Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm
|
|
- Clarence Farmer
- 7 years ago
- Views:
Transcription
1 Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm M. Arun, S.S. Salvadiswar, J.Sibidharan Department of Electronics and Communication, Mepco Schlenk Engineering College, Virudhunagar salvadiswar@gmail.com Abstract Character Recognition/Pattern Recognition has become main aspect of Computer vision. Optical Character Recognition is a method where characters are recognized from images digitally. Many algorithms are available for this purpose but i Novel algorithm implements this in a faster and efficient way based on unique segmentation technique. This algorithm has been implemented in MATLAB R2010a with a set of test images and an accuracy of 98% has been obtained. Text to Speech conversion is an artificial tool that converts text to speech sounds. There are quite a number of methods to generate speech sounds but this Selective Speech Synthesis provides naturalness in speech sounds based on phonemes, diphones and syllables. Keywords: Image processing based on OCR, Segment Extraction, Text to Speech conversion, Selective speech synthesis, Feature Extraction. I. Introduction Text to Speech conversion is an artificial tool that converts text to speech sounds. There are quite a number of methods to generate speech sounds but this Selective Speech Synthesis provides naturalness in speech sounds based on phonemes, diphones and syllables. Our ultimate aim is to make visually impaired people to Read books, newspaper and articles. Braille is the system that already exists to aid the visually impaired people. But the main disadvantage in Braille System is that it consumes time. In this Braille system the text is converted to raised dots to make the visually challenged people read and understand the letter/word. Our whole design relies on image processing technique. Any image with text embedded in it can be taken as an input image. This image is processed by image processing techniques to identify each and every character. These characters are converted into speech sounds using Voice shield box and Arduino. Journal on Today s Ideas Tomorrow s Technologies, Vol. 2, No. 1, June 2014 pp by Chitkara University. All Rights Reserved. 1
2 Arun, M. Salvadiswar, S.S. Sibidharan, J. A algorithm called i Novel Algorithm is used to recognize the characters in the image. The main Module in character recognition is Segment extraction. The Programming is done in MATLAB using Character recognition algorithm and Beagle Bone Black is used to run the program that gives the output as a text file which has the character contents of the image. This Text File is sent to the Arduino through serial UART communication from the Beagle Bone Black. The Arduino receives the input text file and sends character as the output to the Voice shield box. This Voice Shield Box Consists of TTS256 processor (Text to Speech Converter) and a Speak Jet IC. The output from the TTS256 processor is an allophone Codes for the corresponding letter and this allophone code is sent to Speak Jet IC where the allophone codes are get converted to allophone sounds. The allophone sounds are given as electrical signals to the output jack where these signals are converted into sounds. II. i -NOVEL ALGORITHM The proposed algorithm for optical character recognition has been explained in detail in this section. A. OVERVIEW OF i NOVEL ALGORITHM The algorithm is represented in a block diagram as shown in Figure 1. Figure 1 2
3 First, an image is acquired through any of the standard image acquisition techniques. The input image is assumed to be in the YCbCr color format. The algorithm works on the Y part of the input image, which is a gray level image. Using an appropriate thresholding algorithm, the gray level images are threshold to obtain a binary image which quantizes alphabets and background to black and white colors respectively. The obtained binary image is then passed on to a specific edge detection process. The edge detection algorithm is performed such that only the right sided edges of each alphabet are obtained and the other edges are eliminated. After edge detection, the image is then segmented and feature extraction is performed. A segment is defined as a continuous path of black pixels in the edge detected image, for this algorithm. In this step, different details of the segments, which are required for further processing, are stored. The next step is to profile stored line segments. Profiling of segments is the process of Categorizing them into different types of segments such as short, long, line or curve, etc. Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm B.THRESHOLDING The Y component of the input image is thresholded in this block. The results of thresholding and edge detection for the alphabet Q is shown in Figure 2. Conventional thresholding with a threshold value of 64 is used for this particular input image. The threshold factor was obtained after experimentation on over 500 images of alphabets. Figure 2 3
4 Arun, M. Salvadiswar, S.S. Sibidharan, J. C.CREATING BOUNDING BOXES The thresholded input image is then confronted to bounding operation. A bounding box is made around each and every character in the text image using propied library function in MATLAB. This library function encloses every character with a bounding box by identifying the pixel values of the input text image. The results of creating a bounding box around a text image are shown in Figure 3. D.IDENTIFICATION OF SPACE To identify the space between two words, an array named space vector is initialized. This space vector array stores the pixel values of white background in it. The pixel value of white is 255. Whenever the array confronts with the value 255, it stores it in the variable. When the variable reaches a maximum limit of 7 or 8 array values of 255 it is assumed that there is a space. If the variable gets less than 4 or 5 array values of 255 then the variable is neglected and the array is again initialized to zero. E.CROPPING AND SEPERATION OF LINES The process of recreation of the entire image in a text file is obtained through cropping and separation. The whole input image is cropped to a predefined size of characters. This i novel algorithm identifies each and every character 4
5 in the image and compares it with a set of predefined character image set and produces the output in a text file. The entire image is cropped at each and every step of the character recognition iterative process. The identified characters at each step is then stored in a new text file to be further processed. III. TEXT TO SPEECH CONVERSION The proposed algorithm for text to speech conversion has been explained in detail in this section. Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm A. OVERVIEW OF TEXT TO SPECH CONVERSIONALGORITHM The below algorithm to convert the identified text characters into speech sounds is represented in a block diagram as shown in Figure 3. Figure 3 A. BEAGLE BONE BLACK The main component of the project is Beagle Board. The main advantage of this board is that it contains a real time operating System in it which is capable of running on any environment. The other advantage is that it can be accessed remotely from any environment provided with Ethernet and Wi-Fi connectivity. The Beagle Board contains the character recognition algorithm. It runs the algorithm over the input text images and identifies the characters and stores in a text file. This text file is given as an input to the arduino board. The reason behind the usage of this board is that it contains 2Gb built in memory which can store multiple books in it in the form of images. B. TTS256 PROCESSOR The TTS256 is an 8-bit microprocessor programmed with 600 letter-to-sound rules for the automatic, real-time translation of English text to allophone addresses. The TTS256 will read English words, numbers, currency, time, 5
6 Arun, M. Salvadiswar, S.S. Sibidharan, J. mathematical expressions and some punctuation characters. As the rule set is constrained by the amount of memory in the device, the TTS256 will be able translate and pronounce correctly roughly 90% of text sent to it. The translation quality is adequate for many embedded applications but is guaranteed to mispronounce some common words from time to time. C. OPERATION OF TTS256 Communications parameters of the serial port are set to 9600 Baud N81. The host processors send up to 128 character the TTS256 s serial port on pin 18 (RX). Text is spoken when the TTS256 receives a new line character (0x0A)or the maximum number of 128 characters has been received. The TTS256 then converts the English text to Speak Jet allophone codes, which are then sent to the Speak Jet via the serial port. The TTS256 then monitors the Speak Jet PIN 15 (BUFFER_HALF_FULL) line and waits to send more data. Once the Speak Jet starts speaking, it lowers the Speak Jet ready line (pin 16 of the Speak Jet). After the Speak Jet has completed speaking and is ready to accept more data, the Speak Jet ready line is raised. The host processor should monitor the Speak Jet ready line to determine when to send more text. The host processor should wait at least 12mS after sending text before checking the status of the Speak Jet Speaking flag. D. SPEAK JET The Speak Jet is a completely self contained, single chip voice and complex sound synthesizer. It uses Mathematical Sound Architecture (MSA) technology which controls an internal five channel sound synthesizer to generate onthe-fly, unlimited vocabulary speech synthesis and complex sounds. The Speak Jet is preconfigured with 72 speech elements (allophones), 43 sound effects, and 12 DTMF Touch Tones. Through the selection of these MSA components and in combination with the control of the pitch, rate, bend, and volume parameters, the user has the ability to produce unlimited phrases and sound effects, with thousands of variations, at any time. This is not recorded waveforms or sound fragments but truly synthetic sound. The Speak Jet can be controlled simultaneously by logic changes on any one of its eight Event Input lines, and/or by a Serial Data line from a CPU (such as the OOPic, Basic Stamp or PC) allowing for both CPU controlled and Stand-Alone operations. Other features include an internal 64 byte input Buffer, Internal Programmable EEPROM, three programmable outputs, and direct user access to the internal five channel sound synthesizer. 6
7 IV. RESULTS The developed algorithm was designed and implemented on MATLAB build R2010a with a thresholding module and a simple alphabet segmentation module. It was tested on 20 different computer generated images of the three major fonts. The Figure 4 shows the process of character recognition being implemented on different images with different font styles and font size on a MATLAB environment. Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm Figure 4 Figure 5 7
8 Arun, M. Salvadiswar, S.S. Sibidharan, J. The Figure 5 shows the result of character recognition process. The figure shows a text file which contains the text content of the processed image. V. CONCLUSION The motivation for the development of this algorithm was the simple fact that English alphabets are fixed glyphs and they shall not be changed ever. Due to this fact, usage of artificial neural networks and vector based data training provide almost accurate results, but these are performing a lot of redundant work. And also, most of the OCR processes today involves images from high resolution scanners and cameras. OCR technologies now can make use of this advancement in technology and consider techniques which were abandoned due to the lack of present day imaging technology. Our algorithm is one such approach. This algorithm has the advantage of speed, power, memory and area, since it does not include any training or learning mechanisms and also because of lack of image database which some OCR techniques require. Also, this algorithm is the first, in being a multiple font OCR and also a no training type OCR. To conclude, the developed algorithm can readily be used as a kernel within a complete OCR solution to recognize each alphabet after the segmentation and such adjustment operations to align the alphabet horizontally. The algorithm also gives us an accuracy of 100% on the current test set of alphabets for most of the fonts in all the three above mentioned font families currently. Future versions of this algorithm can be expected to extract more types of features from the input alphabet image to improve accuracy and to provide support for other alphabet sets. REFERENCES Ramanathan. R. et al. A Novel Technique for English Font Recognition Using Support Vector Machines, in Advances in Recent Technologies in Communication and Computing, Kottayam, Kerala, 2009, pp DOI /ARTCom Sushruth Shastry Gunasheela G. et al., i - A novel Algorithm for Optical Character Recognition in - International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing in March 2013, pp DOI /iMac4s J. Zhang, Language generation and speech synthesis in dialogues for language learning, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, May 20, Farig Yousuf Sadeque, Bangla Text to Speech Conversion: a Syllabic Unit Selection Approach Department of Computer Science and Engineering Bangladesh University of Engineering and Technology (BUET) Dhaka-1000, Bangladesh. DOI /ICIEV S. P. Kishore and A.W. Black, Unit size in unit selection speech synthesis, Proceedings of EUROSPEECH, pp ,
9 M Usman Raza, et al., Text Extraction Using Artificial Neural Networks, in Networked Computing and Advanced Information Management (NCM) 7th International Conference,, Gyeongju, North Gyeongsang, 2011, pp Fonseca, J.M., et al., Optical Character Recognition Using Automatically Generated Fuzzy Classifiers, in Eighth International Conference on Fuzzy Systems and Knowledge Discovery, Shanghai, 2011, pp DOI /FSKD Design and Implementation of Text To Speech Conversion for Visually Impaired Using i Novel Algorithm 9
ELECTRONIC DOCUMENT IMAGING
AIIM: Association for Information and Image Management. Trade association and professional society for the micrographics, optical disk and electronic image management markets. Algorithm: Prescribed set
More informationAn Arabic Text-To-Speech System Based on Artificial Neural Networks
Journal of Computer Science 5 (3): 207-213, 2009 ISSN 1549-3636 2009 Science Publications An Arabic Text-To-Speech System Based on Artificial Neural Networks Ghadeer Al-Said and Moussa Abdallah Department
More informationNavigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, mani85a@gmail.com,karur,india 2 M.Kumarasamy
More informationFingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id awaghmare194@gmail.com kazmiali786@gmail.com Contact Numbers 8097031667 9167689265
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationDEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: EC6504 - Microprocessor & Microcontroller Year/Sem : II/IV UNIT I THE 8086 MICROPROCESSOR 1. What is the purpose of segment registers
More information- 35mA Standby, 60-100mA Speaking. - 30 pre-defined phrases with up to 1925 total characters.
Contents: 1) SPE030 speech synthesizer module 2) Programming adapter kit (pcb, 2 connectors, battery clip) Also required (for programming) : 4.5V battery pack AXE026 PICAXE download cable Specification:
More informationIntelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
More informationSerial Communications
Serial Communications 1 Serial Communication Introduction Serial communication buses Asynchronous and synchronous communication UART block diagram UART clock requirements Programming the UARTs Operation
More informationS7 for Windows S7-300/400
S7 for Windows S7-300/400 A Programming System for the Siemens S7 300 / 400 PLC s IBHsoftec has an efficient and straight-forward programming system for the Simatic S7-300 and ern controller concept can
More informationA Computer Vision System on a Chip: a case study from the automotive domain
A Computer Vision System on a Chip: a case study from the automotive domain Gideon P. Stein Elchanan Rushinek Gaby Hayun Amnon Shashua Mobileye Vision Technologies Ltd. Hebrew University Jerusalem, Israel
More informationREAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
More informationImplementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller Zafar Ullah Senior Application Engineer Scenix Semiconductor Inc. Leo Petropoulos Application Manager Invox TEchnology 1.0
More informationMICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
More informationMULTIPLE CHOICE FREE RESPONSE QUESTIONS
MULTIPLE CHOICE FREE RESPONSE QUESTIONS World ORT Union I n p u t d e v i c e s Where would you find the letters QUERTY? A. Mouse B. Keyboard C.Numeric Keypad How did the computer mouse get its name? A.
More informationUSTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems
USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and
More informationEmbedded Systems on ARM Cortex-M3 (4weeks/45hrs)
Embedded Systems on ARM Cortex-M3 (4weeks/45hrs) Course & Kit Contents LEARN HOW TO: Use of Keil Real View for ARM Use ARM Cortex-M3 MCU for professional embedded application development Understanding
More informationADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory
ADVANCED PROCESSOR ARCHITECTURES AND MEMORY ORGANISATION Lesson-17: Memory organisation, and types of memory 1 1. Memory Organisation 2 Random access model A memory-, a data byte, or a word, or a double
More informationA+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
More informationAccurate Measurement of the Mains Electricity Frequency
Accurate Measurement of the Mains Electricity Frequency Dogan Ibrahim Near East University, Faculty of Engineering, Lefkosa, TRNC dogan@neu.edu.tr Abstract The frequency of the mains electricity supply
More informationMACHINE VISION MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com
MACHINE VISION by MNEMONICS, INC. 102 Gaither Drive, Suite 4 Mount Laurel, NJ 08054 USA 856-234-0970 www.mnemonicsinc.com Overview A visual information processing company with over 25 years experience
More informationLaser Gesture Recognition for Human Machine Interaction
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-04, Issue-04 E-ISSN: 2347-2693 Laser Gesture Recognition for Human Machine Interaction Umang Keniya 1*, Sarthak
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationDesigning and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System
, pp.97-108 http://dx.doi.org/10.14257/ijseia.2014.8.6.08 Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System Suk Hwan Moon and Cheol sick Lee Department
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationLow-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
More informationManagement Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
More informationAutomatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
More informationKeywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
More information8051 MICROCONTROLLER COURSE
8051 MICROCONTROLLER COURSE Objective: 1. Familiarization with different types of Microcontroller 2. To know 8051 microcontroller in detail 3. Programming and Interfacing 8051 microcontroller Prerequisites:
More information1 PERSONAL COMPUTERS
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
More informationChapter 4 System Unit Components. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 4 System Unit Components Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook
More informationANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
More information150127-Microprocessor & Assembly Language
Chapter 3 Z80 Microprocessor Architecture The Z 80 is one of the most talented 8 bit microprocessors, and many microprocessor-based systems are designed around the Z80. The Z80 microprocessor needs an
More informationMeasurement and Analysis Introduction of ISO7816 (Smart Card)
Measurement and Analysis Introduction of ISO7816 (Smart Card) ISO 7816 is an international standard related to electronic identification cards with contacts, especially smart cards, managed jointly by
More informationOpen Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationFPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
More informationIVR CRM Integration. Migrating the Call Center from Cost Center to Profit. Definitions. Rod Arends Cheryl Yaeger BenchMark Consulting International
IVR CRM Integration Migrating the Call Center from Cost Center to Profit Rod Arends Cheryl Yaeger BenchMark Consulting International Today, more institutions are seeking ways to change their call center
More informationEARTH PEOPLE TECHNOLOGY SERIAL GRAPH TOOL FOR THE ARDUINO UNO USER MANUAL
EARTH PEOPLE TECHNOLOGY SERIAL GRAPH TOOL FOR THE ARDUINO UNO USER MANUAL The Serial Graph Tool for the Arduino Uno provides a simple interface for graphing data to the PC from the Uno. It can graph up
More informationAndroid based Alcohol detection system using Bluetooth technology
For more Project details visit: http://www.projectsof8051.com/android-based-alcohol-detection-system-usingbluetooth-technology/ Code 1435 Project Title Android based Alcohol detection system using Bluetooth
More informationData Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide
Data Acquisition Module with I2C interface «I2C-FLEXEL» User s Guide Sensors LCD Real Time Clock/ Calendar DC Motors Buzzer LED dimming Relay control I2C-FLEXEL PS2 Keyboards Servo Motors IR Remote Control
More informationVersions. Q.station Q.station T. Q.station D. Q.station DT x x
Most important features: Very high data rates up to 100 khz each channel 100 khz at 16 channels, 10 khz at 128 channels 64 Q.bloxx modules connectable Ethernet interface for configuration and data output
More informationVision Impairment and Computing
This factsheet introduces the major approaches to computing for people with impaired vision; it is not intended to be detailed or comprehensive. The approaches detailed here can be used singly or in combination
More informationThe Development of Multimedia-Multilingual Document Storage, Retrieval and Delivery System for E-Organization (STREDEO PROJECT)
The Development of Multimedia-Multilingual Storage, Retrieval and Delivery for E-Organization (STREDEO PROJECT) Asanee Kawtrakul, Kajornsak Julavittayanukool, Mukda Suktarachan, Patcharee Varasrai, Nathavit
More informationHow To Use Safety System Software (S3)
SPECIFICATION DATA Safety System Software (S3) APPLICATION Safety System Software (S 3 ) is a robust, full featured configuration, diagnostic, programming and real-time monitoring package for integrators
More informationForm Design Guidelines Part of the Best-Practices Handbook. Form Design Guidelines
Part of the Best-Practices Handbook Form Design Guidelines I T C O N S U L T I N G Managing projects, supporting implementations and roll-outs onsite combined with expert knowledge. C U S T O M D E V E
More informationHow To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationChapter 2 Logic Gates and Introduction to Computer Architecture
Chapter 2 Logic Gates and Introduction to Computer Architecture 2.1 Introduction The basic components of an Integrated Circuit (IC) is logic gates which made of transistors, in digital system there are
More informationDevelopment of Low Cost Private Office Access Control System(OACS)
Development of Low Cost Private Office Access Control System(OACS) Sadeque Reza Khan Prime University, Department of Electrical and Electronic Engineering, Dhaka-1216, Bangladesh sadeque_008@yahoo.com
More informationScanning Workshop Joan Weeks SLIS Computer Labs Mgr. February 2011
Scanning Workshop Joan Weeks SLIS Computer Labs Mgr. February 2011 Scanned Images and Born Digital Images Scanners convert analog images into digital images for web pages and digital library collections
More informationFrom Concept to Production in Secure Voice Communications
From Concept to Production in Secure Voice Communications Earl E. Swartzlander, Jr. Electrical and Computer Engineering Department University of Texas at Austin Austin, TX 78712 Abstract In the 1970s secure
More informationVECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and
More informationOptical Character Recognition (OCR)
History of Optical Character Recognition Optical Character Recognition (OCR) What You Need to Know By Phoenix Software International Optical character recognition (OCR) is the process of translating scanned
More informationComputer Organization & Architecture Lecture #19
Computer Organization & Architecture Lecture #19 Input/Output The computer system s I/O architecture is its interface to the outside world. This architecture is designed to provide a systematic means of
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationImplementation of Knock Based Security System
Implementation of Knock Based Security System Gunjan Jewani Student, Department of Computer science & Engineering, Nagpur Institute of Technology, Nagpur, India ABSTRACT: Security is one of the most critical
More informationSerial Communications
April 2014 7 Serial Communications Objectives - To be familiar with the USART (RS-232) protocol. - To be able to transfer data from PIC-PC, PC-PIC and PIC-PIC. - To test serial communications with virtual
More informationHardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms
Hardware and Logic Implementation of Multiple Alarm System for GSM BTS Rooms Arifa Ferdousi 1 and Sadeque Reza Khan 2 1 Dept. of Computer Science and Engineering, Varendra University, Rajshahi, Bangladesh
More informationSignature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
More informationSecurity & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
More informationLONG BEACH CITY COLLEGE MEMORANDUM
LONG BEACH CITY COLLEGE MEMORANDUM DATE: May 5, 2000 TO: Academic Senate Equivalency Committee FROM: John Hugunin Department Head for CBIS SUBJECT: Equivalency statement for Computer Science Instructor
More informationBest Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com
Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and
More informationVirtual KNX/EIB devices in IP networks
WEINZIERL ENGINEERING GmbH WEINZIERL ENGINEERING GMBH F. Heiny, Dr. Y. Kyselytsya, Dr. Th. Weinzierl Bahnhofstr. 6 D-84558 Tyrlaching Tel. +49 (0) 8623 / 987 98-03 E-Mail: info@weinzierl.de Web: www.weinzierl.de
More informationA Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
More informationImplementing an In-Service, Non- Intrusive Measurement Device in Telecommunication Networks Using the TMS320C31
Disclaimer: This document was part of the First European DSP Education and Research Conference. It may have been written by someone whose native language is not English. TI assumes no liability for the
More informationMACHINE ARCHITECTURE & LANGUAGE
in the name of God the compassionate, the merciful notes on MACHINE ARCHITECTURE & LANGUAGE compiled by Jumong Chap. 9 Microprocessor Fundamentals A system designer should consider a microprocessor-based
More informationOPC COMMUNICATION IN REAL TIME
OPC COMMUNICATION IN REAL TIME M. Mrosko, L. Mrafko Slovak University of Technology, Faculty of Electrical Engineering and Information Technology Ilkovičova 3, 812 19 Bratislava, Slovak Republic Abstract
More informationDigitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai 2007. Jens Onno Krah
(DSF) Soft Core Prozessor NIOS II Stand Mai 2007 Jens Onno Krah Cologne University of Applied Sciences www.fh-koeln.de jens_onno.krah@fh-koeln.de NIOS II 1 1 What is Nios II? Altera s Second Generation
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationCMOS OV7660 Camera Module 1/5-Inch 0.3-Megapixel Module Datasheet
CMOS OV7660 Camera Module 1/5-Inch 0.3-Megapixel Module Datasheet Rev 1.0, June 2013 Table of Contents 1 Introduction...2 2 Features...3 3 Key Specifications...4 4 Application...4 5 Pin Definition...6
More informationAn Embedded Based Web Server Using ARM 9 with SMS Alert System
An Embedded Based Web Server Using ARM 9 with SMS Alert System K. Subbulakshmi 1 Asst. Professor, Bharath University, Chennai-600073, India 1 ABSTRACT: The aim of our project is to develop embedded network
More informationDiscovering Computers 2011. Living in a Digital World
Discovering Computers 2011 Living in a Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify chips,
More informationGPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out
More informationThirukkural - A Text-to-Speech Synthesis System
Thirukkural - A Text-to-Speech Synthesis System G. L. Jayavardhana Rama, A. G. Ramakrishnan, M Vijay Venkatesh, R. Murali Shankar Department of Electrical Engg, Indian Institute of Science, Bangalore 560012,
More informationEPSON PERFECTION SCANNING BASICS
EPSON PERFECTION SCANNING BASICS SCANNING A DOCUMENT 1. start a new Word document 2. select Insert, Picture, From Scanner or Camera choose Web or Print quality, depending on what you are scanning a. if
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)
More informationSmart Thermostat page 1
Smart Thermostat page 1 3. APPROACH In today s home appliances market, automation is becoming the norm and Smart Thermostat is a typical automation appliance able to be applied easily at home. With Smart
More informationCOMPUTER HARDWARE. Input- Output and Communication Memory Systems
COMPUTER HARDWARE Input- Output and Communication Memory Systems Computer I/O I/O devices commonly found in Computer systems Keyboards Displays Printers Magnetic Drives Compact disk read only memory (CD-ROM)
More informationMachine Architecture and Number Systems. Major Computer Components. Schematic Diagram of a Computer. The CPU. The Bus. Main Memory.
1 Topics Machine Architecture and Number Systems Major Computer Components Bits, Bytes, and Words The Decimal Number System The Binary Number System Converting from Decimal to Binary Major Computer Components
More informationHigh-speed image processing algorithms using MMX hardware
High-speed image processing algorithms using MMX hardware J. W. V. Miller and J. Wood The University of Michigan-Dearborn ABSTRACT Low-cost PC-based machine vision systems have become more common due to
More informationAn Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
More informationTracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
More informationInbound Routing with NetSatisFAXTion
Inbound Routing with NetSatisFAXTion Routing Terms DID Direct Inward Dialing (DID) is a service of a local phone company (or local exchange carrier) that provides a block of telephone numbers for calling
More informationUsing Neural Networks to Create an Adaptive Character Recognition System
Using Neural Networks to Create an Adaptive Character Recognition System Alexander J. Faaborg Cornell University, Ithaca NY (May 14, 2002) Abstract A back-propagation neural network with one hidden layer
More informationMANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL
MANAGING QUEUE STABILITY USING ART2 IN ACTIVE QUEUE MANAGEMENT FOR CONGESTION CONTROL G. Maria Priscilla 1 and C. P. Sumathi 2 1 S.N.R. Sons College (Autonomous), Coimbatore, India 2 SDNB Vaishnav College
More informationImplementation of Canny Edge Detector of color images on CELL/B.E. Architecture.
Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture. Chirag Gupta,Sumod Mohan K cgupta@clemson.edu, sumodm@clemson.edu Abstract In this project we propose a method to improve
More informationPROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1
UNIT 22: PROGRAMMABLE LOGIC CONTROLLERS Unit code: A/601/1625 QCF level: 4 Credit value: 15 TUTORIAL OUTCOME 2 Part 1 This work covers part of outcome 2 of the Edexcel standard module. The material is
More informationGLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
More informationLogical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.
Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how
More informationAUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR
AUTOMATIC NIGHT LAMP WITH MORNING ALARM USING MICROPROCESSOR INTRODUCTION This Project "Automatic Night Lamp with Morning Alarm" was developed using Microprocessor. It is the Heart of the system. The sensors
More informationNetwork connectivity controllers
Network connectivity controllers High performance connectivity solutions Factory Automation The hostile environment of many factories can have a significant impact on the life expectancy of PCs, and industrially
More informationVoice Dialer Speech Recognition Dialing IC
Speech Recognition Dialing IC Speaker Dependent IC for Voice Dialing Applications GENERAL DESCRIPTION The IC, from the Interactive Speech family of products, is an application specific standard product
More informationZIMBABWE SCHOOL EXAMINATIONS COUNCIL. COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER
ZIMBABWE SCHOOL EXAMINATIONS COUNCIL General Certificate of Education Ordinary Level COMPUTER STUDIES 7014/01 PAPER 1 Multiple Choice SPECIMEN PAPER Candidates answer on the question paper Additional materials:
More informationLow-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
More informationSerial port interface for microcontroller embedded into integrated power meter
Serial port interface for microcontroller embedded into integrated power meter Mr. Borisav Jovanović, Prof. dr. Predrag Petković, Prof. dr. Milunka Damnjanović, Faculty of Electronic Engineering Nis, Serbia
More informationOpen-Source, Cross-Platform Java Tools Working Together on a Dialogue System
Open-Source, Cross-Platform Java Tools Working Together on a Dialogue System Oana NICOLAE Faculty of Mathematics and Computer Science, Department of Computer Science, University of Craiova, Romania oananicolae1981@yahoo.com
More informationAbstract. Cycle Domain Simulator for Phase-Locked Loops
Abstract Cycle Domain Simulator for Phase-Locked Loops Norman James December 1999 As computers become faster and more complex, clock synthesis becomes critical. Due to the relatively slower bus clocks
More informationLOW COST HARDWARE IMPLEMENTATION FOR DIGITAL HEARING AID USING
LOW COST HARDWARE IMPLEMENTATION FOR DIGITAL HEARING AID USING RasPi Kaveri Ratanpara 1, Priyan Shah 2 1 Student, M.E Biomedical Engineering, Government Engineering college, Sector-28, Gandhinagar (Gujarat)-382028,
More information