VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo

Size: px
Start display at page:

Download "VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo"

Transcription

1 VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo User's guide

2 User's guide version: Publish date: 1/29/2013

3 Table of Contents 1 Introduction System Requirements 1 2 IP Cameras Configuration 2 3 Face Image Constraints 5 4 Liveness detection 6 5 Matching Threshold and Score 7 6 Application Windows Main Window Options Dialog Menu Commands Simple Usage Examples Linux Mac OS X 13 Index a iii

4 1 Introduction VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo application is designed with aim to demonstrate the capabilities of Neurotechnology faces recognition engine. The program is a Windows 2000/XP/Vista/7 compatible GUI application. 1 Evaluation software supports image acquisition from the external video source (such as Web or IP cameras ( see page 2)). It can also read face images from still images (.bmp,.tif,.png,.jpg,.gif files). The application has 3 operation modes: 1. Enrollment. Software processes the face image, extracts features and writes them to the database. 2. Face enrollment features generalization. This mode generates the generalized face features collection from a number of the face templates of the same person. Each face image is processed and features are extracted. Then collections of features are analyzed and combined into one generalized features collection, which is written to the database. The face recognition quality increases if faces are enrolled using this mode. 3. Matching. This mode performs new face image matching against face templates stored in the database. 1.1 System Requirements Windows requirements: 128 MB of RAM, 1Ghz CPU, 9MB HDD space for the installation package. Microsoft Windows 2000/XP/Vista/7. DirectX 8.1 or later. You can download DirectX upgrade from Microsoft web site. Microsoft GDI+. This library is supplied with Windows XP and Windows.NET Server family. If you are using any other modern Windows platform (Windows 98/Me and Windows NT 4.0/2000) you should download and install it from Microsoft web site. The Microsoft XML Parser (MSXML) 3.0 SP4 is required so if it is not already in the system you should download and install it from Microsoft web site. (Optionally) Video capture device (web camera). Linux requirements: PC with x86 compatible CPU Linux OS 2.6 or newer GCC-4.0.x or newer pkg-config or newer GNU Make 3.81 or newer GTK x or newer libraries and development packages libtiff-3.8.x or newer libraries and development packages libusb or newer libraries. Mac OS X: 1

5 2 IP Cameras Configuration VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo can be used with most IP cameras. How to configure an IP camera read the following: Configuring on Microsoft Windows IP Cameras are configured through NdmMedia.ini configuration file in the root directory of sample distribution. The file contains commented example of the possible configuration, the format is described further. The ';' character can be used to comment out the line. The file uses usual.ini format, where certain parameters are grouped into sections: Section Description 2 [NVideoSource] Specifies parameters controlling usage of all the local video devices. [Camera] Section defines additional video input device. This can be remote stream (for example from IP camera) or "virtual" device which would provide video from media file. The first section described ([NAudioSource] should appear in the configuration file only once, as this setting control all the local devices. The other section ([Camera] define a new device and can appear as many times as needed. IP cameras can be used through two frameworks: DirectShow or Windows Media Foundation. Following flags allow to select which way is preferred and can appear in just described sections: Flag UseDirectShow Description Flag used to set whether to use DirectShow for video source. UseDirectShow=False - disables DirectShow UseDirectShow=True - enables DirectShow UseWindowsMediaFoundation Flag used to set whether to use Windows Media Foundation for video source. UseWindowsMediaFoundation=False - disables Windows Media Foundation UseWindowsMediaFoundation=True - enables Windows Media Foundation PreferDirectShow AllowDuplicateDevices Flag used to prefer DirectShow versus Windows Media Foundation. PreferDirectShow=False - prefers to use Windows Media Foundation PreferDirectShow=True - prefers to use DirectShow vs. Windows Media Foundation This flag is used to allow enumerating duplicate devices. If this flag was set to true and the same device is accessible through DirectShow and Windows Media Foundation (Windows 7) then this device will be enumerated twice. Note: Valid only for [NVideoSource]) section. Following parameters define a device and can be used in [Camera] section: Parameter Url Filename Id Description Rtsp address of media source (IP camera). For example: Url=rtsp:// :554/media/video1 Media source file name. For example: Filename=C:\test.wav Note: Only Filename or Url address can be specified at a time, not both. Camera Id (optional parameter). This Id overrides original camera Id. For example: Id=My Camera 2

6 DisplayName Display name for camera (optional parameter). This parameter overrides default camera display name. For example: DisplayName=My Camera Display name Configuring on Linux and Mac OS X IP cameras on Linux and Mac OS X are available through gstreamer framework. Rtsp stream or local media file for their content are used. IP cameras are configured through NdmMedia.conf configuration file in the root directory. The file contains commented example of the possible configuration, the format is described further. The '#' character can be used to comment out the line. The file uses.ini like format, where certain parameters are grouped into sections. Each sections defines a new device and can appear as many times as needed: Section Description [Camera] Section defines additional video input device. This can be remote stream (for example from IP camera) or "virtual" device which would provide video from media file. 2 The device is described by following parameters in each section: Parameter Url Filename Id Description Rtsp address of media source (IP camera). For example: Url=rtsp:// :554/media/video1 Media source file name. For example: Filename=/tmp/test.wav Note: Only Filename or Url address can be specified at a time, not both. Camera Id (optional parameter). This Id overrides original camera Id. For example: Id=My Camera DisplayName Display name for camera (optional parameter). This parameter overrides default camera display name. For example: DisplayName=My Camera Display name Note: Some IP cameras need special special configuration and their use is described in separate subsections below. Cisco Video Surveillance IP 4500 Cisco Video Surveillance IP 4500 camera is supported through NdmCisco plugin. The camera should be configured by editing the NdmCisco.conf file in \Cameras\NdmCisco directory of the Algorithm Demo. Multiple cameras can be specified, by using the following template (for each camera): [Camera] Ip= Username=admin Password=Admin123 ChannelId=1 ChannelName=Channel1 Id=MyId DisplayName=MyDisplayName 1. IP - defines IP address of camera channel 2. Username - camera's username. To set camera's username use Cisco software. 3. Password - camera's user password. 4. ChannelId - Camera's channel ID. 5. ChannelName - Name of camera's channel. 6. Id - NDeviceManger ID for the camera. 3

7 7. DisplayName - display name for the camera. Mobotix DualNight M12 Mobotix DualNight M12 IP camera is supported through NdmMobotix plugin. The camera should be configured by editing the NdmMobotix.conf file in \Cameras\NdmMobotix directory of the Algorithm Demo. Multiple cameras can be specified, by using the following template (for each camera): [Camera] Ip= Id=MobotixId DisplayName=MobotixDisplayName Channel=right 1. IP - defines IP address of camera channel 2. Id - NDeviceManger ID for the camera. 3. DisplayName - display name for the camera. 4. Channel - camera's channel. 2 Prosilica GigE Vision Prosilica GigE Vision camera is supported through NdmProsilica plugin. The plugin is saved as NdmProsilica.dll file in \Cameras\NdmProsilica directoriy of the Algorithm Demo. Note: This camera does not require any additional configuration. 4

8 3 Face Image Constraints Face recognition accuracy heavily depends on face image quality. Especially, maximum care should be taken in acquiring good quality facial images in enrollment step. During enrollment one or more (if available) images are converted into facial features template which is usually saved into database and can be further used to rapidly identify or verify the person. The following basic recommendations and requirements should be taken under consideration: Face pose and expressions 1. Use near-frontal face images for enrollment with a rotation deviation of up to 15 degrees in any direction (yaw, pitch, roll). MegaMatcher and VeriLook SDK supports roll angle deviation up to 180 degrees. 2. Use more than one image for enrollment to cover slightly different face views in yaw and pitch directions. In case of successful coverage, faces up to 25 degrees deviation from frontal can be recognized. 3. Neutral face expression is preferred in the enrollment step. During identification slight changes in facial expression do not influence face recognition accuracy. 4. Persons wearing glasses should use several images - with and without glasses - for enrollment. Thus, during identification they will be recognized in both cases. 5. Glasses with heavy frames and sunglasses will decrease face recognition accuracy. 6. Changes in face appearance because of facial hair should be accommodated in the same manner as wearing of glasses. Note: the minimum distance between eyes in the image should be 50 pixels. The recommended distance is 75 pixels. Lightning 3 1. If lighting conditions can be controlled: 1. Lighting should be equally distributed on each side of the face and from top to bottom with no significant shadows within the face region. This can be achieved by using direct frontal light or diffuse lighting. 2. Avoid sunlight or any other additional lighting. 3. Avoid lighting which can produce glares on glasses or even face skin. Cameras 1. Use cameras of similar quality for both enrollment and identification. 2. Some cameras can be configured to produce mirrored images, i.e. left eye of the persons face can become "right" eye in the face image. Make sure that face orientation is uniform across all the images used in face recognition because facial features template extracted from mirrored face images of the same person will not match with those extracted from not-mirrored ones. 5

9 4 Liveness detection Faces algorithm is capable to differentiate live faces from non live faces (e.g. photos). "Use liveness check" checkbox and "Liveness threshold" parameter in the options dialog controls the behavior of liveness check. When "Use liveness check" checkbox is marked, the liveness check is performed while matching. That is the liveness score of collected stream is calculated and checked against the liveness score threshold set in the "Liveness threshold" parameter. Using liveness check requires a stream of consecutive images. (This check is intended to be used mainly with video stream form a camera). The stream must be at least 10 frames length and the recommended length is frames. Only one person face should be visible in this stream. If the stream does not qualify as "live" and "Extraction failed" message is displayed in the log window. To maximize the liveness score of a face found in an image stream, user should move his head around a bit, tilting it, moving closer to or further from the camera while slightly changing his facial expression. (e.g. User should start with his head panned as far left as possible but still detectable by face detection and start panning it slowly right slightly changing his facial expression until he pans as far right as possible (but still detectable by face detector)). 4 6

10 5 Matching Threshold and Score VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo features matching algorithm provides value of features collections score as a result. The higher is score, the higher is probability that features collections are obtained from the same person. Matching threshold is linked to false acceptance rate (FAR, different subjects mistakenly accepted as of the same) of matching algorithm. The higher is threshold, the lower is FAR and higher FRR (false rejection rate, same subjects erroneously accepted as different) and vice a versa. You can convert matching threshold to FAR (false acceptance rate) and vice versa using this table: FAR (False acceptance rate) 1 % % % % % % % 96 Matching threshold (score) or using this formula: Threshold = -12 * log10(far); where FAR is NOT percentage value. 5 7

11 6 Application VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo incorporates Neurotechnology face recognition algorithm. Using this demo application face images can be enrolled from still images (from image files) or video streams (from cameras) and identification task performed. 6.1 Windows VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo application in Windows OS can be started from FacesAlgorithmDemo.exe Main Window Main application window has three-pane layout, where top pane is used for displaying image or video stream and two bottom panes are used for messages logging. Menu commands and two toolbar buttons, used as shortcuts for most accessed commands, control application. Person can be enrolled using "Enroll" command. After enrolling a person's image from file the main window looks like this: 6 The main window panes are these: 8

12 1. Top face detection pane, used to display video or still images and result of face detection algorithm overlaid on image. 2. Left pane is application log, used for system information and application progress messages. 3. Right pane is matching results pane for listing id of the subject in the database, most similar to matched image. Subjects are considered similar if their score value exceeds matching FAR (False acceptance rate) set via Options (Options->Identification) dialog. Also in this pane matching score is displayed Options Dialog Options dialog window can be accessed through menu command File->Options... Options dialog window is used to configure faces detection, extraction, enrollment and identification parameters. Face Detection: Minimum IOD minimum distance between eyes. Maximum IOD maximum distance between eyes. Face confidence threshold value which controls the requirements for face detection. The greater this value is the more strict rules are applied when looking for faces in an image. Favor largest face - if checked, the largest face found in an image will be used for facial feature extraction instead of the one with the highest face confidence threshold score. Detect gender - if checked, the application will detect gender. Detect all features when extracting from file - if checked, all face features (not only these necessary for extraction) are detected when extracting from a file. Detect base feature points when extracting from file - if checked, eyes, nose tip and mouth will be detected. Max roll angle deviation - this value is used to define the maximum value in degrees of rolled face image which can be enrolled or identified. Max yaw angle deviation - this value is used to define the maximum value in degrees of yawed face image which can be enrolled or identified. Face extraction: 6 9

13 Face quality threshold controls how strict rules are applied when determining the quality of a found face for extraction. Enrollment: Save images to database - when checked saves images of enrolled faces to database. Use filename as template id - image filename is used as id for enrolled face template. Template size (enroll from image) - size of face image templates when enrolling from image. Can be used Large, Medium or Small template. It is recommended to use large template size. Template size (enroll from stream) - size of face image templates when enrolling from image. Can be used Large, 6 10

14 Medium or Small template. It is recommended to use large template size. Frame count maximum number of frames to process with face detection algorithm while enrolling subject using video camera or stream. Max record per template - maximum number of extracted face records to be saved within one face records template. Generalization template count - templates count for face features generalization (how many templates should be enrolled to generalize face features). Identification: Template size (identify from image) - default size of face images templates when performing identification from image. Can be used Large, Medium or Small template. It is recommended to use medium template size. Template size (identify from image) - default size of face images templates when performing identification from stream. Can be used Large, Medium or Small template. It is recommended to use medium template size. Disable liveness check Indicates that no liveness check ( see page 6) will be used while matching. Frame count maximum number of frames to process with face detection algorithm while identifying subject using video camera with no liveness check. Enable liveness check Indicates that the liveness check ( see page 6) will be used while matching. Liveness threshold controls the requirements for live faces. The greater this value is the more strict rules are applied to check if face in an image stream is live. (If this value is set to 0 all faces are considered to be live). Frame count maximum number of frames to process with face detection algorithm while identifying subject using video camera with liveness check enabled. Minimum value is 10. FAR - threshold that separates identical and different subjects. Matching threshold is linked to false acceptance rate (FAR, different subjects erroneously accepted as of the same) of matching algorithm. The higher is threshold, the lower is FAR and higher FRR (false rejection rate, same subjects erroneously accepted as different) and vice a versa. Speed defines identification speed. When the most accurate identification results are required it is recommended to use Low speed. But in this case identification task is performed slower. If the maximum identification speed is required it is recommended to use High identification speed. Note: Template size also affects identification speed. The highest possible identification speed is achieved when Small template and High speed is used. Misc: Flip image horizontally mirror horizontally image received from video camera. 6 11

15 Flip image vertically - mirror vertically image received from video camera Menu Commands The following table explains menu commands of the Faces Algorithm Demo application. Menu command Jobs» Enroll Jobs» Enroll with generalization Jobs» Identify Tools» Clear logs Tools» Clear database Tools» Options Help» About Description Enrolls image to face database. Enrolls image to faces database with features generalization. Search for matching image in face database. Clear application log windows. Empty faces database. Display options dialog. Display information about Faces algorithm demo application Simple Usage Examples In this section simple basic scenarios of using VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo application are described in a step by step fashion. Enrolling from camera 1. First, camera to be used as the capture device must be selected from "source" menu in the toolbar. After that camera video input should be visible in the upper pane of the program. 2. Faces found in the video stream are outlined in the capture image by green rectangle (the green rectangle outlines the face that best fits the matching requirements of the Neurotechnology Faces algorithm in addition this face has its eyes marked by the program). 3. To enroll a face from a video stream, "enroll" button in the toolbar can be used or option "enroll" from a system menu "jobs" can be selected. For this operation to succeed at least one face in the image must be present. Program will process a few frames and will enroll face into the database of the demo program from these frames and a dialog asking for the person to be enrolled id will be shown. Matching from camera 1. First, camera to be used as the capture device must be selected from "source" menu in the toolbar. After that camera video input should be visible in the upper pane of the program. 2. Faces found in the video stream are outlined in the capture image by colorful rectangles (the green rectangle outlines the face that best fits the matching requirements of the Neurotechnology Faces algorithm in addition this face has its eyes marked by the program, and yellow rectangles show other faces found in the image). 3. To identify a face "Identify" button must be clicked or option "Identify" must be selected from a system menu "jobs". After this the face, that best suits the matching requirements of the Neurotechnology Faces algorithm (it should be outlined by a green rectangle in the video input pane) will be matched against the database of the demo program and most probable candidate will be displayed in the bottom right pane of the program window. Enrolling from file 1. First, file input as the capture device must be selected from "source" menu in the toolbar. 2. To enroll a face from a file "enroll" button must be pressed or "enroll" option selected from the system menu "jobs". After that a file open dialog should open in which a file to be opened must be selected. The image in the file will be displayed in the upper pane of the window, with the found face outlined by a green rectangle (if such rectangle is absent it means that no face suitable for enrollment was found in the image) and a dialog asking for the person to be enrolled id will be shown. 6 12

16 The outlined face will be enrolled to the demo program database. Matching from file 1. First, file input as the capture device must be selected from "source" menu in the toolbar. 2. To identify a face from a file "match" button must be pressed or "match" option selected from the system menu "jobs". After that a file open should open in which a file to be opened must be selected. The image in the file will be displayed in the upper pane, with the found face outlined by a green rectangle (if such rectangle is absent, it means that no face, suitable for matching was found in the image). The outlined image will be matched against the demo program database and most probable candidate will be displayed in the bottom right pane of the window. 6.2 Linux VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo application on Linux can be started from FacesAlgorithmDemo file. There are separate distribution for 32 bits and 64 bits operating system. See Windows ( see page 8) part to find out how to use this application. 6.3 Mac OS X VeriLook 5.3/MegaMatcher 4.4 Algorithm Demo application on Mac OS can be started from FacesAlgorithmDemo.app file. See Windows ( see page 8) part to find out how to use this application. 6 13

17 Index A Application 8 F Face Image Constraints 5 I Introduction 1 IP Cameras Configuration 2 L Linux 13 Liveness detection 6 M Mac OS X 13 Main Window 8 Matching Threshold and Score 7 Menu Commands 12 O Options Dialog 9 S Simple Usage Examples 12 System Requirements 1 W Windows 8 a

Face identification and movement tracking for video surveillance systems. SentiVeillance SDK

Face identification and movement tracking for video surveillance systems. SentiVeillance SDK Face identification and movement tracking for video surveillance systems Face identification and movement tracking for video surveillance systems Document updated on May 3, 2017 CONTENTS Features and capabilities.......................................

More information

Biometric identity verification for large-scale high-security apps. Face Verification SDK

Biometric identity verification for large-scale high-security apps. Face Verification SDK Biometric identity verification for large-scale high-security apps Face Verification SDK Face Verification SDK Biometric identity verification for large-scale high-security applications Document updated

More information

Face identification for stand-alone or Web applications. VeriLook SDK

Face identification for stand-alone or Web applications. VeriLook SDK Face identification for stand-alone or Web applications VeriLook SDK VeriLook SDK Face identification for stand-alone or Web applications Document updated on June 20, 2016 CONTENTS VeriLook algorithm features

More information

Face identification for stand-alone or Web solutions. VeriLook SDK

Face identification for stand-alone or Web solutions. VeriLook SDK Face identification for stand-alone or Web solutions VeriLook SDK VeriLook SDK Face identification for stand-alone or Web applications Document updated on December 21, 2017 CONTENTS VeriLook algorithm

More information

CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS

CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS CHAPTER 4 FACE RECOGNITION DESIGN AND ANALYSIS As explained previously in the scope, this thesis will also create a prototype about face recognition system. The face recognition system itself has several

More information

EyeFaceGUI. User Guide. Version

EyeFaceGUI. User Guide. Version EyeFaceGUI User Guide Version 4.4.0615.1 010001010111100101100101011001000110010101100001001000000 101001001100101011000110110111101100111011011100110100101 110100011010010110111101101110010001010111100101100101011

More information

EyeFaceGUI v User Guide

EyeFaceGUI v User Guide EyeFaceGUI v3.12.0.1 User Guide Copyright 2016, Eyedea Recognition s.r.o. All rights reserved Eyedea Recognition s.r.o. is not responsible for any damages or losses caused by incorrect or inaccurate results

More information

VeriFinger 6.4/MegaMatcher 4.2 Algorithm Demo

VeriFinger 6.4/MegaMatcher 4.2 Algorithm Demo VeriFinger 6.4/MegaMatcher 4.2 Algorithm Demo User's guide Copyright 1998-2012. All rights reserved. User's guide version: 6.4.0.0 Publish date: 3/1/2012 VeriFinger 6.4/MegaMatcher 4.2 Table of Contents

More information

VeriFinger 6.6/MegaMatcher 4.4 Algorithm Demo

VeriFinger 6.6/MegaMatcher 4.4 Algorithm Demo VeriFinger 6.6/MegaMatcher 4.4 Algorithm Demo User's guide Copyright 1998-2012. All rights reserved. User's guide version: 6.6.0.0 Publish date: 1/29/2013 Table of Contents 1 Introduction 1 1.1 Fingerprint

More information

Information technology Biometric data interchange formats Part 5: Face image data

Information technology Biometric data interchange formats Part 5: Face image data INTERNATIONAL STANDARD ISO/IEC 19794-5:2005 TECHNICAL CORRIGENDUM 2 Published 2008-07-01 INTERNATIONAL ORGANIZATION FOR STANDARDIZATION МЕЖДУНАРОДНАЯ ОРГАНИЗАЦИЯ ПО СТАНДАРТИЗАЦИИ ORGANISATION INTERNATIONALE

More information

PrintShop Mail Web. Getting Started

PrintShop Mail Web. Getting Started PrintShop Mail Web Getting Started Copyright Information Copyright 1994-2010 Objectif Lune Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a

More information

Human Vision Components (HVC-P2) B5T

Human Vision Components (HVC-P2) B5T SG-B5T-088B OMRON Corporation Electronic and Mechanical Components Company Human Vision Components (HVC-P2) B5T-007001 Command Specifications Copyright (C) 2016-2018 OMRON Corporation, All rights reserved.

More information

The Intelligent Surveillance Solution. User Manual. Ver

The Intelligent Surveillance Solution. User Manual. Ver The Intelligent Surveillance Solution NuFace User Manual Ver. 1.0.0.151015.00 Table of Content 1. Introduction:... 3 1-1 Function... 3 2. Requirement:... 3 2-1 Minimum Hardware Requirement... 3 2-2 Tested

More information

qwertyuiopasdfghjklzxcvbnmq

qwertyuiopasdfghjklzxcvbnmq qwertyuiopasdfghjklzxcvbnmq wertyuiopasdfghjklzxcvbnmqw ertyuiopasdfghjklzxcvbnmqwer tyuiopasdfghjklzxcvbnmqwerty uiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiop asdfghjklzxcvbnmqwertyuiopas

More information

Digital Vision Face recognition

Digital Vision Face recognition Ulrik Söderström ulrik.soderstrom@tfe.umu.se 27 May 2007 Digital Vision Face recognition 1 Faces Faces are integral to human interaction Manual facial recognition is already used in everyday authentication

More information

Control Software centralized HEM. User Manual

Control Software centralized HEM. User Manual Control Software centralized HEM User Manual Page: - 2-1. Product Overview This software (HEM-HyperElectronicsMappers) for remote control is designed to be installed into a PC for use within a surveillance

More information

PONEMAH V5.30 WITH NOLDUS MEDIA RECORDER 4.0 QUICK START GUIDE

PONEMAH V5.30 WITH NOLDUS MEDIA RECORDER 4.0 QUICK START GUIDE TECHNICAL NOTE PONEMAH V5.30 WITH NOLDUS MEDIA RECORDER 4.0 QUICK START GUIDE DSI has partnered with Noldus Information Technology, the leading solution provider for human and animal behavioral research

More information

Video Monitoring. Contents CHAPTER

Video Monitoring. Contents CHAPTER CHAPTER 15 This chapter describes how to view live and recorded video streams from security cameras configured in the Cisco Video Surveillance Manager (Cisco VSM) system. Using Cisco PAM, you can associate

More information

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK Large-scale AFIS and multi-biometric identification MegaMatcher SDK MegaMatcher SDK Large-scale AFIS and multi-biometric identification Document updated on September 21, 2017 Contents MegaMatcher algorithm

More information

Waleed Pervaiz CSE 352

Waleed Pervaiz CSE 352 Waleed Pervaiz CSE 352 Computer Vision is the technology that enables machines to see and obtain information from digital images. It is seen as an integral part of AI in fields such as pattern recognition

More information

Iris identification for stand-alone or Web solutions. VeriEye SDK

Iris identification for stand-alone or Web solutions. VeriEye SDK Iris identification for stand-alone or Web solutions VeriEye SDK VeriEye SDK Iris identification for stand-alone and Web solutions Document updated on September 27, 2017 CONTENTS Features and capabilities...................................

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 3 Introducing Windows Operating Systems

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 3 Introducing Windows Operating Systems Chapter 3 Introducing Windows Operating Systems Objectives Learn how to use Windows to interface with users, files and folders, applications, and hardware Learn about some Windows tools that you can use

More information

Live Viewing Using Remote Applications

Live Viewing Using Remote Applications CHAPTER 8 Live Viewing Using Remote Applications The system is supplied with three remote applications. Remote View System IP Multicast System Remote View Remote View is used to remotely monitor live videos

More information

Video Monitoring. Contents CHAPTER

Video Monitoring. Contents CHAPTER CHAPTER 13 This chapter describes how to view live and recorded video streams from security cameras configured in the Cisco Video Surveillance Manager (Cisco VSM) system. Using Cisco PAM, you can associate

More information

Criminal Identification System Using Face Detection and Recognition

Criminal Identification System Using Face Detection and Recognition Criminal Identification System Using Face Detection and Recognition Piyush Kakkar 1, Mr. Vibhor Sharma 2 Information Technology Department, Maharaja Agrasen Institute of Technology, Delhi 1 Assistant Professor,

More information

Speakler recognition for stand-alone or Web applications. VeriSpeak SDK

Speakler recognition for stand-alone or Web applications. VeriSpeak SDK Speakler recognition for stand-alone or Web applications VeriSpeak SDK VeriSpeak SDK Speaker recognition for stand-alone or Web applications Document updated on September 28, 2017 CONTENTS VeriSpeak algorithm

More information

About this Guide. Dear Milestone Customer, Contents

About this Guide. Dear Milestone Customer, Contents Dacolian LPR About this Guide Dear Milestone Customer, With the purchase of Milestone XProtect Analytics Dacolian LPR you have chosen a powerful and flexible analytics solution. This guide is aimed at

More information

SecuGuard. Basic 5.0. User s manual. Dec Version: 5.0.x

SecuGuard. Basic 5.0. User s manual. Dec Version: 5.0.x SecuGuard Basic 5.0 User s manual Dec. 2009 Version: 5.0.x SecuGuard Basic System Requirement...5 Installation...6 Before Installing the Software... 6 Starting the Installation... 6 Quick Start...9 Install

More information

Amazon Rekognition. Quick-Look Biometric Performance Assessment. August 2017 novetta.com Copyright 2017, Novetta, LLC. COMPANY PROPRIETARY

Amazon Rekognition. Quick-Look Biometric Performance Assessment. August 2017 novetta.com Copyright 2017, Novetta, LLC. COMPANY PROPRIETARY Amazon Rekognition Quick-Look Biometric Performance Assessment August 2017 novetta.com Copyright 2017, Novetta, LLC. COMPANY PROPRIETARY OVERVIEW Cloud-based face recognition (CBFR) makes automated face

More information

Intelli-Signage Signage Designer Software

Intelli-Signage Signage Designer Software Intelli-Signage (User Manual V1.0) version: V3.0.0.0 Contents 1. Introduction... 1 2. System requirement... 1 2.1 Signage Player Software... 1 2.2... 1 3. Installation/Uninstallation of... 2 4. interface...

More information

Secure Guard Central Management System

Secure Guard Central Management System Speco Technologies, Inc. Secure Guard Central Management System Usage Information Contents 1 Overview... 7 2 Installation... 7 2.1 System Requirements... 7 2.2 System Installation... 7 2.3 Command Line

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

WATERMARK S ENSE User Guide. VeprIT.

WATERMARK S ENSE User Guide. VeprIT. WATERMARK S ENSE User Guide VeprIT http://veprit.com support@veprit.com Based on version 1.2.0. April 28, 2014 VeprIT - Watermark Sense User Guide Page 1 Contents 1 Main Concepts 3 2 User Interface Overview

More information

Boss-Spy Requirements Document

Boss-Spy Requirements Document Boss-Spy Requirements Document Brendan Budine Paul J. Melici John Novatnack Abbas Omar {bdb23, pmelici, jmn27, aao23}@drexel.edu Advisers: Drs. Ko Nishino and Ali Shokoufandeh (Department of Computer Science)

More information

HeadMouse. Robotic Research Team. University of Lleida

HeadMouse. Robotic Research Team. University of Lleida HeadMouse Robotic Research Team University of Lleida User Manual and Frequently Asked Questions What is HeadMouse? HeadMouse is a free program designed to replace the computer mouse. The user can control

More information

Frequently Asked Questions

Frequently Asked Questions Application and Document Sharing, page 1 Hosting, Joining, and Setting up Meetings, page 2 Joining a WebEx Meeting or Playing Back a Meeting Recording on Chrome and Firefox, page 4 Cisco WebEx for Mobile

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

INCA V7 Performance Tips And Tricks

INCA V7 Performance Tips And Tricks INCA V7 Performance s And Tricks Copyright The data in this document may not be altered or amended without special notification from ETAS GmbH. ETAS GmbH undertakes no further obligation in relation to

More information

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION

: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION 2006-287: BIOMETRIC AUTHENTICATION TOOL FOR USER IDENTIFICATION Mario Garcia, Texas A&M University-Corpus Christi American Society for Engineering Education, 2006 Page 11.277.1 Biometric Authentication

More information

ADOBE TRAINING CS6 PHOTOSHOP BASICS: EDITING PHOTOS & WORKING WITH TEXT - 1

ADOBE TRAINING CS6 PHOTOSHOP BASICS: EDITING PHOTOS & WORKING WITH TEXT - 1 ADOBE TRAINING CS6 PHOTOSHOP BASICS: EDITING PHOTOS & WORKING WITH TEXT Photoshop is the leading professional software for editing and adjusting photos, images and other graphic projects. It is a very

More information

Security Management System Camera Configuration Axis IP Device (Stream Profile Support)

Security Management System Camera Configuration Axis IP Device (Stream Profile Support) Security Management System Camera Configuration Axis IP Device (Stream Profile Support) Introduction Security Management System software supports several video source makes and models. This includes IP

More information

VideoViewer (Browser-based Client)

VideoViewer (Browser-based Client) VideoViewer (Browser-based Client) PERPETUAL INNOVATION Lenel OnGuard 2012 VideoViewer (Browser-based Client), product version 6.5 This guide is item number DOC-960, revision 2.005, December 2011 Copyright

More information

SecuGuard. Basic 5.0. Version: xxx

SecuGuard. Basic 5.0. Version: xxx SecuGuard Basic 5.0 Ł` ˆª Ø Version: 5.0.2.xxx SecuGuard Basic ` Ø ˆ ˆ...6 ˆ Ø...7 Ł ˆ Ø»ˆÆ ˆ`... 7 ˆŁ` ˆ Ø»ˆÆ ˆ`... 7 Ø Æ Ł...10 Ø IP Camera(s)... 10 Ł` IP Camera(s)... 10 ˆ Ø Ł ˆ ˆ :... 14 Playback:...

More information

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator

Solution for large-scale AFIS or multi-biometric systems. MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems MegaMatcher Accelerator MegaMatcher Accelerator Solution for large-scale AFIS or multi-biometric systems Document updated on September 28, 2017

More information

Table of Contents. Index

Table of Contents. Index Index Table of Contents Chapter 1 Notice for All Users...1-1 Chapter 2 Installation...2-1 2-1 HD NVR Manager Setup...2-1 2-1-1 Installation Steps...2-2 2-1-2 License Activation...2-9 Chapter 3 SCM Program...3-1

More information

About the Presentations

About the Presentations About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning of each presentation. You may customize the presentations

More information

Illumination invariant face recognition and impostor rejection using different MINACE filter algorithms

Illumination invariant face recognition and impostor rejection using different MINACE filter algorithms Illumination invariant face recognition and impostor rejection using different MINACE filter algorithms Rohit Patnaik and David Casasent Dept. of Electrical and Computer Engineering, Carnegie Mellon University,

More information

icms Pro USER S Manual Ver 1.4

icms Pro USER S Manual Ver 1.4 icms Pro USER S Manual Ver 1.4 Contents Panes... 7 How Can User Rights Affect Your Use of icms Pro SW?... 10 Minimum System Requirements... 11 Installing the icms Pro SW... 12 Download icms Pro from icatchinc

More information

icms Pro USER s MANUAL Ver 1.0

icms Pro USER s MANUAL Ver 1.0 icms Pro USER s MANUAL Ver 1.0 Contents Target Audience for this Document... 5 Copyright, Trademarks and Important Information... 5 Copyright... 5 Disclaimer... 5 Introduction... 6 Tabs... 6 Panes... 7

More information

Avigilon Gateway Web Client User Guide. Version 6.10

Avigilon Gateway Web Client User Guide. Version 6.10 Avigilon Gateway Web Client User Guide Version 6.10 2006-2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, and TRUSTED SECURITY SOLUTIONS. are

More information

RAS (Remote Administration System)

RAS (Remote Administration System) RAS (Remote Administration System) Digital Video Recorder Software User Guide Document 900.0314 Rev 2.00 RAS User Guide Revisions Issue Date Revisions 1.00 08/04 New document. 1.01 04/05 Update template,

More information

HeadMouse. Robotic Research Team. University of Lleida

HeadMouse. Robotic Research Team. University of Lleida HeadMouse Robotic Research Team University of Lleida User Manual and Frequently Asked Questions What is HeadMouse? HeadMouse is a free program designed to replace the computer mouse. The user can control

More information

Face Intellect Software Package

Face Intellect Software Package AxxonSoft Face Intellect Software Package Administrator s Guide Version 1.0.5 Moscow 2011 1 Contents CONTENTS... 2 1 INTRODUCTION... 4 1.1 The purpose and structure of the Guide... 4 1.2 Purpose of Face

More information

I-CUBE FACE RECOGNITION SYSTEM USER GUIDE

I-CUBE FACE RECOGNITION SYSTEM USER GUIDE Barry T. Dudley Page 1 of 12 2004/04/04 I-CUBE FACE RECOGNITION SYSTEM USER GUIDE CONTENTS PAGE CONTENTS PAGE...1 SYSTEM REQUIREMENTS...2 DEMONSTRATION PROGRAM...4 INSTALLATION...5 NORMAL OPERATION...6

More information

Business Edition Basic License User Guide

Business Edition Basic License User Guide Business Edition Basic License User Guide Table of Contents 1. Dashboard-----------------------------------------------------------------------------------------3 2. Catalog Search-----------------------------------------------------------------------------------4

More information

Avigilon Control Center Virtual Matrix User Guide

Avigilon Control Center Virtual Matrix User Guide Avigilon Control Center Virtual Matrix User Guide Version 5.0.2 PDF-ACCVM-A-Rev2 Copyright 2013 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying,

More information

Avigilon Control Center Enterprise Web Client User Guide. Version 5.8.4

Avigilon Control Center Enterprise Web Client User Guide. Version 5.8.4 Avigilon Control Center Enterprise Web Client User Guide Version 5.8.4 2006-2016, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER and ACC are trademarks

More information

Emotion Recognition System. VibraImage. Version Mobile 1.1. Manual. ELSYS Corp. Saint-Petersburg 2010

Emotion Recognition System. VibraImage. Version Mobile 1.1. Manual. ELSYS Corp.   Saint-Petersburg 2010 1 Emotion Recognition System VibraImage Version Mobile 1.1 Manual ELSYS Corp. WWW.ELSYS.RU Saint-Petersburg 2010 2 CONTENT 1. Introduction 3 1.1. Basic applications 3 1.2. Package contents 3 1.3. Specifications

More information

Sonatype CLM - IDE User Guide. Sonatype CLM - IDE User Guide

Sonatype CLM - IDE User Guide. Sonatype CLM - IDE User Guide Sonatype CLM - IDE User Guide i Sonatype CLM - IDE User Guide Sonatype CLM - IDE User Guide ii Contents 1 Introduction 1 2 Installing Sonatype CLM for Eclipse 2 3 Configuring Sonatype CLM for Eclipse 5

More information

Quick Start Guide (External Preview Version)

Quick Start Guide (External Preview Version) Quick Start Guide (External Preview Version) 2016 PSP Security Co. Ltd. All rights reserved A. Establishing Connection 1. The following peripherals are required to operate AccuFACE: 12 VDC power supply

More information

Avigilon Control Center Enterprise Client User Guide. Version 5.6

Avigilon Control Center Enterprise Client User Guide. Version 5.6 Avigilon Control Center Enterprise Client User Guide Version 5.6 2006-2015, Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright,

More information

The Impact of Diffuse Illumination on Iris Recognition

The Impact of Diffuse Illumination on Iris Recognition The Impact of Diffuse Illumination on Iris Recognition Amanda Sgroi, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame asgroi kwb flynn @nd.edu Abstract Iris illumination typically causes

More information

Facial & Fingerprint Recognition Product

Facial & Fingerprint Recognition Product Facial & Fingerprint Recognition Product Series User Manual Version: 1.1.7 Date: January 2010 About This Manual This document introduces the user interface and menu operations of the Facial & Fingerprint

More information

The CSU Face Identification Evaluation System: Its Purpose, Features and Structure

The CSU Face Identification Evaluation System: Its Purpose, Features and Structure The CSU Face Identification Evaluation System: Its Purpose, Features and Structure David S. Bolme, J. Ross Beveridge, Marcio Teixeira and Bruce A. Draper Computer Science, Colorado State University 3rd

More information

Exam Name: MOS: Microsoft Office Word 2010 Expert

Exam Name: MOS: Microsoft Office Word 2010 Expert Vendor: Microsoft Exam Code: 77-887 Exam Name: MOS: Microsoft Office Word 2010 Expert Version: DEMO QUESTION 1 Arrange the steps to add a Style to the Quick Styles gallery in the correct order. Answer:

More information

ipims USER s MANUAL (ORION IP Device Total Management SW) Ver 1.2 by sj

ipims USER s MANUAL (ORION IP Device Total Management SW) Ver 1.2 by sj ipims USER s MANUAL (ORION IP Device Total Management SW) Ver 1.2 by sj Contents Contents... 2 Target Audience for this Document... 5 Minimum System Requirements... 5 Introduction... 6 Tabs... 6 Panes...

More information

Fast Face Detection Assisted with Skin Color Detection

Fast Face Detection Assisted with Skin Color Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. II (Jul.-Aug. 2016), PP 70-76 www.iosrjournals.org Fast Face Detection Assisted with Skin Color

More information

Face Quality Assessment System in Video Sequences

Face Quality Assessment System in Video Sequences Face Quality Assessment System in Video Sequences Kamal Nasrollahi, Thomas B. Moeslund Laboratory of Computer Vision and Media Technology, Aalborg University Niels Jernes Vej 14, 9220 Aalborg Øst, Denmark

More information

Digital Photogrammetric System. Version 5.3 USER GUIDE. Block adjustment

Digital Photogrammetric System. Version 5.3 USER GUIDE. Block adjustment Digital Photogrammetric System Version 5.3 USER GUIDE Table of Contents 1. Purpose of the document... 3 2. module... 3 3. Start of work in adjustment module... 4 4. Interface and its elements... 6 4.1.

More information

Pelco Camera and SCADA Integration Quick Start Guide

Pelco Camera and SCADA Integration Quick Start Guide Pelco Camera and SCADA Integration Quick Start Guide Table of Contents 1. Installation... 4 1.1 Operating system requirements... 4 1.1.1 Supported operating systems... 4 1.1.2 Non-supported operating

More information

Mirasys NVR. User s Guide

Mirasys NVR. User s Guide Mirasys NVR User s Guide CONTENTS Contents... 2 Before you start... 3 Introduction... 6 Logging in... 9 User interface... 13 Navigator... 16 Cameras... 25 Video outputs... 41 Digital outputs... 46 Digital

More information

NI-IMAQdx VI Reference Help

NI-IMAQdx VI Reference Help NI-IMAQdx VI Reference Help June 2008, 371969C-01 NI-IMAQdx driver software gives you the ability to acquire images with IEEE 1394 and GigE Vision cameras. This help file describes the VIs included in

More information

eggplant TM eggplant RITA BAsIcs

eggplant TM eggplant RITA BAsIcs eggplant TM RITA Basics Copyright 2008 Redstone Software, Inc. RITA Basics Trademarks Eggplant, Eggplant Functional Tester, Eggplant Load Tester, Eggplant Starter Edition the Eggplant logos, Redstone,

More information

Face recognition for enhanced security.

Face recognition for enhanced security. Face recognition for enhanced security. Cognitec Systems - the face recognition company FaceVACS : Face Recognition Technology FaceVACS Face Recognition Technology Cognitec s patented FaceVACS technology

More information

Manual Version: V1.01. ISS Manager Video Management Software User Manual

Manual Version: V1.01. ISS Manager Video Management Software User Manual Manual Version: V1.01 ISS Manager Video Management Software User Manual Notice The information in this manual is subject to change without notice. Every effort has been made in the preparation of this

More information

Avigilon Control Center Virtual Matrix User Guide

Avigilon Control Center Virtual Matrix User Guide Avigilon Control Center Virtual Matrix User Guide Version 5.2 PDF-ACCVM-B-Rev1 2013-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect

More information

Avigilon Control Center Server User Guide

Avigilon Control Center Server User Guide Avigilon Control Center Server User Guide Version 4.12 PDF-SERVER-E-Rev1 Copyright 2012 Avigilon. All rights reserved. The information presented is subject to change without notice. No copying, distribution,

More information

Avigilon Control Center Standard Client User Guide. Version 6.0

Avigilon Control Center Standard Client User Guide. Version 6.0 Avigilon Control Center Standard Client User Guide Version 6.0 2006-2017, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC, HIGH DEFINITION STREAM MANAGEMENT

More information

Smart card multi-biometrics. MegaMatcher On Card SDK

Smart card multi-biometrics. MegaMatcher On Card SDK Smart card multi-biometrics MegaMatcher On Card SDK MegaMatcher On Card SDK CONTENTS Smart card multi-biometrics Document updated on September 22, 2017 Technology features and capabilities..............................

More information

Component-based Face Recognition with 3D Morphable Models

Component-based Face Recognition with 3D Morphable Models Component-based Face Recognition with 3D Morphable Models B. Weyrauch J. Huang benjamin.weyrauch@vitronic.com jenniferhuang@alum.mit.edu Center for Biological and Center for Biological and Computational

More information

Component-based Face Recognition with 3D Morphable Models

Component-based Face Recognition with 3D Morphable Models Component-based Face Recognition with 3D Morphable Models Jennifer Huang 1, Bernd Heisele 1,2, and Volker Blanz 3 1 Center for Biological and Computational Learning, M.I.T., Cambridge, MA, USA 2 Honda

More information

Avigilon Control Center Standard Web Client User Guide. Version 5.6

Avigilon Control Center Standard Web Client User Guide. Version 5.6 Avigilon Control Center Standard Web Client User Guide Version 5.6 2006-2015, Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright,

More information

CMOS USORIA. Features

CMOS USORIA. Features CMOS USORIA A CMOS, 2 Megapixel (1600x1200), 1/2 Inch, Color, USB 2, Triggerable, Rugged, Lightweight, Industrial Vision Camera With a C Mount and Tripod Adapter It is Designed for Inspection, Instrumentation,

More information

TOON BOOM HARMONY Paint Preferences Guide

TOON BOOM HARMONY Paint Preferences Guide TOON BOOM HARMONY 12.2.1 Paint Preferences Guide 2 Legal Notices Toon Boom Animation Inc. 4200 Saint-Laurent, Suite 1020 Montreal, Quebec, Canada H2W 2R2 Tel: +1 514 278 8666 Fax: +1 514 278 2666 toonboom.com

More information

GNOSYS PRO 0.7. user guide

GNOSYS PRO 0.7. user guide GNOSYS PRO 0.7 user guide Author Guido M. Re Date September 2016 Reviewer Chad Barksdale Date September 2016 3 Contents 1 Get Started 7 1.1 System Requirements...................................................

More information

Cisco Jabber. Windows - USER MANUAL. Version: 4.8. VisionsConnected Holding B.V.

Cisco Jabber. Windows - USER MANUAL. Version: 4.8. VisionsConnected Holding B.V. Cisco Jabber Windows - USER MANUAL Version: 4.8 VisionsConnected Holding B.V. Contents Trademarks and Copyrights... 3 Disclaimer... 3 System requirements... 4 Installation... 5 Signing in... 7 Making a

More information

GV-Eye Mobile App. Contents

GV-Eye Mobile App. Contents GV-Eye Mobile App. Contents 1.1 Specifications... 2 1.2 Supported GV-IP Devices and Software... 3 1.2.1 Supported Products for Connection... 3 1.2.2 Supported Products for Enabling Monitoring... 4 1.2.3

More information

Installing the Product Software

Installing the Product Software CHAPTER 1 The Cisco Configuration Engine is a network management software that acts as a configuration service for automating the deployment, management, and upgrading of network devices and services.

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

WebEx Network Recording Player User Guide

WebEx Network Recording Player User Guide WebEx Network Recording Player User Guide for Advanced Recording Format (.arf) files Version 2.3 Copyright 1997-2009 Cisco Systems, Inc. and/or its affiliated entities. All rights reserved. WEBEX, CISCO,

More information

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and

Expression Detection in Video. Abstract Expression detection is useful as a non-invasive method of lie detection and Wes Miller 5/11/2011 Comp Sci 534 Expression Detection in Video Abstract Expression detection is useful as a non-invasive method of lie detection and behavior prediction, as many facial expressions are

More information

Livescribe Connect User Guide. Draft P-2 May 23, 2011

Livescribe Connect User Guide. Draft P-2 May 23, 2011 Copyrights and Trademarks LIVESCRIBE, ECHO, PULSE, CONNECT, and NEVER MISS A WORD are trademarks of Livescribe Inc. All other trademarks are properties of their respective owners. Copyright 2007-2011.

More information

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining your PC, 6e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining your PC, 6e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn how an OS interfaces

More information

ROES Tips and Tricks. ROES Desktop Capabilities

ROES Tips and Tricks. ROES Desktop Capabilities ROES Tips and Tricks ROES Desktop Capabilities Client version 9.5 Java FX Splash Page, webviewurl Template File Configuration Element Catalog Search Paypal Books wizard, Books view Action Callbacks Favorites

More information

Video Client. Version 1.6. en Software manual

Video Client. Version 1.6. en Software manual Video Client Version 1.6 en Software manual Video Client Table of Contents en 3 Table of contents 1 Introduction 5 1.1 System requirements 5 1.2 Software installation 5 1.3 Conventions used in the application

More information

Avigilon Control Center Player User Guide. Version 5.10

Avigilon Control Center Player User Guide. Version 5.10 Avigilon Control Center Player User Guide Version 5.10 2006-2016, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, AVIGILON CONTROL CENTER, ACC and HDSM, are trademarks of Avigilon

More information

Version 5.1 for Microsoft Windows 2000 / XP / Vista / 7. User- Manual

Version 5.1 for Microsoft Windows 2000 / XP / Vista / 7. User- Manual Version 5.1 for Microsoft Windows 2000 / XP / Vista / 7 User- Manual 2 NeuroCheck User-Manual Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Data Manager. Scheduling Data Backup CHAPTER

Data Manager. Scheduling Data Backup CHAPTER CHAPTER 9 To access Data management tasks, log into the system (see Logging In section on page 2-1). Then, from the Home page, click the Tools tab. The Tools page appears. From the Tools page, click. The

More information

Avigilon Control Center Standard Client User Guide. Version 5.2.2

Avigilon Control Center Standard Client User Guide. Version 5.2.2 Avigilon Control Center Standard Client User Guide Version 5.2.2 2006-2014 Avigilon Corporation. All rights reserved. Unless expressly granted in writing, no license is granted with respect to any copyright,

More information

REFERENCE MANUAL. DressingSim EX. Copyright Digital Fashion Ltd.

REFERENCE MANUAL. DressingSim EX. Copyright Digital Fashion Ltd. REFERENCE MANUAL DressingSim EX Copyright 2003 Digital Fashion Ltd. www.dressingsim.com 1 TABLE OF CONTENTS 1. Introduction to DressingSim EX 1.1 Product Description 1.2 Graphical User Interface Description

More information