Wednesday, August 26, 2020
Studying The Ethical Issues In Elearning Sites Information Technology Essay
Contemplating The Ethical Issues In Elearning Sites Information Technology Essay My subject on this paper is about E-Learning locales the social, proficient, and moral issues in eLearning destinations. This subject is an extremely wide one as there are different eLearning sites like Learn2.com, Blackboard, Intelinfo.com, Worldwildlearn.com, Wannalearn.com, Oasis also, e.t.c. I will pick Oasis in addition to as my contextual investigation since I have use it and Ive seen out it works. Above all else, as the world is turning into a worldwide world step by step most University everywhere throughout the present reality spins around the Internet. This comprises of web based contemplating or eLearning administrations over electronic frameworks, for example, the Internet and different methods like utilizing the CD-ROM and other electronic intends to peruse rather than printed books. This realized the name eLearning. The spread of rapid Internet among networks and the multiplication of eLearning among individuals make the two chances and difficulties for Websites. On one hand, eLearning may diminish a considerable lot of impediments related with a segregated area by diminishing separation, correspondence, and data cost and expanding access to bring down cost providers and administrations. For instance Oasis also, This is an eLearning webpage which Middlesex college utilizes, where both understudy and staffs or instructors of Middlesex college can get to the website from any piece of the world either at home or workplaces at some random opportunity to get most recent and refreshed data in regards to their examinations and scholastic status all they expected to get to the website is the entrance to the web internet browser, it is intelligent that understudy can peruse or download their talk slides online just as getting refreshed data about their course work, task, result status, accommodation of task, online evaluation e.t.c from any piece of the world with only a tick of a mouse and they can too visit with their kindred understudies and teacher onl ine with only a tick of a mouse on who is online connect to associate and get refreshed data in regards to their talks or assignments accommodation e.t.c E-LEARNING Sites: e-Learning locales are destinations with key methods for training, that centers around innovation inside an instructive establishment that is eager to receive it anyway it isn't just e-learning destinations that requires mechanical development it is for business need too, this is a vital method of learning or considering that can be accomplished by utilizing electronic conveyance strategies, for example, web based learning conveyance bundles, online video conferencing, sites or email to Administer the associations among educator and understudies. It can likewise be any virtual demonstration or strategy that individuals uses to make sure about data aptitudes and information by means of the web. Points of interest of e-learning destinations: It diminishes travel cost and time since you can get to it from anyplace you are understudies will have the choice to choose their learning materials that meets their degree of learning and premium Students or understudies can concentrate any place they approach Internet Adaptability to join conversations in the release board strung conversation zones at any hour. improvement of PC and Internet aptitudes that are transferable to different aspects of students lives Weaknesses of e-learning locales: Absence of recognizable structure and schedule Questionable Internet associations can be baffling A few courses, for example, customary hands-on courses can be hard to recreate Unmotivated students or those with poor investigation propensities may fall behind. Moral, Legal, Social and expert issues on e-Learning locales Morally issues on e-learning destinations: the moral issues on e-taking in locales for the most part start from ill-advised use of this powerful asset known as Internet. It isn't hard to undermine the web than versus. Understudies either concentrating in a college or enlist on an online program can without much of a stretch procure deceitful information or data and use it for their coursework, tasks, and Assignments. Along these lines it is significant that the product designer for eLearning destinations is mindful structure and made do with satisfactory balanced governance to limit deceptive practices by which understudy can swindle. This moral issues can be settled if the e-learning site programming engineer focus on the structure of the e-learning site programming. Lawful issues on e-learning destinations: There are different lawful issues encompassing the utilization of e-learning locales in considering which we as a whole should know about, The most troublesome (and frequently covering) legitimate issues are found in the regions of copyright, information insurance and authorizing. Copyright: There is a comprehension of reasonable use (except if determined something else) that permits sensible utilization of materials for private examination. Making different duplicates of assets without the express consent of the copyright proprietor, or a copyright explanation recognizing this as a reasonable use, isn't satisfactory. Information security: The site of the Information Commissioners Office (http://www.ico.gov.uk) cites eight standards of information assurance that apply to each one of those handling and holding individual information. Individual information includes the two realities and feelings about an individual, and the Data Protection Act applies to any close to home data held in an organized recording framework. Information must be: decently and legitimately prepared, handled for constrained purposes, sufficient, significant and not over the top, precise, not kept longer than would normally be appropriate, prepared as per the information subjects rights secure, and not moved to nations without satisfactory insurance. Permitting: The permit is the lawful proclamation of how one can utilize an e-learning destinations copyrighted material. In an instructive setting, the permit will for the most part express the quantity of machines a bit of bought programming might be utilized on. Typically, instructive foundations will require a site permit, a multi-client permit or numerous duplicates of single-client licenses. Programming and different assets must be utilized inside the provisions of the permit. Social issues on e-Learning locales: To distinguish the social issues being developed of an e-learning application in an instructive organization, I will quickly sanction the presentation of the field of PC morals as identified with social issues. Capacity of information: The straightforwardness with which information are spared utilizes reconnaissance, observing and spyware strategies extremely simple from the specialized perspective. Flightiness of personality: Present day unclear characters make conceivable taking different people character, fashioning of a message, or communicating something specific namelessly like spam for instance. There is a continuous moral discussion about the advantages and disadvantages of secrecy. At the point when confronted with social issues, an expert ought to have the option to settle on sound and very much finished up decision that will stifle the social factors that will in general revoke the norms set by the training organization. Proficient Issues on e-learning locales Planning e-learning situations for quality expert instruction is a test for training originators, as the proceeding with training of essentially moving courses online can be shockingly crippling. We contend that as colleges endeavor to instruct for greatness in proficient practice, plan approaches for the e-learning segments must be conceptualized in a more extensive perspective on a contemporary learning condition including incorporated virtual and physical measurements. These are extensively considered in a coordinated manner to encourage learning encounters giving an accentuation on grounded practice. The plan of our interface and writing framework is affected to some extent by the structure of the e-Learning content. Suggestion or things that ought to be placed as a primary concern when creating e-learning destinations: I need to outline out some prescribed procedures techniques for the eLearning. These procedures are not new. The vast majority of these methodologies are being utilized in some structure in numerous schools and colleges it is use on desert garden in addition to also, I have arranged a rundown of what techniques can be actualized inside the system of given programming. I myself have go through a portion of this methodologies when composed my online appraisal on Oasis in addition to. The accompanying ways are intends to handle the issues of cheating, written falsification, and copyright infringement inside the structure of an eLearning programming like desert spring in addition to. They can assist with lessening or forestalling the issue of cheating, literary theft and copyright infringement. Make online test accessible for only scarcely any days or a day that it would be taken Breaking point the time on the test When picked answer ought not be return to Set deferent inquiries for every understudy to evade spillage of answers Cause understudy to take part in an online conversation gathering Give a short test during on the web meeting Understudies ought to be mentioned to hand their venture over for copyright infringement check End: E-Learning webpage programming substance and Internet applications have change method of educating and learning and have likewise make new issues around morals and responsibility. The furthest point outcome of the eLearning destinations has made the two promoters and depreciators. A few specialists state that the effective use of eLearning programs seems to pivot fundamentally on the trust and genuineness of the focused on remote students. Be that as it may, while making drawing in programming, program or substance, the genuineness and trustworthiness of the understudies isn't really a significant thought. Hence like in any college customary projects, the exactness, right parts, controls, exercises and assessment strategies have additionally become basic issues for eLearning destinations. Accordingly adjacent to concentrating on the look and fill of the e-learning site, close consideration ought to be paid to the plan, nature of substance, conveyance practices and the executives of e Learning destinations.
Saturday, August 22, 2020
Steam Engine Research Paper Example | Topics and Well Written Essays - 3000 words
Steam Engine - Research Paper Example The fundamental motivation behind the fixed steam motors is to siphon and drive processes by creating power. While presented in the eighteenth century, these motors kept on being created in enormous numbers all through the nineteenth century, and the greater part of the piece of the twentieth century until progressions made in the electrical field prompting the pragmatic utilization of electric force and the improvement of the interior ignition motor had their spot. The utilization of the fixed steam motors quickened between the timeframe of 1750 and 1850 yet began to bit by bit decrease a while later when further developed and versatile power fueled motors started to be presented. In spite of the fact that the utilization of inward burning motors turned out to be progressively across the board later, this paper targets focusing on the way that the significance of endeavors prompting the disclosure of steam force and creation of first monetarily fruitful steam motor can't be denied a nd ought to never be ignored while thinking about the innovative developments acquainted earlier with 1850. Fixed steam motors have frequently been confused with different sorts of motors presented during the time steam motors were a work in progress process. In any case, a little examination into this issue demonstrates that they can be recognized and remain rather than train motors utilized for railroads, footing motors utilized for assembling streets, steam vehicles, and farming motors utilized for furrowing and gathering fields. The steam motor is apparently viewed as the most significant innovation of the mechanical insurgency and the writing looked into in this paper targets underlining this case the steam motor because of different components was without a doubt an... This article focuses on that the world saw a supported development in the conspicuous impacts applied by innovation related upheavals which start to reform each part of day by day life to improve things. Period stretching out from 1750 to 1850 is portrayed by the transitional difference in the manual and creature based work into basic machine-based assembling. This paper makes an end that the steam motor has consistently stayed in spotlight in the history. After Savery, Newcomen assumed an immense job of basic nature in propelling the endeavors started by the past specialist and presented a variant of steam motor which not just conquered the issues related with the previous model yet additionally helped in significantly encouraging the human life by cultivating the change of manual-based work into machine-based assembling. At that point Wattââ¬â¢s profoundly viable twofold acting rotative steam motor and later forms of steam motors developed in later years filled in as the reason for an entirely different rush of current or progressive steam innovation. General agreement is that however the steam motor was a fundamental early component of the modern transformation, still this innovation remained underused for the vast majority of the piece of that period as a large portion of the businesses at that point kept on depending on wind and wa ter power alongside manual and creature based work to run machines. The revelation of steam power framed the foundation of the steam motor assembling process and numerous researchers and architects whose work goes before 1850 are engaged with constantly building up this innovation.
Thursday, August 20, 2020
MLA Format in Essays
MLA Format in Essays MLA Format in Essays MLA Format in Essays: Expert Tips on Proper Formatting When it comes to academic essay writing, MLA format in essays is definitely one of the most frequently assigned by professors. Normally, students have to format in MLA style those essays that are written in Literature, Liberal Arts and Humanities. Overall, during the years of college or university, students are assigned numerous types of MLA essays. Still, even though the citation style is widespread, some students cannot perfectly cope with all of its peculiarities and features. More so, it is understandable that it is hard to keep in mind all rules and specifics when it comes to formatting and writing academic papers in general. The very first reason why students face challenges with the process of organization and MLA style essay formatting is because some students tend to skip classes, and thus they have a gap in their knowledge and overall subject acquisition. The second reason is that students may be unable to find relevant information on what is MLA essay format, particularly its specific rules. Third, students may simply lack sufficient time on studying the principles of MLA essay formatting, which can also negatively impact the overall quality of writing. So, to avoid mistakes and ensure that your target audience does not get any negative impression from your writing, do not hesitate and buy a cheap MLA style essay from our service. Apart from getting custom help, you can also get guidelines on formatting as well as find some specific MLA essay example that you will find most useful.
Sunday, May 24, 2020
review exam - 4259 Words
Fin 3010 Dr. Michello Summer 2007 Practice Problems Expected dividend yield Answer: a EASY i. If D1 = $2.00, g (which is constant) = 6%, and P0 = $40, what is the stockââ¬â¢s expected dividend yield for the coming year? a. 5.0% b. 6.0% c. 7.0% d. 8.0% e. 9.0% Expected return, dividend yield, and capital gains yield Answer: e EASY ii. If D1 = $2.00, g (which is constant) = 6%, and P0 = $40, what is the stockââ¬â¢s expected capital gains yield for the coming year? a. 5.2% b. 5.4% c. 5.6% d. 5.8% e. 6.0% Expected total return Answer: d EASY iii. If D0 = $2.00, g (which is constant) = 6%, and P0 = $40, what is the stockââ¬â¢s expected total return for the coming year? a. 9.8% b. 10.3% c. 10.8% d. 11.3% e. 11.8%â⬠¦show more contentâ⬠¦An increase in a firmââ¬â¢s expected growth rate would normally cause its required rate of return to a. Increase. b. Decrease. c. Fluctuate. d. Remain constant. e. Possibly increase, decrease, or have no effect. Required return Answer: d EASY xviii. If a stockââ¬â¢s expected return exceeds its required return, this suggests that a. The stock is experiencing supernormal growth. b. The stock should be sold. c. The company is probably not trying to maximize price per share. d. The stock is probably a good buy. e. Dividends are not being declared. Constant growth model Answer: a MEDIUM xix. Which of the following statements is CORRECT? a. The constant growth model takes into consideration the capital gains earned on a stock. b. It is appropriate to use the constant growth model to estimate stock value even if the growth rate is never expected to become constant. c. Two firms with the same expected dividend and growth rate must also have the same stock price. d. If a stock has a required rate of return rs = 12%, and if its dividend is expected to grow at a constant rate of 5%, this implies that the stockââ¬â¢s dividend yield is also 5%. e. The price of a stock is the present value of all expected future dividends, discounted at the dividend growth rate. Constant growth model Answer: c MEDIUM xx. If a stockââ¬â¢s dividend is expected to grow at a constant rate of 5% a year, which of the followingShow MoreRelatedExam Review2016 Words à |à 9 PagesReview Exam 2 1. Planet X has a radius 3 times larger than the earthââ¬â¢s radius. How does this planetââ¬â¢s volume compare to Earthââ¬â¢s volume? a. The volume is 3 times larger than the Earthââ¬â¢s radius. b. The volume is 1/9 the Earthââ¬â¢s radius. c. The volume is 27 times the Earthââ¬â¢s Radius. d. The volume is 1/27 times the Earthââ¬â¢s radius. 2. The moons X and Y orbit 2 different planets. They have the same orbital velocity, but the distance of X from its planet is 2 times theRead MoreFinal Exam Review1463 Words à |à 6 PagesComm 1332 Comprehensive Exam Review To thoroughly prepare for your exam, the following review process is recommended: 1. Review lecture notes and powerpoint files for each chapter (copies on webct). 2. Practice OUTLINING (coordinating and subordinating: framing main point/subpoint/sub-subpoint information). 3. Finally, specific knowledge of the following will prove useful: 1. The 3 purposes of public speaking To inform, to persuade, to entertain 2. The 9 elements that affect publicRead MoreReview For Exam 22476 Words à |à 10 Pagesï » ¿ Women and Crime CCJ 4670 REVIEW FOR EXAM 2 Review the Key Terms at the end of each chapter. Lecture 5 ââ¬â Delinquency across the Life Span 1. Describe Claussenââ¬â¢s classic study of children of the Great Depression and its findings. 2. Define ââ¬Å"turning point.â⬠-involves a gradual or dramatic change which may lead to a modification, reshaping, or transition from one state, condition, or phase to another 3. Describe the various explanations for the age of desistance from crime. As age increasesRead MoreExam 1 Review1937 Words à |à 8 Pages12345) Mid-Term Exam ââ¬â Review Questions 1) All of these are pitfalls an organization should avoid in strategic planning EXCEPT (Ch. 1) Some pitfalls to watch for and avoid in strategic planning are these: ï⠷ Using strategic planning to gain control over decisions and resources ï⠷ Doing strategic planning only to satisfy accreditation or regulatory requeriments ï⠷ Too hastily moving from mission development to strategy formulation ï⠷ Failing to communicate the plan to employees, who continue workingRead More|Review Problems for Exams4693 Words à |à 19 Pages|Review Problems for Exams -- FINA 6301 ââ¬â Dr. Park | Chapters 2 and 3 [i]. In 2004, TimeNow Corporation had fixed assets of $1,345, current assets of $260, current liabilities of $180 and shareholders equity of $775. What was the net working capital for TimeNow in 2004? [ii]. During 2004, the Abel Co. had gross sales of $1 million. The firmââ¬â¢s cost of goods sold and selling expenses were $300,000 and $200,000Read MoreExam Review Essay2444 Words à |à 10 Pages------------------------------------------------- Chapter 1 Review Questions 1. What is the goal of science? The major goal of science is to ask answer questions about the physical universe that we live in. 2. How is observation different from imagination? Observation gathers only what data is obviously true. Imagination can go anywhereââ¬âfactual or not. 3. Write an equation in words then in symbols for the following sentence: The price of coffee beans is equal to the weightRead MoreEssay on Midterm Exam ( Review)1542 Words à |à 7 PagesExam Review 1 Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 1. Each of the following functions are within the framework for Human Resources Management EXCEPT: a. recruitment and selection. b. training and development. c. employee relations. d. employee discipline. 2. Which of the following is NOT a primary impact that technology has had on HRM? a. It has improved the processes of internal and external communications. b. It has altered the methodsRead MoreExam 1 Review3345 Words à |à 14 Pagesfine-tune scans or probes Answers: Information about vulnerabilities Information that will help fine-tune scans or probes Passwords Competitors â⬠¢ Question 4 5 out of 5 points What database of financial records should penetration testers review? Selected Answer: EDGAR Answers: ALICE EDGAR Both A and B Neither A nor B â⬠¢ Question 5 5 out of 5 points Which of the following examples best portrays passive information gathering? Selected Answer: Reviewing job listingsRead MoreExam 1 Review Essay619 Words à |à 3 PagesExam 1 Review BIO 130: Introduction to Environmental Science Unit 1 Be able to define an environmental factor. There are two types (condition and resource). What is the difference between a condition and a resource? Be able to categorize particular environmental factors as conditions OR resources (for example, temperature is a condition and not a resource). Be able to rank from smallest to largest: ecosystem, landscape, biome, biosphere Be able to rank from smallest to largest (in termsRead MoreExam review for CJ Essay912 Words à |à 4 PagesCriminal Justice 3311 Review Questions Exam 2 To insure you obtain the best possible grade, be sure to research each question as completely as possible. Try to answer these questions as if you are providing information to an individual who knows nothing about each topic. Explain your answers in detail; remember, the more complete your answer is the better your grade will be. 1. The importance of Lawrence Kohlbergââ¬â¢s work is the link he makes between moral development and reason. Although
Wednesday, May 13, 2020
OPTICAL CHARACTER RECOGNITION SOFTWARE - Free Essay Example
Sample details Pages: 22 Words: 6605 Downloads: 4 Date added: 2017/06/26 Category Statistics Essay Did you like this example? CHAPTER 1 ABSTRACT Suppose we wanted to digitize a magazine article or a printed contract. We could spend hours retyping and then correcting misprints. Or we could convert all the required materials into digital format in several minutes using a scanner (or a digital camera) Obviously, a scanner is not enough to make this information available for editing, say in Microsoft Word. All a scanner can do is create an image or a snapshot of the document that is nothing more than a collection of black and white or colour dots, known as a raster image. In order to extract and repurpose data from scanned documents, camera images or image-only PDFs, we need an Optical Character Recognition software that would single out letters on the image, put them into words and then words into sentences, thus enabling us to access and edit the content of the original document. Donââ¬â¢t waste time! Our writers will create an original "OPTICAL CHARACTER RECOGNITION SOFTWARE" essay for you Create order Optical Character Recognition or OCR, is a technology long used by libraries and government agencies to make lengthy documents quickly available electronically. Advances in OCR technology have spurred its increasing use by enterprises. For many document-input tasks, OCR is the most cost-effective and speedy method available. And each year, the technology frees acres of storage space once given over to file cabinets and boxes full of paper documents. This project is aimed at designing and developing a C/C++ based basic optical character recognition system capable of converting a preprocessed image file containing printed text into an editable text file. This will enable fast conversion of images into text which can be later edited if required. CHAPTER 2 INTRODUCTION WHAT IS OCR? Optical character recognition, usually abbreviated to OCR, is the mechanical or electronic translation of images of handwritten, typewritten or printed text (usually captured by a scanner) into machine-editable text. OCR is a field of research in pattern recognition, artificial intelligence and machine vision. Optical character recognition (using optical techniques such as mirrors and lenses) and digital character recognition (using scanners and computer algorithms) were originally considered separate fields. Because very few applications survive that use true optical techniques, the OCR term has now been broadened to include digital image processing as well. Early systems required training (the provision of known samples of each character) to read a specific font. Intelligent systems with a high degree of recognition accuracy for most fonts are now common. Some systems are even capable of reproducing formatted output that closely approximates the original scanned page including images, columns and other non-textual components. All OCR systems include an optical scanner for reading text, and sophisticated software for analyzing images. Most OCR systems use a combination of hardware (specialized circuit boards) and software to recognize characters, although some inexpensive systems do it entirely through software. Advanced OCR systems can read text in large variety of fonts, but they still have difficulty with handwritten text. HISTORY In 1929 Gustav Tauschek obtained a patent on OCR in Germany, followed by Handel who obtained a US patent on OCR in USA in 1933. In 1950, David H. Shepard decided it must be possible to build a machine to do this, and, with the help of Harvey Cook, a friend, built Gismo in his attic. Shepard then founded Intelligent Machines Research Corporation (IMR), which went on to deliver the worlds first several OCR systems used in commercial operation. While both Gismo and the later IMR systems used image analysis, as opposed to character matching, and could accept some font variation, Gismo was limited to reasonably close vertical registration, whereas the following commercial IMR scanners analyzed characters anywhere in the scanned field, a practical necessity on real world documents. The first commercial system was installed at the Readers Digest in 1955, which, many years later, was donated by Readers Digest to the Smithsonian, where it was put on display. In about 1965 Readers Digest and RCA collaborated to build an OCR Document reader designed to digitize the serial numbers on Reader Digest coupons returned from advertisements. The United States Postal Service has been using OCR machines to sort mail since 1965 based on technology devised primarily by the prolific inventor Jacob Rabinow. The first use of OCR in Europe was by the British General Post Office or GPO. In 1965 it began planning an entire banking system, the National Giro, using OCR technology, a process that revolutionized bill payment systems in the UK. Canada Post has been using OCR systems since 1971. In 1974, Ray Kurzweil developed the first omni-font optical character recognition systema computer program capable of recognizing text printed in any normal font. However, this device required the invention of two enabling technologiesthe CCD flatbed scanner and the text-to-speech synthesizer. On January 13, 1976, the finished product was unveiled which covered an entire tabletop, but functioned exactly as intended. The United States Postal Service, banking systems in UK and Canada Post have been using OCR machines to sort mail since 1965. Today, OCR technology incorporates high-speed scanners and complex computer algorithms to increase speed and data accuracy. OCR systems no longer require training to read a specific font. Current systems can recognize most fonts with a high degree of accuracy and some are capable of outputting formatted text that closely approximates the printed page. APPLICATIONS ACCESS An entire company with multiple sites can access documents on a central server. Robust database applications can manage electronic documents, performing searches based on document location or content. A content management program can add value to an electronic storage system, allowing users to store additional information with the document. Finding information within a long document is easier and faster. Multiple users can access an electronic document simultaneously. Users can easily and instantly distribute documents to a number of people at once via email. CONTROL Electronic document storage systems prevent documents from being misfiled or erroneously deleted. A central content management system serves as a single source for up-to-date information. The system can keep track of document revisions maintaining a record of the who, when, and what of every change made. Security is easier to maintain in an electronic environment. Administrators can Control who can see, read, modify, or destroy a particular document. Electronic documents can easily be stored offsite as part of a disaster recovery program. RESOURCE EFFICIENCY Electronic documents use less office space than traditional paper files Paper documents that need to be retained can be moved off-site to storage facilities. Electronic filing systems save human resources because users can access files on their own rather than requiring the help of support staff. LIMITATIONS OCR has never achieved a read rate that is 100% perfect. Because of this, a system which permits rapid and accurate correction of rejects is a major requirement. A great concern is the problem of misreading a character (substitutions). Through the years, the desire has been: to increase the accuracy of reading, that is, to reduce rejects and substitutions to reduce the sensitivity of scanning to read less-controlled input to eliminate the need for specially designed fonts (characters), and to read handwritten characters efficiently. However, todays systems, while much more forgiving of printing quality and more accurate than earlier equipment, still work best when specially designed characters are used and attention to printing quality is maintained. However, these limits are not objectionable to most applications, and dedicated users of OCR systems are growing each year. OUR PROJECT Our project will focus on creating efficient core components of an OCR such as- text detection, segmentation, character extraction from image, character recognition etc. The OCR software is divided into various modules and sub modules with a specific task. This enables easy updating, easy debugging, and streamlined distribution of work among team members. All code is written in C/C++ due to wide availability of supporting libraries and IDEs. The three main modules of our software are: 1. Image input and preprocessing Function to read an image file (*.bmp format ) Recognize and extract text from image (apply image binarization and thinning.) Apply segmentation to segregate a single character. Send image to recognition module. 2. Character Recognition Use basic pattern recognition/ feature extraction to determine which character it is. Find match in look up table for various characters- to match the exact alphabet. A dictionary is used to correct spelling errors. Send processed data to output module. 3. Output Develop a basic text file (*.txt), set attributes (name, location, access permissions etc.), write the output of OCR into file save and close the file. CHAPTER 3 HARDWARE AND SOFTWARE REQUIREMENTS 3.1 HARDWARE USED: General purpose PC running windows xp 32bit/64bit the software may not run properly on older windows version. Flatbed Scanner (optional) Digital Camera(optional) SOFTWARE USED: Bloodshed Dev-C++ v4.9.9.2 (C/C++ IDE) Microsoft Visual C++ Express 2008(C/C++ IDE) Borland Turbo C++ (C/C++ IDE) XVI32 (hex editor, binary file analysis) Adobe Photoshop(image editing, preprocessing and analysis) Microsoft Paint(image editing, preprocessing and analysis) CHAPTER 4 DATA FLOW DIAGRAMS LEVEL 0 LEVEL 1 LEVEL 2 preprocessImage function: OCRprocess function: textOutput function: LEVEL 3 CHAPTER 5 FUNCTIONS AND METHODOLOGIES USED 5.1 BMP IMAGES BMP images can range from black and white (1 bit per pixel) up to 24 bit colour (16.7 million colours). The input file that we are going to use for our software is an 8 bit bmp image, i.e., pixels are stored with a color depth of 8 bits per pixel. The color resolution of each pixel can be from 0 to 255(2^8=256). So any file that has to be processed must be first converted to it. Microsoft has defined a particular representation of color bitmaps of different color depths, as an aid to exchanging bitmaps between devices and applications with a variety of internal representations. They called these device-independent bitmaps or DIBs, and the file format for them is called DIB file format or BMP file format. According to Microsoft support: A device-independent bitmap (DIB) is a format used to define device-independent bitmaps in various color resolutions. The main purpose of DIBs is to allow bitmaps to be moved from one device to another (hence, the device-independent part of the name). A DIB is an external format, in contrast to a device-dependent bitmap, which appears in the system as a bitmap object. A typical BMP file usually contains the following blocks of data: Header Info Header Color Palette Image Data BMP File Header Stores general information about the BMP file. Bitmap Information (DIB header) Stores detailed information about the bitmap image. Color Palette Stores the definition of the colors being used for indexed color bitmaps. Bitmap Data Stores the actual image, pixel by pixel. India is a country of diversity. With a population of more than a billion, people differ in nearly all dimensions whether it is food patterns, occupation, education, health BMP HEADER This block of bytes is at the start of the file and is used to identify the file. A typical application reads this block first to ensure that the file is actually a BMP file and that it is not damaged. The first two bytes of the BMP file format are the character B then the character M in 1-byte ascii encoding. All of the integer values are stored in little-endian format (i.e. least-significant byte first). Offset# Size Purpose 0000h 2 bytes The magic number used to identify the BMP file: 0x42 0x4D and 19778 in decimal (Hex code points for B and M). The following entries are possible: BM Windows 3.1x, 95, NT, etc BA OS/2 Bitmap Array CI OS/2 Color Icon CP OS/2 Color Pointer IC OS/2 Icon PT OS/2 Pointer 0002h 4 bytes the size of the BMP file in bytes 0006h 2 bytes reserved; actual value depends on the application that creates the image 0008h 2 bytes reserved; actual value depends on the application that creates the image 000Ah 4 bytes the offset, i.e. starting address, of the byte where the bitmap data can be found. BITMAP INFORMATION (DIB HEADER) This block of bytes tells detailed information about the image.All values are stored as unsigned integers, unless explicitly noted. Offset # Size Purpose Eh 4 the size of this header (40 bytes) 12h 4 the bitmap width in pixels (signed integer). 16h 4 the bitmap height in pixels (signed integer). 1Ah 2 the number of color planes being used. Must be set to 1. 1Ch 2 the number of bits per pixel, which is the color depth of the image. Typical values are 1, 4, 8, 16, 24 and 32. 1Eh 4 the compression method being used. See the next table for a list of possible values. 22h 4 The image size. This is the size of the raw bitmap data (see below), and should not be confused with the file size. 26h 4 the horizontal resolution of the image. (pixel per meter, signed integer) 2Ah 4 the vertical resolution of the image. (pixel per meter, signed integer) 2Eh 4 the number of colors in the color palette, or 0 to default to 2n. 32h 4 the number of important colors used; generally ignored. COLOR PALETTE The palette occurs in the BMP file directly after the BMP header and the DIB header. Therefore, its offset is the sum of the size of BMP header and the size of the DIB header. The palette is a block of bytes (a table) listing the colors available for use in a particular indexed-color image. Each pixel in the image is described by a number of bits (1, 4, or 8) which index a single color in this table. The purpose of the color palette in indexed-color bitmaps is to tell the application the actual color that each of these index values corresponds to. A DIB always uses the RGB color model. In this model, a color is in terms of different intensities (from 0 to 255) of the additive primary colors red (R), green (G), and blue (B). A color is thus defined using the 3 values for R, G and B (though stored in backwards order in each palette entry). BITMAP DATA This block of bytes describes the image, pixel by pixel. Pixels are stored upside-down with respect to normal image raster scan order, starting in the lower left corner, going from left to right, and then row by row from the bottom to the top of the image. Uncompressed Windows bitmaps can also be stored from the top row to the bottom, if the image height value is negative. In the original DIB, the only four legal numbers of bits per pixel are 1, 4, 8, and 24. In all cases, each row of pixels is extended to a 32-bit (4-byte) boundary, filling with an unspecified value (not necessarily 0) so that the next row will start on a multiple-of-four byte location in memory or in the file. The total number of bytes in a row can be calculated as the image size/bitmap height in pixels. Following these rules there are several ways to store the pixel data depending on the color depth and the compression type of the bitmap. One-bit (two-color, for example, black and white) pixel values are stored in each bit, with the first (left-most) pixel in the most-significant bit of the first byte. An unset bit will refer to the first color table entry, and a set bit will refer to the last (second) table entry. Four-bit color (16 colors) is stored with two pixels per byte, the left-most pixel being in the more significant nibble. Each pixel value is an index into a table of up to 16 colors. Eight-bit color (256 colors) is stored one pixel value per byte. Each byte is an index into a table of up to 256 colors. RGB color (24-bit) pixel values are stored with bytes as BGR (blue, green, red). int main() This function asks for an input filename and then reads the BMP image. The header of the image is stored in with the help of the class BMPHEADER and the pixel values are retrieved and stored in a dynamically allocated unsigned int array, bmpImage which is used by all other functions. It does not use predefined bmp libraries and only relies on standard file handling libraries. However since the pixels are stored starting from the bottom left, a function called bmpImageCorrectFunc() is called after reading. It changes the order and the bmpImage array now stores the pixels starting from top left. Then main calls these three functions:- void preProcessImage(unsigned int * bmpImage, BMPHEADER bmpHeader, BOUNDINGPIXEL boundingPixelCoord); void OCRprocess(char * text, unsigned int *bmpImage, BMPHEADER bmpHeader, BOUNDINGPIXEL boundingPixelCoord); void textOutput(char arr[],char *filename); preprocessImage() This function calls other functions and performs pre processing on the image. First the bmp image is read and then it is stored in an array and a Header structure. These are used to access various attributes (pixel colour values, height width size bits per pixel etc.) of the image. The image is then converted into a complete 8 bit black and white image and a modified thinning algorithm is applied to obtain single pixel wide lines. A projection histogram based segmentation algorithm is applied to segment individual lines, words and characters. The following functions are called from this function in the same order: void binarization(unsigned int * bmpImage, BMPHEADER bmpHeader); void thin(unsigned int * bImage, BMPHEADER bmph); void segmentation(unsigned int *bmpImage, BMPHEADER bmpHeader, BOUNDINGPIXEL boundingPixelCoord) binarization() This function uses a technique known as Thresholding to convert the BMP image into a completely black and white image. Thresholding often provides an easy and convenient way to perform a segmentation on the basis of the different intensities or colors in the foreground and background regions of an image. In addition, it is often useful to be able to see what areas of an image consist of pixels whose values lie within a specified range, or band of intensities (or colours). The input to a thresholding operation a grayscale or color image or a black and white image having some coloured pixels due to noise. The output is a binary image representing the segmentation. Black pixels correspond to background and white pixels correspond to foreground (or vice versa). The segmentation is determined by a single parameter known as the intensity threshold. In a single pass, each pixel in the image is compared with this threshold. If the pixels intensity is higher than the threshold, the pixel is set to, say, white in the output. If it is less than the threshold, it is set to black. Multiple thresholds can also be specified, so that a band of intensity values can be set to white while everything else is set to black. SHADE CARD Using the above shade card the threshold was set at 127 colour value. All the pixels below 127 colour value would be changed to black and those above to white of the input image. However on studying the shades carefully we noticed, that 7, 8 and 9 pixel values are closer to white than to black. So they were included as exceptions and changed to white. The following images show an example of binarization: INPUT OUTPUT Now the black and white image is sent to the thinning function. thin() The basic idea of thinning is to repeatedly delete object boundary pixels so as to reduce the line width to one pixel. This must be done without locally disconnecting the object (splitting the object in two parts) or deleting line end points. The result is like a skeleton of the image. We used the modified Rutovitz parallel processing algorithm. In parallel processing, the value of a pixel at the n-th iteration depends on the values of the pixel and its neighbours at the (n-1)-th iteration. Thus all the pixels if the image can be processed simultaneously. MODIFIED RUTOVITZ ALGORITHM Definitions: To decide whether a pixel P1 should be deleted, it is assumed that a 3*3 window is used for each pixel. That is the values of the eight neighbours of the central pixel (P1) are used in the calculation of its values for the next iteration. The eight neighbouring values are denoted in the following way: P9 P2 P3 P8 P1 P4 P7 P6 P5 We define the following: 0 represents WHITE and 1 BLACK. N(P1) : number of non-zero neighbors: N (P1) = P2 + P3 + + P9 S(P1) : number of 0 to 1 transitions in the sequence (P2, P3,, P9, P2) Algorithm: Repeat until no more change can be made. A pixel P1 is marked if the all the following conditions are true: P1=1 S (P1) = 1 2= N (P1) =6 P2 or P4 or P8 = 0 or S (P2) != 0 P2 or P4 or P6 = 0 or S (P4) != 0 Delete the marked pixels. This function makes permanent changes in the image itself. An example of thinning: INPUT OUTPUT segmentation() Itrefers to the process of partitioning adigital imageinto multiple segments (setsofpixels). The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in images. Several general-purposealgorithmsand techniques have been developed for image segmentation. Since there is no general solution to the image segmentation problem, these techniques often have to be combined with domain knowledge in order to effectively solve an image segmentation problem for a problem domain. Some methods are described below: Clustering methods Using K-means algorithm the image is iteratively divided into clusters. Histogram-based methods Horizontal and vertical projection histograms are used to partition the image. Edge detection methods Region boundaries and edges are segmented thus it is very useful in matching shapes. Region growing methods A specific region is segmented by comparing each pixel intensity w.r.t a starting point(seed point). Thus all similar intensity pixel are covered in the region as it grows. Level set methods It uses motion equations on a curve/surface to calculate propagation of the contour. Graph partitioning methods Graphs can effectively be used for image segmentation. Usually a pixel or a group of pixels are vertices and edges define the (dis)similarity among the neighborhood pixels. Watershed transformation Itconsiders the gradient magnitude of an image as a topographic surface. Pixels having the highest gradient magnitude intensities correspond to watershed lines, which represent the region boundaries. Water placed on any pixel enclosed by a common watershed line flows downhill to a common local intensity minimum. Pixels draining to a common minimum form a catch basin, which represents a segment. Model based segmentation The central assumption of such an approach is that structures of interest/organs have a repetitive form of geometry. Multi-scale segmentation Image segmentations are computed at multiple scales inscale-spaceand sometimes propagated from coarse to fine scales.eg.1D, 2D etc. Semi-automatic segmentation In this kind of segmentation, the user outlines the region of interest with the mouse clicks and algorithms are applied so that the path that best fits the edge of the image is shown. Neural networks segmentation Using artificial neural networks, segmentation is performed on small areas. Each pixel is treated as neuron which contains its colour/intensity values and is connected to neighboring neurons. Thus such connections can be evaluated to segment the region. This project utilizes the projection histogram method because: It is the most efficient in case of pure black and white images. It is well suited for OCR segmentation as several iterations of the same algorithm can be applied to segment a line, a word or a single character. It has very little processing and memory requirements. PROJECTION HISTOGRAM SEGMENTATION METHOD A projection histogram referrers to a graph representing the horizontal/vertical projection of an image. Projection of a black white image would simply be the total number of black pixels in a row or column. When a horizontal projection is performed on an image, an array stores the number of black pixels in each row of the image while when a vertical projection is performed on an image, an array stores the number of black pixels in each column of the image. These steps are done by hProjFunc() and vProjFunc() and they store the data in hProj[ ] and vProj[ ] respectively. The data from these two arrays is utilized to segment the image into lines, words and individual characters. To segment various lines in an image containing text, the hProjFunc() is applied to the whole image. Then the array containing horizontal projection data, hProj[ ] is analyzed and empty/ 0 values are identified. These 0 values in the array indicate an empty line i.e. the portion between two lines of text. Thus the top and bottom positions of each line can be easily calculated. Once all lines are segmented, the vProjFunc() is applied on images of only single lines. Thus the vertical projection of each line contained in vProj[ ] can be used to determine position of words and individual characters in that line by analyzing the empty portions in the array. The hProjFunc() is again applied on images of individual characters to obtain the coordinates of top-left corner and bottom-right corner of an imaginary box tightly enclosing each character. The red and green pixels in the above image indicate the top-left(red) and bottom-right(green) corners of boxes enclosing individual characters. The final output of segmentation is stored in a boundingPixelCoord structure which contains 4 arrays of x and y coordinates of top-left and bottom-right corners of all characters(x1, y2, x2, y2). It also stores the top and bottom values for each line as well as the average width of characters for each line (this is utilized to determine spacing between words). OCRprocess() The OCRprocess() function is the main optical character function. It converts the image data into text. Once called by int main() it analyzes the segmentation data and performs the following steps: Line identification/changing Creating appropriate spacing in between words Finding the start character and end character of each word Determining the final word by using OCRcontrol() which calls extraction1() and dictionary(). Return the whole text in a dynamic array containing the extracted words, spaces and lines. It uses the segmentation data to identify character positions, start and end of each line and inserts n at end of lines to change lines. It calculates the start and end of each word and spacing by using the average width of character and matching that against the positions of two consecutive characters, if they are far apart a space is inserted and the start and end of word is stored. The following function is called by this function: void OCRcontrol(char * wordArr,unsigned int start, unsigned int end, unsigned int *bmpImage, BMPHEADER bmpHeader, BOUNDINGPIXEL boundingPixelCoord, int count, unsigned int firstWordFlag); The starting and ending of a single word once known is passed on to the OCRcontrol() function which performs the actual conversion from image to text. OCRcontrol() OCRcontrol() function which performs the actual conversion from image to text. It calls two functions extraction1() and dictionary(). The extracted word returned by extraction1() is passed onto the dictionary() which finds the closest possible match. If no discrepancies are found between the dictionary output and the extraction output, it is finally returned to OCRprocess() to be appended in the final text dynamic array. These are the two functions called: void extraction1(char * wordArr,unsigned int start, unsigned int end, unsigned int *bmpImage, BMPHEADER bmpHeader, BOUNDINGPIXEL boundingPixelCoord); void dictionary(char *input,char ** equalStore, int eqValue, char ** unequalStore, int uneqValue); extraction() When the input data to an algorithm is too large to be processed and it is suspected to be notoriously redundant (much data, but not much information) then the input data will be transformed into a reduced representation set of features (also named features vector). Transforming the input data into the set of features is calledfeature extraction. If the features extracted are carefully chosen it is expected that the features set will extract the relevant information from the input data in order to perform the desired task using this reduced representation instead of the full size input. Feature extraction is an essential part of any OCR system. It utilizes various algorithms to accurately match each character from a number of reference files. It extracts various features such as edges, boundary, loops, extreme points etc. to correctly identify the character. Various methods used for feature extraction: Zoning The image of each character is divided into a number of zones and average gray level or binary level in each zone is calculated. Center of gravity Each black pixel is treated as unit mass and the center of gravity of each character is calculated. Tips A character is identified using the number and positions of various tips in a character. Number of branches or intersections A character is identified using the number and positions of various I ntersections in a character Projection histograms Horizontal and vertical projection histograms are used to accurately match the character. Extreme points Positions of various extreme points are used to match characters. Moments Similar to COG method calculate moments of each character. The software utilizes multiple methods to efficiently and accurately match each individual character. It utilizes two main functions extraction1() . Features used in Extraction function 1 to match individual characters: Projection histograms (primary) Top and bottom gap detection (secondary) Closed loop detection (secondary) Character height calculation (secondary) PROJECTION HISTOGRAMS The projection histograms extraction method utilizes techniques similar to segmentation. A horizontal and vertical projection of each character is calculated by hProjFunc() and vProjFunc() and stored in hProj[ ] and vProj[ ] respectively. Accurate matching of these arrays (hProj and vProj) to stored data is done using two methods. The first method directly matches the values of various indices of the array. The second method matches the peaks in the graph i.e. position of maximum and minimum values in the arrays. Before the above matching schemes are applied normalization is done to account for varying font sizes. The positions of various indices of hProj and vProj arrays are normalized over a range of 0 to 5 where the position of the 0th value is represented by 0, last position by 5, the mid-position by 2.5. Thus depending on the height and width a normalizing factor is calculated and used to match characters of different font sizes. This method requires the use of 4 reference files to store data for both horizontal/vertical projection for both types of matching schemes. The reference files store Courier New font characters, size 12- all lowercase alphabets, uppercase alphabets and numbers. TOP AND BOTTOM GAP DETECTION This method analyzes the top two and bottom two lines to identify gaps. The gaps are identified by finding a set of white pixels enclosed between sets of black pixels. It is performed by the lineGaps() function. This method helps to differentiate between characters such as h and b. CLOSED LOOP DETECTION This method iteratively employs the use of gap detection to identify a closed loop. It is performed by loopCalc() function. If a set of gap lines is found to be enclosed between two sets of no gap lines then a closed loop is found. This helps to differentiate between a, e, o, B and h, c, t. CHARACTER HEIGHT CALCULATION This performed by analyzing the position of the enclosing box coordinates calculated by segmentation relative to the top and bottom of the line. Thus differentiating between small alphabets such as a, e, v and t, h, g etc. The secondary methods are matched using another reference file which stores data for all secondary features. This is done in the setXtraParam() function. Data of a total set of 62 characters( 26 lowercase, 26 uppercase, 10 numbers) stored for all reference files. Once the features are calculated/identified each character of the reference file is assigned a matching value. At the end of all of the above operations the maxCharXtraParam() function identifies the character with the highest matching value. Finally the matching alphabet is appended to the word array. Once all iterations are complete the word array contains the extracted word. dictionary() The dictionary file contains an extensive list of approximately 1, 35,000 words from both US and UK English. It also contains common acronyms, abbreviations, names of countries and cities and common names. Firstly, a function char *filenameGen() is created which creates seperate reference files for different length of words and returns them. Each length file has all the words of that length in ascending order. Thus the output of this function creates 23 reference files into which the original dictionary is now split. The extracted words are then sent as input to the dictionary function. The length of the word is calculated and using file handling the appropriate file is opened. The void equal() function searches for the word in the file. If an exact match is found, that word is is stored in a dynamic array equalstored[] to be returned. However, words with at the most 1 error are also stored in the array. Since extraction can lead to two characters being combined to one, the dictionary function also calls a void unequal() function which opens the file containing words which are of one more than the length of input. It finds the closest match for the input word by comparing relative positions. For example aple would give a correct output as apple. The words with zero or one error are stored in a dynamic array unequalstored[] which is returned. The OCRcontrol() function choses the best match for the input word. CHAPTER 6 OUTPUTS AND RESULTS Main menu: Enter filename and run program Original 8bit .BMP image of a sample word: Black and white/binarization output sample: Thinning output sample: Segmentation output sample: Feature Extraction output sample: werld However the dictionary used changes the word to the closest match possible resulting in the word: world Actual 8bit image file textpaint.bmp read: Output textpaint.txt file created: Another example: Accuracy: The accuracy may be affected by a number of factors such as: Noise Rotation/skew error Poor image quality Reference data does not match the font style of the text Unsupported special characters encountered eg. ; @ ? etc. Courier New 12 Courier New 18 Times New Roman 14 Total Characters 434 434 434 Incorrect Characters 27 45 98 Correct Characters 407 389 336 % Accuracy 93.77% 89.63% 77.42% The above observations show that the software is capable of handling Courier New and/or a similar font style, for which it is optimized. While considerable reduction in accuracy is observed in the case of Times New Roman (for which software is not optimized), but it is still well above 50%. Accuracy may also slightly differ with varying size of images as probability of error also varies with different character counts. Courier New 12 Total Characters 434 867 1465 Incorrect Characters 27 65 44 Correct Characters 407 802 1421 % Accuracy 93.77% 92.50% 96.99% Thus the software is capable of achieving high accuracy for the most optimized font style and size. RESULT The software is designed to read 8bit/256 colour bitmap image which contains only text. It is optimized to read Courier New font style at font size of 10 to 16 points. Other font styles and sizes will show reduced accuracy. CHAPTER 7 CONCLUSION AND LIMITATIONS This software functions as a basic concepts demonstrator and performs all basic functions required from an optical character recognition software. It is capable of very accurately identifying Courier New style of characters and shows considerable accuracy in other similar font styles also. The software runs most efficiently on windows XP and is capable of reading 8bit .BMP image files. The software has a few inherent limitations which may be overcome with further development. These are: Support only for 8bit/256 colour .BMP image file format and no other format Optimization only for Courier New font style Only for images containing text, no support for images containing text and pictures in a single file Optimized for grayscale images with white background only. Inability to identify special characters such as @,!,? etc. Command line interface which is archaic and must be replace by a GUI Preprocessing does not correct noise, rotation and skew error Mainly designed for windows XP, it does not support Mac OS X, Linux etc. CHAPTER 8 FUTURE SCOPE As shown above the current implementation of the software has various limitations. These limitations can be easily overcome with the support of extra features such as:- Work for all types of image formats like JPEG, TIFF, GIF, etc. Inclusion of rotation/skew correction and noise removal in the preprocessing module. A user friendly graphical user interface (GUI), capable of running on various systems. Support for more operating systems such as Linux, Windows vista, Mac OS X etc. Support for other font styles can be improved by addition of more reference files containing data for those fonts. Use of more complex and accurate extraction methods such as artificial neural networks (ANN), which require considerable amount of processing but provide better results. Support for more languages/ scripts such as hindi, urdu, mandarin etc. Capability to decipher cursive handwriting would greatly improve the scope of the software. It would require use of heuristics analysis, support for different hand writing styles, improved segmentation capability, pattern matching and ANN. The basic OCR software can also be used along with a video analysis library to apply optical character recognition to text contained in video streams. This would create various new possibilities such as real time in video translation, real time vehicle tracking using number plates etc. CHAPTER 9 REFERENCES Research Articles: Le Daniel X., Thomas George R., Automated portrait/landscape mode detection on a binary Image Rajashekararadhya S.V. Dr Ranjan P. Vanaja, Efficient zone based feature extraction algorithm for handwritten numeral recognition of four popular south Indian scripts, Journal of Theoretical and Applied Information Technology 2005-2008 Zhang Y.Y and Wang P.S.P, A modified parallel thinning algorithm, 9th International Conference on Image Processing, 1988. Lee His-Jian, ChenSi-Yuan, Wang Shen-Zheng, Extraction and recognition of license plates of motorcycles and vehicles on highways, 17th International Conference on Pattern Recognition, 2004 Santos Rodolfo P. dos, Clemente Gabriela S., Ren Tsang Ing and Calvalcanti George D.C., Text line segmentation based on morphology and histogram projection, 10th International Conference on document analysis and recognition, 2009 Sanyuan Zhang, Mingli Zhang and Xiuzi Ye,Car plate character extraction under complicated environment, IEEE conference on systems, man and cybernetics, 2004 Books: 1. Handbook of Character Recognition and Document Image Analysis, H Bunke, P.S.P Wang, World Scientific. 2. Digital image processing,Rafael C. Gonzalez, Richard Eugene Woods Character recognition systems,Mohamed Cheriet, Nawwaf Kharma, Cheng- Lin Liu, Ching Suen Compressed image file formats, John Miano Topological algorithms for digital image processing, T Yung Kong, Azriel Rozenfeld Optical Character recognition: an illustrated guide to the frontier, Stephen V. Rice, George Nagy, Thomas A. Nartkar, Kluwer Academic Publishers The Image Processing Handbook, John C. Russ Web: https://www.dtek.chalmers.se/~d95danb/ocr/ https://homepages.inf.ed.ac.uk/rbf/HIPR2/hipr_top.htm https://en.wikipedia.org/wiki/BMP_file_format https://en.wikipedia.org/wiki/Optical_character_recognition https://www.getahead-direct.com/gwbadfd.htm https://local.wasp.uwa.edu.au/~pbourke/dataformats/bmp/ https://www.eecs.berkeley.edu/~fateman/kathey/char_recognition.html https://www2.mustek.com/Class/ocrinfo.html https://jocr.sourceforge.net/index.html https://www.ccs.neu.edu/home/feneric/charrec.html https://cgm.cs.mcgill.ca/~godfried/teaching/projects97/azar/skeleton.html https://en.wikipedia.org/wiki/Feature_extraction https://fourier.eng.hmc.edu/e161/lectures/morphology/node2.html https://people.idiap.ch/vincia/Projects/acet https://users.ecs.soton.ac.uk/msn/book/ https://www.webopedia.com/TERM/O/optical_character_recognition.html https://www.computerworld.com/s/article/73023/Optical_Character_Recognition https://en.wikipedia.org/wiki/Image_file_formats https://www.scantips.com/basics09.html https://www.elated.com/articles/understanding-image-formats/ https://www.ibiblio.org/pub/packages/ccic/software/info/HBF-1.1/BitmapFile.html https://www.cambridgeincolour.com/tutorials/image-averaging-noise.htm
Wednesday, May 6, 2020
The Love Suicides Free Essays
In The Love Suicides, Ritter by Classmate Anemones and considered to be a masterpiece, many complications arise In this romantic and dramatic tragedy that demonstrates a most complex look at love. In this essay, I will delve Into the symbolism of the work, the significances of the charactersââ¬â¢ actions, the cultural differences from those that I am accustomed, and my viewpoint of the fatal ending. The Love Suicides is set in a Snakeskin, Japan tea house in 1720 and is a great favorite of the Japanese stage. We will write a custom essay sample on The Love Suicides or any similar topic only for you Order Now It tells the calamitous story of Jessie, a paper merchant and his lover, Koura, a prostitute. This story Is about the moral and social code ender which the townsmen lived at the time, with the status of merchants being lower than that of the samurai class. Even though considered to be a lower class, the townsmen had developed a firm ethical code whereby in order for your business to prosper, your financial and personal obligations had to be met first. Jessie is married to his cousin, San, and is tormented by his sense of duty to his family and tormented by his love for Koura. The story opens with Koura secretly meeting a ââ¬Å"samurai customer,â⬠while dodging Ethel. A wealthy man who Is attempting to buy her contract and take her as his own. Koura does not like Tahiti and wants no part of him. In trying to understand Tahiti, I can only imagine that he feels. Tahiti is a rich guy who loves this woman but she in love with another man who happens to be married and the father of two children. The ââ¬Å"samurai customerâ⬠walks in wearing a wicker hat concealing his face. The samurai Is actually Jewelââ¬â¢s brother, Magneto, a flour merchant, who has come Into the tea house to meet Koura. However, Ethel believes him to be Jell, whom he despises and begins to speak negatively about him attempting to defame him and ruin his reputation in the eyes of Koura. Tahiti continues to rant about Sissies occupation as a paper merchant, putting him down incessantly. The ââ¬Å"samurai waited patiently for his turn with Koura, and finally Tahiti left, but left her depressed and In deep thought about her love, Jill. This only makes the ââ¬Å"samuraiâ⬠even angrier because after being very irritated at all of the commotion Ethel had made, he soul Is not getting any service as a guest of the establishment. The ââ¬Å"samuraiâ⬠is getting angry with Koura for neglecting him, and she begins to tell him that sheââ¬â¢s been afraid of dying ever since Jessie asked her to omit a love suicide. Unbeknownst to Koura,Jessie is outside eavesdropping, having gone to visit her after hearing that she was meeting a samurai costumer. Jessie has been with Koura for almost two years and everyone knows it. He begins to wonder If the two years had been a lie. Jell Is so Infuriated at this point that he tries house. In an effort to defend Koura, the ââ¬Å"samuraiâ⬠grabs hold of the Sissies hand through the latticework and ties him up. Tahiti returns and sees Jessie tied up outside the window and seizes his opportunity to beat him up, while calling him a thief trying to rob the place. The samurai comes to Sissies defense and starts assaulting Tahiti, causing him to run away. It was then that the samurai revealed himself to be Sissies brother. Magneto begins to pour his heart out to his brother, telling him how his affair with Koura has Just about destroyed his family and tarnished his own reputation. Jessie understands and tells his brother that he is ending his relationship with Koura, wanting to destroy all of the love letters that were exchanged between himself and Koura. Magneto takes all of them and finds a note from San, Sissies wife, addressed to Koura. What are the limits of love? In this story so far, boundaries have been pushed and emotions have run high. Sissies brother is clearly there out of love for his family and for his brother. When the reputation of your family and your own is at risk then this is the point where a serious decision has to be made on what your future actions will be. San actually starts to feel sorry for Koura and the situation the she is in, loving a married man (her husband) and has a contract on her by someone who she doesnââ¬â¢t love. San wants Jessie to go and save Koura from committing suicide. She wants him to pay the ransom to get her out of the contract. Jessie tells San that the price is very high so San gets half of the money and tells Jessie to pawn all of the family fine garments to make up the other half. These family garments are the nicest and most valuable items at the time to own. These are thick silk and patterned clothing that have been passed down through the generations. Why does San care that much about a woman that is sleeping with her husband? These are the cultural difference that have made this one of the best stories and is still in books today. When Sonââ¬â¢s father, Agamemnon hears that San was willing to ell the family garments to save her husbandââ¬â¢s mistress, he forbids it and demands that Jessie divorces his daughter and takes San away. In the meantime Magneto is running around looking everywhere for his brother. Jessie hides from Magneto, watching and listening sadly to his brotherââ¬â¢s anguish and pain. Jessie sneaks back to the tea house and gets Koura and they take off to Maxima, knowing that their lives would end soon and decide that they will die at the Adagio Temple, the perfect place for their love suicide. Jessie and Sharkââ¬â¢s decision to kill themselves is quite stubbing to me. The thought of committing suicide in the western word is extremely taboo. In many eastern societies, it is considered an honorable way to die. I believe suicide to be a cowardly act. Jessie isnââ¬â¢t thinking about his wife or his children, only himself. Jessie tells Koura that he has divorced San, but still out of respect for her they will not to die together, saving San the shame of how it will look. At dawn, the fateful couple prepare for death. Jessie stabs and kills Koura with a knife and then hangs himself by Jumping off a sluice gate with a noose around his neck. They die in the belief that they would share the next life together in happiness. A teaching of Buddha is that those who commit suicide for love will be together in the next life to come. As for me, this is a story of impulsiveness, heightened emotions, and human frailties. Jessie was torn between two opposing worlds, one of duty and the It is true that love is a most powerful emotion and can make some people commit some of the most irrational, unfathomable, illogical, incomprehensible, hopeless, desperate and deadly acts imaginable. In the case of Jessie and Koura, they did it for love. How to cite The Love Suicides, Papers
Tuesday, May 5, 2020
Contemporary Educational Ethics Issue â⬠Complete Solution
Question: Prepare a 3 page paper in which you research a contemporary educational ethical issue where your personal beliefs and values may conflict with legal and societal expectations. The contemporary issue should involve widely accepted moral and ethical values that come in conflict with legal requirements and societal thought. Summarize the situation, present the legal stance, and assert what you believe the societal stance to be. Outline the expected consequences and benefits based on the accepted value systems. As an educational leader, if this issue arose in your institution, what course of action would you take? Would that course of action be based on your personal values or ethical decision-making? How would you sell your ideas to other leaders, parents, students, and the community? If your ideas were not accepted, what would your fallback position be, if you had one? Answer: Introduction This report introduces a research on the contemporary educational, ethical issue regarding reservation in the Australian universities. It summarises the situation with the expected benefits and consequences that are based on the value systems. If the issue takes place in an educational institution, then the probable actions to be taken have also been elaborated. Discussion Summarization of the situation The universities in Australia have initiated reservation system for the backwards tribal people who are treated as the minority in the country (Ro.ecu.edu.au, 2016). A certain number of reserved seats has created a situation where suitable candidates of the normal category are not able to take admission. It has therefore created a mental dissatisfaction in the normal students' mind that though they have secured good marks in the last examination, they have passed, they are not able to get through (dickinson.edu, 2016). Undoubtedly, it is an ethical issue created by the education houses. Presentation of the legal stance The jurisdiction of Australia has approved the initiatives taken by the universities. As a result, if the nominal number of the minorities take admission in the universities then a certain number of seats remain empty which can not be fulfilled by the qualified candidates of the normal category (Iie.org, 2016). The government of Australia has taken the steps to protect the educational progress of the minorities, which has created an ethical issue for the normal regarding the unavailability of seats. Assertion of the belief regarding social stance As per the current situation, it can be expected from the society that they will take a stand against the jurisdiction of the nation for the restoration of the facilities of the general people. It can be believed that the common people will make processions showing their disrespect towards the existing system (theconversation.com, 2012). They will communicate their message through the opponent party in the parliament house where a bill will be passed for initialization of flexibility regarding admission. Expected consequences and benefits based on the accepted value systems The expected consequences are as follows, There will be a major clash between the major and the minority communities regarding the change of the rules. If the value systems are accepted then, it can remove the existing government who are in the favour of strict reservations (edwiseinternational.com, 2016). Rules and regulations will be modified for the general people. The benefits of the accepted value systems are as follows, There will be flexibility in the system of admission in the universities. If seats reserved for the minority remain vacant due to unavailability of the minor students, it will be fulfilled by a suitable general student (unesdoc.unesco.org, 2016). The modified system will create a good morale among the general as they will have a feeling of a sense of justice from their government. There will be an encouragement of taking more admissions in the universities for education, which will lead to enhancement of the literacy level. Course of action to be taken If such issue regarding reservation arises in our educational institution, the steps to be taken are, Immediate removal of the reservation system (edwiseinternational.com, 2016) Setting the same eligibility criteria for all the candidates either be general or tribal. Course of action that is based on personal values or ethical decisions If a tribal student excels well in the academics but is not able to carry on due to the financial crisis, then a monetary concession will be given to him for further studies as an emergency support (theconversation.com, 2012). Regular campaigning will be done for avoiding racial discrimination among the students for reduction of communal hatred. Selling the ideas to other leaders, parents, students and community The ideas are built on the concepts of values and ethics. It should be communicated to leaders, parents, students and the community through conduction of seminars and workshops in the schools, colleges and the universities (Iie.org, 2016). The ideas can also be communicated through newspaper and Internet ads and social networking site, which will reach most of the target audience. Fallback position in case of rejection of ideas If the ideas are rejected then, it will symbolise that majority of the nation are in support of the existing system of the reservation or they have some other opinion. In case, the position will be to look for another alternative for changing the system (Dickinson.edu, 2016). Providing other facilities to the general candidates such as scholarship can add up value. Course of action to be taken in case of global organization's leader If the institution is a global organization, general students will be given more monetary scholarship along with further study facilities in the colleges in other nations under the affiliation of the main institution in Australia (Ro.ecu.edu.au, 2016). Such changes are required on the essential basis if a change in administration in Australia is not at all possible. References Codes of Ethics in Australian Education. (2016).Ro.ecu.edu.au. Retrieved 18 May 2016, from https://ro.ecu.edu.au/cgi/viewcontent.cgi?article=1825context=ajte Edwise International Overseas Education Consultent. (2016).Edwiseinternational.com. Retrieved 18 May 2016, from https://www.edwiseinternational.com/about/introduction.asp Global Education Research Reports | Institute of International Education. (2016).Iie.org. Retrieved 18 May 2016, from https://www.iie.org/Research-and-Publications/Research-Projects/Global-Education-Research-Reports Global Education. (2016).dickinson.edu. Retrieved 18 May 2016, from https://www.dickinson.edu/download/downloads/id/1571/global_education.pdf Student affairs and services. (2016).unesdoc.unesco.org. Retrieved 18 May 2016, from https://unesdoc.unesco.org/images/0018/001832/183221e.pdf Universities Australia criticises manufacturing taskforce. (2012).The Conversation. Retrieved 18 May 2016, from https://theconversation.com/universities-australia-criticises-manufacturing-taskforce-8918
Wednesday, April 1, 2020
The Role of the Administrator in Teacher Retention free essay sample
The school is a social institution that provides individuals with educational services that keep pace with the continuation and development of life and supports the march of the human society and achieve individuals psychological satisfaction and honest work. The school is a social matter that concerns everyone, community leaders, parents, teachers. . The school administration means that every organized activity aims to achieve the desired educational goals of the school, which is not an end in itself, but is a means to achieve the objectives of the educational process and the school administration aims to organize the school and establish the movement of work on the basis of enabling them to achieve its mission in education The school principal is responsible for coordinating and organizing the efforts in order to reach the educational goals set by the planners and officials in the educational administration The successful school is the one whose administrators believe in the import ance of team work and spreading the culture of one team, The skills of working within the team with the teachers, in order to increase their contribution to the work and their participation in the decision, and this will bring many benefits to the school, teachers, students and the community as a whole. We will write a custom essay sample on The Role of the Administrator in Teacher Retention or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The advantages of adopting the method of work teams in the educational administration include: Schools are closer and closer to society instead of moving away Provide opportunities for managers to learn new skills by working directly with others Increase managers sense of responsibility as they work, plan with teachers, and create a high sense of the importance of meeting the needs of individuals in and out of school. Improve communication within and outside the school. Perform the work within the school in an atmosphere of collective and freedom, a sense of security and tranquility, away from individual competition. Improve the level of educational service provided to students through collective educational decisions, and committed by teachers lead to better results. Achieve professional growth for all employees in the educational administration, as a result of their multiple responsibilities.
Saturday, March 7, 2020
Secularization Essay Example
Secularization Essay Example Secularization Essay Secularization Essay It was Voltaire who said, If God did non be, it would be necessary to contrive him . Our theory agrees. ( Stark and Bainbridge 1987, page 23 ) . These words uttered by Stark and Bainbridge back in 1987 offer a glance into the longstanding and heated debated between the antecedently dominant, the Secularization Thesis and the finishing Supply Side Theory, in academic sociology. Both theories have profound deductions for the hereafter of faith as a force in society. This essay will look at two articles published in the Sociology of Religion. First, this essay will look at the two finishing theories of the Secularization Thesis and the Supply Side. Second, a sum-up of the chief points of Starks article entitled Secularization: RIP in 1999, and Bruce s 2001 response article entitled Christianity in Britain: RIP will be presented. Looking critically at both articles, this essay will reason that Stark has won the argument for this around. The secularisation thesis day of the months from when the theory of development was at the high of its influence. The theory in its modern conjuration comes from the work of British sociologist Bruan Wilson in the sixtiess. This double thesis was based on the observation that since the Gallic and industrial revolutions in Europe in the 19th and 20 centuries have lead to a diminution in religionism. First, this theory used Modernity as an account for the issue of Christianity from the universe. Secondary, this theory, would hold the same effects on all types of societies. It saw the extinction of faith from an enlightened universe. On the other manus, Supply Side Theory came to dispute the secularisation theory in the 1980 s. This theory aims to explicate religionism. Advocates believe that there is a changeless possible human demand for spiritual goods over clip and between societies. They believe that as the supply of these goods fluctuates, these fluctuations explain the different degrees of spiritual energies in different societies. Basically, the greater the spiritual diverseness of a society, the better the spiritual energy in that society. As antecedently noted the secularisation thesis theory has come under aggressive onslaught. Rodney Stark, so learning at the University of Washington in 1999 published his article Secularization, R.I.P. in the Sociology of Religion diary. In this article, Stark clearly argues that the Secularisation theoy, is out-dated, antique and, as the rubric of his article high spots, the theory is dead and should be left to rest in peace Stark begins his article by observing, [ f ] or about three centuries, societal scientists and miscellaneous western intellectuals have been assuring the terminal of religion . Stark makes five major claims about the thesis. First, harmonizing to Stark, Modernity and modernization is seen by theoreticians to be the cause of secularisation. He notes that modernization is a long, gradual, comparatively stable process , and that if secularisation is the consequence of modernization, there will be a corresponding long-term, gradual, and comparatively changeless tendency of spiritual decline . Second, to Stark, the focal point of the anticipations is on single piousness, particularly belief, non institutional distinction. He believes that some protagonists of the secularisation thesis have changed their focal point and definition so they do non hold to acknowledge that their thesis is failed. In fact, Stark agrees faith establishments have less power and that spiritual ritual and symbols have become less common in public life. Starks 3rd statement is that in all versions of the thesis the claim that of all facets of modernisation, it is scientific discipline that has the most deathly deductions for religion . Fourthly, Secularization is irreversible. Nevertheless, Stark disagrees with this by observing Andree Greeley s 1994 remark that after 70 old ages of Soviet Union activist attempts to accomplish secularization St. Vladimir has routed Karl Marx . Finally, Stark notes that the thesis applies globally. While the theoreticians have largely focuses on Christianity, belief in supernatural powers is traveling to decease out all over the universe. Allah and Jehovah will both fall in each other as an interesting historical memory . Secularization, R.I.P. , so gets into particulars. To Stark the secularisation thesis has failed to be an accurate anticipation due to six chief grounds. First, it is a myth that there has been a diminution in spiritual belief and engagement because there has been no incontrovertible long-run diminution in European spiritual participation and in Europe levels of subjective devoutness remain high. Next, he argues that there has neer been an Age of Faith . To Stark most Europeans did non go to church during the in-between Ages and during the Renaissance. In fact, he highlights that many clergy were unqualified and that clergy were frequently absent from their parishes. In add-on, while there were periodic detonations of mass spiritual enthusiasm , this offers even stronger grounds against engagement in organized faith. As a consequence, it can be said spiritual engagement sometimes rises and sometimes diminutions. Third, he argues that neer was Europe truly Christianized. Stark believe s that although early Christianity was a mass societal motion in a extremely competitory environment, it lost its energy after it became the official faith of the Roman Empire. After Emperor Constantine converted to Christianity, there was neer an effort to change over the general population of Europe. This ties in to his 4th statement. Stark notes that while some theoreticians confirm there was no Age of Faith, to them people still had high degrees of spiritual belief, even if they did non travel to church. Stark believes, utilizing secular Iceland as an illustration, this still applies today, observing that while Iceland merely has 2 per centum church attending, merely 2.4 per centum of the state are atheists. Fifthly, if secularisation is to demo up anyplace it must demo up among scientists . However, Stark discovers that many scientists report being spiritual. Evidence that there is a struggle between faith and scientific discipline is largely fictional, and scientists are non notably irreligious . Finally, Stark ends his harangue about the fails of the Secularization theory by saying that grounds from Eastern Europe, Muslim states and practicians of Asiatic folk faiths that modernness is compatible with faith. In 2001, Steven Bruce, Professor of Sociology at the University of Aberdeen, responded to Stark, with the suitably titled Christianity in Britain, R.I.P. . Bruce disagrees with Starks hypothesis that the secularization is merely a myth, based upon undervaluing the spiritual verve of the of the universe today. Furthermore, Stark argued that this myth besides exaggerated the religionism of the past age of religion. In order to rebut Starks claims, Bruce uses Britain as an illustration. First, Bruce looks back at pre-industrial Britain. While cognition of faith and its orthodoxy may hold been limited, in order for there to be no aureate age of religion we would hold to be able accept nine sociologically implausible assumptions . These scope from inquiring if the most powerful national establishment had small or no impact upon the people. To why would people let such a big sum of the wealth of Britain go to this establishment which they did non back up. To Bruce, spiritual beliefs so wer e still far more permeant and influential than they are now. Following, Bruce looks at assorted indexs of the diminution of Christianity in Britain over the last 150 old ages. Today, most Christian communities are in diminution. Even if we merely look to appraise done in 1951, 1990, and 2000 there is a clear tendency of dramatic diminution. Bruce goes every bit far to notice that utilizing the long-run stable tendency of the diminution of Church rank and attending, it is possible to do a statistical projection that by the 2030s the chief Christian denominations will discontinue to be. ( Methodist ) . Bruce clearly believes that no sum of supply side revisionism will alter the fact that Christianity in Britain is in serious problem. Bruce so takes a critical expression at supply-side theories of faith, which argue that demand is changeless and that degrees of spiritual verve hence depend on the supply, which is greatest when there is a free and competitory market for suppliers. He asks that sing Christianity has ever valued corporate Acts of the Apostless of worship, and if there is a free market place for faith and no deficiency of deficit of Christian administrations. Surly this should be expressed in some manner. Bruce notes that while the New Age motion might look to show the being of widespread informal spiritual belief, possibly of an digesting demand for faith, his scrutiny of the extent, nature, and significance of that motion suggests otherwise, observing that they are numerically all but irrelevant . The ranks of these new administrations do non sufficiently do up for those lost from the more traditional denominations, which are in danger of dwindling past the demographic point of no return.
Thursday, February 20, 2020
E-Business Essay Example | Topics and Well Written Essays - 1000 words
E-Business - Essay Example store associates were equipped with extensive product training to assist customers on how to do things themselves while clinics were also conducted (Our history, n.d.). It expanded later to Canada, Mexico, China, Puerto Rico, the U.S. Virgin Islands and the territory of Guam with unprecedented speed (Our history, n.d.) that total more than 2,200 retail outlets (Corporate, n.d.). It was listed in NASDAQ in 1981, New York Stock Exchange three years after (Our history, n.d.), and also traded at Dow Jones and Standard & Poorââ¬â¢s index (Corporate, n.d.). Its inventory of home improvement needs and materials consisted of around 40,000 and can order 250,000 products for customers (Stores, 2006). E-commerce encompasses the ââ¬Å"buying, selling, transferring, or exchanging products, services, and/or informationâ⬠through the computer and the internet (Turban et al., 2005, as cited in E-business, n.d. p. 3). E-business, a broader term that includes e-commerce, means purchase and sale of goods and services as well as ââ¬Å"servicing customers, collaborating with business partners, conducting e-learning, and processing electronic transactionsâ⬠(Turban et al., 2005, as cited in E-business, n.d. p. 3). E-commerce transactions are commonly conducted through the internet but may also be done over private interconnection (e.g. value-added networks, local area networks, wide area networks) (Turban et al., 2005, as cited in E-business, n.d. p. 3). The benefits of e-commerce include: a) online search allows consumers comparison for cheaper products, b) selection of more vendors and products, c) 24 hours-7 days a week shopping from any location, d) quick access to necessary detailed data, e) allows users to avail of custom-made products at lower prices, f) enables persons to make a living or earn a degree at home, g) allows electronic auctions that provides advantage to both vendors and buyers, and h) interact and communicate with other consumers for exchange of experiences and views
Tuesday, February 4, 2020
Cause & Effect of Sept. 11th Essay Example | Topics and Well Written Essays - 1500 words
Cause & Effect of Sept. 11th - Essay Example The social effect is captured by the way the catastrophe altered the American peopleââ¬â¢s perception, behavior and interaction towards Muslims living within and outside the country. The political effect is manifested by the labeling of certain states as the axis of evil and the American-led invasions of Iraq and Afghanistan. The economic effect can be seen from the increased use of resources to secure production, distribution, finance, and communication at the expense of national productivity. What caused the September 11 attacks? In retrospect the big question still is: what led to 9/11 in the first place? There is no clear answer to this question; however, numerous conjectures have been raised. Even the US governmentââ¬â¢s 9/11 commission failed to provide clarity on the real causes of September 11. The commission only gave an unqualified response on who was responsible for the heinous act. There is not a single event in modern times that has elicited as many explanations as this tragedy. According to Bergen (2006) the theories on the causes of the September 11 attacks could be categorized into three: (1) the outright absurd, which state that the attacks were orchestrated by the US government; (2) the believable but flawed that argue that the attacks were done as a response to foreign occupation in the Arab lands; and (3) the credible, which postulates that September 11 was simply a collateral damage resulting from a clash within Islam. The al Qaeda angle In its findings, the US 9/11 commission concluded that the al Qaeda was solely responsible for the terrorist attacks. Osama Bin Laden was at war unambiguously with the United States. Levingston (2010) argued that this was the case because Osama was irked by the multiple engagements of the US in the Arab lands and its unequivocal support for Israel. This theory fits the second categorization of Bergen (2006); the-believable-but-flawed argument. At this juncture, it is important to note that Osama ââ¬â¢s critique towards America had never been cultural. Osama was not fighting Western culture; his was a personal war against the US. Bergen (2006) stated that Bin Laden was astute enough to know that he could not wage an all-out battle against the worldââ¬â¢s sole superpower. He therefore craftily embodied his vision inside al Qaeda and attracted similar disgruntled Islamists whom he managed to convince that America was the enemy. Osama saw terrorism as the only achievable mode of operation to wage war against the US. This argument is believable but flawed because it fails to provide sufficient reasons as to why an individual in the Middle East would be so obsessed with waging a war against the US. Western interference The second plausible root cause of al Qaedaââ¬â¢s attack was perpetual Western interference in the oil-rich Persian Gulf. This interference can be traced back to colonization of Arab states by France and Britain, the creation and unequivocal support for the Jewish state ââ¬â Israel, and currently American hegemony that is exemplified by acts such as the Gulf War in 1990. Western interference is a broader cause than Osamaââ¬â¢s war in that it does not merely point the finger at one Western state ââ¬â America ââ¬â but at the entire Western world. The heart of this argument on Western interference is that the West has slowly and steadily been eroding the Arab culture by permeating Western ideologies in the Persian
Subscribe to:
Posts (Atom)