Persian Sign Language Recognition Using Radial Distance and Fourier Transform
|
|
- Debra Harrell
- 7 years ago
- Views:
Transcription
1 I.J. Image, Graphics and Signal Processing, 204,, Pblished Online November 203 in MECS ( DOI: 0.585/ijigsp Persian Sign Langage Recognition Using Radial Distance and Forier Transform Bahare Jalilian Department of Compter Engineering, Kermanshah Science and Research Branch, Islamic Azad University Kermanshah, Iran Abdolah Chalechale Department of Compter Engineering, Razi University Kermanshah, Iran Abstract This paper provides a novel hand gestre recognition method to recognize 32 static signs of the Persian Sign Langage (PSL) alphabets. Accrate hand segmentation is the first and important step in sign langage recognition systems. Here, we propose a method for hand segmentation that helps to bild a better vision based sign langage recognition system. The proposed method is based on YCbCr color space, single Gassian model and Bayes rle. It detects region of hand in complex backgrond and non-niform illmination. Hand gestre featres are extracted by radial distance and Forier transform. Finally, the Eclidean distance is sed to compte the similarity between the inpt signs and all training featre vectors in the database. The system is tested on 480 postre images of the PSL, 5 images for each 32 signs. Experimental reslts show that or approach is capable to recognize all 32 PSL alphabets with 95.62% recognition rate. Index Terms Persian sign langage, hand gestre recognition, Gassian model, centroid distance, Forier transform, Eclidean distance I. INTRODUCTION Sign langage is a non-verbal visal langage that sed by deaf. In order to improve commnication between deaf and hearing people, research in atomatic sign langage recognition is needed. One application of sign langage recognition systems are the se on Internet becase many deaf people are nable to se the World Wide Web and commnicate by in the way normal people do, since they commonly have great difficlties in reading and writing. The reason for this is that normal people learn and perceive written langage as a visal representation of spoken langage. For deaf people, however, this correspondence does not exist, and letters which encode phonemes are jst symbols withot any meaning. The major part of sign langage is comprised of gestres and postres hand that imply meaningfl information. In gestre recognition, sign Langage is translated for dynamic hand motions. In postre recognition, sign Langage is recognized for static alphabets and nmbers. Sign langage recognition system is sefl for the hearing impaired to commnicate with the normal people. Research on atomatic sign recognition has been started since arond 995 []. Many different techniqes for hand gestres recognition have been analyzed, sch as fzzy logic [2], Hidden Markov Models (HMMs) [3], neral networks [4, 5] and spport vector machine [6]. Tsai and Hang sed Spport Vector Machine (SVM) to recognize the static sign and apply HMM model to identify the dynamic signs in the Taiwanese Sign Langage (TSL) [6]. Mehdi and Niaz khan [7] have proposed an American Sign Langage Recognition based on sensor glove to captre the signs. Artificial neral networks are sed to recognize the sensor vales coming from the sensor glove. Lee and Tasi have sed 3D data and neral network to interpret Taiwan sign langage [8]. Assaleh et al [9] have proposed the first continos (Arabic Sign Langage) ArSL system that was able to recognize ArSL sing HMM. Hogh transform and neral network have been sed for recognition American Sign Langage [0]. In [] a system for Arabic Sign Langage Recognition is designed that based on a Gassian skin color model to detect the signer's face and a Hidden Markov Model to recognition signs. Wavelet transform and neral network have been sed for recognition dynamic signs of American Sign Langage [2]. A system for Arabic Sign Langage Recognition is provided which the inpt image is converted into YCbCr color space and a skin profile is sed to detect the skin color from the YCbCr image. Principal Component Analysis algorithm is sed to compose the featre vectors for signs and gestres library [3]. Kiani Sarkaleh et al [4] proposed a Persian sign langage recognition system which is capable of recognizing 8 Persian signs by discrete wavelet transform and a mlti layered Perceptron (MLP) Neral Network (NN) to classify the selected images. In this system backgrond of all images was black. Karami et al [5] designed a
2 Persian Sign Langage Recognition Using Radial Distance and Forier Transform 4 system to recognize static signs of the Persian Sign Langage (PSL) alphabets, backgrond of all inpt images were niform and black. Hand images are converted to grayscale images. Their system is based on the wavelet transform and neral networks. Palraj et al [6] introdced a very simple Malaysian Sign Langage recognition system based on the area of the objects in a binary image and Discrete Cosine Transform (DCT) for extracting the featres from the video sign langage. In preprocessing stage the movie frames are converted into indexed image format and Average filter is applied on these images and the nwanted noises are removed. A simple sign langage recognition system was developed sing the skin color segmentation, moment invariants for featres extracting and neral network model [7]. In most of approaches, inpt hand images have been assmed that have niform and plain backgrond. The signs can be either static or dynamic. A static sign is a particlar hand shape and pose which represented by a single image. A dynamic sign is a moving gestre that represented by a seqence of hand images. The Persian sign langage consists of approximately 075 gestres of the common alphabets and words that the basic Persian sign alphabet is composed of 37 static and dynamic gestres [9]. Or approach focses on the recognition of 32 static hand images. In this paper, we propose a system to interpret static gestres of alphabets in Persian sign langage (PSL). First of all, an effective hand segmentation method is presented to detecting hand region in a complex backgrond with changing illmination condition. The hand segmentation method begins by modeling hman skin color in YCbCr color space sing a database of skin pixels. Skin color distribtion is modeled as a single Gassian model. Similarly a nonskin or backgrond model is bilt sing a database of non-skin pixels. Ths a Skin Probability Image is obtained in which the gray level of each pixel represents the probability of the corresponding pixel in the inpt image to represent skin. Next, hand gestre featres are extracted by radial distance and Forier transform. The rest of the paper is organized as fo llo ws. A detail description of the proposed PSL recognition system is presented in Section Ⅱ. In Section Ⅲ, we exhibit or experimental reslts with discssion. Finally, the conclsions and frther work are presented in Section Ⅳ. II. THE SUGGEST ED SYST EM The sggested system is provided to recognize 32 static sign of the Persian sign langage (PSL) alphabets. These signs are shown in Figre.We assmed that the inpt images inclde exactly one hand. Or system has two main phases: hand segmentation phase (hand region detection) and the featre extraction phase. The block diagram of the proposed recognition system is shown in Figre 2 and its main steps are discssed in the following. Figre. The Persian Sign Langage Alphabets. A. Hand Segmentation Image Pre-processing and detection of the hand region is necessary for image enhancement and for getting good reslts in sign langage recognition systems. The proposed system introdces a method for
3 42 Persian Sign Langage Recognition Using Radial Distance and Forier Transform segmenting hands sing YCbCr color space, single Gassian model, Bayes rle and morphology operators. The block diagram of this phase is shown in Figre 3. between skin and non-skin pixels to classify skin-pixel and to provide robst parameter against varying illmination conditions. RGB vales can be transformed to YCbCr color space sing (): Y Cb = Cr R G 8.24 B () If only the chrominance component is sed, segmentation of skin colored regions becomes powerfl in this process. Therefore, the variations of lminance component are eliminated as mch as possible by choosing the CbCr plane (chrominance components) of the YCbCr color space to bild the model. Research has shown that skin color is clstered in a small region of the chrominance space [4], as shown in Figre 4. Figre 2. The Block Diagram of the Proposed Recognition System Figre 4. Skin color Distribtion in YCbCr Color Space Figre 3. The Block Diagram of the Segmentation Phase in the Proposed Recognition System ) YCbCr Color Space Conversion One important factor that shold be considered while bilding a statistical model for color is the choice of a right color space. For most images, the RGB color space is considered as the defalt color space. In order to convert into other color spaces, we can apply linear or non-linear transformation on the RGB components. In this algorithm, after that color images are resized to 28 by 28 p ixe ls, the inpt RGB image is converted in to YCbCr images de to the fact that RGB color space is more sensitive to different light conditions so we need to transform the RGB vales in to YCbCr. The color space transformation is assmed to decrease the overlap 2) Single Gassian Model The skin color distribtion in CbCr plane is modeled as a single Gassian model. According to section 2. the reason for sing a single Gassian model is the localization of skin color to a small area in the CbCr chrominance space. This step begins with the modeling of skin and non-skin color sing a database of skin and non-skin pixels, respectively. A database of labeled skin pixels is sed to train the Gassian model. Some of skin images from the database are shown in Figre 5. The mean and the covariance of the database characterize the model. Images containing hman skin pixels as well as non-skin pixels are collected. The skin pixels from these images are careflly cropped ot to form a set of training images.
4 Persian Sign Langage Recognition Using Radial Distance and Forier Transform 43 where µ s and Σ s represent the mean vector and the covariance matrix of the training pixels, respectively. Ths the mean and the covariance have to be estimated from the training data to characterize the skin color distribtion as illstrated by (3) and (4). In these eqations, n is nmber of samples in training set. µ = n s j= c j n (3) = n T s = j c j s c j s n ( µ )( µ ) (4) Figre 5. Some of Skin Images from the Skin Database Let c = [Cb Cr] T denote the chrominance vector of an inpt pixel. Then the probability that the given pixel lies in the skin distribtion is given by (2): exp p c skin = 2 ( / ) T ( c µ ) Σ ( c µ ) 2π s Σs s s (2) Then, a Gassian model similar to skin model is bilt for non-skin p ixels also wh ich is called the non-skin or the backgrond model. A database of backgrond region is sed to train the non-skin model. Some of non-skin images from the database are shown in Figre 6. Then the probability that the given pixel lies in the non-skin distribtion is c/non-skin). The skin model and nonskin model are sed to obtain the Skin Probability Image of an inpt color image. Once the skin color and backgrond are modeled sing the single Gassian, these can be sed to calclate the probability of an inpt pixel representing skin, i.e. skin/c), where c is the inpt color vale. c/skin) is again sed to compte the reqired probability skin/c). To compte this probability, the Bayes rle is sed [9]: c / skin) P( skin) skin / c) = (5) c / skin). P( skin) + c / non skin). P( non skin) To calclate the probability, skin/c), for each inpt pixel, The probabilities skin) and non-skin) can be estimated from skin and non-skin image in the training database [9]. In this stdy, for training set we assmed that all p ixels are belong to the skin or non-skin clsters. Hence, we sed: p ( skin) = non skin) = 0.5 (6) c / skin) skin / c) = (7) c / skin) + c / non skin) Ths, the two conditional probabilities and the above ratio are compted pixel-by-pixel to give the probability of each pixel representing skin given its chrominance vector c. This reslts in a gray level image where the gray vale at a pixel indicates the probability of that pixel representing skin. This is called the Skin Probability Image (SPI) given by (8): SPI ( i, j) = skin / cij ) (8) Figre 6. Some of Non-Skin I mages from the Non-Skin Database Where a is a proper scaling factor and c ij is the chrominance vale of pixel (i,j). Here a is chosen to be 255 so that the highest probability vale reslts in a gray level of 255 in the Skin Probability Image. Then gray
5 44 Persian Sign Langage Recognition Using Radial Distance and Forier Transform image obtained is converted into a binary image by Ots thresholding. 3) Morphology Operations The binary image obtained in the previos section may contain white pixels at non-skin regions (backgrond) where the backgrond color resembles the color of skin or black pixels at hand region. These noises may be cased de to bad lighting conditions or existing pixels similar to skin pixels in those regions. In order to detect the hand clearly, it has been frther implemented morphology operations, to fill p the black pixels on the segmented hand and white pixels on backgrond. There are two operations involve namely dilation and erosion. Firstly, dilation operation is performed. Dilation adds pixels to fill p any missing pixels in hand region. Secondly, erosion operation is performed. Erosion removes any white pixels which do not belong to the hand region. This stage is performed to improve the reslt of hand segmentation. Figre 7 shows the images obtained after applying each of steps in the proposed segmentation algorith m. Figre 7(a) is orig inal image; Figre 7(b) is Skin Probability Image. Figre 7(c) is the binary image after Ots thresholding. Figre 7(d) is the hand detected after morphology operation. Figre 8. Implemented Radial Distance Techniqe on Hand Region. The bondary of a shape consists of a series of edge points. A "radial" is a straight line joining the centroid to an edge point. The "centroid" is located at the position (x c, y c ) sch that x c and y c are calclated, respectively, sing (9) and (0). N x x = c = 0 ( ) N N y y = c = 0 ( ) N (9) (0) Lengths of a shape s radial from its centroid, r(), are compted by (). (x(), y()) are coordinates of edge points and (x c, y c ) is coordinate of centroid. 2 2 r( ) = ( x( ) x c ) + ( y( ) yc ) () The signatres generated by this techniqe are invariant to translation, bt they do depend on slope and scaling (hand' size). Normalization with respect to slope and scaling can be achieved by Forier transform sing (2). n a n = r( ) e n t = j2πn N n =,..., N (2) Figre 7. (a): Original Image, (b): Skin Probability Image, (c): Segmented Hand After Ots thresholding (d): The Hand Detected After Morphology Operations. B. Featre Extraction In this phase, first, we apply Sobel edge detector to the hand segmented image, then featres are extracted fro m edges of the hand region. Next, we se radial distance model to obtain a -D fnctional representation of a bondary shapes (signatres) and to bild featre vectors [20]. Radial distance techniqe is based on the distance from the centroid of the shape to the bondary edge pixels as a fnction of angle, as shown in Figre 8. Where, N is the nmber of selected points on the bondary of the hand shape. The compted coefficients, a n, are divided by the maximm coefficient. We considered only first N/2 coefficients of Forier for the final featre vector, that is: a a2 a n / 2 fv = [,,..., ] (3) a0 a0 a0 Therefore, each sign is expressed by these compted coefficients as its featre vector. C. Classification and Recognition Stage A featre vector is compted for each image sign or gestre in the training set and stored in the training data set. When the system receives a new sign, it segments
6 Persian Sign Langage Recognition Using Radial Distance and Forier Transform 45 hand region, detects edges of hand and extracts a featre vector for it. The system comptes the Eclidean distance between featre vector of the inpt image sign and all the stored featre vectors in the training data set. Finally, the sign with minimm distance is selected as the most similar sign and best match. sing a digital camera fro m d ifferent persons, in a complex backgrond with changing illmination conditions and environments. The system is meant to be independent of the distance from the camera. So me samples from or signs database are shown in Figre 9. We divided the database into 2 sets, 320 images are selected for the training set and 60 images are employed as the test set. Hence, the training set is composed of 320 featre vectors. For testing the system, we measred the Eclidean distance between featre vectors of images in the test set and the featre vectors in the training set. Recognition rate of the sggested system is defined as (4): NmberofCorrectlyClassifiedSign Re cognitionr ate = 00% (4) TotalNmberofSigns As we can observe from the Figre 0, the proposed system is capable to recognize 32 PSL alphabets with 95.62% recognition rate which a good reslt is considering the diversity of data in dataset. Figre 0. Recognition Rates of the System for each PSL Alphabets IV. CONCLUSIONS AND FURTHER WORK Figre 9. Some Samples from Or Signs Database III. EXPRIMENTAL RESULT S For experiments, we have sed 32 static signs of PSL alphabets to test validity and robstness of the proposed system. Here, we bilt a database consists of 480 images (5 images of each sign). The sign images are captred This paper proposed a new techniqe for PSL recognition system. The system can detect the hand region in a complex backgrond, changing illmination and environmental conditions and inclding different skin colors. In the first step, the hand region is detected and segmented sing a single Gassian model in YCbCr color space and Bayes rle. Then, In order to find the most effective featres, we sed the radial distance model and Forier transform for featre extraction. As a reslt, the extracted featres for different signs are discriminated while they are invariant to the scaling and slope of the hand shape. The testing reslts showed 00% recognition rate with almost all the 32 signs except 7 signs. Ths, the reslts demonstrated that the proposed system is capable to recognize 32 PSL alphabets with a recognition rate of 95.62%. The
7 46 Persian Sign Langage Recognition Using Radial Distance and Forier Transform proposed approach needs no constraint sch as gloves, sensors and ill minations. In the ftre, we intend to extend the proposed method to constrct a complete Persian sign langage recognition system inclding both static and dynamic signs in order to help deaf and hearing impaired people to commnicate with others. REFERENCES [] M.B. Waldron and S. Kim, " Isolated ASL sign recognition system for deaf persons," IEEE Transactions on Rehabilitation Engineering, 3, 26 27, 995. [2] C.S. Lee, G.T. Park and J.S. Kim, "Real-t ime Recognition System of Korean Sign Langage based on Elementary Components,"997IEEE Proceedings of the Sixth IEEE International Conference on Fzzy Systems. Vol. 3, pp [3] M. AL-Rosan and K. Assaleh, "Video-based signer-independent Arabic sign langage recognition, sing hidden Markov models," Appl Soft Compt 9(3), 2009, pp [4] E. Stergiopolo and N.Papamarkos, "Hand gestre recognition sing a neral network shape fitting techniqe," Engineering Applications of Artificial Intelligence22, 2009, pp [5] P. Vamplew and A. Adams, "Recognition of sign langage gestres sing neral networks," Astralian Jornal of Intelligent Information Processing Systems, 998, vol. 5, [6] B.L. Tsai and C.L. Hang, "A Vision-Based Taiwanese Sign Langage Recognition System, IEEE International Conference on Pattern Recognition, 200, Vol. 5, pp [7] S.A. Mehdi and Y. Niaz Khan, "Sign Langage Recognition Using Sensor Gloves," Proceedings of the 9th International Conference on Neral Information Processing (ICONIP 02), 2002, Vol. 5, pp [8] Z. H. Lee and C. Y. Tsai, "Taiwan sign langage (TSL) recognition based on 3D data and neral networks", Expert Systems with Applications, 2009, vol.36, [9] K. Assaleh, T. Shanableh, M. Fanaswala and F. Amin, "Continos Arabic sign langage recognitionin ser dependent mode", J Intell Learn Syst Appl 2, 200, pp [0] Q. Mnib, M. Habeeb, B. Takrri and AI-Malik, "American sign langage (ASL) recognition based on Hogh transform and neral networks", Expert Systems with Applications, 2007, vol.32, pp [] M. Mohandes and M. Deriche, "Image Based Arabic Sign Langage Recognition", the 8TH International Symposim on Signal Processing and ITS Applications, 2005, pp [2] S. Kmar, D. K. Kmar and A. Sharma, "Visal hand gestre classification sing wavelet transforms, International Jornal of Wavelets", Mltiresoltion and Information Processing, 2003, vol., pp [3] E.E. Hemayed and A. S. Hassanien, "Edge-based recognizer for Arabic sign langage alphabet (ArS2V -Arabic sign to voice)," IEEE International Compter Engineering Conference, 20, pp [4] A. K. Sarkaleh, F. Poorahangaryan, B. Zanj and A. Karami, "A Neral Network Based System for Persian Sign Langage Recognition", IEEE International Conference on Signal and Image Processing Applications, 2009, pp [5] A. Karami, B. Zanj, A. K. Sarkaleh, "Persian sign langage (PSL) recognition sing wavelet transform and neral networks." Expert Systems with Applications 38, 20, pp [6] M.P Palraj, S. Yaacob H. Desa and C.R. Hema, "Extraction of Head and Hand Gestre Featres for Recognition of Sign Langage", International Conference on Electronic Design, 2008, pp.-6. [7] M.P Palraj, S. Yaacob and M. Azalan, R. Palaniappan, "A Phoneme Based Sign Langage Recognition System Using Skin Color Segmentation", 6th International Colloqim on Signal Processing & Its Applications, 200, No. 4, pp [8] I. Bahadori, Persian sign langage collection for the deaf. Edcation and research office rehabilitation research grop. Iran Welfare Organization, 992. [9] V. Vezhnevets, V. Sazonov and A. Andreeva, "A srvey on pixel-based skin color detection techniqes, In Proceedings of the GraphiCon 03, 2003, pp [20] K.L. Tan, and L. F. Thiang, Retrieving similar shapes effectively and efficiently, Mltimedia Tools and Applications, Klwer Academic Pblishers, Netherlands. 2003, pp. 34. Bahare Jalilian, She is crrently working toward the M.Sc. degree in the Islamic A zad Un iversity, Kermanshah Science and Research Branch. She obtained her B.S. in Compter Engineering from Razi University of Kermanshah, Iran in 20. Her research interests inclde compter vision, digital image processing and pattern recognition. Abdol ah Chalecale, Born in Kermanshah, Iran, received his B.S. and M.Sc. degrees in Electrical Engineering (Hardware) and Compter Engineering (Software) from Sharif University of Technology, Tehran, Iran. He received his Ph.D. degree from Wollongong University, NSW, Astralia in 2005 and crrently is with Razi University, Kermanshah, Iran. His research interests inclde image processing, machine vision and hman-machine interactions.
TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings
TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University
More informationWHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor
WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool
More informationASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks
ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic
More informationDesigning and Deploying File Servers
C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.
More informationRegular Specifications of Resource Requirements for Embedded Control Software
Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces
More information7 Help Desk Tools. Key Findings. The Automated Help Desk
7 Help Desk Tools Or Age of Anxiety is, in great part, the reslt of trying to do today s jobs with yesterday s tools. Marshall McLhan Key Findings Help desk atomation featres are common and are sally part
More informationCompensation Approaches for Far-field Speaker Identification
Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer
More informationCurriculum development
DES MOINES AREA COMMUNITY COLLEGE Crriclm development Competency-Based Edcation www.dmacc.ed Why does DMACC se competency-based edcation? DMACC tilizes competency-based edcation for a nmber of reasons.
More informationA Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2
International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1
More informationEvery manufacturer is confronted with the problem
HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,
More informationUsing GPU to Compute Options and Derivatives
Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation
More informationSpectrum Balancing for DSL with Restrictions on Maximum Transmit PSD
Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,
More informationMUNICIPAL CREDITWORTHINESS MODELLING BY NEURAL NETWORKS
0 Acta Electrotechnica et Informatica Vol. 8, No. 4, 008, 0 5 MUNICIPAL CREDITWORTHINESS MODELLING BY NEURAL NETWORKS Petr HÁJEK, Vladimír OLEJ Institte of System Engineering and Informatics, Faclty of
More informationOptimal Trust Network Analysis with Subjective Logic
The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway
More information10 Evaluating the Help Desk
10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem
More informationEvolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending
Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,
More informationEMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02
EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is
More informationDimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data
Volme: 3 Isse: 8 59-594 Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Dr. M. Naga Ratna Dept. of Compter Science JNTUH College of Engineering Email: mratnajnt@jnth.ac.in
More informationData De-duplication from the data sets using Similarity functions
Data De-dplication from the data sets sing Similarity fnctions M.Chitrarpa 1, V.Mniraj Naid 2 1 M.Tech Stdent Department of CSE Adisankara College of Engineering & Technology Gdr, Nellore district, India
More informationEnabling Advanced Windows Server 2003 Active Directory Features
C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment
More informationOnline Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
More informationDeploying Network Load Balancing
C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft
More informationGUIDELINE. Guideline for the Selection of Engineering Services
GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by
More informationDocument management and records (based in part upon materials by Frank Upward and Robert Hartland)
Today s lectre IMS1603 Lectre 21 What does docment management entail? Docment management and records (based in part pon materials by Frank Upward and Robert Hartland) www.monash.ed. a Thinking more abot
More informationEquilibrium of Forces Acting at a Point
Eqilibrim of orces Acting at a Point Eqilibrim of orces Acting at a Point Pre-lab Qestions 1. What is the definition of eqilibrim? Can an object be moving and still be in eqilibrim? Explain.. or this lab,
More informationWhat is a robot? Lecture 2: Robot Basics. Remember the Amigobot? Describing the Amigobot. The Unicycle Model. Modeling Robot Interaction.
What is a robot? Lectre 2: Basics CS 344R/393R: ics Benjamin Kipers A robot is an intelligent sstem that interacts with the phsical environment throgh sensors and effectors. Toda we discss: Abstraction
More informationChapter 1. LAN Design
Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More information8 Service Level Agreements
8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent
More information9 Setting a Course: Goals for the Help Desk
IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities
More informationModeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.
FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional
More informationPlanning a Managed Environment
C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the
More informationNeural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
More informationMVM-BVRM Video Recording Manager v2.22
Video MVM-BVRM Video Recording Manager v2.22 MVM-BVRM Video Recording Manager v2.22 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability
More informationThe Boutique Premium. Do Boutique Investment Managers Create Value? AMG White Paper June 2015 1
The Botiqe Premim Do Botiqe Investment Managers Create Vale? AMG White Paper Jne 2015 1 Exective Smmary Botiqe active investment managers have otperformed both non-botiqe peers and indices over the last
More information5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes
5 High-Impact Use Cases of Big Analytics for Optimizing Field Service Processes Improving Field Service Efficiency and Maximizing Eqipment Uptime with Big Analytics and Machine Learning Field Service Profitability
More informationRemote Control of an Inverted Pendulum System for Intelligent Control Education
Remote Control of an Inverted Pendlm System for Intelligent Control Edcation Sel Jng Intelligent Systems and Emotional Engineering Laboratory Department of Mechatronics Engineering Chngnam ational University,
More informationFast and Interactive Analytics over Hadoop Data with Spark
NETWORKED SYSTEMS Fast and Interactive Analytics over Hadoop Data with Spark MATEI ZAHARIA, MOSHARAF CHOWDHURY, TATHAGATA DAS, ANKUR DAVE, JUSTIN MA, MURPHY MCCAULEY, MICHAEL J. FRANKLIN, SCOTT SHENKER,
More informationPosition paper smart city. economics. a multi-sided approach to financing the smart city. Your business technologists.
Position paper smart city economics a mlti-sided approach to financing the smart city Yor bsiness technologists. Powering progress From idea to reality The hman race is becoming increasingly rbanised so
More informationCorporate performance: What do investors want to know? Innovate your way to clearer financial reporting
www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction
More information5 Using Your Verbatim Autodialer
5 Using Yor Verbatim Atodialer 5.1 Placing Inqiry Calls to the Verbatim Atodialer ( Yo may call the Verbatim atodialer at any time from any phone. The nit will wait the programmed nmber of rings before
More informationPlanning a Smart Card Deployment
C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive
More information2.1 Unconstrained Graph Partitioning. 1.2 Contributions. 1.3 Related Work. 1.4 Paper Organization 2. GRAPH-THEORETIC APPROACH
Mining Newsgrops Using Networks Arising From Social Behavior Rakesh Agrawal Sridhar Rajagopalan Ramakrishnan Srikant Yirong X IBM Almaden Research Center 6 Harry Road, San Jose, CA 95120 ABSTRACT Recent
More informationCloser Look at ACOs. Designing Consumer-Friendly Beneficiary Assignment and Notification Processes for Accountable Care Organizations
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationDesigning an Authentication Strategy
C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,
More informationManipulating Deformable Linear Objects: Characteristic Features for Vision-Based Detection of Contact State Transitions
Maniplating Deformable Linear Objects: Characteristic Featres for Vision-Based Detection of Contact State Transitions Jürgen Acker Dominik Henrich Embedded Systems and Robotics Lab. (RESY) Faclty of Informatics,
More informationResearch on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game
International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg
More informationA taxonomy of knowledge management software tools: origins and applications
Evalation and Program Planning 25 2002) 183±190 www.elsevier.com/locate/evalprogplan A taxonomy of knowledge management software tools: origins and applications Peter Tyndale* Kingston University Bsiness
More information11 Success of the Help Desk: Assessing Outcomes
11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to
More informationIntroduction to HBase Schema Design
Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior
More informationOn the urbanization of poverty
On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the
More informationEMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03
EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information
More informationDesigning a TCP/IP Network
C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation
More informationA Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent
More informationI Symbolization J,1 II e L~ "-"-:"u"'dll... Table I: The kinds of CGs and their classification, (where, t - a local neighbourhood topology)
POSTER SESSIONS 484 REPRESENTATION OF THE GENERALIZED DATA STRUCTURES FOR MULTI-SCALE GIS M.O.Govorov Dept. of Cartography,' Siberian State Academy of Geodesy Plahotnogo 10, Novosibirsk, 630108, Rssia
More informationOptimal control and piecewise parametric programming
Proceedings of the Eropean Control Conference 2007 Kos, Greece, Jly 2-5, 2007 WeA07.1 Optimal control and piecewise parametric programming D. Q. Mayne, S. V. Raković and E. C. Kerrigan Abstract This paper
More informationAn unbiased crawling strategy for directed social networks
Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of
More informationSickness Absence in the UK: 1984-2002
Sickness Absence in the UK: 1984-2002 Tim Barmby (Universy of Drham) Marco Ecolani (Universy of Birmingham) John Treble (Universy of Wales Swansea) Paper prepared for presentation at The Economic Concil
More information3. DATES COVERED (From- To) Technical 4. TITLE AND SUBTITLE
REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-01-0188 l ne pblic reporting brden tor this collection of information is estimated to average 1 hor per response, inclding the time tor reviewing instrctions,
More informationPrimary Analysis of Effective Permeability of the Flame in Burning Natural Gas
Jornal of etals, aterials and inerals. Vol.7 No. pp.63-66. rimary Analysis of Effective ermeability of the Flame in Brning Natral Gas Rakoš JAROSAV * and Repasova AGDAENA * Department of Thermal Technology,
More informationChapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000
Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed
More informationIn this chapter we introduce the idea that force times distance. Work and Kinetic Energy. Big Ideas 1 2 3. is force times distance.
Big Ideas 1 Work 2 Kinetic 3 Power is force times distance. energy is one-half mass times velocity sqared. is the rate at which work is done. 7 Work and Kinetic Energy The work done by this cyclist can
More informationRecognition of Single Handed Sign Language Gestures using Contour Tracing Descriptor
, July 3-5, 2013, London, U.K. Recognition of Single Handed Sign Language Gestures using Contour Tracing Descriptor Rohit Sharma, Yash Nemani, Sumit Kumar, Lalit Kane, Pritee Khanna, Member, IAENG Abstract
More informationOptimal Personalized Filtering Against Spear-Phishing Attacks
Optimal Personalized Filtering Against Spear-Phishing Attacks Aron Laszka and Yevgeniy Vorobeychik and Xenofon Kotsokos Institte for Software Integrated Systems Department of Electrical Engineering and
More informationHigh Availability for Microsoft SQL Server Using Double-Take 4.x
High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network
More informationHow To Plan A Cloud Infrastructure
Concrrent Placement, Capacity Provisioning, and Reqest Flow Control for a Distribted Clod Infrastrctre Shang Chen, Yanzhi Wang, Massod Pedram Department of Electrical Engineering University of Sothern
More informationGLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
More informationThe Time is Now for Stronger EHR Interoperability and Usage in Healthcare
The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing
More informationHAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
More informationPeriodized Training for the Strength/Power Athlete
Periodized Training for the /Power Athlete Jay R. Hoffman, PhD, FACSM, CSCS *D The se of periodized training has been reported to go back as far as the ancient Olympic games. Its basic premise is that
More informationSample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification
Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order
More informationHSBC Internet Banking. Combined Product Disclosure Statement and Supplementary Product Disclosure Statement
HSBC Internet Banking Combined Prodct Disclosre Statement and Spplementary Prodct Disclosre Statement AN IMPORTANT MESSAGE FOR HSBC CUSTOMERS NOTICE OF CHANGE For HSBC Internet Banking Combined Prodct
More informationPRIN 2007: D-ASAP project
PRIN 2007: D-ASAP project Roma Tor Vergata Unit D-ASAP meeting Feb. 2010 People@RomaTorVergata Name Vincenzo Grassi Salvatore Tcci Francesco Lo Presti Valeria Cardellini Emiliano Casalicchio Effort (m/y)
More informationVRM Video Recording Manager v3.0
Video VRM Video Recording Manager v3.0 VRM Video Recording Manager v3.0 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with
More informationCloser Look at ACOs. Putting the Accountability in Accountable Care Organizations: Payment and Quality Measurements. Introduction
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Janary 2012
More informationPlanning an Active Directory Deployment Project
C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,
More informationMining Social Media with Social Theories: A Survey
Mining Media with Theories: A Srvey Jiliang Tang Compter Science & Eng Arizona State University Tempe, AZ, USA Jiliang.Tang@as.ed Yi Chang Yahoo!Labs Yahoo!Inc Snnyvale,CA, USA yichang@yahooinc.com Han
More informationFUNCTIONAL COEFFICIENT MODELS UNDER UNIT ROOT BEHAVIOR. 1. Introduction
FUNCTIONAL COEFFICIENT MODELS UNDER UNIT ROOT BEHAVIOR TED JUHL Abstract. We analyze the statistical properties of nonparametrically estimated fnctions in a fnctional-coefficient model if the data has
More informationLocating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Doble-Take 4.x High Availability for Internet Information Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks
More informationBIS - Overview and basic package V2.5
Engineered Soltions BIS - Overview and basic package V2.5 BIS - Overview and basic package V2.5 www.boschsecrity.com Complete enterprise management for efficient, integrated bilding and secrity management
More informationSIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS
SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS Jeng-Han Doh 1, Nhat Minh Ho 1, Griffith School of Engineering, Griffith University-Gold Coast Camps, Qeensland, Astralia ABSTRACT
More informationEMC VNX Series Setting Up a Unisphere Management Station
EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre
More informationPhone Banking Terms Corporate Accounts
Phone Banking Terms Corporate Acconts If there is any inconsistency between the terms and conditions applying to an Accont and these Phone Banking Terms, these Phone Banking Terms prevail in respect of
More informationCRM Customer Relationship Management. Customer Relationship Management
CRM Cstomer Relationship Management Farley Beaton Virginia Department of Taxation Discssion Areas TAX/AMS Partnership Project Backgrond Cstomer Relationship Management Secre Messaging Lessons Learned 2
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationFirewall Feature Overview
PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content
More informationCloser Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know
Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated
More informationEMC PowerPath Virtual Appliance
EMC PowerPath Virtal Appliance Version 1.2 Administration Gide P/N 302-000-475 REV 01 Copyright 2013 EMC Corporation. All rights reserved. Pblished in USA. Pblished October, 2013 EMC believes the information
More informationInferring Continuous Dynamic Social Influence and Personal Preference for Temporal Behavior Prediction
Inferring Continos Dynamic Social Inflence and Personal Preference for Temporal Behavior Prediction Jn Zhang 1,2,3,4 Chaokn Wang 2,3,4 Jianmin Wang 2,3,4 Jeffrey X Y 5 1 Department of Compter Science and
More informationSignature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
More informationEMC ViPR Analytics Pack for VMware vcenter Operations Management Suite
EMC ViPR Analytics Pack for VMware vcenter Operations Management Site Version 1.1.0 Installation and Configration Gide 302-000-487 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationVision based Vehicle Tracking using a high angle camera
Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu gramos@clemson.edu dshu@clemson.edu Abstract A vehicle tracking and grouping algorithm is presented in this work
More informationOn a Generalized Graph Coloring/Batch Scheduling Problem
Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr
More informationaééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë
C H A P T E R 7 aééäçóáåö=táåççïë= péêîéê=ommp=oéöáçå~ä= açã~áåë Deploying Microsoft Windows Server 2003 s involves creating new geographically based child domains nder the forest root domain. Deploying
More informationTechnical Notes. PostgreSQL backups with NetWorker. Release number 1.0 302-001-174 REV 01. June 30, 2014. u Audience... 2. u Requirements...
PostgreSQL backps with NetWorker Release nmber 1.0 302-001-174 REV 01 Jne 30, 2014 Adience... 2 Reqirements... 2 Terminology... 2 PostgreSQL backp methodologies...2 PostgreSQL dmp backp... 3 Configring
More informationBosch Video Management System Software v3
Video Bosch Video Management System Software v3 Bosch Video Management System Software v3 www.boschsecrity.com Enterprise-class Client/Server based video management system System-wide ser management, alarm
More information