Benchmarking the LBPH Face Recognition Algorithm with OpenCV and Python
|
|
|
- Aubrey Bennett
- 9 years ago
- Views:
Transcription
1 Benchmarking the LBPH Face Recognition Algorithm with OpenCV and Python Johannes Kinzig 1, Christian von Harscher 2 Faculty of Computer Science and Enginering Frankfurt University of Applied Sciences Nibelungenplatz Frankfurt am Main, Germany 1 [email protected], 2 [email protected] Abstract In this paper, we present an benchmark of the Local Binary Patterns Histogram (LBPH) algorithm in combination with OpenCV and Python. We wanted to show that these techniques can be used for a real-time application. The main part of this work will describe the architecture as well as the implementation of the detection and recognition application. A cascade classifier with haar-like features will be used for the detections phase. Of course the recoginition will be implemented with the LBPH algorithm. The benchmarks will be executed on different machines for generating representative results. Index Terms Real-time Systems, Face Detection, Face Recognition, Benchmark I. INTRODUCTION Face detection and face recognition can be used in various real world application fields. This could be face tracking during a live broadcast of a sport event or person identification at the airport border control. Another field of application could be criminal prosecution in public places using the image data of surveillance cameras. Both examples need a fast detection and recognition algorithm because the results of detecting and recognizing a face are important for further processing. For instance, when performing a face tracking of a specific person in a video stream the operations for detecting and recognizing the face have to be as fast as the picture display rate. Otherwise the face tracking could not be performed. In this paper a benchmarking proposal of OpenCV s face detection algorithm and the face recognition algorithm (using LPBH recognizer, cf. I-B) is described and later on performed. The benchmark should give information about required hardware and wether the face detector and LBPH face recognizer can be used in realtime applications. A. Face Detection Face detection describes the process of locating one or many human-like faces in a image sequence. For a fast detection of faces the haar-like feature algorithm by Viola and Jones can be used [2]. Fig. 1. Haar-like features [2, Fig. 3]
2 The left feature in the upper row of Fig. 1 is showing an edge. This feature can be used for detecting the forehead position of a face. The feature on the right is used for detecting a line, mostly the position of the nose of a face can be determined. The second row is showing a sample image with the applied features. A combination of these and additional features can be used for a rapid detection with a high detection rate of 95% described in [2, sect. 3.2]. The rapid detection is done by using a cascade classifier (fig. 2). The image is segmented in subwindows and only a few features are checked at the beginning. Only if the current feature is detected, further features will be checked. This reduces the number of features that must be checked per sub-window. If the given feature set is not detected inside the sub-window then the sub-window will be rejected and no further processing will be done. Due to this processing of the feature detection, the performance of the algorithm can be increased because not all features must be checked for each sub-window. Fig. 2. Detection cascade [2, Fig. 4] T=true; F=false B. Face Recognition The next step after locating a face inside of an image is the recognition of it. The recognition is the process of identifying a face inside of a set of previously learned faces. For this purpose different algorithms like Eigenfaces, Fisherfaces or Local Binary Patterns Histograms (LBPH) can be used. In this paper the LBPH will be covered. In fig. 3 an example image is given in a. This image is already screened in sections. Our application for benchmarking will display a colored image sequence but analyze only the desaturated grayscale image. After this each section will be weighted with a grayscale value, representing the dissimilarity to the neighbor sections. In paper [3, sect. 4] the black sections indicate a value of 0.0 and the white sections are weighted with a value of 4.0. The analyzed image is shown in b of fig. 3. After this dissimilarity analysis the weighted sections represent a shape and texture pattern that can be compared to the existing samples of a person.
3 Fig. 3. LBPH analysis [3, Fig. 5] II. ALGORITHM IMPLEMENTATION Before a benchmarking of the OpenCV algorithms could be performed, a software had to be developed which implements the face detection and recognition algorithm. Implementing the recognition algorithm requires to also implement OpenCV s face trainer. This lead to a complete software which had to be developed with the following features: 1) Read in the video stream from a camera which is connected to the computer 2) Detect a face in the current frame of the image sequence 3) Allow to store the face and link a label to it (label = face name) 4) Recognize the stored face in another video stream and show the correct label A graphical representation of the implemented features and software architecture can be seen in fig. 4. Load Cascade Classifier Detect faces from Stream Load face recognizer Learn Faces Switch to Recognizer Detect faces from Stream For detected face: compare with learned faces Iff known face found: display name for face Fig. 4. Software Architecture A. Architecture The overall system architecture is shown as a use case diagram in fig. 5. It shows the detection and recognition process. Subject A and B are positioned in front of the webcam. The detector will then load the cascade classifier for detecting the haar-like features of the image sequence. After detecting the faces of Subject A and B inside of an image the detector will forward the coordinates of the detected faces to the recognizer. Then the recognizer will loop through the learned samples of each subject and tries to recognize the subject. If the recognition process was successful the recognizer will highlight the face
4 of a subject and display the name over the previously drawn rectangle. For this whole process the face samples need to be learned first. Fig. 5. Use Case Diagram In the learning phase the face detector is used for detecting the faces positions. After that the face can then be named by the operator and saved by the system. A typical set of samples can be found in fig. 6. The first row represents one person and the second row represents another person. The system will not save the images as files but interpret the features of each face and saves them into main memory. Fig. 6. Example samples as images B. Implementation details regarding execution speed The complete software was written in Python and executed in a Python V environment. The OpenCV algorithms are written in C++ and were called using the Python application. The timing overhead which occurs when calling the libraries from within the Python application can be neglect, additionally all the algorithms which are benchmarked are written in C++ and were compiled to binaries for the specific system. Basically this means that the algorithms are executed directly and abstain from a virtual machine layer like the Python VM or Java VM. This leads us to the assumption that the results are reliable. Fig. 7 shows the face recognizer window. The video stream was captured from the camera and the face recognizer compares each frame with the faces contained in the training set. To prove wether the recognition was done correctly a rectangle is drawn around every detected face and labeled with the stored label (label = name for the face).
5 Fig. 7. Face recognizer application developed to benchmark the face detection and recognition process C. Face Detection Generally developing applications which detect a face is very easy when using OpenCV. The detection itself is just one line of code, the configuration of the face detector is also quite lightweight. In line two the file with the haar-cascades is loaded into the ramdisk. This is an XML based file which holds pretrained information necessary to detect a human face. Loading another cascade classifier leads to detecting other objects, for instance a dogs s face. Line five just connects to the camera which is connected to the computer (using USB). For detecting faces and to let it look like a video-stream in line seven an endless loop is started. In line nine the current frame is taken from the video stream and is stored as frame. The the other value which is stored as ret is a boolean value which is True if the frame was captured successfully, otherwise it is False. Because the LBPH algorithm can only take gray frames for processing in line 12 the picture is converted to gray (cv2.color BGR2GRAY). In line 15 the face detection is performed. The method takes the gray frame as an input (including some other parameters) and returns detected faces as the output, these are stored in faces (cf. [1]) # loading the cascade classifier into ramdisk self.facecascade = cv2.cascadeclassifier(cascpath) # start capturing the stream from the camera self.videostream = cv2.videocapture(self.videodevice) while True: # Capture frame-by-frame self.ret, self.frame = self.videostream.read() # convert image to gray, because recognition is done in gray self.grayframe = cv2.cvtcolor(self.frame, cv2.color_bgr2gray) # holds the face data self.faces = self.facecascade.detectmultiscale(self.grayframe,...,, flags=cv2.cv.cv_haar_scale_image)
6 D. Face Recognition The face recognition process is similar to the detection process. The most important task is to train the recognizer correctly. In line two an instance from the LBPH face recognizer is generated, in line five its method train is called. This method trains the face recognizer with the face - label pairs. As arguments it takes the faces (features) which were detected by the face detector (cf. II-C) and the labels for the faces. The labels are passed as an numpy array. Numpy is an extension module for Python which allows fast computing of large matrices and large arrays. The numpy array is internally organized as an array in C++. As described in section II-B OpenCV is written in C++ and therefore the face trainer expects the labels as an supported data structure. This requires to pass the labels as an numpy array. 1 # For face recognition the LBPHF recognizer will be used 2 self.recognizer = cv2.createlbphfacerecognizer() 3 4 # now train the recognizer, pass the faces and the corresponding labels 5 self.recognizer.train(features, numpy.array(labels)) The face recognition itself again starts as the detection. Inside the endless loop frame after frame is captured from the video stream. Then again the face detector is started and stores detected faces into an array. Afterwards the face recognizer is called for every face which was detected by the face detector (face was stored inside array). This saves time because the face recognizer is only started when a face was detected, otherwise the recognizer would get a faceless frame as an input. 1 while True: 2 # holds the face data 3 self.faces = self.facecascade.detectmultiscale(self.grayframe,..., flags=cv2. cv.cv_haar_scale_image) 4 5 # for every face detected above 6 for (x, y, w, h) in self.faces: 7 8 # run the face recognizer 9 self.predicted, self.conf = self.recognizer.predict(self.grayframe[y: y + h, x: x + w]) The face recognizer begins recognizing a face when its predict method is called. The predict method takes a frame as input. In this scenario this frame definitely contains a face because otherwise the for loop would not run (because the array where to iterate over would be empty). The recognizer then delivers two output values predicted and conf. Predicted holds the label of the face which was recognized and conf contains the according confidence of the recognition. The higher conf is the less is the recognizer confident about the recognition. A perfect recognition is obvious when the recognizer returns 0.0 for the conf value (cf. [1]). E. Benchmarking As already described in section II-D the face detection and also the face recognition is basically performed with just one command. Therefore the benchmarking consists of measuring the execution time of the specific command which starts the detection and recognition. Measuring the execution time can programmatically be performed in simple steps: 1) Get current time (by asking the OS) and store it as start time 2) Run the function or method whose execution time has to be determined 3) Get the current time and subtract the previously stored start time For this specific task a Python class was written which does the time measurement. This has the advantage that in the main application only two methods have to be called: startbenchmark() for starting
7 the measurement and stopbenchmark() for stopping the measurement and returning the measured values. The stopbenchmark() method returns two double values, representing the execution time in seconds for the wall clock time and CPU time. This described class also takes care for writing the determined values to a CSV file. Measuring the time with Python is quite fast forward, the time module has to be imported. With the command time.clock() the current CPU time is returned as a floating point number expressed in seconds on Unix. With the command time.time() the current wall clock time is returned as a floating point number in seconds since the start of the epoch in UTC (cf. [4]) The following listing shows a sample method to measure time in Python with the class which was developed to benchmark the OpenCV algorithms (same is described in [5, p 191, 192]): 1 # TimeMeasurement instance with name "Measurement1" 2 measurement1 = TimeMeter("Measurement1") 3 4 # measure cpu and wall clock time 5 measurement1.startbenchmark() 6 time.sleep(1) # method or function call which timing has to be determined 7 wallclock, cpuclock = measurement1.stopbenchmark() 8 measurement1.writetofile(str(wallclock) + ",\t" + str(cpuclock) + "\n") The CPU execution time describes how long the algorithm was processed by the CPU, apparently how much CPU cycles were needed for the execution. The wall clock time represents the real execution time of this algorithm. This means that all other processes which are running on the system and are inserted in the execution because of a higher priority (or any other scheduling policy) are respected for the time measurement. This is the reason why the real time is alway higher than the CPU time. Determining the CPU time when benchmarking an algorithm is usually the first way to go because this shows the behavior independent from the other processes. This allows to compare the algorithm performance among different CPUs with different speed. The CPU time also offers valuable clues to the multi core or multi CPU behavior of an algorithm. If the wall clock time is lower than the CPU time, it is assumed that the algorithm is supporting multiple cores. The explanation is that for the same amount of time more CPU cycles are available than on a system with less CPU cores. Fig. 8 shows that the execution measured using the wall clock time takes less time than the CPU time. This shows that the face detection algorithm provided by OpenCV supports multiple cores and increases in performance with the number of CPU cores. The wall clock time is interesting when getting information about how fluent an application is running on a specific system because the real time is returned. This information is also important for this kind of benchmark because the output of the software execution is visible. For instance when doing a live broadcast of an sports event and the stage direction wants the camera to follow a hockey player the real execution time (wall clock time) of detecting and recognizing the face has to be known beforehand because otherwise the complete system is not working. In case the player runs faster out of the frame than the algorithm can detect and recognize this face, the camera is not able to follow the face anymore. This is the reason why this paper describes the approach for taking both values into account, the wall clock time and the CPU time.
8 III. PERFORMING THE BENCHMARK A. Preconditions When performing the benchmark several important preconditions had to be ensured: Illumination conditions have to be the same for training the recognizer and for running the recognizer Training the recognizer was done from live camera stream Recognition of faces should be done in the same environment as training the recognizer The light and illumination conditions should be the same for training the face recognizer and for running the recognizer. Occurring shadows in the faces because of different light and illumination conditions, especially when the light beam comes from another direction may lead to a bad recognition rate or to a faulty recognition. This had to be avoided because additionally measuring the recognition rate would have increased the effort drastically. This lead to the idea to learn the faces directly from within the situation in where the faces should be recognized in the second step. This ensured a comparatively high recognition rate which allowed to concentrate on the time measurement. While doing the benchmarking all faces were recognized correctly and the illumination condition was the same throughout all tests. B. Benchmarking on devices To get an impression about the execution time of the face detector and recognizer the idea was to run the same tests on several devices. This shows wether the algorithms support multi core systems ( increasing number of cores, the faster the execution becomes ) and offers valuable clues about the systems which are needed to use the algorithm appropriately for different fields of application. As described in section I the benchmark should give information wether the OpenCV algorithms are suited for real time applications, three different devices were chosen (table I). One older computer, the MacBook (Modell late 2009), a newer Mac (MacBook Air) with average performance and an Lenovo ThinkPad with comparatively high performance. TABLE I MACHINES USED FOR BENCHMARKING Machine Operating System Processor Main Memory MacBook OS X bit Intel Core 2 GHz 4 GB Ram MacBook Air OS X bit Intel Core GHz 4GB Ram ThinkPad Linux Mint bit Intel Core GHz 7.5GB Ram
9 IV. RESULTS The benchmarking of the application was done separately for the detection as well as for the recognition phase. For all recognizer test cases in table II the camera resolution was specified to 800*600 pixels and the samples of two persons were used (fig. 7). The same camera resolution was used for the face detector. TABLE II RECOGNIZER TEST CASES Test case no Machine MacBook MacBook MacBook ThinkPad ThinkPad MacBook Air MacBook Air Samples per person AVG(wallclock time) [sec] AVG(CPU time) [sec] The benchmark of the detection phase in fig. 8 shows that the ThinkPad is the fastest of the machines followed by the MacBook Air and MacBook. Fig. 8. Face detector benchmark As described in section Local Binary Patterns Histograms of [1] it is necessary to use at least 8±1 samples per person for a high recognition rate. The same applies for the speed of the used LBPH algorithm. The comparison between 2, 7 and 12 samples is made in fig. 9. The average wallclock time of these three test cases in table II imply that there is a significant difference between test case 1 (2 samples) and 2 (7 samples). On the other hand there is no significant difference between the average wallclock time of test case 2 (7 samples) and 3 (12 samples). So slightly increasing the number of samples from 7 to 12 does not affect the speed of the used LBPH algorithm.
10 Fig. 9. Face recognizer benchmark with different number of samples on MacBook (test cases: 1, 2, 3) For comparing the runtimes with different number of samples per person (2 and 7 samples) the benchmarks were visualized in fig. 10 and 11. The execution of the algorithm does not necessarily take longer but in the most cases it does because of the increased number of samples. The MacBook Air shows a low-peak in fig. 10 whereas the ThinkPad performes constantly. The MacBook as the slowest execution time. The anomaly described in V pt. 2), could be caused by other processes running either on the ThinkPad during the test case 5 or on the MacBook Air during test case 6. Fig. 10. Face recognizer benchmark, with 2 samples on each device (test cases: 1, 4, 6) Fig. 11. Face recognizer benchmark, with 7 samples on each device (test cases: 2, 5, 7)
11 V. DISCUSSION Section IV shows that both, the face detector and the face recognizer are suited for real time applications; this even on older systems such as the MacBook. When doing the benchmarks, on all three systems the video stream was displayed fluently, there were no noticeable delays in the stream. This is valid for the detection and also for the recognition of the faces. The proof for the detector can be seen in fig. 8 where the average time taken is about 0.08 seconds (wall clock) for the fastest system. Table II shows the proof for the face recognizer where the average time taken is about seconds (wall clock) for the Lenovo ThinkPad. When interpreting the results, additional conspicuousness was recognized. Further explications to the following circumstances will not be given because this is not part of the actual work and may be researched in a following project. 1) When looking at fig. 11 and 8 it becomes obvious that the detection itself takes longer than the recognition. 2) When comparing fig. 10 and 11 it becomes obvious that the MacBook Air is performing faster than the ThinkPad when the training set consists of seven samples. When the training set consists of two samples, the ThinkPad is faster. REFERENCES [1] OPENCV DEV TEAM, Face Recognition with OpenCV, Mar 09, accessed: tutorial.html [2] VIOLA, JONES: Rapid Object Detection using a Boosted Cascade of Simple Features, efros/courses/lbmv07/papers/viola-cvpr-01.pdf [3] AHONEN, HADID, et al., Face Recognition with Local Binary Patterns, ECCV masters/2011/frt/dyrul/library/article8.pdf [4] The Python Standard Library: Generic Operating System Services [5] David M. Beazley, Python Essential Reference, EAN: , Editor: Pearson Education
Evaluation of Optimizations for Object Tracking Feedback-Based Head-Tracking
Evaluation of Optimizations for Object Tracking Feedback-Based Head-Tracking Anjo Vahldiek, Ansgar Schneider, Stefan Schubert Baden-Wuerttemberg State University Stuttgart Computer Science Department Rotebuehlplatz
How To Train A Face Recognition In Python And Opencv
TRAINING DETECTORS AND RECOGNIZERS IN PYTHON AND OPENCV Sept. 9, 2014 ISMAR 2014 Joseph Howse GOALS Build apps that learn from p h o to s & f r o m real-time camera input. D e te c t & recognize the faces
CS231M Project Report - Automated Real-Time Face Tracking and Blending
CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, [email protected] June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android
PERFORMANCE ENHANCEMENTS IN TreeAge Pro 2014 R1.0
PERFORMANCE ENHANCEMENTS IN TreeAge Pro 2014 R1.0 15 th January 2014 Al Chrosny Director, Software Engineering TreeAge Software, Inc. [email protected] Andrew Munzer Director, Training and Customer
Figure 1: Graphical example of a mergesort 1.
CSE 30321 Computer Architecture I Fall 2011 Lab 02: Procedure Calls in MIPS Assembly Programming and Performance Total Points: 100 points due to its complexity, this lab will weight more heavily in your
Robust Real-Time Face Detection
Robust Real-Time Face Detection International Journal of Computer Vision 57(2), 137 154, 2004 Paul Viola, Michael Jones 授 課 教 授 : 林 信 志 博 士 報 告 者 : 林 宸 宇 報 告 日 期 :96.12.18 Outline Introduction The Boost
Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture.
Implementation of Canny Edge Detector of color images on CELL/B.E. Architecture. Chirag Gupta,Sumod Mohan K [email protected], [email protected] Abstract In this project we propose a method to improve
Copyright 2011 - bizagi
Copyright 2011 - bizagi 1. Process Automation with bizagi... 3 Description... 3 Objectives... 3 Target Audience Profile... 4 Duration... 4 2. Part I Basic concepts to build a bizagi solution... 5 Description...
Outline. hardware components programming environments. installing Python executing Python code. decimal and binary notations running Sage
Outline 1 Computer Architecture hardware components programming environments 2 Getting Started with Python installing Python executing Python code 3 Number Systems decimal and binary notations running
An Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
Effective Java Programming. efficient software development
Effective Java Programming efficient software development Structure efficient software development what is efficiency? development process profiling during development what determines the performance of
Step 2: Paint Your Model
KeyShot creates images. Simple, beautiful, and fast. KeyShot is the first interactive raytracing and global illumination program of its kind that behaves more like a digital camera than a rendering application.
Lesson 10: Video-Out Interface
Lesson 10: Video-Out Interface 1. Introduction The Altera University Program provides a number of hardware controllers, called cores, to control the Video Graphics Array (VGA) Digital-to-Analog Converter
Analysis of Micromouse Maze Solving Algorithms
1 Analysis of Micromouse Maze Solving Algorithms David M. Willardson ECE 557: Learning from Data, Spring 2001 Abstract This project involves a simulation of a mouse that is to find its way through a maze.
Computer Graphics Hardware An Overview
Computer Graphics Hardware An Overview Graphics System Monitor Input devices CPU/Memory GPU Raster Graphics System Raster: An array of picture elements Based on raster-scan TV technology The screen (and
Storing Measurement Data
Storing Measurement Data File I/O records or reads data in a file. A typical file I/O operation involves the following process. 1. Create or open a file. Indicate where an existing file resides or where
Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9. Do Now: Name 3 parts of the computer.
C1 D1 Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9 Do Now: Name 3 parts of the computer. 1 Hardware and Software Hardware the physical, tangible parts of a computer
Control 2004, University of Bath, UK, September 2004
Control, University of Bath, UK, September ID- IMPACT OF DEPENDENCY AND LOAD BALANCING IN MULTITHREADING REAL-TIME CONTROL ALGORITHMS M A Hossain and M O Tokhi Department of Computing, The University of
A General Framework for Tracking Objects in a Multi-Camera Environment
A General Framework for Tracking Objects in a Multi-Camera Environment Karlene Nguyen, Gavin Yeung, Soheil Ghiasi, Majid Sarrafzadeh {karlene, gavin, soheil, majid}@cs.ucla.edu Abstract We present a framework
OPERATION MANUAL. MV-410RGB Layout Editor. Version 2.1- higher
OPERATION MANUAL MV-410RGB Layout Editor Version 2.1- higher Table of Contents 1. Setup... 1 1-1. Overview... 1 1-2. System Requirements... 1 1-3. Operation Flow... 1 1-4. Installing MV-410RGB Layout
Open-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
Autodesk Revit 2016 Product Line System Requirements and Recommendations
Autodesk Revit 2016 Product Line System Requirements and Recommendations Autodesk Revit 2016, Autodesk Revit Architecture 2016, Autodesk Revit MEP 2016, Autodesk Revit Structure 2016 Minimum: Entry-Level
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Using MATLAB to Measure the Diameter of an Object within an Image
Using MATLAB to Measure the Diameter of an Object within an Image Keywords: MATLAB, Diameter, Image, Measure, Image Processing Toolbox Author: Matthew Wesolowski Date: November 14 th 2014 Executive Summary
PRODUCT INFORMATION. Insight+ Uses and Features
PRODUCT INFORMATION Insight+ Traditionally, CAE NVH data and results have been presented as plots, graphs and numbers. But, noise and vibration must be experienced to fully comprehend its effects on vehicle
ICS Technology. PADS Viewer Manual. ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com
ICS Technology PADS Viewer Manual ICS Technology Inc PO Box 4063 Middletown, NJ 077748 732-671-5400 www.icstec.com Welcome to PADS Viewer Page 1 of 1 Welcome to PADS Viewer Welcome to PADS (Public Area
Memory Management Outline. Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging
Memory Management Outline Background Swapping Contiguous Memory Allocation Paging Segmentation Segmented Paging 1 Background Memory is a large array of bytes memory and registers are only storage CPU can
Media File Player. Version 1.5.1 Release Note 1 st Edition
Media File Player Version 1.5.1 Release Note 1 st Edition Last Modified Date: July. 19, 2012 c 2012 Sony Corporation Copyright Notice 2010 Sony Corporation. All rights reserved. This document may not be
VMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
These release notes are intended to acquaint you with your new software version as quickly as possible.
Release Notes Building Integration System (BIS) Version 4.2 These release notes are intended to acquaint you with your new software version as quickly as possible. Table of Contents: 1 Installation Notes...
Setting up for Adobe Connect meetings
Setting up for Adobe Connect meetings When preparing to lead a live lecture or meeting, you probably ensure that your meeting room and materials are ready before your participants arrive. You run through
VMware Horizon FLEX User Guide
Horizon FLEX 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
VHS2DVD Wizard User's Manual
VHS2DVD Wizard User's Manual Table of Contents 1. Installation Instructions a. Installation Package Contents b. Installation Instructions c. Setting Up the Computer for Video Capturing i. Adjust the Screen
In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal
Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto [email protected] Luís Teixeira INESC Porto, Universidade Católica Portuguesa [email protected] Luís Corte-Real
About Parallels Desktop 10 for Mac
About Parallels Desktop 10 for Mac Parallels Desktop 10 for Mac is a major upgrade to Parallels award-winning software for running Windows on a Mac. About this Update This update for Parallels Desktop
what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored?
Inside the CPU how does the CPU work? what operations can it perform? how does it perform them? on what kind of data? where are instructions and data stored? some short, boring programs to illustrate the
Speed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA [email protected], [email protected] Abstract. A speed
Video Tracking Software User s Manual. Version 1.0
Video Tracking Software User s Manual Version 1.0 Triangle BioSystems International 2224 Page Rd. Suite 108 Durham, NC 27703 Phone: (919) 361-2663 Fax: (919) 544-3061 www.trianglebiosystems.com Table of
How To Program With Adaptive Vision Studio
Studio 4 intuitive powerful adaptable software for machine vision engineers Introduction Adaptive Vision Studio Adaptive Vision Studio software is the most powerful graphical environment for machine vision
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
IP Video Rendering Basics
CohuHD offers a broad line of High Definition network based cameras, positioning systems and VMS solutions designed for the performance requirements associated with critical infrastructure applications.
Smartboard and Notebook 10 What s New
Smartboard and Notebook 10 What s New Smartboard Markers and Eraser (for use with all programs): You may use your finger as the mouse. Press down twice to double click Hold your finger down for a few seconds
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
High-speed image processing algorithms using MMX hardware
High-speed image processing algorithms using MMX hardware J. W. V. Miller and J. Wood The University of Michigan-Dearborn ABSTRACT Low-cost PC-based machine vision systems have become more common due to
Affdex SDK for Windows!
Affdex SDK for Windows SDK Developer Guide 1 Introduction Affdex SDK is the culmination of years of scientific research into emotion detection, validated across thousands of tests worldwide on PC platforms,
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping
AQA GCSE in Computer Science Computer Science Microsoft IT Academy Mapping 3.1.1 Constants, variables and data types Understand what is mean by terms data and information Be able to describe the difference
Microsoft Office 2010 system requirements
Microsoft Office 2010 system requirements When upgrading from Microsoft Office 2007 to the 2010 release you should not need to upgrade your hardware, although you might need to upgrade to a supported operating
CMS suite. Control room management software. Barco's CMS software is an advanced control room management suite which
CMS suite Control room management software Barco's CMS software is an advanced control room management suite which improves the decision-making process, allowing decisions to be taken faster and more effectively.
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
GETTING STARTED WITH STUDIO ONE ARTIST
GETTING STARTED WITH STUDIO ONE ARTIST 2009, PreSonus Audio Electronics, Inc. All Rights Reserved. TABLE OF CONTENTS Studio One Artist Features...3 System Requirements...4 Installation and Authorization...5
Elemental functions: Writing data-parallel code in C/C++ using Intel Cilk Plus
Elemental functions: Writing data-parallel code in C/C++ using Intel Cilk Plus A simple C/C++ language extension construct for data parallel operations Robert Geva [email protected] Introduction Intel
Indoor Surveillance System Using Android Platform
Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao
Adobe Connect Support Guidelines
THINK TANK Online Services Adobe Connect Support Guidelines Page 1 Contents Introduction... 4 What is Adobe Connect?... 4 Adobe Connect Usage Quick Guide... 4 Items Required for Accessing Think Tank Online
Automatic Maritime Surveillance with Visual Target Detection
Automatic Maritime Surveillance with Visual Target Detection Domenico Bloisi, PhD [email protected] Maritime Scenario Maritime environment represents a challenging scenario for automatic video surveillance
AR-media Player v2.3. INSTALLATION & USER GUIDE (February, 2013) (Windows XP/Vista/7)
INSTALLATION & USER GUIDE (February, 2013) (Windows XP/Vista/7) Inglobe Technologies 2008/2013 Copyright Copyright 2008/2013 Inglobe Technologies S.r.l. All rights reserved. No part of this publication
MICROPROCESSOR AND MICROCOMPUTER BASICS
Introduction MICROPROCESSOR AND MICROCOMPUTER BASICS At present there are many types and sizes of computers available. These computers are designed and constructed based on digital and Integrated Circuit
How to choose a suitable computer
How to choose a suitable computer This document provides more specific information on how to choose a computer that will be suitable for scanning and post-processing your data with Artec Studio. While
Contents. 2. cttctx Performance Test Utility... 8. 3. Server Side Plug-In... 9. 4. Index... 11. www.faircom.com All Rights Reserved.
c-treeace Load Test c-treeace Load Test Contents 1. Performance Test Description... 1 1.1 Login Info... 2 1.2 Create Tables... 3 1.3 Run Test... 4 1.4 Last Run Threads... 5 1.5 Total Results History...
Several tips on how to choose a suitable computer
Several tips on how to choose a suitable computer This document provides more specific information on how to choose a computer that will be suitable for scanning and postprocessing of your data with Artec
EnerVista TM Viewpoint Monitoring v7.10
EnerVista TM Viewpoint Monitoring v7.10 Guideform Specifications July 7, 2014 Page 1 of 14 1 - Product Overview 1.1 Viewpoint Monitoring Scope EnerVista Viewpoint Monitoring is an easy to setup, powerful
Real-Time Eye Gaze Tracking With an Unmodified Commodity Webcam Employing a Neural Network
To appear in Proceedings of ACM Conference on Human Factors in Computing Systems (CHI), Atlanta, GA, 2010 Real-Time Eye Gaze Tracking With an Unmodified Commodity Webcam Employing a Neural Network Weston
Virtualization for Cloud Computing
Virtualization for Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF CLOUD COMPUTING On demand provision of computational resources
IX Support Tool Setting Manual
IX System IP network-compatible intercom IX Support Tool Setting Manual Software version 2.0.0.0 or later Before configuring and using the system, read Setting Manual and Operation Manual (PDF) carefully.
Note: A WebFOCUS Developer Studio license is required for each developer.
WebFOCUS FAQ s Q. What is WebFOCUS? A. WebFOCUS was developed by Information Builders Incorporated and is a comprehensive and fully integrated enterprise business intelligence system. The WebFOCUShttp://www.informationbuilders.com/products/webfocus/architecture.html
Understanding the Performance of an X550 11-User Environment
Understanding the Performance of an X550 11-User Environment Overview NComputing's desktop virtualization technology enables significantly lower computing costs by letting multiple users share a single
CHAPTER FIVE RESULT ANALYSIS
CHAPTER FIVE RESULT ANALYSIS 5.1 Chapter Introduction 5.2 Discussion of Results 5.3 Performance Comparisons 5.4 Chapter Summary 61 5.1 Chapter Introduction This chapter outlines the results obtained from
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER
ASSEMBLY PROGRAMMING ON A VIRTUAL COMPUTER Pierre A. von Kaenel Mathematics and Computer Science Department Skidmore College Saratoga Springs, NY 12866 (518) 580-5292 [email protected] ABSTRACT This paper
Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach
Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach S. M. Ashraful Kadir 1 and Tazrian Khan 2 1 Scientific Computing, Royal Institute of Technology (KTH), Stockholm, Sweden [email protected],
About Parallels Desktop 7 for Mac
About Parallels Desktop 7 for Mac Parallels Desktop 7 for Mac is a major upgrade to Parallels' award-winning software for running Windows on a Mac. About this Update This update for Parallels Desktop for
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
Minimum System Requirements
1/12 Minimum System Requirements The Fuzion Media Player needs the following hardware to run optimally: - CPU: Intel Core 2 Duo 2.2 GHz or higher - Graphics Card: nvidia 9500GT or better - Operating System:
ELEC 377. Operating Systems. Week 1 Class 3
Operating Systems Week 1 Class 3 Last Class! Computer System Structure, Controllers! Interrupts & Traps! I/O structure and device queues.! Storage Structure & Caching! Hardware Protection! Dual Mode Operation
Processing Large Amounts of Images on Hadoop with OpenCV
Processing Large Amounts of Images on Hadoop with OpenCV Timofei Epanchintsev 1,2 and Andrey Sozykin 1,2 1 IMM UB RAS, Yekaterinburg, Russia, 2 Ural Federal University, Yekaterinburg, Russia {eti,avs}@imm.uran.ru
Intelligent Heuristic Construction with Active Learning
Intelligent Heuristic Construction with Active Learning William F. Ogilvie, Pavlos Petoumenos, Zheng Wang, Hugh Leather E H U N I V E R S I T Y T O H F G R E D I N B U Space is BIG! Hubble Ultra-Deep Field
Performance Optimization Guide Version 2.0
[Type here] Migration Optimization Performance Optimization Guide Version 2.0 Publication Date: March 27, 2014 Copyright 2014 Metalogix International GmbH. All Rights Reserved. This software is protected
Lecture Notes, CEng 477
Computer Graphics Hardware and Software Lecture Notes, CEng 477 What is Computer Graphics? Different things in different contexts: pictures, scenes that are generated by a computer. tools used to make
İSTANBUL AYDIN UNIVERSITY
İSTANBUL AYDIN UNIVERSITY FACULTY OF ENGİNEERİNG SOFTWARE ENGINEERING THE PROJECT OF THE INSTRUCTION SET COMPUTER ORGANIZATION GÖZDE ARAS B1205.090015 Instructor: Prof. Dr. HASAN HÜSEYİN BALIK DECEMBER
farmerswife Contents Hourline Display Lists 1.1 Server Application 1.2 Client Application farmerswife.com
Contents 2 1 System requirements 2 1.1 Server Application 3 1.2 Client Application.com 1 1 Ensure that the computers on which you are going to install the Server and Client applications meet the system
Integrating NLTK with the Hadoop Map Reduce Framework 433-460 Human Language Technology Project
Integrating NLTK with the Hadoop Map Reduce Framework 433-460 Human Language Technology Project Paul Bone [email protected] June 2008 Contents 1 Introduction 1 2 Method 2 2.1 Hadoop and Python.........................
Several tips on how to choose a suitable computer
Several tips on how to choose a suitable computer This document provides more specific information on how to choose a computer that will be suitable for scanning and postprocessing of your data with Artec
AT&T Connect System Requirements for End Users v9.5. March 2013
AT&T Connect System Requirements for End Users v9.5 March 2013 Product: AT&T Connect Title: System Requirements for End Users Version: v9.5 Publication date: 3/6/2013 Reference number: CONSYSCL01012 Revision
C# and Other Languages
C# and Other Languages Rob Miles Department of Computer Science Why do we have lots of Programming Languages? Different developer audiences Different application areas/target platforms Graphics, AI, List
ACE: After Effects CC
Adobe Training Services Exam Guide ACE: After Effects CC Adobe Training Services provides this exam guide to help prepare partners, customers, and consultants who are actively seeking accreditation as
Order Information. Step-by-Step Guide for Ordering MAXQDA
Order Information Step-by-Step Guide for Ordering MAXQDA This document provides you with an overview of all the different configuration options for MAXQDA, so you can figure out which license is right
Chapter 2 Installing ShareScope
What you will learn in this chapter: Minimum hardware requirements. How to run ShareScope on a Mac. Where to find your account number & password. How to download the ShareScope software. How to install
MACHINE ARCHITECTURE & LANGUAGE
in the name of God the compassionate, the merciful notes on MACHINE ARCHITECTURE & LANGUAGE compiled by Jumong Chap. 9 Microprocessor Fundamentals A system designer should consider a microprocessor-based
Understanding Operating System Configurations
Lesson 2 Understanding Operating System Configurations Learning Objectives Students will learn to: Understand Standard User Versus Administrative User Accounts Understand Types of UAC Prompts and Levels
GLM 2.0 Version 2.0.0 for Windows
Nov 2014 Nov 7, 2014 Head office Genelec Oy, Olvitie 5, FIN-74100 IISALMI, FINLAND Phone: +358 17 83 881, Telefax: +358 17 812 267 E-mail: [email protected] Release Note GLM 2.0 Version 2.0.0 for Windows
Choosing a Computer for Running SLX, P3D, and P5
Choosing a Computer for Running SLX, P3D, and P5 This paper is based on my experience purchasing a new laptop in January, 2010. I ll lead you through my selection criteria and point you to some on-line
Didacticiel Études de cas. Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka.
1 Subject Association Rules mining with Tanagra, R (arules package), Orange, RapidMiner, Knime and Weka. This document extends a previous tutorial dedicated to the comparison of various implementations
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
Technical Data Sheet SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers
661 Solutions for ARINC 661 Compliant Systems SCADE R17 Solutions for ARINC 661 Compliant Systems Design Environment for Aircraft Manufacturers, CDS and UA Suppliers SCADE Solutions for ARINC 661 Compliant
NAS 249 Virtual Machine Configuration with VirtualBox
NAS 249 Virtual Machine Configuration with VirtualBox Configure and run Virtual Machines on ASUSTOR Portal with VirtualBox A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you
Advanced analytics at your hands
2.3 Advanced analytics at your hands Neural Designer is the most powerful predictive analytics software. It uses innovative neural networks techniques to provide data scientists with results in a way previously
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, [email protected],karur,india 2 M.Kumarasamy
Market Data + Services. Xentric Trade Machine. Algorithmic trading. Designated Sponsor Quoting.
Market Data + Services Xentric Trade Machine Algorithmic trading. Designated Sponsor Quoting. 2 Xentric Trade Machine Xentric Trade Machine 3 Tailor-made solutions give you a competitive edge Framework
