Sign language recognition is still considered challenging and complex due to involvement of random human hand movements. These movements are very inconsistent with respect to the degrees of freedom a person has on the hands during the signing process. Sign language is the language of the hearing impaired that uses fingers and hand movements in reference to head, face or body. Past research shows, 2D video-based sign language recognition systems are widely considered due to low cost camera sensors. However, the processing algorithms were complex and computationally intensive to be considered for development of complete sign language recognition system. The major difficulty in sign language recognition compared to speech recognition is to recognize simultaneously different communication attributes of a signer such as hands and head movement, facial expressions and body pose . All these attributes must be considered simultaneously for a good recognition system. The second major problem faced by designers of sign language recognition system is tracking the signer in the clutter of other information available in the video. This is addressed by many researchers as signing space . A sign language space can be created with entities such as humans or objects stored in it around a 3D body centered space of the signer. These entities are executed at a certain location and later referenced by pointing to the space. A major challenge faced by researchers to define a model for spatial information containing these entities created during the sign language dialogue.
The study focused on the postgraduate students’ utilization of Information and Communication Technologies facilities for an educational revolution in faculty of Technical and Science Education, River State University of Science and Technology, Port Harcourt, Nigeria. To elicit responses for the study, three research questions and hypotheses were formulated. One hundred (100) postgraduate students were randomly sampled across the departments; Ninety three (93) completed questionnaires which represent 93% recovery rate were analyzed for the study. Cronbach’s Alpha method was used to determine the reliability of the instrument which yielded a reliability index of 0.89. Responses were analyzed using statistical package for social sciences (SPSS) version 20, mean and standard deviation are used in answering the research questions and one-way ANOVA in testing the hypotheses at p<0.05 level of significance. The result revealed that: ICT facilities are not available for PG students’ use; the three groups of respondents significantly differed in their opinion on utilization of ICT facilities for different activities; incessant power outage with mean response of 4.00 is the most challenging to effective utilization of ICT facilities in Nigerian tertiary institutions. Based on the findings the study concluded that in spite of the potentials inherent in the use of ICT in educational process, its availability to postgraduate students for teaching and learning is abysmally low, thereby discouraging postgraduate students’ active participation and interest in utilization of the facilities for educational purposes. The researcher recommended that authorities should brace up to the challenges through acquisition and installation of ICT infrastructure and active involvement of students in ICT related activities.
Data mining has a wide number of applications ranging from marketing and advertising of goods, services or products, artificial intelligence research, biological sciences, crime investigations to high-level government intelligence. Due to its widespread use and complexity involved in building data mining applications, a large number of Data mining tools have been developed over decades. Every tool has its own advantages and disadvantages. An open-source development model usually means that the tool is a result of a community effort, not necessary supported by a single institution but instead the result of contributions from an international and informal development team. This development style offers a means of incorporating the diverse experiences Data mining provides many mining techniques to extract data from databases. Data mining tools predict future trends, behaviours, allowing business to make proactive, knowledge driven decisions. The development and application of data mining algorithms requires use of very powerful software tools. As the number of available tools continues to grow the choice of most suitable tool becomes increasingly difficult. The top six open source tools available for data mining are briefed as below Table 1.
the right method of teaching while keeping in mind the capability of the students and the curriculum. Thus, method is a way of presentation of the content in the classroom. But, it is however very important to keep in mind that a method is not an end in itself but is used to achieve the set aims of teaching. You should also keep in mind that, same method should not be used at all times but there should be flexibility in using it as for as situations, circumstances, and condition in a particular case. You should use various methods depending upon demand of the situation. The method which in a particular class under a particular circumstance, may be a total failure for other teacher. The best methods of teaching science are Teacher-Centered and Pupil-Centered. The first type of teaching methods focuses on telling, memorizing and recalling information. The students’ participation is very limited wherein they only ask questions or answer questions. Most of the time, the students are passive listeners and receive the knowledge. The teacher is center of process that goes on in the classroom. The second type of teaching process emphasizes on need, requirement, interest and capability of students. The students are active participants where in their skills and abilities are developed. Teacher and students jointly explore the different aspects of problem. The role of the teacher is to create a problematic situation, have materials and resources available to the students, and help them identify issues, state hypotheses, clarify and test hypotheses and draw conclusions. If you are keen in making lesson plans which may help you in achieving your identified objectives, then they should be stated clearly. If objectives are not clearly defined, it is impossible to evaluate a student, a lesson, a unit, a course or a program effectively. This leads to teaching disaster. Unless you have clear picture of instructional intention, you will be unable to select test items in which the objectives are clearly defined and the students know which activities are relevant for success of the teaching and learning process. A meaningfully stated objective is that clearly communicate the readers the writer’s intention. It states the behavioral outcome of students after completing a certain topic. The most important characteristics of useful objectives are that it identifies the kind of performance that will be accepted as evidence Abstract
Also termed direct instruction, explicit instruction refers to an instructional method that constructs interactions between the student and the teacher. The practice involves the teacher guiding the student through predefined instructional sequences to instill strategies used by effective learners to master concepts (Kroesbergen& Van Luit, 2003). The instructor begins by stating the learning objective, after which follows the sequence of instructions. Though each step of the sequence, an evaluation is performed to assess what the learner already know about the subject. Information obtained from these analyses is used to customize subsequent instructions, which may involve repetitive practicing of the skills learned in the curriculum. Importantly, the pace of the sequence and associated repetitive task must be determined by students’ progress and how they understand each phase. With this approach, instructional sequences involve allocating enough time for the learner to process what has been taught so that they may provide feedback on the same. Responses are frequently solicited as a means of monitoring the effectiveness of the specific strategy chosen by the instructor.
According to the Research Program for International Student Assessment (PISA) on 2015, Indonesia is ranked 63th from countries in the world, it shows that the development of education is currently progressing significantly. But the development and growth must still be followed by a supervisory function . Educational institutions are responsible for learning activities both academically and non-academically . In terms of carrying out the duties and functions carried out only can be monitored by two parties, namely related institutions and parents. One of the factors as a reference for monitoring is attendance.
related to the environment. While studies showed that heredity is an important factor in determining intelligence; it was also suggested that environment is a critical factor in determining the extent of its expression. An investigation done recently revealed that 70 percent of the differences in the twins’ I.Q. scores were attributable to inherited traits. Previous studies had suggested that about 50 percent of the differences in scores were inherited. Studies showed that the grey matter volume is strongly determined by genes, and reflected cognitive performance. It was also suggested that there is a strong genetic influence on IQ, verbal and spatial abilities, so in short our genes determine the quality of our intelligence, our ability to integrate and process information. The level of our intelligence determines how well we cope with changes in our environment. It is believed that race and culture have their share in intelligence as well, but so far there is no confirmed conclusion that intelligence varies from race to race. Environmental factors can play a role as well, but in fact they are capable of slowing down our mental processes more than enhancing it. There is no evidence to indicate that our environment can increase intelligence to a relatively high level. It is also inherently easier to degrade brain tissue than to create more complex brain tissue. Enhancements in brain structure require long periods of evolutionary selection, in addition to the availability of extraneous sources of energy. While brain degradation can happen in a relatively shorter time (Brain Matrix, 2013).
After the subject matter has been determined by literature studies it will become a reference or reference which is used as a theoretical basis in finding solutions that can solve a problem. In this step journals from existing research or books are supporting research that is currently or will be running. 3) Data Collection
14 Read more
A total of 369 Research articles discusses based on the study according to: year wise contributions of Research articles, Average number of Research articles published in per volume, Geographical distribution of research articles, and Indian and its states towards LIS research contributions.
As an effort made to this research, to identify the methods that have been done. In order to know the application of methods created by others approaching this research. So here are some studies that are close to the research that will be discussed. The results of M. A. Sudarsono and Krisnawati showed that to design and build Android Based Applications required some software and hardware, starting from system analysis to design the process of this application . Research A. Putranto explained based on the SWOT matrix, Regina Pacis High School Bogor can use the strengths to obtain opportunities. The way that can be done by SMU Regina Pacis Bogor, among others: make improving the competence of students and teachers by using existing facilities and technology; developing innovative learning methods by utilizing existing information technology channels (e- learning) and improving the quality of learning for students and teachers obtained from the technology channel . Other research Y. Astuti and D. I. Fahmasari Pinter Java website provides feature article posting for member Pinter Java website that can be used to exchange information about Java Culture, and So people who will learn Javanese culture do not need to come directly to the island of Java . From the previous research that has been described then it is necessary to develop to design sales applications in the analysis with SWOT, that is by adding feature product ranking into application design.
13 Read more
Traditionally, teaching is simply pouring curricular information to the students. It seems that learning is solely left on the part of the students while neglecting the fact that teaching only matters when learning truly occurs (Shah, 2013). The traditional scheme is, in essence, one of imposition form above and outside. It imposes adult standards, subject matters, and methods upon those who are only growing slowly toward maturity (Dewey, 1916). So the gap is so great that the required subject matter, the methods of learning and of behaving are foreign to the existing capabilities of the young. They are beyond the reach of the experience the young learners already possess. Consequently, they must be imposed; even though good teachers will use devices of art to cover up the imposition so as to relive it of obviously brutal features (Dewey, 1916; Holt, 2005; Shah, 2015). Similarly according to the traditional belief, teaching was perceived as a business just to deal with the curricular provisions without connecting to social transformation, advancement and overall personality development of the student. Existing teaching learning activities and delivery system is unsatisfactory and is not suitable for the age of 21 st
ABSTRACT: We use computers for banking and investing to shopping and communicating with others through email or chat programs. Computer and network of computer become the very important part of companies, organization and government sector. A lot of important information is stored in computers and transferred across networks and the internet. Unauthorized users may try to break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems to detect malicious activities. That helps us to re-act and stop intruders. There are two types of IDSs, network- based IDSs and host-based IDSs. A network-based IDS monitor’s network traffic and activities to find attacks, and a host-based IDS monitors activities in a computer system to detect malicious actions. This thesis is a research on using Bayesian techniques in implementing a network-based IDS that can tell us a computer process is normal (harmless) or abnormal (harmful). We combine three techniques to build a IDS. In our system k2 algorithm is applied which main purpose is to incrementally add a node to a network, it means start with a single node than add another node to complete a network. Bayesian methods utilize a search-and-source procedure to search the space of DAGs, and use the posterior density as a scoring function and finally to construct a data structure called a junction tree which can be used to calculate any query through message passing on the tree. In a past a lot of research is done on a IDS but for a wireless network is little. We have combine three techniques to make sure that network is safe from unauthorized access and attacks.
We use computers for banking and investing to shopping and communicating with others through email or chat programs. Computer and network of computer become the very important part of companies, organization and government sector. A lot of important information is stored in computers and transferred across networks and the internet. Unauthorized users may try to break into systems to have access to private information. This brings the need of a system that can detect and prevent those harmful activities. Intrusion detection systems (IDSs) monitor networks and/or systems to detect malicious activities. That helps us to re-act and stop intruders. There are two types of IDSs, network-based IDSs and host-based IDSs. A network-based IDS monitor’s network traffic and activities to find attacks, and a host-based IDS monitors activities in a computer system to detect malicious actions. This thesis is a research on using Bayesian techniques in implementing a network-based IDS that can tell us a computer process is normal (harmless) or abnormal (harmful). We combine three techniques to build a IDS. In our system k2 algorithm is applied which main purpose is to incrementally add a node to a network, it means start with a single node than add another node to complete a network. Bayesian methods utilize a search-and-source procedure to search the space of DAGs, and use the posterior density as a scoring function and finally to construct a data structure called a junction tree which can be used to calculate any query through message passing on the tree. In a past a lot of research is done on a IDS but for a wireless network is little. We have combine three techniques to make sure that network is safe from unauthorized access and attacks.
Links between an entry page and an index page or between two index pages are referred as index URLs. Links between an index p age and a thread page are referred as thread URLs. Links connecting multiple pages of a board and multiple pages of a thread are referred as page- flipping URLs. A crawler starting from the entry URL only needs to follow index URL, thread URL, and page-flipping URL to traverse EIT paths that lead to all thread pages. The challenge of forum crawling is then reduced to a URL type recognition problem. In this paper, we show how to learn URL patterns, i.e., Index-Thread-page-Flipping (ITF) regexes, recognizing these three types of URLs from as few as five annotated forum packages and apply them to a large set of 160 unseen forums packages. Note that we specifically refer to “forum package” rather than “forum site.” last section, we draw conclusions and point out future directions of research.
16 Read more
Watering plants is a job that is usually done every day, both for private plants at home, plants that exist in city parks and along sidewalks and plants that are made for cultivation. Watering these plants is one of the monotonous and routine work and usually this work is done manually by paying employees to do watering at certain times. This manual work usually experiences various problems when the work is done. One of the most serious problems is the problem of water quantity. How much water is needed by a plant that is treated so that the water used is not too much wasted, so that it becomes a Mubadzir. If this monitoring is not carried out, it can happen that the treated plants may experience excess or lack of water, resulting in plant death. Such monitoring cannot be completed with an ordinary control system, because the normal control system is regulated only when the water pump is started without taking into account the condition of the previous plant. Though the work faced can be more complex than that. The problem will be even more complex if the plant being treated is a plant that requires more specific treatment. For plants that need more intensive care, not everyone can do it, except for only those who have special expertise. Thus a special control system will be needed. In this case a fuzzy logic-based method will be applied which has 2 main parameters, namely air temperature ,  and soil moisture. It is expected that this method can regulate the flow of water needed by the plant. Information base knowledge must come from an expert in the field of plants.
Abstract: Language is core medium of communication and translation is core tool for the understand the information in unknown language. Machine translation helps the people to understand the information of unknown language without the help of Human translator. This study is brief introduction to machine Translation and the solution for homographs. machine translation have been developed for many popular languages and many researches and developments have been applied to those languages but a significant problem in Persian (the language of Iranian, Afghani, etc.) is detecting the homographs which is not generally problematic in any other languages except Arabic. Detection of homographs in Arabic have been extensively studied. However Persian and Arabic share 28 characters, having only 4 different characters, they are two quite different languages. Homographs, words with same spelling and different translations are more problematic to detect in Persian because not all the pronounced vowels are written in the text (only 20% of vowels are written in the text) so the number of homographs in Persian is about thousands of times more than in other languages except Arabic.
42 Read more
The acoustic biometrics technology provides a higher level of safety than other solutions because biometrics relies on more than one physical property. Sound biometrics engines take into account sound behavior, what is being said, and countless audio features, . These features are measured indirectly, given the data that is generated by the factors of how you speak, but are not exclusive to these physical properties. The information provided by these features is hidden by voice. The task of acoustic biometrics is to try to match recording samples that also contain that hidden information with experimental models containing the information. In addition, there are things that you can change around your voice and things that you cannot change, . For example, you cannot change the length of the vocal paths, the basic frequency of your voice, etc., but you can change the pitch, accent, speed, and speed. These traits that you can change are what humans use to recognize and identify sounds, which also depend on inherent and insincere contributors , , .
The study of thermoelastic states of structures and their elements is an urgent problem of mathematical modeling. One of the main trends in the development of modern technology is the widespread use for the manufacture of various designs of composite materials consisting of structural components with various thermo- mechanical properties. The effectiveness of design solutions largely depends on the correct consideration of the thermo-mechanical behavior of the composite material under thermo-mechanical loads.
In proactive schemes, also known as Table-driven approaches, every node continuously maintains the complete routing information of the network. When a node needs to forward a packet, the route is readily available; thus there is no delay in searching for a route. However, for a highly dynamic topology, the proactive schemes spend a significant amount of scarce wireless resource in keeping the complete routing information correct. E.g. Distance Vector Routing, Link State Routing.
Abstract - PT Rumah Sakit Mary Cileungsi Hijau as a big company providing health care and had many employee’s. Those employee’s data had to well organized. Calculating and controlling the schedule working which is divided 24 hours each day. Efectivity and efficiency time schedule in payroll unit is question abled if not supported by an information system which is can control the schedule perfectly.Applying the quality and centered information system hopefully can support efficiency and efffectivity employee's working time schedule and can give an accurate information administration employee’s data for the leader to control hospital operation. One of company effort to support that goals is implementing the good computerized system, which is can give fast and accurate information.
13 Read more