Monday, December 30, 2019
Beloved Passage Analysis - 1335 Words
Buffalo men, they called them, and talked slowly to the prisoners scooping mush and tapping away at their chains. Nobody from a box in Alfred, Georgia, cared about the illness the Cherokee warned them about, so they stayed, all forty-six, resting, planning their next move. Paul D had no idea of what to do and knew less than anybody, it seemed. He heard his co-convicts talk knowledgeably of rivers and states, towns and territories. Heard Cherokee men describe the beginning of the world and its end. Listened to tales of other Buffalo men they knew ââ¬â three of whom were in the healthy camp a few miles away. Hi Man wanted to join them; others wanted to join him. Some wanted to leave; some to stay on. Weeks later Paul D was the only Buffaloâ⬠¦show more contentâ⬠¦Context and Summary: Escape Plans Morrisonââ¬â¢s Beloved delves deeply into the world of abuse and pain, brought from a lifetime of slavery. Chapter 10 reveals Paul Dââ¬â¢s history between his escape from a prison in Alfred, Georgia after attempting to kill Brandywine and when he appears on Setheââ¬â¢s doorstep at 124 Bluestone Road, Cincinnati. Shortly after Paul Dââ¬â¢s escape from prison, he and forty-six other prisoners walked into a camp of sick Cherokees, who broke their chains and provided for them. However, as each individual prisoner dispersed, Paul D, the last ââ¬Å"Buffalo manâ⬠, remained uncertain with his destination. For so long, Paul D merely wished to be relieved of Sweet Home, the place where he worked as a slave, as well as his dreadful memories of watching his companions get severely punished. The passage on page 132 focuses on Paul Dââ¬â¢s journey to the ââ¬Å"freeâ⬠and ââ¬Å"magical northâ⬠by the aid of tree flowers as they continually bloomed in the warm weathe r to his temporary destination in Delaware. Eighteen months later, Paul D finally manages to trap his horrible memories into ââ¬Å"the tobacco tin lodged into his heartâ⬠, giving this character background as well as depth. Tone: Uncertain Hope In the beginning of this passage, Morrisonââ¬â¢s tone is uncertain, not using many adjectives to describe the prisonersââ¬â¢ relief when they were free, as if the prisoners themselves were uncertain on what emotion to convey.Show MoreRelatedEffectiveness Of Stylistics On The Reader. Stylistics Are1527 Words à |à 7 Pagesdetermining the effectiveness said literature has on the reader. The novels Such is My Beloved and By Grand Central Station I Sat Down and Wept both involve the concepts of sex and religion, but are each enjoyed by different groups of readers, Factors that highlight these differences include the point of view which story is told from, the word choice by the author, and the style the novel is written with. Such is My Beloved is enjoyed by more readers due to its following of a traditional form of writingRead MoreAnalysis Of The Book Isaiah Reveals Yahweh s Judgment And Salvation 777 Words à |à 4 Pagesscriptural passage with thoughtful clarity for the int ention of practical application. Isaiah 5:1-7 expresses Yahwehââ¬â¢s judgment against the house of Israel, for not bringing forth spiritual fruit through what He has provided for them. Initial Assessment of Isaiah 5:1-7 Prior to delving into the passage, ensuring the development of the passage, the reader will come upon a parable (Isaiah 5:1-6), which then the nature of the parable is given (5:7). First and foremost, this passage should beRead MoreAnalysis of Rhetorical Strategies in The Company Man Essays1009 Words à |à 5 PagesAnalysis of Rhetorical Strategies in ââ¬Å"The Company Manâ⬠In ââ¬Å"The Company Manâ⬠by Ellen Goodman, throughout the passage Goodman illustrates her feelings of distaste and anger toward Phil, as he in her mind represents Corporate America: routine, indifferent, almost robotic. Goodman uses numerous rhetorical strategies to convey her attitude toward Phil, including tone, repetition, the use of statistics, sarcasm, anecdotes, differing syntax, and irony. From the beginning, Goodman createsRead More Exploring Personal Choices in Toni Morrisons Beloved Essay1466 Words à |à 6 PagesExploring Personal Choices in Toni Morrisons Beloved At the climax of her book Beloved, Toni Morrison uses strong imagery to examine the mind of a woman who is thinking of killing her own children. She writes, Because the truth was simple, not a long-drawn-out record of flowered shifts, tree cages, selfishness, ankle ropes and wells. Simple: she was squatting in the garden and when she saw them coming and recognized schoolteachers hat, she heard wings. Little hummingbirds stuck their needleRead More Textual Analysis of Epic of Gilgamesh and Book of Genesis of the Holy Bible1056 Words à |à 5 PagesA Textual Analysis of Genesis and the Epic of Gilgamesh The stories of the floods found in both Gilgamesh and Genesis contain many striking similarities that are inevitably beyond mere coincidence. One could surmise that both of these stories might have a basis in common historical occurrence. However, despite the fact that both of these works discuss a common topic, the portrayal of this event is quite different. Like identical twins raised in different cultures, the expressions ofRead MoreThe Style of Toni Morrisons Beloved1118 Words à |à 5 Pages Style Analysis of Belovednbsp;nbsp; In the 500 word passage reprinted below, from the fictional novel Beloved, Toni Morrison explains the pent-up anger and aggression of a man who is forced to keep a steady stance when in the presence of his white masters.nbsp; She uses simple language to convey her message, yet it is forcefully projected.nbsp; The tone is plaintively matter-of-fact; there is no dodging the issue or obscure allusions.nbsp; Because of this, her work has an intensity unparalleledRead More Essay on Twelfth Night: A Gender-Bending Journey1574 Words à |à 7 Pagesreveals his hidden love, she is mistaken. Her misinterpretation of Cesarioââ¬â¢s manner is one of many problems contained within the drama. Cesarioââ¬â¢s true gender, Oliviaââ¬â¢s active pursuit of him/her, and the ambiguity of words with double meanings in this passage threaten to turn wholesome, romantic conquest on its head, or as Olivia says ââ¬Å"turn night to noonâ⬠(139). à à à à à à à à à à à à Perhaps the biggest upset to the traditional structure is the possibility that Olivia may be in love with a woman. ShakespeareRead More Essay on Love and Gender in Twelfth Night1551 Words à |à 7 Pageshidden love. However, Olivias mistaken interpretation of Cesarios manner is only the surface problem presented by her speech. The reality of Cesarios gender, the active role Olivia takes in pursuing him/her, and the duality of word meanings in this passage threaten to turn the traditional patriarchal concept of courtship upside down, or as Olivia says turn night to noon (139). à à à à à à à à à à à à Perhaps the biggest upset to the traditional structure is the possibility that Olivia may be in loveRead MoreComparison and Contrast of Classical Composers Handel and Bach693 Words à |à 3 Pagesthe rhythm of the word hallelujah, to structure the piece, lengthening the first note, and creating a stirring explosion of sound at the end (The pure power of Handels Hallelujah Chorus, NPR, 2008). The King of Kings passage is a single note, but by repeating the passage in higher and higher registers...[e]ach one seems to be the highest you could possibly get, creating the climax of the piece (The pure power of Handels Hallelujah Chorus, NPR, 2008). The sound is uncomplicated, powerfulRead MoreKing Lear, By William Shakespeare938 Words à |à 4 Pagessymbolic function of blindness recalls the lessons of both the old god and the new. The playââ¬â¢s references to seeing, to eyes, to vision and to blindness are many. Typically, these passages r efer to being able to see oneââ¬â¢s way along a road or a path. For the purposes of this analysis, this essay will focus on two passages drawn from the text of the play. The first is quoted below: I have no way, and therefore want no eyes; I stumbled when I saw. Full oft tis seen Our means secure us, and our mere
Sunday, December 22, 2019
Prohibition Of The Usa Prohibition - 2994 Words
Prohibition in the USA Prohibition was introduced to the United States of America on the 16th of January 1920 with the hope of a pure nation that was not under the influence of alcohol. Prohibition was the legal prohibiting of the manufacture and sale of alcoholic beverages, which did not include the consuming of alcohol as you could still keep alcohol that was made or bought before 16th of January 1920. As the alcohol consumption rose substantially before the 1920s, it spurred the temperance movements in forcing this law of prohibition into parliament. Prohibition was then put into effect with the eighteen amendment of the constitution by Andrew J Volstead known as the Volstead act. This law was created in the hope of reducing the consumption of alcohol, but in actual fact it lead to; organised crime, bootlegging, gangsters, illegal smuggling, speakeasies and moonshines which all encouraged the consumption illegal liquor. This law also had many effects on the society such as the economy and the deaths rel ated to alcoholic poisoning. Still today there is a debate on whether it was a moral noble action or a failure, but would America have been better off not having a national prohibition? Before prohibition Increase in alcohol filled society and according to prohibitionists Americas only highlight of life was to get drunk. Between 1900 and 1913, Americans began to drink more and more, beer production jumped form 4.6 billion litres to 7.6 billion litres and the volume of taxShow MoreRelatedProhibition in Usa 1900-19301027 Words à |à 5 PagesProhibition in USA in the 1900ââ¬â¢s The prohibition was brought on by the strong temperance movement happening in America in the early 1900ââ¬â¢s. These groups were devout Christians who vowed to be sober as they saw the affect alcohol had on families. But the members of this movement campaigned for everyone to give up alcohol. The arguments of the Temperance groups were so strong that they eventually convinced state governments to prohibit the sale and produce of alcohol in their state. Politicians backedRead MoreEssay about Prohibition in the USA in 19191038 Words à |à 5 PagesProhibition in the USA in 1919 Prohibition was introduced in 1919; however it is impossible to find one simple reason for why it was introduced. It was not a new idea as the movement had already begun in 1830. By 1914 over half of Americas states were dry. At one minute past midnight on January 16th 1920 the law against the sale and transportation of alcohol in America became law; however in 1917 the law had been passed by congress due to the eighteenth amendmentRead MoreHow did the Prohibition Change the United States of America (USA)? And why was it a failure?1490 Words à |à 6 PagesThe word Prohibition as stated in the World Book encyclopaedia refers to laws that are designed to prevent the drinking of alcoholic beverages. The enforcement of the Volstead Act in the United States of America (USA) saw the nationwide beginning of the prohibition on the 16th of January 1920. The Prohibition brought about a change in attitude for the people of the United States (USA). It caused an extreme rise in crime; encouraging everyday people to break the law and increased the amount ofRead MoreEssay about The History of Prohibition975 Words à |à 4 PagesThe History of Prohibition Source A is aptly named ââ¬Å"Slaves of the saloonâ⬠. It shows a man handing over what we guess is his weekly wages to the owner of a saloon ââ¬â we guess by the men drinking in the background that he is using it to buy alcohol. The source also depicts a woman and her children sitting around a table with no food. We can guess fairly easily that this is the man in the saloonââ¬â¢s family; there is a bill on the floor hinting at lack of money for necessitiesRead More Prohobition Essays1189 Words à |à 5 PagesPROHIBITION In all probability, no one thing gave more character to the era known as the ââ¬ËRoaring 20sââ¬â¢, than what was called ââ¬Ëthe long dry spellââ¬â¢ (a.k.a. Prohibition). Prohibition was the result, of the longstanding efforts, by largely Protestant religious groups, who had preached temperance since the early colonial period. What had been known as the temperance movement came to be a drive for all out prohibition right about the turn of the century. From about 1900-1904 there was a dramaticRead MoreThe Consequences of Prohibition Essay1493 Words à |à 6 Pagesshort introduction A lot of things happened in 1920 Ãâ" USA was one of the victors in the first World War, and had a good period. Soon that was changed and USA suffered from many things, the great crash, prohibition and gang wars. But not only bad things happened Ãâ" there was also the new deal, new cultures, new poets and writers. The thing i want to write about is prohibition, that was a really big deal Ãâ" lots of books have beenRead MoreIs the Prohibition of Drugs Useful or Not? Essay1729 Words à |à 7 Pagesthe twentieth century, people in many countries become aware of drug prohibition. In fact, every country in the world has a form of drugs prohibition. However, national drug prohibition started in 1920s in the United States as a subgroup of national alcohol prohibition. In 1930 the congress of United States separated drugs from the alcohol prohibition law and created a new federal drug prohibition agency (Levine, 2002). Prohibition may be defined as the set of policies which ban all production, distributionRead More`` The Epic Of America `` By James Truslow Adams1019 Words à |à 5 Pagesgangsters like Al Capone, . ââ¬Å"America is a society of criminals might be more humanly interesting and morally satisfying than a society of empty routines irresponsibly powerful organization, widespread corruption and meaningless violenceâ⬠Immigration in USA in 20th century. Many families came to America is search of a better life and looking for a better future for themselves and their children. In 20th century, a million new immigrants arrived to America . Families have brought in their own cultureRead MoreWhy was Prohibition such a controversial issue during the 1920ââ¬â¢s1369 Words à |à 6 Pages Why was Prohibition such a controversial issue during the 1920ââ¬â¢s? Prohibition was the banning of the manufacture and sale of alcoholic beverages. The power to ban the production, export, import, transportation or sale of alcoholic beverages was given by the 18th Amendment, 1917. This was gradually adopted by state governments across America and was followed up in 1919 by the Volstead Act that defined intoxicating liquor as a drink containing 0.5% of alcohol and prescribedRead MoreThe Consequences of Prohibition Essay580 Words à |à 3 PagesThe Consequences of Prohibition On the midnight of 28th October 1919, importing, exporting, transporting, selling and manufacturing of intoxicating liquor came to a halt in America. Possessing substances above the 0.5% alcohol limit was illegal. This was Prohibition. This Eighteenth Amendment was meant to have reduced the consumption level, consequently to have reduced death rates, poverty and principally crime, in the USA. Yet this had quite the opposite effect. The
Saturday, December 14, 2019
Accounting Information Sytems Free Essays
Wikipedia: An accounting information system (AIS) is a system of collection, storage and processing of financial and accounting data that is used by decision makers. An accounting information system is generally a computer-based method for tracking accounting activity in conjunction with information technology resources. The resulting statistical reports can be used internally by management or externally by other interested parties including investors, creditors and tax authorities. We will write a custom essay sample on Accounting Information Sytems or any similar topic only for you Order Now The actual physical devices and systems that allows the AIS to operate and perform its functions 1. Internal controls and security measures: what is implemented to safeguard the data 2. Model Base Management The collection, storage and processing of financial and accounting data that is used by decision makers. An accounting information system is generally a computer-based method for tracking accounting activity in conjunction with information technology resources. The resulting statistical reports can be used internally by management or externally by other interested parties including investors, creditors and tax authorities. An accounting information systems that combines traditional accounting practices such as the Generally Accepted Accounting Principles (GAAP) with modern information technology resources. Six elements compose the typical accounting information system: People ââ¬â the system users. Procedure and Instructions ââ¬â methods for retrieving and processing data. Data ââ¬â information pertinent to the organizationââ¬â¢s business practices. Software ââ¬â computer programs used to process data. Information Technology Infrastructure ââ¬â hardware used to operate the system. Internal Controls ââ¬â security measures to protect sensitive data. MANAGEMENT ACCOUNTING Management accounting or managerial accounting is concerned with the provisions and use of accounting information to managers within organizations, to provide them with the basis to make informed business decisions that will allow them to be better equipped in their management andà control functions. In contrast to financial accountancy information, management accounting information is: primarily forward-looking, instead of historicallyà model based with a degree of abstraction to support decision making generically, instead of case based; designed and intended for use by managers within the organization, instead of being intended for use by shareholders, creditors, and public regulators; usually confidential and used by management, instead of publicly reported; computed by reference to the needs of managers, often using management information systems, instead of by reference to general. The process of preparing management reports andaccounts that provide accurate and timely financial and statistical information required by managers to make day-to-day and short-term decisions. Unlike financial accounting, which produces annual reports mainly for external stakeholders, management accounting generates monthly or weekly reports for an organizationââ¬â¢s internal audiences such as department managers and the chief executive officer. These reports typically show the amount of available cash, sales revenue generated, amount of orders in hand, state of accounts payable and accounts receivable, outstanding debts, raw material and inventory, and may also include trend charts, variance analysis, and other statistics. Also called managerial accounting. BUSINESS POLICY This course examines the components and processes of the strategic management model, using examples from Canada and the United States. Students learn to do case analysis throughout the course. Topics covered include strategic management, social responsibility, environmental and internal analysis and diagnosis, strategy selection, and implementation and evaluation After completing this course, students should be able to: Perform a rigorous analysis of a companyââ¬â¢s strategic direction. Identify and explain a companyââ¬â¢s mission and vision statement and relate and critiqueà these statements to the companyââ¬â¢s strategic direction. Prepare a SWOT (strengths, weakness, opportunities, and threats) analysis and explain and evaluate the relationship between the SWOT and a companyââ¬â¢s strategic direction. Identify and explain all micro and macro forces that shape a companyââ¬â¢s strategic plan and determine performance. Analyze and evaluate all the steps for the proper alignment of financial and non-financial resources within a companyââ¬â¢s strategic plan. Analyze a companyââ¬â¢s strategic plan in the context of the industry life cycle and environment in which it operates. Analyze, evaluate, and draw conclusions on the effectiveness and performance of control and integration mechanisms. Establish metrics to assess and measure strategic performance. Analyze and evaluate the companyââ¬â¢s communication and feedback loop relative to company strategy and performance. Analyze, evaluate, and draw conclusions on the financial performance relative to the companyââ¬â¢s strategic plan. Analyze, evaluate, and identify risks and risk mitigation strategies appropriate to the companyââ¬â¢s strategic direction. Analyze, evaluate, and develop strategies for a single or multi-business organization. Assess, analyze, and recommend changes to company strategy based on a full analysis of a companyââ¬â¢s strategic plan. Develop and prepare a strategic review document presented in a consistent form and properly documented. PRODUCTION AND OPERATIONS MANAGEMENT Production and Operations Management (ââ¬Å"POMâ⬠) is about the transformation of production and operational inputs into ââ¬Å"outputsâ⬠that, when distributed, meet the needs of customers.The process in the above diagram is often referred to as the ââ¬Å"Conversion Processâ⬠. There are several different methods of handling the conversion or production process ââ¬â Job, Batch, Flow and Group. POM incorporates many tasks that are interdependent, but which can be grouped under five main headings: PRODUCT Marketers in a business must ensure that a business sells products that meet customer needs and wants. The role of Production and Operations is to ensure that the business actually makes the required products in accordance with the plan. The role of PRODUCT in POM therefore concerns areas such as: ââ¬â Performance ââ¬â Aesthetics ââ¬â Quality ââ¬â Reliability ââ¬â Quantity ââ¬â Production costs ââ¬â Delivery dates PLANT To make PRODUCT, PLANT of some kind is needed. This will comprise the bulk of the fixed assets of the business. In determining which PLANT to use, management must consider areas such as: ââ¬â Future demand (volume, timing) ââ¬â Design and layout of factory, equipment, offices ââ¬â Productivity and reliability of equipment ââ¬â Need for (and costs of) maintenance ââ¬â Heath and safety (particularly the operation of equipment) ââ¬â Environmental issues (e.g. creation of waste products) PROCESSES There are many different ways of producing a product. Management must choose the best process, or series of processes. They will consider: ââ¬â Available capacity ââ¬â Available skills ââ¬â Type of production ââ¬â Layout of plant and equipment ââ¬â Safety ââ¬â Production costs ââ¬â Maintenance requirements PROGRAMMES The production PROGRAMME concerns the dates and times of the products that are to be produced and supplied to customers. The decisions made about programme will be influenced by factors such as: ââ¬â Purchasing patterns (e.g. lead time) ââ¬â Cash flow ââ¬â Need for / availability of storage ââ¬â Transportation PEOPLE Production depends on PEOPLE, whose skills, experience and motivation vary. Key people-related decisions will consider the following areas: ââ¬â Wages and salaries ââ¬â Safety and training ââ¬â Work conditions ââ¬â Leadership and motivation ââ¬â Unionisation ââ¬â Communication GOOD GOVERNANCE Good governance is about the processes for making and implementing decisions. Itââ¬â¢s not about making ââ¬Ëcorrectââ¬â¢ decisions, but about the best possible process for making those decisions.Good decision-making processes, and therefore good governance, share several characteristics. All have a positive effect on various aspects of local government including consultation policies and practices, meeting procedures, service quality protocols, councillor and officer conduct, role clarification and good working relationships. How to cite Accounting Information Sytems, Papers
Thursday, December 5, 2019
A Real Time Hand Gesture Recognition
Question: Write about theA Real Time Hand Gesture Recognition. Answer: Introduction Many diversified applications consider virtual environments as an efficient human computer interaction forms. There are many applications that require natural form of human computer interaction. Existing human-computer interactions method using mouse, keyboards and pens are not sufficient to support natural interaction with the computer. Hence, researchers always had an interest to explore new and natural form of human-computer interactions. Hand gestures based methods opened the gateway for the new methods of human computer interactions. In the beginning Gloves and sensor based tracker methods were introduced. These methods were not efficient, had many limitations and were not comfortable in use. Thus, new innovative methods were searched for a natural form of human computer based interaction. Direct use of hand through graphical based interfaces has proved to be a better from of natural human computer interaction. Computer vision technology and human-computer interaction have helped in designing and implementing many natural forms of human-computer interaction systems. These include interactions through gestures, speech, facial expressions, etc. Hand gesture recognition system thus is a human-computer interaction system that is capable of recognizing various gestures of a human hand. The human gesture can be static or dynamic. Different methods have been proposed and implemented for recognizing human hand gestures. Some methods make use of external devices like gloves and some make use of skin color to segment the hand features. This research work makes use of Hidden Markov Model along with morphological operations in recognizing hand gestures for a natural HCI system. Over the years of research on Hidden Markov Model has proven that these models performances are better than the others like artificial neural networks, fuzzy logic, for pattern recognition. Thus, this works makes use of simple k ind of integration of digital image processing techniques and Hidden Markov model based methodology for hand gesture recognition. The methodology is given in section below after theoretical description. Methodology first explains the overall system workflow diagram and each step of the diagram and the process undertaken in it are explained in the section following it. Finally the experimentation and the results are described in sections following it. Theoretical Foundation Hand Detection Gesture is a sort of non-verbal method of conveying message where in a bodily based actions are used to communicate a message. Gestures are categorized as static or dynamic. In the first form of category the static gesture the bodily part remain in certain pose or positions and are thus easier to compute and in dynamic gesture the bodily part is represented through sequence of postures and is more complex in nature to compute. Since communication is evolving so are new methods of communication are sought for (Chen, Fu, and Huang, 2003). Among them one of the emerging methods are acquiring information of message through recognition of gestures systems. Existing methods on gesture recognition focus on devices like data gloves, color markers, skin color, hand body part movement etc. Gesture recognition has opened gates for new methods of Human-Computer interaction even more powerful than Graphical User interfaces based on mouse and keyboards. Gesture recognition can enable human to interact with the machine with no external devices like mechanical devices in use. Gesture recognition is broadly classified as Glove based Gesture Recognition and Vision-Based Gesture Recognition. Glove based Gesture recognition has a drawback that it hides the naturalness as it needs accessories in the form of devices to interact with machines. But Vision-based gesture recognition uses features from the Visual image of body part like hand and compares its features with those features extracted from web camera (Ionescu, et. al, 2005). Gaussian Blurred Filter Gaussian Blur filter is a variant of a blur filter. This filter for a given selection selects only a part of an image and blurs its. This may result in color leakage from unblurred area to the blurred area of the image. Thus, Gaussian filter is used to blur the images by removing noise and details from it. The one dimensions Gaussian function is defined as: In the above equation, is known as the standard deviation of the distribution .The mean value of this distribution is 0. Images should be of two-dimensional Gaussian functions (Mitra and Acharya, 2007) which are the product of two one-dimensional Gaussian functions for each direction and thus is given by the following equation: Thus, for images the Gaussian filter works using two-dimensional distribution function as a point-spread function and thus the blurring of the image is achieved by convolving the image with the two-dimensional Gaussian distribution function of the image. Figure 1: a. Image with noise b. Image after filtering (Ng and Ranganath, 2002) RGB to HSV The RGB model contains three primary color red, green and blue. It symbolizes the cathode ray tube based color model. These are called as the primary colors and their combination can result in the production of any other desired color. The RGB color model makes use of the Cartesian coordinate based system (Sarkar, Sanyal, and Majumder, 2013). The RGB color model and the Cartesian system is given in the figure below. The diagonal which has coordinates (0,0,0) represents black color and (1,1,1) represents white color totally defines the gray-scale. Figure 2: RGB Model HSV Color Model The HSV color model represents the Hue, saturation and value of an image. The HSV coordinate system is in a hexacone as given in the figure below. The values of the coordinates represent the intensity of a color (Yang and Ahuja, 2001). The hue value changes from 0 to 1 for various colors starting from 0 to red than yellow, green, cyan, blue, magenta and again 1 o red. Saturation value also varies from 0 to 1 and corresponds to the unsaturated shades representing shades of grey to fully saturated shades representing no white based colors. Brightness value varies from 0 to 1 and it corresponds to the light intensity of a color with 0 as less to brighter value at 1. Figure 3: a. HSV coordinate system b. HSV Color Model RGB to HSV Conversion Considering the figure below, the point P in the figure has a hue measured at an angle between the line connecting triangle center and RED point and triangle center and P point (Zhu, et. al., 2000). Figure 4: RGB to HSV For a given point P the is defined as the distance between the point P and the triangle center and finally the intensity for the point P is given as the height of the line which is perpendicular to the given triangle and passes through its center (Anzai, 2012). Thus, from the above description, the RGB to HSV conversion formula is given below. Morphological Process Morphological operations are the application of non-linear operations on the features of an image. These operations rely on the relative pixels of the image. These operations make use of structuring element which is a matrix which is placed on all the possible locations of the input image (Chen, Georganas, and Petriu, 2007). The structuring element combines the input binary image using a set of operations like intersection, union, etc. the morphological operations are erosion, dilation, boundary detection, openness, etc. Canny Edge Detection The Canny edge detection is an edge location algorithm that uses a multi-stage calculation to detect edges of the image (Lee and Kim, 1999). It was developed by John F. Shrewd in 1986. Canny edge detection algorithm process is given below: First make use of Gaussian channel based filter to blur the picture Compute the force inclinations of the given input image. Then non-greatest concealment is applied to dispose of any suspicious points which acts as hindrances to edge discovery Twofold limit is applied on the image to help in deciding the edges Finally the edges are recognized by smothering the edges that are frail and not associated with solid edges. Blob Detection Blob detection is used to detect specific regions of an image that differ from the surrounding image in properties like brightness, color, etc. blob detectors are of two types one the differential method which is dependent on the derivate of the function related to the position of the region and the other is based on the local maxima and minima function of the region (Murthy and Jadon, 2009). HMM -Hidden Markov Model Consider a person has three coins and he tosses those coins in a sequence known to him. The total outcome of flipping the coins is the observation sequence of the whole event. Now the persons standing outside the room is not aware of the sequence of the coins. Now if one considers that the third coin outcome is mostly tails and if all the coins are tossed in equal probability then one can easily say that the number of tails is more than the heads. If the probability of moving the state of the first coin or the second coin to the state of the third coin is zero and then tossing is started using first and second coins then the outcome sequence of the toss shall result in more tails due to the transition of probabilities between the state of coins and the initial state of the coins (Ramamoorthy et. al., 2003). Thus, the given example forms three sets one the set of individual bias, the seconds the set of transition of probabilities and the third the set of initial probabilities. These s et form the basis of Hidden Markov Model. Hidden Markov model is thus defined as a collection of finite states which are connected by a transition. Each state has two sets of probabilities a transition probability and the other a discrete output probability or continuous output probability. These output probability density function define the condition of producing a given output from an input random vector. Experiment, Methods and Design Methodology The methodology for hand gesture recognition system is based on the following figure: Figure 5: Methodology The gesture recognition system is capable of identifying meaningful gesture in real-time from color image sequences using HMM. The steps and the explanation for the given methodology are given below: Step 1: acquire image from the video Using webcam of good resolution a video is acquired by the system. The video is broken into image sequences at a given interval to give images of the hand. Step 2: preprocessing of the image Since the image acquired from the webcam may be noisy thus to make the image perfect for hand detection it is essential to do some preprocessing of the image. This includes segmentation of the image, morphological operations, filtering and de-noising of the image. First, the image is converted into HSV scale from the colored RGB model. This generates a binary image with binary threshold values (Suk, Sin, and Lee, 2008). Now in the segmentation process, the background image and the foreground image is segmented using a selection of an adequate threshold of gray level. This segmentation separates the hand part of the image from the background image. Existing Research has proved that OStu segmentation algorithm has good results on hand gestures and hence this algorithm is used for segmentation of the image. The segmented image using Otsu algorithm has some background part with 1 values as background noise and some hand part of the image as 0 values as gesture noise. This morphological filtering consisting of dilation and erosion is used to get an image with smooth and closed filtered image (Yeasin and Chaudhuri, 2000). To have accurate hand gesture position in the image blob detection is carried out on the image. This helps in identifying the centroid point, boundary area and bounding box for the hand gesture. Canny edge detection algorithm is applied to the image to smooth the image, eliminate any noises if any then find the edges of the hand gesture giving a black and white image with white lines representing the boundary or the edge of the hand gesture. Step 3: Feature extraction For each binary image of the hand, a Fourier Descriptor (FD) is formed which represents the boundary of the image. The boundary of the image is represented as bk= xk+jyk where xk and yk represent the boundary pixels. This number is resampled at fixed length sequences. Thus, for an image a discrete vector is formed which represents the features of the image like centroid, orientation etc. this discrete vector is given to the HMM as an input. Step 4: HMM-based gesture recognition The final step is the classification of the image into the set of already defined hand gestures. HMM is made up of five stages with a feed forward algorithm. The discrete input vector is quantized (Zhu, Xu and Kriegman, 2002). The HMM is trained using the BaumWelch re-estimation formulas. The training identifies the initial probability vector, transitions probability matrix, and observation probability matrix. In training, the discrete vector is used to construct gesture database which contains isolated hand gestures. In this work, the system is designed for recognizing gesture by zero-code word detection where each gesture ending with a line segment is assigned a zero code word. After the training process, the feed forward algorithm is applied. This algorithm computes the probability of the input discrete vector sequences for HMM topology. This results in the gesture path corresponding to the maximal likelihood of the database gestures. The one with maximum likelihood is selected as the recognized hand gesture (Sarkar, Sanyal and Majumder, 2013). Experimentation Using the above methodology the Hand gesture recognition system is designed in C++ language on Visual studio platform. OpenCV libraries have been used to help in the programming to have integration of some functions supporting digital image processing using C++ language. First the hand movements are captured via a video camera or a web camera of the laptop. This is done using the command Video Capture cap. Once a video is captured it is divided into the snapshots of the images to get image of the hand. A good image is selected and that particular image is converted into HSV from the existing RGB format using the function COLOR BGR2HSV code (Mitra and Acharya, 2007). Using the concept of image segmentation the foreground and background images are segmented. The skin color is determined using the HSV values and the image is converted to binary form for image segmentation. Edges of the hand are determined using the edge detection algorithm and then the feature extraction is helpful to convert the image into vector. After then the HMM is used to generate close templates to identify gestures. The above algorithm is executed on the C++ based environment. Results The following figure displays the result of the hand gesture recognition using the designed system. Figure 6: HSV Control Figure 7: a. Original image b. HSV image Figure 8: a. Edge detection output b. Threshold image Conclusion Nowadays, gesture-based recognition system research has increased and new techniques and methods are carried out daily for enhancing the accuracy of the overall system. This work successfully implements a hand gesture recognition system for a given video of hand gesture movement. This work makes use of image segmentation to segment the foreground and background of the image, and then carries out morphological filtering of the image to remove the noise and enhance the image (Chen, Georganas, and Petriu, 2007). Then the edges of the hand gesture are recognized and the boundary of the image is transformed to a discrete random vector. This vector is given to the HMM for classification of the hand gesture based on the training database already created. The program was successfully able to recognize hand gesture and it is proposed that the accuracy of the system is about 92%. References Alsheakhali, M., Skaik, A., Aldahdouh, M. and Alhelou, M., 2011. Hand Gesture Recognition System.Information Communication Systems,132. Anzai, Y., 2012.Pattern Recognition Machine Learning. Elsevier. Chen, F.S., Fu, C.M. and Huang, C.L., 2003. Hand gesture recognition using a real-time tracking method and hidden Markov models.Image and vision computing,21(8), pp.745-758. Chen, Q., Georganas, N.D. and Petriu, E.M., 2007, May. Real-time vision-based hand gesture recognition using haar-like features. InInstrumentation and Measurement Technology Conference Proceedings, 2007. IMTC 2007. IEEE(pp. 1-6). IEEE. Ionescu, B., Coquin, D., Lambert, P. and Buzuloiu, V., 2005. Dynamic hand gesture recognition using the skeleton of the hand.EURASIP Journal on Advances in Signal Processing,2005(13), pp.1-9. Lee, H.K. and Kim, J.H., 1999. An HMM-based threshold model approach for gesture recognition.Pattern Analysis and Machine Intelligence, IEEE Transactions on,21(10), pp.961-973. Mitra, S. and Acharya, T., 2007. Gesture recognition: A survey.Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on,37(3), pp.311-324 Murthy, G.R.S. and Jadon, R.S., 2009. A review of vision based hand gestures recognition.International Journal of Information Technology and Knowledge Management,2(2), pp.405-410. Ng, C.W. and Ranganath, S., 2002. Real-time gesture recognition system and application.Image and Vision computing,20(13), pp.993-1007. Ramamoorthy, A., Vaswani, N., Chaudhury, S. and Banerjee, S., 2003. Recognition of dynamic hand gestures.Pattern Recognition,36(9), pp.2069-2081. Sarkar, A.R., Sanyal, G. and Majumder, S., 2013. Hand gesture recognition systems: a survey.International Journal of Computer Applications,71(15). Suk, H.I., Sin, B.K. and Lee, S.W., 2008, September. Recognizing hand gestures using dynamic bayesian network. InAutomatic Face Gesture Recognition, 2008. FG'08. 8th IEEE International Conference on(pp. 1-6). IEEE. Yang, M.H. and Ahuja, N., 2001. Recognizing hand gestures using motion trajectories. InFace Detection and Gesture Recognition for Human-Computer Interaction(pp. 53-81). Springer US. Yeasin, M. and Chaudhuri, S., 2000. Visual understanding of dynamic hand gestures.Pattern Recognition,33(11), pp.1805-1817. Zhu, Y., Ren, H., Xu, G. and Lin, X., 2000. Toward real-time human-computer interaction with continuous dynamic hand gestures. InAutomatic Face and Gesture Recognition, 2000. Proceedings. Fourth IEEE International Conference on(pp. 544-549). IEEE. Zhu, Y., Xu, G. and Kriegman, D.J., 2002. A real-time approach to the spotting, representation, and recognition of hand gestures for humancomputer interaction.Computer Vision and Image Understanding,85(3), pp.189-208.
Subscribe to:
Comments (Atom)