120 research outputs found

    CREATIVE AND EFFECTIVE STRATEGIES TO ENCOURAGE LEARNERS SPEAKING SKILL IN LARGE CLASSROOMS

    Get PDF
    This paper purposes at improving of students’ speaking skill in the large classes. One of the biggest issues dealing with schools and teachers today is the management of large classes. It is said that frustrating, noisy and stressful classroom environment cannot easily be overcome. In order to create an effective teaching and learning environment, a class size should be small and a teacher wisely solves to crowded classrooms. Using appropriate and effective teaching methods, teachers not only persuade students’ motivation and interest but also know how to develop learners’ speaking skill. In accordance with the creative and effective ways and strategies discussed in this paper, students get many benefits in the development of speaking skills. This study reveals that creative strategies such as guessing topic, passing a parcel through students, sharing topics, expressing different view supported by a monolingual method in large classrooms, expressed in this paper are useful and effective ways for students to improve their speaking skill as well as for teachers these give benefits when managing large classroom. In brief, these strategies support teachers as effective ways to upgrade the level of students’ speaking skill and attract students to participate in speaking lessons in accordance with students’ response based on a questionnaire

    Angle-Aware Greedy Forwarding Algorithm for Vehicular Ad Hoc Networks

    Get PDF
    Greedy Perimeter Stateless Routing (GPSR) gives the good forwarding nodes for Mobile Ad Hoc Networks (MANET) but does not provide the right directional forwarding nodes in Vehicular Ad Hoc Network (VANET). This is the fact that MANET uses the nodes without limitations in moving but VANET uses fixed infrastructure in mobility such as roads with lanes. The key of original greedy forwarding is choosing the forwarding node with the shortest distance between the source and the destination. It does not consider the direction of the forwarding nodes, which possibly cause the selected forwarding node going opposite direction from the destination. This paper thus tries to improve the greedy forwarding method of Greedy Perimeter Stateless Routing (GPSR) by taking into considerations in both the distance and the direction. Moreover it shows the mystery of angle that gives the right direction. The optimized GPSR (OGPSR) using improved greedy forwarding provides the better throughput, average end-to-end delay and routing overheads than the original GPSR

    Security Enhancement System Based on the Integration of Cryptography and Steganography

    Get PDF
    Nowadays, due to the widespread use of data exchange in electronic way, the information security has become important in data storage and transmission. Lack of security makes many problems in security awareness applications. The two kinds of information that are widely used in daily communication are image and text. Steganography and cryptography are both ways to protect the data security against various attacks. Thus, this work focuses on the enhancement of not only image but also information security based on the combination of cryptography and steganography methods. From the cryptography point of view, image security is enhanced based on the combination of proposed block-based transformation and encryption technique. Firstly, the original image is transformed with proposed block-based transformation algorithm to obtain better robustness of image encryption. And then, the generated transformed image is encrypted by using Blowfish encryption algorithm. After getting the encrypted image, a steganography approach provides the data hiding system by using this encrypted image as a cover for information security. Moreover, to prove the advantages of using combination process (proposed transformation and Blowfish encryption) rather than single encryption, performance comparison is made by calculating the correlation and entropy of encrypted images generated by combination process and Blowfish encryption algorithm.

    Weight-based Word Sense Disambiguation Method for Myanmar-to-English Language Translation

    Get PDF
    In many natural language processing (NLP) techniques, machine translation is a popular and useful technique. Machine translation technique is a translation process from one to another language. This technique is thus very useful for people around the world. While translating the languages, ambiguity is a big challenge because many words have several meanings. Ambiguous words have damaging effects on the precision of machine translation. To solve this problem, word sense disambiguation (WSD) method is useful for automatically identifying the correct meaning of an ambiguous word. In order to have a better precision, weight-based WSD method is proposed by taking advantage of a Minkowski distance method. As the proposed method considers the weight values of each sense of training and input vectors while observing the ambiguous words, it is more effective than the simple translation system. Experimental results show that the weight-based WSD method gives a better precision approximately 51% when compared to the simple machine translation method

    Enhancement of Cluster-based Routing Protocol with Parameters Consideration in Wireless Sensor Network

    Get PDF
    A wireless sensor network (WSN) consists of large number of battery operated sensor nodes which are generally deployed in different environments. These sensor nodes have limited energy to sense, process and transmit information. Therefore, there is a need to design an energy efficient routing protocol to extend the lifetime of a WSN. Low Energy Adaptive Clustering Hierarchy (LEACH) protocols are considered to optimize the energy consumption. In this paper, a cluster based routing protocol called Enhancement of Cluster-based Routing Protocol with Parameter Consideration (ECRP-PC) is proposed, in which an assistant Cluster Head called Vice Cluster Head (VCH) is introduced in addition to Cluster Head (CH).  In a cluster, the node with the highest residual energy among all nodes is selected as the CH, and the node with second highest residual energy is selected by the CH as the VCH when the cluster head distance is longer than the specified distance. VCH will serve as a backup node of the CH. The selected VCH will be in a sleep mode as long as the energy of CH is above a threshold, and it will become active when the energy of CH is below a threshold. According to the results, the proposed ECRP-PC protocol is able to increase the average lifetime of nodes up to 56% compared to the original LEACH

    Qualitative study of parental perceptions of barriers & enablers of girls’ education in Monywa, Myanmar

    Get PDF
    In Myanmar, there are no significant gaps in literacy rates for boys and girls in the age group 15-19 years. However, the gap gradually increases after the age of 19. The study explored parents’ attitudes towards girls’ and boys’ schooling in Monywa, Myanmar to better understand parental perceptions. Findings show both rural and urban parents equally in favor of educating both daughters and sons, even when there’s a financial struggle for the family. One respondent observed that girls’ education was more likely to be prioritized if the girl was smart, while boys’ education was likely to be prioritized regardless
    • …
    corecore