Project

Recognition Algorithm

Updates
0 new
0
Recommendations
0 new
0
Followers
0 new
15
Reads
0 new
124

Project log

Wafa Elmannai
added 2 research items
The world has approximately 253 million visually impaired (VI) people according to a report by the World Health Organization (WHO) in 2014. Thirty-six million people are estimated to be blind. According to WHO, 217 million people are estimated to have moderate to severe visual impairment. An important factor that motivated this research is the fact that 90% of VI people live in developing countries. Several systems were designed to improve the quality of the life of VI people and support their mobility. Unfortunately, none of these systems are considered to be a complete solution for VI people and these systems are very expensive. We present in this work an intelligent framework for supporting VI people. The proposed work integrates sensor-based and computer vision-based techniques to provide an accurate and economical solution. These techniques allow us to detect multiple objects and enhance the accuracy of the collision avoidance system. In addition, we introduce a novel obstacle avoidance algorithm based on the image depth and fuzzy logic. By using the fuzzy logic, we were able to provide precise information to help the VI user in avoiding front obstacles. The system has been deployed and tested in real-time scenarios. An accuracy of 98% was obtained for detecting objects and 100% accuracy in avoiding the detected objects.
Wafa Elmannai
added 2 research items
Transmission Control Protocol (TCP) is the most reliable protocol. That was previously introduced for wired networks only. Lately the TCP started to act poorly for several factors due to the advent of wireless network. The represented factors which need to be addressed are recovery mechanism, backup mechanism, mobility, congestion window and maximum packet size. Based on existing variants, new were introduced. The most two debated variants are Vegas and Westwood which motivated many researches. However, the number of studies proved that Vegas could perform more efficiency than other variants during the congested network whereas Westwood could consume less bandwidth. Hence, in our previous publications, we already proved by integrating some features of Vegas and Westwood to get better and more stable variant even in high congested network. It is called TCP University of Bridgeport (TCP-UB). Based on a previous simulation, TCP-UB proved a high efficiency, less bandwidth consumption and stability from static and mobility point of view. Therefore, in this paper we are using NS2 simulator to perform TCP-UB over wireless mesh network supported with manhattan mobility model. It provides robust and faster transmission service among several police stations in Connecticut, USA. Furthermore, we are comparing TCP-UB with Vegas and Westwood from a static and mobility point of view based on bandwidth consumption and congestion window scenario. On the basis of findings, we validate that TCP-UB is also better performer even over wireless mesh network.. Keywords: TCP UB · wireless mesh network · stability · manhattan mobility model · Bandwidth consumption · congestion window. Abdul Razaque ________________________________________________
With the technology development over the past decades, it became necessary to provide secure recognition systems. The Optical Character Recognition (OCR) can be considered as one of the most useful software to offer security. It works on the principal of recognizing the patterns with the use of a computer algorithm. OCR has multiple uses in places that need security verification such as banks, elevators, police departments. Furthermore, it can be used in several categories simultaneously. There are two types of recognition. First is the static approach which is based on the information of the input. Second is the dynamic recognition which is more usable for recognition of speech. In fact, OCR will be one of the most important techniques for human computer interaction in future. However, in this paper we have used OCR as feature to implement our algorithm. We are presenting a new algorithm that is capable of recognizing each signature individually. This makes the system more efficient and robust,especially in banks which need to verify the customer's signature on a regular basis. A highly efficient C# system was developed to implement the new algorithm. Copyright © 2012 by International Society of Computers and Their Applications (ISCA).