47 research outputs found

    Eyes extraction from facial images using edge density

    Get PDF
    This paper proposes a novel method for eyes extraction in facial images using edge density information. The method is based on the observation that irrespective of skin colour, colour variations occur the most in the eye region. In the proposed method, edges are detected in the input facial image. Morphological dilation is applied twice and the holes are filled in the connected regions. This makes the high density edges regions appear as blobs. Certain shapes and geometrical rules are applied to these blobs to extract the eyes. The method was tested using images from the PICS facial images database. The accuracies of the initial blobs extraction and the final eyes extraction were 95% and 72% respectively

    An automated system for batch hazard and operability studies

    Get PDF
    A widely used hazard identification technique within the process industry is HAZOP (hazard and operability study). To overcome the repetitive and time-consuming nature of the technique automated systems are being developed. This work considers batch processes, in which material undergoes processing in distinct stages within the plant equipment items according to a set of operating procedures, rather than each equipment item remaining in a “steady state”, as is normal for continuous plants. In batch plants deviations which can lead to hazards can arise both from deviations from operating procedures and process variable deviations. Therefore, the effect of operator actions needs to be considered. CHECKOP is an automated batch HAZOP identification system being developed as a joint project between HAZID Technologies Ltd and Loughborough University. CHECKOP uses a state-based approach to HAZOP analysis. CHECKOP takes a plant description and a set of operating instructions as input and produces a HAZOP report automatically. The overall system architecture and the details of the major components of the systems will be described. Examples of incorrect plant operation along with the resulting output generated by CHECKOP will be shown. The advantages and limitations of CHECKOP will be discussed

    Hazards in advising autonomy: incorporating hazard modelling with system dynamics into the aerospace safety assessment process for UAS

    Get PDF
    This paper describes the further continuation of an investigation to identify and develop tools for the identification and management of hazards likely to arise with the quality and behavioural aspects in and resulting from automatic advice - such as might arise with an automated system advisory function facilitating critical decision-making with an autonomous vehicle. An example of a representative critical advisory function is identified in that supporting a necessary “Sense & Avoid” capability, as embodied within a airborne autonomous system. In consideration then of how might a model driven approach, combining physical and dynamical models, statistical data and belief be combined to aid system evaluation, work has so far been undertaken to investigate the nature of suitable models to provide representations of the control structure and system dynamics. Whilst the system engineering methods are to be generic, the context of “Sense & Avoid” provides a relevant framework within which to pose a “toy-problem” with complex behaviour, against which to judge the methods and models

    A ‘computer tutor’ to assist children develop their narrative writing skills : conferencing with HARRY

    Get PDF
    The purpose of this study was to test the hypothesis that a computer tool can change the way children approach the task of writing and improve their writing performance. HARRY, a web-based computer tutor, provides a Vygotskian-like scaffolding of the knowledge transforming mature writing process and presents it to children individually in a conference situation. The effects of the computer tutor are analysed by comparing stories produced by three children of varied writing ability, who wrote a control and a HARRY assisted story, and by observing the children as they wrote. A control group also wrote two stories without receiving assistance for either story. The study's hypothesis was confirmed. With HARRY's assistance, the children wrote better stories and employed the revision process characteristic of mature writers. Vygotsky's work suggests that children will learn to adopt the mature approach from repeated use of the system and that the scaffolding should be reduced gradually. However, as the system relied upon the children's willingness to first request, then act upon the available guidance, the system would benefit from further development to ensure children interact sufficiently with HARRY

    Cross-organisational workflow enactment via progressive linking by run-time agents

    Get PDF
    Driven by popular adoptions of workflow and requirements from the practice of virtual enterprise (VE), research in workflow interoperability is currently on the increase. Nonetheless, it is still in its early stage compared with the maturity of individual workflow technology. Some attempts have been tried, however results are not satisfactory especially in a VE context, where many of the partnerships are dynamic and temporary. Reasons include the rigidity and high initial coordination cost inherently associated with top-down modelling and enactment approaches. Therefore, this paper proposes a bottom-up and WfMS 1 Keywords: Multi-Agent Systems, Workflow Interoperability, Virtual Enterprise -independent approach towards cross-organisational workflow enactment, which is via progressive linking enabled by run-time agents. This is expected to pave the way for further cross-organisational workflow needs

    Facilitating B2B E-business by IT-supported business process negotiation services

    Get PDF
    Due to the complexity of business transactions and growing business automation demands from the B2B e-business community to swiftly respond to the ever-changing environment, workflow technology has been receiving more attention recently. The increasing popularity and adoption of workflow management system (WfMS) within organisations make workflow-based B2B e-business practically viable since more and more business transactions are implemented as automated processes and executed by WfMSs. Having been viewed as services by many researchers and practitioners, process-driven B2B e-business are conducted through service discovery and runtime execution. However, if there is no existing service provided by a desired business partner that matches the requirement then such a process will have to be negotiated and then created. Unfortunately, direct people-to-people negotiation followed by manual transformation of the negotiation outcome into processdriven services can be very resource consuming. Therefore, it is identified that there is a research gap in computer-aided negotiation approach for process-driven B2B e-business. This paper introduces essentials of workflow technology and negotiation. It then describes ways of capturing elements of negotiation from an operational view point. Finally, it explains how to integrate the IT-supported negotiation services into an overall cross-organisational workflow collaboration (COWCO) supporting framework

    Face pose estimation from eyes and mouth

    Get PDF
    Face pose estimation plays an important role in human computer interaction, automatic human behaviour analysis, gaze estimation, virtual reality, pose independent face recognition, etc. Accuracy and speed are the most desirable features of a face pose estimation system. In this paper, a face pose estimation scheme based on the centres of the eyes and mouth is proposed. The proposed method is simple and is, therefore, very effective in terms of computation because it uses only three points, i.e., eyes and mouth centres. The use of only three points increases the pose estimation range and makes the method suitable for real time applications. Tests using the Pointing '04 database show that the proposed scheme is robust and fast

    A hybrid method for eyes detection in facial images

    Get PDF
    This paper proposes a hybrid method for eyes localization in facial images. The novelty is in combining techniques that utilise colour, edge and illumination cues to improve accuracy. The method is based on the observation that eye regions have dark colour, high density of edges and low illumination as compared to other parts of face. The first step in the method is to extract connected regions from facial images using colour, edge density and illumination cues separately. Some of the regions are then removed by applying rules that are based on the general geometry and shape of eyes. The remaining connected regions obtained through these three cues are then combined in a systematic way to enhance the identification of the candidate regions for the eyes. The geometry and shape based rules are then applied again to further remove the false eye regions. The proposed method was tested using images from the PICS facial images database. The proposed method has 93.7% and 87% accuracies for initial blobs extraction and final eye detection respectively

    Cross-organisation dataspace (COD) - architecture and implementation

    Get PDF
    With the rapid development of information and communication technologies, the need to share information to improve efficiency in large enterprises is also increasing rapidly. For a large enterprise the information can come from many different sources and in different formats. There is a real requirement to manage the vast amount and diverse sources of data in a convenient and integrated way so that repositories of information can be built up with little additional effort and the information can be easily accessed globally. This paper presents the design and implementation of a prototype, called COD (Cross- Organisation Dataspace), that addresses the above challenges. COD, in the context of an enterprise involving multiple organisations, allows users from different geographical locations to contribute information and to search and access information easily. The information can be contained in many different forms, e.g. text files, reports, drawings and databases

    Hazards in advising autonomy: developing requirements for a hazard modelling methodology incorporating system dynamics

    Get PDF
    This paper describes the continuation of a research project to identify and develop tools for the identification and management of hazards likely to arise with the quality and reliability of automatic advice - such as in an automated system advisory function, especially where supporting a “Sense & Avoid” capability as embodied within an airborne autonomous system. An earlier literature survey has been used to map detail onto a Use Case model representing an outline certifiable system development process; thereby helping to identify an appropriate research direction within the broad range of potential end-user requirements. From this direction, an approach has emerged to evaluate hypothetical deviations from declared intent within a behavioral modeling framework to be styled upon Owen's STAMP-Based Hazard Analysis (STPA). For this approach an outline exemplar describing an air-proximity hazard arising between two air-vehicles has been developed, and the representation of the control structure and system dynamics describing this model are considered. Arising from this model some consideration is then given towards the expression of a more systematic approach in the construction of such models, leading towards new methods to derive safety requirements for implementation within autonomous air systems
    corecore