Team 6: Experimental Handwriting System Allen Alarcon Ingrid Anderson Bhupesh Kapoor Shi-wu Lee.

Slides:



Advertisements
Similar presentations
Group-awareness for Mobile Cooperative Learning
Advertisements

Remote Visualisation System (RVS) By: Anil Chandra.
A distributed architecture for crystallography data, metadata, and applications John C. Bollinger Indiana University Molecular Structure Center, Bloomington,
Data and metadata in the Reciprocal Net John C. Bollinger Indiana University Molecular Structure Center, Bloomington, IN.
CHAPTER 9, survey research
DREDGABL and GEOSITE Knowledge-Based Expert System Geotechnical Decision Support Tools for Dredging.
What are the questions really asking?
Técnicas de Calidad en el Software Sesión # 10. Good quality software Operations Transition Testing Portability Reusability Interoperability Maintainability.
ICS (072)Database Systems: A Review1 Database Systems: A Review Dr. Muhammad Shafique.
Forged Handwriting Detection Hung-Chun Chen M.S. Thesis in Computer Science Advisors: Drs. Cha and Tappert.
Detection of Forged Handwriting Using a Fractal Number Estimate of Wrinkliness Experts are required to differentiate between authentic and forged signatures.
Introduction CSCI102 - Introduction to Information Technology B ITCS905 - Fundamentals of Information Technology.
Knowledge is Power Marketing Information System (MIS) determines what information managers need and then gathers, sorts, analyzes, stores, and distributes.
MPARWG Deborah K Smith DISCOVER MEaSUREs Project Remote Sensing Systems.
Discovering Computers 2010
Software Documentation Written By: Ian Sommerville Presentation By: Stephen Lopez-Couto.
Medulla® Medico Legal reporting Software Copyright © 2009 Thar Bionics Private Limited Presented By Thar Bionics Private Ltd. Copyright.
Cis-Regulatory/ Text Mining Interface Discussion.
TC2-Computer Literacy Mr. Sencer February 8, 2010.
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
Taylor Trayner. Definition  Set of business processes developed in an organization to create, store, transfer, and apply knowledge  Knowledge is a firm.
Compact MythTV Frontend Advisor: Professor Wilsey Dustin Grimmeissen Richard Anderson David Kesler.
© URENIO Research Unit 2004 URENIO Online Benchmarking Application Thessaloniki 7 th of October 2004 Isidoros Passas BEng Computer System Engineering.
April 20023CSG11 Electronic Commerce Design (1) John Wordsworth Department of Computer Science The University of Reading Room.
Crowdsourcing Predictors of Behavioral Outcomes. Abstract Generating models from large data sets—and deter¬mining which subsets of data to mine—is becoming.
FAEIS Project User Opinion Survey 2005 Thursday, June 23, 2005 Washington, D.C. H. Dean SutphinYasamin Miller ProfessorDirector, SRI Agriculture & Extension.
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
Overview of Informatics
Hala Bezine IGS 2011 Cancun-Mexico 1 Presented by :M me Hala Bezine Republic of Tunisia Ministery of Higher Education and Scientific Research University.
Dr. PARICHART PALANANTANA RATTANA BUNDIT UNIVERSITY Study the Readiness and Characteristics of e-Learning for Students at Private Universities in Bangkok.
BEN Architecture Isovera Consulting Feb Internet consulting for non-profits 2 BEN Architecture Diagram.
Data Visualization Project B.Tech Major Project Project Guide Dr. Naresh Nagwani Project Team Members Pawan Singh Sumit Guha.
Preliminary Evaluation Results: A Discussion with the Advisory Committee on Citizen-Friendly Reporting August 30, 2005 Human Services Research Institute.
Digital Filing A Simple Way to Digitally Centralize and Distribute Documents.
1 of 8Prof. Dr. Dr. h.c. Otto Spaniol Computer Science, Informatik 4 Communication and Distributed Systems 25/10/2015 Distributed Applications and Network.
Information Visualization: Ten Years in Review Xia Lin Drexel University.
Document Clustering for Forensic Analysis: An Approach for Improving Computer Inspection.
CEOS WGISS-21 CNES GRID related R&D activities Anne JEAN-ANTOINE PICCOLO CEOS WGISS-21 – Budapest – 2006, 8-12 May.
ANKITHA CHOWDARY GARAPATI
Framework for the Creation of Digital Knowledge Resources to meet the Challenges for Digital Future: A Librarian’s Perspective Dr. Harish Chandra Librarian.
Database Systems. Role and Advantages of the DBMS Improved data sharing Improved data security Better data integration Minimized data inconsistency Improved.
Definition Digital Libraries are defined as the new way of carrying out the functions of Libraries such as : New type of information resources New approaches.
Agenda  Overview of survey strategy for 2012  Surveying non-GMC Public Health trainees  Obtaining demographics data  Surveying method  Reporting results.
Hellenic Centre for Marine Research (HCMR) MedOBIS - Ocean Biogeographic Information System for the Eastern Mediterranean and Black Sea.
Two Paradigms for Official Statistics Production Boris Lorenc, Jakob Engdahl and Klas Blomqvist Statistics Sweden.
KING SAUD UNIVERSITY – COLLAGE OF COMPUTER AND INFORMATION SCIENCES CSC 113 JAVA ONLINE DOCUMENTATION.
What Affects Students’ Performance in School? A report by: Justin Caldwell.
29 September 2004Spartacus Computing Solutions1 Welcome Mr. Brian Smith, Siena College Webmaster & Ms. Kate Zimmerman, Siena College Academic Program Administrator.
Data Management in Clinical Research Rosanne M. Pogash, MPA Manager, PHS Data Management Unit January 12,
Windows Azure poDRw_Xi3Aw.
Systems and User Interface Software. Types of Operating System  Single User  Multi User  Multi-tasking  Batch Processing  Interactive  Real Time.
Research Design in Education Research Methods. Describe your research topic What is the nature of the problem and your research question? To answer the.
Chapter 9 : Application Areas. 2 Some Advance Application Areas of Computers  Software Development  Artificial Intelligence  Robotics  Industrial.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
BSA 385 Week 3 Individual Assignment Frequent Shopper Program Part 2 Check this A+ tutorial guideline at
PowerPoint presentation
An Overview of the Computer System
Software Documentation
An Introduction to Visual Basic .NET and Program Design
Looking Inside the machine (Types of hardware, CPU, Memory)
Forged Handwriting Detection
An Overview of the Computer System
European Network of e-Lexicography
Chapter 1 Database Systems
Why is Implementing Effective Requirements Practices So Hard?
BlackBoard 5 A Definitive e-Learning Software Platform Ozgur Balsoy,
Java Online documentation
Chapter 1 Database Systems
allen2e_01_02_li 1. Question: identification, location? A. B. C. D. E.
Information system analysis and design
Presentation transcript:

Team 6: Experimental Handwriting System Allen Alarcon Ingrid Anderson Bhupesh Kapoor Shi-wu Lee

Objectives of Study: Validate individuality of handwriting Is there a difference among the abilities of Certified Document Examiners, Novices, and Machine? Create a tool to help answer question

Processes Used to Carry out Study Online Quiz: –a. Collect original and forgery handwriting samples. –b. Create database for storage of samples. –c. Create Online Quiz Distribute Quiz: –a. Novices –b. Certified Document Examiners. –c. Machine (not carried out)

Validity of our Study Comments by Certified Document Examiners: –Sample collection must be collected under same conditions. –Digitized images are “pixilated” and lack sufficient clarity. –Limited by one word, need writing in a larger context. –Divergence in Writing: how much does a writer diverge from stroke to stroke. –Computer images are becoming more prevalent in examinations

Statistics: Novices

Statistics: Experts

Results / Conclusions Comparison of Data Sets for Novice and Experts. –Relative difficulty in forging certain handwriting styles. –Preliminary results reveal that novices and experts utilize different parameters in making selections. –Dr. Moshe Kam from Drexel University confirmed that lay people are more likely than legitimate examiners at misidentifying writers. –To what extent does a computerized image restrict an examiner’s ability to make an identification?

Snapshot of Online Quiz 1

Snapshot of Online Quiz 2

System Architecture Front-end portal Web Graphical User Interface- interface for accepting surveys from participants.

Back-end portal Customed Database - stores results/comments from participants