Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract Essays are used to evalaute student’s knowledge from early before itself. The aim of the proposed system is to evalaute the handwritten essays automatically. The proposed method is to develope an automated system to to evaluate handwritten student essays. For a single topic under study the students may refer more than one study material. According to the similarity of the contentsa reference study material is constructed. The reference study material is used to evaluate the handwritten essays. The scanned image of the handwritten essays are used as the input in the proposed method. From the image texts are extracted for the evaluation. The Longest Common Subsequence (LCS) is used for the proposed system.
Authors and Affiliations
Reshma. V. M , Linda Sara Mathew
A Novel Approach To Topological Skeletonization Of English Alphabets And Characters
In this paper we put forward a modified approach towards skeletonization of English alphabets and characters. This algorithm has been designed to find the skeleton of all the typeface of Modern English as present i...
"SL-SKE (Signature Less-Secret Key Encryption) For DataSharing in Clouds"
Abstract: Cloud cоmрutіոg іs tyріcаlly defіոed as а type of cоmрutіոg that relies оո shаrіոg cоmрutіոg resources. The Іոfrаstructure as а Service іո cloud offers the dаtа-ceոter servіces to stоre аոd mаոаge іոfоrmаtіоո,...
Development of Security Based Reserved Agreement Blocker for Smartphone
Abstract: Smart phones are very effective tools for increasing the productivity of business users. With their increasing computational power and storage capacity, smartphones allow end users to perform several tasks and...
Challenges to Data Base Security – A Futuristic View
Abstract: In present scenario, database security is on prime consideration, for any organization because of its implementation and complex nature of system. It is generally associated with the dealing of retrieval of dat...
An Automated Model to Detect Fake Profiles and botnets inOnline Social Networks Using Steganography Technique
Abstract: At the present time, hundreds of millions of active users all around the world are using online socialnetwork, such as Facebook, Twitter, Tumblr and LinkedIn. This service turned out to be one of the most...