21 research outputs found

    CREATIVE AND EFFECTIVE STRATEGIES TO ENCOURAGE LEARNERS SPEAKING SKILL IN LARGE CLASSROOMS

    Get PDF
    This paper purposes at improving of students’ speaking skill in the large classes. One of the biggest issues dealing with schools and teachers today is the management of large classes. It is said that frustrating, noisy and stressful classroom environment cannot easily be overcome. In order to create an effective teaching and learning environment, a class size should be small and a teacher wisely solves to crowded classrooms. Using appropriate and effective teaching methods, teachers not only persuade students’ motivation and interest but also know how to develop learners’ speaking skill. In accordance with the creative and effective ways and strategies discussed in this paper, students get many benefits in the development of speaking skills. This study reveals that creative strategies such as guessing topic, passing a parcel through students, sharing topics, expressing different view supported by a monolingual method in large classrooms, expressed in this paper are useful and effective ways for students to improve their speaking skill as well as for teachers these give benefits when managing large classroom. In brief, these strategies support teachers as effective ways to upgrade the level of students’ speaking skill and attract students to participate in speaking lessons in accordance with students’ response based on a questionnaire

    Angle-Aware Greedy Forwarding Algorithm for Vehicular Ad Hoc Networks

    Get PDF
    Greedy Perimeter Stateless Routing (GPSR) gives the good forwarding nodes for Mobile Ad Hoc Networks (MANET) but does not provide the right directional forwarding nodes in Vehicular Ad Hoc Network (VANET). This is the fact that MANET uses the nodes without limitations in moving but VANET uses fixed infrastructure in mobility such as roads with lanes. The key of original greedy forwarding is choosing the forwarding node with the shortest distance between the source and the destination. It does not consider the direction of the forwarding nodes, which possibly cause the selected forwarding node going opposite direction from the destination. This paper thus tries to improve the greedy forwarding method of Greedy Perimeter Stateless Routing (GPSR) by taking into considerations in both the distance and the direction. Moreover it shows the mystery of angle that gives the right direction. The optimized GPSR (OGPSR) using improved greedy forwarding provides the better throughput, average end-to-end delay and routing overheads than the original GPSR

    Weight-based Word Sense Disambiguation Method for Myanmar-to-English Language Translation

    Get PDF
    In many natural language processing (NLP) techniques, machine translation is a popular and useful technique. Machine translation technique is a translation process from one to another language. This technique is thus very useful for people around the world. While translating the languages, ambiguity is a big challenge because many words have several meanings. Ambiguous words have damaging effects on the precision of machine translation. To solve this problem, word sense disambiguation (WSD) method is useful for automatically identifying the correct meaning of an ambiguous word. In order to have a better precision, weight-based WSD method is proposed by taking advantage of a Minkowski distance method. As the proposed method considers the weight values of each sense of training and input vectors while observing the ambiguous words, it is more effective than the simple translation system. Experimental results show that the weight-based WSD method gives a better precision approximately 51% when compared to the simple machine translation method

    Image Encryption based on AES Stream Cipher in Counter Mode

    No full text
    With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access

    Online Money Transfer System Using ElGamal Digital Signature Scheme

    No full text
    This paper presents money transfer transactionfrom bank to bank system to provide authentic,integrity services by using ElGamal public keydigital signature and SHA-512 hash functionalgorithm. This system consists of two components:Signing and Verifying. Signing process is performedby sender and verifying process is performed byreceiver. In signing process, administrator createssignature with its private key and send its signature& original ticket to other administrator. In receivingprocess, administrator computes hash code fromoriginal ticket and compares hash code fromdecrypted signature with its public key. The securityof ElGamal signature algorithm is based oncomputing discrete logarithm over a finite largeprime. The security of SHA-512 is large size ofdigest output. If two hash values are equal, thecontent of ticket message is not modified aftersigned and display ticket message of money transferis successful. If two hash values are not equal, thecontent of ticket message is modified after signed

    Classification and Discovery on Intra-Firewall Policy Anomalies

    No full text
    Firewalls are core elements in networksecurity. However, managing firewall rules is anerror-prone task especially for less experienceadministrator. The reason is that firewall filteringrules itself might cause network vulnerability due tothe firewall policy anomalies unless carefully writtenand ordered them. Thus, firewall rule analysis isessential to determine the proper rule placement andordering without any policy anomalies wheninserting or modifying filtering rules. In this thesis,we develop a firewall rules analyzer based on IntraFirewall Policy Anomaly Algorithm in order todiscover and alert all possible policy anomalies inIPCOP firewall that is used in Small Office HomeOffice (SOHO) network. And the main purpose of thisanalyzer is to assist the administrators who settingtheir firewall to be able to configure conflict-freefirewall rules easily by giving advising alerts. Weimplemented the firewall in a small campus networkprototype and experimented it in a virtual networkthat is built by using Virtual Machine Software(VMWare) Workstation 10. Firewall policy for thissystem is based on our own predefined securitypolicy for this network. We will test the system thathow the developed analyzer can assist theadministrators by comparing of the administrator'sability for firewall setting with the help of theanalyzer and those without the help of it

    Security Awareness of Network Infrastructure: Real-time Intrusion Detection and Prevention System with Storage Log Server

    No full text
    In an organization’s of computer network, the intrusion of detection and prevention is the important one because of malicious and dedicated attacks are very high. In this paper, we describe the network infrastructure and study of a network intrusion detection system (NIDS) and network intrusion prevention system (NIPS) with syslog server in small and medium size network organization. The purposes of NIDS and NIPS are to prevent, manage and detect the unauthorized access. False negatives are obviously a problem. It is difficult to figure out what you know. In our propose system, we use other components of the security component syslog server. It will show signs of attack that the IDS is not alerting on. Snort is a popular NIDS with signature based rules for detecting of known attacks. For IPS, it is used Snort inline that acts as to protect from untrusted network. So inline prevention system is a solution of network-based security

    Application of A Radial Basis Function Neural Network for Diagnosis of Diabetes Mellitus

    No full text
    In this paper, an attempt is made to study the applicability of a general purpose, supervised feed forward neural network with one hidden layer, namely; Radial Basic Function (RBF) neural network. It uses relatively smaller number of locally tuned units and its adaptive in nature. RBFs are suitable for pattern recognition and classification. An artificial neural network with radial basic function is applied for the diagnosis of diabetes mellitus system This system consists of three phases: preprocessing, training and testing

    Innovation Security of Beaufort Cipher by Stream Cipher Using Myanmar-Vigenere Table and Unicode Table

    No full text
    Nowadays, securing information and message transformation are going with electronic way, thesecurity becomes very important role on public network. Cryptography is readable message convert tounreadable message using encryption/decryption process. Encryption Process is sender and decryptionprocess are receiver side. Commonly, information can be storing with international language such as Englishlanguage. At the present time, everyone is trying to be more secure not only English but also own languagesuch as Myanmar, Chinese, Tamil etc. Confidential data are transferred through with regional language byusing with more innovative method. To secure such information, encryption/decryption plays an importantrole in information security. In cryptography, there are several cipher techniques such as, polyalphabeticcipher, Stream cipher, Block cipher etc. This section using Beaufort cipher is an example of substitutioncipher, In this paper, we propose an advanced encryption algorithm that improves the security of Beaufortencryption by combining it with a modern encryption method such as Stream cipher for the Myanmarlanguage, Stream cipher is considered relatively as an unbreakable method and uses a binary form ( insteadof characters) where Plain text, encrypted text and key are bit string

    Road Sign Recognition System using Radial Basis Function Neural Network Architecture

    No full text
    In this paper, road sign recognition system (RSR) is implemented with radial basis function (RBF) neural network architecture. The system consists of image pre-processing and algorithm of RBF function to recognition that road sign data set.RSR can be performed with dynamic and static road sign images. Road sign consists of various shapes according to their command. In this paper, the mostly use road signs are applied for training and testing data in the implementation of the system.RBF neural network is used in the recognition system because it is a supervised learning neural network and can have better approximation in pattern recognition than other systems. Road signs for warning for danger, forbidden and restriction, and command signs with various geometrical shapes are trained and tested. The result of the system is described by applying the recognition rate described from training and testing phase in RBF neural network
    corecore