Version-7 (July-August 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The arrival of cloud computing has been so extensive that it has become the most sought-after idea for data owners to outsource their data to the cloud thereby allowing users to retrieve it. Although traditional methods are proof enough that the models created based on symmetric key encryption perform well, a significant drawback is vulnerability of the security of the key which when once leaked, discloses confidential data of the data owner. Another drawback is the process of data user authentication, which is very tedious where a long conversation is carried out between the administration server and the user to verify the identity of the user. In this paper, we initiate schemes that deal with improvising the traditional methods as well as improvising the process of data user authentication.............
Keywords: Symmetric Encryption, Asymmetric Encryption, Hybrid Encryption, Cloud Computing, One Time Password, Security..
[1] R. Curtmola, J.A. Garay, S. Kamara, and R. Ostrovsky, "Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions," Proc. ACM Conf. Computer and Comm. Security (CCS'06), 2006.
[2] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou "Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data", IEEE Transactions on Parallel and Distributed Systems, vol.23, No.8, Aug.2012.
[3] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, "Secure ranked keyword search over encrypted cloud data," in Proc. IEEE Distrib.Comput.Syst., Genoa, Italy, Jun. 2010 elevated channel lowtemperature poly-Si TFT," IEEE Electron Device Lett., vol. 20, pp.569–571, Nov. 1999.
[4] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy- preserving multi-keyword ranked search over encrypted cloud data," in Proc.IEEE INFOCOM, Shanghai, China, Apr.2011.
[5] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, "Privacy- preserving multi-keyword ranked search over encrypted cloud data," IEEE Trans. Parallel Distrib. Syst., vol. 25.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Most scientific data consists of analysing huge amount of data collected from different resources. Hence, parallel algorithms and frameworks are the important which can process huge volumes of data and meeting the requirements of performance and scalability entailed in such scientific data analyses. In this paper, we proposed a concurrent VM reconfiguration mechanism for big data tool which is mapreduce on virtualized cloud environments. Our reconfiguration enhances the input data locality of a virtual MapReduce cluster. It adds cores to VMs to run local tasks temporarily..............
Keywords: Cloud Computing, Big Data, Map Reduce, Virtualization.[1] I. Raicu, I. Foster, Y. Zhao. "Many-Task Computing for Grids and Supercomputers", Invited Paper, IEEE MTAGS 2008.
[2] R.Udendhran, "New Framework to Detect and Prevent Denial of Service Attack in Cloud Computing Environment" Asian Journal of Computer Science And Information Technology 4 : 12 (2014) 87 - 91 ISSN 2249-5126.
[3] J. Dean and S. Ghemawat. MapReduce: simplified data processing on large clusters. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 137–150, 2004.
[4] M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly. Dryad: distributed data-parallel programs fromsequential building blocks. In Proceedings of the 2ndEuropean Conference on Coputer Systems (EuroSys), 2007.
[5] Apache Hadoop. http://hadoop.apache.org.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Hotel Recommendation System Based on Data Mining Techniques |
Country | : | India |
Authors | : | Ravindra Ramawat || Mr.B.L.Pal |
: | 10.9790/0661-1904071219 |
Abstract: The recommendation system is a software tool to recommend user about the quality of items or services to be use by the user.Due to increase of tourism industry as well as growth IT industry tourist or employee visiting from one place to another place frequently and staying in hotel for short period. So, numbers of researchers have design and developed hotel recommendation system for these types of visitors using different – different type of algorithms like memory based algorithm, model based algorithm and Association rule. Each and every algorithm has their own prose and cons. That is why we have design and developed a new recommendation system for the hotel booking using K-Means algorithm, Apriori algorithm and association rule.
Keywords: K-means Clustering, Apriori Algorithm, hotel, Association rule, visitors etc
[1] Meenal Moghe, Abhishek Raghuvanshi, 2015 has proposed,"A Novel Collaborative Filtering Recommendation System Algorithm"– (IJETR)-October 2015
[2] Ahmed Mohammed K. Alsalama – "A Hybrid Recommendation System Based On Association Rules" –ISSR-2015
[3] Qi Wang, Wei Cao and Yun Liu– "A Novel Clustering Based Collaborative Filtering Recommendation System Algorithm " –Springer 2014
[4] Mohammad Hamidi Esfahani, Farid Khosh Alhan - "New Hybrid Recommendation System Based On C-Means Clustering Method " -IEEE-2013 5th conference of information Knowledge
[5] Hazem Hajj, Wassim El-Hajj, Lama Nachman – "A Hybrid Approach with Collaborative Filtering for Recommender Systems" –IEEE 2013.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computational Framework for Web Metrics towards Automated Web Design |
Country | : | India |
Authors | : | Meenakshi Sridhar || Nasib Singh Gill |
: | 10.9790/0661-1904072029 |
Abstract: The discipline of engineering of software has evolved from software engineering to web engineering, and now to cloud engineering, the last of which develops required resources & environment for cloud computing. Apart from the technical characteristics of each, software engineering has been first product-oriented and then also process-oriented; web engineering has client-orientation and now cloud engineering is oriented toward open-endedness. Because of changes in the orientations and other concerns during the evolution, from time to time, the sets of web metrics required..............
Keywords: web design automation, web metrics flexible knowledge-base, web facets: science, social science, engineering etc.
1] Sridhar M. & Gill N.S. (2017), An Approach for Automating Design of Web, its Metrics & Knowledge-base, communicated
[2] Proceedings of the First International Workshop on Web Engineering, WWW7 Conference, Brisbane (1998).
http://fistsev.macarthur.uws.edu.au/san/WebE98
[3] Communications of the ACM, Special Section on Web-based Information Systems (1998), pp 78-97.
[4] San Murugesan and Yogesh Deshpande (1999) Proceedings of the First ICSE Workshop on Web Engineering, International Conference on Software Engineering, Los Angeles, May 1999. http://fistserv.macarthur.uws.edu.au/san/icse99-webe/
[5] San Murugesan Yogesh Deshpande (Eds.) (2001)Web Engineering: Managing Diversity and ComplexityOf Web Application Development, pp 3-32 & 245-322, Lecture Notes in Computer Science 2016 Springer
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Big data analytics brings in considerable value to decision making and provide more accurate and actionable insights into customer churn in telecom industry. As general meta-heuristics such as Particle Swarm Optimization (PSO) and Firefly Algorithm (FFA) are incapable of handling huge dataeffectively, Spark 2.0 on Hadoop architecture is employed. The parallelized nature of Spark &Hadoop will provide accurate and faster results. FFA and PSO were individually used to predict customer's behavior efficiently but it has issues with highly sparse dataalong with computational complexity and inaccuracy prediction results for the churn dataset. To overcome the above mentioned issues, in the proposed..............
Keywords: Churn prediction, Telecom, Meta-heuristics, Spark, Hadoop, PSO, FFA, HFFPSO
[1]. Y. Huang, B. Huang, and M. T. Kechadi, "A rule-based method for customer churn prediction in telecommunication services," in Advances in Knowledge Discovery and Data Mining, Springer, 2011, pp. 411–422.
[2]. Idris and A. Khan, "Customer churn prediction for telecommunication: Employing various various features selection techniques and tree based ensemble classifiers," in Multitopic Conference (INMIC), 2012 15th International, 2012, pp. 23–27.
[3]. M. Kaur, K. Singh, and N. Sharma, "Data Mining as a tool to Predict the Churn Behaviour among Indian bank customers," Int. J. Recent Innov. Trends Comput. Commun. vol. 1, no. 9, pp. 720–725, 2013.
[4]. V. L. Miguéis, D. Van den Poel, a. S.Camanho, and J. Falcão e Cunha, "Modeling partial customer churn: On the value of first product-category purchase sequences," Expert Syst. Appl., vol. 39, no. 12, pp. 11250–11256, Sep. 2012.
[5]. Coussement K. and D. V. Poel, "Churn prediction in subscription services: An application of support vector machines while comparing two parameter-selection techniques," Expert Syst. Appl., vol. 34, no. 1, pp .313–327, 2008
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Framework for Machine Learning based Multi Agent System |
Country | : | India |
Authors | : | Archana Mangal || Iti Mathur |
: | 10.9790/0661-1904074045 |
Abstract: Applications which can facilitate decision making are gaining importance. They can be found in domains like process control, air traffic control, inventory management, airline reservation etc. Developing applications for these domains have several flaws. First, they do not achieve the desired goal. Second, even if they do, their implementation and maintenance is very costly. Agent oriented system offers a qualitative change in this position. An agent learns from its environment, manipulates itself and coordinates with other agents in the system. Researchers have designed many agents but they were unable to solve complex dynamic applications of this kind...............
Keywords: Multi agent System, Machine learning, Decision tree, Support vector machine, Multi layer perceptron, Radial basis function.
[1]. Ketel, Mohammed. "A mobile agent based framework for web services." Proceedings of the 47th Annual Southeast Regional Conference. ACM, 2009.
[2]. Panait, Liviu, and Sean Luke. "Cooperative multi-agent learning: The state of the art." Autonomous agents and multi-agent systems 11.3 (2005): 387-434.
[3]. Claus, Caroline, and Craig Boutilier. "The dynamics of reinforcement learning in cooperative multiagent systems." AAAI/IAAI 1998 (1998): 746-752.
[4]. Sebastia, Laura, Adriana Giret, and Inma Garcia. "A multi agent architecture for tourism recommendation." Trends in Practical Applications of Agents and Multiagent Systems. Springer Berlin Heidelberg, 2010. 547-554.
[5]. Lenz, Mario. "IMTAS: Intelligent multimedia travel agent system." Information and Communication Technologies in Tourism. Springer Vienna, 1996. 11-17.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the transmitted information. Steganography is the process of hiding data bits on cover or carrier file. In this paper, instead of embedding the data bits directly on carrier color image, original data bits will be mapped on the carrier file with key vectors. If the size of the source image and cover image is equal (x1 = x2 and y1 = y2) then the corresponding bits are compared in preparing mapping vectors. If the source image (with..............
Keywords: Cryptography, Steganography, Color Image steganography, LSB, mapping vectors, carrier file, different size images, Steganalysis
[1]. Niels Provos and Peter Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security & Privacy, 2003.
[2]. Niel F Johnson, Sushil Jajodia, Exploring Steganography: Seeing The Unseen, IEEE, 1998.
[3]. Tahir Ali, Amt Doegar, "A Novel Approach of LSB Based Steganography Using Parity Checker", IJARCSSE, Vol.5, Issue 1, January 2015, pp. 314-321.
[4]. Niel F Johnson, Sushil Jajodia, Exploring Steganography: Seeing The Unseen, IEEE, 1998
[5]. Wien Hong And Tung-Shou Chen, A Novel Data Embedding Method Using Adaptive Pixel Pair Matching, IEEE Transactions On Information Forensics And Security, Volume 7, No. 1, February 2012
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The popular uprising in Syria: Complexity of the problems |
Country | : | India |
Authors | : | Dr. Th. Siamkhum |
: | 10.9790/0661-1904075255 |
Abstract: From the early 2010s, countries of Middle-East; Egypt, Libya and Syria witnessed popular uprising against the ruling dictatorial regime of their respective country. While in Egypt and Libya, the uprising eventually, dislodged the ruling dictatorial regime in their respective country, in Syria, however, the popular uprising has been dragging on for more than 6 years, and there is no end in sight as of now. Initially, in Syria, the popular protest movement was launched to demand democratic reforms, released of political prisoners, abolition of emergency laws and an end to rampant corruption in the country. Therefore, the protest movement, initially was not directed towards regime change. However, as................
[1] Syrian uprising: A year in turmoil at The Washington Post.
[2] "Syria collected news and commentary". The Guardian.
[3] Syria collected coverage at Al Jazeera English
[4] "Iraq conducts first airstrikes against ISIS in Syria". CNN. February 24, 2017. "Syria Army Advancing on Key Rebel Town, Supply Route". Theepochtimes.com. 4 March 2014. Archived from the original on 26 June 2015. Retrieved 20 March2014.
[5] "The Nusra Front's Game-Changing Rise in Syria". Carnegie Middle East Center. Retrieved 21 September2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Computer Forensics for Private Web Browsing of UC Browser |
Country | : | India |
Authors | : | Rahul Neware |
: | 10.9790/0661-1904075660 |
Abstract: Private Browsing modes provides the privacy where the surfing activity traces are not present but this Private Browsing is a great task for the Computer Forensics who want to recover the Browser history in the case of any misuse of the web browser. To recover that history the use of volatile memory forensics methodologies and the tools can be used to obtain the traces in main memory after PB(Private Browsing) session. To gain this artifacts left in the foremost reminiscence the proper memory framework will be beneficial for the investigators to successfully retrieve the reminiscence related with the past PB session History. The framework shown in flowchart below is used to overall procedure to collect and analyse the data related to personal browsing using UC Browser.
Keywords: Private Web Browsing, Web Browsers, Computer Forensics, Web Browser Artifacts, UC Browser
[1]. Aggarwal, G., Bursztein, E., Jackson, C., & Boneh, D. (2010). "Analysis of Private Browsing Modes in Modern Browsers". USENIX Security Symposium (pp. 79-94).
[2]. Al Barghouthy, N., Marrington, A., & Baggili, I. (2013). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.
[3]. Lerner, B. S., Elberty, L., Poole, N., & Krishnamurthi, S. (2013). Verifying web browser extensions' compliance with private-browsing mode. In Computer Security–ESORICS 2013 (pp. 57-74). Springer Berlin Heidelberg.
[4]. Marrington, A., Baggili, I., Al Ismail, T., & Al Kaf, A. (2012). Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers. In Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on (pp. 1-6). IEEE.
[5]. W3schools, (2016). Browser Statistics. [online] Available at: http://www.w3schools.com /browsers/browsers_stats.asp [Accessed 16 Jan. 2015].
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimizing the Performance of Wireless Rechargeable Sensor Networks |
Country | : | India |
Authors | : | A.H. Mohamed |
: | 10.9790/0661-1904076169 |
Abstract: Nowadays, the Wireless Rechargeable Sensor Networks (WRSNs) have been concerned as a new trend to solve the energy problems and extendin the lifetime of wireless sensor networks. This technology is promising to replace the present methods. It enables multiple nodes to be charged simultaneously by wireless charging vehicle. This can improve the network lifetime. In this work, the proposed WRSN system introduces the uses of cluster-heads method to improve the power consumption and the lifetime of WSNs. Besides, it uses the genetic algorithm methodology to optimize the cluster-heads needed to be recharged and the routing (travel) path of the wireless mobile charger...........
Keywords: Wireless energy transfer, Wireless Re-chargeable Sensor networks, Genetic Algorithm (GA), Mobile Charger (MC), and Travel Path.
[1]. Z. Ren, P. Cheng, J. Chen, D. K. Y. Yau, and Y. Sun. Dynamic Activation Policies for Event Capture in Rechargeable Sensor Network. IEEE Transactions on Parallel and Distributed Systems, 25(12):3124 – 3134, Dec 2014.
[2]. A.Kurs, A.Karalis, M.Robert, J.D.Joannopoulos, P.Fisher, and M.Soljacic, "Wireless power transfer via strongly coupled magnetic resonances ", Science, vol.317, pp.83-86, 2007.
[3]. H. Dai, Y. Liu, G. Chen, X. Wu, and T. He, "Safe charging for wireless power transfer," in Proc. IEEE INFOCOM, 2014.
[4]. C. Wang, J. Li, F. Ye, and Y. Yang, "Improve charging capability for wireless rechargeable sensor networks using resonant repeaters," in Proc. IEEE ICDCS, 2015.
[5]. B. Tong, Z. Li, G. Wang, and W. Zhang, "How wireless power charging technology affects sensor network deployment and routing," in Proc. 30th International Conference on Distributed Computing Systems, 2016, pp. 438-447.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Civil War in Syria: Who fight who, for whom and for what |
Country | : | India |
Authors | : | Dr Th.Siamkhum Th Siamkhum |
: | 10.9790/0661-1904077075 |
Abstract: Civil war in Syria, as is popularly called, has now been dragging on for more than 6 years with no end in-sight. Initially, it was a popular movement having certain limited aims more democratic reforms, releases of political prisoners and an end to rampart corruption in the country; and that regime change was not included in the agenda. The popular uprising was launched by the combined opposition groups, and was initially unarmed popular movement for restoration of democracy in Syria. However, the government, with the aim to crush the uprising, adopted repressive measures with iron hand, which instead
[1] Human Rights Watch World Report 2005 Events of 2004, Human Rights Watch 2005. ISBN 1-56432-331-5.
[2] Deadly Reprisals: deliberate killings and other abuses by Syria's armed forces" (PDF). Amnesty International. June 2012. Archived from the original (PDF) on 16 June 2012. Retrieved 25 June 2012.
[3] Syria crisis 'worsening' amid humanitarian funding shortfall, warns top UN relief official". UN News Centre. 26 March 2015. Retrieved 28 July 2015.
[4] United Nations General Assembly Resolution 182 session 46 Strengthening of the coordination of humanitarian emergency assistance of the United Nations on 19 December 1991.
[5] United Nations, Syria Humanitarian Assistance Response Plan (SHARP). Retrieved 18 September 2013.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Human progress is going through the teamwork, especially in terms of implementation and business development. However, in order to provide the cooperation between members of the team, there must be a guarantee of the rights of everybody in the process of work. In a private case, it is important to show the monthly salary for each employee of a company. The goal of the research is the development of a system for salary calculation for state establishments in Republic of Iraq. Thus, the institutions and organizations have a composed structure. If they have branches in different cities far between each other, they will need methods of communication between those branches (departments)...............
[1]. Bell D. IBM developerWorks. [Electronic Resource] URL: http://www.ibm.com/developerworks/rational/library/769.html (the date of access: 05.02.2015).
[2]. Bjoremo M. Evaluation of web applications frameworks with regards to rapid development. – Sweden: Chalmers University of Technology, University of Gothenburg, 2010. – 41 p.
[3]. Blanco J.A., Upton D. CodeIgniter 1.7. – UK: Packt Publishing Ltd, 2009. – 300 p.
[4]. Delisle M. Creating your MySQL Database: Practical Design Tips and Techniques. – UK: Packt Publishing Ltd, 2006. – 105 p.
[5]. Gerrard P. A unified approach to system functional testing. // EuroSTAR, 25–28 October, 1993. – P. 36/1-36/9..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Credit Card Fraud Detection Using Weighted Support Vector Machine |
Country | : | India |
Authors | : | Prasant Kumar Acharya || Manoranjan Mishra |
: | 10.9790/0661-1904077989 |
Abstract: Credit card fraudulent data is highly imbalanced, and it has presented an overwhelmingly large
portion of nonfraudulent transactions and a small por-tion of fraudulent transactions. The measures used to
judge the veracity of the detection algorithms become critical to the deployment of a model that accu-rately
scores fraudulent transactions taking into account case imbalance, and the cost of identifying a case as genuine
when, in fact, the case is a fraudulent transaction. In this paper, a new criterion to judge classification
algorithms, which considers the cost of misclassification, is proposed, and several under-sampling techniques
are compared by this new criterion. At........
[1] Consumer Sentinel Network Data Book 2019 (2020). https:// www.ftc.gov/ system/files/
documents/reports/consumersentinelnetworkdatabook2019/consumer_sentinel_network_data_book_2019.pdf
[2] Ertekin, S., Huang, J., Bottou, L. and Giles, L. (2007) Learning on the Border: Active Learning in Imbalanced Data Classification.
Proceedings of the Sixteenth ACM Con-ference on Information and Knowledge Management, Lisbon, 6-10 November 2007, 127-
136. https://doi.org/10.1145/1321440.1321461
[3] Huang, Y.-M. and Du, S.-X. (2005) Weighted Support Vector Machine for Classifi-cation with Uneven Training Class Sizes. 2005
International Conference on Ma-chine Learning and Cybernetics, Guangzhou, Vol. 7, 4365-4369.
https://doi.org/10.1109/ICMLC.2005.1527706
[4] Bekkar, M., Djemaa, H.K. and Alitouche, T.A. (2009) Evaluation Measures for Models Assessment over Imbalanced Data Sets.
Journal of Information Engineering and Applications, 3, 27-38.
[5] Gu, Q., Zhu, L. and Cai, Z.H. (2009) Evaluation Measures of the Classification Per-formance of Imbalanced Data Sets. 2009
International Symposium on Intelligence Computation and Applications, Huangshi, 23-25 October 2009, 461-471.
https://doi.org/10.1007/978-3-642-04962-0_53
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Ground Water Assessment in Orissa Region of Angul-Talcher |
Country | : | India |
Authors | : | Sarala Prasanna Pattanaik || Manisha Devi |
: | 10.9790/0661-1904079094 |
Abstract: The examination was completed to survey the effects of industrial and mining activities on the ground
water quality in Angul-Talcher region of Orissa. The quality was evaluated in terms of physico-chemical
parameters. Ground water samples were collected from thirteen (13) open well at different areas in study region
during pre and post monsoon season. The physico-chemical parameters such as pH, Electrical conductivity,
TDS, Total hardness, Ca hardness, Mg hardness, Ca ion, Mg ion, Chloride, and COD were analyzed (APHA,
1998) to know the current status of the groundwater quality. Drinking water quality (IS: 10500) of pre-monsoon
season was better than post monsoon season. Few water samples were slightly alkaline along with high
dissolved solids......
Key Word: Water quality, Ground water, Drinking water standard, Physico-chemical parameters
[1]. Altman, S. J, Parizek, R. R. Dilution of nonpoint source nitrate in ground water. J. Environ. Quality1995: 24:707-717.
[2]. APHA, Standard Methods for the Examination of Water and Wastewater. APHA-AWWA-WPCF 1998. Washington D.C.
[3]. Adekunle, A. S. Effects of Industrial Effluent on Quality of Well Water Within Asa Dam Industrial Estate, Ilorin, Nigeria. Nature
and Science 2009:7(1).
[4]. Datta, P.S. Ground water ethics for its sustainability. Cerrent Science 2005: 89 (5). IS: 10500, Drinking Water Specification. 1992.
(Reaffirmed 1993)
[5]. Jinwal, A, Dixit, S. Pre and post monsoon variation in physio-chemical characteristic in groundwater quality in Bhopal, India. Asian
j. Exp. Sci. 2008: 22 (3)..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study on the Impact of Motivation on English Language Learning |
Country | : | India |
Authors | : | Manisha Panda || Minati Pradhan |
: | 10.9790/0661-1904079598 |
Abstract: This study overviews current research on the role of motivation in second or foreign language
learning. Motivation is an important factor for explaining the success or failure of any complex task. In this
paper, the researcher defines the term motivation, explains different types of motivation, reviews previous
studies about the role of motivation in language learning, mentions conditions of motivation, and finally states
key factors of motivation. The review of literature indicated that motivation has a very important role in
learning English as a foreign or second language successfully.
Keywords: motivation, types, role, conditions, factors
[1]. Al-Hazemi, H. (2000). Lexical Attrition of Some Arabic Speakers of English as a Foreign Language: a Study of Word
[2]. Loss. Internet TESL J [Serial online] Available from: http://iteslj.org/Articles/Al-Hazemi-Attrition/
[3]. Al-Otaibi, G. (2004). Language Learning Strategy Use among Saudi EFL Students and Its Relationship to LanguageProficiency
Lever, Gender, and Motivation [PhD Dissertation]. Indiana (PA): Indiana University ofPennsylvania.
[4]. Broussard, S. C., & Garrison, M. E. B. (2004). The Relationship between Classroom Motivation and Academic Achievement in
Elementary School-aged Children. Family and Consumer Sciences Research Journal, 33(2), 106–120.
[5]. Brown, H. D. (2000). Principles of Language Learning and Teaching. (4th ed.). New York: Addison Wesley Longman