character position
Recently Published Documents


TOTAL DOCUMENTS

16
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

Author(s):  
N. G. Osipova

The article analyzes the social aspects of Hinduism as a combination of not only religious, but also mythological, legal and ethical concepts. They form, on the basis on which the social life of Indian society is largely organized. The author’s analysis of the historical development of Hinduism shows that, despite the absence of a rigid organizational structure, it has an internal unity at the social, ideological and religious levels. Hinduism is united in a whole by sacred texts and the Pantheon of Gods, recognized by almost all its trends and schools, as well as the faith in karma — the causal relationship between the actions of an individual in past incarnations and his fate, character, position in society in the current incarnation, and reincarnation. The cornerstone of both the faith and the social component of the Hindu doctrine is the concept of classes and castes, which denote separate groups whose members have a common professional occupation, do not marry other groups, and do not even share meals with them. The article considers the hierarchy of classes that originated in India in the Vedic period, as well as the principles, primarily professional and regional, of the formation of modern castes.The author analyzes a set of religious prescriptions and cult practices that regulate the daily life of Hindus, the ritual side of Hinduism associated with the most significant events in human life. Special attention is paid to new practices of “redemptive rites”, including asceticism, fasting, various methods of mortification of the flesh, and redemptive gifts. It is noted that the essence of Hinduism is not limited to its religious and ideological content. An organic integral part of it is a number of social institutions, legal and moral norms, social institutions and cultural phenomena. In this regard, Hinduism is not only and not so much a religion, but a way of life and holistic behavior, which can also have its own spiritual practice.


2020 ◽  
Vol 34 (07) ◽  
pp. 12120-12127 ◽  
Author(s):  
Zhaoyi Wan ◽  
Minghang He ◽  
Haoran Chen ◽  
Xiang Bai ◽  
Cong Yao

Driven by deep learning and a large volume of data, scene text recognition has evolved rapidly in recent years. Formerly, RNN-attention-based methods have dominated this field, but suffer from the problem of attention drift in certain situations. Lately, semantic segmentation based algorithms have proven effective at recognizing text of different forms (horizontal, oriented and curved). However, these methods may produce spurious characters or miss genuine characters, as they rely heavily on a thresholding procedure operated on segmentation maps. To tackle these challenges, we propose in this paper an alternative approach, called TextScanner, for scene text recognition. TextScanner bears three characteristics: (1) Basically, it belongs to the semantic segmentation family, as it generates pixel-wise, multi-channel segmentation maps for character class, position and order; (2) Meanwhile, akin to RNN-attention-based methods, it also adopts RNN for context modeling; (3) Moreover, it performs paralleled prediction for character position and class, and ensures that characters are transcripted in the correct order. The experiments on standard benchmark datasets demonstrate that TextScanner outperforms the state-of-the-art methods. Moreover, TextScanner shows its superiority in recognizing more difficult text such as Chinese transcripts and aligning with target characters.


Author(s):  
MahmudulHasan Moon ◽  
A K M Tanzimul Islam Tanim ◽  
Md. Zillani Shoykot ◽  
Md. Nahid Sultan ◽  
U.A. Md. Ehsan Ali ◽  
...  

Security of data is the challenging aspects of modern information technology. An improved cryptology algorithm is introduced in this paper to offer comparatively higher security. We divide our message into several blocks as 8bits per block then convert each character into its corresponding positional number, where uppercase letters, lowercase letters, digits and special characters are mapped into some range of numbers. Then replace each decimal number into their binary equivalent consisting of 7-bits. Then combine 8 blocks of binary numbers into a single string. After performing some operation on the data, we get the final encrypted message. For decryption, we use same method in reverse way. Taking the decrypted message we perform some basic operation as replacing by binary or equivalent decimal and position then we get the original message back. Though the length of the encrypted message is larger than original message in this proposed algorithm, it offers higher security for the real-time communications


2020 ◽  
Vol 31 (4) ◽  
pp. 351-362
Author(s):  
Klinton Bicknell ◽  
Roger Levy ◽  
Keith Rayner

Reading is a highly complex learned skill in which humans move their eyes three to four times every second in response to visual and cognitive processing. The consensus view is that the details of these rapid eye-movement decisions—which part of a word to target with a saccade—are determined solely by low-level oculomotor heuristics. But maximally efficient saccade targeting would be sensitive to ongoing word identification, sending the eyes farther into a word the farther its identification has already progressed. Here, using a covert text-shifting paradigm, we showed just such a statistical relationship between saccade targeting in reading and trial-to-trial variability in cognitive processing. This result suggests that, rather than relying purely on heuristics, the human brain has learned to optimize eye movements in reading even at the fine-grained level of character-position targeting, reflecting efficiency-based sensitivity to ongoing cognitive processing.


Author(s):  
Hanat Raji-lawal

Introduction: Anagram solving task involves a retrieving process from previously acquired knowledge, this serves as a suitable memory cognition test. Automation of this process can give a very good memory cognitive test tool, the method behind this automation is anagram orthographic similarity measure. Aim: The purpose of this research is to study existing anagram orthographic similarity measures, to deduce their strengths and weaknesses, for further improvement. Materials and Methods: Experiments were carried out on the measures, using real data. Their behaviour on different orthographic string set was observed. Result: Experiment revealed that brute force has a very poor processing time, while sorting and neighbourhood frequency does not have issues with processing time. Conclusion: The research revealed that existing anagram orthographic similarity measures are not suitable for character position verification and evaluation of syllabic complexity which are essential measures of working memory capacity.


Author(s):  
Ahmad Riza Faizal

This research has put forward a Flip and Switch concept as a mark for exchanging a quality and character position in a film by analyzing with a semiotic rectangle methodology (the Greimas’Rectangle). There are two Flips and two Switches in the film “Cahaya Dari Timur: Beta Maluku” as the findings of the research, marking a change of the view point and narrative pattern that will be conveyed by the film against the hope of story plot from the spectators’ mind. By taking criterion which makes this film to become a cult film, the research findings have overlapped peculiar scenes leading to the cult film to be.  There will be phenomena criteria formed that can be able to bring them (peculiar scenes) up. But today, the film of Cahaya Dari Timur: Beta Maluku is not a cult film. As we know that Cahaya Dari Timur: Beta Maluku, began with an idea of non-anti minority which is the complement of anti- minority issue. These findings have marked that this film is not about a minority but it is about what is being born after a minority conflict has been completed.


2017 ◽  
Vol 25 (7) ◽  
pp. 1132
Author(s):  
Huimin HUA ◽  
Junjuan GU ◽  
Nan LIN ◽  
Xingshan LI

2016 ◽  
Vol E99.D (4) ◽  
pp. 1172-1181 ◽  
Author(s):  
Jianjuan LIANG ◽  
Bilan ZHU ◽  
Taro KUMAGAI ◽  
Masaki NAKAGAWA

Author(s):  
Birmohan Singh ◽  
Manpreet Kaur ◽  
Dalwinder Singh ◽  
Gurwinder Singh

Sign in / Sign up

Export Citation Format

Share Document