...Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information and automatically enters it into electronic database instead of the conventional way of manually retyping the text. Optical Character Recognition is a vast field with a...
Words: 3379 - Pages: 14
...Journal of Traffic and Logistics Engineering Vol. 2, No. 3, September 2014 A Car Monitoring System for Self Recording Traffic Violations Ahmed M. Elmahalawy Computer Science and Engineering Department, Faculty of Electronics Engineering, Minufiya University Menouf, 32952, El-Minufiya, Egypt Email: ahmed.elmahalawy@el-eng.menofia.edu.eg; a_elmhalaway@hotmail.com which ought to be considered as sufficiently independent. These two major sub-systems are: 1) the transaction subsystem and 2) the enforcement subsystem. [2] Another example is video technology applications for traffic management and safety. This technology offers both tangible and intangible benefits. Video technology requires a substantial up- front investment costs for the purchase and installation of equipment and training of staff. Due to the complexity of video systems and the rapid pace of change related to this technology, agencies may overlook some applications while using resources to implement less valuable applications. [3] Over the last few years there has been a growing interest in Intelligent Speed Adaptation (ISA), to solve the problem of exceeding the speed limits. ISA has the potential to significantly reduce the incidence and severity of road trauma in many countries all over the world. [4], [5] The remainder of this paper is organized as follows: Section 2 gives a background of previous work in this field. Overview of Self Recording Traffic Violations system is presented...
Words: 3119 - Pages: 13
...Hand Gesture recognition system provides us an innovative, natural, user friendly way of interaction with the computer which is more familiar to the human beings. Gesture Recognition has a wide area of application including human machine interaction, sign language, immersive game technology etc. By keeping in mind the similarities of human hand shape with four fingers and one thumb, this paper aims to present a real time system for hand gesture recognition on the basis of detection of some meaningful shape based features like orientation, centre of mass (centroid), status of fingers, thumb in terms of raised or folded fingers of hand and their respective location in image. The approach introduced in this paper is totally depending on the shape parameters of the hand gesture. It does not consider any other mean of hand gesture recognition like skin color, texture because these image based features are extremely variant to different light conditions and other influences. To implement this approach we have utilized a simple web cam which is working on 20 fps with 7 mega pixel intensity. On having the input sequence of images through web cam it uses some pre-processing steps for removal of background noise and employs K-means clustering for segmenting the hand object from rest of the background, so that only segmented significant cluster or hand object is to be processed in order to calculate shape based features. This simple shape based approach to hand gesture recognition can identify...
Words: 3301 - Pages: 14
...Revision Guide to CCEA ICT Contents [hide] * 1 Complete ICT Revision Guide (CCEA) * 2 Knowledge of ICT Components * 3 INPUT DEVICES * 4 OUTPUT DEVICES * 5 STORAGE DEVICES * 6 INFORMATION AND DATA * 7 DATA STRUCTURE * 8 DATA CHECKING * 9 DATA PORTABILITY * 10 DATA NETWORKS * 11 INTERNET, INTRANET AND WWW * 12 TRANSMISSION, BACKUP, TELECONFERENCING * 13 APPLICATIONS * 14 SOFTWARE PACKAGES * 15 VIRTUAL REALITY IN TRAINING, ENTERTAINMENT * 16 COMPUTERS IN CONTROL (REAL TIME) * 17 ON-LINE SERVICES * 18 SECURITY AND PRIVACY OF DATA * 19 HEALTH AND SOCIAL ISSUES * 20 EMPLOYMENT * 21 ICT IN MUSIC, LEISURE, ENTERTAINMENT | ------------------------------------------------- Knowledge of ICT Components 1. DIGITAL : • Discrete values or binary digit 2. PROCESSOR: • Control center of the computer 3. RAM:- • Volatile (temporary storage), working storage, holds programmes currently in use, • Used for writing to and reading. • Measured in gigabytes 4. ROM:- • Instructions computer needs to start, • Non-volatile (permanent storage), can’t be changed, only read • Stores the Boot up/Start up program for the PC START UP STEPS:- • Power up • Read ROM chip • Connect all in and output devices • Load DOS from hard drive. • Load windows from hard drive 5. CACHE:- • Temporary storage, • Stores most frequently used instructions, • Is RAM memory that the computer microprocessor can access more quickly. • Volatile (128kb-512kb). 6. DOS:- Disk Operating System...
Words: 6710 - Pages: 27
...------------------------------------------------- Top of Form Bottom of Form CORPORATE HISTORY 1995-1997 1995 * Larry Page and Sergey Brin meet at Stanford. (Larry, 22, a U Michigan grad, is considering the school; Sergey, 21, is assigned to show him around.) According to some accounts, they disagree about almost everything during this first meeting. 1996 * Larry and Sergey, now Stanford computer science grad students, begin collaborating on a search engine called BackRub. * BackRub operates on Stanford servers for more than a year—eventually taking up too much bandwidth to suit the university. 1997 * Larry and Sergey decide that the BackRub search engine needs a new name. After some brainstorming, they go with Google—a play on the word “googol,” a mathematical term for the number represented by the numeral 1 followed by 100 zeros. The use of the term reflects their mission to organize a seemingly infinite amount of information on the web. Back to top 1998 August * Sun co-founder Andy Bechtolsheim writes a check for $100,000 to an entity that doesn’t exist yet: a company called Google Inc. September * Google sets up workspace in Susan Wojcicki’s garage at 232 Santa Margarita, Menlo Park. * Google files for incorporation in California on September 4. Shortly thereafter, Larry and Sergey open a bank account in the newly-established company’s name and deposit Andy Bechtolsheim’s check. * Larry and Sergey hire Craig Silverstein...
Words: 11054 - Pages: 45
...Disseminating Organizational IT Security & Trouble Shooting When we talk about the increase security with proper authentication policies; infrastructure security is more than just firewalls and security patches. Most IT environments have some type of remote access. VPN, e-mail, and many other services expose your user accounts to the world. This article will focus on how to deal with user accounts of your current and former employees. Proper password aging policies will naturally take care of old or unused accounts. The idea behind password aging is that after a certain amount of time, a password expires. A password is less prone to compromise if it is changed frequently. Likewise, if an account is compromised, its usefulness will be limited to the amount of time left before the expiry timer concludes. Aging account passwords can reduce exposure if brute-force, social engineering, or sniffing attempts are successful. The strength of the password itself is also extremely important. It is imperative that the systems requiring users to change their passwords also enforce some level of strictness with regards to what passwords are accepted. An un-guessable password makes brute-force attacks the premiere method by which accounts are compromised mostly ineffective. An exhaustive brute-force attack will eventually discover all passwords, given enough time, but the idea is to use a password of sufficient length, so that it can’t be guessed in a reasonable amount of attempts. The successful...
Words: 3223 - Pages: 13
...-Aa posteriori distribution a priori distribution A.C. pulse abandoned connection abbreviated address calling abend aberration abnormal end abnormal reflection abnormal termination abort sequence abort, to aborted connection absolute code absolute delay absolute error absolute error of measurement absolute instruction absolute instrument absolute pressure absolute stability of a system absolute system of electrical units absolute-value device absolutely stable system absolutely summable absorb, to absorbant absorbing state absorption cross-section absorption loss absorption modulation absorption absorption spectrum absorption trap absorptive attenuator abstract abstract symbol abstract syntax tree abstraction AC AC/DC converter accelerate, to accelerated test accelerating relay acceleration of gravity sonsal dağılım önsel dağılım almaşık akım darbesi yarıda kalan bağlantı kısa numarayla arama olağandışı sonlanma sapınç olağandışı son olağandışı yansıma olağandışı son durdurma dizisi (bitirmeden) durdurmak yarıda kalan bağlantı makina dilindeki kod, mutlak kod mutlak gecikme mutlak hata mutlak ölçüm hatası makina dilindeki komut, mutlak komut mutlak ölçü aleti mutlak basınç bir dizgenin mutlak kararlılığı elektrik birimlerinin mutlak sistemi mutlak değer aygıtı mutlak kararlı dizge mutlak toplanır soğurmak soğurgan soğurucu durum etkin soğurma alanı soğurum yitimi enerji soğurum kiplenimi soğurulma, soğurum soğurum izgesi soğurum tuzağı soğurgan zayıflatıcı 1) öz; 2) soyut soyut...
Words: 38690 - Pages: 155
...Traffic Engineering Design This page intentionally left blank Traffic Engineering Design Principles and Practice Second edition Mike Slinn MVA Limited, MVA House, Victoria Way, Woking GU21 1DD, UK Paul Matthews MVA Limited, Third Floor, One Berners Street, London W1T 3LA, UK Peter Guest 8 The Grove, Farnborough, Hampshire GU14 6QR, UK AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK • OXFORD PARIS • SAN DIEGO • SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Elsevier Butterworth-Heinemann Linacre House, Jordan Hill, Oxford OX2 8DP 30 Corporate Drive, Burlington, MA 01803 First published by Arnold, 1998 Reprinted 2003 Second edition 2005 Copyright © 2005, Elsevier Ltd. All rights reserved. No part of this publication may be reproduced in any material form (including photocopying or storing in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright holder except in accordance with the provisions of the Copyright, Designs and Patents Act 1988 or under the terms of a license issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, England W1T 4LP. Applications for the copyright holder’s written permission to reproduce any part of this publication should be addressed to the publisher. Permissions may be sought directly from Elsevier’s Science and Technology Rights Department in Oxford, UK: phone: (ϩ44) (0) 1865 843830; fax: (ϩ44) (0) 1865 853333;...
Words: 83129 - Pages: 333
...the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia, b ©Martin Dohrn/Science Photo Library; p.83 © Norman Chan – Fotolia; p.85 © Studio 10 /Alamy; p.86 © Brennan JB7 produced by Martin Brennan; p.87 © Sergojpg/Fotolia; p.88 and 110 b © Jürgen Fälchle/Fotolia; p.108 t © Andrew Brown/Fotolia, b © Stanford Eye Clinic/Science Photo Library; p.114 © Tan Kian Khoon – Fotolia. 3 Hachette UK’s policy is to use papers that are natural,...
Words: 49691 - Pages: 199
...CHAPTER 1: INTRODUCTION In the beginning of civilization, people used fingers and pebbles for computing purposes. In fact, the word 'digit us' in Latin actually means 'finger' and 'calculus' means 'pebble'. This gives a clue into the origin of early computing concepts. With the growth of civilization, the computing needs also grew. The need for a mechanism to perform lengthy calculations led to the invention of the first calculator and then the computers. The term 'computer' is derived from the word 'compute', which means to calculate. A computer is an electronic machine, devised for performing calculations and controlling operations that can be expressed either in logical or numerical terms. In simple words, a computer is an electronic device that performs mathematical and non-mathematical operations with the help of instructions to process the data to achieve desired results. Although the application domain of a computer depends totally on human creativity and imagination, it covers a huge area of applications including education, industries, government, medicine, scientific research, law and even music and arts. This chapter provides a detailed description of evolution, generations and characteristics of computers along with their classification and applications. CHAPTER 2: CHARACTERISTICS OF COMPUTERS Man developed computers so that it could perform intricate operations such as calculation and data processing or entertain him. Today, computers are everywhere—in...
Words: 9431 - Pages: 38
...Kelcie Jeffries Money & Banking Mr. Foster March 8, 2014 How Technology has changed the Banking World over Time The ATM “In 1939, Luther Simjian patented an early and not-so-successful prototype of an ATM. However, some experts have the opinion that James Goodfellow of Scotland holds the earliest patent date of 1966 for a modern ATM, and John D White in the US is often credited with inventing the first free-standing ATM design. In 1967, John Shepherd-Barron invented and installed an ATM in a Barclays Bank in London. Don Wetzel invented an American made ATM in 1968. However, it wasn't until the mid to late 1980s that ATMs became part of mainstream banking” (Bellis). Although we can see that it is not clear on who invented the ATM, I think they all played an important role in developing what we have in today’s world. Don Wetzel was the most recent with installing one of the first ATMs in American and him and two other men invented what we know as today as the ATM card. The ATM made its first showcase on the outside at the Rockville Center, New York Chemical Bank. Also, another interesting fact I learned about this first ATM was that it only gave you cash it did not tell you your balance or let you transfer funds like we can at today’s ATM. “The ATM we know today was later installed and invented in 1971 and was called the total teller” (Bellis). During this era not every customer could have the right to an ATM card, banks would only let credit card holders have access...
Words: 2669 - Pages: 11
...Do The Deep Information Computer Technology Author Musisi Boney 2013 EDITION Authored by Musisi Boney; +256788489095 2 Table of contents Topics Page Introduction To Computer …………………………………………………….. 5 History & Evolution Of Computers ………………………………………….... 7 Computer Generation …………………………………………………………. 11 Computers Today ……………………………………………………………... 15 Computer Classification ………………………………………………………. 19 Computer System ……………………………………………………………... 25 Computer Hardware ………………………………………………………….. 27 - Input devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER ...
Words: 30445 - Pages: 122
...input unit consists of one or more input devices. Keyboard is the one of the most commonly used input device. Other commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform the following functions. Accept the data and instructions from the outside world. Convert it to a form that the computer can understand. Supply the converted data to the computer system for further processing. Storage Unit: The storage unit of the computer holds data and instructions that are entered through the input unit, before they are processed. It preserves the intermediate and final results before these are sent to the output devices. It also saves the data for the later use. Memory Size: All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is represented by an 8 bit code. The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte space. Byte is the space occupied in the memory. The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte). One KB is equal to 1024 bytes and one MB is equal to 1000KB. The size of the primary storage in a typical PC usually starts at 16MB. PCs having 32 MB, 48MB, 128 MB, 256MB memory are quite common. Output Unit: The output unit of a computer provides the information and results of a computation to outside world. Printers, Visual Display Unit...
Words: 9444 - Pages: 38
...Deep Learning more at http://ml.memect.com Contents 1 Artificial neural network 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Improvements since 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Network function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.2 Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.3 Learning paradigms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.4 Learning algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Employing artificial neural networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.5 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.1 Real-life applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.2 Neural networks and neuroscience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.6 Neural network software ...
Words: 55759 - Pages: 224
...TELECOMMUNICATION SWITCHING AND NETWORKS TElECOMMUNICATION SWITCHING NffiWRKS AND THIS PAGE IS BLANK Copyright © 2006, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (10) : 81-224-2349-3 ISBN (13) : 978-81-224-2349-5 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE This text, ‘Telecommunication Switching and Networks’ is intended to serve as a onesemester text for undergraduate course of Information Technology, Electronics and Communication Engineering, and Telecommunication Engineering. This book provides in depth knowledge on telecommunication switching and good background for advanced studies in communication networks. The entire subject is dealt with conceptual treatment and the analytical or mathematical approach is made only to some extent. For best understanding, more diagrams (202) and tables (35) are introduced wherever necessary in each chapter. The telecommunication switching is the fast growing field and enormous research and development are undertaken by...
Words: 115682 - Pages: 463