A 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Applications

Size: px
Start display at page:

Download "A 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Applications"

Transcription

1 Internationa Journa of esearch Studies in Science, Engineering and Technoogy Voume 2, Issue 7, Juy 2015, PP ISSN (Print) & ISSN X (Onine) A 3D Motion Trajectory Signature Identification for Human- Computer Interaction (HCI) Appications S. M. Youssef Computer Engineering Department, University Arab Academy for Science and Technoogy, Aexandria, Egypt sherin@aast.edu.com N. F. Attia Computer Engineering Department, Pharos University, Aexandria, Egypt neha.fathi@pua.edu.com S.M. Ekaffas Computer Science Department, University Arab Academy for Science and Technoogy, Aexandria, Egypt saeh.mesbah@gmai.com Abstract: Trajectory tracking is used to keep tracks objects. Trajectory tracking contro is used to affect desired trajectories of a device, human and anything can move. In order to precisey track specified trajectories, or be abe to foow more genera trajectories, many tracking contro agorithms have been proposed, but sti there is some probems of tracking trajectory in its appication. This paper introduces a new mode for trajectory signature tracking that integrates the maximay stabiity extrema regions (MSE) feature extraction of first eve transformed domain descriptors with K- nearest neighbour cassifier. Experiments have been carried out on arge datasets of tracking trajectories with different characteristics. MATLAB software version 2013a is used to impement and test the proposed method. Experimenta esuts showed that the proposed mode produces satisfactory performance. Significant improvements have been iustrated in terms of recognition rate and recognition efficiency. Keywords: Trajectory tracking, Motion trajectory, maximay stabiity extrema regions (MSE), K- Nearest neighbour cassifier. 1. INTODUCTION Trajectory tracking contro means tracking reference trajectories predefined or given by path panners. It has been widey [17] studied and various effective methods and tracking controers have been deveoped. Trajectory tracking, measuring the positions and engths of the stationary points is aso usefu for perceiving the characteristics of the pause. Trajectory tracking is reated to ine simpification, on the one hand, and protocos for tracking an object s current position, on the other hand. For carity, we refer to the word as (rea-time) position tracking [11]. This paper addresses the motion trajectory matching probem. Trajectory based motion recognition is one of the most important objectives in motion characterization. The recognition mode, accuracy and efficiency are the three key factors reated to the configurations of trajectory representation and recognition engine. ecognition modes can be categorized according to the initiaization modes. Motion trajectory is a compact and robust cue for motion characterization and it has been extensivey studied for describing actions, behaviors and activities in different appications. No matter for simpe actions, median behaviors or compex activities, the consequent motions can be characterized by identifying the invoved subjects (human body, head, hands, or feet) and extracting the underying motion trajectories [1]. That is, motion can be anayzed spatio-temporay by the joint description of spatiay parae and/or temporay sequentia motion trajectory compositions. Motion trajectories are invoved in many different situations where various requirements on motion characterization exist [20]. The basis to account for the different requirements ies in a fexibe trajectory description. aw trajectory data can be used directy. However, such a simpe way of using the raw data is quite infexibe because it reies much on the absoute positions of the data points. Instead, buiding trajectory representations using some intrinsic properties woud be a better way to capture the shape features of a trajectory and to avoid suffering from the constraints of absoute Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 102

2 A 3D Motion Trajectory Signature Identification for Human-Computer Interaction (HCI) Appications coordinates. Furthermore, deveoping dynamic and adjustabe trajectory representation structures (for exampe, changeabe in size) can benefit the adaptabiity of trajectory descriptions. Trajectory tracking has many appications in our ife ike, hand tracking, eye tracking, trajectory tracking of wheeed mobie appication, motion tracking, etc. Motion trajectories can be extracted by visua tracking from the motions of humans, robots or other moving objects. It might be a singe trajectory tracked from an individua tracking point of interest, or a set of mutipe, interreated, concurrent trajectories extracted from a compicated motion. In fact, a arge body of work about motion tracking can be found in the iterature [1]. This research work just reasonaby assumes that the motion trajectories have been extracted from motions. This paper is organized as foows. Section two represents the background and reated concepts; section three represents the reated word; section four iustrates the proposed mode; section five demonstrates the Excrementa resuts; finay section six gives concusion. 2. BACKGOUND AND ELATED CONCEPTS This section provides the main reated concepts and key terms Signature-Based Trajectory Description For a free form 3-D motion trajectory Γ (t) is parameterized by: [20] Γ (t) = {X (t), Y (t), Z (t) t [1, N]} Where, t is tempora index and N is trajectory ength. Its 3-D Eucidean signature S is defined in terms of differentia invariants: curvature (κ), torsion (τ) and the first order derivatives with respect to Eucidean arc-ength s (κs = dκ/ds and τs = dτ/ds), in the foowing form, [20] S= {[κ (t), τ (t), κ s (t), τ s (t)] t [1,N]} (1) In practice, an approximate signature S* was numericay impemented in terms of the joint Eucidean invariants (the inter-point Eucidean distances) [20]. This not ony enhances the signature s robustness by avoiding cacuating the noise sensitive high order derivatives in the accurate signature, but aso eiminates the requirement to the differentiabiity of the signature components. As the joint invariants are oca features, the signature admits the computationa ocaity that is the basis to deduce substantia descriptive invariants, and that makes the signature insensitive to occusion. From the above definition, it is observed that the signature is based on the features extracted from a the samped trajectory points. Hence it is a compete description to the entire raw trajectory data, which is abe to capture and preserve most motion features. Thus the fitting inaccuracy is not a probem for the signature descriptor [12]. To ensure the existence of the signature mathematicay, it is assumed that the trajectory denoted by Γ (t) is reguar, say, for a t, Γ (t) = 0. For the representation of irreguar trajectories, the stationary points wi be firsty detected by examining the condition of Γ ( t) = 0 and then the trajectory is reguated to be reguar by removing the stationary points. Due to continuous tracking, this means eaving one and removing the extra points among a set of consecutivey samped points that admit stationary points. Accordingy, it is abe to generate a singe signature for the reguated trajectory. Meanwhie, the positions and ength of the removed stationary points are saved for the ater use for trajectory reconstruction [20] Motion Trajectory Signature Signature (trajectory) has two eves. Whie the first eve is the fu description to the entire raw trajectory data, the second eve is the condensed description of the first eve signature data [8]. First Leve: Eucidean differentia invariants features are empoyed to buid a oose trajectory signature. As differentia invariants are typica oca features, they are not ony capabe of characterizing trajectory shapes, but aso can offer richer invariants in trajectory representation with respect to rigid, metric and viewpoint change and insensitivity to occusion. Focusing on the detaied motion features captured by the first-eve signature, motion perception to different trajectory instances can be achieved readiy via the visuaization of the noninear inter-trajectory warping paths. The first-eve signature is particuary appropriate for sma scae appication concerning both trajectory recognition and motion perception [8]. Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 103

3 N. F. Attia et a. Second Leve: Second eve is motivated by reducing the redundancy data in the first-eve signature to obtain a compact signature description towards faster trajectory recognition. Appying PCA transform to the first-eve signature, we get the second-eve signature with ess data but preserving most variance of the trajectory features. Further, based on the Gaussian Mixture modeing to the second-eve signature, a Bayesian cassifier is deveoped to repace the time-consuming matching agorithm. These resorts can speed much up the recognition especiay for arger scae database [8]. 3. ELATED WOK Human-Computer Interaction (HCI) is becoming more significant in the ife. With the progress of computer science, the existing physica devices currenty used in the interaction (e.g. keyboard, mouse,) are not satisfying human needs nowadays. Many designers attempt to improve the usabiity and make the interaction more natura and easier. They introduced the technique of Human-to-Human Interaction (HHI) into the domain of HCI to reach this purpose [10]. In this context, using hand gestures is among the richest HHI domain since everyone uses mainy hand gestures to expain ideas when he communicates with others [6]. Communication with hand gestures becomes important and much cearer with the consideration of sign anguage. Sign anguage (SL) is the natura way of communication among deaf persons. As etters and words in natura anguages, we find the corresponding eements on sign anguages, which are the movements, gestures, postures and facia expressions. Many researchers expoited hand gestures in other appication fieds such as hand tracking [2] and interactive computer graphics [3]. Simiary, severa studies have focused on automatic sign anguage recognition so as to faciitate communication between hearing and deaf persons and to improve HCI usabiity [1] [2]. Severa works in the domain of automatic sign anguage recognition have been interested in the manua information such as the trajectories of both hands. In order to recognize human gestures by motion information, many methods based on trajectories and motions have been proposed to anayze these gestures [4]. Bobick and Wison adopted a state-based method for gestures recognizing [5]. They used a number of sampes, for each gesture, to cacuate its main curve. Each gesture sampe point was mapped to the ength of arc at curve. Afterword, they approximated the discretized curve using a uniform ength in segments. They grouped the ine segments into custers, and to match the previousy earning state of sequences and the current input state, they used the agorithm of Dynamic Time Warping. For continuous ASL (American Sign Language recognition), Haynes and Jain (2010) used a viewbased approach [9]. A anguage recognition appication has been deveoped based on 3D continuous sign [14]. They used the Longest Common Subsequence method for sign anguage recognition instead of HMM (Hidden Markov Mode), which is a costy doube stochastic process. A research on automatic recognition of sign anguage mainy focused on the domain of the dependent signer. A itte work has been devoted to independent signer [10][13]. The sign anguage recognition systems based on independent signer have a promising trend in practica systems that can recognize a different signers SL. But the probem of the recognition of signer independent is hard to resove regarding the great obstace from different sign variations. 4. POPOSED MODEL Figure1 shows the proposed mode. It has different phases incuding pre-processing, buid component tree, arrange extrema regions, refining the seection and the ast phase is recognition. This paper is uses the MSE for feature extraction with the first eve of the signature with the advantage of using K-NN search with motion trajectory in recognition. Fig1. Functiona bock diagram of the proposed mode Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 104

4 A 3D Motion Trajectory Signature Identification for Human-Computer Interaction (HCI) Appications 4.1. aw Motion Trajectory A arger trajectory dataset of UCI KDD high quaity ASL is used to test the signature s retrieva performance especiay the improvement in efficiency benefitted from the second-eve signature [18]. The ASL trajectory dataset consists of 95 sign casses, and 27 sampes were captured for each sign. Figure 2 iustrates some trajectories from the dataset Pre-Processing Fig2. Sign sampes of some words The raw motion trajectory is used to convert raw matrix to matrix contains vaues in range from (0 to 1), then dea with this numbers as from 0.0 (back) to 1.0 (fu intensity or white) Buid Component Tree It is the first phase in MSE. MSE a method for a bob detection in images[14][15], bob detection methods are aimed at detecting regions in a digita image that differ in properties, such as brightness or coour, compared to surrounding regions. Informay, a bob is a region of an image in which some properties are constant or approximatey constant; a the points in a bob can be considered in some sense to be simiar to each other. A method for a bob detection in images [14] [15]. Bob detection methods are aimed at detecting regions in a digita image that differ in properties, such as brightness or coour, compared to surrounding regions. Informay, a bob is a region of an image in which some properties are constant or approximatey constant; a the points in a bob can be considered in some sense to be simiar to each other. This method of extracting a comprehensive number of corresponding image eements contributes to the wide-baseine matching, and it has ed to better stereo matching and object recognition agorithms MSE is a feature detector; Like the SIFT detector, the MSE agorithm extracts from an image I a number of co-variant regions, caed MSEs. An MSE is a stabe connected component of some eve sets of the image I. optionay; eiptica frames are attached to the MSEs by fitting eipses to the regions; for a more in-depth expanation of the MSE detector. A stabe region has a sma variation. The agorithm finds regions which are "maximay stabe", meaning that they have a ower variation than the regions one eve beow or above. Note that due to the discrete nature of the image, the region beow or above may be coincident with the actua region, in which case the region is sti deemed maxima. In genera, an extrema region is a set of pixes connected by their 4-neighbors that satisfy the property that a of their intensities are uniformy greater or ess than the intensities of every pixe that surrounds the region. An extrema region is maximay stabe if given intensity i and a margin, the change in the number of pixes in the region from i to i + is a oca minimum. A arge vaue for wi generate ony a few highy stabe regions, whie a smaer vaue wi detect many ess-stabe regions. The advantage of a sma deta vaue is that more regions wi be detected which aows more invariant information to be extracted from an image [16]. Component tree is a representation of a gray-eve image that contains information about each image component and the inks that exist between components at sequentia gray-eves in the image, a pixes are arranged by their intensity and neighborhood reationship. Every chid tree is corresponding to a region, and the root of the chid tree is the index of the pixe that has the biggest vaue in the region. Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 105

5 N. F. Attia et a Arrange the Extrema egions It the second stage in MSE. Extrema regions are the nodes whose parent nodes have a bigger vaue. Arrange the extrema regions in a tree of nested regions, as shown in Figure 3. Connecting two regions _ and _+1, if and ony if B,...,, (2),..., min 1 max Fig3. Extrema regions are arranged in a tree of nested regions [19],, the stabiity score is: [19] 1 B,..., v Seect the maximay stabe region in the branch minima stabiity score is (3), 1, which has a oca B,..., If v < v 1 ( If v > v 1 ( Otherwise, do nothing 1 ), mark ), mark 4.5. efining the Seection as unstabe as unstabe It is the ast stage in Maximay Stabe Extrema egion (MSE).In this stage we finaize the Maximay Stabe Extrema egion agorithm by: emove very sma and very big regions emove regions which have too high area variation emove dupicated regions 4.6. ecognition In the this phase K-NN cassifier is used to find the distance between the regions orientation, the most cose signs gives us ower distance than others, the next tabes shows some orientation distances to show the accuracy of the proposed mode. The k-nearest Neighbours agorithm is a non-parametric method used for cassification and regression. In both cases, the input consists of the k cosest training exampes in the feature space. The output depends on whether k-nn is used for cassification or regression. In k-nn cassification, the output is a cass membership. An object is cassified by a majority vote of its neighbors, with the object being assigned to the cass most common among its k nearest neighbors (k is a positive integer, typicay sma). If k = 1, then the object is simpy assigned to the cass of that singe nearest neighbour. In k-nn regression, the output is the property vaue for the object. This vaue is the average of the vaues of its k nearest neighbours [7]. KNN for cassification, in this case, we are given some data points for training and aso a new unabeed data for testing. Our aim is to find the cass abe for the new point. The agorithm has different behavior based on k, for exampe: k = 1, this is the simpest scenario. Let x be the point to be abeed. Find the point cosest to x. Let it be y. Now nearest neighbor rue asks to assign the abe to x. This seems too simpistic and sometimes even counter intuitive. 5. EXPEIMENTAL WOK A arger trajectory dataset of UCI KDD high quaity ASL [18] is used to test the trajectory recognition performance in terms of two important measurements: accuracy and efficiency. The ASL trajectory Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 106

6 A 3D Motion Trajectory Signature Identification for Human-Computer Interaction (HCI) Appications dataset consists of 95 sign casses (words), and 27 sampes were captured for each sign. We used haf the sampes for training and the other haf for testing. Severa casses of sampes were randomy seected and recognized in our proposed method. Moreover, different resuts from the scheme have been compared with resuts of other agorithms in [8] [20]. Probem Find the most stabe region from motion trajectory. Soution Motion trajectory are set of positions ((x1,y1,z1),(x2,y2,z3),..(xn,yn,zn)). Convert the matrix of ocation to gray scae matrix, smaest refect back pixes, argest refect white pixes. Then represent the gray scae matrix as a gray scae image as shown in Figure 4 and compute a previous steps showed in 4.3, 4.4 and 4.5 to extract the MSE region from the motion trajectory. (a) Sign sampe of a aive word (b) Aive word as an intensity image Fig4. Sign sampe with its corresponding intensities eves 5.1. Test and Vaidation We appy some cases as a sma exampe beong to sma database to meet our used experiment, in this exampe the database contains a sign sampes from two casses (aive, answer) for exampe, each cass contain 3 signs Case One The test sign is from one of these sampes from the database to check vaidation using the word aive, sign number three. Tabe1. Distances between Train Words and Test Word for Case One Cass one (Answer ) Cass two (Aive) answer-1 & aive-3 & aive-3 answer-3 & aive-3 Aive-1 & aive-3 Aive-2 & aive-3 Aive-3 & aive Fig5. The distance between train sampe casses and a test cass sampe that describe Tabe 1 Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 107

7 N. F. Attia et a Case Two The test sign is from one of these sampes from the database to aso check vaidation using the word answer sign number two. Tabe2. Distances between Train Words and Test Word for Case Two Cass one (Answer ) Cass two (Aive) answer-1 & & answer-3 & Aive-1 & Aive-2& Aive-3& Fig6. The distance between train sampe casses and a test cass sampe that describe Tabe Case Three The test sign is a sign beongs to the casses but not in the database to check verification, the test sign is beongs to cass two. Tabe3. Distances between Train Words and Test Word for Case Three Cass one (Answer ) Cass two (Aive) answer-1 & aive & aive answer-3 & aive Aive-1 & aive Aive-2& aive Aive-3& aive Fig7. The distance between train sampe casses and a test cass sampe that describe Tabe 3, the recognized cass is cass number two, and speciay is recognized to aive-1cass Case Four The test sign is a sign not beongs to any cass in the database to check verification, the test sign is beongs to cass (word) eat. Tabe4. Distances between Train Words and Test Word for Case Four Cass one (Answer ) Cass two (Aive) answer-1 & eat & eat answer-3 & eat Aive-1 & eat Aive-2& eat Aive-3& eat Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 108

8 A 3D Motion Trajectory Signature Identification for Human-Computer Interaction (HCI) Appications The output of the previous case is that cass is not recognized to any cass becouse it doesnot match our verification test.the proposed mode achive 100 % for vaidation and it has a high accuracy with respect to agorithm in [8][20] that shown in Tabe 5, and it has a higher efficiency (in terms of query time), as the casses number increases, the efficiency decreases much sower as shown in Tabe 6.The proposed mode behaves generay better on both accuracy and efficiency with respect to previous agorithms in [8][20]. Tabe5. Average atio of Correct ecognition Cass No Proposed mode 97% 95% 92% The second-eve signature[8] 92.38% 86.17% 78.66% Fu signature based GMM and Bayesian recognition[21] 92.73% 88.58% 83.02% Fu signature and DTW matching [21] 90.03% 87.52% 91.19% Tabe6. ecognition Efficiency Comparison (Units MS/Query) Cass No Proposed mode The second eve signature [ 8 ] Fu signature based GMM and Bayesian recognition[20] Fu signature and DTW matching [20] CONCLUSION This paper presented a new method for 3D motion trajectory that integrates the maximay stabiity extrema regions (MSE) feature extraction of first eve transformed for main descriptors with K- nearest neighbour cassifier. The proposed mode achieves efficient and high recognition accuracy compared with previous agorithms. EFEENCES [1] Voger, C.P.: American Sign Language recognition reducing the compexity of the task with phoneme-based modeing and parae hidden markov modes. PhD thesis, University of Pennsyvania, Phiadephia, PA, USA. Supervisor-Dimitris N. Metaxas, [2] Lefebvre-Abaret, F., Automatic processing of videos FSL: Modeing and operating phonoogica constraints of movement PhD thesis, University of Tououse III - Pau Sabatier, [3] Freeman, W.T., Anderson, D., Beardsey, P., Dodge, C., Kage, H., Kyuma, K., Miyake, Y. Computer vision for interactive computer graphics, in Proc. IEEE Computer Graphics and Appications, May-June, 1998, pp [4] Johansson, G. A Visua Perception of Bioogica Motion and a Mode for Its Anaysis, Perception and Psychophysics, vo. 73, no. 2, 1973, pp [5] Bobick, A.F., Wison, A.D. A State-Based Approach to the epresentation and ecognition of Gesture, in ptoc. IEEE Trans. Pattern Anaysis and Machine Inteigence, Dec. 1997, vo. 19, no. 12, pp [6] Voger, C., Metaxas, D. A ASL ecognition Based on a Couping between HMMs and 3D Motion Anaysis, in Proc. Sixth IEEE Int Conf. Computer Vision, 1998,pp [7] Sitong Liu, Jianhua Feng, Yongwei Wu, egion-aware Top-k Simiarity Search, Lecture Notes in Computer Science Berin, Germany: Springer Voume 9098, 2015, pp [8] Shandong Wu, Y. F. Li and Jianwei Zhang, A Hierarchica Motion Trajectory Signature Descriptor, in Proc. IEEE Internationa Conference on obotics and Automation, 2008, pp [9] Haynes, S., Jain,., A Detection of Moving Edges, Computer Vision, Graphics, and Image Understanding, vo. 21, no. 3, pp , 1980 [10] Maher Jebai, Patrice Dae, Mohamed Jemni, Extension of hidden markov mode for recognizing arge vocabuary of sign anguage, Internationa Journa of Artificia Inteigence & Appications, Vo. 4 Issue 2, p35, Mar2013. Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 109

9 N. F. Attia et a. [11] aph Lange, Frank D urr, Kurt otherme, Efficient ea-time Trajectory Tracking, VLDB Journa, Vo.20,pp , [12] S. D. Wu, Y. F. Li and J. W. Zhang, Signature descriptor for free form trajectory modeing, in Proc. IEEE Internationa Conference on Integration Technoogy, Shenzhen, China, 2007, pp [13] Liang,.H., Ming, O. A Sign Language ecognition System Using Hidden Markov Mode and Context Sensitive Search, in Proc. of ACM Symposium on Virtua eaity Software and Technoogy, 1996, pp [14] Jabaah, K., Jemni,M., Toward Automatic Sign Language ecognition fromweb3d Based Scenes, ICCHP, Lecture Notes in Computer Science Berin, Germany: Springer,vo.6190, Juy [15] Zaman Khan,., Adnan Ibraheem, N., Hand Gesture ecognition: A Literature eview, Internationa Journa of Artificia Inteigence & Appications (IJAIA), Vo.3, No.4,pp , Juy [16] J. Matas, O. Chum, M. Urban, and T. Pajda. obust wide baseine stereo from maximay stabe extrema regions, In 13th BMVC, September 2002, pages [17] azvan Soea, Urbano Nunes, Trajectory Panning and Siding-Mode Contro Based Trajectory-Tracking for Cybercars, Integrated Computer-aided Engineering, Int. Journa, IOS Press, vo.14, n.1, pp.33-47, [18] UCI KDD ASL Archive, [Onine], Avaiabe: htm. Last accessed on 29/6/2015. [19] Marc O Maey Hussein A Hadad, Automatic egistration of Large Images from Light Microscopy, M.E. thesis, Lund University Facuty of Engineering. [20] Shandong Wu and Y.F. Li, "Fexibe Signature Descriptions for Adaptive Motion Trajectory epresentation, Perception and ecognition," Pattern ecognition, vo. 42, no. 1, pp , Jan AUTHOS BIOGAPHY Neha Fathi is a teaching assistant in the department of Computer Engineering, Pharos University, Aexandria. Egypt. She received her B.Sc. degree in Computer Engineering from Arab Academy for Science and Technoogy in Sherin M. Youssef, Professor, head of computer Engineering Department. She obtained her Ph.D., Mphi from University of Nottingham, UK (2004) in the fied of Inteigent Systems, and M.Sc. from University of Aexandria (1996) in Machine Learning & Pattern Anaysis. Her research interest ies in the fied of signa processing, video/image processing, image coding, inteigent systems, signa compression, Biomedica Engineering, Biometrics, QoS inteigent networks, Machine earning, Genetic agorithms, Neuro-based systems, Swarm Inteigence, and Mutimedia systems. Saeh Mesbah Ekaffas, Associate Professor at the Dept. of IS, Coege of Computing & IT, Arab Academy for Science, Technoogy & Maritime Transport (AASTMT). He is currenty the director of the emote Sensing & Spatia Studies Unit, AASTMT. He received his B.Sc. in Eectronics & Teecommunications Engineering, M.Sc. and Ph.D. from Aexandria Univ. His research interests incude digita image processing, sateite remote sensing, geographic information systems (GIS) and environmenta studies. Internationa Journa of esearch Studies in Science, Engineering and Technoogy [IJSSET] 110

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

MICROSOFT DYNAMICS CRM

MICROSOFT DYNAMICS CRM biztech TM MICROSOFT DYNAMICS CRM Experienced professionas, proven toos and methodoogies, tempates, acceerators and vertica specific soutions maximizing the vaue of your Customer Reationships Competency

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

ONE of the most challenging problems addressed by the

ONE of the most challenging problems addressed by the IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,

More information

Oracle Project Financial Planning. User's Guide Release 11.1.2.2

Oracle Project Financial Planning. User's Guide Release 11.1.2.2 Orace Project Financia Panning User's Guide Reease 11.1.2.2 Project Financia Panning User's Guide, 11.1.2.2 Copyright 2012, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

We focus on systems composed of entities operating with autonomous control, such

We focus on systems composed of entities operating with autonomous control, such Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Serving the Millennial Generation - The Challenge and Opportunity for Financial Services Companies

Serving the Millennial Generation - The Challenge and Opportunity for Financial Services Companies Serving the Miennia Generation - The Chaenge and Opportunity for Financia Services Companies May 2015 Christopher J. Perry, CFA Equity Research Anayst Today, the Miennia Generation (or Generation Y), broady

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Sage Accounts Production Range

Sage Accounts Production Range Sage Accounts Production Range The abiity to dri-down from the face of the accounts makes reviewing accounts so easy. Sage Accounts Production Software As individua as you and your cients Jim O Leary,

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES

ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES ADVANCED ACCOUNTING SOFTWARE FOR GROWING BUSINESSES Product Features 1. System 2. Saes Ledger Unimited companies with password protection User security Muti-user system: 1 user comes as standard, up to

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

The Web Insider... The Best Tool for Building a Web Site *

The Web Insider... The Best Tool for Building a Web Site * The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

1B11 Operating Systems. Input/Output and Devices

1B11 Operating Systems. Input/Output and Devices University Coege London 1B11 Operating Systems Input/Output and s Prof. Steve R Wibur s.wibur@cs.uc.ac.uk Lecture Objectives How do the bits of the I/O story fit together? What is a device driver? 1B11-5

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Teach yourself Android application development - Part I: Creating Android products

Teach yourself Android application development - Part I: Creating Android products Teach yoursef Android appication deveopment - Part I: Creating Android products Page 1 of 7 Part of the EE Times Network A Artices Products Course TechPaper Webinars Login Register Wecome, Guest HOME DESIGN

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

EFFICIENT CLUSTERING OF VERY LARGE DOCUMENT COLLECTIONS

EFFICIENT CLUSTERING OF VERY LARGE DOCUMENT COLLECTIONS Chapter 1 EFFICIENT CLUSTERING OF VERY LARGE DOCUMENT COLLECTIONS Inderjit S. Dhion, James Fan and Yuqiang Guan Abstract An invauabe portion of scientific data occurs naturay in text form. Given a arge

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

University of Southern California

University of Southern California Master of Science in Financia Engineering Viterbi Schoo of Engineering University of Southern Caifornia Dia 1-866-469-3239 (Meeting number 924 898 113) to hear the audio portion, or isten through your

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301 US 20060288075A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2006/0288075 A1 Wu (43) Pub. Date: Dec. 21, 2006 (54) ELECTRONIC MAILBOX ADDRESS BOOK MANAGEMENT SYSTEM AND METHOD

More information

Industry guidance document Checkout workstations in retail - safe design and work practices

Industry guidance document Checkout workstations in retail - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices WorkSafe Contents Foreword...

More information

(12) United States Patent Rune

(12) United States Patent Rune (12) United States Patent Rune US006304913B1 (10) Patent N0.: (45) Date of Patent: US 6,304,913 B1 on. 16, 2001 (54) INTERNET SYSTEM AND METHOD FOR SELECTING A CLOSEST SERVER FROM A PLURALITY OF ALTERNATIVE

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey

Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey Distribution of Income Sources of Recent Retirees: Findings From the New Beneficiary Survey by Linda Drazga Maxfied and Virginia P. Rena* Using data from the New Beneficiary Survey, this artice examines

More information

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Niagara Catholic. District School Board. High Performance. Support Program. Academic

Niagara Catholic. District School Board. High Performance. Support Program. Academic Niagara Cathoic District Schoo Board High Performance Academic Support Program The Niagara Cathoic District Schoo Board, through the charisms of faith, socia justice, support and eadership, nurtures an

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere mi-rm mi-recruitme Manager the recruitme soution for Tae Managers everywhere mi-rm mi-recruitme Manager Your very own tae manager First Choice Software has been a eading suppier of recruitme software since

More information

CUSTOM. Putting Your Benefits to Work. COMMUNICATIONS. Employee Communications Benefits Administration Benefits Outsourcing

CUSTOM. Putting Your Benefits to Work. COMMUNICATIONS. Employee Communications Benefits Administration Benefits Outsourcing CUSTOM COMMUNICATIONS Putting Your Benefits to Work. Empoyee Communications Benefits Administration Benefits Outsourcing Recruiting and retaining top taent is a major chaenge facing HR departments today.

More information

Packet Classification with Network Traffic Statistics

Packet Classification with Network Traffic Statistics Packet Cassification with Network Traffic Statistics Yaxuan Qi and Jun Li Research Institute of Information Technoogy (RIIT), Tsinghua Uniersity Beijing, China, 100084 Abstract-- Packet cassification on

More information

Efficient and Effective Clustering Methods for Spatial Data Mining

Efficient and Effective Clustering Methods for Spatial Data Mining Efficient and Effective Custering Methods for Spatia Data Mining Raymond T. Ng Department of Computer Science University of British Coumbia Vancouver, B.C., V6T 124, Canada rng@cs.ubc.ca Jiawei Han Schoo

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

l l ll l l Exploding the Myths about DETC Accreditation A Primer for Students

l l ll l l Exploding the Myths about DETC Accreditation A Primer for Students Expoding the Myths about DETC Accreditation A Primer for Students Distance Education and Training Counci Expoding the Myths about DETC Accreditation: A Primer for Students Prospective distance education

More information

Overview of Health and Safety in China

Overview of Health and Safety in China Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Automatic Structure Discovery for Large Source Code

Automatic Structure Discovery for Large Source Code Automatic Structure Discovery for Large Source Code By Sarge Rogatch Master Thesis Universiteit van Amsterdam, Artificia Inteigence, 2010 Automatic Structure Discovery for Large Source Code Page 1 of 130

More information

Management Accounting

Management Accounting Management Accounting Course Text Professiona, Practica, Proven www.accountingtechniciansireand.ie Tabe of Contents FOREWORD...v SYLLABUS: MANAGEMENT ACCOUNTING...vii PART 1 INTRODUCTION Chapter 1: Introduction

More information

Infrastructure for Business

Infrastructure for Business Infrastructure for Business The IoD Member Broadband Survey Infrastructure for Business 2013 #5 The IoD Member Broadband Survey The IoD Member Broadband Survey Written by: Corin Tayor, Senior Economic

More information

Income Protection Options

Income Protection Options Income Protection Options Poicy Conditions Introduction These poicy conditions are written confirmation of your contract with Aviva Life & Pensions UK Limited. It is important that you read them carefuy

More information

We are XMA and Viglen.

We are XMA and Viglen. alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow

More information

STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA

STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA STRUCTURING WAYFINDING TASKS WITH IMAGE SCHEMATA By Martin M. Rauba A THESIS Submitted in Partia Fufiment of the Requirements for the Degree of Master of Science (in Spatia Information Science and Engineering)

More information

Welcome to Colonial Voluntary Benefits. Thank you for your interest in our Universal Life with the Accelerated Death Benefit for Long Term Care Rider.

Welcome to Colonial Voluntary Benefits. Thank you for your interest in our Universal Life with the Accelerated Death Benefit for Long Term Care Rider. Heo, Wecome to Coonia Vountary Benefits. Thank you for your interest in our Universa Life with the Acceerated Death Benefit for Long Term Care Rider. For detai pease ca 877-685-2656. Pease eave your name,

More information

Fast Image Acquisition in Pulse-Echo Ultrasound Imaging Using Compressed Sensing

Fast Image Acquisition in Pulse-Echo Ultrasound Imaging Using Compressed Sensing Fast Image Acquisition in Puse-Echo Utrasound Imaging Using Compressed Sensing Martin F. Schiffner and Georg Schmitz Chair of Medica Engineering, Ruhr-Universität Bochum, D-4481 Bochum, Germany Copyright

More information

SPOTLIGHT. A year of transformation

SPOTLIGHT. A year of transformation WINTER ISSUE 2014 2015 SPOTLIGHT Wecome to the winter issue of Oasis Spotight. These newsetters are designed to keep you upto-date with news about the Oasis community. This quartery issue features an artice

More information

PENALTY TAXES ON CORPORATE ACCUMULATIONS

PENALTY TAXES ON CORPORATE ACCUMULATIONS H Chapter Six H PENALTY TAXES ON CORPORATE ACCUMULATIONS INTRODUCTION AND STUDY OBJECTIVES The accumuated earnings tax and the persona hoding company tax are penaty taxes designed to prevent taxpayers

More information

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction Spatio-Tempora Asynchronous Co-Occurrence Pattern for Big Cimate Data towards Long-Lead Food Prediction Chung-Hsien Yu, Dong Luo, Wei Ding, Joseph Cohen, David Sma and Shafiqu Isam Department of Computer

More information

Enabling Direct Interest-Aware Audience Selection

Enabling Direct Interest-Aware Audience Selection Enabing Direct Interest-Aware Audience Seection ABSTRACT Arie Fuxman Microsoft Research Mountain View, CA arief@microsoft.com Zhenhui Li University of Iinois Urbana-Champaign, Iinois zi28@uiuc.edu Advertisers

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

Program Comprehension During Software Maintenance and Evolution

Program Comprehension During Software Maintenance and Evolution Program Comprehension During Software Maintenance and Evoution Armeiese von Mayrhauser A. Marie Vans Coorado State University Code cognition modes examine how programmers understand program code. The authors

More information

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1 IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan

More information

Sentiment Analysis with Global Topics and Local Dependency

Sentiment Analysis with Global Topics and Local Dependency Proceedings of the Tenty-Fourth AAAI Conference on Artificia Inteigence (AAAI-10) Sentiment Anaysis ith Goba Topics and Loca Dependency Fangtao Li, Minie Huang, Xiaoyan Zhu State Key Laboratory of Inteigent

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT The Productive Therapist and The Productive Cinic Peter R. Kovacek, MSA, PT Format Interactive Discussions among equa peers Constructive argument Reaity Oriented Mutua Accountabiity Expectation Panning

More information

ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS

ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS ST. MARKS CONFERENCE FACILITY MARKET ANALYSIS Prepared by: Lambert Advisory, LLC Submitted to: St. Marks Waterfronts Forida Partnership St. Marks Conference Center Contents Executive Summary... 1 Section

More information

Capability Development Grant. Build business capabilities to sharpen your competitive edge

Capability Development Grant. Build business capabilities to sharpen your competitive edge Capabiity Deveopment Grant Buid business capabiities to sharpen your competitive edge 1 Buid up your business with the Capabiity Deveopment Grant The Capabiity Deveopment Grant (CDG) is a financia assistance

More information

Key Features of Life Insurance

Key Features of Life Insurance Key Features of Life Insurance Life Insurance Key Features The Financia Conduct Authority is a financia services reguator. It requires us, Aviva, to give you this important information to hep you to decide

More information

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method , pp. 129-270 http://dx.doi.org/10.14257/ijsia.2015.9.4.24 ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science,

More information