Online Medical Symbol Recognition Using a Tablet PC
|
|
|
- Eleanore Cameron
- 10 years ago
- Views:
Transcription
1 Online Medical Symbol Recognition Using a Tablet PC Amlan Kundu, Qian Hu, Stanley Boykin, Cheryl Clark, Randy Fish, Stephen Jones and Stephen Moore MITRE Corporation 202 Burlington Road Bedford, MA Abstract In this paper we describe a scheme to enhance the usability of Tablet PC handwriting recognition systems by creating a software module for recognizing symbols that are not a part of the Tablet PC symbol library. The goal of this work is to make handwriting recognition more useful for medical professionals accustomed to using medical symbols in medical records. To demonstrate that this new symbol recognition module is robust and expandable, we report results on both a medical symbol set and an expanded symbol test set which includes selected mathematical symbols. I. Introduction A Tablet PC allows users to input data with a digital pen as well as via standard keyboard, mouse, or speech. Tablet PCs have special screens that use an active digitizer to enable users to write directly on the screen to control their PCs and to input information such as handwriting or a drawing. This process, called inking, enables users to add "digital ink" which appears as natural-looking handwriting on the screen. The digitized handwriting can be converted to standard text through handwriting recognition, or it can remain as handwritten text. When the input interface is easy and intuitive, handwriting can be a more natural and convenient input method for data entry into applications. When a doctor is standing beside an exam table and moving from room to room, manipulating a keyboard can be quite cumbersome. Thus, inking makes EMR (electronic medical record) creation more natural and convenient for medical professionals than typing on a keyboard. Inking also allows users to insert a sketch or drawing, take free-hand notes, and annotate an existing document such as an X-ray. Consequently, using a pen to input information into the Tablet PC can be a more natural and productive way to work in many situations, and is often quicker and easier than using a keyboard. On Tablet PCs, a digitizer overlaid on the LCD screen creates an electromagnetic field. When the pen comes in contact with the screen s electromagnetic field, its motion is reflected on the screen as a series of data points. As the pen continues to move across the screen, the digitizer
2 collects information from the pen movement in a process called "sampling." The Tablet PC digitizer is capable of sampling 130 "pen events" (units of motion that correspond to data points) per second [11]. These electromagnetic pen events are then represented visually on the screen as pen strokes. Because of its high sampling rate, the Tablet PC is able to create the effect of "realtime inking;" that is, as the user writes on the LCD screen, digital ink appears to flow from the moving pen. The high sampling rate also enables written ink to be displayed and stored with very high graphical resolution. Not only is this important for visual legibility on the screen, it is necessary for maximizing accuracy during the process of handwriting recognition. Despite its versatility, the Tablet PC recognition engine does not recognize some common medical symbols, which limits its usability for medical records applications. While symbols composed of standard keyboard characters such as mg% (milligrams per 100ml) can be added to the default dictionary, others such as (male) remain unavailable since the addition of nonstandard keyboard characters is not supported by the dictionary expansion utility. This paper describes our research effort to recognize a set of 15 of these handwritten medical symbols (Table 1) allowing their use by medical professionals using a Tablet PC. To demonstrate that the symbol recognition module is robust and expandable, we have also included 20 mathematical symbols for an expanded set with which to test our symbol recognition algorithm. The primary contribution of the work described in this paper is that it deals with online medical symbol recognition in an application which includes both symbols and non-symbols. This combination of medical, on-line and symbol/non-symbol has not been addressed by previous work in the field of handwritten symbol recognition (HSR). While most of the papers related to HSR deal with offline HSR, online HSR, online mathematical symbol recognition in particular, is drawing increased attention [20]. In [21], online mathematical symbol recognition is addressed using a multi-classifier approach. In [22], online chemical symbol recognition is addressed using hidden Markov model based classifiers. In [23], online music symbol recognition is addressed using a complex scheme that recognizes individual strokes of the handwritten music symbol and uses that information for the final recognition. As has been noted, in this study we address online medical symbol recognition. However, our recognition approach does not deal with the handwritten medical symbol in isolation. In our work, handwritten medical symbols need to first be identified and separated from non-symbols as the writer writes. Only after a symbol is identified as a symbol is the final classification performed. Thus, the problem is one of identifying and classifying symbols embedded in a stream of non-symbols. This significantly increases the complexity of the problem. We begin in Section II with a description of our approach to interface with a standard Tablet PC handwriting application and our handwriting symbol classification system. In Section III we describe the development of our test corpus and present experimental results. In Section IV we provide a description of a research prototype which integrates the medical/mathematical symbol recognition module described here with a Tablet PC as well as our plans for tighter integration with the Tablet PC s handwritten recognition engine. Finally, Section V presents our conclusions and future plans. II. Handwritten Symbol Recognition System
3 Our handwritten symbol recognition system consists of three stages, 1 - Data Collection and Feature Extraction, 2 - Symbol Identification and 3 - Symbol Classification. This system augments the existing Tablet PC handwritten recognition system without requiring any changes to the existing system. The description of our Handwritten Symbol Recognition system in this section includes our approach to accessing information from the existing Tablet PC. A. Data collection and Feature Extraction The first step in symbol classification is the conversion of a handwritten bit mapped symbol image into the features used for classification. The classifier described in this paper uses 35 features extracted from a binary bit mapped image. The basis of our feature set are 30 features which have been successfully used in many handwriting applications [4,5]. These include three moment features that capture global shape information and 27 geometric and topological features including the number of loops, an X-joint feature, horizontal and vertical zero crossing features, a T-joint feature, the number of end points in upper, middle and lower zones of the character image, the number of segments in upper, middle and lower zones, and pixel distribution features. Based upon our previous research with Arabic character recognition, we added five features to this standard feature set. Arabic characters share characteristics with symbols not normally found in the Roman character set such as abrupt changes in stroke direction and vertical stacking. These additional features were found to improve performance during Arabic character recognition and were included in our symbol classifier [5]. Two of these new features pertain to the character aspect ratio. The maximum vertical extent and maximum horizontal extent of the character are used to compute the normalized horizontal to vertical aspect ratio f hv and the vertical to horizontal aspect ratio f vh. Three chain code features, which assist with abrupt changes in stroke direction, were also included. For the given character image, 8-directional chain codes are computed. All chains with a length greater than a threshold are considered good chains. The feature f ch is assigned a value from 0 (no good chain) to 1 ( >3 good chains) based upon the number of good chains. The feature f rough is a chain code based roughness measure and f con captures chain code sharp turn information. While it appears that some features of this empirically selected feature set are correlated, it has been shown [5] that feature reduction techniques such as Principal Component Analysis (PCA) result in a degradation in performance. Our experiments and analysis showed that we could reduce our feature set from 35 to 28 but at a cost of a 5% reduction in performance. Since feature computation is very fast, we elected to stay with our set of 35 features. Extraction of these features requires a binary bit mapped image of the user s handwriting. Therefore our first step was the collection of bit mapped images of handwritten samples from our set of target medical symbols. While our main sample collection media was a tablet PC, we also made use of data collected using a digital pen from IOGear. The main advantage of the IOGear device was the relative simplicity (compared to the Tablet PC) of capturing a large number of images for training and testing. IOGear images, when properly captured, are quite similar to those captured with the Tablet PC as they both simulate online handwriting. We begin with a description of the feature extraction process using the Microsoft Handwriting SDK on a tablet PC.
4 Capturing an Image with a Tablet PC The Microsoft handwriting SDK converts Tablet PC writing not into a binary bit mapped image, but into a sequence of strokes defined by Beziér [8] points. A single stroke is the movement of the pen between when it touches the screen and when it is lifted. Beziér points are a compressed representation of these strokes. Given these Beziér points, Beziér functions can be used to generate a bit mapped representation of the stroke as described below. An N th order Beziér function fits a curve to N+1 Beziér points in such a way that the 2D coordinates of any point along the curve can be extracted. To find a particular point on the curve described by a 3 rd order Beziér function we use the equation: where: p = C 1 B 1 (t) + C 2 B 2 (t) + C 3 B 3 (t) + C 4 B 4 (t) p is the point in 2D space C i are the Beziér points B i are the Beziér functions described below t is the fraction of the distance along the curve (between 0 and 1) The Beziér functions calculate the weight to be given to each of the four Beziér points in determining the position of the selected point p which is a function of its distance along the curve connecting C 1 and C 4. We used the Bernstein Basis Function, 1 = t + (1 - t) as a parametric method for generating these curves. For a cubic (3rd order) curve, we cube both sides: 1 3 = (t + (1 - t)) 3 1 = t 3 + 3t 2 (1 - t) + 3t(1 - t) 2 + (1 - t) 3 While it is possible to simplify this equation further, for the purpose of this analysis we wanted to express it in terms of t and (1 - t). The cubic equation gives us the four Beziér functions: B 1 (t) = t 3 B 2 (t) = 3t 2 (1 - t) B 3 (t) = 3t(1 - t) 2 B 4 (t) = (1 - t) 3 Given a sequence of Beziér points, the first four define the first Beziér curve of the stroke to be recreated. The last Beziér point of this group and the next three Beziér points define the next (Figure 1). Since these two curves share a common point, they are connected. The Beziér point computation continues until all the points in the set are used up.
5 Figure 1: Creation of a Beziér curve based on four control points given by dots In our implementation, we used at least 100 points (p) in each Beziér curve to recreate a smooth image followed by filtering and data reduction to create offline images adequate for training and testing. Figure 2 below shows a reconstructed image from 110 Beziér points. Figure 2: A typical reconstructed image from Beziér points. The inking in Figure 2 consists of two strokes. The first stroke has 76 Beziér points, and the second has 34. Using the algorithm just described we convert the first 76 Beziér points into a stroke consisting of 25 small connected Beziér curves; each curve consisting of at least 100 points. The resulting offline image is shown in Figure 2. To capture Beziér points for training and test from a Tablet PC, the application shown in Figure 3 was developed. The interface contains a handwriting area on the left-hand side, from which the input is digitized by the Tablet PC and separated into a series of ink strokes represented by Beziér points. The Tablet PC SDK is used to retrieve the Beziér points and surface them to the application, via a text box, as a series of coordinates, where they can be collected and analyzed. Using this data collection interface, each sample of a handwritten symbol is saved in its own file.
6 Figure 3: MITRE Handwriting Capture Demo Application Capturing an Image with the IOGear Digital Pen The IOGear Mobile Digital Scribe is a device for capturing handwriting strokes while writing on normal paper. The device consists of a receiver which clips onto the paper and a ballpoint pen whose motion is tracked by the receiver. Data stored in the receiver is downloaded via a USB connection and the device software produces a full page image. No special paper is required to use the IOGear digital pen. We used IOGear to capture handwriting samples and export several pages of high-quality JPG images, which we then used for training and testing. Unlike the Tablet PC interface, a single saved page can contain multiple examples of the handwritten symbols. A segmentation algorithm was used to segment the pages into individual symbol samples for use in the training/testing of the system. Some contrast and brightness adjustments were made to convert the IOGear images from gray scale to black and white (binary) images matching the reconstructed Tablet PC image. Although IOGear images were not created using a Tablet PC stylus, there was significant similarity in the final image output as both simulate online cursive writing. Some typical sample images of medical symbols are shown in Figure 8 of Appendix-I. B. Symbol Identification Typical Tablet PC handwriting systems support multiple languages. It has been shown that performance would be dramatically degraded if all languages shared a single library and recognition engine. Therefore, each of the supported languages -- English, German, French, Korean, Japanese and Simplified and Traditional Chinese -- has its own recognition engine with
7 a bank of language-specific handwriting samples. As we have already described, the ability to add non-character symbols to the existing system s English library is not available. Based upon this and the acknowledged benefit of multiple libraries, we decided to treat our new symbol recognition as if it were a new language. Therefore, as shown in Figure 4, the first stage in our new recognizer is a binary classifier that discriminates between a symbol and a non-symbol. Henceforth, we will refer to this step as symbol identification. Figure 4: Two stage symbol classification The binary symbol/non-symbol classification problem is deceptively complex. Many nonsymbols have shape characteristics similar to those of symbols. To address this issue our feature set included features for classification that capture the following characteristics of symbols vs. non-symbols. Symbols are usually short relative to non-symbol handwriting. Vertical stacking of strokes appears in some symbols. Basic shapes of the symbols differ from the shapes of the non-symbols Preliminary testing on the Symbol Identification task was performed using the following standard classifier types [7]: Bayes Neural Net (MLP) Logistic Linear Regression Radial Basis Function Support Vector Machine Several Meta-classifiers Nearest Neighbor 1 and 5 Several Tree classifiers (including J48)
8 RandomForest classifiers (essentially a multi-classification based on many trees) Several rule based classifiers We found that three classifiers a Multilayer Perceptron Neural Net, a RandomForest classifier and a Nearest Neighbor classifier consistently outperformed all other classifiers. Based upon these preliminary results, we applied a multi-classifier framework to the binary symbol/nonsymbol problem using the following classifiers as components: Multilayer Perceptron Neural Net [2,3,7,9] RandomForest classifier (an advanced tree classifier) [1,7,10] Nearest Neighbor classifier [2,3,7] As shown in section III, this multi-classifier approach was more robust than any individual classifier. Of the three component classifiers, the multi-layer Perceptron Neural Net and Nearest Neighbor classifiers are well-known [2,3,9]. A RandomForest classifier is an advanced tree classifier. In a RandomForest classifier, subsets of the feature set are randomly selected and trees are constructed based on these subsets. While using multiple decision trees, the focus is on the splitting criterion and the tree sizes to achieve a balance between over-fitting and achieving maximum accuracy. It has been shown [1] that RandomForest classifiers outperform other tree classifiers. We implemented all three classifiers using the Weka software package [7] choosing the IB1 (Instance-Based Classifier using 1 nearest neighbor(s) for classification) option for the Nearest Neighbor classifier. Default parameters were used for all three classifiers. For the Multilayer Perceptron Neural Net, the number of iterations for training was set to 400. For the RandomForest classifier, the number of trees was set to 10. More details regarding these classifiers can be found in the references [1,2,3,7,9,10]. The individual outputs of the three classifiers were merged using a simple majority voting scheme. C. Symbol Classification Once it has been determined that the image to be classified is a symbol, the input then passes through another module that identifies the appropriate symbol from the symbol library. The same classifiers investigated for the Symbol Identification problem were evaluated for Symbol Classification. Interestingly, we found that the same classifiers which gave optimum performance for Symbol Identification were the leading candidates for Symbol Classification. We again made use of the multi-classifier approach described above. In the symbol classification stage, the outputs of the three individual classifiers were merged using a simple majority voting scheme. In cases where the output of each of the classifiers was different, the output of the classifier with the highest confidence was used. III. Experiments
9 This section describes the results of our experiments to both identify when the input handwriting was a symbol and to classify the new symbol set. These experiments begin with the creation of a lexicon for training and test. A. Lexicon Creation Since non-symbols include all words, numbers, etc. excluding the symbols, creating a representative corpus for all non-symbols would be a huge task which fortunately turned out to be unnecessary. We observed that symbols are limited to inputs which are one or two characters in length. Therefore our non-symbol lexicon could be limited to one and two character inputs. We developed a lexicon of 443 non-symbol words. This included letters of the alphabet, Arabic numerals 1 through 99, Roman numerals, state abbreviations (e.g., MA) and other two-letter geographical abbreviations, temporal abbreviations (e.g., pm), and high-frequency one and two letter words such as it, of, and go. In addition to these, medical practice uses many abbreviations which should be considered as non-symbols. We researched several web sites [13-19] to find medical and scientific abbreviations and acronyms, and selected those that are used in clinical reports for inclusion in our non-symbol lexicon. These include abbreviations for units of measure (e.g., cm), vitamins (e.g., B1), chemical elements and compounds (e.g., Zn, O2), anatomical terms (e.g., GB for gallbladder), disease names (e.g., TB for tuberculosis), procedures (e.g., bx for biopsy), bodily substances (e.g., TG for triglycerides), vital signs and lab assay descriptors (e.g., RR for respiratory rate), report section headings (e.g., FH for FAMILY HISTORY), the names of medical specialties (e.g., OB for obstetrics), hospital locations (e.g., OR for operating room), the Latin expressions used in drug prescriptions (e.g., qd for every day), and frequently used expressions such as RO (rule out) and WN (well nourished). Handwritten sample images of these 443 non-symbol words were collected from different writers. These non-symbol images along with symbol images were used to develop the symbol vs. non-symbol binary classifier. Some typical non-symbol sample images are shown in Figure 9 of Appendix-I.
10 For our symbol recognition lexicon we chose 15 common medical symbols (Table 1) whose addition to the standard Tablet PC dictionary is not supported. Symbol Meaning Symbol Meaning (lb.) Pound Approximately equal Change; heat Male µg Microgram Male p After Female s Without Female µ Micron Increase ± Plus or minus; either positive or negative; indefinite Decrease Multiplied by; magnification Table 1: List of medical symbols for the experiment In addition, we added 20 common mathematical symbols (Table 2) to create an extended set of symbols. This extended set was created to test the robustness and extendibility of the symbol recognition module α β λ τ η σ δ ψ γ π ρ Π Σ Φ Ω Table 2: List of mathematical symbols for the experiment Using both the Tablet PC and IOGear digital pen as input devices, 4102 non-symbols, 2525 medical symbols and 1196 mathematical symbols were collected and allocated for training or test as shown in Table 3. The number of writers used for data collection is indicated in the table. None of the data used for training was used for test. However, some of the data used for test was created by writers of training data. Tablet PC Writers IOGear Writers Total Medical Symbols Training Mathematical Symbols Training Non-symbols Training Medical Symbols Test 38 2* 180 4** 218 Mathematical Symbols Test Non-symbols Test 413 2* 443 4** 856 Table 3: Training and Test Corpus. (*1 new writer, 1 also contributed to training. **1 new writer, 3 also contributed to training)
11 B. Symbol Identification We evaluated the performance of our binary symbol vs. non-symbol classification stage first with a symbol set containing only medical symbols. The classifier was then retrained using the expanded symbol set which includes our selected mathematical symbols to explore the impact of expanding the symbol class. As shown in Table 4, a total of 1074 samples (218 symbols, 856 non-symbols) were labeled by the symbol identification classifier. The accuracy on this task was 96.7%; a significant improvement over the chance performance of 79.7% achieved by always choosing the majority class of Non-symbol. Total Correct Incorrect Accuracy Medical Symbols % Non-symbols Table 4: Symbol identification for medical symbols only Expanding the symbol class to include mathematical symbols reduced the accuracy of the symbol identification task to 92.6% as shown in Table 5. While this is still a significant improvement over chance performance of 71.7%, achieved by always choosing the majority class of Non-symbol, increasing the number of symbols from 15 to 35 caused a 4.2% relative degradation in performance. Total Correct Incorrect Accuracy Medical + Mathematical Symbols % Non-symbols Table 5: Symbol identification for both medical and mathematical symbols C. Symbol Classification The symbol classification stage of our system was evaluated using only the identified medical symbols and then again after retraining with the expanded symbol set. As shown in Table 6, the accuracy of the symbol identification classifier was 95.4% on the medical symbol only test set and 95.9% on the expanded symbol set. Apparently more than doubling the size of the symbol set does not cause problems during classification even though it produced a minor degradation in the symbol identification stage. Total Correct Incorrect Accuracy Medical Symbols % Medical + Mathematical Symbols % Table 6: Symbol classification on both medical only and the expanded symbol set D. Evaluation of Data Collection and Multi-classifier Decisions
12 The system described in this paper was heavily influenced by our decisions to collect data from two different sources and to use a multi-classifier architecture rather than a single classifier. In this section we report the empirical performance supporting those decisions. Training and test data was collected using both the target application Tablet PC and the IOGear digital pen. Table 7 presents performance on both the symbol identification and symbol classification tasks for the extended symbol set. The table indicates that when classification results are separated by the data source, there is very little change in performance. The IOGear digital pen provided 42% of the data used to train the symbol identification classifier but only 15% of the training data for symbol classification. Total Correct Incorrect Accuracy Extended Symbol Identification Tablet PC % IOGear % Extended Symbol Classification Tablet PC % IOGear % Table 7: Performance of the two classifiers on source dependent data Finally, we evaluated the performance of individual classifiers and compared their accuracy with the accuracy of the combined classifier. Both Symbol Identification and Symbol Classification were performed on subsets drawn from the full expanded symbol test set. Symbol Identification used 856 samples and Symbol Classification used 240 samples. Table 8 indicates that using a multi-classifier approach was significantly better than any of the individual classifiers when applied to the Symbol Identification task. The improvement was less dramatic but still positive when applied to Symbol Classification. Symbol Identification Symbol Classification Random Forest 82.1% 94.2% Nearest Neighbor 84.2% 95.0% Neural Net 80.6% 82.3% Combined Multi-classifier 90.4% 98.3% Table 8: Performance of individual classifiers vs. multi-classifier approach on both the Symbol Identification and Symbol Classification tasks. IV. Application The handwriting symbol recognition system described in this paper is a part of a larger prototype system being developed at MITRE which provides an interactive multimodal interface for an open-source web application called OpenEMR [23]. OpenEMR is a web application that manages patient medical records. Our interface is designed to allow medical professionals to include speech and handwriting tools when interacting with OpenEMR via a web browser plugin (Mozilla Firefox), for the purpose of searching, navigating, and inputting medical data in ways that are natural to the user. The purpose of this prototype is to demonstrate the potential for this type of tool to streamline the productivity and workflow of the medical user beyond the traditional keyboard-and-mouse paradigm offered by current electronic medical record systems.
13 Software developers can easily adapt the propotype software to work with other electronic health records systems. In this section we focus on the handwriting modality of the prototype, which connects a Firefox browser with the Tablet handwriting tool. This tool has been customized with medical dictionaries for out-of-vocabulary (OOV) terminology for the purpose of generating better recognition performance. Figure 5: MITRE s handwriting recognition prototype interface instantiated within OpenEMR Figure 5 shows a screenshot of the prototype interface. The web page being displayed represents the medical practitioner s summary of a patient visit, commonly known as a SOAP Note (Subjective, Objective, Assessment, and Plan). This page of the open-source system has been modified to utilize handwriting and speech, signaled by the green and red buttons in the upper left portion of the screen. A handwriting input panel is situated in the upper right corner. Clicking on this control activates the pop-up handwriting pad shown. In the scenario shown here, the handwriting tool is used to correct text that was input via speech recognition, changing the mis-recognized word oscillation to the correct term auscultation. The handwriting panel is available to a user to enter text or make corrections in text input areas. It is believed that this expanded modality would be useful in environments where keyboarding is not practical for example, in triage situations where desktop terminals are not readily available.
14 Currently, we are working to augment this prototype with the symbol recognition research system described in this paper, so that medical symbols can also be recognized and displayed. A symbol recognition application has been developed to demonstrate the ability to pass ink from the Tablet PC to the symbol recognition algorithm described in this paper (Figure 6). Figure 6: Recognizing symbol input with and without symbol recognizer This interface contains a handwriting area on the left-hand side, from which the input is digitized and separated into a series of ink strokes. The stroke data is then passed to the symbol recognition algorithm, with the results displayed on the right side. (The Tablet system s result is displayed above to compare the research with default behavior). We are working to combine the behavior of the two recognition engines -- the native handwritten recognition engine and the symbol recognition engine described in this paper -- so that mixed handwriting, containing both text and symbol input, can be parsed and recognized (Figure 7). Figure 7: Mixed Text and Symbol Handwriting Recognition (ink and electronic text representations) V. Conclusions In this paper we have described our method of training a system to automatically recognize handwritten medical symbols that are out of the existing system s lexicon. While our intent is to recognize symbols relevant to a medical application, we have also shown that the symbol
15 classification is robust to symbols from other domains. We have shown that using a multiclassifier architecture provides improved performance over an individual classifier. This study has shown a potential method to augment existing recognition system for out-ofvocabulary symbol recognition. Future work will address improving the performance of the binary symbol identification stage and final integration of the symbol recognizer with the existing Tablet PC system. Since symbols constitute a small fraction of the handwriting input, misidentification of non-symbol characters by the binary symbol identification stage must be kept very low to reduce inserted errors to the level necessary for adoption of the symbol recognition enhancement. The fact that medical abbreviations look similar to symbols makes this a difficult task. Our future work will involve more data collection and algorithm refinement based on contextual information to improve the performance of binary symbol vs. non-symbol classification. References [1] T. C. Ho, Random Decision Forest, Proc. 3 rd Intl. conf. on document analysis and recognition, Montreal, CA, pp , [2] C. M. Bishop, Pattern recognition and Machine Learning, ISBN 10: , Springer, [3] J. M. Parker, Algorithm for Image Processing and Computer Vision, ISBN-10: , John Wiley and Son, [4] M.-Y. Chen, A. Kundu, and S. N. Srihari, Variable duration hidden Markov model and morphological segmentation for handwritten word recognition. IEEE Trans. on Image Processing, 4(12), [5] A. Kundu, J. Phillips, T. Hines, B. Huyck and L. Van Guilder, "Arabic Handwriting Recognition Using Variable Duration HMM," Proceeding of International Conference of Document Analysis and Recognition (ICDAR), pp , Brazil, Sept [6] J. Shlens, A tutorial on principal component analysis. elaw/papers/pca.pdf, pages 1 13, [7] Weka Machine Learning Project, The University of Waikato, New Zealand, [8] P. J. Schneider, An algorithm for automatically fitting digitized curves, Graphics Gems, A. S. Glassner, ed., pp Academic Press, San Diego, CA, [9] Lippmann, R. P., An Introduction to Computing With Neural Net, ASSP Magazine, 2, 4-21, 1987.
16 [10] Leo Breiman, Random Forests, Machine Learning, pp. 5-32, Vol. 45, No. 1, 2001 [11] EMR Digital Ink Handwriting Recognition, Jan. 12, [12] R. Milewski and V. Govindaraju, Handwriting Analysis of Pre-Hospital Care Reports, Proc. 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 04), [13] Flash-Med: Medical Acronyms and Abbreviations for Medical Terms, [14] Medical Abbreviations, [15] Common Medical Abbreviations, [16] United States Postal Service -- Abbreviations, [17] List of medical abbreviations Wikipedia, the free encyclopedia, [18] Acronyms and Abbreviations Glossary, [19] JD-MD Medical Abbreviations Glossary, [20] K-F. Chanand D-Y. Yeung, Mathematical Expression Recognition: A Survey, International Journal of Document Analysis and Recognition (IJDAR), Vol. 3, No. 1, pp. 3-15, [21] U. Garain and B. B. Chaudhuri, On Machine Understanding of Online Handwritten Mathematical Expressions, Proceedings of 7th International Conference on Document Analysis and Recognition (ICDAR 03), 2003, pp [22] Y. Zhang, G. Shi and J. yang, HMM-based Online Recognition of Handwritten Chemical Symbols, Proceedings of 10th International Conference on Document Analysis and Recognition (ICDAR 09), 2009, pp [23] H. Miyao and M. Maruyama, An Online Handwritten Music Score Recognition System, Proceedings of the 17 th International Conference on Pattern Recognition (ICPR 04), 2004, pp [23] OpenEMR:
17 APPENDIX-I: Sample Images Figure 8: Typical image of symbols 7, 6, 5,4,3, 2, 1, 9 and 10 Figure 9: Typical non-symbol images from a lexicon of 443 entries
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
A Color Placement Support System for Visualization Designs Based on Subjective Color Balance
A Color Placement Support System for Visualization Designs Based on Subjective Color Balance Eric Cooper and Katsuari Kamei College of Information Science and Engineering Ritsumeikan University Abstract:
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
Distributed forests for MapReduce-based machine learning
Distributed forests for MapReduce-based machine learning Ryoji Wakayama, Ryuei Murata, Akisato Kimura, Takayoshi Yamashita, Yuji Yamauchi, Hironobu Fujiyoshi Chubu University, Japan. NTT Communication
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
Using Lexical Similarity in Handwritten Word Recognition
Using Lexical Similarity in Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR) Department of Computer Science and Engineering
Online Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Meta-learning. Synonyms. Definition. Characteristics
Meta-learning Włodzisław Duch, Department of Informatics, Nicolaus Copernicus University, Poland, School of Computer Engineering, Nanyang Technological University, Singapore [email protected] (or search
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Chapter 5 Objectives. Chapter 5 Input
Chapter 5 Input Describe two types of input List characteristics of a Identify various types of s Identify various types of pointing devices Chapter 5 Objectives Explain how voice recognition works Understand
Keywords Data mining, Classification Algorithm, Decision tree, J48, Random forest, Random tree, LMT, WEKA 3.7. Fig.1. Data mining techniques.
International Journal of Emerging Research in Management &Technology Research Article October 2015 Comparative Study of Various Decision Tree Classification Algorithm Using WEKA Purva Sewaiwar, Kamal Kant
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
Working With Animation: Introduction to Flash
Working With Animation: Introduction to Flash With Adobe Flash, you can create artwork and animations that add motion and visual interest to your Web pages. Flash movies can be interactive users can click
Machine Learning with MATLAB David Willingham Application Engineer
Machine Learning with MATLAB David Willingham Application Engineer 2014 The MathWorks, Inc. 1 Goals Overview of machine learning Machine learning models & techniques available in MATLAB Streamlining the
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
An Arabic Text-To-Speech System Based on Artificial Neural Networks
Journal of Computer Science 5 (3): 207-213, 2009 ISSN 1549-3636 2009 Science Publications An Arabic Text-To-Speech System Based on Artificial Neural Networks Ghadeer Al-Said and Moussa Abdallah Department
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier G.T. Prasanna Kumari Associate Professor, Dept of Computer Science and Engineering, Gokula Krishna College of Engg, Sullurpet-524121,
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
MACHINE LEARNING BASICS WITH R
MACHINE LEARNING [Hands-on Introduction of Supervised Machine Learning Methods] DURATION 2 DAY The field of machine learning is concerned with the question of how to construct computer programs that automatically
A Tutorial on Tablet PC. Simon Fraser University CMPT 354 Fall 2007
A Tutorial on Tablet PC Simon Fraser University CMPT 354 Fall 2007 Tablet PC Overview Agenda Tablet PC Development Tablet PC Resources A Tutorial on Tablet PC 2/22 Tablet PC Overview What is Tablet PC?
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Smart Board Basics. December, 2009. Rebecca Clemente Department of Education
Smart Board Basics December, 2009 Rebecca Clemente Department of Education Contents Obtaining the software... 3 What your students will need... 3 Writing in the Notebook... 4 Saving... 5 Change handwriting
Getting Even More Out of Ensemble Selection
Getting Even More Out of Ensemble Selection Quan Sun Department of Computer Science The University of Waikato Hamilton, New Zealand [email protected] ABSTRACT Ensemble Selection uses forward stepwise
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Polynomial Neural Network Discovery Client User Guide
Polynomial Neural Network Discovery Client User Guide Version 1.3 Table of contents Table of contents...2 1. Introduction...3 1.1 Overview...3 1.2 PNN algorithm principles...3 1.3 Additional criteria...3
2. Distributed Handwriting Recognition. Abstract. 1. Introduction
XPEN: An XML Based Format for Distributed Online Handwriting Recognition A.P.Lenaghan, R.R.Malyan, School of Computing and Information Systems, Kingston University, UK {a.lenaghan,r.malyan}@kingston.ac.uk
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
How To Draw On An Ipad With A Touch Tablet (For Free) On A Blackberry Or Ipad 2 (For A Sims) On An Easter Egg (For An Sims 2) On Blackberry 2 (Blackberry)
Apex v5 Pro (Assessor) Touch Tablet Module Tutorial This Tutorial: The drawing lesson in this tutorial guides you through the same sketch as our regular v5 Pro tutorial but highlights the Touch Tablet
Data, Measurements, Features
Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are
CS 2750 Machine Learning. Lecture 1. Machine Learning. http://www.cs.pitt.edu/~milos/courses/cs2750/ CS 2750 Machine Learning.
Lecture Machine Learning Milos Hauskrecht [email protected] 539 Sennott Square, x5 http://www.cs.pitt.edu/~milos/courses/cs75/ Administration Instructor: Milos Hauskrecht [email protected] 539 Sennott
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Using Neural Networks to Create an Adaptive Character Recognition System
Using Neural Networks to Create an Adaptive Character Recognition System Alexander J. Faaborg Cornell University, Ithaca NY (May 14, 2002) Abstract A back-propagation neural network with one hidden layer
ADVANCED APPLICATIONS OF ELECTRICAL ENGINEERING
Development of a Software Tool for Performance Evaluation of MIMO OFDM Alamouti using a didactical Approach as a Educational and Research support in Wireless Communications JOSE CORDOVA, REBECA ESTRADA
GOALS: The goal for this session is: OBJECTIVES: By the end of the lesson participants should be able to: MATERIALS: Instructor ACTVITIES: EVALUATION:
GOALS: The goal for this session is: Learn how to connect and use the SMART Board for effective instruction Ability to annotate and save work using Microsoft Office and SMART Notebook Software OBJECTIVES:
Numerical Algorithms Group
Title: Summary: Using the Component Approach to Craft Customized Data Mining Solutions One definition of data mining is the non-trivial extraction of implicit, previously unknown and potentially useful
Colour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
Binary Image Scanning Algorithm for Cane Segmentation
Binary Image Scanning Algorithm for Cane Segmentation Ricardo D. C. Marin Department of Computer Science University Of Canterbury Canterbury, Christchurch [email protected] Tom
Analysis Tools and Libraries for BigData
+ Analysis Tools and Libraries for BigData Lecture 02 Abhijit Bendale + Office Hours 2 n Terry Boult (Waiting to Confirm) n Abhijit Bendale (Tue 2:45 to 4:45 pm). Best if you email me in advance, but I
Multi-Touch Control Wheel Software Development Kit User s Guide
Multi-Touch Control Wheel Software Development Kit User s Guide V3.0 Bulletin #1204 561 Hillgrove Avenue LaGrange, IL 60525 Phone: (708) 354-1040 Fax: (708) 354-2820 E-mail: [email protected] www.grayhill.com/instinct
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
ACE: Illustrator CC Exam Guide
Adobe Training Services Exam Guide ACE: Illustrator CC Exam Guide Adobe Training Services provides this exam guide to help prepare partners, customers, and consultants who are actively seeking accreditation
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
High Quality Image Magnification using Cross-Scale Self-Similarity
High Quality Image Magnification using Cross-Scale Self-Similarity André Gooßen 1, Arne Ehlers 1, Thomas Pralow 2, Rolf-Rainer Grigat 1 1 Vision Systems, Hamburg University of Technology, D-21079 Hamburg
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Introduction Predictive Analytics Tools: Weka
Introduction Predictive Analytics Tools: Weka Predictive Analytics Center of Excellence San Diego Supercomputer Center University of California, San Diego Tools Landscape Considerations Scale User Interface
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7
DATA MINING TOOL FOR INTEGRATED COMPLAINT MANAGEMENT SYSTEM WEKA 3.6.7 UNDER THE GUIDANCE Dr. N.P. DHAVALE, DGM, INFINET Department SUBMITTED TO INSTITUTE FOR DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY
Machine Learning for Medical Image Analysis. A. Criminisi & the InnerEye team @ MSRC
Machine Learning for Medical Image Analysis A. Criminisi & the InnerEye team @ MSRC Medical image analysis the goal Automatic, semantic analysis and quantification of what observed in medical scans Brain
CS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, [email protected] June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
Cursive Handwriting Recognition for Document Archiving
International Digital Archives Project Cursive Handwriting Recognition for Document Archiving Trish Keaton Rod Goodman California Institute of Technology Motivation Numerous documents have been conserved
An Instructional Aid System for Driving Schools Based on Visual Simulation
An Instructional Aid System for Driving Schools Based on Visual Simulation Salvador Bayarri, Rafael Garcia, Pedro Valero, Ignacio Pareja, Institute of Traffic and Road Safety (INTRAS), Marcos Fernandez
Data Mining. SPSS Clementine 12.0. 1. Clementine Overview. Spring 2010 Instructor: Dr. Masoud Yaghini. Clementine
Data Mining SPSS 12.0 1. Overview Spring 2010 Instructor: Dr. Masoud Yaghini Introduction Types of Models Interface Projects References Outline Introduction Introduction Three of the common data mining
QAV-PET: A Free Software for Quantitative Analysis and Visualization of PET Images
QAV-PET: A Free Software for Quantitative Analysis and Visualization of PET Images Brent Foster, Ulas Bagci, and Daniel J. Mollura 1 Getting Started 1.1 What is QAV-PET used for? Quantitative Analysis
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS
GAZETRACKERrM: SOFTWARE DESIGNED TO FACILITATE EYE MOVEMENT ANALYSIS Chris kankford Dept. of Systems Engineering Olsson Hall, University of Virginia Charlottesville, VA 22903 804-296-3846 [email protected]
Character Image Patterns as Big Data
22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,
Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05
Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification
Gerry Hobbs, Department of Statistics, West Virginia University
Decision Trees as a Predictive Modeling Method Gerry Hobbs, Department of Statistics, West Virginia University Abstract Predictive modeling has become an important area of interest in tasks such as credit
CoolaData Predictive Analytics
CoolaData Predictive Analytics 9 3 6 About CoolaData CoolaData empowers online companies to become proactive and predictive without having to develop, store, manage or monitor data themselves. It is an
MiSeq: Imaging and Base Calling
MiSeq: Imaging and Page Welcome Navigation Presenter Introduction MiSeq Sequencing Workflow Narration Welcome to MiSeq: Imaging and. This course takes 35 minutes to complete. Click Next to continue. Please
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Turkish Radiology Dictation System
Turkish Radiology Dictation System Ebru Arısoy, Levent M. Arslan Boaziçi University, Electrical and Electronic Engineering Department, 34342, Bebek, stanbul, Turkey [email protected], [email protected]
Supervised Learning (Big Data Analytics)
Supervised Learning (Big Data Analytics) Vibhav Gogate Department of Computer Science The University of Texas at Dallas Practical advice Goal of Big Data Analytics Uncover patterns in Data. Can be used
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Data Mining. Nonlinear Classification
Data Mining Unit # 6 Sajjad Haider Fall 2014 1 Nonlinear Classification Classes may not be separable by a linear boundary Suppose we randomly generate a data set as follows: X has range between 0 to 15
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Domain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
STATISTICA. Financial Institutions. Case Study: Credit Scoring. and
Financial Institutions and STATISTICA Case Study: Credit Scoring STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table of Contents INTRODUCTION: WHAT
Each figure of a manuscript should be submitted as a single file.
Introduction This page provides general information for authors creating figures to maximize the quality of those illustrations and to prepare artwork for submission to the Brazilian Journal of Medical
Switching from PC SAS to SAS Enterprise Guide Zhengxin (Cindy) Yang, inventiv Health Clinical, Princeton, NJ
PharmaSUG 2014 PO10 Switching from PC SAS to SAS Enterprise Guide Zhengxin (Cindy) Yang, inventiv Health Clinical, Princeton, NJ ABSTRACT As more and more organizations adapt to the SAS Enterprise Guide,
Article. Electronic Signature Forensics. Copyright Topaz Systems Inc. All rights reserved.
Article Electronic Signature Forensics Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents Overview...
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
BIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics http://www.ccmb.med.umich.edu/node/1376
Course Director: Dr. Kayvan Najarian (DCM&B, [email protected]) Lectures: Labs: Mondays and Wednesdays 9:00 AM -10:30 AM Rm. 2065 Palmer Commons Bldg. Wednesdays 10:30 AM 11:30 AM (alternate weeks) Rm.
2. How to Use SMART Board as a Projector and Whiteboard
Page 1 Smart Board Getting Started Smart Board is an interactive whiteboard developed by SMART Technologies that combines the capabilities of a data projector and a white board. Use the SMART Board to
Training Methods for Adaptive Boosting of Neural Networks for Character Recognition
Submission to NIPS*97, Category: Algorithms & Architectures, Preferred: Oral Training Methods for Adaptive Boosting of Neural Networks for Character Recognition Holger Schwenk Dept. IRO Université de Montréal
Unconstrained Handwritten Character Recognition Using Different Classification Strategies
Unconstrained Handwritten Character Recognition Using Different Classification Strategies Alessandro L. Koerich Department of Computer Science (PPGIA) Pontifical Catholic University of Paraná (PUCPR) Curitiba,
Contents WEKA Microsoft SQL Database
WEKA User Manual Contents WEKA Introduction 3 Background information. 3 Installation. 3 Where to get WEKA... 3 Downloading Information... 3 Opening the program.. 4 Chooser Menu. 4-6 Preprocessing... 6-7
Adobe Illustrator CS5 Part 1: Introduction to Illustrator
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Adobe Illustrator CS5 Part 1: Introduction to Illustrator Summer 2011, Version 1.0 Table of Contents Introduction...2 Downloading
Benchmarking of different classes of models used for credit scoring
Benchmarking of different classes of models used for credit scoring We use this competition as an opportunity to compare the performance of different classes of predictive models. In particular we want
