Volume 4, Issue 8

August, 2019

Review Paper

1. Future industries and our life-style development with 5G Technology and their dark side

Fifth-generation(5G) networks are the next level of mobile internet connectivity, offering faster speeds and more reliable connections on mobile smart devices and other devices. Combining cutting-edge network technology and the very latest research, 5G should offer connections that are faster than current connections, with average download speeds of around 1GBps expected to soon be the norm. 2020 will be the year of the fifth generation of telecommunication. Fifth-generation mobile wireless networks will be faster, easily accessible, more reliable. For consumers, the first changes will be faster mobile data speeds - eventually up to 100 times quicker than those of 4G, letting people download full-length movies in seconds. At work, the trend will be greater automation of tasks and digital connectivity, driving a new wave of productivity gains for some industries. This will definitely change our lifestyles in a significant manner. Today the world's economy depends on many things from which one of the backbone business foundation stones is the economical, advanced use of Information Technology in the communication sector with its latest inventions. Information Communication systems have reserved an important space in the trade and economy. In other words, the true value of 5G won’t be limited to phones. Just about every industry that touches our daily lives will be transformed – for the better – by the technology evolution that will define 2020. The networks will help power a huge rise in the Internet of Things technology, providing the infrastructure needed to carry huge amounts of data, allowing for a smarter and more connected world. Other side needs to take a noted disadvantage about 5G connection example: increased bandwidth, raise radio frequency rate.

Published by: Nwet Nwet ThanResearch Area: Technology

Organisation: University of Computer Studies, Yangon, MyanmarKeywords: LTE, 5G, Mobile Technology

Review Paper

2. Reduce traffic cause on traffic point/light using image processing

The main objective of traffic jams increased by a number of motor vehicles and an increasing number of city population and development of the city's living style. We need a solution to handle this situation more effectively and usable. The management part of the traffic in Myanmar is using like training and only manual efforts that cannot completely solve this situation state. So, we need to do automatically system to control current traffic and to avoid the congestion of main roads, that we can call the Auto Traffic Control System with Intelligent Computing. This method, the webcam will be used for each of the traffic light in order to take a shot current image of the main roads traffic is bound to occur. These systems will count a total number of vehicles in images and will be calculated using image processing theory and various timings are detected according to the count along with a green signal for vehicles to pass. The simplest way of controlling a traffic light uses a timer for each phase. Another way is to use electronic sensors in order to detect vehicles and produce a signal that cycles. We propose a system for controlling the traffic light by image processing. The system will detect vehicles through images instead of using electronic sensors embedded in the pavement. A camera will be installed alongside the traffic light. It will capture image sequences. Setting the image of an empty road as a reference image, the captured images are sequentially matched using image matching. In these projects, we are building a system to solve the traffic with image processing by using various types of image processing theory, the vehicles can be detected on the basis of which traffic lights can switch.

Published by: Ohnmar AungResearch Area: Image Processing

Organisation: University of Computer Studies, Yangon, MyanmarKeywords: Traffic light control, Image processing, Foreground detection, Vehicle count, Timer

Research Paper

3. Arduino based tracking system using GPS and GSM

The location tracking system is the combination of the Global Positioning System (GPS) and the Global System Mobile communication (GSM) technologies via the microcontroller. It is used to detect the GPS location of vehicles or any objects which are attached to a tracking device. The proposed system made good use of popular technology that combines a smartphone with an Arduino UNO. GPS is a satellite-based navigation technology that provides accurate location and information. The GSM module is used to transmit and receive an update from the object location to a database. Data from the numerous satellites are received by GPS receiver in the National Marine Electronics Association (NMEA) protocol form. The system SMS contains latitude and longitude of the location of the object. The NMEA code consists of a combination of information. Arduino is linked to the GPS and the GSM module in the serial connection. The GPS receiver sends data to Arduino. Then, Arduino instructs the GSM module to send the location data to the GSM enable device in a short message form. Thus, by using the tracking system, it is easy to calculate and get the estimate location and time for the vehicle to reach a given destination.

Published by: Thin Thin Htwe, Dr. Kyaw Kyaw HlaingResearch Area: Embedded System For Arduino

Organisation: University of Computer Studies, Pathein, MyanmarKeywords: Arduino UNO, GSM module, GPS module, Mobile, LCD

Research Paper

4. Teaching effects of numeric integration by using MATLAB Programming

Teaching mathematical programs parallel to a traditional course is being introduced all over the world and MATLAB is the most popular program for that. Numerical analysis is useful course which can solve various practical problems and research with the combination of mathematics and computer. In this paper, the demonstrating systems of numerical integration problems are implemented based on MATLAB. The structure of the system and some specific algorithms are given, including Rectangular Rule, Trapezoidal Rule and Simpson’s Rule. The main idea is to show basic principles and solutions to students that MATLAB could provide. They can extend knowledge gained from the MATLAB course on the other courses. This paper aims at teaching how to program the numerical integral with a step-by-step approach in transforming their algorithms to the most basic lines of code that can run on the computer efficiently and output the solution at the required degree of accuracy. In addition, this paper gives notes on the use of each of these MATLAB commands and programs through several Numerical examples.

Published by: Khin Ma Ma Than, Marlar Win KhinResearch Area: Computer Science

Organisation: University of Computer Studies, Banmaw, MyanmarKeywords: Mathematical Programs, MATLAB, Numerical Analysis, Numerical Integration

Research Paper

5. Applications of operations research tools in financial engineering

This research paper aims at establishing a dependence of the New era financial services on operations research tools and how operations research tools have become the essence of financial management fields. This paper also introduces Financial Engineering a revolutionary idea that has made finance instability more predictable and manageable.

Published by: Rishab Agarwal, Arpit Pruthi, Yash Kandpal, Siddharth ChaudharyResearch Area: Operations Research

Organisation: SVKM's Narsee Monjee Institute of Management Studies, Mumbai, MaharashtraKeywords: Simulation models, Portfolio management, Risk management

Research Paper

6. Teaching integer representations utilizing MATLAB

We teach the first-year students of computer university in Myanmar about the relationships between different sorts of numbers in Discrete Mathematics. In this paper, we discuss ways in which computer technology can be used to learn integer representations of number theory in discrete mathematics. In today’s world, the computing component is essential in every applied math courses. While students come from various programming background using different programming languages, it is more practical to use a single computing language throughout the course. MATLAB is a helpful software for mathematical computation. This is the best idea to learn integer representation problems by using computer programming. It is important to get theory skills and knowledge of viewing practical testing. Traditionally, covering the theory is needed to do practical working.

Published by: Kyi Kyi Win, Marlar Win KhinResearch Area: Computer Science

Organisation: University of Computer Studies, Yangon, MyanmarKeywords: Integer representations, Number theory, Discrete Mathematics, Programming languages, MATLAB

Research Paper

7. Utilization of MATLAB as a technological tool for teaching numeric problems

This paper illustrates how MATLAB can be used in numeric problems to enhance the teaching of Fixed-Point Iteration, Newton’s Method, Secant Method, Gauss-Seidel Iteration and Least Squared Method. The education system is undergoing rapid changes. Various new methods are introduced and used. Further, it makes more effective and learning is highly significant. Today the use of MATLAB in teaching numerical analysis is widespread. MATLAB has grown into a comprehensive programming environment suitable for solving a wide range of numerical problems. The students can extend knowledge gained from the MATLAB course on the other courses. This paper explains the general process of numerical problems, studies the function and characteristic of MATLAB and its application in numerical problems.

Published by: Marlar Win KhinResearch Area: Computer Science

Organisation: University of Computer Studies, Banmaw, MyanmarKeywords: MATLAB, Numeric problems, Education system, Numerical analysis

Research Paper

8. A comparative analysis of mechanical properties of spring and square shape steel sample before and after heat treatment

In this work, we have analyzed the effect of heat treatment on the properties of two different shape steel specimens under various heat treatment processes. Specimens were subjected to heat treatment in an electric muffle furnace. Heat treatment temperature, soaking time and cooling rate were selected as per phase diagram of specimen material. Specimens were tested for mechanical properties before and after heat treatment. Different heat treatment processes compared with respect to their effect on the properties of two different shape specimens.

Published by: AmanResearch Area: Mechanical Engineering

Organisation: Arni University, Kangra, Himachal PradeshKeywords: Soaking, Heat treatment, Stress relive, Steel, Metals

Research Paper

9. Replacing same meaning in sentences using natural language understanding

NLP ( Natural Language Processing ) can be used to communicate with computers by means of intelligence methods in a natural language. In other words, it is very useful for classification and analysis. Although there are many natural language syntax analyzers that existed before, it still remains to fulfill the requirements for analyzing English text for English to English Machine Translation. In this paper, we have proposed a chunk based analyzer for English to English Machine Translation System. The keyword search Technique is one of the techniques of Natural Language Understanding. A simple keyword based matching technique is used for classification. Domain-specific dictionaries of keywords are used to reduce the dimensionality of feature space. The output result is that the word matched to a known word will be replaced in the given sentence, which will not be changed the original meaning.

Published by: Tin Htar Nwe, Zar Lwin Phyo, Zin Mar Myo, Aye Thidar WinResearch Area: Natural Language Processing

Organisation: University of Computer Studies, Magway, MyanmarKeywords: NLP (Natural Language Processing), A chunk based syntax analyzer, Matching technique, Intelligence methods

Others

10. Compare the data confidentiality approach to Short Message Services (SMS) using RC4 and AES algorithms

Todays, short messages service (SMS) still represents the foremost used mobile electronic messaging service. SMS messages are employed in many various applications, even in cases wherever safety features, like authentication and confidentiality between the communications, should be ensured. Unfortunately, SMS technology doesn’t give inbuilt support for any safety features. Hence the secured communication on SMS could be a big challenge. In this work, we use the communication between peers is secured by using public-key cryptography. It includes SMS network architecture as well as cryptographic protocols as a theoretical background and it also deals with design, implementation and confidentiality assessment of RC4 stream cipher for SMS data confidentiality on mobile networks. To secure the message, the receiver needs to put a password. In the paper, we compare the RC4 and RSA algorithm for data confidentiality on SMS.

Published by: Thin Thin Hlaing, Theint Zarli MyintResearch Area: Myanmar

Organisation: University of Computer Studies, Banmaw, MyanmarKeywords: SMS, RC4, RSA,KSA, PRGA, Crypto

Research Paper

11. Strategies for developing the reading skill through effective reading practices

This research paper mainly focuses on developing the reading skills of the third year students at the Computer University, Kalay, Burma. As reading is the most common skill, effective uses of practice reading strategies engage learners resulting in competence in fluency and meaningful depiction of literary texts. The knowledge of reading in a foreign language is important for the students to take the responsibilities for their own learning and to use the acquired reading strategies to tackle the various kinds of texts both inside and outside the class. In this paper, some various effective techniques are mentioned to improve the students’ abilities of reading. The important factors of the reading skills are showed to improve students’ reading speed and to catch the general meaning of the massage. Through needs analysis survey, needs, lacks, wants and attitudes of various students and teachers can be found out. It is hoped that this paper can give some insights into the difficulties faced by students and teachers who have no idea how to train students to be efficient and flexible readers and help the students make good use of their reading skill and how to handle it in the most effective way throughout their studies.

Published by: Thaung Thaung Nwe, Yin Yin AyeResearch Area: English Language Teaching

Organisation: Computer University, Kalay, MyanmarKeywords: Developing, Reading, Strategies

Review Paper

12. Prevention for cancer diseases associated with vegetables

Vegetables are important for human health because of their vitamins, minerals, phytochemical compounds, and dietary fiber content. Especially antioxidant vitamins (vitamins A, vitamins C, and vitamins E) and dietary fiber content have important roles in human health. Adequate vegetable consumption can be protective of some chronic diseases such as diabetes, cancer, obesity, metabolic syndrome, cardiovascular diseases, as well as improve risk factors related to these diseases. Fruits and vegetables are universally promoted as healthy. Fruits and vegetables include a diverse group of plant foods that vary greatly in the content of energy and nutrients. Fruits and vegetables also supply vitamins and minerals to the diet and are sources of phytochemicals that function as antioxidants, phytoestrogens, and antiinflammatory agents and through other protective mechanisms. Multivitamins may slightly reduce the risk of cancer but don’t prevent heart disease. There is a wealth of data available within the health care system. Advanced data mining techniques can help medial situations. The Harvard-Led Physicians Health Study II (PHS II) recently found that taking a multivitamin slightly lowers the risk of being diagnosed with cancer. Fruits and vegetables contain many biologically active ingredients that may help to prevent cancer in ways that vitamins and minerals alone do not. The PHS II was the first study to test a standard multivitamin for the prevention of chronic disease. The cardiovascular disease portion of the study focused on whether taking a multivitamin reduced the risk of heart attacks, strokes, and death from cardiovascular disease. It’s important not to overplay the benefit that PHS II found for preventing cancer. What you eat and don’t eat can have a powerful effect on your health, including your risk for cancer. We conducted a systematic review and meta-analysis to clarify these associations.

Published by: Aye Aye BoResearch Area: Analysis

Organisation: University of Computer Studies, Magway, MyanmarKeywords: Harvard-Led Physicians health, Cancer, Associations, Vegetables

Research Paper

13. Text steganography in Letter of Credit (LC) using synonym substitution based algorithm

Text steganography uses text files as carrier files to hide confidential information. The goal of text steganography is to make the hidden data undetectable except the sender and receiver. This paper focuses on semantic-based text steganography. It hides confidential information by replacing words with their synonyms (same meanings). In international trading processes, products are imported and exported between foreign countries, in this case, the sellers and the buyers do not know each other. Therefore, the seller has a number of risks such as credit risk and legal risk caused by the distance. Letter of credit (LC) has been used to solve these risks. In the modern age, LC information has been sent online. Therefore, the security of LC information has become an important role. Most of the bank’s LC information is sent via SWIFT message, email or message formats. Using these types of message does not secure the LC information. This paper implements synonym substitution based algorithm to make confidential LC information more secure. This system is implemented by using Java software development kit (J2SE 7).

Published by: Aye Aye ChawResearch Area: Computer Science

Organisation: University of Computer Studies, Mandalay, MyanmarKeywords: Synonym, Obfuscation, Deobfuscation, Letter of Credit

Research Paper

14. Information hiding using AES algorithm and audio steganography

Nowadays, information security is a more important topic in ICT and related to all areas. Cryptography is the science that studies a wide range of issues in the transmission and safeguarding of information. Steganography is the art and science of embedding hidden messages in such a way that no one knows the existence of the message in the cover media file. This paper presents a combination of cryptography and steganography to hide information in the cover media file. In the cryptography part, AES algorithm is chosen and the audio file is used as a cover media file in steganography part. In this paper, the information is encrypted firstly and then encrypted texts are hidden into an audio file. The use of one secret key and cover media file is more secure than the use of one secret key. The first key is used for message encryption and the second audio file is applied as cover media file for information hiding.

Published by: Moe ThantResearch Area: Information Security

Organisation: Computer University, Kalay, MyanmarKeywords: Cover media file, Cryptography, Steganography

Research Paper

15. Rationale for teaching grammar by communicative approach

This research paper deals with teaching grammar to the students, who need to purpose their studies through the medium of English. It also intends to develop the grammatical competence of students of English through communicative activities. Students are required to apply their grammatical knowledge in communication since grammatical competence is part of communicative competence. This research paper aims to help students to be able to pursue their specific studies in English more effectively. In this research paper, first, the theoretical aspect of communicative language teaching is presented. Then, the importance of teaching grammar and the role of teacher and learners, and the role of Instruction Materials. Next, suggested the requirements of grammar for teacher and Analyzing learners’ grammatical difficulties. Finally, some activities intended to develop their proficiency are also presented. It is hoped that the study of this research will be of some help in creating effective teaching.

Published by: Kyi Kyi KhaingResearch Area: Grammar and Literature

Organisation: Computer University, Kalay, MyanmarKeywords: Teaching grammar, The role of teacher and learner, Instruction materials

Technical Notes

16. The art of Mathematics: Origami simulation

In the real-world domain, mathematics is essential everywhere. Current technologies, like computer and information technology, can’t also be developed without assisting mathematics. Mathematics includes the study of many fields, including number theory, algebra, geometry, mathematical analysis and so on. Unfortunately, mathematics is also influenced by the arts, like paper folding. It is also called “Origami”. In this study, we will express the antiquity of origami and how to apply mathematics to making them. The exploration of the mathematics theory is an influence on the developing of Origami. The design of origamis can also be applied to the construction and industries. In this paper, we will discuss the simulation of the creation of origami.

Published by: May Nwe Soe, Aye Aye AungResearch Area: Mathematics

Organisation: University of Computer Studies, Mandalay, MyanmarKeywords: Mathematics, Origami, Folding-art

Others

17. Teaching grammar through communicative language teaching

Learning the English Language is necessary to communicate with each other. This paper is aimed to propose some communicative strategies to motivate the students' interest in learning grammar and to apply the knowledge of grammar in the real world situation. Grammar has been taught since in high schools. But students forget easily and find it difficult to apply that they have learned in real situations up to now. So it is important to have communicative competence in learning grammar. The students in the realm of higher education think that they have already known the forms and uses of grammar. In fact, they do not realize that they often make mistakes in writing a sentence and speaking. In addition, students are not interested in doing exercises on grammar such as filling in the blanks, multiple-choice, matching, questions and answers. So to arouse students' interest and to teach grammar communicatively, appropriate techniques among various methodologies should be used and adopted in English Language Teaching according to the needs and interests of their students. To create this situation, the communicative language teaching strategies are emphasized and communicative activities are added in accordance with the necessities of teaching situation.

Published by: Myat Myat MoeResearch Area: English Learning and Teaching

Organisation: University of Computer Studies, Taunggyi, MyanmarKeywords: Grammar, Interest, Motivation, Communicative, Techniques, Competence

Research Paper

18. A study to assess the knowledge and practice of antenatal mothers regarding breast feeding in a selected rural community at Bhidki (Chargawan) Jabalpur (M.P.)

The primary purpose of the study was to assess the antenatal mother’s knowledge and practice towards breast feeding and its relationship with variables in a selected village of Bhidki, Chargawan, Jabalpur M.P. This chapter dealt with analysis and interpretation of data collected from 100 antenatal mothers from a village of Bhidki, Chargawan, Jabalpur M.P. organized and analyzed using both descriptive and inferential statistics and was been presented in six sections. These are as follows: - Section I: Description of sample characteristics. Section II: Knowledge of antenatal mothers regarding breastfeeding. Section III: Practice of antenatal mothers regarding breastfeeding. Section IV: Correlation between knowledge and practice. Section V: Association between selected factors and the Antenatal Mother’s Knowledge and Practice level. As regards sample characteristics, the majority of the antenatal mothers belonged to the age group of 21-30 years. Most of them were Hindus and Housewives by occupation. Most of them had educational levels as middle School or High School and above. There were more Multi-gravidae mothers (92%) as compared to Grand multi-gravidae (8%). The findings of the study revealed that 52% of antenatal mothers had the appropriate knowledge. A positive correlation was found between antenatal mothers' knowledge and practice. (0.09).

Published by: Stella Peter, Supriya PeterResearch Area: Nursing

Organisation: Netaji Subhash Chandra Bose Medical College, Jabalpur, Madhya PradeshKeywords: Antenatal mother, Knowledge, Practice, Breast feeding, Relationship