Free Essay

Human Face Detection and Recognition Using Web-Cam

In:

Submitted By dancourbano
Words 1996
Pages 8
Journal of Computer Science 8 (9): 1585-1593, 2012
ISSN 1549-3636
© 2012 Science Publications
Human Face Detection and Recognition using Web-Cam
Petcharat Pattanasethanon and Charuay Savithi
Depatment of Business Computer, Faculty of Accountancy and Management,
Mahasarakham UniversityKamreang, Kantharawichai, Mahasarakham 44150, Thailand
Abstract: Problem statement: The illuminance insensitivity that reflects the angle of human facial aspects occurs once the distance between the object and the camera is too different such as animated images. This has been a problem for facial recognition system for decades. Approach: For this reason, our study represents a novel technique for facial recognition through the implementation of Successes
Mean Quantization Transform and Spare Network of Winnow with the assistance of Eigenface computation. After having limited the frame of the input image or images from Web-Cam, the image is cropped into an oval or eclipse shape. Then the image is transformed into greyscale color and is normalized in order to reduce color complexities. We also focus on the special characteristics of human facial aspects such as nostril areas and oral areas. After every essential aspectsarescrutinized, the input image goes through the recognition system for facial identification. In some cases where the input image from the Web-Cam does not exist in the database, the user will be notified for the error handled. However, in cases where the image exists in the database, that image will be computed for similarity measurement using Euclidean Distance measure from the input image.
Results and Conclusion: The result of our experiment reveals that the recognition process of 150 images in the database and 10 images from the Web-Cam provides 100% accuracy in terms of recognition. The runtime in this case is at 0.04 sec.
Key word: Successes Mean Quantization Transform (SMQT), Neural Network (NN), Histogram
Equalization (HE), Local Binary Patterns (LBP)
INTRODUCTION
One of the most challenging tasks that a facial recognition retrieval model has to tackle is the efficiency to identify the accurate match with the least runtime result. From most video files, blurry lighting has made it a disadvantage to identify facial clarity
(Agarwal et al., 2010). In a constantly moving environment such as personal vehicles, only certain parts of the overall facial are captured. Therefore, it is even more demanding to develop a capture model and recognition model from Web-Cams (Zhu et al., 2010).
However, in this study, we have developed a model that provides the solution for both models to be met.
There are two critical stages for the model to follow, which are the Facial Detection stage and the Facial
Recognition stage. The purpose of this research is to develop a facial recognition model which can accurately predict or match the subject's image from our database. Input image can be either from the camera storage or the database itself. The essential parts of human facial characteristics consist of eyes, nostril shapes, mouth shapes and skin. After the input image is uploaded, we set the limitation for its edged, compute for the area of human skin, crop the facial shape into and eclipse shape, convert the color into greyscale and normalize the color to reduce color complexities (Micael et al., 2007). The image or data is then transformed using Successes Mean Quantization
Transform (SMQT) technique and match with the database referencing the similarity measurement of both images. Nonetheless, if the image does not exist in the database, the input data will be kept in the database and the system will notify the user. On the other hand, if the image exists in our database, the system will compute for similarity measurement from the
Euclidean Distance of the image exist in our database.
Crimes, homicides and assaults are literally the primary problems of various countries. In some countries, social security is not provided equally to the entire population due to the low financial support for such over-prized system (Paschalakis and Bober, 2003). Our work supports low cost and highly productive system in order to assist organizations such as government, retails, shopping centers, or even private businesses that require sufficient security provider. The other aspect that this system took advantage of is the difference in facial characteristics of human. The interesting part is that we humans have different biological characteristics that are hardly changed or implanted physically. Besides, it is a multitasking system that user does not have to physically touch the
Corresponding Author: Petcharat Pattanasethanon, Depatment of Business Computer, Faculty of Accountancy and Management,
Mahasarakham UniversityKamreang, Kantharawichai, Mahasarakham 44150, Thailand
1585
J. Computer Sci., 8 (9): 1585-1593, 2012 equipment or yield from doing other activities, since it will detect the subject automatically that the subject does not know that he or she is being captured. We can easily agree on the benefits of facial recognition models, however, there are always some limitations in reality that affects the flaw of the system. For instance, interrupt signals from images, low resolution images and facial reflex or expressions can cause inaccuracy in the retrieving process. These scenarios are being handled through several research approaches. In our research, the system recognizes only the images with frontal facial expression that are stored in web cameras and our standard database. algorithm using single image matching method. The model is designed to have two panels in the interface.
The control panel can be interpreted as two parts; the
Web-Cam control i/o and the processing unit. Both panels are processed individually and plausibly concurrent. The first part receives an input image through the camera, which is further described in Fig.
1a as a Startup GUI. The “Start Cam” button indicates
Web-Cam activation. The square frame is design to surround the facial area as to relocate the prospective area and separate the facial area and the background.
The square frame creates a 10-20 sec. delay for the image in order to capture the facial expression as preferred. After the “Cap CAM” button is pressed, the interrupt signal is sent to our Web-Cam, which has now stopped its task since the prospective image is obtained. As shown in Fig. 1b, this process captures only the facial part of the image and transforms its size to reduce the storing area. The size of a normalized image in our research is initially set to 100×140 pixels, as shown in Fig. 2.
The square frame that crops the entire face begins once the position of the face is set to (Sx, Sy) andthe both eyes are set to (X1,Y) and (X2,Y), as demonstrated in Fig. 2a. The width (Wi) and Height
(Hi) of the image can be computed from Eq. 1 and 2, respectively: Related works: Slight changes to the sensor and illumination insensitivity in the image are some examples of the many interactions that technically affect the entire accuracy of the pattern recognition.
Since pattern recognition can be engaged and implement to several obligation such as criminal facial matching and individual identification, a wide range of research has been conducted assist the above mentioned issues. For instance, some research implemented Histogram Equalization (HE), Local
Binary Patterns (LBP) (Lahdenoja et al., 2005) and
Modified Census Transform (MCT) (Froba and Ernst,
2004) to develop a pattern recognition model. HE is a computationally expensive operation in comparison to
LBP and MCT, however, LBP and MCT are typically restricted to only extract binary patterns in a local area.
The Successive Mean Quantization Transform (SMQT)
(Micael et al., 2007) can be viewed as a tunable tradeoff between the number of quantization levels in the result and the computational load. In this study the
SMQT is used to extract features from the local area of an image. Derivations of the sensor and illumination insensitive properties of the local SMQT features are presented. Pattern recognition in the context of appearance based face detection can be approached in several ways (Yang et al., 2002). Techniques proposed for this task are for example the Neural Network (NN)
(Rowley et al., 1998), probabilistic modelling
(Schneiderman and Kanade, 1998), cascade of boosted features (AdaBoost) (Viola and Jones, 2001), Sparse
Network of Winnows (SNoW) (Gundimada and Asari,
2005), combination of AdaBoost and SNoW (Osuna et al., 1997) and the Support Vector Machine (SVM)
(Ruan andYin, 2009).
Wi = 2∆x + | x1 = x2 | (1)
Hi = 2∆y (2)
MATERIALS AND METHODS The GUI processing unit works accordingly with the flowchart describe in Fig. 3. The second part is the identification window, which recognizes the output image by going through the database with the eclipse shape frame. Later, SMQT and Eigen face techniques are applied to the image. In order to compare the similarity measurement with the database image, our reference point is based on the value of Euclidean Distance. This will also thoroughly check if the person from the input image exists in database or not. Otherwise, the user is asked to directly add this image into the database, including the date and location which that image is found. The facial identification GUI window and flowchart diagram of the system are demonstrated as in Fig. 4 and 5, respectively.
Face detection and recognition system: No matter if Face detection and face recognition technique: In the input is a single image or a video file, the algorithm this research, we propose a facial detection and facial that pattern recognition uses is almost similar. In video recognition technique which increases the accuracy and files, matching images are processed by digitizing the preciseness of the results. The detection and recognition image frame by frame. Since pattern recognition in process are based on two renowned techniques called video files can be implemented using single image Successive Mean Quantization Transform (SMQT) and matching, in this research, we provide the matching Spare Network of Winnows (SNOW).
1586
J. Computer Sci., 8 (9): 1585-1593, 2012
Fig. 3: GUI Input Image Flowchart explains briefly how our GUI processes the input image
(a)
Fig. 4: GUI of Identify FaceFrom Data Base
(b)
Fig. 1: Capturing Window
Captured Image
(a)Startup
GUI
(b)
Fig. 5: Flowchart of the GUI of Identify FaceProcess
(a)
(b)
The two techniques contribute to a pattern, which store details of the facial part through data transformation and separates it from the background. The second part
Fig. 2: Facial capturing and saving to database(a)
Dimension on face (b) Limitation face sizing
1587
J. Computer Sci., 8 (9): 1585-1593, 2012 uses Eigenface to compute for the coefficient within special characteristics from the facial part, which different people may possess different facial structure or essential characteristics from others. nonface Can be achieved using the non-face table hx∈w , face the face table h x∈w and defining a threshold for θ. Since both tables work on the same domain, this implies that one single lookup-table:
Local SMQT feature and split up SNOW classifier:
SMQT and SNOW are initially proposed by (Micael et al., 2007) for the purpose of facial detection in a high speed manner without being affected by the surrounding error signals such as illumination insensitivity or sensor variation. SMQT extracts pixels in local area of the image. The steps are described as below.
Let x be one pixel and D(x) be set of |D(x)| = D pixels from a local area in an image. Consider the
SMQT transformation of the local area Eq. 3:
SMQTL : D ( x ) → M ( x ) h x = h nonface − h face x x
Can be created for single lookup-table classification. Let the training database contain i = 1, 2,..., N feature patches with the SMQT features Mi(x) and the corresponding classes ci (face or nonface). The nonface table and the face table can then be trained with the
Winnow Update Rule (Gundimada and Asari, 2005).
Initially both tables contain zeros. If an index in the table is addressed for the first time during training, the value (weight) on that index is set to one. There are three training parameters; the threshold γ, the promotion parameter α>1 and the demotion parameter 0

Similar Documents

Premium Essay

Reflection Analysis Of Hand Gesture Recognition

...Hand Gesture recognition system provides us an innovative, natural, user friendly way of interaction with the computer which is more familiar to the human beings. Gesture Recognition has a wide area of application including human machine interaction, sign language, immersive game technology etc. By keeping in mind the similarities of human hand shape with four fingers and one thumb, this paper aims to present a real time system for hand gesture recognition on the basis of detection of some meaningful shape based features like orientation, centre of mass (centroid), status of fingers, thumb in terms of raised or folded fingers of hand and their respective location in image. The approach introduced in this paper is totally depending on the shape parameters of the hand gesture. It does not consider any other mean of hand gesture recognition like skin color, texture because these image based features are extremely variant to different light conditions and other influences. To implement this approach we have utilized a simple web cam which is working on 20 fps with 7 mega pixel intensity. On having the input sequence of images through web cam it uses some pre-processing steps for removal of background noise and employs K-means clustering for segmenting the hand object from rest of the background, so that only segmented significant cluster or hand object is to be processed in order to calculate shape based features. This simple shape based approach to hand gesture recognition can identify...

Words: 3301 - Pages: 14

Premium Essay

Real Time Hand Tracking for Human Computer Interaction

...proposed work is part of a project that aims for the control of a mouse based on hand gesture recognition. This goal implies the restriction of real-time response and unconstrained environments. This is basically a vision based skincolour segmentation method for moving hand in real time application [3]. This algorithm is based on three main steps: hand segmentation, hand tracking and gesture recognition from hand features. For the hand segmentation step we use the colour cue due to the characteristic colour values of human [1]. The hands are recognized by the computer using the skin colour as one of the basic features for the hand recognition. The important feature is the accurate segmentation of hands [3]. I. Introduction Nowadays, the majority of the human-computer interaction (HCI) is based on mechanical devices such as keyboards, mouse, joysticks or gamepads. In recent years there has been a growing interest in a class of methods based on computational vision due to its ability to recognise human gestures in a natural way .These methods use as input the images acquired from a camera or from a stereo pair of cameras. The main goal of these algorithms is to measure the hand configuration in each time instant. Our application uses images from a lowcost web camera placed in front of the hand. The hand must be localized in the image and segmented from the background before recognition. The pixels are selected from the hand. The selected pixels are transformed from the RGB-space...

Words: 2141 - Pages: 9

Free Essay

Blue Eyes

... Is it possible to create a computer which can interact with us as we interact each other? For example imagine in a fine morning you walk on to your computer room and switch on your computer, and then it tells you “Hey friend, good morning you seem to be a bad mood today. And then it opens your mail box and shows you some of the mails and tries to cheer you. It seems to be a fiction, but it will be the life lead by “BLUE EYES” in the very near future. The basic idea behind this technology is to give the computer the human power. We all have some perceptual abilities. That is we can understand each others feelings. For example we can understand ones emotional state by analyzing his facial expression. If we add these perceptual abilities of human to computers would enable computers to work together with human beings as intimate partners. The “BLUE EYES” technology aims at creating computational machines that have perceptual and sensory ability like those of human beings. TABLE OF CONTENTS 1. INTRODUCTION...

Words: 4265 - Pages: 18

Free Essay

Virus Technology

...VIRUS TECHNOLOGY   view Presentation   The term virus is as old as hills are now in the world of computer technologies. A virus basically is software that is made to run automatically usually used for destructive purpose by the computer experts. Though virus is a well known but not known well. Definition : A computer virus is a coded program that is written in Assembly or a system programming language such as ‘C’ to deliberately gain entry into a host system and modify existing programs and/or perform a series of action, without user consent.     In this paper we would like to throw light on some of the unturned stones of the world of virus. We would start from history of the virus i.e. who created the first virus, for what purpose and hoe it affect to the computer. Then classification of viruses by to different methods: Ø General classification of the virus. Ø Behavioral classification of the virus. We covered the topic how nowadays viruses affects to the Mobiles, how they come to the mobile. The small and most important topic that we covered is the ‘Positive Virus’. We covered how the virus actually works in the host computer along with one example as they would enlighten our knowledge about viruses, this is because we want to secure of viruses and actually need to known how are they programmed and executed automatically. We also covered some information about the most popular viruses with  some vital information i.e. how they work, how much harmful to...

Words: 5536 - Pages: 23

Free Essay

Cams

... Study Guide for the Certification Examination Fifth Edition a publication of the association of certified anti-money laundering specialists Study Guide for the Certification Examination Fifth Edition Executive Vice President John J. Byrne, CAMS Editor Robert S. Pasley, CAMS Co-Editor Kevin M. Anderson, CAMS Contributors Joyce Broome, CAMS Heather Brown, CAMS Aub Chapman, CAMS Vasilios Chrisos, CAMS David Clark, CAMS Jurgen Egberink, CAMS Michael D. Kelsey, CAMS Saskia Rietbroek, CAMS Nancy J. Saur, CAMS Mansoor Siddiqi, CAMS Daniel Soto, CAMS Timothy White CAMS Production Assistant Catalina Martinez We would like acknowledge the following individuals for their contributions to the CAMS Exam, and the Online and Live Preparation Seminars: Kevin M. Anderson, CAMS Joyce Broome, CAMS Aub Chapman, CAMS David Clark, CAMS Josue Garcia, CAMS Hoi Luk, CAMS Ira Morales Mickunas, CAMS Robert S. Pasley, CAMS Karim Rajwani, CAMS Mansoor Siddiqi, CAMS Saskia Rietbroek, CAMS Ed Rodriguez, CAMS Nancy J. Saur, CAMS Wendy Steichen, CAMS Brian J. Stoeckert, CAMS Charles Taylor, CAMS Will Voorhees, CAMS Natalie Ware, CAMS Peter Warrack, CAMS Amy Wotapka, CAMS Crispin Yuen, CAMS Copyright © 2012 by the Association of Certified Anti-Money Laundering Specialists (ACAMS). Miami, USA. All rights reserved. No part of this publication may be reproduced or distributed, and may not be made available in any electronic format, without the prior...

Words: 105184 - Pages: 421

Free Essay

Cis 500

...Law Enforcement Technology Needs Assessment Law Enforcement Technology Needs Assessment: Future Technologies to Address the Operational Needs of Law Enforcement In partnership with the Lockheed Martin Corporation By Christopher S. Koper, Bruce G. Taylor, and Bruce E. Kubu With contributions by Eugene Glover, John Anderson, Paul Snabel, Chuck Wexler, Rachael Bambery, Nathan Ballard, Anthony Bellero, David Prothero, Willie Marsh, Mike Schroeder, Mike Taylor, Greg Maultsby, Donnie Gilley and Dave Kier Police Executive Research Forum 1120 Connecticut Ave., N.W., Suite 930 Washington, D.C. 20036 Jan 16, 2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen...

Words: 37391 - Pages: 150

Free Essay

Management Information Systems

...Find more on www.studymaterial.ca ADMS 2511 MIS Notes Ch 1 – Modern Organization in the Global, Web-Based Environment Management information systems (MIS)- deals with the planning of info tech to help people perform tasks related to info processing and management Information technology (IT)- any computer-based tool used with info to support the needs of an org Importance of Planning for IT -a new info system can apply to the whole org, or a specific area of the org Application portfolios- are groups of new system proposals (apps that have to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities...

Words: 24496 - Pages: 98

Free Essay

Computer Vision

...Learning OpenCV Gary Bradski and Adrian Kaehler Beijing · Cambridge · Farnham · Köln · Sebastopol · Taipei · Tokyo Learning OpenCV by Gary Bradski and Adrian Kaehler Copyright © 2008 Gary Bradski and Adrian Kaehler. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or corporate@oreilly.com. Editor: Mike Loukides Production Editor: Rachel Monaghan Production Services: Newgen Publishing and Data Services Cover Designer: Karen Montgomery Interior Designer: David Futato Illustrator: Robert Romano Printing History: September 2008: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Learning OpenCV, the image of a giant peacock moth, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this...

Words: 150684 - Pages: 603

Free Essay

Enterprise Operations

...Operational Level Paper E1 ENTERPRISE OPERATIONS (REVISION SUMMARIES) Chapter 1 2 3 4 5 6 7 8 9 10 11 12 Topic Organisations Corporate Responsibility and Ethics The International Economy Information Systems Managing Information Systems Operations Management Quality Management Marketing Buyer Behaviour Human Resource Management Management Theory and Motivation The Legal Environment Page Number 3 13 17 27 35 45 55 61 73 79 93 101 E1 revision summaries 1 E1 revision summaries 2 Chapter 1 Organisations E1 revision summaries 3 Key summary of chapter Private sector organisations Sub-sectors of the economy not directly controlled by the government or state private business and households. Examples • • • • Private businesses e.g. self employed sole traders or partnerships. Companies (corporations) e.g. separate legal identity with limited liability for shareholders (owners). Private banks and building societies. Non-governmental organisations e.g. trade unions, charities, clubs etc. e.g. Public organisations Sub-sectors of an economy, or organisations, owned and directly controlled by the state or government. Examples • • • Local authorities. State owned industries e.g. the UK post office. Public corporations e.g. the British Broadcasting Company (BBC). Characteristics of public organisations • • • • Ultimately accountable to government. Goals and guidelines determined by government. Not-for-profit motive (NPO). Funded by the general public...

Words: 15334 - Pages: 62

Premium Essay

Cataolog

...ork2012 - 2013 Catalog A Message from the President “Sullivan University is truly a unique and student success focused institution.” I have shared that statement with numerous groups and it simply summarizes my basic philosophy of what Sullivan is all about. When I say that Sullivan is “student success focused,” I feel as President that I owe a definition of this statement to all who are considering Sullivan University. First, Sullivan is unique among institutions of higher education with its innovative, career-first curriculum. You can earn a career diploma or certificate in a year or less and then accept employment while still being able to complete your associate, bachelor’s, master’s or doctoral degree by attending during the day, evenings, weekends, or online. Business and industry do not expand or hire new employees only in May or June each year. Yet most institutions of higher education operate on a nine-month school year with almost everyone graduating in May. We remained focused on your success and education, and continue to offer our students the opportunity to begin classes or to graduate four times a year with our flexible, year-round full-time schedule of classes. If you really want to attend a school where your needs (your real needs) come first, consider Sullivan University. I believe we can help you exceed your expectations. Since words cannot fully describe the atmosphere at Sullivan University, please accept my personal invitation to visit and experience...

Words: 103133 - Pages: 413

Premium Essay

Student

...devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER A computer is a general purpose electronic machine that receives/accepts, processes stores, and output data into meaningful information. OR A computer is an electronic machine capable of storing vast amount of data and carry out data processing extremely fast. The operational speed of a computer is measured in millions of instructions per second (MIPS) measured in megahertz (MHZ) or...

Words: 30445 - Pages: 122

Free Essay

Nit-Silchar B.Tech Syllabus

...NATIONAL INSTITUTE OF TECHNOLOGY SILCHAR Bachelor of Technology Programmes amï´>r¶ JH$s g§ñWmZ, m¡Úmo{ à VO o pñ Vw dZ m dY r V ‘ ñ Syllabi and Regulations for Undergraduate PROGRAMME OF STUDY (wef 2012 entry batch) Ma {gb Course Structure for B.Tech (4years, 8 Semester Course) Civil Engineering ( to be applicable from 2012 entry batch onwards) Course No CH-1101 /PH-1101 EE-1101 MA-1101 CE-1101 HS-1101 CH-1111 /PH-1111 ME-1111 Course Name Semester-1 Chemistry/Physics Basic Electrical Engineering Mathematics-I Engineering Graphics Communication Skills Chemistry/Physics Laboratory Workshop Physical Training-I NCC/NSO/NSS L 3 3 3 1 3 0 0 0 0 13 T 1 0 1 0 0 0 0 0 0 2 1 1 1 1 0 0 0 0 4 1 1 0 0 0 0 0 0 2 0 0 0 0 P 0 0 0 3 0 2 3 2 2 8 0 0 0 0 0 2 2 2 2 0 0 0 0 0 2 2 2 6 0 0 8 2 C 8 6 8 5 6 2 3 0 0 38 8 8 8 8 6 2 0 0 40 8 8 6 6 6 2 2 2 40 6 6 8 2 Course No EC-1101 CS-1101 MA-1102 ME-1101 PH-1101/ CH-1101 CS-1111 EE-1111 PH-1111/ CH-1111 Course Name Semester-2 Basic Electronics Introduction to Computing Mathematics-II Engineering Mechanics Physics/Chemistry Computing Laboratory Electrical Science Laboratory Physics/Chemistry Laboratory Physical Training –II NCC/NSO/NSS Semester-4 Structural Analysis-I Hydraulics Environmental Engg-I Structural Design-I Managerial Economics Engg. Geology Laboratory Hydraulics Laboratory Physical Training-IV NCC/NSO/NSS Semester-6 Structural Design-II Structural Analysis-III Foundation Engineering Transportation Engineering-II Hydrology &Flood...

Words: 126345 - Pages: 506

Premium Essay

New Medical Devices in the Us

...New Medical Devices in the US August 13 2010 Table of Contents 1. Introduction……………………………………………………………………………………………………………………………………2 2. Background and Framework……………………………………………………………………………………………………………4 2.1 Priority Medical Devices for the Netherlands…..……………………………………………………………………4 2.2 The US Vision: From see and treat to predict and prevent……………………………………………………6 2.3 Conclusions…………………………………………………………………………………………………………………………..7 3. Medical device sector in the US………………………………………………………………………………………………………8 3.1 Economic Impact…..………………………………………………………………………………………………………………8 3.2 The Sector by State…..…………………………………………………………………………………………………………10 3.3 Key Institutes: Patent Applications in the Cluster Areas…..………………………………………………….13 3.4 Conclusions…..…………………………………………………………………………………………………………………….20 4. Turning research into novel medical devices………………………………………………………………………………….22 4.1 The Medical Device Development Process…..……………………………………………………………………..22 4.2 CIMIT: A Structure for Medical Device Innovation…..………………………………………………………….23 4.3 Stanford Biodesign: Innovation as a Discipline…..………………………………………………………………..26 4.4 Conclusions and Recommendations…..……………………………………………………………………………….28 5. Summary and Conclusions…………………………………………………………………………………………………………….30 6. Acknowledgements……………………………………………………………………………………………………………………….32 7. References…………………………………………………………………………………………………………………………………….33 Appendices A1 Selection of Key Institutes A2 Results Patent Analysis A3 Research...

Words: 34578 - Pages: 139

Premium Essay

Security Analyst

...6. Exploring TCP/IP Ports 7. Understanding Network Devices 8. Working with MAC Addresses 9. Intrusion Prevention and Intrusion Detection Systems 10. Network Security 11. Knowing Operating Systems 12. Backups and Archiving 13. Summary 14. Exam Essentials 15. Review Questions 5. Chapter 3: Cryptography 2 1. Cryptography: Early Applications and Examples 2. Cryptography in Action 3. Understanding Hashing 4. Issues with Cryptography 5. Applications of Cryptography 6. Summary 7. Exam Essentials 8. Review Questions 6. Chapter 4: Footprinting and Reconnaissance 1. Understanding the Steps of Ethical Hacking 2. What Is Footprinting? 3. Terminology in Footprinting 4. Threats Introduced by Footprinting 5. The Footprinting Process 6. Summary 7. Exam Essentials 8. Review Questions 7. Chapter 5: Scanning Networks 1. What Is Network Scanning? 2. Checking for Live Systems 3. Checking for Open Ports 4. Types of Scans 5. OS Fingerprinting 6. Banner Grabbing 7. Countermeasures 8. Vulnerability Scanning 9. Drawing Network Diagrams 10. Using Proxies 11. Summary 12. Exam Essentials 13. Review Questions 8. Chapter 6: Enumeration of Services 3 1. A Quick Review 2. What Is Enumeration? 3. Windows Basics 4. Enumeration with SNMP 5. Unix and Linux Enumeration 6. LDAP and Directory Service Enumeration 7. Enumeration Using NTP 8. SMTP Enumeration 9. Using EXPN 10. Using RCPT TO 11. SMTP Relay 12. Summary 13. Exam Essentials 14. Review Questions 9. Chapter 7: Gaining Access to a System 1. Up to...

Words: 71242 - Pages: 285

Premium Essay

Crm Conceptual Framework

...“Listening to customers must become everyone’s business. With most competitors moving ever faster, the race will go to those who listen and respond more intently”. -Tom Peters, Thriving on Chaos Chapter 1: Conceptual Framework for CRM What is Customer Relationship management? Before we begin to examine the conceptual foundations of CRM, it will be useful to define what is CRM. A narrow perspective of customer relationship management is creating a team relationship among sales, marketing, and customer support activities within an organization. Another narrow, yet relevant, viewpoint is to consider CRM only as customer retention in which a variety of after marketing tactics is used for customer bonding or staying in touch after the sale is made. Shani and Chalasani define relationship marketing as “an integrated effort to identify, maintain, and build up a network with individual consumers and to continuously strengthen the network for mutual benefit of both sides, through interactive, individualized and value-added contacts over a period of time”. The core theme of all CRM and relationship marketing perspectives is its focus on co-operative and collaborative relationships between the firm and its customers, and/or other marketing actors. CRM is based on the premise that, by having a better understanding of the customers’ needs and desires we can keep them longer and sell more to them. Growth Strategies International...

Words: 18165 - Pages: 73