Large-Scale Thai Statistical Machine Translation
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Yoshida Akiyo Justin.Pdf
iii Title: The Perceptions of Native English Speakers Regarding Thai Nicknames Based on English Loanwords Author: Mr. Justin Akiyo Yoshida Degree: Master of Arts in English Language Studies Rajabhat Maha Sarakham University Advisors: Assistant Professor Dr. Sooksil Prasongsook Assistant Professor Dr. Mayureesirin Siriwan Year: 2019 ABSTRACT The objectives of this research were 1) to identify Thai nicknames that are loanwords from the English language within a sample group and 2) determine the reasons they were chosen. Another objective 3) was to determine how native English speakers perceive Thai nicknames. It was necessary to identify Thai nicknames that were loanwords from the English language, as well as determine if/ why English loanwords were purposefully chosen as nicknames. The methods for data collection were surveys of 155 parents and teachers of children with foreign nicknames and semi-structured interviews of 29 of that group. Determining how these nicknames were perceived by native English speakers was achieved by analyzing previous studies of nicknames and loanwords used by Thai speakers of English during conversation in English. Then, 100 native English speakers were surveyed and interviewed about what they thought of nicknames on the list collected in the first survey. The method of data analysis was content analysis and statistics were expressed in simple percentages. The results from the survey of parents at the chosen school showed that approximately one in six students had a nickname that may have originated from English. The main reasons nicknames were chosen were for (perceived) good meaning and how they sound. However, the results showed that many nicknames and meanings perceived to be NES ( Native English Speaker’ s) English by Thais are actually not, resulting in names that may sound strange or carry a negative meaning. -
Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability -
Mcafee Foundstone Fsl Update
2017-SEP-12 FSL version 7.5.958 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 22374 - (MSPT-Sept2017) Microsoft Windows NetBIOS Remote Code Execution (CVE-2017-0161) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-0161 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in NetBIOS. Successful exploitation by a remote attacker could result in the execution of arbitrary code. 22388 - (MSPT-Sept2017) Microsoft Internet Explorer Memory Corruption Remote Code Execution (CVE-2017-8749) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-8749 Description A vulnerability in some versions of Microsoft Internet Explorer could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Internet Explorer could lead to remote code execution. The flaw is due to a memory corruption error. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document. 22404 - (MSPT-Sep2017) Microsoft Win32k Graphics Remote Code Execution Vulnerability (CVE-2017-8682) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-8682 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. -
How Thai Businesses Utilize English in Their Product Names
Kasetsart Journal of Social Sciences 38 (2017) 123e128 Contents lists available at ScienceDirect Kasetsart Journal of Social Sciences journal homepage: http://www.elsevier.com/locate/kjss How Thai businesses utilize English in their product names * Navaporn Sanprasert Snodin a, , Jirajittra Higgins b, Surakarn Yoovathaworn c a Department of Foreign Languages, Faculty of Humanities, Kasetsart University, Bangkok 10900, Thailand b Chulalongkorn University Language Institute, Chulalongkorn University, Bangkok 10330, Thailand c Administrative and Clerical Division, Faculty of Science, Mahidol University, Bangkok 10400, Bangkok article info abstract Article history: This paper investigated the names given to Thai local community products and provides a Received 8 April 2016 description of the use of the English language in naming products in Thailand. The Received in revised form 6 October 2016 business names of Thai local products under the program One Tambon One Product Accepted 7 October 2016 (OTOP) were selected for analysis, focusing on language characteristics and semantic Available online 12 April 2017 appropriateness by using onomastics to some extent. The data consisted of 1,304 names from five product categoriesdfood, drinks, clothing and accessories, handicrafts and Keywords: ornaments, and inedible herbs, as provided in the database of tambons and OTOP prod- brand naming, ucts. Thai product names in English, some of which only Thais can understand, show code-mixing, language creativity, reflecting Thai identity within English usage in the local setting. One Thai local products problematic area concerns the lack of semantic appropriateness of some English names, as the names are sometimes not relevant to the product type. Thai entrepreneurs need support in naming their products to achieve international intelligibility if their products are to be marketed to international customers. -
Concept and Rule Based Naming System
Issues in Informing Science and Information Technology Volume 3, 2006 Concept and Rule Based Naming System Chakkrit Snae and Michael Brückner Naresuan University, Phitsanulok, Thailand [email protected] [email protected] Abstract Names are important in many societies, even in technologically oriented ones which use e.g. ID systems to identify individual people. There are many elements of personal names which vary in different cultures. Names such as surnames are the most important as they are used in many proc- esses, such as identifying of people and genealogical research. On the other hand variation of names can be a major problem for the identification and search for people, e.g. web search or se- curity reasons. We show name variations for different cultures to guide the implementation of a rule based naming system, currently worked out for Thai names. We characterize the LIG (Levenshtein, Index of Similarity Group (called ISG), and Guth) algorithms which help to find reasonable variants of names and use an ontology of names to capture the meaning of the variants which are based on Thai naming methodologies and rules. A further benefit of this process is an optimized name searching. Keywords: personal names, name variations, name matching, ontology, rule based system Introduction Names are used for identifying persons, places, things and even ideas or concepts. Names serve for labelling of categories or classes and for individual items. They are properties of individuals which are of greater importance in most communities. In technologically oriented societies such as modern Western the reference between a name as a label and the person is not as obvious as in small tribal societies. -
Chapter 5 Citations in Thesis First Format ∗∗∗
Chapter 5 Citations in thesis First format ∗∗∗ Citation means to provide the source of information that the author has used in any working papers as evidence which makes the working papers acceptable and reliable. Furthermore, citation serves to give credit to the previous author and to show the honest intention of the author not to copy others’ information without reference (Plagiarism): Plagiarism is a very serious academic offence that will absolute not to be tolerated. Graduate students must use citations in working papers of any report or thesis. The first format of citations in the thesis in this handbook sets for The American Psychological Association (APA) submitted to Publication Manual of the American Psychological Association 5 th ed. 2001 and APA Style Electronic Formats, 2001 which is the recommended national standard and is largely used all over the world. Some parts have been adapted for citations in Thai language, which may have some characteristics and information that are different from English papers. Citations in the thesis should be referenced in two parts of thesis; in the body of the text and at the end of the chapter or References page. 1. Reference Citations in Text Reference Citations in Text means to provide the sources of information with a combination of reference and context to indicate the source of a statement. Students may choose either of the citation styles from the followings: 1.1 Author-Date method of citation Author-Date method of citation is a citation designating the name of author and year of publication in front of or following the statement to show the source, and may include page numbers of the referenced document if necessary. -
[ EVEREST Ultimate Edition ]
[ EVEREST Ultimate Edition ] ---------------------------------------- Versi EVEREST v4.50.1330/id Modul Pengukuran 2.3.224.0 Home page http://www.lavalys.com/ Tipe Laporan Bimbingan laporan Komputer TANSISCOTBK09K Generator Nain Sistem Operasi Microsoft Windows XP Profe ssional 5.1.2600 (WinXP Retail) Tanggal 20110510 Jam 06:23 [ Ringkasan ] ---------------------------------------- Komputer: Tipe Komputer ACPI Multiprocessor PC Sistem Operasi Microsoft Windows XP Pro fessional Paket Layanan OS Service Pack 3 Internet Explorer 6.0.2900.5512 DirectX 4.09.00.0904 (DirectX 9. 0c) Nama Komputer TANSISCOTBK09K Nama Pengguna Nain Domain Masuk TANSISCOTBK09K Tanggal / Jam 20110510 / 06:23 Motherboard: Tipe CPU Intel Pentium 4, 3000 MH z (15 x 200) Nama Motherboard Dell OptiPlex GX270 Chipset Motherboard Intel SpringdaleG i865G Memori Sistem 512 MB (DDR SDRAM) DIMM2: Infineon HYS64D32000GU7 256 MB PC2100 DDR SDRAM (2.5337 @ 142 MHz) (2.0336 @ 133 MHz) DIMM3: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) DIMM4: Hynix HYMD216 646D6JD43 128 MB PC3200 DDR SDRAM (3.0338 @ 200 MHz) (2.5337 @ 166 MHz) (2.0226 @ 133 MHz) Tipe BIOS Phoenix (05/17/04) Port Komunikasi Communications Port (COM 1) Port Komunikasi ECP Printer Port (LPT1) Layar: Adapter Video RADEON 9600 Series Secon dary (256 MB) Adapter Video RADEON 9600 Series (256 MB) Akselerator 3D ATI Radeon 9600 (RV350) Monitor NEC V520 [15" CRT] (2Y 00657TB) Multimedia: Adapter Suara Analog Devices AD1981B(L ) @ Intel 82801EB ICH5 AC'97 Audio Controller [A2/A3] Adapter Suara BrookTree Bt878 Video Ca pture Device Audio Section Penyimpanan: Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler IDE Intel(R) 82801EB Ultra A TA Storage Controllers Kontroler Penyimpanan A2222176 IDE Controller Drive Disk JetFlash Transcend 8GB U SB Device (7 GB, USB) Drive Disk Kingston DataTraveler 2. -
Bridge to a Brighter Tomorrow: the Patani Malay-Thai Multilingual Education Programme
BRIDGE TO BRIDGE TO A BRIGHTER TOMORROW: The Patani Malay-Thai Multilingual Education Programme Multilingual Education Programme Malay-Thai Patani The ©UNICEF Thailand/2016/Preechapanich BRIDGE TO A CONTACT US Facebook: facebook.com/unicefthailand BRIGHTER TOMORROW: Twitter: twitter.com/unicef_thailand UNICEF Thailand IG: @UNICEF_Thailand The Patani Malay-Thai Multilingual 19 Phra Atit Road LINE: UNICEF Thailand Education Programme Pranakorn, Bangkok 10200 Youtube: youtube.com/unicefthailand Thailand Website: www.unicef.or.th Phone: +66 2 356 9499 To donate Fax: +66 2 281 6032 Phone: +66 2 356 9299 Email: [email protected] Fax: +66 2 356 9229 Email: [email protected] Mahidol University Research Institute for Languages and Cultures of Asia การศึกษาที่นี่ส�าคัญมาก ให้พยายามจัดให้ดี ให้พลเมืองสามารถพูดไทยได้ Education in this place is very important. Strive to manage it well. Enable the people to speak the Thai language. King Bhumibol Adulyadej (1927-2016) On the occasion of His Majesty’s visit to Yala Province 23 March 1959 Engraved in stone outside Regional Education Office 8 Yala Province UNESCO King Sejong Literacy Prize Awarded to the Research Institute of Languages and Cultures of Asia, Mahidol University UNESCO Headquarters, Paris 8 September 2016 In Recognition of the Patani Malay-Thai Multilingual Education Programme © United Nations Children’s Fund (UNICEF) Bangkok, Thailand 2018 ISBN: 978-974-680-426-4 ISBN (E-Book): 978-974-680-424-0 Published by the United Nations Children’s Fund (UNICEF) UNICEF Thailand Country Office 19 Phra Atit Road, Phra Nakorn District, Bangkok 10200 Thailand Telephone: 02 356 9400 Fax: 02 281 6032 Website: www.unicef.org/thailand © UNICEF Thailand/2016/Preechapanich EXECUTIVE SUMMARY Many children are being left behind by the education system in Thailand Thailand has made considerable progress over the past two decades in increasing access to primary and secondary schooling through high levels of government investment in education. -
Towards a Computerization of the Lao Tham System of Writing
First International Conference on Lao Studies - Dekalb, 20-22 May 2005 Towards a Computerization of the Lao Tham System of Writing Grégory KOURILSKY Vincent BERMENT [email protected] [email protected] (1) (1) (2) (1) INALCO (2) GETA-CLIPS (IMAG) 2, rue de Lille BP 53 75343 Paris Cedex 7, France 38041 Grenoble Cedex 9, France http://www.inalco.fr http://www-clips.imag.fr/geta/ ABSTRACT – Although the subject of under-resourced languages is a problem often taken into consideration, one omits to make the distinction with under-resourced scripts . The Tham script of Laos, used to write Buddhist Texts, is one of the two official writing systems used in Lao P.D.R. (Laos). But if the other one – the so-called —laic“ Lao script – is now quite well computerized (numerous fonts, input software, word processors, Unicode area), the Tham script seems to have always been forsaken by modern technologies (typewriters and computers). And this phenomenon does not seem to be being reversed soon since the Unicode Standard does not integrate it in any zone. Understanding the sociological and technical reasons of this neglect, we present an approach to mend it. RÉSUMÉ – Bien que le sujet des langues peu dotées informatiquement soit un problème régulièrement abordé, on omet souvent de distinguer le cas des écritures peu dotées. L'écriture tham du Laos, employée pour noter les textes bouddhiques, est l'une des deux écritures offielles de la République Démocratique Populaire Lao (Laos). Si l'écriture lao proprement dite (appelée parfois par opposition écriture lao —laïque“ ) est aujourd‘hui relativement bien dotée informatiquement (nombreuses polices de caractères, logiciels de traitement de texte, zone Unicode), l‘écriture tham semble avoir toujours été délaissée des techniques modernes de saisie (mécanique aussi bien qu‘informatique). -
The Old New Thing: Practical Development Throughout The
Praise for The Old New Thing “Raymond Chen is the original raconteur of Windows.” —Scott Hanselman, ComputerZen.com “Raymond has been at Microsoft for many years and has seen many nuances of Windows that others could only ever hope to get a glimpse of. With this book, Raymond shares his knowledge, experience, and anecdotal stories, allowing all of us to get a better understanding of the operating system that affects millions of people every day. This book has something for everyone, is a casual read, and I highly recommend it!” —Jeffrey Richter, Author/Consultant, Cofounder of Wintellect “Very interesting read. Raymond tells the inside story of why Windows is the way it is.” —Eric Gunnerson, Program Manager, Microsoft Corporation “Absolutely essential reading for understanding the history of Windows, its intricacies and quirks, and why they came about.” —Matt Pietrek, MSDN Magazine’s Under the Hood Columnist “Raymond Chen has become something of a legend in the software industry, and in this book you’ll discover why. From his high-level reminiscences on the design of the Windows Start button to his low-level discussions of GlobalAlloc that only your inner-geek could love, The Old New Thing is a captivating collection of anecdotes that will help you to truly appreciate the difficulty inherent in designing and writing quality software.” —Stephen Toub, Technical Editor, MSDN Magazine This page intentionally left blank THE OLD NEW THING This page intentionally left blank THE OLD NEW THING Practical Development ThroughoutT the Evolution of Windows Raymond Chen Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. -
Abstract Functions, 281 Accelerators, 215–216 Accessibility, 57, 472–480
Chen_Rev_Index 12/6/06 11:09 AM Page 497 Index Abstract functions, 281 Application Compatibility Toolkit, 287–288 Accelerators, 215–216 Application Data vs. My Documents, 450–451 Accessibility, 57, 472–480 Application Verifier, 288 Active Accessibility feature, 480 Arithmetic library for Calc, 337 AddRef method, 274 Arrows,up-down controls,354–355 Address spaces, large, 451–455 Auto-reset events, 112–114 Adjustor thunks, 274–275 Advanced Options dialog, 2–3, 57 Background operations in power management, All Programs list, 403–404 455–457 Alt key for blinking caret, 343–344 Backward compatibility, 283 Alt+Esc hotkey, 58 16-bit DOS and Windows, 288–290 Alt+Tab order, 58–59 BIOS clock, 301–302 Always on top, 58, 436 bugs in, 293–294 Analog clocks, 51 Deer Hunter, 293 Animal-named functions, 22–23 DirectX video driver, 298–299 Animations, stealing, 305 Display Control Panel, 308–309 ANSI code page, 379–390 drive letters, 292–293 converting with Unicode, 391–392 error code, 297–298 UTF-8 as, 431–432 GetWindowText, 45–46 ANSI strings, 164 hardware, 141–142 Anti-aliased fonts, 459–462 intentional crashes, 283 Anti-piracy holograms, 25–26 listview controls, 300–301 Anti-symmetry rule, 243 operating system patches, 299–300 AOL CDs, 487 Printers Control Panel, 306–307 497 Chen_Rev_Index 12/6/06 11:09 AM Page 498 498 index Backward compatibility (Continued) BS_* button styles, 232, 234 QueryInterface, 303–305 “Bug Bunny,” 494 reserved filenames, 290–292 Bug reports, whimsical, 482–483 Shell Folders key, 294–296 Bugs undocumented behavior, 286–288 -
Hybrid Name Matching Methods for Rule Based Thai Naming System
NU Science Journal 2006; 2(2): 139 - 150 Hybrid Name Matching Methods for Rule Based Thai Naming System Chakkrit Snae* and Michael Brueckner Department of Computer Science, Faculty of Science, Naresuan University, Phitsanulok 65000 Thailand *Corresponding author. E-mail: [email protected] ABSTRACT Names are important in many societies, even in technologically oriented ones which use ID systems or other ways to identify individual people. There are many elements of personal names which vary in and between the different cultures. Names such as personal surnames are the most important as they are used in many processes, such as identifying of people, record linkage and for genealogical research as well. On the other hand, variation of names can be a major problem for the identification and search for people, e.g. web search or security reasons. We show name variations for different cultures to guide the implementation of a rule based naming system, currently worked out for Thai names. We discuss characteristics of the LIG (Levenshtein, Index of Similarity Group (called ISG), and Guth) algorithms which help to find reasonable variants of names. A further benefit of this process would be an optimization for name searching. Keywords: personal names, name variations, name matching, rule based system INTRODUCTION Names are used for identifying persons, places, things and even ideas or concepts. Names serve for labelling of categories or classes and for individual items. They are properties of individuals which are of greater importance in most communities. In technological oriented societies such as modern Western the reference between names as a label and the person is not as obvious as in small tribal societies.