3,155 research outputs found

    Smart Wearable Device for Reduction of Parkinson’s Disease Hand-Tremor

    Get PDF
    Parkinson\u27s disease is a neurodegenerative disorder that affects over 10 million people worldwide (Health Unlocked, 2017). People diagnosed with Parkinson\u27s Disease can experience tremors, muscular rigidity and slowness of movement. Tremor is the most common symptom and external agents like stress and anxiety can make it worse, which may cause complications to complete simple day-to-day tasks. Therefore Bio Protech proposes the development of a smart wearable device for reduction of the hand-tremors based on medical evidence that by applying vibration to the wrist may result in a reduction of the involuntary tremor. The device imitates the shape of a wristwatch and the vibration is supplied by motors placed around the wrist. The users will be given the possibility to regulate the frequency according to their needs using a mobile application connected via Bluetooth

    Advanced Hough-based method for on-device document localization

    Get PDF
    The demand for on-device document recognition systems increases in conjunction with the emergence of more strict privacy and security requirements. In such systems, there is no data transfer from the end device to a third-party information processing servers. The response time is vital to the user experience of on-device document recognition. Combined with the unavailability of discrete GPUs, powerful CPUs, or a large RAM capacity on consumer-grade end devices such as smartphones, the time limitations put significant constraints on the computational complexity of the applied algorithms for on-device execution. In this work, we consider document location in an image without prior knowledge of the document content or its internal structure. In accordance with the published works, at least 5 systems offer solutions for on-device document location. All these systems use a location method which can be considered Hough-based. The precision of such systems seems to be lower than that of the state-of-the-art solutions which were not designed to account for the limited computational resources. We propose an advanced Hough-based method. In contrast with other approaches, it accounts for the geometric invariants of the central projection model and combines both edge and color features for document boundary detection. The proposed method allowed for the second best result for SmartDoc dataset in terms of precision, surpassed by U-net like neural network. When evaluated on a more challenging MIDV-500 dataset, the proposed algorithm guaranteed the best precision compared to published methods. Our method retained the applicability to on-device computations.Comment: This is a preprint of the article submitted for publication in the journal "Computer Optics

    Vision Based Extraction of Nutrition Information from Skewed Nutrition Labels

    Get PDF
    An important component of a healthy diet is the comprehension and retention of nutritional information and understanding of how different food items and nutritional constituents affect our bodies. In the U.S. and many other countries, nutritional information is primarily conveyed to consumers through nutrition labels (NLs) which can be found in all packaged food products. However, sometimes it becomes really challenging to utilize all this information available in these NLs even for consumers who are health conscious as they might not be familiar with nutritional terms or find it difficult to integrate nutritional data collection into their daily activities due to lack of time, motivation, or training. So it is essential to automate this data collection and interpretation process by integrating Computer Vision based algorithms to extract nutritional information from NLs because it improves the user’s ability to engage in continuous nutritional data collection and analysis. To make nutritional data collection more manageable and enjoyable for the users, we present a Proactive NUTrition Management System (PNUTS). PNUTS seeks to shift current research and clinical practices in nutrition management toward persuasion, automated nutritional information processing, and context-sensitive nutrition decision support. PNUTS consists of two modules, firstly a barcode scanning module which runs on smart phones and is capable of vision-based localization of One Dimensional (1D) Universal Product Code (UPC) and International Article Number (EAN) barcodes with relaxed pitch, roll, and yaw camera alignment constraints. The algorithm localizes barcodes in images by computing Dominant Orientations of Gradients (DOGs) of image segments and grouping smaller segments with similar DOGs into larger connected components. Connected components that pass given morphological criteria are marked as potential barcodes. The algorithm is implemented in a distributed, cloud-based system. The system’s front end is a smartphone application that runs on Android smartphones with Android 4.2 or higher. The system’s back end is deployed on a five node Linux cluster where images are processed. The algorithm was evaluated on a corpus of 7,545 images extracted from 506 videos of bags, bottles, boxes, and cans in a supermarket. The DOG algorithm was coupled to our in-place scanner for 1D UPC and EAN barcodes. The scanner receives from the DOG algorithm the rectangular planar dimensions of a connected component and the component’s dominant gradient orientation angle referred to as the skew angle. The scanner draws several scan lines at that skew angle within the component to recognize the barcode in place without any rotations. The scanner coupled to the localizer was tested on the same corpus of 7,545 images. Laboratory experiments indicate that the system can localize and scan barcodes of any orientation in the yaw plane, of up to 73.28 degrees in the pitch plane, and of up to 55.5 degrees in the roll plane. The videos have been made public for all interested research communities to replicate our findings or to use them in their own research. The front end Android application is available for free download at Google Play under the title of NutriGlass. This module is also coupled to a comprehensive NL database from which nutritional information can be retrieved on demand. Currently our NL database consists of more than 230,000 products. The second module of PNUTS is an algorithm whose objective is to determine the text skew angle of an NL image without constraining the angle’s magnitude. The horizontal, vertical, and diagonal matrices of the (Two Dimensional) 2D Haar Wavelet Transform are used to identify 2D points with significant intensity changes. The set of points is bounded with a minimum area rectangle whose rotation angle is the text’s skew. The algorithm’s performance is compared with the performance of five text skew detection algorithms on 1001 U.S. nutrition label images and 2200 single- and multi-column document images in multiple languages. To ensure the reproducibility of the reported results, the source code of the algorithm and the image data have been made publicly available. If the skew angle is estimated correctly, optical character recognition (OCR) techniques can be used to extract nutrition information

    The potential of naturalistic driving studies with simple data acquisition systems (DAS) for monitoring driver behaviour

    Get PDF
    This report addresses the important question regarding the potential of simple and low-cost technologies to address research questions such as the ones dealt with in UDrive. The resources and efforts associated with big naturalistic studies, such as the American SHRP II and the European UDrive, are tremendous and can not be repeated and supported frequently, or even more than once in a decade (or a life time..). Naturally, the wealth and richness of the integrated data, gathered by such substantial studies and elaborated DAS, cannot be compared to data collected via simpler, nomadic data collection technologies. The question that needs to be asked is how many Research Questions (RQs) can be addressed, at least to some extent, by other low-cost and simple technologies? This discussion is important, not only in order to replace the honourable place (and cost!) of naturalistic studies, but also to complement and enable their continuity after their completion. Technology is rapidly evolving and almost any attempt to provide a comprehensive and complete state of the art of existing technologies (as well as their features and cost) is doomed to fail. Hence, in chapter 1 of this report, we have created a framework for presentation, on which the various important parameters associated with the question at hand, are illustrated, positioned and discussed. This framework is denoted by “Framework for Naturalistic Studies” (FNS) and serves as the back bone of this report. The framework is a conceptual framework and hence, is flexible in the sense that its dimensions, categories and presentation mode are not rigid and can be adjusted to new features and new technologies as they become available. The framework is gradually built using two main dimensions: data collection technology type and sample size. The categories and features of the main dimensions are not rigidly fixed, and their values can be ordinal, quantitative or qualitative. When referring to parameters that are not numerical –even the order relation among categories is not always clear. In this way –the FNS can be, at times, viewed as a matrix rather than a figure with order relation among categories presented along its axes. On the two main dimensions of the FNS –data collection technology type and sample size –other dimensions are incorporated. These dimensions include: cost, data access, specific technologies and research questions that can be addressed by the various technologies. These other dimensions are mapped and positioned in the plot area of the FNS. Other presentations, in which the axes and the plot area are interchanged, or 3 -dimensional presentations are performed, can be incorporated to highlight specific angles of the involved dimensions. The various technologies for data collection were mapped on the FNS. The technology groups include: mobile phone location services, mobile phone applications, telematics devices, built -in data loggers, dash cameras and enhanced dash cameras, wearable technologies, compound systems, eye trackers and Mobileyetype technologies. After this detailed illustrations of analyses that can be conducted using simple low-cost technologies are described. It is demonstrated how temporal and spatial analysis can reveal important aspects on the behavioural patterns of risky drivers. Also one stand alone smartphone app can be used to monitor and evaluate smartphone us age while driving. Most of the simple systems relate to specific behaviour that is monitored (i.e. speeding , lane keeping etc.). Additionally, certain thresholds or triggers are used to single out risky situations, which are related to that behaviour. However, once those instances are detected, no information on the circumstances leading or accompanying this behaviour are available. Typically, visual information (discrete or preferably continuous) is needed in order to fully understand the circumstances. Hence, upgrading simple (single-task oriented) technologies by other technologies (most typically by cameras), can significantly improve researchers' ability to obtain information on the circumstances, which accompany the detected risky behaviour. One of the most conceptually straightforward integrated systems is a system, for which the basic technology detects the desired behaviour (e.g. harsh braking) and triggers a simple continuous dashboard camera to save the relevant information, which occurs together with that behaviour. Many RQs can be addressed using this type of combined systems

    MIDV-2020: A Comprehensive Benchmark Dataset for Identity Document Analysis

    Get PDF
    Identity documents recognition is an important sub-field of document analysis, which deals with tasks of robust document detection, type identification, text fields recognition, as well as identity fraud prevention and document authenticity validation given photos, scans, or video frames of an identity document capture. Significant amount of research has been published on this topic in recent years, however a chief difficulty for such research is scarcity of datasets, due to the subject matter being protected by security requirements. A few datasets of identity documents which are available lack diversity of document types, capturing conditions, or variability of document field values. In addition, the published datasets were typically designed only for a subset of document recognition problems, not for a complex identity document analysis. In this paper, we present a dataset MIDV-2020 which consists of 1000 video clips, 2000 scanned images, and 1000 photos of 1000 unique mock identity documents, each with unique text field values and unique artificially generated faces, with rich annotation. For the presented benchmark dataset baselines are provided for such tasks as document location and identification, text fields recognition, and face detection. With 72409 annotated images in total, to the date of publication the proposed dataset is the largest publicly available identity documents dataset with variable artificially generated data, and we believe that it will prove invaluable for advancement of the field of document analysis and recognition. The dataset is available for download at ftp://smartengines.com/midv-2020 and http://l3i-share.univ-lr.fr

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Full text link
    In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpose applications (e.g., finance, gaming, and shopping). As a result, those devices generate a significant network traffic (a consistent part of the overall Internet traffic). For this reason, the research community has been investigating security and privacy issues that are related to the network traffic generated by mobile devices, which could be analyzed to obtain information useful for a variety of goals (ranging from device security and network optimization, to fine-grained user profiling). In this paper, we review the works that contributed to the state of the art of network traffic analysis targeting mobile devices. In particular, we present a systematic classification of the works in the literature according to three criteria: (i) the goal of the analysis; (ii) the point where the network traffic is captured; and (iii) the targeted mobile platforms. In this survey, we consider points of capturing such as Wi-Fi Access Points, software simulation, and inside real mobile devices or emulators. For the surveyed works, we review and compare analysis techniques, validation methods, and achieved results. We also discuss possible countermeasures, challenges and possible directions for future research on mobile traffic analysis and other emerging domains (e.g., Internet of Things). We believe our survey will be a reference work for researchers and practitioners in this research field.Comment: 55 page
    • …
    corecore