Version-5 (March-April 2016)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Comparison of Various Data-Driven Modelling Techniques for Inflow Analysis |
Country | : | India |
Authors | : | Manali Pawar || Samveda Mohite || Rushikesh Deshmukh || Prof. Nivedita Bhirud |
Abstract: Inflow Analysis of a reservoir is an important factor as water is becoming a scarce resource and hence management of water was essential. There are many traditional methods of analysing the reservoir inflow but which were very tedious and time consuming and hence we approach the soft computing data-driven techniques......
Keyword: Inflow analysis, artificial neural networks, M5 model trees, rainfall runoff
[1]. Comparison of data-driven modelling techniques for river flow forecasting, Shreenivas Londhe; Shrikant Charhate, Department of
Civil Engineering, Vishwakarma Institute of Information Technology, Survey no.2/3/4, Kondhwa (Bk), Pune, MH, India b
Department of Civil Engineering, Datta Meghe College of Engineering, Airoli, Navi Mumbai, MH, India.
[2]. Neural networks and M5 model trees in modelling water level–discharge relationship Bhattacharya, D.P. Solomatine, Department
of Hydro informatics and Knowledge Management, UNESCO-IHE Institute for Water Education, P.O. Box 3015, 2601 DA Delft,
The Netherlands.
[3]. Model trees as an alternative to neural networks in rainfall–runoff modelling, DIMITRI P. SOLOMATINE, International Institute
for Infrastructural, Hydraulic and Environmental Engineering (IHE), PO Box 3015, NL-2601 DA Delft, The Netherlands, KHADA
N. DULAL, Department of Hydrology and Meteorology, PO Box 406, Kathmandu, Nepal.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Wireless E-Notice Board |
Country | : | India |
Authors | : | Mitesh Santhakumar || Prasadbhagat || Ujjwalrajjpurohit || Niteshmhatre || Prof Varshabodade |
Abstract: Notice boards are one of the major communication mediums for mass media. Many Universities and educational institutions still use wooden notice board to display announcements. However, reliance on such boards is still not enough to convey relevant information around the organization. This paper gives a basic idea about Wireless E-Notice Board. Primary aim of the proposed system is to ensure that information sent from a remote place is displayed on display unit......
Keyword: E-Notice Board, Wireless, SMS, SIM300GSM modem, Raspberry Pi B+, Large Display.
[1]. N. Villar, K. Van Laerhoven, H.-W. Gellersen. "A Physical Notice Board with Digital Logic And Display", (Demo). In Adjunct Proceedings of the European Symposium on Ambient, 2007
[2]. Wireless electronic display board using gsm technology 1n. jaganmohanreddy, 2g.venkareshwarlu. cbit, Hyderabad
[3]. Electronic Notice Board for Professional CollegeAnushree S P, Divyashree V Bhat, Moonisha G A Venkatesh U C.
[4]. "GSM based campus display system"(using microcontroller a at89s52) bachelor of engineering in electronics & communication L.D.R.P Institute Technology & Research, G GandhinagarGujaarat Technological University, Ahmedabad December, 2012
[5]. HaitaoJia, Li Cao Department of Automation, Tsinghua, and Beijing, China "A Remote data acquisition system based on SMS". Systems, Man and Cybernetics, 2004 IEEE International Conference on(Volume: 7)
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Fast Compressed Sensing Based High Resolution Image Reconstruction |
Country | : | India |
Authors | : | Dr G Vijay Kumar || ANMV Srivalli |
Abstract: As a powerful high resolution image modeling technique, compressive sensing (CS) has been successfully applied in digital image processing and various image applications. This paper proposes a new method of efficient image reconstruction based on the Modified Frame Reconstruction Iterative Thresholding Algorithm (MFR ITA) developed under the compressed sensing (CS) domain by using total variation algorithm.......
Keyword: Compressed Sensing, Image Reconstruction, Multilook, MFRITA, Thresholding
[1]. D. L. Donoho, Compressed sensing, IEEE Transactions on Information Theory, Vol.52, No.4, 2006, pp. 1289-1306.
[2]. E. J. Candes, M. B. Wakin, An introduction to compressive sampling, IEEE Signal Processing Magazine, Vol.25, No.2, 2008, pp. 21-30.
[3]. V. S. Petrovic, C. S. Xydeas, Gradient-based multi resolution image fusion, IEEE Transactions on Image Processing, Vol.13, No.2, 2004, pp. 228-237.
[4]. X. Li, S.Y. Qin, Efficient fusion for infrared and visible images based on compressive sensing principle, IET Image Processing, Vol. 5, No.2, 2011, pp. 141-147.
[5]. Z. Z. Yang, and Z. Yang, Novel multifocus image fusion and reconstruction framework based on compressed sensing, IET Image Processing, Vol.7, No.9, 2013, pp. 837-847.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Accident Prevention Technique For Speed Bumper Detection Through IR Sensor And Motor Speed Control Using Timer |
Country | : | India |
Authors | : | Bidyutmala Saha || Rafiqul Islam |
Abstract: A method of preventing an accident using a technology is called ultrasonic. This project is about making cars more intelligent and interactive which may notify or resist user under unacceptable conditions. This project focuses on building a user-friendly vehicle that specializes in detecting intrusions besides doing close range obstacle detection especially bumper in road.......
Keyword: Ultrasonic, Obstacle detection, Edge detection, infrared sensors, proximity sensor.
[1]. Toshiba to Launch Innovative Rechargeable Battery Business" (Press release). Toshiba. 11 December 2007.Retrieved 25 June 2009
[2]. Alfred Smee (1849). Elements of electro biology,: or the voltaic mechanism of man; of electro -pathology, especially of the nervous system; and of electrotherapeutics. London: Longman, Brown, Green, and Longmans. p. 15.
[3]. Peter Gevorkian (1 August 2007). Sustainable energy systems engineering: the complete green building design resource. McGraw Hill Professional. pp. 498-ISBN 978-0-0147359-0. Retrieved 29 February 2012
[4]. Application -Specific Integrated Circuits (ASIC's). 2013. Application-Specific Integrated Circuits (ASIC's). [ONLINE] Available at: http://www.siliconfareast.com/asic.htm.[Accessed 19 July 2013]
[5]. Embedded Systems Design –Heath Steve-Google-kirjat. 2013. Embedded Systems Design-Steve Heath -Google-kirjat.[ONLINE]Available at: http://books.google.fi/books?id= BjNZXwH7HlkC&pg=PA2&redir_esc =y#v=onepage&q&f=true.[Accessed 18 July 2013]
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Adaptive Personalized Web Search with Safety Seclusion |
Country | : | India |
Authors | : | K Manasa || R Lakshmi Tulasi |
Abstract: The Comprehensive research demonstrations the competence of our framework. We additionally give an online expectation component to choosing whether customizing a query is beneficial. Personalized web search (PWS) has shown its adequacy in enhancing the nature of different inquiry benefits on the Internet. The exploratory results likewise uncover that GreedyIL altogether beats GreedyDP as far as productivity......
Keyword: Information, Personalization, PWS Personalized Web Search, Search Engine, User Profile.
[1]. Bertino E. and Sandhu.(2005),"Database Security-Concepts Approaches, and allenges,"IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 2-19.
[2]. Chaudhuri S. et al (2011), "Database Access Control & Privacy: Is There a Common Ground?" Proc. Fifth Bien- nial Conf. Innovative Data Systems Research (CIDR), pp. 96-103.
[3]. Fung B. et al (2010), "Privacy-Preserving Data Publishing: A Survey of Recent evelopments," ACM Computing Surveys, vol. 42, no. 4, article 14, 2010.
[4]. Ghinita G. et al (2009),"A Framework for Efficient Data Anonymization Under Privacy and Accuracy Constraints, "ACM Trans. Database Systems, vol. 34, no. 2, article 9.
[5]. Li N. et al (2011), "Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy," Arxiv preprint arXiv:1101.2604.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Prediction of Epileptic Seizure: A Review |
Country | : | India |
Authors | : | Shubhashree Savant || Mukta Dhopeshwarkar |
Abstract: Epilepsy is a neurological disorder affecting about 50 million people worldwide. Many techniques have been developed for predicting the basic features of epileptic seizures. Techniques used to forecast seizures include frequency-based methods, statistical analysis of EEG signals, devices to warn seizures etc.. Effective treatments require reliable prediction of seizures to increase their effectiveness and quality-of-life. One of the most dangerous aspects of seizures is its unpredictability. Seizure prediction is an important aim of clinical management and treatment in completely controlling a patient's epilepsy. This paper reviews the prediction of epileptic seizure used during last decade.
Keyword: Epilepsy, Partial Seizure, Generalized seizure, Seizure Prediction
[1]. Viglione S, Ordon V, Martin W, Kesler C, inventors; US government, assignee. Epileptic seizure warning system. US patent 3 863 625. November 2, 1973.
[2]. Lehnertz K, Litt B. The First International Collaborative Workshop on Seizure Prediction: summary and data description. 2005;116(3):493-505.
[3]. World Health Organization, 2011.Available: http://www.who.int/mediacentre/factsheets/fs999/en/
[4]. A. Dalton, S. Patel, A.R. Chowdhury, M. Welsh, T. Pang, S. Schachter, G. ´ Olaighin, P. Bonato, "Detecting epileptic seizures using wearable sensor technologies," In Proc. of the First AMA-IEEE Medical Technology Conference on Individualized Healtcare, 2010.
[5]. Fisher, R., Boas, W., Blume, W., Elger, C., Genton, P., Lee, P., and Engel, J. Epileptic seizures and epilepsy: Definitions proposed by the International League Against Epilepsy (ILAE) and the International Bureau for Epilepsy (IBE). Epilepsia 46, 4 (2005), 470-472.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Survey on Single Scalar Point Multiplication Algorithms forElliptic Curves overPrime Fields |
Country | : | United Arab Emirates |
Authors | : | Mohammad Rasmi || Ahmad Abu Sokhon || Mohammad Sh. Daoud || Hani Al-Mimi |
Abstract: Elliptic Curve Cryptography (ECC) is an attractive field of research since it requires a shorter key length compared to other public-key cryptosystems such as RSA. A shorter key reduces the required computations, power consumption, and storage. The major time-consuming operation in ECC is the point multiplication, 𝑘𝑃. Therefore, a lot of research has been carried out to improve the efficiency of ECC implementations. Composite Elliptic Curve (EC) operations and recoding methods are two factors that affect the efficiency of EC scalar multiplication.......
Keyword: Elliptic Curve Cryptography, recoding methods, EC multiplication
[1]. ALMIMI, H., SAMSUDIN, A. & JAHANI, S. 2015. Elliptic-curve scalar multiplication algorithm using ZOT structure. Security and Communication Networks, 8, 1141-1154.
[2]. AVANZI, R. 2005. A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue. Selected Areas in Cryptography, vol. 3357, pp. 130-143.
[3]. BALASUBRAMANIAM, P. & KARTHIKEYAN, E. 2007. Elliptic curve scalar multiplication algorithm using complementary recoding. Applied Mathematics and Computation, vol. 190, pp. 51-56.
[4]. BLAKE, I. F., SEROUSSI, G. & SMART, N. P. 1999. Elliptic Curves in Cryptography, Cambridge University Press.
[5]. BOOTH, A. D. 1951. A Signed Binary Multiplication Technique. Quarterly J. Mechanics and Applied Mathematics, vol. 4, pp. 236-240.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review Paper on Thinning of Image Using Zhang and Suen Algorithm and Neural Network |
Country | : | India |
Authors | : | Sonam Soni || Dr. Raman Chadha || Sukhmeet Kaur |
Abstract: This review paper provides a concise survey on different techniques for thinning and their comparison in image processing. Thinning is one of the fundamental requirements is to represent the structural shape of digital images. This can be done by reducing it to a graph. This process may be completed by obtaining the skeleton of the particular region of the image or the full image using skeletonization of the image also known as thinning. Skeletonization is the process of extracting skeletons from an object in a digital image........
Keyword: Thinning, Skeletonization, Image Processing, Zhang and Suen, Neural Networks, Thinning rate, Thinning speed.
[1]. Abu-Ain W, et al. "Skeletonization Algorithm for Binary Images" The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) pp.704-709.
[2]. Padole G.V, Pokle S. B. "New Iterative Algorithms For Thinning Binary Images" Third International Conference on Emerging Trends in Engineering and Technology IEEE 2010 pp. 166-171
[3]. Chatbri et al. "Using scale space filtering to make thinning algorithms robust against noise in sketch images" Pattern Recognition letters 42(2014) pp. 1-10
[4]. Prakash, R. P., Keerthana S. Prakash, and V. P. Binu. "Thinning algorithm using hypergraph based morphological operators." Advance Computing Conference (IACC), 2015 IEEE International. IEEE, 2015.
[5]. Abu-Ain, W., Abdullah, S.N.H.S., Bataineh, B., Abu-Ain, T. and Omar, K., 2013. Skeletonization Algorithm for Binary Images. Procedia Technology, 11, pp.704-709.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mining Frequent Patterns on Object-Relational Data |
Country | : | China |
Authors | : | Juliana Lucas Mbuke || Lu Songfeng |
Abstract: Data mining is viewed as an essential part of the process towards knowledge discovery. Through data mining process different kinds of patterns that is frequent pattern and others, are discovered, evaluated and presented as knowledge. Mining data from large database repositories which contains vast amount of data is not only interesting but also essential since it yields useful and novel information which aid organizations and other individuals in decision making.........
Keyword: Data mining, frequent pattern mining, object-relational data (ORD)
[1]. Francisco Guil, A.B., and Roque Mar´ın, TSET: An Algorithm For Mining Frequent Temporal Patterns.
[2]. Li, L., B. Yang, and F. Zhou, A framework for object-oriented data mining, in Fuzzy Systems and Knowledge Discovery, 2008. FSKD'08. Fifth International Conference on. 2008, IEEE. p. 60-64.
[3]. Gole, S. and B. Tidke, Frequent itemset mining for Big Data in social media using ClustBigFIM algorithm, in Pervasive Computing (ICPC), 2015 International Conference on. 2015, IEEE. p. 1-6.
[4]. LEI XU, C.J., (Member, IEEE), JIAN WANG, (Member, IEEE), and M. JIAN YUAN, IEEE), AND YONG REN, (Member, IEEE), Information Security on Big Data: Privacy and Data Mining. IEEE Access, 2014.
[5]. Jiawei Han, M.K., Data Mining: Concepts and Techniques. 2nd ed. Data Management Systems, ed. M.R. Jim Gray. 2006, San Francisco,CA,USA: Diane Cerra. 772.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evaluation of Intrusion Detection Schemes in Wireless Sensor Network |
Country | : | India |
Authors | : | Ishu Gupta || Kishu Gupta |
Abstract: Wireless Sensor Network (WSN) consists of sensor nodes, which communicate wirelessly in order to perform some specific operation. Wireless Sensor Network (WSN) is implemented in open medium environment and the sensors nodes are fully distributed in nature. In order to communicate with each other a multi hop communication should be used........
Keyword: Anomaly-based IDS, Cluster-based IDS, Intrusion Detection System, sensor node, Signature-based IDS, Wireless Sensor Network
[1]. https://www.google.co.in/search?hl=en&site=imghp&tbm=isch&source=hp&biw=&bih=&q=wireless+sensor+network&btnG=Search+by+i mage#btnG=Search+by+image&imgrc=ok-Eklg0v_LAGM%3A.
[2]. Zapata, Manel Guerrero. "Secure ad hoc on-demand distance vector routing."ACM SIGMOBILE Mobile Computing and Communications Review 6, no. 3 (2002): 106-107.
[3]. Hu, Yih-Chun, David B. Johnson, and Adrian Perrig. "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks." Ad Hoc Networks1, no. 1 (2003): 175-192.
[4]. Hu, Yih-Chun, Adrian Perrig, and David B. Johnson. "Ariadne: A secure on-demand routing protocol for ad hoc networks." Wireless Networks 11, no. 1-2 (2005): 21-38.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Approach to Sentiment Analysis using Artificial Neural Network with Comparative Analysis of Different Techniques |
Country | : | India |
Authors | : | Pranali Borele || Dilipkumar A. Borikar |
Abstract: Sentiment Analysis is the process of identifying whether the opinion or reviews expressed in a piece of work is positive, negative or neutral. Sentiment analysis is useful in social media monitoring to automatically characterize the overall feeling or mood of consumers as replicated in social media toward a specific brand or company and determine whether they are viewed positively or negatively on the web Sentiment Analysis has been widely used in classification of review of products and movie review ratings.........
Keyword: Machine Learning, Maximum Entropy, Naïve Bayes, Neural Network, Sentiment analysis, Support Vector Machine.
[1] B. Pang, L. Lee, and S. Vaithyanathan, "Thumbs up?: sentiment classification using machine learning techniques," in Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10. Association for Computational Linguistics, 2002, pp.79–86.
[2] K. Dave, S. Lawrence, and D. M. Pennock, "Mining the peanut gallery: Opinion extraction and semantic classification of product reviews,"in Proceedings of the 12th international conference on World Wide Web. ACM, 2003, pp. 519–528.
[3] Neethu M S and Rajasree R," Sentiment Analysis in Twitter using Machine Learning Techniques", 4th ICCCNT 2013 July 4 - 6, 2013, Tiruchengode, India
[4] S.B.Kotsianta, I.D. Zaharakis and P.E. Pintelas." Machine Learning: a review of classification and combining technique",Springer,(pp.159-190).-2006
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improved MPPT strategy focused on the regulation of sliding mode for a PV device |
Country | : | India |
Authors | : | A.Pandian || Satyajit Mohanty |
Abstract: The energy produced using a photovoltaic (PV) is mainly dependent on weather factors such as
temperature and solar radiation. Given the high cost and low yield of a PV system, it must operate at maximum
power point (MPP), which varies according to changes in load and weather conditions. This contribution
presents an improved maximum power point tracking (MPPT) controllers of a PV system in various climatic
conditions. The first is a sliding mode MPPT that designed to be applied to a buck converter in order to achieve
an optimal PV array output voltage. The second MPPT is based on the incremental conductance algorithm or
Perturb-and-Observe algorithm. It provides the output reference PV voltage to the sliding mode controller
acting on the duty cycle of the DC-DC converter. Simulation is carried out in SimPower toolbox of
Matlab/Simulink. Simulation results confirm the effectiveness of the sliding mode control MPPT under the
parameter variation environments and shown that the controllers meet its objectives.
[1] N. Hamrouni, M. Jraidi, and A. Chérif, "Solar radiation and ambient temperature effects on the performances of PV pumping
System," Journal of Renewable Energies, vol. 11, no. 1, pp. 95–106, 2008.
[2] S. Premrudeepreechacharn and N. Patanapirom, "Solar-array modelling and maximum power point tracking using neural networks,"
in 2003 IEEE Bologna Power Tech Conference Proceedings, Bologna, Italy, vol. 2, pp. 5, 2003.
[3] J. Sai Kumar and Tikeshwar Gajpal, "A Multi Input DC-DC Converter for Renewable Energy Applications," International Research
Journal of Engineering and Technology (IRJET), vol. 3, no. 6, pp. 380-384, June 2016.
[4] A. Daoud and A. Midoun, "Simulation and experimental study of maximum power point tracker based on a DC/DC buck
converter," International Review of Electrical Engineering, vol. 5, no. 2, part A, pp. 514–520, April 2010.
[5] G. Petrone, G. Spagnuolo, and M. Vitelli, "Distributed Maximum Power Point Tracking: Challenges and Commercial Solutions,"
Automatika, vol. 53, no. 2, pp. 128–141, 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improved Nonlinear PID for Industrial Pneumatic Actuator Selfregulation |
Country | : | India |
Authors | : | Satish V || Bikasita Acharya |
Abstract: The present article describes the improvement of Self-regulation Nonlinear PID (SN-PID) controller.
A new function is introduced to improve the system performance in terms of transient without affecting the
steady state performance. It is used to optimize the nonlinear function available on this controller. The signal
error is reprocessed through this function, and the result is used to tune the nonlinear function of the controller.
Furthermore, the presence of the dead zone on the proportional valve is solved using Dead Zone Compensator
(DZC). Simulations and experiments were carried out on the pneumatic positioning system. Comparisons
between the existing methods were examined and successfully demonstrated..
[1] S. R. Pandian, F. Takemura, Y. Hayakawa, and S. Kawamura, "Pressure observer-controller design for pneumatic cylinder
actuators," IEEE/ASME Transactions on Mechatronics, 2002; 7: 490-499, 2002.
[2] Siti Fatimah Sulaiman, M.F. Rahmat, A.A.M.Faudz, Khairuddin Osman, S.N.S.Salim, S.I. Samsudin, A.R.Azi ra, "Enhanced
Position Control for Pneumatic System by Applying Constraints in MPC Algorithm," InternationalJournal of Electrical and
Computer Engineering (IJECE), 7(3): 1633-1642, 2017.
[3] X. Brun, D. Thomasset, and E. Bideaux, "Influence of the process design on the control strategy: application in electropneumatic
field. Control Engineering Practice, 10(7): 727-735, 2002.
[4] F. Xiang and J. Wikander, "QFT control design for an approximately linearized pneumatic positioning system," Int. J. Robust
Nonlinear Control, 13(7): 675-688, 2003.
[5] H. Schulte and H. Hahn, "Fuzzy state feedback gain scheduling control of servo-pneumatic actuators," ControlEngineering Practice,
12(8): 639-650, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Improving Learners' Reading Ability on Introduction to Linguistics Class through Two-Stay Two-Stray Method |
Country | : | India |
Authors | : | Rajnish Kumar Lohani || Nilamani Das |
Abstract: This research began from the writer's observation in the Introduction to Linguistics class at second
semester of English Education Department, Universitas Islam Madura. From the data, there were some
problems of learners, they are; 1) they felt difficult in understanding the subject of Introduction to Linguistics
because it was the new subject for them, 2) they were not active in participating teaching and learning process.
Related to the problems above, the writer tried to find the solution by choosing the best strategy, it was
Cooperative learning TWO–STAY TWO STRAY (TS-TS). This research is CAR (Classroom Action Research)
that has four steps: planning, acting, observing and reflecting. The subject of this research was the learners of
English Education Department at........
Keyword: Reading, Cooperative Learning, Two Stay Two Stray
[1]. Annas, Usman, B., & Muslem, A. (2018). THE EFFECT OF USING THE TWO STAY TWO STRAY TECHNIQUE TO
DEVELOP YOUNG LEARNERS' SPEAKING SKILLS AND MOTIVATION.pdf. ENGLISH EDUCATION JOURNAL (EEJ),
9(3),422-44.
[2]. www.jurnal.unsyiah.ac.id/EEJ/article/download/12222/9480
[3]. Eferi, M. (2018). PENINGKATAN AKTIVITAS BELAJAR SISWA DALAM MATA PELAJARAN BIOLOGI MELALUI
MODEL PEMBELAJARAN KOOPERATIF TIPE TWO STAY – TWO STRAY (TS-TS) DI KELAS XII IPA.1 SMAN 1
PASAMAN.
[4]. JURNAL MANAJEMEN PENDIDIKAN,03(01), 103–114. https://ejurnal.stkip- pessel.ac.id/ index.php/ jmp/article/view/284
[5]. Harmer, J. (2001). How to Teach English; An Introduction to the Practice of English Language Teaching. Addison Wesley
Longman Limited.