scholarly journals Color Blindness Testing Using A Client-Server Based on The Ishihara Method

2020 ◽  
Vol 4 (2) ◽  
pp. 46-52
Author(s):  
Yudhi Ardiyanto ◽  
Muhamad Yusvin Mustar

The Ishihara method is one way to detect whether or not someone suffers from color blindness. This method possesses several sets of plates or circle patterns containing various combinations of colored dots and sizes, forming numbers visible for people with normal eyes. A collection of several plates with the name Ishihara book is available in the market. However, the book has a weakness for being easily damaged or faded in color. Although there are some shortcomings, several researchers have developed applications to anticipate those weaknesses. Being unable to be used by several people at once and the test history has not been adequately archived, are several examples of shortcomings of existing applications. This study aims to create a client-server-based color blindness testing mobile application. The system can provide real-time test results, and detailed test history is presented. Another feature is the push notification menu that sends messages to all users. This application has been designed and implemented successfully. Thereby, it can be used for a color blindness test before conducting a medical examination.

1993 ◽  
Vol 8 (3) ◽  
pp. 499-505 ◽  
Author(s):  
S. Roy ◽  
O.P. Malik ◽  
G.S. Hope
Keyword(s):  

Author(s):  
Farukh Hashmi ◽  
Kiran Ashish ◽  
Satyarth Katiyar ◽  
Avinash Keskar

Contactless biometric systems have increased ever since the corona pandemic outbreak. The two main contactless biometric systems are facial recognition and gait patterns recognition. The authors in the previous work [11] have built hybrid architecture AccessNet. It involves combination of three systems: facial recognition, facial anti-spoofing, and gait recognition. This work involves deploying the hybrid architecture and deploying two individual systems such as facial recognition with facial anti-spoofing and gait recognition individually and comparing the individual results in real-time with the AccessNet hybrid architecture results. This work even involves in identifying the main crucial features from each system that are responsible for predicting a subject. It includes extracting few crucial parameters from gait recognition architecture, facial recognition and facial anti-spoof architectures by visualizing the hidden layers. Each individual method is trained and tested in real-time, which is deployed on both edge device NvidiaJetsonNano, and high-end GPU. A conclusion is also adapted in terms of commercial and research usage for each single method after analysing the real-time test results


Author(s):  
Sunghoon Kim ◽  
Monica Menendez ◽  
Hwasoo Yeo

Perimeter control is used to regulate transfer flows between urban regions. The greedy control (GC) method takes either the minimum or the maximum for the control inputs. Although it has the advantage of simplicity for real-time feasibility, a few existing studies have shown that it can sometimes have negative impacts because of unnecessary transfer flow restrictions. To reduce unnecessary restrictions, this study provides a method that gives flexibility to ease the strict conditions of the conventional GC. First, we propose a modification as a way of granting exceptions to the flow restriction under specific conditions. Second, we develop an algorithm to determine the threshold dynamically for accepting the exception, by comparing the possible outflow loss of the subject region and the possible outflow gain of its neighboring regions. The test results show that this flexible greedy control can handle the balance between the transfer demands and the greed of regions for securing the supply level, while increasing the performance in both vehicle hours traveled and trip completion.


ACS Omega ◽  
2021 ◽  
Author(s):  
Ilka Engelmann ◽  
Enagnon Kazali Alidjinou ◽  
Judith Ogiez ◽  
Quentin Pagneux ◽  
Sana Miloudi ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document