3,155 research outputs found
Smart Wearable Device for Reduction of Parkinson’s Disease Hand-Tremor
Parkinson\u27s disease is a neurodegenerative disorder that affects over 10 million people worldwide (Health Unlocked, 2017). People diagnosed with Parkinson\u27s Disease can experience tremors, muscular rigidity and slowness of movement. Tremor is the most common symptom and external agents like stress and anxiety can make it worse, which may cause complications to complete simple day-to-day tasks.
Therefore Bio Protech proposes the development of a smart wearable device for reduction of the hand-tremors based on medical evidence that by applying vibration to the wrist may result in a reduction of the involuntary tremor. The device imitates the shape of a wristwatch and the vibration is supplied by motors placed around the wrist. The users will be given the possibility to regulate the frequency according to their needs using a mobile application connected via Bluetooth
Advanced Hough-based method for on-device document localization
The demand for on-device document recognition systems increases in
conjunction with the emergence of more strict privacy and security
requirements. In such systems, there is no data transfer from the end device to
a third-party information processing servers. The response time is vital to the
user experience of on-device document recognition. Combined with the
unavailability of discrete GPUs, powerful CPUs, or a large RAM capacity on
consumer-grade end devices such as smartphones, the time limitations put
significant constraints on the computational complexity of the applied
algorithms for on-device execution.
In this work, we consider document location in an image without prior
knowledge of the document content or its internal structure. In accordance with
the published works, at least 5 systems offer solutions for on-device document
location. All these systems use a location method which can be considered
Hough-based. The precision of such systems seems to be lower than that of the
state-of-the-art solutions which were not designed to account for the limited
computational resources.
We propose an advanced Hough-based method. In contrast with other approaches,
it accounts for the geometric invariants of the central projection model and
combines both edge and color features for document boundary detection. The
proposed method allowed for the second best result for SmartDoc dataset in
terms of precision, surpassed by U-net like neural network. When evaluated on a
more challenging MIDV-500 dataset, the proposed algorithm guaranteed the best
precision compared to published methods. Our method retained the applicability
to on-device computations.Comment: This is a preprint of the article submitted for publication in the
journal "Computer Optics
Vision Based Extraction of Nutrition Information from Skewed Nutrition Labels
An important component of a healthy diet is the comprehension and retention of nutritional information and understanding of how different food items and nutritional constituents affect our bodies. In the U.S. and many other countries, nutritional information is primarily conveyed to consumers through nutrition labels (NLs) which can be found in all packaged food products. However, sometimes it becomes really challenging to utilize all this information available in these NLs even for consumers who are health conscious as they might not be familiar with nutritional terms or find it difficult to integrate nutritional data collection into their daily activities due to lack of time, motivation, or training. So it is essential to automate this data collection and interpretation process by integrating Computer Vision based algorithms to extract nutritional information from NLs because it improves the user’s ability to engage in continuous nutritional data collection and analysis. To make nutritional data collection more manageable and enjoyable for the users, we present a Proactive NUTrition Management System (PNUTS). PNUTS seeks to shift current research and clinical practices in nutrition management toward persuasion, automated nutritional information processing, and context-sensitive nutrition decision support.
PNUTS consists of two modules, firstly a barcode scanning module which runs on smart phones and is capable of vision-based localization of One Dimensional (1D) Universal Product Code (UPC) and International Article Number (EAN) barcodes with relaxed pitch, roll, and yaw camera alignment constraints. The algorithm localizes barcodes in images by computing Dominant Orientations of Gradients (DOGs) of image segments and grouping smaller segments with similar DOGs into larger connected components. Connected components that pass given morphological criteria are marked as potential barcodes. The algorithm is implemented in a distributed, cloud-based system. The system’s front end is a smartphone application that runs on Android smartphones with Android 4.2 or higher. The system’s back end is deployed on a five node Linux cluster where images are processed. The algorithm was evaluated on a corpus of 7,545 images extracted from 506 videos of bags, bottles, boxes, and cans in a supermarket. The DOG algorithm was coupled to our in-place scanner for 1D UPC and EAN barcodes. The scanner receives from the DOG algorithm the rectangular planar dimensions of a connected component and the component’s dominant gradient orientation angle referred to as the skew angle. The scanner draws several scan lines at that skew angle within the component to recognize the barcode in place without any rotations. The scanner coupled to the localizer was tested on the same corpus of 7,545 images. Laboratory experiments indicate that the system can localize and scan barcodes of any orientation in the yaw plane, of up to 73.28 degrees in the pitch plane, and of up to 55.5 degrees in the roll plane. The videos have been made public for all interested research communities to replicate our findings or to use them in their own research. The front end Android application is available for free download at Google Play under the title of NutriGlass. This module is also coupled to a comprehensive NL database from which nutritional information can be retrieved on demand. Currently our NL database consists of more than 230,000 products.
The second module of PNUTS is an algorithm whose objective is to determine the text skew angle of an NL image without constraining the angle’s magnitude. The horizontal, vertical, and diagonal matrices of the (Two Dimensional) 2D Haar Wavelet Transform are used to identify 2D points with significant intensity changes. The set of points is bounded with a minimum area rectangle whose rotation angle is the text’s skew. The algorithm’s performance is compared with the performance of five text skew detection algorithms on 1001 U.S. nutrition label images and 2200 single- and multi-column document images in multiple languages. To ensure the reproducibility of the reported results, the source code of the algorithm and the image data have been made publicly available. If the skew angle is estimated correctly, optical character recognition (OCR) techniques can be used to extract nutrition information
The potential of naturalistic driving studies with simple data acquisition systems (DAS) for monitoring driver behaviour
This report addresses the important question regarding the potential of simple and low-cost
technologies to address research questions such as the ones dealt with in UDrive. The resources and efforts associated with big naturalistic studies, such as the American SHRP II and the European UDrive, are tremendous and can not be repeated and supported frequently, or even more than
once in a decade (or a life time..). Naturally, the wealth and richness of the integrated data, gathered by such substantial studies and elaborated DAS, cannot be compared to data collected via simpler, nomadic data
collection technologies. The question that needs to be asked is how many Research Questions (RQs) can be addressed, at least to some extent, by other low-cost and simple technologies? This discussion is important,
not only in order to replace the honourable place (and cost!) of naturalistic studies, but also to complement and enable their continuity after their completion. Technology is rapidly evolving and almost any attempt to provide a comprehensive and complete state of the art of existing technologies (as well as their features and cost) is doomed to fail. Hence, in chapter 1 of this report, we have created a framework for presentation, on which the various important parameters associated with the question at hand, are illustrated, positioned and discussed. This framework is denoted by “Framework for Naturalistic Studies” (FNS) and serves as the back bone of this report. The framework is a conceptual framework and hence, is flexible in the sense that its dimensions, categories and presentation mode are not rigid and can be adjusted to new features and new technologies
as they become available. The framework is gradually built using two main dimensions: data collection technology type and sample size. The categories and features of the main dimensions are not rigidly fixed, and their
values can be ordinal, quantitative or qualitative. When referring to parameters that are not numerical –even the order relation
among categories is not always clear. In this way –the FNS can be, at times, viewed as a matrix rather than a figure with order relation among categories presented along its axes.
On the two main dimensions of the FNS
–data collection technology type and sample size –other dimensions are incorporated. These dimensions include: cost, data access, specific technologies and
research questions that can be addressed by the various technologies. These other dimensions are mapped and positioned in the plot area of the FNS. Other presentations, in which the axes and the plot area are
interchanged, or 3 -dimensional presentations are performed, can be incorporated to highlight specific angles of the involved dimensions. The various technologies for data collection were mapped on the FNS. The technology groups include: mobile phone location services, mobile phone applications, telematics devices, built -in data loggers, dash
cameras and enhanced dash cameras, wearable technologies, compound systems, eye trackers and Mobileyetype technologies.
After this detailed illustrations of analyses that can be conducted using simple low-cost technologies are described. It is demonstrated
how temporal and spatial analysis can reveal important aspects on the behavioural patterns of risky drivers. Also one stand alone smartphone app can be used to monitor and evaluate smartphone us
age while driving. Most of the simple systems
relate to specific behaviour that is monitored (i.e. speeding , lane keeping etc.). Additionally,
certain thresholds or triggers are used to single out risky situations, which are
related to that behaviour. However, once those instances are detected, no information on the circumstances leading or
accompanying this behaviour are available. Typically, visual information (discrete or preferably continuous) is needed in order to
fully understand the circumstances.
Hence, upgrading simple (single-task oriented)
technologies by other technologies (most typically by cameras), can significantly improve researchers' ability to obtain information on the
circumstances, which accompany the detected risky behaviour. One of the most conceptually straightforward integrated systems is a system,
for which the basic technology detects the desired behaviour (e.g. harsh braking) and triggers a simple continuous dashboard
camera to save the relevant information, which occurs together with that behaviour. Many RQs can be addressed using this type of combined systems
MIDV-2020: A Comprehensive Benchmark Dataset for Identity Document Analysis
Identity documents recognition is an important sub-field of document
analysis, which deals with tasks of robust document detection, type
identification, text fields recognition, as well as identity fraud prevention
and document authenticity validation given photos, scans, or video frames of an
identity document capture. Significant amount of research has been published on
this topic in recent years, however a chief difficulty for such research is
scarcity of datasets, due to the subject matter being protected by security
requirements. A few datasets of identity documents which are available lack
diversity of document types, capturing conditions, or variability of document
field values. In addition, the published datasets were typically designed only
for a subset of document recognition problems, not for a complex identity
document analysis. In this paper, we present a dataset MIDV-2020 which consists
of 1000 video clips, 2000 scanned images, and 1000 photos of 1000 unique mock
identity documents, each with unique text field values and unique artificially
generated faces, with rich annotation. For the presented benchmark dataset
baselines are provided for such tasks as document location and identification,
text fields recognition, and face detection. With 72409 annotated images in
total, to the date of publication the proposed dataset is the largest publicly
available identity documents dataset with variable artificially generated data,
and we believe that it will prove invaluable for advancement of the field of
document analysis and recognition. The dataset is available for download at
ftp://smartengines.com/midv-2020 and http://l3i-share.univ-lr.fr
The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis
In recent years, mobile devices (e.g., smartphones and tablets) have met an
increasing commercial success and have become a fundamental element of the
everyday life for billions of people all around the world. Mobile devices are
used not only for traditional communication activities (e.g., voice calls and
messages) but also for more advanced tasks made possible by an enormous amount
of multi-purpose applications (e.g., finance, gaming, and shopping). As a
result, those devices generate a significant network traffic (a consistent part
of the overall Internet traffic). For this reason, the research community has
been investigating security and privacy issues that are related to the network
traffic generated by mobile devices, which could be analyzed to obtain
information useful for a variety of goals (ranging from device security and
network optimization, to fine-grained user profiling).
In this paper, we review the works that contributed to the state of the art
of network traffic analysis targeting mobile devices. In particular, we present
a systematic classification of the works in the literature according to three
criteria: (i) the goal of the analysis; (ii) the point where the network
traffic is captured; and (iii) the targeted mobile platforms. In this survey,
we consider points of capturing such as Wi-Fi Access Points, software
simulation, and inside real mobile devices or emulators. For the surveyed
works, we review and compare analysis techniques, validation methods, and
achieved results. We also discuss possible countermeasures, challenges and
possible directions for future research on mobile traffic analysis and other
emerging domains (e.g., Internet of Things). We believe our survey will be a
reference work for researchers and practitioners in this research field.Comment: 55 page
- …