Abstract: On-line handwritten scripts are usually dealt with pen tip traces from pen-down to pen-up positions. Time evaluation of the pen coordinates is also considered along with trajectory information. However, the data obtained needs a lot of preprocessing including filtering, smoothing, slant removing and size normalization before recognition process. Instead of doing such lengthy preprocessing, this paper presents a simple approach to extract the useful character information. This work evaluates the use of the counter- propagation neural network (CPN) and presents feature extraction mechanism in full detail to work with on-line handwriting recognition. The obtained recognition rates were 60% to 94% using the CPN for different sets of character samples. This paper also describes a performance study in which a recognition mechanism with multiple thresholds is evaluated for counter-propagation architecture. The results indicate that the application of multiple thresholds has significant effect on recognition mechanism. The method is applicable for off-line character recognition as well. The technique is tested for upper-case English alphabets for a number of different styles from different peoples.
Abstract: This study aimed to develop and initially validate an instrument that measures social competency among tertiary level faculty members. A review of extant literature on social competence was done. The review of extant literature led to the writing of the items in the initial instrument which was evaluated by 11 Subject Matter Experts (SMEs). The SMEs were either educators or psychologists. The results of the evaluations done by the SMEs served as bases for the creation of the pre-try-out instrument used in the first trial-run. Insights from the first trial-run participants led to the development of the main try-out instrument used in the final test administration. One Hundred Forty-one participants from five private Higher Education Institutions (HEIs) in the National Capital Region (NCR) and five private HEIs in Central Luzon in the Philippines participated in the final test administration. The reliability of the instrument was evaluated using Cronbach-s Coefficient Alpha formula and had a Cronbach-s Alpha of 0.92. On the other hand, Factor Analysis was used to evaluate the validity of the instrument and six factors were identified. The development of the final instrument was based on the results of the evaluation of the instrument-s reliability and validity. For purposes of recognition, the instrument was named “Social Competency Inventory for Tertiary Level Faculty Members (SCI-TLFM)."
Abstract: This paper explores the use of project work in a
content-based instruction in a Rajabhat University, a teacher college,
where student teachers are instructed to perform teaching roles
mainly in basic education level. Its aim is to link theory to practice,
and to help language teachers maximize the full potential of project
work for genuine communication and give real meaning to writing
activity. Two research questions are formulated to guide this study:
a) What is the academic achievement of the students- writing skill
against the 70% attainment target after the use of project to enhance
the skill? and b) To what degree is the development of the students-
writing skills during the course of project to enhance the skill? The
sample of the study comprised of 38 fourth-year English major
students. The data was collected by means of achievement test,
student writing works, and project diary. The scores in the summative
achievement test were analyzed by mean score, standard deviation,
and t-test. Project diary serves as students- record of the language
acquired during the project. List of structures and vocabulary noted in
the diary has shown students- ability to attend to, recognize, and
focus on meaningful patterns of language forms.
Abstract: In order to make surfing the internet faster, and to save redundant processing load with each request for the same web page, many caching techniques have been developed to reduce latency of retrieving data on World Wide Web. In this paper we will give a quick overview of existing web caching techniques used for dynamic web pages then we will introduce a design and implementation model that take advantage of “URL Rewriting" feature in some popular web servers, e.g. Apache, to provide an effective approach of caching dynamic web pages.
Abstract: Computations with higher than the IEEE 754 standard double-precision (about 16 significant digits) are required recently. Although there are available software routines in Fortran and C for high-precision computation, users are required to implement such routines in their own computers with detailed knowledges about them. We have constructed an user-friendly online system for octupleprecision computation. In our Web system users with no knowledges about high-precision computation can easily perform octupleprecision computations, by choosing mathematical functions with argument(s) inputted, by writing simple mathematical expression(s) or by uploading C program(s). In this paper we enhance the Web system above by adding the facility of uploading Fortran programs, which have been widely used in scientific computing. To this end we construct converter routines in two stages.
Abstract: The article emphasizes the ideological commitment of
the philosopher Emil Cioran. It presents firstly Cioran's works on the
theme announced by the title, then the European context that
determined the political option of Cioran and a brief analysis of his
relationship with History during his French period. The anti-
Semitism of Cioran was favored by his attachment to a few
philosophers, but also by the European extremist and anti-Semitic
context. The article seeks to demonstrate that the philosopher Cioran,
known more for his pessimism and nihilism, maintained in time an
obsessive relationship with History. His political philosophy is as
important as his subjective philosophy, better known than the former.
Abstract: Weblog is an Internet tool that is believed to possess
great potential to facilitate learning in education. This study wants to
know if weblog can be used to promote students- critical thinking. It
used a group of secondary two students from a Singapore school to
write weblogs as a means of substitution for their traditional
handwritten assignments. The topics for the weblogging are taken
from History syllabus but modified to suit the purpose of this study.
Weblogs from the students were collected and analysed using a
known coding system for measuring critical thinking. Results show
that the topic for blogging is crucial in determining the types of
critical thinking employed by the students. Students are seen to
display critical thinking traits in the areas of information sourcing,
linking information to arguments and viewpoints justification.
Students- criticalness is more profound when the information for
writing a topic is readily available. Otherwise, they tend to be less
critical and subjective. The study also found that students lack the
ability to source for external information suggesting that students
may need to be taught information literacy in order to widen their use
of critical thinking skills.
Abstract: In recent years, everything is trending toward digitalization
and with the rapid development of the Internet technologies,
digital media needs to be transmitted conveniently over the network.
Attacks, misuse or unauthorized access of information is of great
concern today which makes the protection of documents through
digital media a priority problem. This urges us to devise new data
hiding techniques to protect and secure the data of vital significance.
In this respect, steganography often comes to the fore as a tool for
hiding information. Steganography is a process that involves hiding
a message in an appropriate carrier like image or audio. It is of
Greek origin and means "covered or hidden writing". The goal of
steganography is covert communication. Here the carrier can be sent
to a receiver without any one except the authenticated receiver only
knows existence of the information. Considerable amount of work
has been carried out by different researchers on steganography. In this
work the authors propose a novel Steganographic method for hiding
information within the spatial domain of the gray scale image. The
proposed approach works by selecting the embedding pixels using
some mathematical function and then finds the 8 neighborhood of
the each selected pixel and map each bit of the secret message in
each of the neighbor pixel coordinate position in a specified manner.
Before embedding a checking has been done to find out whether the
selected pixel or its neighbor lies at the boundary of the image or not.
This solution is independent of the nature of the data to be hidden
and produces a stego image with minimum degradation.