Saturday, May 31, 2008

Assignment # 4 , Q #12 & # 13

Q(12)
Display the RG face of the color cube.
Ans.
RG(:,:,1)=[ones(256,1)*[0:1:255]/255]';
RG(:,:,2)=[ones(256,1)*[0:1:255]/255];
RG(:,:,3)=zeros(256);
imshow (RG)








Q(13)
Display the GB face of the color cube.
Ans.
GB(:,:,1)=zeros(256);
GB(:,:,2)=[ones(256,1)*[0:1:255]/255]';
GB(:,:,3)=[ones(256,1)*[255:-1:0]/255];
imshow(GB)

Assignment # 4 Q # 11


Q(11)Display the RB face of the color cube(see fig 6.9 of page 404 of the text) Ans.
RB(:,:,1)=[ones (256,1)*[0:1:255]/255]';
RB(:,:,2)=zeros(256);
RB(:,:,3)=[ones(256,1)*[0:1:255]/255];
imshow(RB)

Assignment # 4 Q # 10


Q(10) Display a greyscale image like the following.
Ans imshow((1/255)*ones(256,1)*[0:1:255])

Assignment # 4 , Q # 4, 5, 6, 7, 8, 9

Q 4. On Octave find a command to make a 256 x 256 matrix with the rows, all the same, equal to the numbers 0 to 255.
Ans. ones(256,1) * [0:1:255]
Q5. On Octave find a command to make a 256 x 256 matrix with the columns, all the same, equal to the numbers 0 to 255.
Ans.[ ones(256,1) * [0:1:255]]'
Q 6. On Octave find a command to make a 256 x 256 matrix of all zeros.
Ans. zeros(256)
Q(7)On Octave find a command to make a 256 x 256 matrix of all ones.
Ans. ones(256)
Q(8).On Octave find a command to make a 256 x 256 matrix of the value 128.
Ans. 128 * ones(256)
Q(9) same as Q 6

Assignment # 4 , Q # 1, 2, 3

Q(1) Find an Octave command to make a matrix of 256 x 1 size
Ans. ones(256,1)
Q(2) Find an Octave command to make a matrix of the integers 0 through 255 in a single row.
Ans. M=[0:1:255]
Q(3). Find an Octave command to make a column of integers 0 through 255.
Ans.M=[0:1:255]' ( transpose of the matrix M in Q 2)

Saturday, May 24, 2008

Assignment #3, Q2 & Q3

Problem 2: (book Page 457) Consider any two valid colors C1 and C2 with coordinates

(x1, y1) and (x2,y2)in the chromaticity diagram. Derive the necessary general expressions for computing the relative percentages of colors C1 and C2 composing a given color that is known to lie on the straight line joining these two colors.

Solution:

Let C(x, y) be any point (color) on the

line joining the two given point (colors) C1(x1, y1) and C2(x2, y2). The distance between the two given colors C1 and C2 is given by the distance formula in calculus:

d (c1, c2) = √(x1 – x2)2 + (y1 – y2)2

Distance between C1(x1, y1) and C(x, y) is d1 (c1, c) = = sqrt{(x1 – x)2 + (y1 – y)2} . And distance between C2(x2, y2) and (x, y) is

d2 (c2, c) = sqrt{(x2 – x)2 + (y2 – y)2}.

Let P1 = percentage of color C1(x1, y1) in C(x, y)

and P2 = percentage of color C2(x2, y2) in C(x, y)

then P1= [{d (c1, c2) - d1 (c1, c)}/ d (c1, c2) ]* 100 % .....(i)

and P2 = {d (c1, c2) - d2 (c2, c) }/ d (c1, c2) = (100 – P1) % ......(ii)

Special Cases:

(1) When C = C1 then

P1 = [{d (c1, c2) - 0} / d (c1, c2) ]* 100 % = 1 * 100 % = 100 % and

P2 = {d (c1, c2) - d2 (c2, c1)}/ d (c1, c2) = 0% = (100 – P1) % = (100 – 100)% = 0%

(2)When C = C2 then

P1=[{d (c1, c2) - d1 (c1, c2)}/ d (c1, c2) ]* 100 % = 0% and

P2 = {d (c1, c2) - d2 (c2, c2)}/ d (c1, c2) ]*100 % = 1*100% = 100%

= (100 – P1) % = (100 – 0) % = 100%

Note:

Percentage of the colors C1(x1, y1) and C2(x2, y2) in any given point (color) between C1 and C2 can be calculated by using the equations (i) and (ii) above.

For Example:

Let us consider 380 nm and 520 nm wavelengths. 380 nm wavelength has x and y coordinates as C1 (0.175, 0.003) and 520nm wavelength has x and y coordinated as C2 (0.055, 0.840). We take any point (color) e.g. C(x, y) with x and y coordinates say C (0.115, 0.4215) on the line joining C1 and C2. We can calculate percentage of C1 and C2 in C as follows:

Using (i) above: Percentage of 380nm wavelength in C(x, y) = P1, so

P1= {d (c1, c2) - d1 (c1, c)}/ d (c1, c2) * 100 %

= {√ (0 .175 – 0.055)2 + (0.003 – 0.840)2 - √ (0.175 - 0.115)2 + (0.003 – 0.4215)2} / {√ (0 .175 – 0.055)2 + (0.003 – 0.840)2} * 100 %

= {√0.0144 + 0.700569 - √0.0036 + 0.17514225} / {√0.0144 + 0.700569} * 100 %

= (0.845558395 – 0.422779197)/ (0.845558395) * 100 %

= (0.422779198) / (0.845558395) * 100 %

= 0.5 * 100 %

= 50%

Therefore, Percentage of 380nm wavelength [C1 (0.175, 0.003] in C(x, y) = C (0.115, 0.4215) is 50 %

Hence, percentage of 520nm wavelength [C2 (0.055, 0.840)] in C(x, y)
P2= (100 – P1) % = (100 - 50)% = 50% -----------------------------------------------------------------------------------------
Problem #3 ( Problem 6.3 p 457)

Consider any three valid colors now c1, c2 and c3 with coordinates (x1,y1), (x2, y2), and
(x3,y3) in the chromacity diagram of Fig 6.5. Derive the necessary general expressions for computing the relative percentages of c1, c2 and c3 composing a given color that is known to lie with in the triangle whose vertices are the coordinates of c1, c2 and c3.

Solution:





























----------------------------------------------------------------------------------------------------

Thursday, May 15, 2008

Assigment #2 Q7

Choose symbols to represent the truth values of phrases in the following paragraph:
"Poison caused the victim's death IFF there was a change in his blood chemistry OR a residue of poison in the stomach. There was NEITHER a change in blood chemistry NOR a residue of poison in his stomach, BUT there were puncture mark on the body.Poison was injected by the ONLY IF there were puncture marks on the body. Poison was injected by a needle ONLY IF there were puncture marks on the body. EITHER poison was the cause of the victim's death, OR there were no puncture marks on the body".
Let A = Poison caused the victim's death
B = Change in blood chemistry of the victim
C = Residue of poison in victim's stomach
D = Puncture marks in the victim's body
E = Poison was injected by a needle
Now the first statement is:
"Poison caused the victim's death IFF there was a change in his blood chemistry OR a residue of poison in the stomach" which is equivalent to A IFF (B OR C)
2nd statement:
"NEITHER a change in blood chemistry NOR a residue of poison in his stomach, BUT there were puncture mark on the body" which is equivalent to NOT(B OR C) AND D
3rd statement is:
"Poison was injected by a needle ONLY IF there were puncture marks on the body" which is equivalent to E ONLY IF D
4th statement is:
"EITHER poison was the cause of the victim's death, OR there were no puncture marks on the body" which is equivalent to A XOR NOT(D)


A IFF (B OR C) = NOT[A OR(B OR C) AND NOT(A AND (B OR C)
E ONLY IF D = NOT(D) OR E
A XOR NOT(D) = (A OR (NOT D)) AND NOT( A AND (NOT D))
--------------------------------------------------------------------------------------------------
Assignment 2 Q6
The two binary pictures listed below are pic1 and pic2. Create the following:
(1) pic1 and pic2
(2)pic1 or pic2
(3)(Not pic1)IMPL(Not pic2)

Solution:
(1)


pic1 and pic2






(2)
pic1 or pic2










(3) (NOT pic1) IMPL(NOT pic2)

ASSIGNMENT # 2 Order of Magnitude

Orders of Magnitude

(1) 64 K = 64 kilobytes
1GB = 1 gigabytes = (1024) (1024)kilobytes

(1024)(104) K/(64K) = 16384
Therefore, today's computers have 16 384 times more of memory.

(2)Memory of a double sided floppy disk = 800K
Memory of a DVDs =4.7GB

= 4.7 (1024 ) ( 1024)K
= 4928307.2K
4928397.2K/800K = 6160.384
Therefore, there will be approximately 6 160 floppy disks are equivalent to one 4.7GB DVD.

(3) A lot of information is available on internet regarding the history of development of the speed of the processor of computer.Following links may help.

http://www.willus.com/archive/timeline.shtml
http://trillian.randomstuff.org.uk/~stephen/history/microprocessor.html
http://trillian.randomstuff.org.uk/~stephen/history/timeline-CP

In early 70s, the Intel processor's rate was 108KHz , approximately 0.06 MIP (Million Instructions Per Second) Pentium II 333MHz today runs at 770 MIP. AMD released the Phenum X4 9750 running at 2.4 GHz and 9850 running at 2.5 GHz. Intel released Xeons, the L5400 series, running up to 2.5 GHz. Today's computers are running more than 12833 MIP times faster.

The original IBM PC (c. 1981) had a clock rate of 4.77 MHz (4,770,000 cycles/second)" http://en.wikipedia.org/wiki/Clock_rate)

An IBM PC with an Intel 486 CPU running at 50 MHz will be about twice as fast as one with the same CPU, memory and display running at 25 MHz, while the same will not be true for MIPS R4000 running at the same clock rate as the two are different processors with different functionality.The clock rate of the RAM, the width in bits of the CPU's bus and the amount of Level 1, Level 2 and Level 3 cache.

Computers today boast processor clock rates which are superior to the original IBM PC (circa 1981) clock rate of 4.77MHZ. My iBook G4 (2004), for example, has a processor speed of 1.07 GHZ.

Assignment #2 Q 4 & 5

Q. How do things grow/change if you were working in trinary? That is assumed that there are three possible inputs {0,1,2}, how many possible binary operations are there?

Since there are three possible inputs {0, 1, 2} . Therefore, 3^9 = 19 683.
x 0 0 0 1 1 1 2 2 2
y 0 1 2 0 1 2 0 1 2

In Binary case , for two choices and four ways to arrange them; hence, there are 2^4=16 operations. In this case, we have three operations, and nine ways to arrange them; therefore, we have 3^9 operations.

------------------------------------------------------------------------------------------------

Problem # 5

How many binary operations are necessary so that compositions of these binary operations can be used to express every possible two argument function on ternary operations?

Solution:
Since the operations IMPL, OR, AND, and NOT can generate all 16 binary functions, these same four can generate every possible two argument function on trinary operations.So the function: NOT, OR, AND, and IMPL here are only 4 binary operations necessary so that compositions of these binary operations can be used to express every possible two argumen.



ASSIGNMENT # 2 Q 3(a)

Q3 (a) which of the 16 binary operations are commutative?

By definition a function is said to be a commutative function if f(x, y) = f(y, x).
So commutative functions are:

[0,0,0,0] =x XOR x

[0,0,0,1]=x XOR ((x IMPL y) XOR ((x XOR x) IMPL(x XOR y)))

[0,0,1,1]=x

[0,1,0,1]=y

[0,1,1,0]=x XOR y

[0,1,1,1]=y XOR ((x IMPL y) XOR ((x XOR x) IMPL(x XOR y)))

[1,0,0,0]=x XOR(y IMPL x)

[1,0,0,1]=(x XOR y) IMPL(x XOR x)

[1,0,1,0]=y IMPL(x XOR x)


[1,1,0,0]=x IMPL(x XOR x)

[1,1,1,0]=x IMPL(x XOR y)

[1,1,1,1]=(x XOR x) IMPL (x XOR y)

ASSIGNMENT # 2 Q 2(g)

Problem:
Which (if any) of the possible binary functions can not be represented using only compositions of {XOR, IMPL}

Solution:

0000=x XOR x

0001=x XOR ((x IMPL y) XOR ((x XOR x) IMPL (x XOR y)))

0010=(x IMPL y) XOR ((x XOR x) IMPL (x XOR y))

0011=x

0100=x XOR(y XOR ((x IMPL y) XOR ((x XOR x) IMPL(x XOR y))))

0101=y

0110=x XOR y

0111=y XOR ((x IMPL y) XOR ((x XOR x) IMPL(x XOR y)))

1000=x XOR(y IMPL x)

1001=(x XOR y) IMPL(x XOR x)

1010=y IMPL(x XOR x)

1011=y IMPL x

1100=x IMPL(x XOR x)

1101=x IMPL y

1110=x IMPL(x XOR y)

1111=(x XOR x) IMPL(x XOR y)

Therefore all 16 functions can be written using only compositions of XOR and IMPL.



Problems assigned to me in Assign #2

First 4 digits of my student # = 2070

2070 = 6 (mod 8) => Problem # 2 (g)

2070 = 5(mod7) => Problem # 6 (f)

2070 = 0(mod 3) => Problem # 3(a)

BIT STRING and LOGIC

Problem (1)

Show that every binary function(there are 16) can be expressed as a composition of the binary operations AND/OR and NOT

Solution:

Let

X = [0, 0, 1, 1] and

Y = [0, 1, 0, 1]

Then

NOT X = [1, 1, 0, 0]

NOT Y = [1, 0, 1, 0]

By successive division by 2 of 0 to 15 decimal digits we get 16 Binary Functions as:

00 = [0, 0, 0, 0]
01 = [0, 0, 0, 1]
02 = [0, 0, 1, 0]
03 = [0, 0, 1, 1]
04 = [0, 1, 0, 0]
05 = [0, 1, 0, 1]
06 = [0, 1, 1, 0]
07 = [0, 1, 1, 1]
08 = [1, 0, 0, 0]
09 = [1, 0, 0, 1]
10 = [1, 0, 1, 0]
11 = [1, 0, 1, 1]
12 = [1, 1, 0, 0]
13 = [1, 1, 0, 1]
14 = [1, 1, 1, 0]
15 = [1, 1, 1, 1]

By using AND, OR and NOT we can write these Binary Functions as:

[0, 0, 0, 0] = (X) AND (NOT X)
[0, 0, 0, 1] = (X) AND (Y)
[0, 0, 1, 0] = (X) AND (NOT Y)
[0, 0, 1, 1] = (X) AND (X)
[0, 1, 0, 0] = (NOT X) AND (Y)
[0, 1, 0, 1] = (Y) AND (Y)
[0, 1, 1, 0] = {(X) AND (NOT Y)} OR {(Y) AND (NOT X)}
[0, 1, 1, 1] = (X) OR (Y)
[1, 0, 0, 0] = (NOT X) AND (NOT Y)
[1, 0, 0, 1] = NOT{(X) AND (NOT Y)} OR {(Y) AND (NOT X)}
[1, 0 ,1, 0] = NOT Y
[1, 0, 1, 1] = (X) OR (NOT Y)
[1, 1, 0, 0] = NOT X
[1, 1, 0, 1] = (NOT X) OR (Y)
[1, 1, 1, 0] = NOT{(X) AND (Y)}
[1, 1, 1, 1] = (X) OR (NOT X)

Saturday, May 10, 2008

"Copying from internet is not cheating"

I think students of this age are better than the generations before us. They just have more access to technology, which creates more temptation. But the question is that we need to make our students realize that they must cite the reference they are getting the idea from and tell then clearly that this is not your thought process. It's not an original idea. If you use it, you need to cite it because it didn't come from you.

This article may be of interest to you. Please read if you have interest and time for it. Thanks. Enjoy.

Computers, The Internet, and Cheating Among Secondary School Students: Some Implications for Educators

Stacey Conradson & Pedro Hernández-Ramos
Santa Clara University

This article investigates in greater depth one particular aspect of cheating within secondary education and some implications for measuring academic achievement. More specifically, it examines how secondary students exploit the Internet for plagiarizing schoolwork, and looks at how a traditional method of educational assessment, namely paper-based report and essay writing, has been impacted by the growth of Internet usage and the proliferation of computer skills among secondary school students. One of the conclusions is that students’ technology fluency is forcing educators to revisit conventional assessment methods. Different options for combating Internet plagiarism are presented, and some software tools as well as non-technology solutions are evaluated in light of the problems brought about by “cyberplagiarism.”

Is student cheating on the rise in our secondary schools? Most researchers concur that the incidence of academic misconduct in our middle schools and high schools has increased significantly in recent years (Underwood and Szabo, 2003; Petress, n.d.). In fact, the preponderance of statistical and anecdotal evidence underscores several disturbing trends, indicating that cheating at the secondary level is not only occurring more frequently, but that students are using much more sophisticated methods for their transgressions. Although educators and academics disagree on the root causes of this alarming behavior, there is little dispute that the accessibility of computers, the Internet, and other electronic resources such as CD-ROM encyclopedias has made cheating quicker and easier for our current generation of technology-savvy teenagers. “Cybercheating,” meaning the use of technology tools in inappropriate ways for academic work, is on the rise.

The intent of this article is not to suggest that technology use inevitably results in aberrant student behavior. Rather, the investigation of “cybercheating” provides some useful insights on a complex social and educational debate about the role schools should play in preparing students with the skills needed for the workforce of the twenty-first century. Fulton (1997) persuasively argues that schools must change traditional approaches to learning in order to help today’s students acquire the skill sets required for succeeding in the workplace of the future. These advanced skills will be achieved “through the learner’s interactions with content” in the “digital age” and not through “the transmission of facts” (Fulton, 1997). In other words, technological changes have rendered traditional methods of teaching and assessment in education less effective and less relevant—at least from the perspective of many students and quite a few educators as well. Shaw (2003), for example, argues that “we will have to design assessment tools that are more reflective of the way knowledge and information are used in the adult world” (p.39).

The Cyberplagiarism Problem in Secondary Schools

Cromwell (2000) claims that “Many trend watchers think cheating is epidemic, usually beginning in middle school and extending though college.” Schulte (2002) reported the results of a Rutgers University study based on 4,500 high school students from 25 high schools around the country. The study found that 72 percent of the students admitted to “seriously cheating on a written work” and more than half had “copied portions of a paper from the Internet without citing the source.” Donald McCabe, the founder of the Center for Academic Integrity, is quoted as saying that

“…cheating is starting younger—in elementary school in fact. And by the time students hit middle and high school, cheating is, for many, like gym class and lunch period, just part of the fabric of how things are….What’s changed is technology. It’s made cheating so easy. And the vast realms of information on the truly, worldwide Web are so readily available. Who could resist?” (in Schulte, 2002).

In a different article (Thomas, 2001), McCabe is quoted asserting that “High-schoolers are much more likely than college students to use the Net to cheat, and computers have redefined younger kids’ concept of what constitutes cheating.” McCabe also claims, based on his findings, that 15 to 20 percent of high-schoolers have bought or downloaded papers from one of the many paper mill websites to submit as their own work.

Educational Communications (1998), based on a survey of the top scholastic high school achievers selected from the annual Who’s Who Among American High School Students “honor roll,” found that four out of every five students admitted to cheating during their high school career to improve grades. This 1998 poll resulted in the highest percentage of cheating honor students in the thirty-year history of the program. Of particular concern was the fact that 53 percent of the respondents felt cheating was “no big deal.”

There are a multitude of sources corroborating the above findings. For example, research by the Josephson Institute of Ethics (1998) is another example of a frequently quoted survey involving 20,829 middle and high school students, where 70 percent reported that they had cheated in school. It should be noted that while some in academia and elsewhere have found fault with some of the survey techniques, or have questioned the interpretation of some data, the overwhelming proportion of literature suggests that student plagiarism at the secondary level is a pervasive practice, with significant percentages of students copying directly from the Internet and other electronic sources without proper attribution. For example, in their meta-analysis of studies on cheating Athanasou & Olasehinde (2002) found that “substantial proportions of males and females engaged in cheating at high school and that substantial proportions continued cheating in college or university.”

Intentional and Unintentional Plagiarism

Dr. Jamie McKenzie, editor of the online educational journal From Now On (www.fno.org), claims that many students engaged in plagiarism truly do not understand that the exercise of cutting and pasting into a paper without attribution is morally wrong. “They [students] don’t think of it as cheating. They are simply collecting information and don’t understand the whole concept of intellectual property” (quoted in Hafner, 2001). Many academic experts on plagiarism concur with this point of view. In other words, students who have acquired a certain view toward intellectual property (if they recognize the concept at all) with respect to music, movies, email, jokes, photos, and other web-related content assume that there’s nothing illegal or unethical about taking or copying material from the web for the fulfillment of school assignments. Given that many teachers in secondary education often lack the familiarity and Internet-related skills that their students have, they are prone to misinterpret acts of copying as deliberate cheating. Teachers—particularly those working in middle and high schools—need to consider that their students’ use of content without proper attribution often represent inadvertent incidents of cheating.

Straw (2000) argues that educators must learn to discern “Acts of academic dishonesty committed with deliberate intent… [from]… the unintentional results of inexperience and ignorance.” He further observes that “…students are stunned to learn that the sites they’re using are created by individuals who need to be acknowledged. The structure of the Internet must be seen as a culprit in creating much of this confusion. A great deal of electronic information lacks the tangible physical presence of print sources.” If more than a century earlier Rhodes (1899) had to remind his fellow historians that “the study of history is a training in the handling of books,” we may find it necessary to alert all instructors that teaching and learning in the twenty-first century must include training in the “handling” of the rich technology-based information resources—including electronic books—available now.

Providing a simple definition of “plagiarism” is a good starting point for helping students gain a clearer understanding of acceptable uses of other authors’ writings. Pearson (2002) defines plagiarism as “Presenting someone else’s ideas or work as your own, without attribution.” Pearson urges teachers to set clear expectations about the originality of schoolwork, and to discuss the importance of doing one’s own critical thinking in terms of the learning process. She pragmatically suggests that “those who cheat are going to do it no matter what I say…my job is to help (students) think about it, and to let them make their own informed choices.”

In short, the various types of plagiarism run the gamut from students’ not knowing at all about the need to properly acknowledge their sources, to believing a source to be common knowledge—thus committing an innocent error in judgment biased in favor of their own sense of “originality”—to a student’s submission of a paper entirely composed by another author, hence, consciously executing an overt act of academic dishonesty. Educators at the secondary level need to become aware of and learn to differentiate egregious transgressions from the more innocuous cases of cheating without an explicit intent. This could be accomplished through in-service opportunities focused on this cheating, or by making widely available information specifically developed for teachers to help them cope with this challenge (e.g., Hurwitz and Hurwitz, 2004; Creech and Johnson, 1999).

Deliberate Plagiarism and the Use of Paper Mill Websites

The proliferation of websites offering term paper services has not only unleashed a fury of controversy in academic circles, but has given rise to new ways of promoting and facilitating student cheating, especially at the high school level. In fact, one source estimates that 60 percent of all papers downloaded for purposes of plagiarism are acts committed by high school students (Plagiarism and the Web, 2002). Other researchers suggest that, due to the generally poor quality of papers found on “paper mill” sites, many of the submissions would not be considered acceptable work at the college level.

In examining their offerings, a sampling of paper mill sites provides a range of online services from digital “Cliff Notes” or lecture notes, to free and “for fee” essays and term papers, as well as editing and custom design services for college-quality papers which command fees of up to $30/per page. Since a racketeering lawsuit filed by Boston University threatened to shut down a list of these sites by name (the suit was later struck down by the courts), most sites now publish a disclaimer that their offerings are intended solely for “research purposes”—thus inferring that their content is not supposed to be used with an intent to cheat and/or plagiarize. These warnings are obviously not monitored, nor are any enforcement measures taken.

To get a rough idea of the extent to which these web businesses influence or facilitate student plagiarism, it is useful to look at the magnitude of web traffic they generate. Paul Roberts, the founder of Cheater.com, for instance, claimed that in the late 1990s his firm signed up 80 to 100 members every day, and the site received roughly 13,000 daily hits (Clayton, 1997). Kenny Sahr, who launched the website School Sucks (www.schoolsucks.com), asserts his site attracted about 10,000 unique visitors per day (Glasner, 2002). Sahr quips that “…besides casinos or porn [the paper mill sites are the only ones] making money on the Internet” now. When asked whether his business encourages cheating, Sahr remarked that his site is “a stupid place to plagiarize from” (Glasner, 2002). As a shameless, self-proclaimed industry spokesman, Sahr admits to stirring the pot and putting audiences, especially teachers, on the defensive:

“What worries me is that educators are worried about School Sucks. A teacher who’s giving original and creative assignments, who’s reading the students’ writing and knows what it’s like, has nothing to fear from School Sucks” (Cromwell, 2000).

The tagline at Sahr’s website is “ Download your Workload.” The reality is that such messages fly directly in the face of values such as academic integrity and individual accomplishment. Judging by the number of paper mill sites currently in business, and the growth of paper mill Internet addresses (or URLs), one must conclude that, as long as these sites are attracting visitors, whether educators like it or not these enterprising publishers are here to stay.

There are three major types of web sites used by students interested in “downloading their workload.” The first are lecture note sites, the second are term paper and essay sites, and the third are editorial services sites. The first two categories have some “free” offerings (in exchange for opening an “account” where private information including an email address must be provided), such as SparkNotes (www.sparknotes.com), now owned by Barnes & Noble. The cost for papers bought from these publishers runs from as little as $5/per page up to a minimum per paper charge of $500 for highly specialized topics. The price of a paper bought at one of these vendors might fall into a range of $30 to $100, plus delivery charges in most cases, which is a fee range many secondary students would find within their budgets.

Table 1. Selected sample of web sites offering lecture notes, term papers, essays, and editorial services.
Lecture Note Web Sites Term Paper & Essay Web Sites Edit Service Sites
www.pinkmonkey.com
www.sparknotes.com
www.novelguide.com
www.givemenotes.com
www.schoolpaper.com
www.cheathouse.com
www.lazystudents.com
www.geniuspapers.com
www.researchcentral.com
www.a1-termpaper.com
www.allpapers.com
www.papersinn.com
www.research-assistance.com
www.12000papers.com
www.ezwrite.com
www.planetpapers.com
www.bignerds.com
www.chuckiii.com
www.freeessay.com
www.realpapers.com
www.NetCheats.com
www.cyberedit.com
www.termpapers.net

In surfing these sites one discovers a myriad of services offered. In an attempt to differentiate one site from another, some of the more savvy marketers advertise deliberate misspellings and grammatical mistakes in their papers so as to avoid arousing teachers’ suspicions. Other sites provide detailed instructions for paraphrasing so as to escape detection by one of the search engines designed explicitly to uncover student plagiarism. Clearly, the founders and owners of the paper mill businesses maintain a watchful eye on the legal and technical issues potentially impacting their market, and have thus far managed to stay a step ahead of those who want to shut them down.

Reversing the Trend: Some Practical Solutions

There is a wide array of options available to educators designed to deter students from committing plagiarism and/or cheating in their writing assignments. There are three general categories of techniques that teachers and administrators may deploy to combat this particular aspect of student cheating, including: 1) the application of commercial, technology-based tools for detecting plagiarized schoolwork, 2) the establishment of academic policies for reducing cheating behaviors, and 3) the re-evaluation and redesign of traditional methods of educational assessment.

Commercial Tools for the Detection of Plagiarized Content

With the proliferation of web-based content and the online paper mill businesses, technology savvy teachers and administrators have fought back by seeking electronic methods for catching offenders. In response to educators’ needs, commercial offerings for detecting web-based cheating have evolved. Currently, the available tools range from free, mainstream search engines such as Google or AltaVista, to the deployment of services such as TurnItIn.com, a sophisticated offering that does text string matching against approximately 1.5 billion web pages. Some of the more popular detection services, in addition to TurnItIn, include IntegriGuard, WordCheck Software, and Essay Verification Engine (Eve 2.2). Fees for these services, although differently structured, typically include a monthly flat rate or an annual minimum service charge, with a nominal fee per document. (It bears mentioning that not all public secondary schools are in a position to afford this type of specialized service.)

Once a school, district, or an individual instructor signs up for an anti-plagiarism service, their students must submit electronic copies of their work, which are then uploaded to the respective service. The software engine in these services uses algorithms to match up identical text strings from the student’s paper with content sources found on the web or in databases of other students’ papers and essays. TurnItIn, for example, maintains a huge repository of the student papers that are sent to the service. New submissions are compared with its existing database and then added to the repository. Once submissions are reviewed, scores are returned to the instructors indicating “original” content.

John Barrie, the founder of TurnItIn, estimates that in about 85 percent of the cases when students are caught plagiarizing it is because they cut and paste directly from web pages; and another 13 to14 percent of the occurrences of plagiarism are due to students copying from other students (Reagan, 2002). Barrie claims that less than one percent of the time does plagiarized work come from a paper mill source. However, it is reasonable to assume that if students are told their papers will be electronically analyzed, the vast majority will take measures to avoid turning in plagiarized web content, knowing there is a high probability of being caught and disciplined.

Are these technology-based tools effective deterrents? At Bullard High School, a pilot user of TurnItIn, teacher Sophia Smith claimed that after TurnItIn was implemented “the plagiarism rate in my class went from around 20 percent down to zero between the first and second assignment” (Atkins and Nelson, 2001). Barrie, the founder, asserts that TurnItIn has monitored assignments from “hundreds of high schools” and that roughly 20 percent of papers sent to his service contain some portion of plagiarized content. Compared to similar surveys, this percentage may be slightly inflated. After all, Barrie’s claims may be less conservative due to a vested interest in growing his business.

Despite their self-proclaimed successes, some plagiarism experts meet these technology tools with skepticism. Although many educators concede that commercial tools are effective in discouraging some cheaters, the anti-plagiarism services remain problematic for several reasons. Once a teacher catches a student, there is frequently a reluctance to exercise punitive measures, usually because schools lack clear directives on how to handle these awkward situations; also, teachers and schools are skittish about the potential legal liability of accusing students of cheating. (For example, Gross (2003) makes reference to a psychologist working in an affluent district where “some [parents] threaten to sue over any disciplinary measure that might mar a college transcript.”). Some educators feel that the use of such tools sends the wrong message to their students and that these technologies engender an atmosphere of mistrust. Other public schools balk at the cost. Still others contend that the scores derived include too many “false positives.” In other words, not all software engines are calibrated to identify proper attribution. This article, for instance, relies heavily on cited quotations, and could, in theory, trigger a false plagiarism score! Lastly, some educators believe that there are better, alternative methods to address the cheating problem, and shun the anti-plagiarism technology services.

Setting Clear Policies For Academic Integrity

The media and educators alike have given the plagiarism issues at our schools a heightened visibility. As a result, many schools have designed and published integrity policies and honor codes explicitly covering Internet usage, or, else have modified older, more traditional policy statements. Carroll and Appleton (2001) contend that a “balanced institutional response” that includes “enhanced teaching and learning strategies against a backdrop of a clear, fair and effective disciplinary procedure” is the best way for schools to ensure against plagiaristic practices. For the secondary grades, schools and individual teachers should publish clear definitions of what constitutes plagiarism, how to avoid it, and what the consequences will be for students. Many schools encourage teachers to give lessons on the differences between copying and paraphrasing, and how to provide proper attribution. Some examples of “Honor Codes” and “Cheating Policies” can be found online for both middle schools and high schools, including at the websites of the following institutions: El Toro High School (Lake Forest, CA; http://eths.svusd.org/pol.html#ethics), Langley High School (McLean, VA; http://www.fcps.k12.va.us/LangleyHS/saxon/honor.html), H.E. Huntington Middle School (San Marino, CA; http://www.san-marino.k12.ca.us/~heh/ BinderReminder/discipline.html), and the Webb School (Knoxville, TN; https://www.webbschool.org/today/academics/upper/philosophy.asp).

Lathrop and Foss (2000) and McCabe and Klebe Treviño (2002) assert that honor codes, where students are expected to assume responsibility for their own actions and commit to integrity pledges, help inculcate anti-cheating attitudes in the school culture, and thereby lessen the incidence of cheating. Based on the results of a third party study, Lathrop and Foss (2000) reported that “Honor codes appeared to be a major influence in reducing cheating among students,” while McCabe and Klebe Treviño (2002) found that in college campuses, “The impact of honor codes, both traditional and modified, is surprisingly strong on many campuses, suggesting that an ethical appeal to students—rooted in a sense of community responsibility— can help reduce cheating.” Many K-12 schools now also require students (and sometimes, their parents as well) to sign an “Acceptable Use” agreement covering computers, the Internet, and other electronic resources at school that also spells out consequences (up to and including expulsion) for infringements ranging from inappropriate use to plagiarism and other forms of academic dishonesty. Such written policies, and their proper communication within schools, helps students understand that the institution will deal with academic dishonesty with the seriousness it deserves.

While most students are willing to state in writing that they will abide by the rules of their school’s honor code, the overwhelming majority of students will not “tattletale” on a fellow student who breaks the code. It appears that students steadfastly draw the line at policies attempting to get them to report on one another. Even when students are put at a disadvantage grade-wise, the research underscores the reluctance of students to “rat.”

In sum, the most important aspect of a school’s honor code seems to be the role that students themselves play in developing and carrying out the policies (Gross, 2003). McCabe (2001) reports that “the level of serious cheating on written assignments is 25 to 33 percent lower” when students are stakeholders in the honor code processes. Thus, where students are participating on school enforcement boards and levying their own sanctions, honor code systems have far greater influence on reducing academic misconduct.

Re-examining Traditional Assessment Methods

To help educators resolve the ethical dilemmas posed by plagiarism and Internet usage, it is becoming necessary to design new ways of assessing learning and/or skill attainment for secondary education. Traditional modes of assessment, specifically term papers and essays, represent valid indicators of academic achievement in a pre-computer era when access to information was largely limited to interpersonal and print sources and there were no electronic writing tools (e.g., word processors, spell checkers, thesauruses, CD-ROM encyclopedias, the World Wide Web). Given the dynamics of today’s workplace and our educational environment, it becomes less clear that these scholastic assessments are still as meaningful and/or relevant as they once were, especially with respect to the acquisition of information literacy skills.

Fulton (1997) looked into the future and made some predictions about the prerequisite skills that our secondary students will need to participate successfully in the global economy over the next decade. She argues that, while the need to hone critical thinking abilities will not go away, the approach to learning will change significantly, suggesting that “advanced skills of comprehension, reasoning, composition, and experimentation” will be learned through “experience and (the creation) of mental structures…which organize and synthesize the information and experiences which the individual encounters in the world.” Moreover, she claims, “the technology pull of the Internet will force the issue of developing broader information literacy skills.” Students, in other words, will need to be far more discerning about the “undigested” information they access on the Internet, and capable of “making critical judgments about its value, reliability, and validity.” Lastly, Fulton (1997) describes the profile of the future workers as technology-savvy and collaborative problem-solvers who are also “effective communicators using a variety of appropriate technologies/media.”

Assessment indicators such as the traditional essay and term paper fall short of measuring these types of skills that our students require for the digital economy. Term papers represent academic exercises geared toward individual performance. Essays are typically based on information from authenticated, traditional information sources such as textbooks and library materials. Hence, these assignments do not indicate how well students have learned to work collaboratively to solve problems; nor do they measure the students’ ability to quickly delve through virtual avalanches of information, such as found on the web, and make critical distinctions between what is not and what is useful.

Consequently, many educators today find themselves in the midst of a sharpening pedagogical conflict. On the one hand, moving away from traditional assessment methods in favor of more authentic forms of assessment may help mitigate some of the undesirable consequences of technology and Internet usage, such as plagiarism, and help students become better prepared for the technological fluency demands of the future workplace. However, pressures originating in (among other sources) mandated curriculi, standardized testing requirements, parental expectations, and general inertia make it unlikely that most educators would abandon term paper or essay writing in the near future.

Recognizing the implicit difficulties facing educators caught in this dilemma, and, more specifically, focusing on ways to reduce plagiarism, several authors (e.g., McKenzie, 1998; Minkel, 2002; McCullen, 2003) have made pragmatic recommendations for secondary school teachers to incorporate into their classroom practice. The following represents a brief summary of some suggestions on how to design school assignments and assessments to discourage (or even prevent) cheating and/or plagiarism from electronic or other sources:

  • Avoid assigning the same or very commonly used essay topics every year to the same classes.
  • Familiarize oneself with the quality and skill levels of the student’s writing before assigning a term paper. Short in-class assignments can accomplish this goal.
  • Do not use open-ended subjects as assignments. Be very specific in the design of the assignment.
  • Know what’s available online prior to introducing the subject matter of the composition to the class.
  • Let students know that you know about online sources for term papers and the like and put them on notice that you’ll be watching for transgressions such as plagiarism.
  • Schedule progress reports on students’ research and writing projects. Require outlines, bibliographies, and even drafts prior to submission of the final written product.
  • Assign several smaller papers instead of long, heavily weighted end-of-term projects.
  • Require oral presentations based on original student-produced materials.
  • Use peer groups to comment on drafts and final papers.
  • Allow for collaborative projects in written assignments. Change the assessment criteria to accommodate a grading scheme that allows for individual assessment based on contributions within the group.
  • Devise different formats such as scripts, journals, timelines, comparative ideas, interviews, and other creative approaches for assignments.
  • Change the perspective of the narration to first person (e.g., a historical witness or a newspaper reporter).
  • Use web portfolios or other technology-driven formats such as presentations or digital movies.
  • Allow alternative media such as art projects, where students turn in a storyboard or a comic strip instead of a paper.
  • Engage students in online discussions using private or secure systems (to guard students’ privacy), specifying the levels and types of participation required (e.g., at least three original postings of 200 words or more in reply to a teacher’s or peer’s posting within a one-week period).
  • Involve students in the development of assessment rubrics that lay out clear expectations for their work.

An outstanding resource for examples and case studies on the use of these alternative strategies is the George Lucas Educational Foundation’s website (www.glef.org), in particular the sections on Assessment, Project-Based Learning, Technology Integration, and Digital Divide.

Summary and Conclusions

This article has considered assertions and reviewed some evidence that the incidence of student plagiarism has had a significant increase at the secondary school level. The Internet and the development of computer competencies among secondary school students have facilitated a practice of “cutting and pasting” web-based text and other electronic resources without proper attribution. Descriptions of representative websites used for the purposes of plagiarism and of some technologies designed to combat the problem have been provided. A brief review of some non-technical methods for deterring inappropriate uses of materials from the web has been presented, including a look at honor codes for maintaining academic integrity, and assessment formats designed for teachers to discourage plagiarism. Lastly, a contention has been made that traditional assessment methods in secondary education need to be re-examined and redesigned for the digital economy of the near future—and in some measure, the here and now.

The tension between teachers and students, between those who assess and those being assessed, will continue as long as attitudes toward the assessment process continue to emphasize individual performance in what students perceive to be irrelevant tasks and products created for an audience of one—the teacher. The prevalence of student cheating on term papers beginning so early in the current education system suggests that teaching strategies and the social and cultural values have been deeply influenced by technology, particularly the ease with which people can now access vast amounts of information. The value of writing a paper for students’ academic, intellectual, cognitive, social, and even moral development did not go away with the increased availability of the Internet and other electronic resources. However, the practice of assigning writing tasks with high-stakes to students who have been (or think that that they have been) ill-prepared to do well in them raises valid issues of fairness and accuracy in assessment.

The fact that papers may have served the academic community well for several hundred years does not mean that the value of this practice is guaranteed in the future, along with standardized tests based on multiple-choice questions and other forms of “traditional” assessment (Wiggins and McTighe, 1998). The high incidence of cheating serves also as an invitation to examine systematically the teaching and assessment practices in elementary, middle, and high schools to consider whether subtle or dramatic shifts in the teaching of Language Arts may have contributed to this problem. Are students being asked to write less than before? Are teachers paying the same levels of attention to students’ writing and giving detailed, quality feedback? Are schools engaging students in meaningful conversations about intellectual property, authorship, and academic integrity? To the extent that the answers to these questions are negative, the problem of cheating moves beyond the students engaged in the practice to their teachers, their schools, and their communities.

In other words, “cybercheating” happens not just because students have access to the Internet or CD-ROM encyclopedias, but also because the high-stakes consequences of the educational system’s investment in assessment puts enormous pressures on students to “do well” in papers and tests that they can’t relate to their lives and the futures they envision for themselves. This does not mean that, for example, students should not be presented with the opportunity to reflect on the meaning of Hamlet—only that perhaps a term paper may not be the best way to motivate the student to read, consider, ponder, analyze, compare, contrast, synthesize, and other tasks in relation to Shakespeare’s masterpiece. For teachers, the motivating challenge should not be figuring out how to “catch” students who plagiarize, but how to frame the assignment in such a way that students won’t see the need to plagiarize and cheat. This is the third solution outlined above, and it’s easy to see that it’s also the one that would take the longest to implement fully. A technology-based solution or the publication of policies that carry serious negative consequences for those caught cheating can be important first steps for institutions where the third option is not viable (at least in the short-term). However, no one should assume that reliance on the first two solutions (technology or policy) will make it possible to ignore the need to examine the core teaching and assessment practices eventually, perhaps leading to major changes in what work is demanded of students and how it is evaluated.

Monday, May 5, 2008

"Where are the flying cars I was promised?"

Futurists and Future Technology:
The futuristic Skycar has four seats (carrying up to 750 lbs.), a maximum air speed of 375 mph, and a range of about 750 mi. In theory, it gets more than 25 mpg. On the ground, the Skycar should travel a dinky 30 to 35 mph, just fast enough to get to an empty parking lot and stun everyone with a sweet vertical takeoff. Prototypes like the Skycar have been for almost a century, and it may be another hundred years before you can score that most badass symbol of the space age—the flying car.


http://www.youtube.com/watch?v=LrFgRAcr0jg
http://www.gimundo.com/Articles/Daily/966/4/16/2008/Russian_Inventor_Creates_Flying_Car

(1) Size of the computer:
Isn't it amazing that the size of computers has been reduced sharply but their power has increased at an exponential rate. The cost of computers has come down so much that many households now own not only one, but two, three or even more, PCs. This rapid evolution in this technology has forced us to think what it would be like after 20 to 25 years. Future picture of these machines can be visualized from robots act like household servants to pocket size computers. Some of these predicted inventions have already come to pass like robotic vacuum cleaners.
(2)Robot, artificial intelligence, quantum computers and nanotechnology.

Quantum computers are the powerful machines, transforming the computing experience, for both business and home users, are likely to be introduced in the near future. The quantum computer is expected to be a giant leap forward in computing technology, with exciting implications for everything from scientific research to stock market predictions.

Nanotechnology is the process by which matter is manipulated at the atomic level, providing the ability to “build” objects from their most basic parts. Like robotics and artificial intelligence, nanotechnology is already in use in many places, providing everything from stain resistant clothing to better suntan lotion. These advances in nanotechnology are likely to continue in the future, making this one of the most powerful aspects of future computing.

And if history is to be any guide, some of the most powerful advances in the world of computers and computer technology are likely to be completely unforeseen. After all, some of the most powerful technologies of the past have taken us by surprise, so stay tuned for a truly fascinating future.

Some useful links:

http://www.youtube.com/watch?v=iKTBlQsxmN0&NR=1
http://www.youtube.com/watch?v=tXLxcCTwr2E&NR=1
http://www.youtube.com/watch?v=7_mBjOmq1kY