28 research outputs found

    An Evaluation of Cultural Contents and Activities in the General English Textbook

    Get PDF
    This is an evaluation of cultural contents and activities in the textbook, General English, published by the Curriculum Project, Thabyay Education Foundation, used in the migrant learning centers in the Thailand-Myanmar border. The evaluation was done to support Thabyay Education Foundation, a non-profit organization. General English has been adapted from Language in Use (1991) and developed for the post-secondary who are between the age of 16 to 25.This research was conducted to find out whether the materials were appropriate with regard to the social lives of the refugee students. The evaluation was done in four categories: topics, illustrations and activities. To evaluate these four categories, the researcher analyzed the textbook and interviewed the participants. The interviews were conducted with 15 participants from three different learning centers in three different refugee camps. The findings reveal that the subject content of the material is generally appropriate and potentially engaging to the young adult Myanmar migrant learners.

    DC-link voltage balancing and control of qZ-source inverter fed induction motor drive

    Get PDF
    Poor performance of the motor drive system is caused when the direct current-link (DC-link) capacitor voltages of the inverter are not sufficiently generated. This is mainly because of the various load torque changes and input voltage fluctuation. The qZ-source inverter operates with a fully shoot-through technique. This technique causes mismatching between the upper and lower DC-link capacitor voltages. Without capacitor voltage-balancing function, the desired DC-link capacitor voltages could not be provided or maintained when there are load and speed changes. A Sawtooth carrier-based simple boost triple-sixty-degree (TSD) pulse width modulation (PWM) technique is used to drive the qZ-source T-type inverter because this technique can give a more significant boost DC-link voltage than a traditional simple boost PWM technique. Proportional integral (PI) controller is applied for the DC-link voltage controller to achieve the fast response and less steady-state error. The simulation model was constructed for a 4 kW, 400 V, 1,400 rpm induction motor (IM) drive system used in rolling mill using MATLAB/Simulink with and without voltage balancing function. As a result, DC-link voltages of the qZ-source T-type inverter fed the induction motor drive system could be controlled using a capacitor voltage-balancing function and the output power of the motor from the simulation result is approximately equal to 4 kW

    Moral Challenges, Moral Distress, and Moral Resilience in Critical Care Nurses During the COVID-19 Pandemic

    Get PDF
    PURPOSE: The purpose of this qualitative descriptive study was to describe critical care nurses’ experiences of moral challenges, moral distress, and moral resilience during the COVID-19 pandemic. The specific aims of this study were to: 1. Describe the moral challenges experienced by ICU nurses. 2. Describe moral resilience in terms of integrity, buoyancy, moral efficacy, self-regulation, and self-stewardship among ICU nurses (from Rushton’s framework). 3. Explore the relationship between moral distress and moral resilience to advance the concept of moral resilience in the face of the COVID-19 pandemic. FRAMEWORK: This study was undergirded by an adaptation of Rushton’s conceptual framework of moral concepts. DESIGN: A qualitative descriptive design was used. Participants were recruited between January to May 2021, and a semi-structured interview guide was utilized to interview participants. RESULTS: 17 participants were interviewed for the study. Participants described the four themes of moral challenges: death and dying, pain and suffering, being alone, and being helpless and not in control. Moral resilience was described as: integrity, buoyancy, moral efficacy, self-regulation, self-stewardship, and self-perception. The relationship between moral distress and moral resilience was described as iterative and fluid. CONCLUSION: The findings of the study provided a new domain of moral resilience called self-perception and a revised adaptation of the conceptual framework for moral resilience

    Mining Association Rule by Using Prefix Graph with an Efficient Flow-Based Strategy

    No full text
    PG Miner, a graph-based Algorithm for mining frequent closed item sets consists of construction a prefix graph structure and decomposing the database to variable length bit vectors, which are assigned to nodes of the graph. The main advantage of this representation is that the bit vectors at each node are relatively shorter than others existing methods. Use projected databases to prune their non-closed item sets. There are two typical strategies adopted by these algorithms: (1) an effective pruning strategy to reduce the combinational search space of candidate item sets and (2) a compresses data representation to facilitate in-core processing of the item sets

    Secure Teaching Support System Using FTP Protocol

    No full text
    File Transfer Protocol (FTP) is the standard mechanism for copying a file from one host to another. Transferring file from one computer to another is one of the most common tasks expected for networking and internetworking environment. This thesis is intended to implement teaching support system for Computer Universities by using FTP.This system can assist the teachers in Computer Universities to cooperate over the network. It can deliver the ability to manage and access teaching materials. The teaching materials contains sample questions, sample answers, exam scope, lecture plan, postgraduates scope, other solutions and important information .While transferring files over network, it is needed to provide security for some important information. To provide the security, the system is implemented by using ElGamal Algorithm. The system uses a network operation system design to manage the entire network from a centralized point, (server).Sever has to transfer encrypted files over the network. On the receiving site, the encrypted files must be decrypted by the client to get the original data. Therefore the system can transfer files with the help of File Transfer Protocol and provides security using ElGamal algorithm

    CUSTOMER SATISFACTION ON WAITING LINE MANAGEMENT AT MYANMA FOREIGN TRADE BANK

    No full text
    The main objective of this research was to find out how impact effect of waiting line management practice apply in MFTB Bank influences to customer satisfaction level. To achieve the main objective, they study determined the effect of waiting line management practices on customer satisfaction, how MFTB bank manage waiting line manage practices to achieve customer satisfaction level. The research was a direct questionnaire survey to 84 customers who visit and business relation with MFTB Banks. The primary data was collected using self-administrated questionnaire and the analysis was done using descriptive statistics data. The study concludes that majority of MFTB bank customers are stratified with MFTB bank’s waiting lime management practice. The main weakness of MFTB Bank customer less satisfaction is perceived waiting time that was still below their expectation level. Besides information provided by MFTB Bank at waiting hall are required to improve from existing level. But waiting environment is impressive satisfaction remark of very comfort ease and pleasant atmosphere for customers while they were awaiting their place service order. Besides, MFTB bank slightly upgrading to Queue discipline to their customers in this competitive service financial sectors. The study recommends MFTB bank invest the provision of appropriate information to the customer to increase customer stratification by adoption automatic measurement system, seamless banking, internet banking, use of interactive communication, digital signaling signage technology, more comprehensive service information at waiting hall. The study also recommends further study in efficiency of waiting line management practice in align with technologies I MFTB Bank

    REVITALIZATION OF SOLID WASTE MANAGEMENT, WATER SUPPLY AND SEWERAGE SYSTEM OF YANGON TO BECOME SUSTAINABLE CITY

    No full text
    Bachelor'sBACHELOR OF SCIENCE (PROJECT AND FACILITIES MANAGEMENT

    Prediction of Bank Loan Type Using Naive Bayesian Classification

    No full text
    Data Mining is the process of storing through large amount of data and picking out relevant information. Classification can be used as in the form of data analysis that can be used to extract models describing the important data classes. Classification is the task to identify the class labels for instances based on a set of features (attributes). As Myanmar is the rice-mart of the world, agricultural remains the vital sector of the economy and measures has been taken to increase productivity of paddy and other crops. It needs to predict the possibility of default of a potential counterparty before they extend a loan to the growers. In this paper, we proposed a bank loan-type prediction system for Myanmar agriculture development Bank by using Bayesian classification. Our system's performance results are also discussed in this paper

    Sequential Pattern Mining for Library System using Prefix Spanning

    No full text
    Sequential pattern mining is an important datamining problem with broad applications. Most of thesequential pattern mining methods, such as GSP(Generalized Sequential Pattern) and AprioriAllexplore a candidate generation and test approach toreduce the number of candidates to be examined.These approaches may not be efficient in mininglarge sequence databases having numerous patternsand/or long patterns. The better algorithm forsequential pattern is based on pattern-growth, adivide-and-conquer algorithm that projects andpartitions databases based on the currently identifiedfrequent patterns and grow such patterns to longerones using the projected databases. This paperpresents mining sequential pattern from librarydatabase by prefixSpan algorithm, which exploresprefix projection in sequential pattern mining.PrefixSpan mines the complete set of patterns butgreatly reduces the efforts of candidate subsequencegeneration. Moreover, prefix-projection substantiallyreduces the size of projected databases and leads toefficient processing. The experimental results of oursystem are also discussed in this paper

    Identification of Human Iris using Discrete Haar Wavelet Transform

    No full text
    Image recognition is one of the fields of Artificial Intelligence. Nowadays, Image recognition is affecting not only corporations using it within an economic interest but also the average user who uses a digital camera. This process can be done with a variety of tools but most of the time these are too complicated for the inexperienced user to handle. We applied the Haar Wavelet in order to extract the deterministic patterns in a person’s iris in the form of a feature vector for personal identification. These are three basic steps in our system such as image preprocessing, feature extraction and recognition. By comparing the quantized vectors using the Hamming Distance operator, we determine finally whether two irises are similar. Our results show that our system is quite effective.. Our system intent to help for security to identify the person based on human’s iris
    corecore