Monday, 27 April 2009

LEARNING DIARY ON EDUCATIONAL TECHNOLOGY.

LEARNING DIARY ON EDUCATIONAL TECHNOLOGY.


INTRODUCTION:
On 24th April, 2009. The topic discussed was Educational Technology; it is a good topic which is based on studying by helping with technology which is the debating issues in the World about the technology for example the use of computers and other peripheral for studying. The following is the fully explanation of the topic,the topic was presented by Mr. Bahart Sanga and Austin Godfrey the research field presented was good and understood well.

Educational technology (also called learning technology) is the study and ethical practice of facilitating learning and improving performance by creating, using and managing appropriate technological processes and resources. Education technology
It includes the system used in the process of developing human capability.


The Characteristics of educational technology;
It involves input, out put and process aspects of education; in this case when we are talking about the input we mean that you should have supposed materials to help and facilitate learning for example computers and peripherals that can help and faster to do work effectively. Process, it generate situation for presenting the subject -matter systematically. Input, it involves the skill of teaching and awareness of teaching and training methods. Out put, it includes mainly the terminal behaviour of the activities or it clarifies the objectives achieved through the content.

It is an application of scientific knowlege to education and training; it includes the organization of learning and conditions for realizing goals of education; it facilitates learning by control of environment, media and methods.

Major objectives of educational technology
To analyze the characteristics of the learner.
To organize the content in logical or psychological sequence
To evaluate the learner's performance in terms of achieving educational objectives.

Problems facing Educational Technology.
High cost to invest and to run these devices, and good condition area for learning most of
many areas it is not good and proper administration of these devices. Other people they failed to have the devices that helping in studies for example to buy computers and other tools facilitating in learning due to the finational problems that is a big problem facing the society, not only that even the devices still high in cost that failed people to buy.

Also we don’t have enough professional teachers and competent to help the society to use the tools of learning by using technology we have.

{Some of the Societies}
(Learned societies concerned with education technology include)‏

Association for Education Communication and Technology.(AECT). Is an academic and professional association.
Headquarters is in Bloomington, Indiana.
Move from Washington DC in 1996
Association for Leaning Technology (ALT).
Association for Leaning Technology(ALT).Is a united kingdom professional body
It brings together people with the interest in the use of learning technology.
ALT was founded in 1993.
Registered (charity number 1063519)‏
The aims of these organisation to…
Contribute to the development of policy.
Spread good practice in the use of learning technology.
Represent and support its members and provide devices for them.

Future.
In order to have a good skills in education we are supposed even to learn more about this changes of technology forexample the use of computers that will help us to develop in academic matters, therefore to have a good technology realised that all academic matters will be run faster and easy in simplification when working or applied.

Tuesday, 21 April 2009

LEARNING DIARY ON IMAGE COMPRESSION.



Am very interested on the topic of Image compression which was presented by Mr. Justine L. Ngimba and Ms Zuena Mgova on 20/04/2009 the topic was good and well understood.On top of that have learned a lot of things on Image compression and comes to realized that is good and well presentation from my colleges.

THE MEARNING OF IMAGE COMPRESSION.
Image compression is minimizing the size in bytes of a graphics file without degrading the quality of the image to an unacceptable level. The reduction in file size allows more images to be stored in a given amount of disk or memory space. It also reduces the time required for images to be sent over the Internet or downloaded from Web pages.
There are several different ways in which image files can be compressed. For Internet use, the two most common compressed graphic image formats are the JPEG format and the GIF format. The JPEG method is more often used for photographs, while the GIF method is commonly used for line art and other images in which geometric shapes are relatively simple. In other hand Image compression is the action of reducing the size of image by increasing its compactness, in image compression Data compression is the technique that is used to reduce larger data files into smaller file size.


Types of image compression.


Image compression can be lossy or lossless. Lossless compression is sometimes preferred for artificial images such as technical drawings, icons or comics. This is because lossy compression methods, especially when used at low bit rates, introduce compression artifacts. Lossless compression methods may also be preferred for high value content, such as medical imagery or image scans made for archival purposes. Lossy methods are especially suitable for natural images such as photos in applications where minor (sometimes imperceptible) loss of fidelity is acceptable to achieve a substantial reduction in bit rate.
My be let asked together why image compression? therefore what have learned from my fellow that we compress in order to make transfer of image through network faster, to saves space in storage devices, It saves time for image downloaded these are some of points that why we compress the image.

Image format.
The format of image includes:-
TIFF (Tagged Image File Format)
JPEG (Joint Photographic Experts Group)
GIF (Graphical Interchange Format)
PNG (Portable network graphics)
BMP (Bitmap)

ADVANTAGES OF IMAGE COMPRESSION.

Reduce the data storage requirements
Reduce the time for images downloaded
E-mail attachment
Web pages
Photo sharing websites

DISADVANTAGES OF IMAGE COMPRESSION.

Reduce reliability of image records
Reduction of information or bits
Time consuming.
disruption of data properties

NOTE.THIS IS VERY IMPONTANT TO KNOW IN IMAGE COMPRESSION.
In compressing an image, start from the original image since compression from compressed image leads to poor image quality.
Do not save to the new format if you think you need to still proceed in compressing and image

Monday, 20 April 2009

LEARNING DIARY ON DATA MINING:


LEARNING DIARY ON DATA MINING.

Am very interested on the topic of Data Mining which was presented by Mr Joshua Sendu and Remy Kaaro on 17/04/2009 the topic was good and well understood.
On top of that have learned a lot of things on Data Mining and comes to realized that is good and well presentation from my colleges.
THE MEARNING OF DATA MINING.

Data mining. Is the process of extracting hidden patterns from large amount of data.
Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases.
BACKGROUND.
Humans have been "manually" extracting information from data for centuries, but the increasing volume of data in modern times has called for more automatic approaches in order to simplify the collection of information from data by doing so their increasing power of computer technology has aided for easier data collection, processing, management and storage. However, the captured data needs to be converted into information and knowledge to become useful easier for collection the information. Data mining is the process of using computing power to apply methodologies, including new techniques for knowledge discovery, to data.
There are three stages of data mining, which are;
Data Exploration This stage usually starts with data preparations which involve cleaning data and data transformation. Data exploration is a methodology in which manual techniques are utilized to find one's way through a data set and bring important aspects of that data into focus for further analysis. Though such a methodology can be applied to data sets of any size or type, its manual nature makes it more reasonable for smaller data sets, especially those in which the data has been carefully gathered and constructed.
Model building and validation:
This stage involves considering various models and choosing the best one based on their predictive performance can be good for use.
Deployment: This is the final stage which involves using the model selected as best in the previous stage and applying it to new data in order to generate predictions or estimates of the expected outcomes
There are several advantages of the data mining then he following are some of them, banking here the bank can find the good information and then they can analyses for a good manner then advertise to the people then they can learn very well, another advantages like Marking, for the researchers, Law enforcement.
In other hand regardless there are some advantages, data mining also have some disadvantages then the following are as follows security in case of this it need a very highly security to protect the data if the technology used to store may be to collect the information is not good or properly it leads to lost the information quickly,Misuse of information; if the information not used properly it can be easier for other people to know the secret information that not need to be known by the other people, Privacy issues; there are some issues which people do not want them to be known as public issues that is why are kept in hidden.

Conclusion: Data mining is a good topic and people should understand well for there benefit for example to hide the information not each to be public ally. Therefore the topic was good.



Tuesday, 7 April 2009

AUTOMATIC ESSAY ASSESSMENT.


LEARNING DIARY ON
AUTOMATIC ESSAY ASSESSMENT.


The research field was conducted by Mr. Nyambalafu and Miss Rose Mchaka on 6th April 2009. The topic was good and understood well but for the first time it was very difficult to me to understand the meaning of Automatic Essay Assessment, now am feel okey on that.
The meaning of Automatic Essay Assessment.
Refers to the use of an electronic machine to make essay evaluation, where by an electronic machine can determine for example the grade of the students, even the machine can avoid the plagiarism, the machine is able to show if the sentences has plagiarism, analyze learning outcome (make evaluation).


The following are the Advantages or importance of Automatic essay assessment.
These are categoriesed into two parts.
To the teacher:
It saves time in marking process.
It saves time in making evaluation.
It helps to make a final grader.
It helps a teacher to be consistency.
To the students.
It challenges students to think critically.
It provides real feedback to the students.
It looks the qualities of the students work and not comparisons with others.
It supports students to reflect learning process.

Therefore to have an electronic machine of doing such activities it is a good plan because it helps in simplification of work but the problems comes It is very cost full for making program because it need a lot of money to buy the program, It reduce thinking capacity of the teacher for example in steady of doing harder machine help to simplify each and everything,It needs high qualified people on setup


Futures.
To have a machine which can assess each and everything.
To give back the whole essay with all corrections.
To have a machine which can assess hardcopy
essay.

Monday, 6 April 2009

SPEAKER RECOGNITION.


LEARNING DIARY ON
SPEAKER RECOGNITION:
This topic was prepared by the students of Tumaini University College.Mr. Benjamin Mkwese and Ruben Minael first year students of Bachelor of Science in Information and communication Technology.
The research field was good and understood well: for the first time it was very difficult to select this topic because of fear and to thing where i can get the material for presentation therefore at the end of preparation come to conclude that it is good well topic.
As human beings, we are able to recognize someone just by hearing him or her talk. Usually, a few seconds of speech are sufficient to identify a familiar voice. The idea to teach computers how to recognize humans by the sound of their voices is quite evident, as there are several fruitful applications of this task.
SPEAKER RECOGNITION:
Speaker recognition. Is the process of automatically recognizing who is speaking on the basis of individual information included in speech signals.
SPEAKER RECOGNITION HAS BEEN CATEGORISED INTO TWO CLASSES:
It can be divided into Speaker Identification and Speaker Verification. Speaker identification determines which registered speaker provides a given utterance from amongst a set of known speakers. Speaker verification accepts or rejects the identity claim of a speaker - is the speaker the person they say they are?
Speaker recognition technology makes it possible to a the speaker's voice to control access to restricted services, for example, phone access to banking, database services, shopping or voice mail, and access to secure equipment.

HOW THE SYSTEM WORKS:
Another thing has learned to this topic it is about how the system works.
The voice input to the microphone produce an analogue speech signal. An analogue to digital converter (ADC) converts this speech signal into binary words that are compatible with digital computer. The converted binary version is then stored in the system and compared with previously stored binary representations of words and phrases.
The current input speech is compared one at a time with the previously stored speech pattern after searching by the computer. When a match occurs, recognition is achieved. The spoken word is binary form is written on a video screen or passed along to a natural language understanding processor for additional analysis.
During training, the computer displays a word and the user reads it aloud. The computer digitizes the user’s voice and stores it. The speaker has to read aloud about 1000 words. Based on these samples, the computer can predict how the user utters some words that are likely to the pronounced differently by different people.
It is noted that even if the same speaker talks the same texts. there are always slight variation in amplitude or loudness of the signal,pitch,frequency difference, time gap etc. Due to this reasons there is never a perfect match between the templates and binary input word.

APPLICATION:
One of many application of speaker recognition is in military operations. Voice control of weapons is an example with reliable speech recognition equipment; pilots can give commands and information to the computers by simply speaking into their microphones they don’t have to use their hands for this purpose.
CONCLUTION:
The topic was good and well understood therefore to have this is a good top and better to register to the system inoder to secure the materials you have may be in the machine such as computer.

Thursday, 2 April 2009

CRYPTOGRAPHY.


CRYPTOGRAPHY.
The research field was done by Mr. Izadin Abdalah and Mr. Joseph Uwemba.First year IT students from Tumaini University College.
For the first time it was very difficult to understand the term CRYPTOGRAPHY even to select to be my research field . But after getting the concepts, knowledge about the cryptography from my fellows now am well understand the terminology. (Cryptography).

The following are the very important things what I have learned in cryptography:
Cryptography:
This term come from the two creek words. That is kriptos-it means hidden and graphen which means writing: Therefore cryptography is the study of hiding the information. It provides a great tool for protecting the information. Therefore what have learned here that this terminology explain the process of hiding information, in order to avoid things to be lasted.
Also another thing that I have learned on this top is that: Mr. Izadin Abdalah and Joseph Uwemba to their field they have said that the I am of this research field is only as an IT professional to use cryptography as a security tool of the computer system.
Not only that the cryptography was used as a tool to protect national secretes and strategies: all this technology was used by Egyptians some years ago.
The components of cryptography: are as follows.
-An algorithm (or cryptographic method and another component was:
-Keys:
But cryptographic has been classified into difference ways some of them are.
Secret key system: (also know as symmetric systems), public key system (also known as asymmetric system. Then what I have learned here for secret key it explains that uses only a single key for both encryption and decryption.
Due to that, I mean in secret key only one key can be used for example for the first time close and to open only one key can be applied at the same time.
Public key uses pair of key to open and to close for security. (Used for encryption, due to what Mr. Joseph Uwemba and Izadin Abdalah they have said this type of cryptography it is a modern one for application compared to the other, also used it to make a digital signature capability )
In fact that discussion was good and understood well to me.