Vinoharan Portfolio
Vinoharan Portfolio
Vinoharan Portfolio
October 2022
Teaching Portfolio
Mr. V. Vinoharan
Lecturer (Unconfirmed),
BSc (Special) in Computer Science,
MSc in Computer Science, MPhil in Computer Science,
Department of Information and Communication Technology,
Faculty of Technological Studies,
University of Vavuniya,
Sri Lanka.
i
ii
Contents
Dedication v
Acknowledgment vi
6 Conclusion 63
Reference 65
Appendixes 68
Appendix 01 - Lecturer (Unconfirmed) Appointment . . . . . . . . . . . . . . . 68
iii
CONTENTS CONTENTS
iv
CONTENTS CONTENTS
Declaration
I confirm that everything in this portfolio is original work of mine, with appropriate
citations. The information in this portfolio can be used to improve courses and further
education.
V. Vinoharan
Lecturer (Unconfirmed)
v
CONTENTS CONTENTS
Acknowledgment
I would like to express my sincere gratitude to Dr.Lalith Senarathne, Director of Staff
Development Center at the Rajarata University of Sri Lanaka for being a great facilitator
of this course. This program motivated me to become an effective academic and motivated
me to complete the portfolio. Additionally, all resource persons for the program are
all highly commended for their dedication to seeing each of their modules through to
completion.
My deepest gratitude is expressed to Professor Sanjeewanie Ginigaddara, Vice-Chancellor,
Rajarata University of Sri Lanka, for offering this invaluable CTHE Programme for us.
And also, my gratitude is expressed to Dr. T. Mangaleswaran, Vice-Chancellor at the
University of Vavuniya, Sri Lanka for allowing me to follow this CTHE course, Mr. S.
Suthakaran, Dean of the Faculty of Technological Studies at the University of Vavuniya,
Sri Lanka for recommending me to follow this CTHE course and Mr. V. Senthooran,
Head of the Department of Information and Communication Technology for giving me
the good guidance and the time to follow the CTHE course.
I also want to thank everyone who helped me to finish my portfolio. My thanks go out to
my friends who are also taking this course with me for making these sessions enjoyable.
Finally, I want to thank my family, friends, and co-workers for their unwavering support
in helping me through this CTHE course.
vi
CONTENTS CONTENTS
Executive Summary
University teaching is a highly difficult and demanding career, but the benefits are sig-
nificant. I have spent last ten months of my professional life working as a Lecturer (Un-
confirmed) in Information and Communication Technology at Department of Information
and Communication Technology, Faculty of Technological Studies, University od Vavu-
niya. In addition, from 2009 to 2021, I was employed by the Computer Unit, University
of Jaffna as an Instructor in Computer Technology.
I was graduated from the Department of Computer Science, Faculty of Science, University
of Jaffna with Second Class Lower Division in 2006. In 2013, I was complete my Master
of Science in Computer Science at the Postgraduate Institute of Science, University of
Peradeniya and in 2018, I was complete my Master of Philosophy in Computer Science
at the Faculty of Graduate Studies, University of Jaffna.
I think that the combination of my educational qualification and work experience will
help to the department of Information and Communication Technology, University of
Vavuniya meet their goals.
To fulfill my teaching methods course, I enrolled in Certificate in Teaching in Higher
Education (CTHE) at the Rajarata University Sri Lanka. I simply thought that I had
to finish this course because it was necessary for my conformation at the start of the
course. But as time went on, I came to see the value of this program and was encourage
to continue attending the courses. Then, with the help of the provided direction and
information I’ve learned from various sessions, I prefer to finish this portfolio.
This collection of work represents the range of my teaching experiences. It is structured
as a series of disclosures and papers meant to demonstrate both my continued growth as
a university teacher and how I implement my teaching philosophy. I have compared and
contrasted numerous modules in my portfolio, along with the reflective implications of
my teaching experiences and future objectives.
My personal and academic backgrounds, which convey a complete record of my profes-
sional experience in a variety of fields, are covered in the first section of the portfolio. The
second and third sections of the portfolio included an explanation of my learning theories,
my teaching techniques, and my duties as an academic teacher. The reflective aspects of
the core modules, such as module 02: personal development and counseling, module 03:
teaching and learning methods, module 04: assessment and evaluation, module 05: cur-
riculum design and revision, module 06: Information Communication Technology (ICT)
skills in higher education, and module 08: research in higher education were covered in
the fourth area of my portfolio. Finally, the portfolio has now been updated to include
conclusion and teaching honors.
vii
CONTENTS CONTENTS
viii
Chapter 1
Biography and an Updated Resume
1.1 Introduction
The first chapter focuses on milestones of my life. At the end of this chapter, the reader
will be able to understand how my educational qualification and professional experiences
was supported to make me a mature person and academic.
1
2 CHAPTER 1. BIOGRAPHY AND AN UPDATED RESUME
My first school was J/Puttalai Maha Vidyalam, Puttalai, Puloly where I studied from
grade one to Grade five. After my Grade five, I went J/Hartley College, Point Pedro to
study Grade six to Advance Level studies. Having passed the Advance Level Examination,
I entered the Faculty of Science, University of Jaffna for my higher studies in 2001.
I have achieved my goals successfully in both my career and personal life. I have completed
my basic degree in Computer Science at the Department of Computer Science, Faculty of
Science, University of Jaffna with Second Class Lower Division in 2006 and I completed my
Master of Science degree in Computer Science at the Postgraduate Institute of Science,
University of Peradeniya in 2013 and also, I have completed my Master of Philosophy
Degree in Computer Science at the Faculty of Graduate Studies, University of Jaffna in
2018. (Appendix 02)
After graduated I was working as an Instructor (On Contract) at the Computer Unit,
University of Jaffna, Sri Lanka from February 2007 to June 2008 and working as an
Assistant Lecturer (On Contract) at the Department of Computer Science, Faculty of
Science, University of Jaffna, Sri Lanka from August 2008 to March 2009. In the time
of Assistant Lecturer (On Contract) period I have an opportunity to wrote a selection
examination for an Instructor in Computer Technology at the University of Jaffna. Based
on this examination I was appointed as an Instructor in Computer Technology since
2009. After the appointment I worked as an Instructor in Computer Technology at the
Computer Unit, University of Jaffna, Sri Lanka from 2009 to 2021. (Appendix 03)
In the time I was working as an Instructor in Computer Technology, (i) I was appointed
as a Visiting Instructor in Information Technology to instruct the final year students in
Arts and Management & Commerce in Information Technology (2007 and 2009), (ii) I
appointed as a Lecturer in-charge in Computer Literacy subject for varies faculties from
the University of Jaffna, Sri Lanka, and (iii) I was appointed as a Visiting Lecturer at the
Department of Information Technology, which is under the Faculty of Arts, University of
Jaffna, Sri Lanka (Appendix 12). Moreover, I was appointed as a visiting academic for
the BSc degree programme in Computer Science at Jaffna Regional Centre of the Open
University of Sri Lanka from 2018 to 2020. (Appendix 13)
I am currently working as a Lecturer (Unconfirmed) in Information and Communication
Technology at the Department of Information and Communication Technology in the
Faculty of Technological Studies, University of Jaffna, Sri Lanka. (Appendix 01)
I’ve done a variety of research studies in the fields of image processing, machine learn-
ing, and computer vision, and the results have been shared with the appropriate parties
through national and international research journals, papers, theses, and posters (Re-
search publications - 04, Journal Article - 01, Posters - 03) (Appendix 04). Additionally,
I have two articles for books and one piece for a newspaper. (Appendix 07)
1.4. EXTRA-CURRICULAR ACTIVITIES AND AWARDS 3
I’m quite interested in the research sector, and I think I have the soft skills and subject
knowledge to succeed in it.
Veerapathirapillai Vinoharan
H: 0772487111
B: v.vinoharan@vau.ac.lk
1.5.2 Education
1. Master of Philosophy Degree in Computer Science at the Faculty of Graduate Studies,
University of Jaffna.
Effective Date: 19 December 2018
2. Master of Science Degree in Computer Science at the Postgraduate Institute of Science
(PGIS), University of Peradeniya.
Effective Date: 11 May 2013
4 CHAPTER 1. BIOGRAPHY AND AN UPDATED RESUME
3. Bachelor of Science (Special) Degree in Computer Science (Second Class Lower Divi-
sion) at the Department of Computer Science, Faculty of Science, University of Jaffna.
Effective Date: 11 October 2006. (Appendix 02)
2. Followed the two years course in ESL, English Language Teaching Centre, University
of Jaffna, Sri Lanka, 12 October 2006.
3. Certificate of Unit Credit Towards, Level 1 Certificate for IT Users, City & Guilds,
February 2005.
4. Certificate in Spoken English for Speakers of Other Languages, City & Guilds Pitman
Qualifications, 03 August 2004.
1.5. CURRICULUM VITA - V. VINOHARAN 5
5. Certificate in English for Speakers of Other Languages, City & Guilds Pitman Quali-
fications, 03 August 2004.
Publications
1. Vinoharan, V. and Ramanan, A.: “One-pass Keypoint Selection to Construct Code-
book for Patch-based Object Classification”, In the IEEE International Conference
on Information and Automation for Sustainability (ICIAfS), IEEE, pp. 237-242,
Colombo, 21-22 December, 2018.
2. Vinoharan, V. and Ramanan, A.: “Keypoints and Codewords Selection for Efficient
Bag-of-Features Representation”, In Proceedings of the IEEE International Conference
on Future of Information and Communication Conference (FICC), IEEE, pp. 378-390,
Singapore, 5-6 April, 2018.
3. Vinoharan, V. and Ramanan, A.: “Are Large Scale Training Images or Discriminative
Features Important for Codebook Construction?”, In Proceedings of the Fifth Interna-
tional Conference on Pattern Recognition Applications and Methods (ICPRAM2016),
SuTePress, pp. 193-198, Rome, Italy, 24-26 February, 2016.
Posters
1. Vinoharan, V. and Ramanan, A.: “On the Construction of Discriminative and Com-
pact Codebook for Patch-based Visual Object Classification”, In Sri Lanka Student
Workshop on Coputer Science (SLSWCS’19), Jaffna, Sri Lanka, 07 December 2019.
Thesis
1. “Training Images vs Discriminative Features: On the Construction of Codebook to
Recognise Visual Objecys”, Faculty of Graduate Studies, University of Jaffna, Master
of Philosophy Thesis, 92pp, 19 December 2018.
3. “Automated Sri Lankan Number Plate Number Recognition System using Image Pro-
cessing”, Department of Computer Science, Faculty of Science, University of Jaffna,
51pp, February 2007.
1.5.7 Presentations
At International Conferences
1. “One-pass Keypoint Selection to Construct Codebook for Patch-based Object Classi-
fication”, at the IEEE International Conference on Information and Automation for
Sustainability (ICIAfS), Colombo, 21-22 December, 2018.
3. “Are Large Scale Training Images or Discriminative Features Important for Code-
book Construction?”, at the Fifth International Conference on Pattern Recognition
Applications and Methods (ICPRAM2016), Rome, Italy, 24-26 February, 2016.
4. “A Wheel-based Side-view Car Detection using Snake Algorithm”, at the Sixth IEEE
International Conference on Information and Automation for Sustainability (ICIAfS’12),
Beijing, China, 27-29 September 2012. (Appendix 08)
1.5. CURRICULUM VITA - V. VINOHARAN 7
At Workshops
1. “An Efficient Approach for Patch-based Visual Object Classification”, at the Sri Lanka
Student Workshop on Computer Science (SLSWCS’17), Jaffna, Sri Lanka, 09 Decem-
ber 2019.
3. First Vingnanam International Research Conference 2018 (VIRC2018), 04th July 2018,
University of Jaffna, Sri Lanka.
Workshops
1. Workshop on Employee Orientation Training, 15th Dec 2021, University of Vavuniya,
Sri Lanka.
2. Sixth Sri Lankan Student workshop on Computer Science (SL-SWCS’21), 04th Dec
2021, University of Jaffna, Sri Lanka.
3. Workshop on “In co-operating Souo-emotional skill in to the Curriculum”, Faculty of
Science, 29 June 2020.
4. Fifth Sri Lankan Student workshop on Computer Science (SL-SWCS’19), 07th Dec
2019, University of Jaffna, Sri Lanka.
5. Workshop on “Statistics for Research”, 24-25 November 2018.
6. Fourth Sri Lankan Student workshop on Computer Science (SL-SWCS’17), 07th Dec
2017, University of Jaffna, Sri Lanka.
7. Third Sri Lankan Student workshop on Computer Science (SL-SWCS’15), 07th Nov
2015, University of Jaffna, Sri Lanka.
8. Workshop on “In co-operating ICT components in the Curricula”, 17-18 November
2014.
9. Workshop on Microsoft IT Academy in University of Visual and Performing Arts on
29th and 30th September 2014
10. Workshop on LMS and open education resource in University of Moratuwa on 30th
July 2014.
11. Workshop on “Effective Teaching of ICT” at University of Jaffna, 23 January 2013
and 07 February 2013.
12. Sri Lankan Student workshop on Computer Science (SL-SWCS’11), 08th December
2011, University of Jaffna, Sri Lanka.
13. Capacity building workshop on “Taking ICT to the Community”, 23-24 June 2011.
14. 2010 ICIAfS Post Conference Workshop on ICT for Sustainability, 21-22 December,
2010, University of Jaffna, Sri Lanka.
15. Workshop on planning the new Higher Education project meeting with English and
IT Teaching staffs of universities. 13th May 2009. (Appendix 10)(Appendix 17)
1.5. CURRICULUM VITA - V. VINOHARAN 9
Chairman
Chairman of the Faculty Web committee for Faculty of Technological Studies with effective
from 09 June 2022 up to now.
Secretary
Secretary of the Jaffna Science Association (JSA), Section B, 2015/2016.
Treasurer
1. Treasurer of the Vavuniya Campus Teachers Association (VCTA), 2022/2023.
Editor
Chief-editor to the First Research Conference on Advances in Information and Communi-
cation Technology under the Department of Information and Communication Technology,
Faculty of Technological Studies, University of Vavuniya, 2022. (Appendix 19)
Member
1. Members to the Committee for Medical Certificate & Mercy Chance effective from 23
August 2022 up to now.
2. Deputy Proctor for the Faculty of Technological Studies with effective from 09 June
2022 up to now.
3. Member of the Senate for the Faculty of Technological Studies with effective from 15
March 2022 up to 15 August 2024.
4. Member of the Editorial Committee for the Documentation of Annual Report of the
University of Vavuniya.
5. Member of the Faculty Research Committee for Faculty of Technological Studies with
effective from 01 December 2021 up to 10 March 2023.
6. Member of the Editorial Committee for Faculty Newsletter and Students Handbook
of the Faculty of Technological Studies with effective from 08 December 2021 for one
year.
10 CHAPTER 1. BIOGRAPHY AND AN UPDATED RESUME
7. Member of the Faculty Anti - Ragging Committee for Faculty of Technological Studies
with effective from 01 December 2021 to 26 August 2022.
8. Member of the Faculty Building Committee for Faculty of Technological Studies with
effective from 08 December 2021 for one year.
9. Member of the Technical Evaluation Committee (TEC) for IDAS for procuring project
electric and electronic equipment with effective from 30 May 2014.
10. Member of the Technical Evaluation Committee (TEC) for IDAS project for procuring
Software with effective from 30 May 2014.
11. Member of the Technical Evaluation Committee (TEC) for IDAS project resource
person for workshop on IT with effective from 30 May 2014. (Appendix 11)
1.5.11 Teaching
Undergraduate Teaching
1. TICT3253: Digital Image Processing (DIP), for the students in Department of Infor-
mation and Communication Technology, Technological Studies, University of Vavu-
niya, 2020/2021.
3. ACLA12010: Computer Literacy, for the students in the Faculty of Arts, University
of Jaffna, 2009 – 2020.
4. AHSBCL1120: Basic Computer Literacy, for the students in the Faculty of Allied
Health Sciences, University of Jaffna, 2009 – 2020.
5. ALCLA11022: Computer Literacy, for the students in the Department of Law, Uni-
versity of Jaffna, 2009 – 2020.
7. Information Technology Co Module for Medical Course, for the students in the Faculty
of Medicine, University of Jaffna, 2009 – 2020.
8. Information Technology, for the students in the Unit of Siddha Medicine, University
of Jaffna, 2009 – 2020.
Inter-faculty Teaching
1. Visiting Instructor in the Faculty of Arts, University of Jaffna, 2015 – 2018:
2. An organiser for a blood donation camp through our village community centre and
also a blood Donner from 2009 up to now.
5. Member of the University Athletic team, University of Jaffna, 2003 and 2004.
6. Won 1st place in 200m in the inter Faculty Athletic Meet, University of Jaffna, 2004.
7. Member of the Science Faculty relay team which won 1st place in 4×400m relay in the
Inter Faculty Track and Field meet 2004.
9. Member of the Science Faculty relay team which won 2nd place in 4×100m relay and
4×400m relay in the Inter Faculty Track and Field meet 2003. (Appendix 05)
12 CHAPTER 1. BIOGRAPHY AND AN UPDATED RESUME
I hereby certify that the above particulars are true and correct, according to the best of
my knowledge.
…………… ……………………..
Date Signature
1.6 Summary
The first chapter details summarize the different periods of my life as well as my accom-
plishments. I have described how I completed both school and university levels at the
beginning of the chapter. The chapter also describes my extracurricular activities and
career achievements.
Chapter 2
Teaching Philosophy Statement
My professional goal is to become a computer science professor who will impart knowl-
edge to the students and the public at large. I also want to conduct research that will
benefit to the people in Sri Lanka and throughout the world. I really feel that I have a
significant obligation to use my intellectual abilities to advance the nation’s technological
advancement. I’m confident that I can complete the assignment at a high level.
I would have to do the research and be persuaded to use the results to address the issue
the nation is now facing. As a lecturer at a university, I firmly think that our students
are incredibly clever, brilliant, and talented because they have passed extremely difficult
exams and been admitted to government universities. Additionally, I want to thank the
parents of university students who have committed to send their children to university.
I think teachers are uniquely suited to change people’s lives for the better. University
students are held accountable for using up public resources and state cash during the
teaching-learning process. In order to contribute to the country’s economic growth, they
must use the resources to the fullest extent possible for the process of human develop-
ment. Even Nevertheless, Sri Lanka is a developing nation that has adopted social welfare
programs including free health care and education as well as many other concessions to
preserve the general public’s wellness.
I completely support and appreciate the student-centered education system, which must
be applied throughout the nation’s primary, secondary, and tertiary educational systems,
including universities. In order to meet the needs of the job market, we must instantly
transform our traditional teacher-centered educational approach to student-centered ed-
ucational approach. At this point, outcome-based education (OBE) is the best strategy
for advancing the nation’s technological advancement.
I frequently advise my students to “think out of the box,” and they need to be given
the actual solution to the country’s major challenges. To prepare students with good
competences (knowledge, skills, and attitudes), wisdom, mental stamina, soft skills, and
optimistic attitudes is the teacher’s primary role and obligation. The true teacher, in
my opinion, should encourage students to develop a positive outlook, increase their self-
confidence, and become intelligent individuals with a sufficient amount of soft skills, such
as teamwork, problem-solving, communication, time management, leadership abilities,
etc.
Teaching, in my opinion, is a noble profession rather than a job. As the teacher is the
architect of another life, it necessitates several sacrifices. The teacher-student connection
and the teacher’s teaching activities have a significant impact on how well students are
13
14 CHAPTER 2. TEACHING PHILOSOPHY STATEMENT
prepared and how their future is shaped. I do, however, take the time to hear their
justifications and strive toward each of their specific objectives. I make it a point to be
accessible for extra help or informal talks on themes of the interested students, and I
promote group work (GW). Additionally, broadening the range of subjects I teach and
utilizing cutting-edge technology to their full potential to spread information will always
be my top priorities.
The teacher is the architect of the thoughtful, sensitive, and skilled workforce that sets
the course of a nation’s growth. I firmly think that in order to accomplish the economic
growth of the nation via education, policymaking, research, and information sharing, a
good teacher has to be inspired and must be provided the proper direction and invaluable
guidance to all sectors. I always intend for these objectives to be successful. I believe that
all Sri Lankan institutions should update their undergraduate degree programs to reflect
the needs of the 21st century workforce. Currently, the majority of universities in the
nation that provide degrees in information technology, information and communication
technology, computer science, and computer engineering are characterized by a dearth of
practical application, application-oriented thinking, and alternate views. This will affect
society as a whole in addition to failing students with backgrounds in computer science and
information technology in the employment market. I agreed with the students-centered
learning (SCL) and outcome-based education (OBE) models.
As a university lecturers, I believe it is our responsibility to prepare our students with
the skills of critical thinking, effective decision-making, quantitative reasoning, problem-
solving, specialized knowledge and application, leadership and communication, lifelong
learning, interdisciplinary knowledge, and global awareness.
17
18 CHAPTER 3. TEACHING RESPONSIBILITIES AND STRATEGIES
03 Administration 0 10
I To carry out research and produce publications, or other research outputs, in line with
personal objectives agreed in the staff review process.
Table 3.2 explain the subjects I have taught, assignment and end of course paper setting,
assessment and end of course paper marking, research project evaluation, and industrial
training evaluation for each semester.
Table 3.2: Teaching Responsibilities - Teaching, Guiding, Paper setting, Paper marking,
Assignments, and supervising by V. Vinoharan from 01st December 2022 - 30th September
2021. (Appendix 14)
I SWOT Analysis
I Academic Counseling
As evidence, I have given an appendix for participating national and international confer-
ence and workshops which is used for my professional development program. (Appendix
08)(Appendix 10)
I Prioritize tasks: Make a list of all the things you have to do today or this week. Then
assign a priority or urgency level to each of these tasks.
I Control procrastination: The more stressful or unpleasant task, the more likely you
are to put it off. This only increases your stress. You may want to try these tips for
controlling procrastination.
I Manage your commitments: Both too many and too few commitments can lead to
stress.
If you want to manage a demanding task
without becoming overly stressed, effective
time management is crucial. When you have
too much work to complete, time manage-
ment gives you direction and helps you to
decrease long-term stress. It helps you be-
come more productive and gives you control
over where you are headed.
By managing your time well, you should find that you love your present work better and
can make the most of your free time to relax and enjoy life. Stress is often caused by a
lack of time management skills.
We have all likely had the notion that there is an excessive much to accomplish and not
enough time. We may start to experience anxiety and worry and get distracted. It’s
crucial to remember that you can have this emotion even if there isn’t much to do.
chologist Daniel Goleman, who also constructed a framework of five components that
characterize emotional intelligence:
1. Self-Awareness – People who have high emotional levels are frequently extremely aware
of themselves. They are aware of their emotions, and as a result, they don’t allow them
to control them. They are self-assured because they rely on their intuition and restrain
their emotions. They are also prepared to look honestly in the mirror. They are aware
of their talents and weaknesses and try to improve in these areas.
2. Self-regulation – This is the capacity to restrain one’s impulses and emotions. Self-
regulators often avoid making rash, imprudent judgments and allowing themselves to
get overly angry or jealous. They deliberate before acting. Self-regulation is char-
acterized by deliberation, comfort with change, honesty, and the capacity to refuse
requests.
3. Motivation – Motivated individuals tend to have strong emotional intelligence. They
are prepared to postpone short-term gains in favor of long-term gains. They are
incredibly industrious, like a challenge, and excel at all they do.
4. Empathy – Empathy is the capacity to relate to and comprehend the needs, wants, and
perspectives of others around you. People who have empathy are adept at understand-
ing others’ sentiments, even when those feelings may not be immediately apparent.
As a result, empathic individuals are typically very good at managing relationships,
listening to others, and connecting with them. They avoid making hasty judgments
and stereotypes and lead extremely transparent, open lifestyles.
5. Social Skills – Another indication of strong emotional intelligence is that persons with
good social skills are typically easy to get along with and like. People with good
social skills tend to be good team players. They assist others in growing and achiev-
ing achievement as opposed to putting their own prosperity first. They are experts
at establishing and sustaining connections, are outstanding communicators, and can
handle conflicts.
It is simple to see the value of emotional intelligence abilities for success on both a personal
and professional level. These are the kinds of talents that strong leaders exhibit, so
enhancing your emotional intelligence may be crucial to creating an image that not only
conveys your leadership qualities but also lasts.
The term “emotional intelligence” or “emotional quo-
tient (EQ)” refers to these fundamental building com-
ponents. EQ is the capacity to recognize, justify, com-
prehend, and express human emotions in constructive
and healthy ways. Lacking these building blocks, a
learner’s capacity to comprehend and apply soft skills
is severely constrained.
24 CHAPTER 4. REFLECTIVE SECTIONS ON THE CORE MODULE
Other “soft skills” than emotional intelligence might help you stand out from the compe-
tition and improve your chances of obtaining employment.
1. Communications Skills: Probably more than any other skill, excellent communication
in writing, speaking, and listening is essential in the job.
5. Planning/Organizing: The ability to develop, plan, organize, and carry out projects
and activities within the allocated period and budget is highly vital, which is why
project management training is a resume booster.
6. Teamwork: Working effectively with others is crucial for many careers since they often
require participation in at least one group setting.
Soft skills and emotional intelligence should be developed, practiced, and applied. Put
these in the “Strengths” section of your resume. Additionally, how well you demonstrate
these abilities when you meet the institution’s leader will determine whether you get the
job or the promotion.
1. When going to an interview, you may concentrate on and talk more about your
strengths. Additionally, it will assist with curriculum vitae (CV) preparation. You
may also change the CV to fit the job criteria if you have a very good concept of them
in advance. Keep in mind that it takes very less time for recruiters who determine
whether or not you fit in.
4.1. MODULE 02 - PERSONAL DEVELOPMENT AND COUNSELING 25
2. When applying for a promotion, Comparing yourself to other applicants assists in self-
evaluation. You’ll have a clear understanding of your advantages over competitors,
allowing you to concentrate on certain advantages rather than your overall advantages.
3. Before a career switch, it helps you determine if your talents are well matched for your
present employment or whether the prospects in your future career.
counseling. It has improved student happiness and increased graduate employment rates
overall.
Universities are also able to keep students who may have otherwise left because they were
frustrated with managing the challenges of university life. Regardless if someone is just
entering university or getting ready to graduate, academic counseling is something that
can be used as a support system for students needing assistance. Academic counseling
may be utilized as a support system for students who need help, regardless of whether
they are just entering university or getting ready to graduate.
University students and academic counselors collaborate closely to help students reach
their academic and professional objectives. Many students want assistance in formulating
these objectives, therefore an academic counselor’s role would be to provide them the
knowledge they require to lead them in the right direction. An academic counselor will
have the chance to put students at ease while providing them with the support they need
in making this crucial life decision because selecting a major is a famously difficult process
for many students.
Academic counselors are supposed to help students select the courses they need to take
to meet their graduation requirements in addition to offering career guidance. To make
sure their students are moving in the correct direction toward their objectives and to help
them with any obstacles they may encounter along the way to a degree, they will also
monitor their progress. The final step is for an academic counselor to assist students in
building the intellectual and social skills necessary for them to graduate from college and
start their chosen careers.
University counselors are crucial for the success of university students since they assist
students through their academic programs and give guidance on future university or career
choices. Without the assistance of an academic advisor, the student would need to do
their own research to determine how their field of study might be applied to a job and
what qualifications are necessary to enter that career. It’s possible that the learner doesn’t
know the context of this knowledge or where to start looking. An academic counselor will
be able to give students guidance since they have the experience and expertise in the
subject. Students at universities who are starting their careers will require a mentor.
A student would benefit greatly from the expertise of an academic counselor who is
knowledgeable with state or federal laws governing certification and licensure requirements
for their particular field. Academic counselors with experience in their profession may
provide students with insider knowledge about the work; the kind of practical knowledge
required to do the job well, which you probably won’t discover in a textbook. They
may be able to help with job placement or internships thanks to their connections in the
industry. In order to support students in areas relevant to their performance, it is crucial
that they have a trustworthy professional connection with an academic counselor.
4.1. MODULE 02 - PERSONAL DEVELOPMENT AND COUNSELING 27
Academic counselors can serve as a point of contact for students and instructors to set-
tle conflicts that can have an effect on the student’s academic achievement. They can
offer students who are having personal problems a sympathetic ear and make the proper
recommendations for therapy.
I Lesson planning
This section of my portfolio, which gives careful consideration to the above mentioned
subtopics, concentrates on teaching and learning methodologies and their application.
Additionally, this part reviews several teaching strategies and how they apply to my
academic career.
4.2.1 Teaching
The act of transferring knowledge and abilities from a teacher to a student is referred
to as teaching. It includes all teaching or educating-related activities. It is an action
or event that shapes a person’s intellect, character, or physical capabilities. There are
several theories of instruction and learning, most of which fall into the formal, descriptive,
and normative categories.
Content-oriented Process-oriented
Lecture Discussion, Presentation, Reflection, etc.
Teacher occupy the central position Students occupy the central position
Students are passive recipient of information Student construct their own knowledge
Learning start from outside Learning start from inside
I In a small class setting, I am now making an effort to remember every student’s name
in order to develop a rapport with them that will make it easier for me to effectively
communicate with the lecturers.
I I’ve come to know that the problem-based learning approach is also more beneficial.
The students are given an issue to tackle, and I ask them to respond to the questions
that are posed. These exercises can improve their capacity for rational thought and
problem-solving.
I To arrive at work on time and inspire the kids to do the same, which will be more
crucial for any future tasks they do.
I I studied more about TBL (Team-Based Learning) during the CTHE program (Session
led by Prof. Gominda) and prepared a plan to put the concept into practice in my
teaching following the CTHE course. I can use this when I teach huge groups in the
future. With this approach, it is simple to break a big group into a few smaller ones,
and the groups are then given the task together while exchanging information.
I Figure 4.3 shows the evidences of the teaching method I have learned from CTHE.
I realized that active student participation in the course and learning via experience with
more practicals are what matters most. I will thus convert my traditional teacher-centered
teaching approach to the student-centered learning system. TBL will assist pupils in
bettering their,
◦ Communication skills
◦ Teamwork attitudes
◦ Leadership skills
Figure 4.3: The evidences of the teaching method I have learned from CTHE
4.2.6 Learning
This section of my teaching portfolio discusses several teaching methods that may be
used in academic settings to create an interactive teaching-learning process. I placed a
strong emphasis on describing the teaching strategies I used to improve the students’
active learning through various activities.
Students have reported improvements in their creative thinking and oral communication
through TBL, and the strategy is adaptable enough to be used in classes of all sizes,
including large lecture courses (Huggins et al., 2015); a formalized version of the strategy
can be found at the Team-based Learning Collaborative (link is external).
The Table 4.5 shows the strategy which will be implemented after CTHE experience.
come up with methods for getting feedback on students’ academic progress (Appendix 15).
These three essential elements are covered and integrated in an effective lesson plan:
I Teaching/learning activities
Setting clear goals for student learning can help you choose the kind of teaching and
learning activities you’ll employ in class, and those activities will help you establish how
to assess whether the goals have been met.
This section of my portfolio, which gives careful treatment to the aforementioned subtopics,
concentrates on assessment and evaluation methodologies. This part also discusses vari-
ous evaluation and assessment techniques and how they might be used to my academic
career.
Formative Assessment
Formative assessment is a continual evaluation that lecturer carry out to get precise data
about students’ development to inform learning and instruction. It generally takes place
40 CHAPTER 4. REFLECTIVE SECTIONS ON THE CORE MODULE
throughout the teaching and learning process and is informal. For the first time, formative
assessment is utilized to prepare lessons. The goal of progress monitoring is to provide
feedback. It helps identify the early shortcomings in my training. Based on this feedback,
I’ll be able to concentrate on what has to be expanded for my training.
Summative Assessment
Summative assessment is a more formal overall evaluation that only occurs seldom (for
example, at the conclusion of a semester) in order to assess achievement and offer a
thorough review of students’ accomplishments at that specific moment. Typically, it
takes the form of a test or examination.
In conclusion, appraisal and assessment mark the conclusion of all scientific investigations.
They depend on one another and help one another. They are also necessary for the sub-
ject’s or person’s progress. Evaluation often occurs at the conclusion of an investigation,
whereas assessment occurs at the beginning. While the evaluation records any changes
or improvements to the data, the assessment aims to record all data, both subjective and
objective.
Figure 4.4: The evidences of the evaluation method I have learned from CTHE
Figure 4.5: The evidences of the evaluation method I have learned from CTHE
(Appendix 16)
At the CTHE, I’ve come to understand how critical it is to provide high-quality practical
guides that can be used by academic staff members and students alike to uphold the
standard of the practical assessment. Proof for the instructional handbook that will be
utilized in next semesters.
Figure 4.6: Evidence for feedback getting from zoom chat box
The curriculum creation, development, and revision of my area are the main subjects of
this portion of my portfolio, with a stronger emphasis on the aforementioned subtopics.
This part also discusses my background and my involvement in the design, creation, and
adjustment of current curriculum. As the person in charge of my core teaching, I made a
significant contribution to the creation of the curriculum for the course Object-Oriented
Programming using Java at the Department of Information and Communication Tech-
nology, Faculty of Studies, University of Vavuniya, Sri Lanka in 2021–2022. I completed
all of the work required to complete the curriculum restructuring process for the goal
of curriculum reform, including reorganizing the materials in the right sequence, locat-
ing the most recent references, and compiling the finalized output. Table 4.8 shows my
contribution to preparing the syllabus in curriculum design process of the Department of
Information and Communication Technology- in the years 2021 & 2022.
Table 4.8: My contribution to preparing the syllabus in curriculum design process of the
Department of Information and Communication Technology- in the years 2021 & 2022.
Course Code: TICT1224
Course Title: Object Oriented Programming (OOP)
Theory Practical Independent Learning
Credit Value: 4:2/2
30 hours 60 hours —
Core/Optional: Core
46 CHAPTER 4. REFLECTIVE SECTIONS ON THE CORE MODULE
Course Contents:
• Theory: Java Overview: Introduction, Data Types, Variable Types, Basic Oper-
ators, Decision Making, Loop Control; Classes and Objects: Classes, Objects,
Methods, Constructors and Destructors, Static Data Members Functions, String
Handling; Inheritance: IS-A Relationship, HAS-A relationship, Abstraction, In-
terfaces; Polymorphism: Instance of Operator, Overloading, Overriding, Virtual
Methods, Runtime Polymorphism or Dynamic Method Dispatch; Encapsulation:
Access Modifiers, Access Control and Inheritance, Encapsulation, The Object Class,
Inner Classes, Packages; Exception Handling: Exception, Try-catch Block, Fi-
nally block, Throw and Throws; Input and Output: Byte Streams and Character
Streams, The Predefined Streams, Reading Streams, Writing data into a file, Read-
ing data from a Text file; Multithreading: Multitasking, Thread, Runnable
Interface, Priority of a Thread.
• Practical: Developing object oriented programs using the concepts covered in the
theory
I am further explained my reflective cycle regarding the curriculum design and revision.
Shortcomings I was ◦ Both students and staff have no clear idea of the content
realized in my of the lesson.
previous practices ◦ Teaching will be transferred from one employee to another
◦ There is no proper evaluation and evaluation system
◦ Time is difficult to manage
◦ Lectures were not given properly
◦ Low student performance
What more do I I have learned a lot from CTHE programme regarding the
have to learn curriculum development,
◦ Learned how to create good curriculum
◦ A comprehensive syllabus was prepared
◦ The new syllabus includes the following (syllabus,
syllabus, credit ratings, timeline, syllabus objectives, ILOs,
syllabus content, teaching and learning methods,
assessment methods and recommended readings)
procedure or prediction.
5. Explain the relationship between the electronical devices and ICT which produce the
real-world system such as automatic car driving, automatic door open, path directing
walking stick for blinds, etc.
6. Raising knowledge of job opportunities and postgraduate study options.
To ensure the project’s further advancement, the Department of ICT at the University of
Vavuniya has undertaken to review the aforementioned learning outcomes. The Depart-
ment plans to use the proper assessment techniques in each module in order to ensure that
the aforementioned learning outcomes are satisfied. Each semester, the undergraduate
lecturer outlines the most crucial learning objectives that students set in the curriculum.
A committee reviews the department’s learning objectives and aims each year, and the
curriculum gives students a good opportunity to master all of the learning objectives be-
fore graduating. The department will take the necessary actions to continue reviewing,
validating, and improving the program based on feedback from students.
The use of ICT in higher education is the main topic of this part, with a stronger emphasis
on the aforementioned subtopics. This part also includes information on my background,
present habits, and how I use ICT in teaching and learning activities.
My current practices in ICT- (WhatsApp, Zoom, LMS Moodle, and e-mail) to conduct
online lectures.
I Create a WhatsApp group for each of my allocated subjects and add all the students
who belongs to this subject.
I Prepared a separate course with subject course code in my VLE accounts which is
already created and enrolment all the students belong to this subject.
I All lecture materials (lecture videos, lecture notes, power point slides for this subject,
Assignments. etc) are shared via VLE and inform the student through WhatsApp
groups. Students can access these lecture materials as they wish.
I Conducted the lectures and discussions using the zoom app. The zoom link also
informs through WhatsApp group.
I Anybody asks any questions after the lecture hours they can send an e-mail with their
questions or share in the WhatsApp group. I will reply as earlier as possible.
I Similar like a normal lecture we can ask question to the random selected students with
two-way communication through zoom for keep our students’ attention.
I We upload lecture videos through VLE, if any student did not understand any section
the students frequently see the lecture videos and understand clearly.
I am further explained my reflective cycle regarding the ICT Skills in Higher Education,
which can be explained as follows,
4.5. MODULE 06 - ICT SKILLS IN HIGHER EDUCATION 51
What more do I I have learned new additional knowledge of modern ICT tools
have to learn in higher education from CTHE Programme which can be
used in my online lectures. (Zoom, Breakout Room, Google
Classroom, YouTube channel, Kahoot, Moodle, Perusal,
Padlet, WhatsApp .etc )
Result and After CTHE Programme, I am practiced and used the
evidence for new following related to ICT such as,
methods ◦ More attractive compare to previous lectures
◦ Do some class activities using ICT tools such as Kahoot,
Padlet, Perusal, etc.
◦ Do some group works in face-to-face lectures with proper
guidance.
◦ Students concentrate efficiently in the class
◦ Time can be saved using ICT tools for assignments,
classwork, and group work
◦ Very easy and convenient for both students and staff
◦ Distribute lecture materials using ICT tools
◦ Evaluation is very easy when we use ICT tool for in-course
assessments
◦ Very easy to collect students’ feedback through ICT tools
and easy to analyze them also using ICT tools
52 CHAPTER 4. REFLECTIVE SECTIONS ON THE CORE MODULE
VLE for both the assignments and the evaluation of the class.
Figure 4.11: Evidence for feedback getting from zoom chat box
capture. ICT may be used to develop tests like computer-based tests, which are frequently
a digital version of conventional paper-based exams, and computer-adaptive tests, which
alter their appearance in response to the input of the learner being assessed. Additionally,
simulation, interaction, and structured answer styles may be used in ICT-based examina-
tions. Effective ICT programs are created in environments like open-level performance,
assessing learners’ logical processes, examining how they approach challenges, and giving
learners feedback.
For a quick evaluation of critical and creative thinking regarding complicated linkages,
computer-based idea mapping with automated scoring can be employed. Teachers can
benefit from the usage of ICT by saving and collecting data on how pupils pick up new
concepts. Additionally, by participating in the evaluation and feedback of their students,
teachers may concentrate on other elements that promote learning. Students do better
while utilizing the same test object after receiving computer feedback while using the test
item. Numerous studies have demonstrated that using a computer stimulates creative
thinking and improves performance.
Currently, we prepare student assessments using more ICT technologies. We used a
variety of ICT technologies to conduct an online test, evaluate assessments, evaluate
certain presentations, and perform viva exams. Following are some of the ICT technologies
we employed in contemporary teaching and learning approaches. Table 4.13 shows the
evidence for the ICT based assessment method.
What more do I ◦ New software and modern systems for research like
have to learn Mendeley.
◦ Understand of intellectual property act..
◦ Advantages and limitations of the research
◦ How to prepare the Google scholar and research gate
accounts
Result and I have learned from CTHE and gain new knowledge of
evidence for new research such as,
methods ◦ After the collect more knowledge from CTHE, I will be
conducted research most effective way in the future
◦ I have prepared the Research Gate accounts as soon as
possible
◦ I have prepared the Google scholar Accounts and uploaded
my few research studies (see the evidence attached below
tion to students for complete plant or On-the-Job training to get real-world experience.
Engaging with research is interesting task work for my career. Figure 4.14 shows the
evidence for my Google Scholar, Research Gate, and Linked In account.
As the department is with less number of staff members and research work is a compulsory
module for every student of the program, therefore all staff members are required to take
4.6. MODULE 08 - RESEARCH IN HIGHER EDUCATION 59
Figure 4.14: The evidence for my Google Scholar, Research Gate, and Linked In account.
responsibility of students for the guidance. After allocating them, we have to guide them,
motivate them to complete their research works proper level, and also to be monitored
well their attendance. Table 4.12 Guiding for Research Proposal formulation, Research
Project, and Dissertation.
And I was the appointed as the “Chief Editor” of the 01st Undergraduate research confer-
ence which was organized by the Department of Information and Communication Technol-
ogy, Faculty of Technological Studies, University of Vavuniya 2022 (Appendix 20). And
I was complete first round review as the reviewer for the Electronic Letters in Computer
Vision and Image Analysis (ELCVIA) Journal. (Appendix 20)
Table 4.12: Guiding for Research Proposal formulation, Research Project, and Disserta-
tion
Contribution for research No of Credits What I have done and
supervising Students currently doing
61
62 CHAPTER 5. HONOURS RELATED TO TEACHING
Chapter 6
Conclusion
The Teaching Portfolio highlights my role as a university lecturer and related to the
teacher’s role, role as a scholar, role as a counselor, role as the administrator, and role
as an examiner..etc. It is also important to prepare a course syllabus by identifying
appropriate exam methods and apply them to the appropriate groups. By identifying the
nature of the learning groups, the lecturer can provide effective education to the groups
by adopting appropriate teaching-learning methods and examination evaluation methods.
And also, as a university lecturer, it is a role to play to guide the students for directions
they wish to achieve. Also, students should be advised on their academic problems and
personal problems, or to direct them to a relevant person. And also, the students should
identify and take the opportunity to capacity building. To pursue a career as a lecturer, it
is important to recognize the strength and weaknesses of it. The feedback of the students
and peers is the most important strategy for continuous improvement of the academic
staff. Identifying the role as a university lecturer is an immense service to the community.
This portfolio documents express my diverse teaching experiences. It is organized as a
collection of disclosure and documents intended to show my ongoing development as a
University teacher as well as to show how I put my teaching philosophy into practice.
In this portfolio, I have comparatively discussed various modules and the reflective im-
plication of my teaching experiences and future goals. The first part of the portfolio
discussed my personal & academic life which expresses a detailed description of my pro-
fessional career in a variety of fields. The second and third parts of the portfolio explained
my teaching philosophy, my teaching strategies, and my teaching responsibilities as an
academic staff member.
The fourth part of my portfolio discussed Reflective sections on the core module such as
module 02 - discussed the program for academic staff of Sri Lankan universities, Module
3 - discussed, teaching and learning methods, Module 4 - discussed, assessment and eval-
uation, Module 5 - discussed, curriculum design and revision, Module 6 discussed, ICT
skills in higher education, and Module 8, discussed research in higher education. Finally,
honors related to teaching and conclusion have been included in the portfolio.
My future goals as an academic staff member of government university can be concluded
as follows. I have to start my Ph.D. degree as soon as possible and then, I wish to be a
professor in computer science to impact knowledge to students and the public in general,
as well as undertake research to empower mankind in Sri Lanka and the world in general.
63
64 CHAPTER 6. CONCLUSION
Reference
1. https://www.nationalsoftskills.org/why-soft-skills-are-so-difficult-to-teach
2. https://www.conceptdraw.com/solution-park/resource/images/solutions/swot_analysis/Strategy-
management-diagram-SWOT-Analysis-Color-Arrow-Blocks.png
3. http://www.coahomacc.edu/programs/academics/academic-resources/counseling/index.html
4. https://www.stthomas.edu/academiccounseling
6. https://www.edglossary.org/student-centered-learning
7. https://poorvucenter.yale.edu/Formative-Summative-Assessments
8. https://tips.uark.edu/using-blooms-taxonomy
9. http://dbfriend.blogspot.com/2020/11/sri-lanka-qualifications-framework-slqf.html
10. https://cft.vanderbilt.edu/guides-sub-pages/team-based-learning
65
66 CHAPTER 6. CONCLUSION
67
68 CHAPTER 6. CONCLUSION
Appendixes
Appendix 01 - Lecturer (Unconfirmed) Appointment Letter
69
In this work, we propose a two-stage approach ? The intra-category confidence of the i code- th > We tested our approach on Xerox7, UIUCTex, Table 1: Mean Average Precision (mAP) rate with code-
book size using categorical confidences obtained by the
to create a discriminative and compact BoF rep- word is represented as follows: and Caltech101 image datasets. proposed method
resentation for visual object recognition. 1 > SIFT features were clustered using RAC with Before FS After FS
Cintra,i = PN Approach Dataset
j=1 var(hij ) r = 0.85, 0.825, 0.86 for Xerox7, UIUCTex, CB mAP CB mAP
> Eliminate ambiguous patch-based descriptors
Caltech101 dataset, respectively. We used the Xerox7 987 67.64 659 69.07
using an entropy-based filtering approach to where K - is the size of the codebook. Traditional UIUCTex 1032 93.40 617 95.04
reduce the features causing false positives in N - number of object categories in classification. linear OVA-SVMs in classification. Caltech101 958 74.71 753 78.36
object classification. hij - ith codeword value of each image belonging to the > Training keypoints were selected from the ini- Xerox7 803 65.77 546 70.11
j th category in the BoF histogram domain, Inter-category
> Select the informative subset of codewords i = 1, 2, .., K., j = 1, 2, .., N.
tially extracted descriptor with an entropy Confidence
UIUCTex 835 93.70 496 95.84
Caltech101 742 75.34 603 76.23
based on categorical confidence measures to th
value E(F)>4.1, 4.4, and 3.8 for Xerox7,
? Combined confidence of the i codeword is Xerox7 740 67.63 494 69.03
enhance the discriminative power of the code- UIUCTex and Caltech101 datasets, respec- Intra-category
UIUCTex 774 93.78 463 93.95
shown as follows: tively. Confidence
book and make it more compact. Caltech101 694 75.53 565 77.32
Ccom,i = αCinter,i + βCintra,i > In the inter-category confidence, the selection Xerox7 833 65.71 598 70.32
Combined confidence UIUCTex 842 93.73 501 95.60
criteria is: Caltech101 850 75.16 564 76.41
Methodology where α and β are constant values. ? Cbinter = 0 having a single category, or
? Cbinter > 20thP ercentile1≤i≤K (Cinter , i)
> A compact visual codebook has advantages in > The overall framework of the proposed method
> In the intra-category confidence, the selection Discussion and Conclusion
terms of computing efficiency and storage re- in this work is illustrated in Figure 1.
criteria is:
quirement [3, 4].
? Cbintra > 25thP ercentile1≤i≤K (Cintra, i) > The central idea of the proposed algorithm is
> Keypoints are selected using an entropy-based Discriminative
and Compact > In the combined confidence, the selection cri- to select representative keypoints and informa-
filtering method. Codebook tive codewords, so that the cluster structure of
teria is:
> A visual codebook is constructed using re- Feature the image dataset can be best respected.
Selection ? Ccom > αCbinter + β Cbintra, 0 ≤ α, β ≤ 1.
source allocating codebook (RAC) algorithm. Feature > The proposed method provides an effective
Extraction
? Entropy of SIFT descriptor F is computed ... ... ... ... ... (Patch-based way to reduce the BoF representation to low-
Codebook
as, Descriptors,
e.g., SIFT) Construction
Results dimension while maintaining the BoF model
P255 to be efficient with stable performance.
E(F ) = − i=0 pi(F )log2pi(F ) > The performance comparison of BoF approach
Training Set Codeword
where pi(F ) = |{k|fk =i}|
; k = 0, 1, 2, · · · , 255. Selection
with entropy-based filtering, the technique
128
with both filtering and codeword selection is References
F = [f1, f2, · · · , f128].
shown in Table 1.
Compact and [1] C. Csurka, R. Dance, L. Fan, J. Willamowski, C. Bray,
> In-distinctive codewords are eliminated based Discriminative > The entropy-based filtering technique elimi- Visual Categorization with Bags of Keypoints, In Workshop on
Feature
on categorical confidence measures. Codebook Statistical Learning in Computer Vision, Pages 1–22, 2004.
Extraction nates around 45% of the descriptors that out-
... ... ... ... ... (Patch-based [2] A. Ramanan, M. Niranjan, A One-pass Resource-Allocating
? The inter-category confidence of the ith Descriptors, performs traditional BoF approach. Codebook for Patch-based Visual Object Recognition, In pro-
e.g., SIFT) ceedings of the IEEE International Workshop on Machine Learn-
codeword is represented as follows: Image > On average 80% of the codewords were se- ing for Signal Processing, Pages 35–40, 2010.
Representation
PN fij
1
(Histogram) lected using inter-category, intra-category con- [3] J. Cui, M. Cui, B. Xiao, G. Li, Compact and Discrimina-
j=1 max ni − mi , 0
Cinter,i = Testing Set tive Representation of Bag-of-features, In Neurocomputing,
fidence, and combined confidence from the ini-
Vol. 169, Pages 55–67, 2015.
where K - is the size of the codebook. tially constructed codebook. [4] W. C. Lin, C. F. Tsai, Z. Y. Chen, S. W. Ke, Keypoint Selec-
N - number of object categories in classification. Classification tion for Efficient Bag-of-words Feature Generation and Ef-
> Our proposed technique yields on average 45% fective Image Classification, In Information Sciences, Vol. 329,
fij - number of j th category training keypoints in the
ith codeword, i = 1, 2, ..., K., j = 1, 2, ..., N.
of reduction in the initially constructed code- Pages 33–51, 2016.
Fig 1: The overall framework of the proposed technique. [5] A. Nasirahmadi, S. H. M. Ashtiani, Bag-of-feature Model
ni - total number of keypoints in ith codeword book while maintaining comparable perfor- for Sweet and Bitter Almond Classification, In Biosystems
mi - number of object categories in ith codeword mance with the traditional approach. Engineering, Vol. 156, Pages 51–60, 2017.
76 CHAPTER 6. CONCLUSION
Feature Representation Ccombi ned,i = αCinter,i + βCintr a,i ; 0 ≤ α, β ≤ 1 (4) features from those image sets.
followed by an entropy-based feature ... ... ... ... ... Extraction where,
(e.g., SIFT) fi j - number of training features in the i th codeword & j th category. The codebook is constructed by using the
selection approach is proposed to filter
Image hij - i th codeword value of each image belonging to the j th category K-means algorithm with K = 500 for all
out ambiguous descriptors from initially Representation in the BoF histogram domain, i = 1, 2, . . . , K, & j = 1, 2, . . . , N.
(Histogram)
Testing Set ni - is the total number of features in the i th codeword. datasets.
extracted large descriptors set. mi - is the number of object categories in the i th codeword.
N - is the number of object categories in classification.
The OVA-SVMs with RBF kernel was used
Statistical-based measures and Visual-bit K - is the size of the codebook.
Classification for classification and the reported classifica-
representation of codewords is proposed Figure 1: Overview of the proposed framework J
Visual-bit representation of codewords tion rates are of average precision (AP) [3].
to select informative codewords from an
J
One Pass Feature Selection (OPFS)
1 : if Ci ≥ t0
? Input: tr ai ni ngF eatur es hi = ∀i = 1, . . . , K (5)
initially constructed large codebook. 0 : otherwise
Discussion and Conclusion
? Output: selectedF eatur es
λp0 + p1
? r ← radius of the hypersphere, t1 = (6)
λ+1 The proposed ideas in this paper are to gen-
Methodology ? selectedF eatur es ← tr ai ni ngF eatur es{1},
eleminate Ci : if Ci ≥ t0 erate a compact and discriminative code-
? for all f eatur e ∈ tr ai ni ngF eatur es do CompactCB = (7)
retain Ci : Otherwise
Unambiguous descriptors are selected from if mink f eatur e − tr ai ni ngF eatur es k2> r 2 then book, that can be obtained by selecting rep-
where,
initially extracted SIFT descriptors using a Create a new hypersphere of r such that, p0 is mi n1≤i ≤K (SBi ), p1 is max1≤i ≤K (SBi )
selectedF eatur es ← {selectedF eatur es ∪ f eatur e} resentative keypoints and eliminating indis-
SBi - sum of visual bits associated with the i th codeword.
one-pass feature selection (OPFS) method end if λ - weighting parameter for a rare informative word. tinctive codewords.
which is then followed by an entropy-based end for ti - level of significant activation of a codeword in a codebook.
These processes not only reduces the over-
feature selection (EBFS) method to increase
Test Results all computational complexity but also main-
the discriminative power of the codebook. tains the BoF model to be efficient with sta-
Comparison of average precision (AP) with number of training features and codebook size: Traditional BoF approach and
A codebook is then constructed by means of ble performance.
proposed feature selection method with and without codeword selection (CS)
K-means approach. As a near future work we will incorporate
Without Statistical Measures with CS Visual bit
Indistinctive codewords are eliminated Approach Dataset #Descriptors CS inter intra combined with CS another set of detector-descriptors: SURF
based on statistical measures (inter, intra, CB AP CB AP CB AP CB AP CB AP
and ORB.
and combined category confidence) [1] or Traditional 4,046,578 987 84.21 803 83.68 740 87.89 902 82.41 286 83.85
OPFS Xerox7 212,294 500 94.11 400 93.31 375 94.69 409 93.72 191 93.42
visual-bit representation of codeword to OPFS+EBFS 172,006 500 94.04 400 93.40 375 94.79 406 93.41 201 94.13
References
obtain a compact codebook [2]. Traditional 4,543,590 1032 82.73 835 81.94 774 86.40 842 81.53 387 90.25 [1 ] V. Vinoharan and A. Ramanan, “Keypoints and Codewords Selection
for Efficient Bag-of-Features Representation”, In IEEE International
A histogram representation is created for OPFS UIUCTex 314,724 500 93.73 400 94.56 375 95.51 401 94.27 264 92.45 Conference on Future of Information and Communication Confer-
OPFS+EBFS 157,094 500 94.17 400 92.95 374 94.08 404 92.88 257 93.48 ence (FICC), pp. 203-208, 2018.
each descriptor set of images and linear
Traditional 1,760,400 1049 71.78 847 72.41 787 73.71 953 71.99 421 71.69 [2 ] T. Kirishanthy and A. Ramanan, “Creating Compact and Discrimina-
SVM classification algorithm is applied to PASCAL tive Visual Vocabularies Using Visual Bits”, In Proceedings of the IEEE
OPFS 245,327 500 72.93 400 73.16 375 73.47 405 73.91 262 72.88 Digital Image Computing: Techniques and Applications (DICTA), pp.
VOC 2007
those fixed-length feature vectors. OPFS+EBFS 181,248 500 72.58 400 72.90 375 73.64 414 72.71 252 72.20 258–263, 2015.
The overall framework of the proposed Traditional 5,659,137 925 84.72 742 82.87 694 84.80 850 82.30 336 84.32 [3 ] K. H. Brodersen, C. S. Ong, K. E. Stephan, and J. M. Buhmann,
“The Binormal Assumption on Precision-Recall Curves”, In Proceed-
OPFS Caltech101 393,024 500 86.01 400 85.17 375 85.97 408 85.83 289 85.48 ings of the International Conference on Pattern Recognition (ICPR),
method is illustrated in Figure 1. OPFS+EBFS 286,925 500 86.02 400 85.36 375 86.34 407 85.50 249 85.35 pp. 4263–4266, 2010.
77
Research Publications
ICIAfS'12 1569625201
Abstract— Car detection is a challenging research area where (SURF) [8] to identify the two wheels and reject the rest
the appearance has various changes due to different models, of the circles that have been detected in the previous step.
poses, scales, lighting conditions, background, occlusion and Then car statistics such as wheelbase distance, wheelbase-to-
various image sizes. Amidst these external challenging factors,
car side-views have obvious and consistent characteristics in their hood ratio, and oblique lines that makes up the front and rear
structure such as wheels, oblique windows and bumpers, which windows are used in finding the bounding box of a car. This
provide crucial cues for detection. In this paper, we describe bounding box is passed as the initial contour for the Snake (or
a novel side-view car detection technique which constructs an active contour) algorithm for finding the outline of the car by
initial contour for the Snake using the detection of wheels. Our an iterative process. Using the final contour obtained by the
approach is subdivided in to three stages: wheel detection, bound-
ing box detection, and segmenting the car from its background. snake method is used to perform the foreground-background
In the first step, we use Hough transformation to detect circles in segmentation in order to locate the car.
an image and validate the wheels with a learnt visual vocabulary. The rest of this paper is structured as follows. Section 2
In the second step, we construct an initial contour with the summarises various car detection algorithms that have been
aid of the detected wheels and the width-to-height statistics of carried out in the recent years. Section 3 briefly describes
different types of cars. This initial contour forms the bounding
box of the car. In the third step, the Snake algorithm proceeds the needed background for our work. Section 4 explains in
with the initial contour to fit the boundary closer to the car. detail the proposed methodology in achieving detection and
Hence, the foreground, car, is separated from the background. We segmentation. Section 5 describes the experimental setup and
empirically evaluated our method on 100 side-view cars and the testing results which supports our claim. Finally, section 6
testing results shows that this approach has good performance. concludes the paper.
Index Terms— Car detection, Circular Hough Transform,
Snake algorithm, SURF, Visual Vocabulary II. R ELATED W ORK
Many related side-view car detection research has been
I. I NTRODUCTION
carried out in recent years. This section briefly describes them
Visual object detection is the task of finding a specific object with their merits and demerits.
in a given digital image or video sequence. Recently, most of In [2], the authors proposed a vehicle detection system for
the research works [4]–[6] on object detection cover the car cars with different direction perspectives: front, back, side,
detection problem. Car detection is a growing research area and oblique. For the front or back-view cars, the knowledge
which has important applications, such as intelligent traffic of horizontal structures are used to generate the hypothesis
surveillance, driver assistant and vehicle parking systems. area, and for oblique car, a template matching technique
In this paper, we address side-view car detection and seg- is applied to generate the vehicle hypothesis. Using these
mentation not as separate entities, but as two closely collab- hypothesis, line features are extracted from each sub-part of
orating processes. We also address the detection problem in the designed template. The method used to detect side-view
static images that can be gray-level or colour images and focus cars in [2] has been revisited in 2011 by the same authors [1].
on local features that describe these structural characteristics They reported that side-view cars can be detected based on
in particular. There are few approaches that specially consider a template matching technique. The template is constructed
the structural characteristics of cars [1]–[3]. All side-view cars using the shape knowledge of a car which mainly consists of
have two wheels and similar boundary shapes but little bit of wheel positions, horizontal and oblique lines of a car. They
variations. In our approach, bounding boxes of a car in its use Hough transformation to detect circles of an image and
side-view is detected by means of wheel detection, set of then the wheels are detected by using some assumptions such
line detection, and then the detected box is passed as the as the two wheels are of the same size, exist in the same
initial contour for the Snake algorithm [10], [11]. We use horizontal line, and not in the top of the image. They estimate
the Hough circle detection algorithm [9] to find the possible the approximate width and height of a car, where the height is
circular-like structures that are present in a given image. We about two-third and width is about three-fifth of the distance
create visual vocabularies using speeded up robust features between two wheels. According to this assumption, the initial
78 CHAPTER 6. CONCLUSION
Keywords: Bag-of-Features, Object Recognition, Incremental Learning, Discriminative Features, Visual Codebook.
Abstract: Advances in machine learning and image feature representations have led to great progress in pattern recog-
nition approaches in recognising up to 1000 visual object categories. However, the human brain solves this
problem effortlessly as it can recognise about 10000 to 100000 objects with a small number of examples. In
recent years bag-of-features approach has proved to yield state-of-the-art performance in large scale evalua-
tions. In such systems a visual codebook plays a crucial role. For constructing a codebook researchers cover
a large-scale of training image set. But this brings up the issue of scalability. A large volume of training data
becomes difficult to process whereas the high dimensional image representation could make many machine
learning algorithms become inefficient or even a breakdown. In this work we investigate whether the dominant
bag-of-features approach used in object recognition will continue significantly to improve with large training
image set or not. We have validated a one-pass clustering algorithm to construct visual codebooks for object
classification tasks on the PASCAL VOC Challenge image set. Our testing results show that adding more
training images do not contribute significantly to increase the performance of classification but it increases
the overall model complexity in terms of increased storage requirement and greater computational time. This
study further suggests an alternative view to the community working with the patch-based object recognition
to enforce retaining more discriminative descriptors rather than the reminiscent of the BIG data hypothesis.
193
Vinoharan, V. and Ramanan, A.
Are Large Scale Training Images or Discriminative Features Important for Codebook Construction?.
DOI: 10.5220/0005676201930198
In Proceedings of the 5th International Conference on Pattern Recognition Applications and Methods (ICPRAM 2016), pages 193-198
ISBN: 978-989-758-173-1
Copyright
c 2016 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
79
Abstract—Bag-of-features (BoF) representation is one of the the detected features are not helpful for better classification;
most popular image representations, that is used in visual object and 2) the model complexity is high that may overfit to the
classification, owing to its simplicity and good performance. distribution of codewords in an image. The increase in the
However, the BoF representation always faces the difficulty of number of object categories, increases the computational cost
curse of dimensionality that leads to huge computational cost and it makes the classification of histograms challenging due
and increased storage requirement. To create a discriminative
to its diverse range in object classes.
and compact BoF representation, it is desired to eliminate
ambiguous features before the construction of visual codebook
and to select the informative codewords from the constructed Most of the object recognition tasks that are reported in
codebook. In this paper, we propose a two-staged approach to the literature have employed sufficiently large-sized codebook
create a discriminative and compact BoF representation for object at the order of 1000 to 10000, typically resulting in hyper-
recognition. In the first step, we eliminate ambiguous patch- dimensional and sparse histogram representations. The use of
based descriptors using an entropy-based filtering approach to such large-sized codebook will in turn make each BoF vector
retain high-quality descriptors. In the subsequent step, we select to require huge storage space and the efficiency of computation
the informative codewords based on statistical measures. We in large scale datasets will yield to the well-known “curse-
have tested the proposed technique on Xerox7, UIUC texture, of-dimensionality”. Therefore, the discriminative power and
PASCAL VOC 2007 and Caltech101 benchmark datasets. Test- compactness of a codebook are important to control the com-
ing results show that more training features and/or a high-
dimensional codebook do not contribute significantly to increase
plexity of the model. A straightforward way to create compact
the performance of classification but it increases the overall model codebooks is to reduce the dimensionality, that will quickly
complexity and computational cost. The proposed preprocessing weaken the discriminative power and degrade classification
step of descriptor selection increases the discriminative power of a performance. Simply selecting most discriminative codewords
codebook, whereas the post-processing step of codeword selection or linearly combining the bins will not work well either [12].
maintains the codebook to be more compact. The proposed In this regard we formulate and contribute the following:
framework would help to optimise BoF representation to be
efficient with steady performance.
• Choose unambiguous patch-based descriptors prior to the
Keywords—keypoint selection; codebook; codeword selection; construction of a codebook in order to reduce the features
image representation; Bag-of-features causing false positives in object classification. In this regard
we present an entropy-based filtering approach to eliminate
ambiguous patch-based descriptors (e.g., SIFT).
I. I NTRODUCTION • Select the best subset of codewords from an initially con-
The bag-of-features (BoF) approach [3], [15], [17], [18], structed codebook to enhance the discriminative power of
[20] is a well known technique for representing the image the codebook and make it more compact. To achieve this we
content and has proved state-of-the-art performance in large present an inter-category and intra-category confidences to
scale evaluations. In the BoF approach, features are usually select the informative codewords that generates a discrimi-
based on the utilisation of tokenising keypoint-based features, native and compact codebook for the BoF representation.
e.g., scale-invariant feature transform (SIFT) [2], to generate
a codebook. The BoF representation of an image conveys the The proposed method provides an effective way to improve
presence or absence of the information for each visual word the object categorisation performance when using the BoF
in the image. In a BoF framework, the codebook plays a model with very low dimensional representation.
crucial role. An important issue of the codebook representation
is its discriminative power and compactness. The size of a The rest of this paper is structured as follows:
codebook controls the complexity of the codebook model and Section II briefly describes the background needed for our
the discriminative power of a codebook determines the quality work. Section III summarises related work that has been used
of the model. The number of features extracted from training to construct a discriminative and compact codebook for object
images to construct a codebook and the dimensionality of a recognition. Section IV explains the proposed methodology
codebook causes two sets of problems: 1) the computational in detail. Section V describes the testing results. Finally,
cost during the vector quantisation step is high and some of Section VI concludes this paper.
978-1-5386-2056-4/18/$31.00
2018
c IEEE 203 | P a g e
80 CHAPTER 6. CONCLUSION
Abstract—In a patch-based object classification system, one of state-of-the-art performances in visual object classification. In
the most popular image representation approach is the bag-of- such BoF approach, the codebook plays an important role in
features (BoF) representation. However, the number of patch- determining the discriminative power and the compactness of
based features extracted from images to create the BoF vector
is usually very large, which causes two problems: (i) Increased the feature vector representation. The discriminative power of
amount of computational needs during the vector quantisation a codebook determines the quality of the codebook model,
step, and (ii) Ambiguous descriptors from training images whereas the size of a codebook controls the complexity of the
increase false positive rate in the classification. To overcome model. We optimize the process of building codebooks with
these issues we introduce a one-pass feature selection approach less memory requirement and accelerate the approach while
followed by an entropy-based filtering technique to eliminate
the ambiguous features from initial large feature set. In this maintaining the discriminative power and compactness in the
work, a discriminative BoF representation for object recognition classification of visual objects.
is constructed using patch-based descriptors that are informative
in distinguishing object categories. Following the construction of a The main contribution of this paper is summarised below:
codebook a subset of codewords which is not activated enough in
images is eliminated based on statistical measures and visual-bit
representation of codewords. The proposed technique is evaluated • A feature selection technique referred to as one-pass
on (i) Xerox7, (ii) UIUCTex, (iii) PASCAL VOC 2007, and feature selection (OPFS) which is followed by an entropy-
(iv) Caltech101 image datasets. The proposed feature selection based feature selection (EBFS) approach is proposed to
step increases the discriminant power of a codebook, while the
codeword selection method maintains the codebook to be more
filter out ambiguous descriptors from initially extracted
compact. The proposed framework would help to optimise the large descriptors set.
BoF representation to be effective with stable performance.
• Two distinct codeword selection algorithms are pre-
Index Terms—Bag-of-features, Keypoint selection, Codeword
selection, Image representation. sented: (i) Statistical-based measures to compute the
inter-category, intra-category, and combined confidences,
I. I NTRODUCTION and (ii) Visual-bit representation of codewords to select
informative codewords from an initially constructed large
Object classification is a process of predicting the presence codebook.
or absence of a specific object in a digital image or video
sequences. There are lot of applications available based on
object classification such as pose estimation [9], describing In particular, we show that retaining too many similar fea-
photos [16], driver assistance system [11], intruder detection tures per image category and less informative codewords per
system [12], etc. Moreover the object classification tasks codebook not only increases the computational cost to generate
face lot of challenges owing to different lighting conditions, the BoF vector, but also degrades the classification rate. The
background, clutter, occlusion, poses, scales, and variety of proposed method provides an effective way to improve the
image sizes. Over the last decade the object classification object categorisation performance when using the BoF model
with the use of bag-of-features (BoF) approach has shown with low-dimensional representation.
promising results in large scale evaluation such as PASCAL
The rest of this paper is organised as follows.
VOC Challenge [7], Caltech256 [5], and ImageNet [17].
Section II briefly describes the background needed for
The BoF representation of an image conveys the presence our work. Section III summarises the related work that
or absence of the information of each codeword in the image has been used to construct a discriminative and compact
with respect to a visual codebook constructed using a set codebook for object recognition. Section IV explains the
of descriptors extracted from training images. The mid-level proposed methodology in detail. Section V describes the
representations of BoF approach [15], [18]–[20] computed experimental setup followed by testing results. Finally,
from dense sampled local descriptors of an image have shown section VI concludes this paper with discussion.
237
81
Journal Article
∗
Computer Unit, University of Jaffna, Jaffna, Sri Lanka
+
Department of Computer Science, University of Jaffna, Jaffna, Sri Lanka
Abstract
The Bag-of-features (BoF) approach has proved to yield better performance in a patch-based object
classification system owing to its simplicity. However, often the very large number of patch-based descrip-
tors (such as scale-invariant feature transform and speeded up robust features, extracted from images to
create a BoF vector) leads to huge computational cost and an increased storage requirement. This paper
demonstrates a two-staged approach to creating a discriminative and compact BoF representation for object
classification. In the first stage, ambiguous patch-based descriptors are eliminated using an entropy-based
and one-pass feature selection approach, to retain high-quality descriptors in constructing a codebook. In
the second stage, a subset of codewords which is not activated enough in images are eliminated from the
initially constructed codebook based on statistical measures. Finally, each patch-based descriptor of an im-
age is assigned to the closest codeword to create a histogram representation. One-versus-all support vector
machine is applied to classify the histogram representation. The proposed methods are evaluated on bench-
mark image datasets. Testing results show that the proposed methods enables the codebook to be more
discriminative and compact in moderate sized visual object classification tasks.
1 Introduction
Visual object classification is a process of predicting the presence of a specific object in a digital image or
video sequence. Visual object classification, scene classification, and image searching have posed a great chal-
lenge for computer vision. A number of factors render the problem of recognition highly challenging: changes
in pose, lighting, occlusion, clutter, intra-class differences, inner-class variances, deformations, background
that varies relative to the viewer, large numbers of images and several object categories.
The bag-of-features (BoF) approach [1], [2], [3], [4], [5], [6], [7], [8], [9] is a popular technique, used
for more than a decade to represent the image content, and has proved to yield better performance in many
computer vision tasks. The BoF approach is a multi-step process, with each step presenting many options, and
Correspondence to: vvinoharan@univ.jfn.ac.lk. The authors contributed equally.
Recommended for acceptance by Angel D. Sappa
https://doi.org/10.5565/rev/elcvia.1403
ELCVIA ISSN:1577-5097
Published by Computer Vision Center / Universitat Autònoma de Barcelona, Barcelona, Spain
82 CHAPTER 6. CONCLUSION
Sports Judge
86 CHAPTER 6. CONCLUSION
Blood Donation
87
}
t
t:;6r:o!llr;) 94-11-2484500
i,JE<I/ qo::ac, } TA & UN/IND-
Cl~nmruCu&l 94-11-2484600
94-11-2484 724 "'"!>! a,ru CP/S/948
Telephone My No.
C?,cld } <!•= }
Ogi ruriQJ 08'W ·
94-11-2447633 .
94-11-2387153 LID!Jlti}W
Fax Your No.
27 th November 2013
Secretary
Ministry of Higher Education Attn: Officer In-Charge of Foreign Training
Dear Sir
Certificate Course in Advaned Web Technology (Using Core & Advance JAVA)
- from 16th December 2013 to 07th February 2014, CMC Ltd., New Delhi, India
This refers to your letter No. FA/05/142 dated 07 th October 2013 forwarding a nomination for the above
programme.
We wish to inform you that the following officer has been selected to participate in the above
programme.
Please request him to contact the Embassy of India for his travel arrangements at the earliest. A copy of
letter received from the Embassy of India in this regard is attached for your information and necessary
action.
Please be informed that the officers who go for overseas training should submit a report on the training
to the respective Ministry with a copy to this Department, within a month after returning to the country.
r
ii
Yours faithfully
I,
A. Kumarasiri ', L
Director General
·,, ,I 'i
Cc: 1. Chairperson, University Grants Commission } ·-, I j
2. Vice Chancellor, University of Jaffna
.
3. Mr. V Vmoharan, Instructor (Grade II),
for your information & necessary
actions please
"
l1
11
1
:I
-~
t
., ii\~
. ijil,
' I~
i~,
-'-f,t.-,
.~ J., :w.,
88 CHAPTER 6. CONCLUSION
89
90 CHAPTER 6. CONCLUSION
91
92 CHAPTER 6. CONCLUSION
93
w11/~I06oll~
Digital Natives
611. m1ram&DfiH
~ ----.,
, .;a......-,;........ $~~60@
i•··
@YJ~mfDe;w@~tD [DrTL..e;GYfl~ ••••••.••
wrrw U6UffiEID60BiffiWffi1D
QI fr,$@!,,$ @j {D (TQI .ffe G) {D if' Ill GQI mr (E) LD rr 8n. aD6YA L L.D
Vi
95
96 CHAPTER 6. CONCLUSION
At Workshop
100 CHAPTER 6. CONCLUSION
101
102 CHAPTER 6. CONCLUSION
A
B 6a>. 38~97 .
{gsr,c9ln ,%[JITWB'.,P cFWU
Qu61TWC:GUrrs t.006\115'1>~. G.&IT(!9Wl.f 07, 8a:i~&Jl5
Dr. A. Ramanan
Department of Computer Science
Faculty of Science
University of Jaffna
Jaffna
Rs. .
Maior eauipment -Nil-
Consumables -Nil-
Stipend 4,000.00
Total 400,000.00
Any changes to the above approved votes need Council approval. This grant is
subjected to your institutional audit.
At Workshop
27/07/2022.
CERTIFICATE OF ATTENDANCE
.......... . .ryJ~·················
Dr.Poongotha1 Selvarajan
Director
Staff Development Centre
Director
Staff Development Centre
University ofVavuniya,
Sri Lanka.
107
108 CHAPTER 6. CONCLUSION
109
110 CHAPTER 6. CONCLUSION
111
112 CHAPTER 6. CONCLUSION
113
114 CHAPTER 6. CONCLUSION
,..,~·-... ""
I} '
·--i~·-®
:'f\~
. •'~
/~lf
eoa,~
eLJ.D;'T,-1 /5.%
Yom \"umher
l 29.08.2022
Dr.S.Wijeyamohan, Senior Lecturer Gr.II, FAS
Mr.N.Edwin Linosh, Senior Lecturer Gr.II, FAS
Dr.N.Ravinthirakumaran, Senior Lecturer Gr.II, FAS
Dr.M.Kayanan, Senior Lecturer Gr.II, FAS
Mr.S.Thirugnanasampanthar, Senior Lecturer Gr.II, FBS
Dr.A.Rukshan, Senior Lecturer Gr.II, FBS
Mrs. S. Mathivathany, Senior Lecturer Gr.II, FBS
Mr.V .Vinotharan, Lecturer (Unconfirmed),Jl.S
Mr.S.A. Jude Leon, Lecturer (Unconfirmed), FBS
Mr.K.Arjunan, Lecturer (Probationary), FAS
Ms.H.K.Nimalka Sanjeewani, Lecturer (Probationary), FAS
Ms.P.Rukshani, Lecturer (Probationary), FTS
Ms.J.Niroshi, Lecturer (Probationary), FTS
Mr.G.Vijayakanthan, Lecturer (Probationary), FAS
Ms.M.R.Fathima Aqeela, Lecturer (Probationary), FBS
Ms.S.Kajanthy, Lecturer (Probationary), FBS
Ms.P.Premisha, Lecturer (Probationary), FTS
Ms.P.Shorubika, Lecturer (Probationary), FTS
Ms. P.Amritha, Lecturer (Probationary), FTS
Mr.S.Suman, Marshal, Student & Welfare Division
Appointment of Team Managers for the Sports Teams of the University of Vavuniya
This is to inform you that the Sports Advisory Board at its 61h meeting held on 29.07.2022 appointed you as
Team Managers to the following sports teams of the University of Vavuniya.
Trkphonc ~o : 024-2222264 ( Yicc Cl.wn<'l'llor) Fax : 024-2222264 ( \'ic1) Cham·dlor) \Y,,t, sit<•: www.vau.ac.lk
024-2222265 ( Gem·111l) 024-2222265 ( C..:em,i,iJ)
115
Dr.T. Manaalesw~-'11"1
..J:. .1110~:i. _Vice~Chancell~~"
Dr.7.Mangaleswaran 'University of Vavuniya
Vice Chancellor - Vavuniya, Sri Lanka. '
j\~ /i
@o.l)q,ox:,
l!J.IW &--o
, ·ou r~111111M'r
I
06.06 .2022
Mr. V. Vinoharan,
Lecturer,
Department of Information Communication Technology,
Faculty of Technological Studies,
I am glad to inform you that you have been appointed as Deputy Proctor to the Faculty of
Technological Studies for a period of one year with effect from 06'" June 2022.
You are expected to work closely to maintain and impose discipline among students of the
Faculty by assisting the Dean and the Proctor of the University.
Yours Sincerely,
VICE-CHANCELLOR
..,+,; \-'o •. University of Va vuniya,
Vavuniya, Sri Lanka.
Dr.T.Mangaleswaran
Vice Chancellor
'frl<-plwul' ;\0 : 024 -2222264 ( \ "il'<.' U iam·1·\lur) Yax : 024-2222264 ( Yit~• Cliam·l'llor) Wd.1 $-ill': WWW. vau.ac.lk
024 -2222265 ( ( ;t·m·ml ) 024-2222265 ( (;,,m•ni l)
117
118 CHAPTER 6. CONCLUSION
Appointment of Members to the Committee for Medical Certificate & Mercy Chance
The Senate at its I o•h meeting held on 18.07.2022 appointed you as the Chairman/ Member to the above
committee to prepare a policy document to handle the Medical Certificate & Mercy Chance as early
as possible and it should be placed to the forthcoming Senate.
.:+,.- .2.2.\og-\..A>i.1.
Dr.'Y.Mangalekwaran, r;.~.!1 l~r'.LJ:3 /sswar. .in
' - ... ·. ,,.·31[r.,·
Vice Chancellor, :.__,. ,: , \/:_'; vur :~
,, ,,. ,
1 -:· ,
CC:
Dean/ Faculty of Applied Science.
Dean/ Faculty of Business Studies.
Dean/ Faculty of Technological Studies.
Head/ Department oflnformation and Communication Technology.
Registrar.
DR/Academic Affairs & Publication.
felrphoue Xo : 024-2222264 ( \"i"" Chaurellor) Fa.x : 024-2222264 ( \'ice Ch.U1edlur) Web site : www.vau.ac.lk
024-2222265 ( t: r nl'i.d) 024-2222265 ( Ur m•ral) E111a il : tmangalcs@ yahoo.com
119
120 CHAPTER 6. CONCLUSION
121
122 CHAPTER 6. CONCLUSION
123
124 CHAPTER 6. CONCLUSION
125
126 CHAPTER 6. CONCLUSION
127
128 CHAPTER 6. CONCLUSION
129
21.02.2022
Mr.V.Vinoharan,
Lecturer,
Department of !CT,
Dear Mr.Vinoharan
I am pleased to inform you that you have been assigned as the Lecturer in charge of the
following course module in the Academic programme of Department of Information and
Communication Technology under Faculty of Technological Studies, University ofVavuniya
for the Academic Year 2020/2021- Second Semester.
Practical 60 Hrs
Your cooperation in teaching and demonstrating theory with practical modules at the
Department is greatly appreciated.
V.Senthooran
University of Vavuniya
Faculty of Technological Studies
Department of Information anti Communication Technology
Title
obi ec1- 0 -r\ 0nliJ '\)yo'h°"'"""' ll" '\
V '-'
(3 • c,O - C\ •<.0
Time
I
5 3 2 1
a) The lectures helped to improve knowledge
j)
The course outline/syllabus given at the beginning was covered. 5 I 3 2 l
Instructions: Please answer all questions by circling one out of numbers I - 5 against
each statement
The numbers 1 - 5 correspond to the statement:
5 - Strongly agree 4 - Agree 3 - Neither agree nor disagree
2 - Disagree l - Strongly disagree
1
137
GJ [ZJ 0 0 0
Any other comments :
1
I -v?NrL aJ.,.,~ b~ c, Q.i+f.it .sc.0n-eol '° f rt-;,.;, 9-u~· e e..i-_,
bu 1-- ev'k 6'-in <'.-0 _:;ow, U, ,·!. rLU f-«--1 L,1t4...
r
.SU l/v'.) 81.l b 0,
2
138 CHAPTER 6. CONCLUSION
40 Minutes
1. What do you mean by Java IDE’s? Give three example for Java IDE’s.
2. Describe the main different between two similar iteration blocks (while loop and do..while
loop) in Java. Give suitable examples of these iteration blocks with output.
3. Write a Java program that allows the user to enter exactly twenty floating-point values. The
program then prints the sum, average (arithmetic mean), maximum, and minimum of
the values entered.
4. Write a Java program that allows a user to enter any number of non-negative integers. When
the user enters a negative value, the program no longer accepts input, and it displays the sum
of all the non-negative values. If a negative number is the first entry, the sum is zero.
5. The fibonacci sequence is the set of steadily increasing numbers where each number is equal
to the sum of the preceding two numbers (1, 1, 2, 3, 5, 8, 13, . . . ). Write a java program that
display first twenty fibonacci numbers.
6. Convert the program given in the question 5 with the help of recursive idea.
9. What do you meant by the Local variable and Instance variable in Java?
10. What do you understand by Constructor? Give two examples which is come under same class
with the help of java codes.
End
139
40 Minutes
1. What do you mean by Java IDEs? Give three example for Java IDE’s.
Solution:
Java IDE (Integrated Development Environment) is a software application that enables
users to write and debug Java programs more easily.
The following are the best Java IDEs that are mostly used in the world: Eclipse, Net-
Beans, IntelliJ IDEA, BlueJ, JCreator, JDeveloper, MyEclipse, Greenfoot, DrJava, Xcode,
Codenvy
2. Describe the main different between two similar iteration blocks (while loop and do..while
loop) in Java. Give suitable examples of these iteration blocks with output.
Solution:
while do-while
Condition is checked first then statement(s) Statement(s) is executed atleast once,
is executed. thereafter condition is checked.
It might occur statement(s) is executed zero At least once the statement(s) is executed.
times, If condition is false.
No semicolon at the end of while. Semicolon at the end of while.
while(condition) while(condition);
If there is a single statement, brackets are Brackets are always required.
not required.
Variable in condition is initialized before variable may be initialized before or within
the execution of loop. the loop.
while loop is entry controlled loop. do-while loop is exit controlled loop.
3. Write a Java program that allows the user to enter exactly twenty floating-point values. The
program then prints the sum, average (arithmetic mean), maximum, and minimum of
the values entered.
import java.io.*;
class Q3{
public static void main(String args[]){
Console cnsl = System.console();
1/4
140 CHAPTER 6. CONCLUSION
You are requested to submit your answers in a folder named with your registration number(Eg:
2017ICTS##) only with the .java files.
:String
:void
You are required to map the above class diagram into a computer programming using Java programming
language in order to automate a Student Management System of “The Techzie Acdemy”. Please note that +
indicates the public class members and - indicates the private class members.
Class Student:
(a) Inside the Student class create separate getters and setters to get and set the values of the instance
variables name , gender, regNumber and academicYear to accomplish encapsulation.
(b) The academicYear should be read-only.
(c) Create a default constructor.
(d) Create another constructor to get only the Academic Year as the parameter and initialize the value
within the constructor.
(e) Create another parameterized constructor with the parameters name , gender , registration number and
academic year to initialize the instance variables.
(NOTE: The Gender should be marked as ‘M’ if the student is a Male and ‘F’ is the student is a Female)
141
1. (a) Breifly describe what is Encapsulation and Polymorphism in the context of Object-
Oriented Programming (OOP) [15%]
(b) Identify the Object-Oriented technology for each of the following features:
i. The entry point of any Java program.
ii. The process of exposing all the necessary details and hiding the rest.
iii. The statements that are not executed by the compiler and interpreter. [15%]
(c) State the usage of underlined keywords in the Java main method shown below:
public static void main(String args[])
[20%]
(d) Explain why Java is called as “Write once and run anywhere?” Explain briefly. [10%]
(e) Explain the term Declaration, Initialization, and Assignment using the suitable Java code
example. [25%]
(f) Identify the difference between Primitive ans Non Primitive data types. [15%]
[50%]
1/4 TICT1224
143
University of Vavuniya
First Examination in Information Communication
Technology - 2019
Second Semester - June/July 2021 (Held in February/March 2022)
TICT1224 Object Oriented Programming (Theory)
Marking Scheme
1.
(a). Encapsulation
You are requested to submit your files in a folder named with your index number
(Example: TS4001) consisting all your .java files.
A movie production company named “The Zee Studio” has planned to automate their Movie
Details Management System and they have requested your help to accomplish it. The class
diagram and other necessary details are given below.
You are required to map the above class diagram into a computer programme using Java
programming language in order to full fill the request of “The Zee Studio”. Please note that +
indicates the public class members and - indicates
1/2the private class members. TICT1224
Create the parent class Movie and inherit 2 child classes Actors and Technicians.
Practical Manual
University of Vavuniya
Faculty of Technological Studies
Department of Information and Communication Technology
First Semester - Academic Year 2019/2020
• Access modifiers
7 28/02/2022 04/03/2022 Discussion
• Encapsulation
8 07/03/2022 11/03/2022 • ICAE 01
• Abstraction
9 14/03/2022 18/03/2022 • Abstract class
• Abstract method
• Interface
10 21/03/2022 25/03/2022 01 Tutorial
• Static modifier
11 28/03/2022 01/04/2022 • ICAE 02 Discussion
• Command line argument
12 04/04/2022 08/04/2022
• Type conversion
• Array data structure
13 11/04/2022 15/04/2022 • Array of objects 01 Tutorial
• Object initializers
14 18/04/2022 22/04/2022 • ICAE 03
15 25/04/2022 29/04/2022 • Introduction to Eclipse IDE 01 Tutorial
16 02/05/2022 06/05/2022 • Revision
Workshop Participation
150 CHAPTER 6. CONCLUSION
151
Mr. V. Vinoharan,
Deputy Proctor,
Dept. of Information and Communication Technology,
Faculty of Technological Studies.
Appreciation for serving as a Resource Person for the Orientation Programme 2022.
I hereby certify and appreciate that you served as a resource person for the Orientation
Programme conducted for the first year students of the academic year 2020/2021 at the
Faculty of Technological Studies.
l?~
----~ ----- . -----
Dean
Faculty of Technological Studies.
DEAN
FACULTY OF TECHNOLOGICAL STU DIES
UNlVERSlTY OF VAVUNlYA
SRl LANKA.