يعد علم اللغة النفسي من العلوم المهمة المتصلة باللسانيات التطبيقية؛ حيث أشار كثير من علماء الغرب إلى أن علم اللغة النفسي جزء من اللسانيات التطبيقة الذي يحتاج فيه المتخصصون في فروع المعرفة الت
للعولمة اللغوية أثر فعال في ثقافة المجتمع اللغوية، من حيث إن هذه العولمة تعني هيمنة اللغة الإنجليزية بمقوماتها الثقافية على غيرها من لغات العالم، وأصبح تأثيرها يمتد إلى مدىً لم يعد الانتماء ا
يتناول الكتاب المسكلات العويصة في الدراسات اللغوية المعاصرة والتراثية، سيما أن معطيات الدراسات المعاصرة في اللسانيات قد استفادت كثيرا من الدراسات اللغوية القديمة بشكل مباشر أو غير مباشر، وس
In the last two decades, investigating the sources of foreign language anxiety in general has increasingly attracted the attention of many researchers in the field of foreign language teaching. However, the sources of anxiety that influence the acquisition of certain specific language skills such as reading in particular have rarely been investigat
In the last two decades, investigating the sources of foreign language anxiety in general has increasingly attracted the attention of many researchers in the field of foreign language teaching. However, the sources of anxiety that influence the acquisition of certain specific language skills such as reading in particular have rarely been investigat
This systematic review of literature on foreign language anxiety and its relationship with achievement is additional clarification to the earlier works and reviews concerned with this issue. Firstly, it defines the foreign language anxiety concept where eventually foreign language anxiety is differentiated from other related concepts. Secondly, it
Ecological status of Malaysia is not as bad as many other developing nations in the world. However, despite the enforcement of the Environmental Quality Act (EQA) in 1974, the water quality of Malaysian inland water (especially rivers) is following deteriorating trend. The rivers are mainly polluted due to the point and nonpoint pollution sources.
Cryptographic hash function is a function that takes an arbitrary length as an input and produces a fixed size of an output. The viability of using cryptographic hash function is to verify data integrity and sender identity or source of information. This paper provides a detailed overview of cryptographic hash functions. It includes the properties,
Interactive Multimedia (IMM) applications have observed quick growth in the world of computer and communication technologies. Voice, video conferencing, graphics services are considered as IMM applications, at low cost with more flexibility in a high speed Wireless Local Area Network (WLAN) that can be defined as a high speed Wireless Campus Networ