NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Natasha Vernooij – ProQuest LLC, 2024
This dissertation investigates how bilinguals use their two grammars to comprehend written intra-sentential codeswitches. I focus on adjective/noun constructions in Spanish and English where I manipulate the congruence of grammatical word order in the two languages across the codeswitch boundary. This allows me to test three codeswitching…
Descriptors: Spanish, English (Second Language), Second Language Learning, Native Language
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dodds, Colin B.; Whelan, Alison; Kharrufa, Ahmed; Satar, Müge – Research-publishing.net, 2021
This chapter is based on a workshop at IVEC 2020 which presented a model of Virtual Exchange (VE) facilitated by interactive, digital, and cultural artefacts created using a progressive web app developed by the EU-funded ENACT project team. The model offers an innovative approach to online intercultural exchange through the opportunity to create,…
Descriptors: Computer Software, Second Language Learning, Second Language Instruction, Open Educational Resources
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kartal, Erdogan – Educational Sciences: Theory and Practice, 2019
This study is about artificial neural network modeling of the linguistic challenges encountered by students learning Turkish as a foreign language in universities in France. The study was conducted in four universities where Turkish is taught as an optional foreign language. Sixty-six students whose mother tongues were either Arabic or French…
Descriptors: Turkish, French, Second Language Learning, Second Language Instruction
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks