Free Essay

Document

In:

Submitted By pawangup
Words 2431
Pages 10
International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 9, December 2013

Real Time Traffic Density Count using Image Processing
Naeem Abbas

Muhammad Tayyab

M.Tahir Qadri

Sir Syed University of Engg &
Technology
University Road
Karachi-75300, Pakistan

Sir Syed University of Engg &
Technology
University Road
Karachi-75300, Pakistan

Sir Syed University of Engg &
Technology
University Road
Karachi-75300, Pakistan

ABSTRACT
Due to the increase in the number of vehicles day by day, traffic congestions and traffic jams are very common. One method to overcome the traffic problem is to develop an intelligent traffic control system which is based on the measurement of traffic density on the road using real time video and image processing techniques. The theme is to control the traffic by determining the traffic density on each side of the road and control the traffic signal intelligently by using the density information. This paper presents the algorithm to determine the number of vehicles on the road.
The density counting algorithm works by comparing the real time frame of live video by the reference image and by searching vehicles only in the region of interest (i.e., road area). The computed vehicle density can be compared with other direction of the traffic in order to control the traffic signal smartly.

Keywords
Traffic density count, image processing, intelligent controlling of traffic.

1. INTRODUCTION
The number of vehicles on the road increases day by day therefore for the best utilization of existing road capacity, it is important to manage the traffic flow efficiently. Traffic congestion has become a serious issue especially in the modern cities. The main reason is the increase in the population of the large cities that subsequently raise vehicular travel, which creates congestion problem [1-5]. Due to traffic congestions there is also an increasing cost of transportation because of wastage of time and extra fuel consumption [2].
Traffic jams also create many other critical issues and problems which directly affect the human routine lives and some time reason for life loss [6-8]. For example if there is an emergency vehicle like ambulance on the road with the critical patient on board. In that situation if an ambulance gets stuck in a heavy traffic jam then there are high chances that the patient cannot reach the hospital on time. So it is very important to design an intelligent traffic system which controls traffic intelligently to avoid accidents, collisions and traffic jams [7-8]. The most common reason of traffic congestion in third world countries is an inefficient traffic signal controlling which affects the traffic flow. For example if one lane has less traffic and the other lane with huge traffic but the duration of green light for both lanes is same then this is the waste of available resources and is inefficient. By considering the above example if the lane with higher traffic density should switch on the green signal light for a longer period than the lane with lesser density.

There are lots of techniques proposed to design an intelligent traffic system, for example, fuzzy based controller and morphological edge detection technique are proposed in [1].
This technique is based on the measurement of the traffic density by correlating the live traffic image with a reference image. The higher the difference is, higher traffic density is detected. In [9] another technique is proposed to design an intelligent traffic system, which is based on four lane system in which time is allocated according to the number of vehicles on the lane. This paper also proposes an emergency vehicle detection, within a limited scenario. In [10] another technique is proposed which is based on neural networks, which identify the vehicles and traffic density by processing the traffic videos. The technique proposed in [11] is based on computing the traffic load by comparing two images, the reference image and the live traffic image. They improved object detection using image segmentation and noise removal operations.
In [2] another technique is proposed to control the traffic signal by using image processing, in which they first selected the reference image which is the image with no vehicles or less vehicles and every time matching real time images with that reference image. On the basis of the percentage of matching traffic lights controlled. But in this technique image matching is performed by the edge detection.
The reference subtraction is a complex technique, with limited outcomes. This paper presents a density analyzer scheme based on counting the number of vehicles in the present image, which provides us more accurate information for signal decision making.
The paper is organized as follows: section II explains the design of the system. Section III discusses the working of the system. Finally section IV concludes the paper followed by the key references used in the work results followed by the key references used in this work.

2. SYSTEM MODEL
The work is divided into 4 parts. The first part is to process the video signal and image acquisition from fixed camera using MATLAB. The second part is to select the target area where the vehicles could be present by using image cropping technique. The third part is the object detection which is performed by enhancing features of the image. Finally, the last part is the density counting, where the number of vehicles are being counted. The overall block diagram of the proposed system is illustrated below.

16

International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 9, December 2013

Input From
Camera

Image
Cropping

Object
Detection

Real- Time Traffic
Monitoring

Image
Acquisition

Density
Count

Fig 1: Block Diagram of the Proposed Model

2.1 Processing of Video Signal and Image
Acquisition
The work starts with processing the live video using
MATLAB software. The video camera is stationary, which is mounted on the pole near the traffic signal. The next stage is to extract the frames continuously from the real time video coming from the stationary camera. This raw digital data is further processed by converting the images from RGB (RedGreen-Blue) to grayscale in order to further process the images. Initially the system captures the image of a vacant road when there is no vehicle present; this image is used as a reference image.
Fig 2(a) shows the reference image which is captured from the live video when the road is empty.
The next section explains the procedure to select region of interest where the vehicles are present.

2.2 Image Cropping
The second step is to select the targeted area by designing image cropping algorithms in MATLAB. The purpose of cropping is to identify the road region where the vehicles are present and exclude the unnecessary background information.
This unnecessary information is fixed in every frame of the live video because the camera is stationary. To crop the required area, reference image has been used, Fig. 2(a), which has no road traffic. First, a binary image of having the same dimensions is created, as in the reference image, then the road area has been shaded white, and the leftover region as black, as shown in Fig. 2(b). Finally, the multiplication of the reference image with the cropping black and white image results in the final desired target area which is illustrated in
Fig 2 (c).
The next part explains the procedure of object detection.

(a)
(b)
(c)
Fig 2: (a) Reference Image taken from the Live Video from [12], (b) Defining the region of interest, (c) Selection of the target area The next step is to convert both images; the reference image
2.3 Object Detection and the real time image into grayscale and then the absolute
The third step is the object or vehicle detection in order to difference of two images will be determined. Since the identify and count the vehicles which are present in the dimensions of the road are fixed therefore the difference targeted area shown in Fig. 2(c). To perform the object image only highlights the presence of vehicles in the desired detection, first the frame from the real time video sequence is target area. The difference image is illustrated in Fig. 3(b). extracted as illustrated in Fig 3(a).

17

International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 9, December 2013

(a)

(b)

Fig 3: (a) Real-time image extracted from the live video taken from [12], (b) Difference of reference and real time image
Fig. 3(b) shows the presence of vehicles in the desired target area but the visibility of the vehicles is not much clearer in that image. In order to improve the visibility of the vehicles, the difference image is converted to a binary image based on a threshold value. The resulting binary image is shown in Fig.
4(a), where the presence of any object is more improved. In

order to determine only vehicles in the desired area, multiplication of the cropped image, Fig. 2(b), with the enhanced version of the difference image, Fig. 4(a), is carried out. The product image is illustrated in Fig. 4(b). In Fig. 4(b), the unnecessary information is filtered out and it only highlights the presence of vehicles in the desired area.

(a)

(b)

Fig 4: (a) Binarization of the difference Image, (b) Image highlighting the presence of vehicles in the targeted area

2.4 Traffic Density
The next step is to calculate the traffic density in the desired target area. In order to determine the traffic density, the vehicles are marked first and then their numbers are counted.
The algorithm search for a set of connecting pixels. In order to consider a connected region as a vehicle, a minimum threshold has been defined. However, it is possible that more than one region of a vehicle is detected using the above criteria. This problem could be overcome by finding the

overlapping bounding boxes of the selected regions and thus smaller and highly overlapping regions are filtered out. The results are shown in Fig. 5, where each detected vehicle is surrounded by a bounding box and the top-left region shows the number of vehicles detected on the road, as currently it is
6.

Fig 5: Image shows the detected and counted vehicles

18

International Journal of Computer Applications (0975 – 8887)
Volume 83 – No 9, December 2013

3. WORKING OF THE SYSTEM
The research is carried out in order to reduce the traffic congestion by calculating the traffic density in a particular direction of the road by using image processing algorithms.
The system starts with an image acquisition process in which the live video is processed by the stationary camera, mounted on any pole. Then one frame per second continuously extracts from the live video and processed each frame by converting it into grayscale. For the reference image an empty road image was selected, when there is no traffic on the road. The second step is the image cropping in which, the targeted area is selected, the area where the vehicles are present and filtered out unnecessary surrounding information. Next phase, determines the presence of objects in live video by taking the absolute difference of each extracted frame with the reference image. Then the presence of objects is enhanced by binarization of the difference image. Then the final step is to calculate the traffic density in the desired target area by counting the number of vehicles in that region. To perform this, first, the vehicles are marked in the targeted region by scanning all the connected objects, and filtering out smaller and overlapping objects.
In order to deal with noise added due to different lighting conditions at different times of the day, a set of reference images have been captured and stored at different time slots of the day. The system cycles through these reference images according the current time of the day.

4. CONCLUSION AND FUTURE WORK
This paper discusses a method for estimating the traffic density on the lane by using image processing. The advantages of this proposed technique is that there is no need to use aerial imagery or complex sensor based systems. The proposed system is very cost effective as it does not require installation of any additional devices, such as RFIDs.
This work can be enhanced further by proposing a system which identifies the presence of emergency vehicles (like an ambulance or fire brigade) and by giving preference to those emergency vehicles. Secondly, it can be enhanced by using
VANETs (Vehicular Ad-hoc Networks) as it provides road safety and intelligent transport system [3].

5. REFERENCES
[1] Madhavi Arora, V. K. Banga, “Real Time Traffic Light
Control System”, 2nd International Conference on
Electrical,
Electronics and Civil
Engineering
(ICEECE'2012), pp. 172-176, Singapore, April 28-29,
2012.

IJCATM : www.ijcaonline.org

[2] Sabya sanchi kanojia, “Real –time Traffic light control and Congestion avoidance system”, International Journal of Engineering Research and Applications (IJERA), pp.925-929, Vol. 2, Issue 2,Mar-Apr 2012.
[3] Muhammad Tayyab, “Implementation of Restoration
Path Using AODV in VANETs” Master’s Dissertation at
Brunel University London, UK.
[4] Anthony J. Venables, “Evaluating Urban Transport
Improvements”, Journal of Transport Economics and
Policy, Vol. 41, No.2 , pp. 173-188, May, 2007.
[5] Tommy Gärling, Geertje Schuitema, “Travel Demand
Management Targeting Reduced Private Car Use”,
Journal of Social Issues, Vol. 63, Issue 1, pp. 139–
153, March 2007
[6] Papageorgiou M., Diakaki C., Dinopoulou V., Kotsialos,
A.,“Review of road traffic control strategies”,
Proceedings of IEEE, Vol. 91, Issue 12, pp. 2043-2067,
November 2004.
[7] Georgios Vigos, Markos Papageorgioua, Yibing Wangb,
“Real-time estimation of vehicle-count within signalized links”, Journal of Transportation Research Part C:
Emerging Technologies, Volume 16, Issue 1, pp.18–35,
February 2008.
[8] Michael W. Szeto and Denos C. Gazis, “Application of
Kalman Filtering to the Surveillance and Control of
Traffic Systems”, Journal of Transportation Science, vol.
6 pp.. 4419-439 , November 1972.
[9] Vikramaditya Dangi, Amol Parab, Kshitij Pawar & S.S
Rathod, “Image Processing Based Intelligent Traffic
Controller”, Undergraduate Academic Research Journal
(UARJ), Vol.1, Issue 1, 2012
[10] Celil Ozkurt and Fatih Camci,“ Automatic Traffic
Density Estimation and Vehicle Classification For
Traffic Survillance Systems Using Neural Networks”,
Journal
of
Mathematical
and
Computational
Applications, Vol. 14, No. 3, pp. 187-196, 2009.
[11] Pratishtha Gupta, G.N Purohit, Sweta Pandey, “Traffic
Load Computation for Real Time Traffic Signal
Control”, International Journal of Engineering and
Advanced Technology, Vol. 2, Issue 4, April 2013.
[12] Live Video of CCTV Camera for Traffic Monitoring in
Stockholm,
available at http://www.trafiken.nu/sv/Stockholm/trafiklaget/Kamero r/Roslagsvagen/Albano/ 19

Similar Documents

Free Essay

Document

...Travel Document I-131 Prepared for Ragnagnewende Jean De Dieu SALAMBERE Last Printed On 03/17/2015 24/7 Customer Care Hotline: 1-800-814-1555 or email us at cs@us-immigration.com and we'll respond within 24 hours Next Steps 1. Read and Follow the Application Filing Instructions. 2. Sign and Date Your Printed Application. 3. Prepare Supporting Documents, as Instructed.* 4. Prepare Filing Fee, if Necessary.* 5. Attach Supporting Documents and Payment. 6. Photocopy Your Signed Application, Supporting Documents and Payment, and Keep the Copies for Your Records. 7. Send Your Original Signed Application, Supporting Documents, and Payment to USCIS (Formerly the INS) at the Address Listed in the Filing Instructions. 8. Do Not Send This Cover Page or Your Filing Instructions. *You may or may not have to send photographs, supporting documents, or a filing fee. Your Forms Filing Instructions will specify everything that is required. www.us-immigration.com 1 of 11 DO NOT SEND THIS COVER PAGE TO USCIS Guiding You Through Citizenship, Green Card and Visas Applications Congratulations, Ragnagnewende! you have reached the final stage of the application process! Following are step-by-step instructions for completing your application and submitting it to U.S. Citizenship and Immigration Services (USCIS). These instructions have been customized for you based on the answers you gave on your questionnaire. Note: Be sure to make a copy of your final application and supporting documents before...

Words: 4995 - Pages: 20

Premium Essay

Document Retention

...Record Keeping has been around for a long time now. Depending on the laws that governed us, we are requiring to maintain records. A good document retention policy could last up to seven years. A litigation hold is basically keeping all records pertaining to the case, or until the case is over. Depending on the records at hand, state and federal laws require organizations to maintain records. During litigation hold notice a good checklist to follow, is a good idea. A document retention policy basically establishes a policy that keeps records of documents and files for a certain amount of period, so that a court can examine a business practices over a time period. Courts and juries don’t have little tolerance for organizations that don’t maintain their records. They often give penalized corporations for keeping their records, by handing out big fines. A document retention policy is established after a litigation hold is given to an organization. Depending on the litigation hold certain documents must be maintain in order to prevent penalties. So if the litigation hold is pertaining to a HIPPA violation at a college, the college must maintain all records to include, emails, documents, faculty involvements, telephone conversations, backup tapes, hard drives, flash drives and etc. The policy has to be clear and understanding to faculty. The files must be in preserved in original format, and cannot be altered at any time. The Sarbanes-Oxley Act of 2002 was passed through the senate...

Words: 1153 - Pages: 5

Premium Essay

Scribd Upload a Document Search Documents

...Scribd Upload a Document Search Documents Explore Documents Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent People Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up | Log In Your Browser is Outdated Because you are not using a modern browser you will not have access to all of Scribd's features. Please consider upgrating to a modern browser: Close This Message Five Paragraph EssayI have never read a story like The Unicorn in the Garden and it definitely it was one of the beststories I have ever read. At the end of the story you don't know if the man really saw an unicorn or made it up so his wife would call the police. It really doesn't matter if he saw the unicorn or made it upthe point is that he gained what he wanted he got rid of his wife.The story also teaches a lesson, every little bad thing you do to someone can backfire twice ashard. The woman had called the police and the psychiatrist in the most meanest intention because shewanted to get rid of him, she did not love him after all. So what the man did was that he gave her of her own medicine, when the police asked if he saw an unicorn he replied using the same words that she hadused previously when he told her that there...

Words: 1015 - Pages: 5

Premium Essay

Business Documents Nvq

...1.1 Describe different types of business documents that may be produced and the format to be followed for each. Business cards: These are used to give the customer information on how to contact the company. These can be electronically formatted in Word and then formatted on card when printed. Fax Document: Another type of document used in business is a Fax document; these are very useful in business and are the fastest ways to transmit documents. These are in paper format, either in colour or black and white. Agenda: Agendas tell you what is going to take place. They help people get organised so that they know exactly what they should do and what is going to happen. These are in paper format when taken to meetings, and can be distributed electronically....

Words: 1835 - Pages: 8

Free Essay

Online Document Scanning

...internet. The internet revolution has change the way of doing things. This is not the time you should worry that your document will be destroyed by rainwater, fire, termites or even stolen. Our company carries all your document management worries by scanning them and storing them in your preferred online archives. Our company has a wealthy of experience because it is lead by technology gurus, thereby guaranteeing quality and reliable services to all our customers. Scanning large volumes of documents is risky. It therefore requires skills, swift hands and people who are detail oriented, which we guarantee. Our company specializes in document management and document scanning. Our major objective is keeping your records safely and securely online. We transform all your hardcopy documents into online stored texts or digital images that you can access anytime provided you have the internet. We eliminate the need for you and your business to have file cabinets by scanning and storing your documents digitally. Besides scanning and storing your documents as digital images or texts, we also store them in form of DVDs and SFTPs. How we do our job Upon contacting us for our services, we pick your documents and take them to our scanning center. Alternatively, we scan the documents at our customer sites if they prefer it that way. After receiving the first batch of documents, we immediately scan them. The scanned copies are sent to the customer for assessment. Upon the customer’s approval,...

Words: 412 - Pages: 2

Free Essay

Document Based Essay

...Document Based Question Essay Outline Use this 5 paragraph form. Make sure you use all of the documents. Groups for body paragraphs don’t have to be an equal number of documents and documents can be used in more than one group. There must be at least 2 documents in a group. Use the Author’s name immediately followed by document number (i.e.Stearns, #4) for easy reference. 1) Thesis (try to use 1 detailed sentence). Remember to restate the question as a statement, and then use the rule of 3 for your blueprint. Don’t put document numbers in thesis. Watch for questions that are comparative or change over time. 2) Body 1 Thesis (1st of your 3, after body thesis list doc. for group; i.e. #2, 5, 8) POV Statement for document # 2 (Use at least two sentences) 1st sentence include the author (doc#), background, and its meaning. 2nd sentence explain why the author has their point of view or POV) POV Statement for document # 5 (Use at least two sentences) POV Statement for document # 8 (Use at least two sentences) Additional document remember to tell the type of document, who it is from, and why it is needed by tying it back to the thesis) 3) Body 2 Thesis (2nd of your 3, after body thesis list doc. for group; i.e. #1, 9) POV Statement for document # 1 (Use at least two sentences) 1st sentence include the author (doc#), background, and its meaning. 2nd sentence explain why the author has their point of view or POV) POV Statement for document # 9 (Use at least...

Words: 411 - Pages: 2

Free Essay

Document Retention Policy

...Premier Collage | Document Retention Policy | Litigation Hold Notice | | | 8/26/2113 | Table of Contents 1.0 POLICY STATEMENT ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐---‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 2.0 PURPOSE ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 3.0 APPLICABILITY ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐--‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 4.0 DEFINITIONS ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 1. Official Records Retention and Disposition Schedules ------------------------------------------------------------- 5 2. File Breaking ------------------------------------------------------------------------------------------------------------------- 5 3. Litigation Hold -----------------------------------------------------------------------------------------------------------------6 4. File Integrity ------------------------------------------------------------------------------------------------------------------- 6 5. File Maintenance ------------------------------------------------------------------------------------------------------------- 6 6. Personally Identifiable Information ------------------------------------------------------------------------------------- 6 7. Confidential Information ----------------------------------...

Words: 4408 - Pages: 18

Free Essay

Checkpoint: Knowing Where You Placed Your Document

...CheckPoint: Knowing Where You Placed Your Document By: Juan C. Williams University of Phoenix- IT 206 Dr. Chris Barrett, PMP 07/28/2011 From my experience, many individuals when saving a document save their documents into any random folder that comes up. Unfortunately this is cause for misplaced documents when trying to locate them at a later date. Thankfully, there are many helpful ways to locate recently saved documents. One step would be to click on the Office button which is located at the top left of your Microsoft Word document, and once the box drops down to the right-side panel will be the top nine recently saved documents. A quick reference would be to click Save and that will take you straight to your default Save designated folder. There are some various ways which have been utilized to lessen the routinely misplaced saved documents which will ultimately make it effortless to locate your recent and/or old files. First, you should create a title for your document, something that you will easily remember in the future to be able to locate it. Now if the document is important, it is best to save it in an accessible file such as your “My Documents” folder or your desktop. One recommendation would be to create a New Folder for example “School” that way you can create a less cluttered work space which will Inevitably help you end up locating files quicker. It is understandable to be in a hurry to save, but, in order to create...

Words: 288 - Pages: 2

Free Essay

Accounting Source Documents

...AxcIdentify the documents used to record business transactions. When coming to draw up the accounts a business needs documents to extract the figures from and also to evidence those figures, they can be collected from source documents, there are many documents for many transactions and they all have their own purposes and uses. It is also important to understand the difference between a Credit and a Debit entry to fully interpret the source documents. The basic rule of double entry bookkeeping is that for every debit there must always be an equal and corresponding credit. A Credit entry is any money that is entering the account. A Debit entry is any money that is leaving the account. Invoices: The seller of goods or services provides and invoice for the buyer, the invoice will contain the following information: * Addresses – the suppliers, the customers and the delivery address if it is different. * Dates – the order and the delivery date. * Reference – a unique invoice number will be present, together with the customer’s order number. * Description of the goods or services sold. * Value – the total amount that is owed by the customer. * Terms – when the invoice is due for payment and any discount that is available to the customer. The invoice informs the buyer how much is being paid for the goods or services. Credit Notes: Credit notes are sent from the supplier to the customer when an adjustment to the amount is required. This may for example...

Words: 715 - Pages: 3

Free Essay

Document Model Prototypes

...Document Object Model Prototypes, Part 1: Introduction Introduction This article is the first installment of a two-part series that introduces advanced JavaScript techniques in Windows Internet Explorer 8. Web applications have come a long way since the birth of the static Web page. Today, Web developers need improved programming functionality, flexibility, and features to enable them to build the next generation of Web applications. The Internet Explorer Web platform provides many of the features and functionality necessary to build those applications. Where the Web platform's built-in support ends, JavaScript, the principle scripting language used on the Web, is often used to code innovative new features that supplement the Web platform, cater to Web site specific scenarios, normalize differences between browsers, and so on. To further empower Web developers with the programming tools necessary to build new JavaScript scenarios that innovate, extend, and build-upon the Web platform, Internet Explorer 8 offers a collection of features that extend some of JavaScript's advanced functionality into the Document Object Model (DOM). This article provides an overview of JavaScript prototype inheritance and introduces the DOM prototypes feature available in Internet Explorer 8; Part 2 introduces a new type of JavaScript property called an accessor property (or getter/setter property). Prototypes in JavaScript To begin a discussion of DOM prototypes, it is crucial to understand...

Words: 3453 - Pages: 14

Free Essay

Business Case for Documents

...Documentum's CEO, is faced with the challenge of pursuing either a vertical or horizontal marketing strategy to route Documentum towards profitability.   Situation and Business Issues Documentum enjoys a leading role in an emerging and potentially lucrative space. But profiting from this opportunity will require overcoming several immediate hurdles including a limited customer base, formidable competitors and unforeseen development costs.  Key Information, Facts, Assumptions Documentum was founded in June 1990 by Howard Shao and John Newton, seasoned database engineers who aimed to develop a new class of software for automating the management of documents across an enterprise. Following three years of losses, Documentum gains traction by combining an elite management team with $5.8MM of Venture Capitalist funding.    Analysis Enterprise document management (EDM) is a new, paradigm-busting product category with few substitutes. The category growth is small, increasing at a rate of 1%-2% year over year . Competition within the EDM category is low, as no other company was developing the "whole elephant" solution. Profitability was extremely low, given the low number of customers and long lead time to develop and deliver the product solution. The combination of these characteristics wholly describes the EDM category as being in the Introduction Stage of the Category Life Cycle .     With regards to the Mode of Innovation analysis , Documentum is a new product in a new category3. No previous...

Words: 255 - Pages: 2

Premium Essay

The Document Object Model

...Document Object Model May 8, 2011 IT/238 Van Hook The Document Object Model (DOM) is an important part of creating animation and making web pages interactive. The Document Object Model is used with Dynamic HTML to help accomplish the interactive web pages that are used today. “Dynamic HTML(DHTML) refers to a combination of technologies that make Web pages dynamic…a combination of JavaScript, XHTML, CSS, and the Document Object Model” (Gosselin, 2008, pg. 485). The Document object Model is all the HTML that is displayed on a web page from the web browser. Each of the many elements contained in the web page are considered objects and can be controlled and changed by using JavaScript. The Document object Model gives you the ability to change these elements without the web page needed to be reloaded. The HTML DOM can be used to dynamically change the document object and to change and control elements like images, which can themselves be considered the image object. The Document object and the image object both contain methods and properties that can be used to dynamically change the web page. The methods used with the document object are close, open, getElementById, getElementsByName, getElementsByTagName, write and writeIn. The open method creates a new window or a frame. The close method closes the document that was opened with the open method. The getElementById method retrieves an element by the specified ID. The getElementsByName method retrieves an...

Words: 685 - Pages: 3

Premium Essay

Scanning Documents Into Pdf Files

...Scanning documents into PDF files If you have a scanner, you can easily convert paper documents to searchable PDF files for distribution, review, archival, or use as interactive forms. 1. Scan the document. First, make sure your scanner is connected to your computer and installed correctly. Then, in Adobe® Acrobat®, choose File > Create > PDF From Scanner. (In Microsoft® Windows®, choose a document preset, such as Black & White Document or Color Image, or choose Custom Scan.) Choose Create > PDF From Scanner to scan a document. If you’re not using a document preset, select scanning options, and then click Scan. Depending on your scanner, you may see other dialog boxes with additional options. Tip: If you’re using Windows and a WIA driver is installed for your scanner, just press the Scan button on your printer, and then choose Adobe Acrobat from the list of registered applications that appears on your computer. Select the scanner in the Acrobat Scan dialog box, and select a document preset or Custom Scan. You’ll be prompted after each page is scanned. To scan another page, select Scan More Pages, and click OK. When you’re finished, click Scan Is Complete, and click OK. 2. Optimize a scanned PDF file. Sometimes scanned PDF files contain more data than you need. To optimize a scanned PDF file, removing unnecessary data and reducing the file size, choose View > Tools > Document Processing, then choose Optimize Scanned PDF from the Tools Pane. Select the options...

Words: 519 - Pages: 3

Free Essay

The Guide for Writing Word Documents

...The Guide for Writing Word Documents in Microsoft Word for EasyChair Publication Andrei Voronkov1 and Kryštof Hoder1 1 University of Manchester, Manchester, U.K. andrei@voronkov.com, hoderk@cs.man.ac.uk Abstract In order to ease the lives of authors, editors, and trees, we present a manual and an example of the use of Microsoft Word and similar tools for creating documents for EasyChair-based electronic and on-paper publishing of workshop and conference proceedings. 1 Introduction The styles and parameters of this guide are designed for compliance with the requirements for publication in the EasyChair conference system (Voronkov, 2004), and are also applicable to the Procedia publications series by Elsevier Science. EasyChair is a free conference management system that is flexible, easy to use, and has many features to make it suitable for various conference models. It is currently probably the most commonly used conference management system (Voronkov, 2004). The use of EasyChair and this style for creating Procedia volumes is a pilot project between Elsevier Science and EasyChair. EasyChair publications accept documents written either in LaTeX or using a docx document format, which can be produced by Microsoft Word or LibreOffice. This guide explains how to produce the docx format in Microsoft Word. To achieve high quality of volumes, both LaTeX and Word documents should have the same layout and similar styles. This guide is provided for the users of Microsoft Word...

Words: 1834 - Pages: 8

Free Essay

Micro Strategies’ Document Management Solutions for Regional Banks

...Micro Strategies’ Document Management Solutions for Regional Banks meet the unique requirements and challenges of the Banking Industry. Regional Banks continue to look for ways to cost effectively process inbound paper and electronic documents. These firms are also looking to manage the access, control, and use of documents created and stored within numerous repositories throughout their organization. Regional Banking industry trends, including consolidations and the desire to centralize operational functions, have forced many financial institutions to seek ways to reign in the costs and inefficiencies associated with disparate document processes. Micro Strategies provides customers with the insight, industry awareness, and technical expertise necessary to design and implement efficient document processing solutions for all types of simple and complex business workflows specific to regional banks. Whether the system is to be used to address a single departmental need or as a firm-wide content management platform – addressing both individual line of business (LOB) requirements and document management needs across the organization – Micro Strategies offers targeted and scalable solutions built on industry leading technology. Reduce cost of operations with improved document processing Increase efficiency allowing less staff to manage increasing number of documents Faster processing of customer documents for new account openings Improve customer service with greater...

Words: 600 - Pages: 3