in the Wadi suq period (Middle Bronze Age 2000-1300BC)In the second millennium BC, something happened that affected on lifestyle of Magans society. Oases might be wedded and replaced by nomadic style (Cleuziou and Tosi 2007,p257).There was a widespread perception this change has had a negative effect on copper production during this period, but the large number of copper assemblages which were found at the site of Qattara and Awasit and Nizwa grave continued with extensive production throughout second millennium BC(Velde,20 01,p109) .In addition an excavations at Bir Kalhar in Almodhbi and Samad al-Shan state have shown that no change seeming(a) in furnace techniques was similar to previous ages (Weisgerber,2006, p196).The expository article by Weisgerber in 1997 ,successfully demonstrates a clear explanation of fall of Magan in secocond millennium BC the importance. He highlights that the internal political crisis in the Indus civilization ,which was one of the important trading partners for the Magan in the tin trade as well as developing copper production technology in Anatolia in joker and Alashia in Cyprus which reduced a copper price, were the main reasons for the collapse of the civilization. Thus, Mesopotamia merchants began to import their copper from new countries(p11). In Magan, copper production began to be limited for domestic uses and bronze assemblage was rarely found (Weisgerber ,2007,p287).3. The development of funerary architectureFunerary architecture was a major concerned by cote rminous old civilizations ,because of strong belief of the existence of life later death. Thus, they have been one of the importance monuments in archaeological studies, especially in social, economic and religious aspects which prevailed in these communities.Tombs On land Oman peninsula are the most remarkable monuments . They can be seen in many places Oman Peninsula , on foothills mountains ranges and in bottom of valleys ( Clouziou and Tosi ,2007,p107). They were the first monuments that attracted many archaeological missions to study history of this civilization. Extensive studies have revealed ,there is gradual evolution in funerary architecture from the end of 4rd to3rd millennium BC and abrupt change in this architecture from the second millennium BC .31 Tombs in Hafit period 3200-2700BCThey were tagged these tombs as beehive tombs a well known beehive shape in Europe while some others called them cottages. Regarding the architectural design, these tombs were designed in a way that they have two parallel fence ins surrounding a circle, oval, square or rectangle burial room the floor of which is covered with obdurate plates. The circumvents are built using unpolished stones taken from nearby Limestone Mountains without using mortar. The out-of-door view of the temples varies according to the type of stones used in social organisation some of them are polished and some are not. The internal surround has soft frontages constructed with a particular type of stones organized systematically with fills of olive-sized stones that occurs in between. The width of the external wall is lesser and separated from the internal wall with a fill of small stones. In some cases, a third wall is added to these temples. The burial room is roofed with stones that lean towards the surface so that it appeared to be flat. In some temples, a supportive wall was noticed to be constructed inside burial suite. The entrance of burial rooms takes the form of triangle or sq uare towards south, east or west. After burying dead bodies, these entrances are to be blocked using stones.Mostly, these tombs are mass graves which contain no less than 3 to 30 skeletons of males and females of different ages and some of them are individual. The corpse will be institutionalise by its lateral side squatting accompanied by its joyless belongings including daggers, bead necklaces, stony tools and pottery vessels imported from Jimdat Nasr civilization, Mesopotamia. As we know, inhabitants of that period were not aware of pottery industry yet. They just import it or maybe imitate producing this type of clay.These tombs continued to be used for long periods reaching one or two centuries by family groups each one of which used one tomb or more. At later periods of time, the old skeletons were to be pushed aside and the tomb shall be used for new corpses.32.Tombs in the Umm an Nar period 2700-2000BCBy the beginning of 2700 B.C, architecture of tombs changed as result of the economic development of Majan civilization. Most of them were built at the plain close to the dwellings of settlements. They become of bigger size and have more rooms to overwhelm more corpses two to four corpses separated by dividing walls. Some temples allow in two semi-circle rooms divided by central wall one end of which is linked to the wall of the tomb from inside. Some of them include triplet rooms divided by two central parallel walls constructed in the middle of the tomb separately and their ends are linked to the internal wall of tomb. Some other temples include four rooms divided by central wall constructed in the middle of the tomb and two small walls branch out from it to form the four rooms. In addition, there is one more type which is a wall dividing the tomb into two halves (picture 15).These tombs have one or two entrances located at the eastern or western side. They are 50 cm higher than ground surface, 60- 70 cm tall and 60 cm wide at the disdain part. Th ese entrances are locked using three stones of particular shapes two in the let down part and one in the upper. The floor of burial room was cover used flat limestone. The internal walls were built using unpolished stones fortify with mortar. The external walls or frontages of tombs of early Umm- an-Nar period (2700- 2400 B.C) were built using brown and white limestone. These stones were removed from nearby quarries, transferred to the site and then polished winning the shape of small tangle or square cubes (picture 16). They are made curved to be in the same line with the circle wall. These tombs get wind very nice and the polished limestone look like pieces of sugar. The diameter of temples of this period was 7 -8 m.By the beginning of late period of Umm-an-Nar, the frontage walls of these become greater. Some of them contain two floors the height of which is about 10 12m and sometimes 14m. They were built by using huge limestone plates reaching 1m height and they were orna ment with prominent sculptures comprising drawings of humans, animals and snakes. These drawings help understanding the nature of lifestyle of inhabitants of 3000 BC. The roofs of Umm-an-Nar temples were flattened using huge stony plates. A roof gutter at the external ends of the tomb surface is provided to drain rainwater.

Friday, March 29, 2019

Speech Enhancement And De Nosing By Wavelet Thresholding And Transform Ii Computer Science Essay

talking to Enhancement And De Nosing By Wavelet Thresholding And Trans tenor Ii Computer lore EssayIn this jut the experimenter forget inspectk to design and go through techniques in fix to de racquet a noisy audio request utilize the MATLAB softw be and its deceases, a literature review provide be through and summarized to check details of the contri neverthelession to the atomic number 18a of memorize. Different techniques that throw rancid been apply in the audio and public lecture biddinging procedure get out be stick knocked break through(p)vass and studied. The implementation will be do apply MATLAB adjustment 7.0.IntroductionThe Fourier summary of a channelize can be utilise as a genuinely effectful tool it can effect the functions of obtaining the relative frequence comp singlent and the amplitude comp acent of aims. The Fourier outline can be employ to analyze components of stationary quests, these atomic number 18 omens that repea t, tapers that atomic number 18 composed of sinning and romaine components, precisely in terms of analyzing non stationary points, these be predicts that boast no repetition in the region that is sampled, the Fourier transmogrify is not very efficient. Wavelet alter on the new(prenominal)(a) hand al un unbrokens for these intercommunicates to be examine. The sanctioned concept behind ripplings is that a foretoken can be analyzed by splicing it into around(prenominal)(predicate) components and past these components be studied individu bothy. In terms of their frequence and prison term, in terms of Fourier abstract the foretell is analyzed in terms of its sine and cosine components but when a riffle go about is adapted because the summary is opposite, the riffle algorithm employes a act and analyzed the entropy on divers(prenominal) scales and resolution as compargond to Fourier analysis. In victimisation the ripple analysis, a casing of wavele t, referred to as macrocosm the start wavelet is utilise as the main wavelet graphic symbol for analysis analysis is accordingly performed from the mother wavelet that is of gameer relative frequency. From the Fourier analysis the frequency analysis of the intercommunicate is make with a simplified form of the mother wavelet, from the wavelet components that be turn overd via this process further analysis can be through with(p) on these coefficients. Haar wavelet types atomic number 18 very union and this is one of their defining features, its compact ability, as the interval gets so hulking it consequently starts to vanish, but the Haar wavelets suck a major(ip) limiting performer they atomic number 18 not continuously contraryiable. In the analysis of a minded(p) indicate the time domain component can be use in the analysis of the frequency component of that charge, this concept is the Fourier translate, where a forecast component is translated to the fre quency domain from a time domain function, the analysis of the signalise for its frequency component can now be done, and ground of Fourier analysis this is possible because this analysis incorporates the cosine and sine of the frequency. build on the Fourier transform a finite bewilder of sampled points are analyzed this results in the discrete Fourier transforms, these sample points are typical to what the empowerkey signal looks like, to pucker the approximate function of a sample, and the gathering of the integral, by the implementation of the discrete Fourier transforms. This is realized by the use of a matrix, the matrix contains an order of the enumerate amount of points of sample,the problem encountered worsens as the number of samples are increased. If there is resembling spacing in the midst of the samples then it is possible to doer in the Fourier matrix into the, multiplication of a few matrices, the results of this can be subjected to a transmitter of an order of the form m log m ope proportionalityns, the result of this sock as the Fast Fourier Transform. Both Fourier transforms mentioned supra are linear transforms. The transmit of the FFT and the DWT is what is referred to as the inverse transform matrix and they can be cosine and sine, but in the wavelet domain more multifactorial mother wavelet functions are formed. The domain of analysis in the Fourier transforms are the sine and cosine, but as it regards to wavelets there last a more complex domain function called wavelets, mother wavelets are formed. The functions are localized functions, and are set in the frequency domain, can be seen in the business leader spectra. This proves useful in finding the frequency and index distribution. found on the fact that wavelet transforms are transforms that are localized as compared to Fourier functions that are not, the Fourier function universe mentioned are the sine and cosine, this feature of wavelet makes it a useful candid ate in the purpose of this research, this feature of wavelets makes operations using wavelets transform sparse and this is useful when apply for racquet removal. A major advantage of using wavelets is that the windowpanes vary. A major application of this is to realize the portions and signals that are not continuous having light wavelet functions is a frank utilisation to overcome this, but to obtain more in depth analysis having longer functions are best.A practice that is utilized is having basis functions that are of short lavishly frequency and basis functions that are of long junior-grade frequency (A. Graps, 1995-2004), point to note Is that unlike Fourier analysis that be in possession of a limited basis function sine and cosine wavelets have interminable set of basis functions . This is a very important feature as it al showtimes wavelet to identify in setion from a signal that can be hidden by other time frequency methods, to wit Fourier analysis.Wavelets lie i n of different families within each family of wavelet there exist different subclasses that are differentiated base on the coefficients that are decomposed and their trains of iteration, wavelets are broadly classified ground on their number of coefficients, that is to a fault referred to as their vanishing moments, a mathematical relationship relates both. anatomy above giveing examples of wavelets (N. Rao 2001) matchless of the more or less helpful and defining features of using wavelets is that the experimenter has control over the wavelet coefficients for a wavelet type. Families of wavelets were developed that proved to be very efficient in the gibeation of polynomial behavior the simplest of these is the Haar wavelet. The coefficients can be thought of as being slabbers these are then placed in a fracture matrix and applied to a raw info vector. The different coefficients are ordered with descriptors that work as a smoothing sink in and another pattern whose functi on is to realize the detail development of the data (D. Aerts and I. Daubechies 1979). The coefficient matrix for the wavelet analysis is then applied in a hierarchical algorithm, order on its arrangement odd rows contain the different coefficients, the coefficients will be acting as filters that perform smoothing and the rows that are eventide will have the coefficients of the wavelets that contains the details from the analysis, it is to the full length data the matrix is frontmost applied, it is then smoothen and disseminated by half after this process the step is repeated with the matrix., where more smoothing takes place and the different coefficients are halved, this process is repeated several times until the data that remains is smoothed, what this process actually does is to bring out the highest resolutions from that data source and data smoothing is withal performed. In the removal of ruffle from data wavelet applications have proved very efficient and successfu l, as can be seen in work done by David Donoho, the process of encumbrance removal is called wavelet shrinkage and limening. When data is decomposed using wavelets, actually filters are employ as averaging filters while the other receive details, some of the coefficients will relate to some details of the data set and if a given detailed is small, it can then be take away from the data set without affecting either major feature as it relates to the data. The underlying idea of dooring is setting coefficients that are at a destinyicular scepter or less than a particular threshold to zero, these coefficients are then later apply in an inverse wavelet transform to furbish up the data set (S. Cai and K. Li, 2010)Literature ReviewThe work done by Student Nikhil Rao (2001) was reviewed, according to the work that was done a completely unsanded algorithm was developed that foc utilize on the compression of name and address signals, based on techniques for discrete wavelet tra nsforms. The MATLAB software translation 6 was employ in order to simulate and implement the codes. The locomote that were taken to achieve the compression are listed on a lower floorChoose wavelet function bring guff trainInput speech signalDivide speech signal into framesDecompose each frameCalculate thresholdsTruncate coefficients convert zero- regard asd coefficientsQuantize and bit encodeTransmit data frame move of extract above taken from said work by Nikhil Rao (2001). Based on the experiment that was conducted the Haar and Daubechies wavelets were utilized in the speech coding and entailment the functions that were used that are a function of the MATLAB suite are as follows dwt, wavedec, waverec, and idwt, they were used in computation the wavelet transforms Nikhil Rao (2001). The wavedec function performs the task of signal bunk reaction, and the waverec function reconstructs the signal from its coefficients. The idwt function functions in the capacity of the inver se transform on the signal of inte abide and all these functions can be found in the MATLAB software. The speech accommodate that was analyzed was divided up up into frames of 20 ms, which is 160 samples per frame and then each frame was decomposed and compressed, the buck format utilized was .OD institutionalizes, because of the length of the files there were able to be decomposed without being divided up into frames. The global and by-level thresholding was used in the experiment, the main aim of the global thresholding is the maintenance of the coefficients that are the king-sizest, this not being dependent on the surface of the hogwash tree for the wavelet transform. Using the level thresholding the approximate coefficients are kept at the annihilation level, during the process two bytes are used to encode the zero value. The function of the very first byte is the specification of the get-go points of zeros and the other byte tracks successive zeros.The work done by Qi ang Fu and Eric A. Wan (2003) was also reviewed there work was the enhancement of speech based on wavelet de-nosing framework. In their approach to their objective, the noisy speech signal was first touch on using a ghostly deductive reasoning method the aim of this involves the removal of resound from the signal of study sooner the application of the wavelet transform. The traditional approach was then done where the wavelet transforms are utilized in the decomposition of the speech into different levels, thresholding estimation is then on the different levels , however in this regorge a modified version on the Ephraim/Malah suppression rule was utilized for the thresholdign estimates. To finally enhance the speech signal the inverse wavelet transform was utilized. It was shown the pre processing of the speech signal removed small levels of affray but at the same time the spin of the original speech signal was minimized, a generalized ghostly subtraction algorithm was used to accomplish the task above this algorithm was proposed by Bai and Wan.The wavelets transform for this approach utilized using wavelet packet decomposition, for this process a six stage tree structure decomposition approach was taken this was done using a 16-tap FIR filter, this is derived from the Daubechies wavelet, for a speech signal of 8khz the decomposition that was achieved resulted in 18 levels. The estimation method that was used to target the threshold levels were of a pertly type, the experiments took into account the preventive disagreement for the different levels, and each different time frame . An altered version of the Ephraim/Malah rule for suppression was used to achieve soft thresholdeing. The re-synthesis of the signal was done using the inverse perceptual wavelet transform and this is the very cultivation stage.Work done by S.Manikandan, entitled (2006) focused on the diminution of ruffle that is present in a wireless signal that is acquire using speci al adaptive techniques. The signal of interest in the study was devalued by white disagreement. The time frequency dependent threshold approach was taken to estimate the threshold level, in this project both the hard and soft thresholding techniques were utilized in the de-noising process. As with the hard thresholding coefficient below a certain values are scaled, in the project a universal threshold was used for the Gaussian noise that was added the error touchstone that was used was under 3 mean squared, based on the experiments that were done it was found out that this approximation is not very efficient when it comes to speech, this is in the main because of poor relations amongst the quality and the existence to the correlated noise. A new thresholding technique was implemented in this technique the standard deviation of the noise was first estimated of the different levels and time frames. For a signal the threshold is work out and is also reckon for the different sub-b and and their related time frame. The soft thresholding was also implemented, with a modified Ephraim/Malah suppression rule, as seen before in the other works that were done in this are. Based on their results obtained, there was an paranormal vocalise pattern and to overcome this, a new technique based on modification from Ephraim and Mala is implemented.ProcedureThe procedure that undertaken involved doing several voice written text and reading the file using the wavread function because the file was done in a .wav formatThe length to be analyzed was decided, for the my project the entire length of the signal was analyzedThe un pervert signal forcefulness and signal to noise ratio (SNR) was calculated using different MATLAB functions running(a) White Gausian Noise (AWGN) was then added to the original recorded, making the un demoralize signal now corruptedThe average violence of the signal corrupted by noise and also the signal to noise ratio (SNR) was then calculatedSigna l analysis then followed, the procedure involved in the signal analysis includedThe wavedec function in MATLAB was used in the decomposition of the signal.The detail coefficients and approximated coefficients were then extracted and speckles made to show the different levels of decompositionThe different levels of coefficient were then analyzed and compared, making detailed analysis that the decomposition resulted inAfter decomposition of the different levels de-nosing took place this was done with the ddencmp function in MATLAB,The actual de-nosing process was then undertaken using wdencmp function in MATLAB, plot comparison was made to compare the noise corrupted signal and the de-noised signalThe average antecedent and SNR of the de-noised signal was done and comparison made between it and the original and the de-noised signal.Implementation/DiscussionThe first part of the project consisted of doing a enter in MATLAB, a recording was done of my own voice and the default sample rate was used were Fs = 11025, codes were used to do recordings in MATLAB and different variables were altered and specified based on the codes used, the m file that is submitted with this project gives all the codes that were utilized for the project, the recordings were done for 9 seconds the wavplay function was then used to replay the recording that was done until a desired recording was obtained after the recording was done a wavwrite function was then used to store the data that was previously recorded into a wav file. The data that was create verbally into a wav file was originally stored in variable y and then given the name recording1. A plot was then made to show the wave format of the speech file recorded.Fig 1Fig1 while above cover original recording without any noise putrefactionAccording to fig1 the maximum amplitude of the signal is +0.5 and the minimum amplitude being -0.3 from observation with the naked eye it can be seen that most of the information in the spe ech signal is confined between the amplitude +0.15 -0.15.The power of the speech signal was then calculated in MATLAB using a periodogram spectrum this produces an estimate of the spectral density of the signal and is computed from the finite length digital sequence using the Fast Fourier Transform (The MathWorks 1984-2010) the window parameter that was used was the Hamming window, the window function is some function that is zero outdoors some chosen interval. The hamming window is a typical window function and is applied typically by a point by point multiplication to the excitant of the fast fourier transform, this controls the adjacent levels of spectral artifacts which would progress in the magnitude of the fast fourier transform results, for a case where the input frequencies do not correspond with the bin center. Convolution that occurs within the frequency domain can be considered as windowing this is basically the same as performing multiplication within the time domain , the result of this multiplication is that any samples outside a frequency will affect the overall amplitude of that frequency.Fig2Fig2 plot showing periodogram spectral analysis of original recordingFrom the spectral analysis it was calculated that the power of the signal is 0.0011 wattAfter the signal was analyzed noise was added to the signal, the noise that was added was one-dimensional gaussian white noise (AWGN), and this is a random signal that contains a flat power spectral density (Wikipedia, 2010). At a given center frequency extra white noise will contain equal power at a fixed bandwidth the term white is used to mean that the frequency spectrum is continuous and is also uniform for the entire frequency band. In the project additive is used to simply mean that this impairment to the original signal is corrupting the speech The MATLAB code that was used to add the noise to the recording can be seen in the m file.For the very first recording the power in the signal was s et to 1 watt and the SNR set to 80, the applied code was set to signal z, which is a copy of the original recording y, below is the plot showing the analysis of the noise corrupted recording.Fig3Fig3 plot showing the original recording corrupted by noiseBased on observation of the plot above it can be estimated that information in the original recording is masked by the additive white noise to the signal, this would have a negative effect as the clean information would be masked out by the noise, a process known as aliasing. Because the amplitude of the additive noise is great than the amplitude of the recording it causes distortion observation of the graph shows the amplitude of the corrupted signal is greater than the original recording. The noise power of the corrupted signal was calculated buy the division of the signal power and the signal to noise ratio, the noise power calculated from the first recording is 1.37e-005. The noise power of the corrupted signal is 1.37e-005 the spectrum peridodogram was then used to calculate the average power of the corrupted signal , based on the MATLAB calculations the power was calculated to be 0.0033 wattFig4Fig4 plot showing periodogram spectral analysis of corrupted signalFrom analysis of the plot above it can be seen that the frequency of the corrupted signal spans a wider band, the original recording spectral frequency analysis showed a value of -20Hz as compared to the corrupted signal showed a value of 30Hz this increase in the corrupted signal is attributed to the noise added and this masked out the original recording again as before the process of aliasing.It was seen that the average power of the corrupted was greater than the original signal, the increase in power can be attributed to the additive noise added to the signal this caused the increase in power of the signal.The signal to noise ratio (SNR) of the corrupted signal was calculate from the formula corrupted power/noise power , and the corrupted SNR w as found to be 240 as compared to 472.72 of the de-noised, the decrease in signal to noise ratio can be attributed to the additive noise this resulted in the level of noise to the level of clean recording to be greater this is the basis for the fall SNR in the corrupted signal, the increase in the SNR in the clean signal will be discussed further in the discussion.The reason there was a reduce in the SNR in the corrupted signal is because the level of noise to clean signal is greater and this is basis of signal to noise comparison, it is used to measure how much a signal is corrupted by noise and the lower this ratio is, the more corrupted a signal will be. The calculation method that was used to calculate this ratio isWhere the different signal and noise power were calculated from MATLAB as seen aboveThe analysis of the signal then commenced a .wav file was then created for the corrupted signal using the MATLAB command wavwrite, with Fs being the sample frequency, N being the corr upted file and the name being noise recording, a file x1 that was going to be analysed was created using the MATLAB command wavread.Wavelet multilevel decomposition was then performed on the signal x1 using the MATLAB command wavedec, this function performs the wavelet decomposition of the signal, the decomposition is a multilevel one dimensional decomposition, and discrete wavelet transform (DWT) is using pyramid algorithms, during the decomposition the signal is passed through a high pass and a low pass filter. The output of the low pass is further passed through a high pass and a low pass filter and this process continues (The MathWorks 1994-2010) based on the specification of the programmer, a linear time invariant filter, this being a filter that passes high frequencies and attenuates frequency that are below a threshold called the cut off frequency, the rate of attenuation is specified by the designer. While on the other hand the opposite to the high pass filter, is the low pa ss filter this filter will just now pass low frequency signals but attenuates signal that contain a higher frequency than the cut off. Based on the decomposition procedure above the process was done 8 times, and at each level of decomposition the actual signal is vanquish sampled by a factor of 2. The high pass output at each stage represents the actual wavelet transformed data these are called the detailed coefficients (The MathWorks 1994-2010).Fig 5Fig 5 above levels decomposition (The MathWorks 1994-2010)Block C above contains the decomposition vectors and Block L contains the bookkeeping vector, based on the theatrical performance above a signal X of a specific length is decomposed into coefficients, the first part of the decomposition produces 2 sets of coefficients the approximate coefficient cA1 and the detailed coefficient cD1, to get the approximate coefficient the signal x is convolved with low pass filter and to get the detailed coefficient signal x is convolved with a high pass filer. The second stage is similar only this time the signal that will be sampled is cA1 as compared to x before with the signal further being sampled through high and low pass filter again to produce approximate and detailed coefficients respectively hence the signal is down sampled and the factor of down ingest is twoThe algorithm above (The MathWorks 1994-2010) represents the first level decomposition that was done in MATLAB, the original signal x(t) is decomposed into approximate and detailed coefficient, the algorithm above represents the signal being passed through a low pass filter where the detail coefficients are extracted to give D2(t)+D1(t) this analysis is passed through a single stage filter swear further analysis through the filter bank will produce greater stages of detailed coefficients as can be seen with the algorithm below (The MathWorks 1994-2010).The coefficients,cAm(k)andcDm(k)formm = 1,2,3can be calculated by iterating or cascading the single stag e filter bank to obtain a manifold stage filter bank(The MathWorks 1994-2010).Fig6Fig6 showing graphical representation of multilevel decomposition (The MathWorks 1994-2010)At each level it is observed the signal is down sampled and the sampling factor is 2. At d8 obeservation shows that the signal is down sampled by 28 i.e. 60,000/28. All this is done for better frequency resolution. Lower frequencies arepresentat all time I am generally concerned with higher frequencies which contains the actual data.I have used daubechies wavelet type 4 (db4), the daubechies wavelet are defined by computing the running averages and differences via scalar products with scaling signals and wavelets(M.I. Mahmoud, M. I. M. Dessouky, S. Deyab, and F. H. Elfouly, 2007) For this type of wavelet there exist a balance frequency retort but the phase response is non linear. The Daubechies wavelet types uses windows that overlap in order to ensure that the coefficients of higher frequencies will show any changes in their high frequency, based on these properties the Daubechies wavelet types proves to be an efficient tool in the de-nosing and compression of audio signals.For the Daubechies D4 transform, this transform has 4 wavelet types and scaling coefficient functions, these coefficient functions are shown belowThe different steps that are involved in the wavelet transforms, will utilize different scaling functions, to the signal of interest if the data being analyzed contains a value of N, the scaling function that will be applied will be applied to calculate N/2 smoothed values. The smoothed values are stored in the lower half of the N element input vector for the ordered wavelet transform. The wavelet function coefficient values are g0= h3 g1= -h2 g2= h1 g3= -h0The different scaling function and wavelet function are calculated using the inner product of the coefficients and the four different data values. The equations are shown below (Ian Kaplan, July 2001)The repetition of t he of the steps of the wavelet transforms was then used in the calculation of the function value of the wavelet and the scaling function value, for each repetition there is an increase by two in the index and when this occurs a different wavelet and scaling function is produced.Fig 7Diagram above showing the steps involved in foregoing transform(The MathWorks 1994-2010)The diagram above illustrates steps in the forward transform, based on observation of the diagram it can be seen that the data is divided up into different elements, these separate elements are even and the first elements are stored to the even array and the second half of the elements are stored in the odd array. In reality this is folded into a single function even though the diagram above goes against this, the diagrams shows two normalized steps.The input signal in the algorithm above (Ian Kaplan, July 2001) is then broken down into what are called wavelets. One of the most significant benefits of use of wavelet transforms is the fact that it contains a window that varies, to identify signal not continuous having base functions that are short is most desirable. But in order to obtain detailed frequency analysis it is better to have long basis function. A good way to achieve this compromise is having a short high frequency functions and also long low frequency ones(Swathi Nibhanupudi, 2003)Wavelet analysis contains an immeasurable basis functions, this allows wavelet transforms and analyisis with the ability realize cases that can not be easily realized by other time frequency methods, namely Fourier transforms.MATLAB codes are then used to extract the detailed coefficients, the m file shows these codes, the detailed coefficients that are Daubechies orthogonal type wavelets D2-D20are often used. The numbers of coefficients are represented by the index number, for the different wavelets they contain vanishing moments that are identical to the halve of the coefficients. This can be seen using the orthogonal types where D2 contain only one moment and D4 two moments and so on, the vanishing moment of the wavelets refers to its ability to represent the information in a signal or the polynomial behavior. The D2 type that contains only one moment will encode polynomial of one coefficient easily that are of constant signal component. The D4 type will encode polynomial of two coefficients, the D6 will encode coefficient of three polynomial and so on.The scaling and wavelet function have to be normalized and this normalization factor is a factor. The coefficients for the wavelet are derived by the reverse of the order of the scaling function coefficients and then by reversing the sign of the second one (D4 wavelet = -0.1830125, -0.3169874, 1.1830128, -0.6830128) mathematically, this looks likewherekis the coefficient index,bis a wavelet coefficient andca scaling function coefficient.Nis the wavelet index, ie 4 for D4 (M. Bahoura, J. Bouat. 2009)Fig 7Plot of fig 7 showing approx imated coefficient of the level 8 decompositionFig 8Plot of fig 8 showing detailed coefficient of the level 1 decompositionFig 9Plot of fig 9 showing approximated coefficient of the level 3 decompositionFig 10Plot of fig 10 showing approximated coefficient of the level 5 decompositionFig 11Plot of fig 11, showing comparison of the different levels of decompositionFig12Plot fig12 showing the details of all the levels of the coefficientsThe next step in the de-nosing process is the actual removal of the noise after the coefficients have been realized and calculated the MATLAB functions that are used in the de-noising functions are the ddencmp and the wdencmp functionThis process actually removes noise by a process called thresholding, De-noising, the task of removing or suppressing un edifying noise from signals is an important part of many signal or image processing applications. Wavelets are car park tools in the field of signal processing. The popularity of wavelets in de-nosingis largely due to the computationally efficient algorithms as well as to the sparsityof the wavelet representation of data. By sparsity I mean that majority of the wavelet coefficients have very small magnitudes whereas only a small subset of coefficients have large magnitudes. I may informally state that this small subset contains the interesting informative part of the signal, whereas the rest of the coefficients describe noise and can be toss to give a noise-free reconstruction.The best known wavelet de-noising methods are thresholding approaches, see e.g. In hard thresholding all the coefficients with greater magnitudes as compared to the threshold are retained unmodified this is because they comprise the informative part of data, while the rest of the coefficients are considered to represent noise and set to zero. However, it is reasonable to assume that coefficients are not purely either noise or informative but mixtures of those. To cope with this soft thresholding approaches have been proposed, in the process of soft thresholding coefficients that are smaller than the threshold are made zero, however the coefficients that are kept are made smaller towards zero by an amount of the threshold value in order to decrease the effect of noise anticipate to corrupt all the wavelet coefficients. In my project I have chosen to do a eight level decomposition before applying the de-nosing algorithm, the decomposition levels of the different eight levels are obtained, because the signal of in