Free Essay

Automatic Traffic Sign Recognition in Digital Images

In:

Submitted By taiyo
Words 2679
Pages 11
Proceedings of the International Conference on Theory and Applications of Mathematics and Informatics - ICTAMI 2004, Thessaloniki, Greece

AUTOMATIC TRAFFIC SIGN RECOGNITION IN DIGITAL IMAGES by John Hatzidimos

Abstract. The objective of this project is the development of an algorithm for the automatic recognition of traffic signs in digital images. The program An.Si. was created (from the Greek words Anagnorisi Simaton which means Sign Recognition). Up to now, many algorithms for the traffic sign detection and classification have been introduced. Extensive research is being made by major car manufacturing companies in collaboration with Universities and other institutes on real-time and automatic recognition of traffic signs, so that it can be a part of the so called “Driver Support Systems” ([7]). Two major problems exist in the whole detection process. Road signs are frequently occluded partially by other vehicles. Many objects are present in traffic scenes which make the sign detection hard (pedestrians, other vehicles, buildings and billboards may confuse the detection system by patterns similar to that of road signs). Colour information from traffic scene images is affected by varying illumination caused by weather conditions, time (daynight) and shadowing (buildings) ([7]). The proposed method detects the location of the sign in the image, based on its geometrical characteristics and recognises it using colour information. Partial occlusion is dealt by the use of the Hough Transform and suggestions are made for future improvements so that the robustness of the algorithm in light condition changes can be increased.

1. Introduction The whole process is part of a larger project concerning the Mobile Mapping. Mobile Mapping is the automated “mapping”-registration of features of interest from images acquired from a moving registration system, mounted either on an airplane or a vehicle. Research is being made, mostly in landbased Mobile Mapping Systems ([1], Tsioumas 2003). Apart from traffic signs, other features of interest are traffic lights, road centerlines and edges and building facades. For building facades, the registration system doesn’t necessarily have to be movable. For the rest of the features, effort is being made for real time recognition and mapping, so they can be a part of the so called “Driver Support Systems”. The DSS is in a way the predecessor of the car autopilot. 174

John Hatzidimos - Automatic traffic sign recognition in digital images Traffic sign recognition is part of the general case of Pattern Recognition. Major problem in pattern recognition is the difficulty of constructing characteristic patterns (templates). This is because of the large variety of the features being searched in the images, such as people faces, cars, etc.. On the contrary, traffic signs a) are made with vivid and specific colors so as to attract the driver’s attention and to be distinguished from the environment b) are of specific geometrical shapes (triangle, rectangle, circle-ellipse) and c) for each sign there is a specific template. It is therefore rather easy to develop an algorithm in such a way that the computer has “a priori knowledge” of the objects being searched in the image. The developed algorithm is divided in two basic phases each one composed of a certain number of steps. In the first phase the detection of the location of the sign center of gravity (which is used as a location reference point) in the image coordinate system is carried out, based on its geometric characteristics. The second phase is the sign recognition with the matching between the search image and the template images, already stored in a database. The programming language used is IDL (Interactive Development Language), of Research Systems Inc., version 5.4. It was selected because of its simple syntax (similar to Visual Basic), but mainly because it is focused in graphic and image processing. Also, it is very effective in matrix manipulation, which is very important, considering the fact that images are processed in matrix form.

2. The algorithm The basic steps of the algorithm in each phase are: a. First phase: detection of the location of the sign in the image 1. ROI segmentation with image thresholding The first step of the algorithm is the region of interest segmentation, using sign color information. A “region of interest” is an area of the image that may contain a traffic sign. A new black and white image is constructed in which all the pixels that satisfy certain thresholds of the sign color are black and the background is white (binary image – an image with only two possible pixel values). The color thresholds are measured in test images. 175

John Hatzidimos - Automatic traffic sign recognition in digital images

First image

Image after colour thresholding (binary image)

2. Thinning and Edge Detection After image thresholding, a thinning algorithm is implemented. The goal of this process is the reduction of the edge thickness in the binary image. In result, the edges after the implementation have a thickness of one pixel. This process makes it easier for the algorithm to detect lines in a later step and also increases its speed (less pixels of interest). In the case of blue traffic sings which don’t have a clear outline, an edge detection filter is implemented (Roberts filter) for the removal of their interior pixels.

3. Region identifying and region clustering Region identifying is the calculation of the down left and upper right apex coordinates of the rectangles which include the regions. This way the search is constrained only in the regions of interest. After that, the regions are clustered according to their total number of pixels and their 176

John Hatzidimos - Automatic traffic sign recognition in digital images center distances. Furthermore, regions with total number of pixels less than a certain value are eliminated and not examined in the later steps. 4. Line Detection In each roi, line detection is carried out so as to check the kind of shape in the roi (triangle, rectangle, circle – ellipse). In the case of the triangle and the rectangle, the line detection process also calculates the necessary data for the calculation of the sign’s centre of gravity coordinates. The Hough Transform is used for the detection, a unique and effective way for the analysis of shapes and movement in images that include noise, missing or surplus data. It is a curve detection technique, that can be applied when the object location is unknown but its shape can be described as a parametric curve ([5], Adamos, and Faig). 5. Shape Check The angles between the lines can be now calculated, using the line direction coefficients deprived from the previous check. If there are three angles between [50,70] or [-70,50] degrees then the shape is accepted as a triangle. In the other case, the algorithm continues with the ellipse detection step. 6. Hough transform for ellipse detection. For the ellipse detection the algorithm uses a different approach of the Hough Transform, the RHT (Randomized Hough Transform) ([4], Inverso, May 2002). The general idea of the transform is the same. The term “Random” is used because the pixels of interest in the current roi are being tested in random groups of three. After the detection of an ellipse, the algorithm runs a check whether this ellipse is acceptable or not, based on its eccentricity and the number of points that belong to the ellipse. In the case of an accepted ellipse, detection of the location of the sign is complete because during the ellipse detection process, the center coordinates have been calculated. From this point on, the ellipse is considered a circle with a radius equal to the large half-axis. If there isn’t an accepted ellipse, the algorithm loops back to the line detection step and examines the next roi. 7. Calculation of the apexes and the center of gravity (triangle and rectangle sign 177

John Hatzidimos - Automatic traffic sign recognition in digital images From the line equations, the coordinates of the center of gravity and of the apexes are calculated. The coordinates of the apexes are needed in the later step of the template transformation. At this point the detection of the sign location is complete. b. Second phase: recognition of the sign. The sign recognition is carried out with the use of the cross-correlation matching between the region of interest extracted from the previous steps and specific template images. For the matching process, the two images must have the same coordinate system; therefore the templates are transformed to the search image coordinate system. 1. Affine transformation (triangle, rectangle). The two coordinate systems are different by two different components of parallel translation in each axis, in two rotation angles and in two scale coefficients. The common points used for the calculation of the transformation parameters are the apexes of the detected shape. Their coordinates in the template system are already known and their respective ones in the search system have been calculated in the location detection phase. All the template images are transformed and the new images constructed have the same dimensions with the search image. The template is located in the same place as the detected sign.

178

John Hatzidimos - Automatic traffic sign recognition in digital images 2. Similarity transformation (circle) In the case of a circle sign, there is only one common point, the center, therefore the affine transformation cannot be used. A similarity transformation is used instead. It is considered that the two systems are different by one scale coefficient (same by x and y) and by two different components of parallel translation in each axis. The scale parameter is calculated from the ratio of the sign radius in the two images. In the same way as in the affine transformation process, new images are constructed for each template. 3. Search area definition (bounding box) The cross correlation coefficient is calculated for the entire roi. The search image pixels which are included in the roi but do not belong to the sign, affect the correlation process and may lead in wrong results. Their colour is changed to that of the background, so their influence is eliminated. In the case of the circle sign, it is easy to determine whether a pixel belongs to the sign or not. All the pixels with a distance to the circle center greater than the radius are whitened (set to the background colour). In the case of triangles and rectangles those pixels are found using a “Point Inclusion In Polygon Test” ([6], WR Franklin). In the new image, all the pixels with a distance to the circle center greater than the radius are whitened (set to the background color). The pixels outside the region are not of any interest because the calculations are only made for the pixels inside the region, so they are left black. The sign pixels maintain their colour.

4. Cross correlation matching For every roi pixel, the cross correlation coefficient ([3]) between the template and the search image is calculated, for each colour channel 179

John Hatzidimos - Automatic traffic sign recognition in digital images (red, green and blue). The final coefficient is the mean of the three RGB coefficients. The template with the largest coefficient corresponds to the sign searched. C. SEPARATE RECTANGLE CASE Rectangle signs are detected with a slight altered and separate process because of two basic differences: a) During the Hough Transform, only (approximately) vertical and horizontal lines are searched b) The correspondence of the common points in the affine transformation step is more complicated to program than that of the triangle shape. 3. Results Below are some digital images, which the algorithm was tested:

The algorithm successfully detected and identified the sign.

180

John Hatzidimos - Automatic traffic sign recognition in digital images The algorithm successfully detected and identified the sign.

The algorithm successfully detected and identified both of the signs. However, it accepted the region at the left edge of the image as a sign, because of its similar blue colour and its rectangle shape.

The algorithm successfully detected the sign location, but the greater crosscorrelation coefficient was that of the sign . That’s due to the shadowing of the sign in the search image, which made it’s interior colour more similar to light blue than the white of the correct sign:

181

John Hatzidimos - Automatic traffic sign recognition in digital images 4. Conclusions – future directions Implementation of the algorithm in test images showed that it is very effective in the sign location phase. There is a slight weakness in the second phase, in cases of color similarity between signs and other areas of the image. It is sensitive in light condition changes during the image acquisition, because of the effect they have in the color thresholds used in the regions of interest segmentation step. The use of proper thresholds is very important as it affects in a great deal the success of the sign location detection and it’s final recognition. Based in the experience acquired from the tests, the aspects which should be further researched and be improved in the future are: • Recognition of signs of more complex shape (eg. Stop sign-octagon, right of way-diamond). The shape of such signs could be detected using another variation of the Hough Transform, the Generalized Hough Transform. The GHT can detect shapes in an image, which doesn’t necessarily have to be described by an analytical mathematical equation such as the triangle or the circle. • Recognition of two (or more) signs in the same region of interest. It is possible in some cases that there two or more signs in the same region of interest.

Such a problem can be dealt with changes in the algorithm’s structure • Increase of the speed of the algorithm by improving the source code and again, by possible changes in its structure. 182

John Hatzidimos - Automatic traffic sign recognition in digital images • Increase of the robustness of the algorithm in light condition changes. The RGB representation is far from the human concept of colour. Furthermore, image processing of the RGB model has several disadvantages: 1. all three components (R, G, and B) depend on intensity, 2. colours, which for a human might be perceptually close, do nat have to be close to each other (Euclidean distance) in RGB space. 3. smoothly shaded surfaces might correspond to several clusters in a colour space. These factors indicate that colour thresholding, a step very essential to the whole process, is greatly affected by light condition changes. One possible solution to the problem is the contiguous replacement of the threshold values during the acquiring of the images, by photographing a metal plate constructed with the same colour as the signs in the current light conditions and measurement of the new threshold. Alternatively, the HSI colour system could be used instead of the RGB. The HSI system (Hue, Saturation, Intensity) is much less sensitive in light condition changes than the RGB ([2], Gadzamowicz, April 1999.) • Merging of the rectangle and triangle-ellipse detection process • Use of “Neural Networks”. “Neural Networks” is a method for pattern recognition which has recently started being researched and is associated with the Artificial Intelligence. It simulates the human nervous system and it uses its ability to “learn” in order to find “recognisable” shapes and objects in images. Programming of “Neural Networks” is much more difficult, but also a more effective and faster recognition process. References: [1] Introduction to Mobile Mapping Systems, Tsioumas Michael, Post Graduate Thesis, May 2003 [2] Automated Processing of Georeferenced Color Stereo Images for Road Inventory, Krzysztof Gajdamowicz Dissertation, April 1999. 183

John Hatzidimos - Automatic traffic sign recognition in digital images [3] Detection and sub-pixel location of photogrammetric targets in digital images, Photogrammetria, Elsevier Science Publishers B.V., Amsterdam. [4] Ellipse Detection Using Randomized Hough Transform, Samuel Inverso, May 2002. [5] Hough Transform in Digital Photogrammetry, C. Adamos and W. Faig. Department of Surveying Engineering, Univ. of New Brunswick, Canada Comission III. [6] PN-POLY, Point inclusion in polygon test, WR Franklin (WRF), www.ecse.rpi.edu/Homepages/wrf/ [7] Road Sign Recognition Survey, http://euler.fd.cvut.cz/research/rs2/

Author: John Hatzidimos - Aristotle University of Thessaloniki, Greece, E-mail address: johnhatz111@hotmail.com

184

Similar Documents

Free Essay

A Survey of Ocr Applications

...Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information and automatically enters it into electronic database instead of the conventional way of manually retyping the text. Optical Character Recognition is a vast field with a...

Words: 3379 - Pages: 14

Free Essay

Car Sensor

...Journal of Traffic and Logistics Engineering Vol. 2, No. 3, September 2014 A Car Monitoring System for Self Recording Traffic Violations Ahmed M. Elmahalawy Computer Science and Engineering Department, Faculty of Electronics Engineering, Minufiya University Menouf, 32952, El-Minufiya, Egypt Email: ahmed.elmahalawy@el-eng.menofia.edu.eg; a_elmhalaway@hotmail.com  which ought to be considered as sufficiently independent. These two major sub-systems are: 1) the transaction subsystem and 2) the enforcement subsystem. [2] Another example is video technology applications for traffic management and safety. This technology offers both tangible and intangible benefits. Video technology requires a substantial up- front investment costs for the purchase and installation of equipment and training of staff. Due to the complexity of video systems and the rapid pace of change related to this technology, agencies may overlook some applications while using resources to implement less valuable applications. [3] Over the last few years there has been a growing interest in Intelligent Speed Adaptation (ISA), to solve the problem of exceeding the speed limits. ISA has the potential to significantly reduce the incidence and severity of road trauma in many countries all over the world. [4], [5] The remainder of this paper is organized as follows: Section 2 gives a background of previous work in this field. Overview of Self Recording Traffic Violations system is presented...

Words: 3119 - Pages: 13

Premium Essay

Reflection Analysis Of Hand Gesture Recognition

...Hand Gesture recognition system provides us an innovative, natural, user friendly way of interaction with the computer which is more familiar to the human beings. Gesture Recognition has a wide area of application including human machine interaction, sign language, immersive game technology etc. By keeping in mind the similarities of human hand shape with four fingers and one thumb, this paper aims to present a real time system for hand gesture recognition on the basis of detection of some meaningful shape based features like orientation, centre of mass (centroid), status of fingers, thumb in terms of raised or folded fingers of hand and their respective location in image. The approach introduced in this paper is totally depending on the shape parameters of the hand gesture. It does not consider any other mean of hand gesture recognition like skin color, texture because these image based features are extremely variant to different light conditions and other influences. To implement this approach we have utilized a simple web cam which is working on 20 fps with 7 mega pixel intensity. On having the input sequence of images through web cam it uses some pre-processing steps for removal of background noise and employs K-means clustering for segmenting the hand object from rest of the background, so that only segmented significant cluster or hand object is to be processed in order to calculate shape based features. This simple shape based approach to hand gesture recognition can identify...

Words: 3301 - Pages: 14

Free Essay

Ict Terms

...Revision Guide to CCEA ICT Contents [hide] * 1 Complete ICT Revision Guide (CCEA) * 2 Knowledge of ICT Components * 3 INPUT DEVICES * 4 OUTPUT DEVICES * 5 STORAGE DEVICES * 6 INFORMATION AND DATA * 7 DATA STRUCTURE * 8 DATA CHECKING * 9 DATA PORTABILITY * 10 DATA NETWORKS * 11 INTERNET, INTRANET AND WWW * 12 TRANSMISSION, BACKUP, TELECONFERENCING * 13 APPLICATIONS * 14 SOFTWARE PACKAGES * 15 VIRTUAL REALITY IN TRAINING, ENTERTAINMENT * 16 COMPUTERS IN CONTROL (REAL TIME) * 17 ON-LINE SERVICES * 18 SECURITY AND PRIVACY OF DATA * 19 HEALTH AND SOCIAL ISSUES * 20 EMPLOYMENT * 21 ICT IN MUSIC, LEISURE, ENTERTAINMENT | ------------------------------------------------- Knowledge of ICT Components 1. DIGITAL : • Discrete values or binary digit 2. PROCESSOR: • Control center of the computer 3. RAM:- • Volatile (temporary storage), working storage, holds programmes currently in use, • Used for writing to and reading. • Measured in gigabytes 4. ROM:- • Instructions computer needs to start, • Non-volatile (permanent storage), can’t be changed, only read • Stores the Boot up/Start up program for the PC START UP STEPS:- • Power up • Read ROM chip • Connect all in and output devices • Load DOS from hard drive. • Load windows from hard drive 5. CACHE:- • Temporary storage, • Stores most frequently used instructions, • Is RAM memory that the computer microprocessor can access more quickly. • Volatile (128kb-512kb). 6. DOS:- Disk Operating System...

Words: 6710 - Pages: 27

Premium Essay

Google

...------------------------------------------------- Top of Form Bottom of Form CORPORATE HISTORY 1995-1997 1995 * Larry Page and Sergey Brin meet at Stanford. (Larry, 22, a U Michigan grad, is considering the school; Sergey, 21, is assigned to show him around.) According to some accounts, they disagree about almost everything during this first meeting. 1996 * Larry and Sergey, now Stanford computer science grad students, begin collaborating on a search engine called BackRub. * BackRub operates on Stanford servers for more than a year—eventually taking up too much bandwidth to suit the university. 1997 * Larry and Sergey decide that the BackRub search engine needs a new name. After some brainstorming, they go with Google—a play on the word “googol,” a mathematical term for the number represented by the numeral 1 followed by 100 zeros. The use of the term reflects their mission to organize a seemingly infinite amount of information on the web. Back to top 1998 August * Sun co-founder Andy Bechtolsheim writes a check for $100,000 to an entity that doesn’t exist yet: a company called Google Inc. September * Google sets up workspace in Susan Wojcicki’s garage at 232 Santa Margarita, Menlo Park. * Google files for incorporation in California on September 4. Shortly thereafter, Larry and Sergey open a bank account in the newly-established company’s name and deposit Andy Bechtolsheim’s check. * Larry and Sergey hire Craig Silverstein...

Words: 11054 - Pages: 45

Free Essay

Disseminating Organizational It Security & Trouble Shooting

...Disseminating Organizational IT Security & Trouble Shooting When we talk about the increase security with proper authentication policies; infrastructure security is more than just firewalls and security patches. Most IT environments have some type of remote access. VPN, e-mail, and many other services expose your user accounts to the world. This article will focus on how to deal with user accounts of your current and former employees. Proper password aging policies will naturally take care of old or unused accounts. The idea behind password aging is that after a certain amount of time, a password expires. A password is less prone to compromise if it is changed frequently. Likewise, if an account is compromised, its usefulness will be limited to the amount of time left before the expiry timer concludes. Aging account passwords can reduce exposure if brute-force, social engineering, or sniffing attempts are successful. The strength of the password itself is also extremely important. It is imperative that the systems requiring users to change their passwords also enforce some level of strictness with regards to what passwords are accepted. An un-guessable password makes brute-force attacks the premiere method by which accounts are compromised mostly ineffective. An exhaustive brute-force attack will eventually discover all passwords, given enough time, but the idea is to use a password of sufficient length, so that it can’t be guessed in a reasonable amount of attempts. The successful...

Words: 3223 - Pages: 13

Free Essay

Engineering

...-Aa posteriori distribution a priori distribution A.C. pulse abandoned connection abbreviated address calling abend aberration abnormal end abnormal reflection abnormal termination abort sequence abort, to aborted connection absolute code absolute delay absolute error absolute error of measurement absolute instruction absolute instrument absolute pressure absolute stability of a system absolute system of electrical units absolute-value device absolutely stable system absolutely summable absorb, to absorbant absorbing state absorption cross-section absorption loss absorption modulation absorption absorption spectrum absorption trap absorptive attenuator abstract abstract symbol abstract syntax tree abstraction AC AC/DC converter accelerate, to accelerated test accelerating relay acceleration of gravity sonsal dağılım önsel dağılım almaşık akım darbesi yarıda kalan bağlantı kısa numarayla arama olağandışı sonlanma sapınç olağandışı son olağandışı yansıma olağandışı son durdurma dizisi (bitirmeden) durdurmak yarıda kalan bağlantı makina dilindeki kod, mutlak kod mutlak gecikme mutlak hata mutlak ölçüm hatası makina dilindeki komut, mutlak komut mutlak ölçü aleti mutlak basınç bir dizgenin mutlak kararlılığı elektrik birimlerinin mutlak sistemi mutlak değer aygıtı mutlak kararlı dizge mutlak toplanır soğurmak soğurgan soğurucu durum etkin soğurma alanı soğurum yitimi enerji soğurum kiplenimi soğurulma, soğurum soğurum izgesi soğurum tuzağı soğurgan zayıflatıcı 1) öz; 2) soyut soyut...

Words: 38690 - Pages: 155

Free Essay

Traffic Engineering

...Traffic Engineering Design This page intentionally left blank Traffic Engineering Design Principles and Practice Second edition Mike Slinn MVA Limited, MVA House, Victoria Way, Woking GU21 1DD, UK Paul Matthews MVA Limited, Third Floor, One Berners Street, London W1T 3LA, UK Peter Guest 8 The Grove, Farnborough, Hampshire GU14 6QR, UK AMSTERDAM • BOSTON • HEIDELBERG • LONDON • NEW YORK • OXFORD PARIS • SAN DIEGO • SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Elsevier Butterworth-Heinemann Linacre House, Jordan Hill, Oxford OX2 8DP 30 Corporate Drive, Burlington, MA 01803 First published by Arnold, 1998 Reprinted 2003 Second edition 2005 Copyright © 2005, Elsevier Ltd. All rights reserved. No part of this publication may be reproduced in any material form (including photocopying or storing in any medium by electronic means and whether or not transiently or incidentally to some other use of this publication) without the written permission of the copyright holder except in accordance with the provisions of the Copyright, Designs and Patents Act 1988 or under the terms of a license issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London, England W1T 4LP. Applications for the copyright holder’s written permission to reproduce any part of this publication should be addressed to the publisher. Permissions may be sought directly from Elsevier’s Science and Technology Rights Department in Oxford, UK: phone: (ϩ44) (0) 1865 843830; fax: (ϩ44) (0) 1865 853333;...

Words: 83129 - Pages: 333

Free Essay

Comp Txt

...the publishers will be pleased to make the necessary arrangements at the first opportunity. Although every effort has been made to ensure that website addresses are correct at time of going to press, Hodder Education cannot be held responsible for the content of any website mentioned in this book. It is sometimes possible to find a relocated web page by typing in the address of the home page for a website in the URL window of your browser. Photo credits p.1 © peno – Fotolia; p.15 © Dmitrydesigner/Fotolia; p.16 ©iStockphoto.com/Karl Yamashita; p.57 © Romanchuck – Fotolia; p.58 t © C Squared Studios/Photodisc/Getty Images, m ©Dmitriy Melnikov - Fotolia.com, b © Popova Olga/Fotolia; p.59 © picsfive – Fotolia; p.65 © Manfred Schmidt – Fotolia.com; p.67 © dja65 – Fotolia; p.68 © Konstantin Shevtsov – Fotolia; p.69 t © Miguel Navarro/Stone/Getty Images, b © Piero Cruciatti/Alamy; p.73 © Jamdesign/Fotolia; p.78 and 79 © adisa – Fotolia; p.81 © Mykola Mazuryk – Fotolia; p.82 t © Mauro Rodrigues/Fotolia, b ©Martin Dohrn/Science Photo Library; p.83 © Norman Chan – Fotolia; p.85 © Studio 10 /Alamy; p.86 © Brennan JB7 produced by Martin Brennan; p.87 © Sergojpg/Fotolia; p.88 and 110 b © Jürgen Fälchle/Fotolia; p.108 t © Andrew Brown/Fotolia, b © Stanford Eye Clinic/Science Photo Library; p.114 © Tan Kian Khoon – Fotolia. 3 Hachette UK’s policy is to use papers that are natural,...

Words: 49691 - Pages: 199

Premium Essay

Evolution of Computers

...CHAPTER 1: INTRODUCTION In the beginning of civilization, people used fingers and pebbles for computing purposes. In fact, the word 'digit us' in Latin actually means 'finger' and 'calculus' means 'pebble'. This gives a clue into the origin of early computing concepts. With the growth of civilization, the computing needs also grew. The need for a mechanism to perform lengthy calculations led to the invention of the first calculator and then the computers. The term 'computer' is derived from the word 'compute', which means to calculate. A computer is an electronic machine, devised for performing calculations and controlling operations that can be expressed either in logical or numerical terms. In simple words, a computer is an electronic device that performs mathematical and non-mathematical operations with the help of instructions to process the data to achieve desired results. Although the application domain of a computer depends totally on human creativity and imagination, it covers a huge area of applications including education, industries, government, medicine, scientific research, law and even music and arts. This chapter provides a detailed description of evolution, generations and characteristics of computers along with their classification and applications. CHAPTER 2: CHARACTERISTICS OF COMPUTERS Man developed computers so that it could perform intricate operations such as calculation and data processing or entertain him. Today, computers are everywhere—in...

Words: 9431 - Pages: 38

Free Essay

Money & Banking

...Kelcie Jeffries Money & Banking Mr. Foster March 8, 2014 How Technology has changed the Banking World over Time The ATM “In 1939, Luther Simjian patented an early and not-so-successful prototype of an ATM. However, some experts have the opinion that James Goodfellow of Scotland holds the earliest patent date of 1966 for a modern ATM, and John D White in the US is often credited with inventing the first free-standing ATM design. In 1967, John Shepherd-Barron invented and installed an ATM in a Barclays Bank in London. Don Wetzel invented an American made ATM in 1968. However, it wasn't until the mid to late 1980s that ATMs became part of mainstream banking” (Bellis). Although we can see that it is not clear on who invented the ATM, I think they all played an important role in developing what we have in today’s world. Don Wetzel was the most recent with installing one of the first ATMs in American and him and two other men invented what we know as today as the ATM card. The ATM made its first showcase on the outside at the Rockville Center, New York Chemical Bank. Also, another interesting fact I learned about this first ATM was that it only gave you cash it did not tell you your balance or let you transfer funds like we can at today’s ATM. “The ATM we know today was later installed and invented in 1971 and was called the total teller” (Bellis). During this era not every customer could have the right to an ATM card, banks would only let credit card holders have access...

Words: 2669 - Pages: 11

Premium Essay

Student

...Do The Deep Information Computer Technology Author Musisi Boney 2013 EDITION Authored by Musisi Boney; +256788489095 2 Table of contents Topics Page Introduction To Computer …………………………………………………….. 5 History & Evolution Of Computers ………………………………………….... 7 Computer Generation …………………………………………………………. 11 Computers Today ……………………………………………………………... 15 Computer Classification ………………………………………………………. 19 Computer System ……………………………………………………………... 25 Computer Hardware ………………………………………………………….. 27 - Input devices/hardware .………………………………………………..27 - Output devices/ hardware..…………………………………….…….....39 - Storage hardware /devices ……………………………………………..49 - Processing devices/hardware …………………………………………..63 - Communication devices/hardware…………………………………….. Computer Software …………………………………………….……………...69 - Utility program …………………………………………………………70 - Operating system ……………………………………………….………72 - Programming languages ………………………………………………78 - Terminologies Used in Software ………………..……………….…....80 Powering A Computer ……………………………………………….………..83 Uninterrupted Power Supply……………………………………………….....85 Computer Configuration…………...…………………………….……………87 Computer Viruses ……………………………………………….……………89 Communication ………………………………………………………………95 Internet ………………………………………………………………………113 Web Design …………………………………………………………………121 Computer Ethics …………………………………………………….………125 Computer Crimes …………………………………………………….……..129 Authored by Musisi Boney; +256788489095 3 Authored by Musisi Boney; +256788489095 4 A COMPUTER ...

Words: 30445 - Pages: 122

Premium Essay

Computer

...input unit consists of one or more input devices. Keyboard is the one of the most commonly used input device. Other commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the input devices perform the following functions.  Accept the data and instructions from the outside world.  Convert it to a form that the computer can understand.  Supply the converted data to the computer system for further processing. Storage Unit: The storage unit of the computer holds data and instructions that are entered through the input unit, before they are processed. It preserves the intermediate and final results before these are sent to the output devices. It also saves the data for the later use. Memory Size: All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is represented by an 8 bit code. The set of 8 bits is called a byte. A character occupies 1 byte space. A numeric occupies 2 byte space. Byte is the space occupied in the memory. The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte). One KB is equal to 1024 bytes and one MB is equal to 1000KB. The size of the primary storage in a typical PC usually starts at 16MB. PCs having 32 MB, 48MB, 128 MB, 256MB memory are quite common. Output Unit: The output unit of a computer provides the information and results of a computation to outside world. Printers, Visual Display Unit...

Words: 9444 - Pages: 38

Free Essay

Deep Learning Wikipedia

...Deep Learning more at http://ml.memect.com Contents 1 Artificial neural network 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.2.1 Improvements since 2006 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.1 Network function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.3.2 Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.3 Learning paradigms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.4 Learning algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.4 Employing artificial neural networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.5 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.1 Real-life applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.5.2 Neural networks and neuroscience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1.6 Neural network software ...

Words: 55759 - Pages: 224

Premium Essay

Nothing

...TELECOMMUNICATION SWITCHING AND NETWORKS TElECOMMUNICATION SWITCHING NffiWRKS AND THIS PAGE IS BLANK Copyright © 2006, 2005 New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (10) : 81-224-2349-3 ISBN (13) : 978-81-224-2349-5 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com PREFACE This text, ‘Telecommunication Switching and Networks’ is intended to serve as a onesemester text for undergraduate course of Information Technology, Electronics and Communication Engineering, and Telecommunication Engineering. This book provides in depth knowledge on telecommunication switching and good background for advanced studies in communication networks. The entire subject is dealt with conceptual treatment and the analytical or mathematical approach is made only to some extent. For best understanding, more diagrams (202) and tables (35) are introduced wherever necessary in each chapter. The telecommunication switching is the fast growing field and enormous research and development are undertaken by...

Words: 115682 - Pages: 463