Visual Target Tracking Using Improved and Computationally Efficient Particle Filtering

Total Page:16

File Type:pdf, Size:1020Kb

Visual Target Tracking Using Improved and Computationally Efficient Particle Filtering VISUAL TARGET TRACKING USING IMPROVED AND COMPUTATIONALLY EFFICIENT PARTICLE FILTERING Y Zhait, M. Yearyt, J.-C. Noyer tt, J. Havlicekt, S. Nematit, and P. Lanvin tt tSchool of Electrical and Computer Engineering University of Oklahoma, Norman, OK USA ttLaboratoire d' Analyse des Systemes du Littoral Universite du Littoral Cote d'Opale, Calais Cedex, France E-mail: [email protected], [email protected] ABSTRACT filter uses a set of weighted samples (called particles) to ap- In this paper, we present a new particle filtering (PF) al- proximate the distribution of the target motion states based gorithm for visual target tracking where Galerkin's projec- on system measurements. At each iteration, the particles are tion method is used to generate the proposal distribution. drawn from the proposal distribution, which ideally should Galerkin's method is a numerical approach to approximate the derive its support from the true state distribution. Tradition- solution of a partial differential equation (PDE). By leverag- ally, the state transition prior is used as the proposal distri- ing this method in concert with L2 theory and the FFT, we ob- bution in standard PF algorithms such as, e.g., the conden- tain a new proposal which directly approximates the true state sation algorithm [4]. But due to the fact that this proposal posterior distribution and is fundamentally different from var- does not account for the currently observed data, it is prone to ious local linearizations or Kalman filter-based proposals. We loss of track lock when a target exhibits unpredictable kine- matics. Other improvements include the localization based apply this improved PF algorithm to track a human head in a video sequence. As predicted by theory and demonstrated by method [2], the unscented particle filter [5], and the state par- tition based method these methods are based our experimental results, this new algorithm is highly effec- [7]. However, tive for tracking targets which exhibit complex kinematics. on assumptions of Gaussianity, depend on a linearization pro- The new proposal distribution given here captures the high cess, or both, which can result in nontrivial modelling errors. probability area in the state space, thereby gleaning increased In this paper, we propose a new particle filter algorithm support from the true posterior distribution. in which Galerkin's projection method is used to generate the proposal distribution. The rationale behind Galerkin's method Index Terms- TV surveillance systems, nonlinear fil- is to assume that the state posterior distribution is in L2 (Rn). ters, computer vision Then, this distribution can be approximated by its projection onto a finite set of orthogonal basis vectors. In addition, by 1. INTRODUCTION choosing a special set of exponential basis vectors, the pro- jections can be approximated by the computationally efficient The objective of visual target tracking is to estimate the po- FFT. This approach does not require any local linearization sition and velocity of an object given observations acquired of the nonlinear systems and also does not require imposing from a video sequence. This task is important in many appli- any Gaussianity assumption on the system state distribution. cations including, e.g., surveillance, visual servoing, gestu- Thus, it is fundamentally different from the various Kalman ral human-machine interfaces, motion capture, robotics, and filter based PF algorithms such as those in [2,5,7]. many others [1,2]. Recently, a new tracking algorithm called particle filtering has captured international attention because 2. PROBLEM FORMULATION of its exceptional performance in nonlinear and non-Gaussian tracking problems [3-6]. This is in part due to the increas- Target tracking is often formulated as a state estimation prob- ing availability of low cost, high performance computing plat- lem. Particle filtering is a nonlinear state estimation tech- forms capable of accomodating the significant complexity of nique which is based on sequential importance sampling and practical particle filtering algorithms. In essence, a particle Bayesian inference. Consider the state space model: xt This work was supported in part by the U.S. Army Research Laboratory f(xt-1) +wt- 1 and yt = h(xt) +vt, where xt and yt denote and the U.S. Army Research Office under grant W91 lNF-04-1-0221. the hidden states and the measurements, respectively. Both 1-4244-0481-9/06/$20.00 C2006 IEEE 1757 ICIP 2006 f(0) and h(.) could be nonlinear functions, wt and vt denote orthogonal basis for L2 (Rn) and where cl (t) is the projection the process and measurements noises. Our estimation goal of p(X, t) onto Xl (x) at time t defined by is to evaluate the posterior state distribution p(xt lYl:t) which is governed by the Chapman-Kolmogorov equation and the (p(x, t), li(x) Jp(x,t)ol(x)*dx . (5) Bayes' formula given as follows [3]: Our objective is to find an approximation p(x, t) of p(x, t) P(XtdYi:t- ) = p(xtlxt_i)p(xt_j1yi:t_ )dxt_1, (1) such thatp(x, t) = LNv l cl(t) 01(X). The approximation error in p arises from the use of only P(Yt t-l ) N -1 as opposed to an infinite number of basis elements q5. P(XtYi:t) = Xt)P(xt iY ) fp(yt xt)p(xt Yj:t_ )dxt (2) The projections cl(t),I = 0,-- ,N -1, are the values to be determined. With this setup, we project Y(x, t) onto the In the framework of particle filtering, the state posterior dis- subspace span{q$(X)}IN- as: Y(x,t), 1(x)) = 0, 1 tribution can be approximated by a set of weighted samples 0, * *, N- 1. Here, instead of solving the original problem (also called particles) denoted by x(i), see [2] for details: Y(x, t) = 0, we solve it's projection, which is a collection of Ns N ordinary differential equations (ODE). Next we apply this P(xd Y1 t) ~ E z(0)(xt - x()), (3) method to the nonlinear state estimation problem defined in i=l Section 2. First we assume p(Xt lYit 1) L=o1 Cl(t) i, where where = (i)/ 1 is the normalized importance D(i) zN w) cl (t) will be determined later. for notational simplicity, we weight, and c(') is given as: drop the variable x. We apply Galerkin's method to equation (2) by projecting it onto the span{ql (X)}IN0 as: (i 1 (i t1) N-1 t =) t( 1 t);(yq(x(')Y ~xj')PXlxt 4 -I,yl:t)(4 (P(Xt Yl:t), k) =E Cl(t)(, k) 1=0 Equation (3) is actually the discretized posterior distribution. In addition, the distributions P(Yt ) and p(X(i) Ix(i)) rep- ELN cl (t) (P(Yt Xt)9l, 9k (6) resent the system's likelihood and the state transition prior, EL=o (t) (P(Yt Xt),O*)1 respectively. At each iteration, the particles (or samples) are where k = o,... , N -1. Eq. (6) is the "projection version" drawn from a proposal distribution x(i) q(xt x i)1', Yo t) of the Bayes' formula given in (2). For simplification, (6) can which is effective provided that it has sufficient support from be written in a matrix form as the true posterior distribution. Choosing a good proposal is a crucial and challenging step in designing a particle filter. C(t) = vC(/)'( (7) 3. NEW TRACKING ALGORITHM where Yt is an N x N matrix with the elements [Ytlk,l = (P(Yt |Xt)>i, Ok) The variables C(t), C(t) and vt are N x 1 As indicated in Section 1, the traditional choice of the pro- vectors, with [vt]l = (p(yt xt), 0*). We choose the exponen- posal cannot provide enough support from the posterior when x tial basis as = a where a and b tracking a target with complex kinematics. This is because the l(x) exp (j271 )', state transition prior does not include the most recent mea- are the integral limits. It was shown in [8] that with this basis surement information. In this section, we introduce an im- the inner product can be approximated with an FFT as proved technique, based on Garlerkin's method, for designing 0o) the proposal distribution. (P(x), 3.1. Galerkin's Method and Computational Efficiency N FFT[p(x)] F (P(X;), ON-1) 1 Galerkin's method is ubiquitous in the solution of PDEs, and in fact forms the basis for the finite element, finite difference, and boundary element methods. Galerkin's method is a dis- p(x), o1) cretization procedure that represents the solution in terms of [ . /b IFFT[p(x)] an orthogonal function expansion where each trial function _ (P(), ON*-1) _ satisfies certain boundary conditions [8]. Let Y(x, t) = 0 de- notes a PDE, which is a function of the temporal variable t Then, by using the FFT, (7) can be approximated as and spatial variable x. Assume p(x, t) C L2(IRJ). is the solu- [Yttli( a(/N)b FFT [p(yt xt) 475i] (8) tion of the PDE, such that it can be decomposed according to vt b IFFT [p(yt|xt)] p(x,t) = E c01Ej(t)0j(x), where {$l(x)}-0 is a complete (9) 1758 By applying Galerkin's method to equation (1) in a similar 4. LABORATORY EXPERIMENTS way, cl (t) can be obtained according to As an illustrative example, we apply the improved PF algo- Cl(t) -(vb a/V)IFFT1 [cl(t-I)FFT,[p(xt xt- )]] (10) rithm to track a human in a video sequence by using the fol- where the FFT, [.] represents the Ith bin of the FFT of the lowing state space model: argument.
Recommended publications
  • Kūnqǔ in Practice: a Case Study
    KŪNQǓ IN PRACTICE: A CASE STUDY A DISSERTATION SUBMITTED TO THE GRADUATE DIVISION OF THE UNIVERSITY OF HAWAI‘I AT MĀNOA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY IN THEATRE OCTOBER 2019 By Ju-Hua Wei Dissertation Committee: Elizabeth A. Wichmann-Walczak, Chairperson Lurana Donnels O’Malley Kirstin A. Pauka Cathryn H. Clayton Shana J. Brown Keywords: kunqu, kunju, opera, performance, text, music, creation, practice, Wei Liangfu © 2019, Ju-Hua Wei ii ACKNOWLEDGEMENTS I wish to express my gratitude to the individuals who helped me in completion of my dissertation and on my journey of exploring the world of theatre and music: Shén Fúqìng 沈福庆 (1933-2013), for being a thoughtful teacher and a father figure. He taught me the spirit of jīngjù and demonstrated the ultimate fine art of jīngjù music and singing. He was an inspiration to all of us who learned from him. And to his spouse, Zhāng Qìnglán 张庆兰, for her motherly love during my jīngjù research in Nánjīng 南京. Sūn Jiàn’ān 孙建安, for being a great mentor to me, bringing me along on all occasions, introducing me to the production team which initiated the project for my dissertation, attending the kūnqǔ performances in which he was involved, meeting his kūnqǔ expert friends, listening to his music lessons, and more; anything which he thought might benefit my understanding of all aspects of kūnqǔ. I am grateful for all his support and his profound knowledge of kūnqǔ music composition. Wichmann-Walczak, Elizabeth, for her years of endeavor producing jīngjù productions in the US.
    [Show full text]
  • Gateless Gate Has Become Common in English, Some Have Criticized This Translation As Unfaithful to the Original
    Wú Mén Guān The Barrier That Has No Gate Original Collection in Chinese by Chán Master Wúmén Huìkāi (1183-1260) Questions and Additional Comments by Sŏn Master Sǔngan Compiled and Edited by Paul Dōch’ŏng Lynch, JDPSN Page ii Frontspiece “Wú Mén Guān” Facsimile of the Original Cover Page iii Page iv Wú Mén Guān The Barrier That Has No Gate Chán Master Wúmén Huìkāi (1183-1260) Questions and Additional Comments by Sŏn Master Sǔngan Compiled and Edited by Paul Dōch’ŏng Lynch, JDPSN Sixth Edition Before Thought Publications Huntington Beach, CA 2010 Page v BEFORE THOUGHT PUBLICATIONS HUNTINGTON BEACH, CA 92648 ALL RIGHTS RESERVED. COPYRIGHT © 2010 ENGLISH VERSION BY PAUL LYNCH, JDPSN NO PART OF THIS BOOK MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR BY ANY MEANS, GRAPHIC, ELECTRONIC, OR MECHANICAL, INCLUDING PHOTOCOPYING, RECORDING, TAPING OR BY ANY INFORMATION STORAGE OR RETRIEVAL SYSTEM, WITHOUT THE PERMISSION IN WRITING FROM THE PUBLISHER. PRINTED IN THE UNITED STATES OF AMERICA BY LULU INCORPORATION, MORRISVILLE, NC, USA COVER PRINTED ON LAMINATED 100# ULTRA GLOSS COVER STOCK, DIGITAL COLOR SILK - C2S, 90 BRIGHT BOOK CONTENT PRINTED ON 24/60# CREAM TEXT, 90 GSM PAPER, USING 12 PT. GARAMOND FONT Page vi Dedication What are we in this cosmos? This ineffable question has haunted us since Buddha sat under the Bodhi Tree. I would like to gracefully thank the author, Chán Master Wúmén, for his grace and kindness by leaving us these wonderful teachings. I would also like to thank Chán Master Dàhuì for his ineptness in destroying all copies of this book; thankfully, Master Dàhuì missed a few so that now we can explore the teachings of his teacher.
    [Show full text]
  • Her Bossy Yet Naive CEO ______Chapter 351
    Her Bossy Yet Naive CEO _________________________________________________________________________________________________________________________________________ Chapter 351 The plane took off anyway. It was the first time in the history of the company that the company had been in the process of developing the new products. She didn’t have a cell phone and was on a plane and had no way to contact anyone, so she had to wait until the plane landed. For over an hour, it was an ordeal. The plane finally landed. Her Bossy Yet Naive CEO _________________________________________________________________________________________________________________________________________ When the passengers had left, Jasmine Tong left only then, and she walked quickly out of the passage alone. Jasmine Tong looked around for a pay phone to call from. She also didn’t have a penny on her and couldn’t leave if she wanted to. “Ma’am,” Suddenly I heard someone call out to me. As soon as Jasmine Tong turned around, she saw a familiar face, someone she had seen before, who should be the bodyguard by Albert Ou’s side. Her Bossy Yet Naive CEO _________________________________________________________________________________________________________________________________________ “Madam, what are you doing here “The bodyguard was also very surprised to see Jasmine Tong. “What are you doing here?” Wasn’t Albert Ou’s bodyguard following Albert Ou around? “Mr. Ou just took a plane to S City, my ID card just happened to expire and I didn’t make it.” “What is he doing in S City” Jasmine Tong looked at the bodyguard in horror. “Go find the wife ah we have been looking for a few days Ou just found out that the wife is Her Bossy Yet Naive CEO _________________________________________________________________________________________________________________________________________ in the Huo family in S city, so he immediately brought someone over.” “What? He even found out.” Jasmine Tong whacked her hand against her palm.
    [Show full text]
  • Crash Course Chinese
    Crash Course Chinese Lu Yang Yanmin Liu Presented by William & Mary Confucius Institute Overview of the Workshop • Composition of Chinese names • Meanings of Chinese names • Tips for bridging the cultural gap • Structure of the Chinese phonetic system • A few easily confused syllables • Chinese as a tonal language • Useful expressions in daily life Composition of Chinese Names • Chinese names include 姓 surname and 名 given name. Chinese English Surname Given name Given name Surname 杨(yáng) 璐(lù) Lu Yang 刘(liú) 燕(yàn)敏(mǐn) Yanmin Liu 陈(chén) 晨(chén)一(yì)夫(fū) Chenyifu Chen Composition of Chinese Names • The top three surnames 王(wáng), 李(lǐ), 张(zhāng) cover more than 20% of the population. • Compound surnames are rare. They are mostly restricted to minority groups. Familiar compound surnames are 欧 (ōu)阳(yáng), 东(dōng)方(fāng), 上(shàng)官(guān), etc. What does it mean? • Pleasing sounds and/or tonal qualities • Beautiful shapes (symmetrical shaped characters like 林 (lín), 森(sēn), 品(pǐn), 晶(jīng), 磊(lěi), 鑫(xīn). • Positive association • Masculine vs. feminine Major types of male names • Firmness and strength: 刚(gāng), 力(lì), 坚(jiān) • Power: 伟(wěi), 强(qiáng), 雄(xióng) • Bravery: 勇(yǒng) • Virtues and values: 信(xìn), 诚(chéng), 正(zhèng), 义(yì) • Beauty: 帅(shuài), 俊(jùn), 高(gāo), 凯(kǎi) Major types of female names • Flowers or plants: 梅(méi), 菊(jú), 兰(lán) • Seasons: 春(chūn), 夏(xià), 秋(qiū), 冬(dōng) • Quietness and serenity: 静(jìng) • Purity and cleanness: 白(bái), 洁(jié), 清(qīng), 晶(jīng),莹(yíng) • Beauty: 美(měi), 丽(lì), 倩(qiàn) • Jade: 玉(yù), 璐 (lù) • Birds: 燕(yàn) Cultural nuances regarding Chinese names • Names reflecting particular times such as: 援(yuán) 朝(cháo) Supporting North Korea 国(guó) 庆(qìng) National Day • Female names reflecting male chauvinism such as: 来(lái) 弟(dì), 招(zhāo) 弟(dì), 娣(dì) Seeking a little brother • Since 1950s, women do not change their surnames after getting married in mainland China.
    [Show full text]
  • Gěi ’Give’ in Beijing and Beyond Ekaterina Chirkova
    Gěi ’give’ in Beijing and beyond Ekaterina Chirkova To cite this version: Ekaterina Chirkova. Gěi ’give’ in Beijing and beyond. Cahiers de linguistique - Asie Orientale, CRLAO, 2008, 37 (1), pp.3-42. hal-00336148 HAL Id: hal-00336148 https://hal.archives-ouvertes.fr/hal-00336148 Submitted on 2 Nov 2008 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Gěi ‘give’ in Beijing and beyond1 Katia Chirkova (CRLAO, CNRS) This article focuses on the various uses of gěi ‘give’, as attested in a corpus of spoken Beijing Mandarin collected by the author. These uses are compared to those in earlier attestations of Beijing Mandarin and to those in Greater Beijing Mandarin and in Jì-Lǔ Mandarin dialects. The uses of gěi in the corpus are demonstrated to be consistent with the latter pattern, where the primary function of gěi is that of indirect object marking and where, unlike Standard Mandarin, gěi is not additionally used as an agent marker or a direct object marker. Exceptions to this pattern in the corpus are explained as a recent development arisen through reanalysis. Key words : gěi, direct object marker, indirect object marker, agent marker, Beijing Mandarin, Northern Mandarin, typology.
    [Show full text]
  • The Value of 11C-Choline PET/CT in Patients with Negative
    Journal of Nuclear Medicine, published on October 10, 2019 as doi:10.2967/jnumed.119.233213 Preoperative localisation of adenomas in primary hyperparathyroidism: the value of 11C-choline PET/CT in patients with negative or discordant ultrasonography and 99mTc-Sesta-MIBI-SPECT/CT Yimin Liu1,2, Yonghong Dang1,2, Li Huo*1,2, Ya Hu3, Ou Wang 4, He Liu5, Xiaoyan Chang6, Yu Liu 1,2, Xiaoping Xing4, Fang Li 1,2, Quan Liao3,Marcus Hacker7, Xiang Li*7, Michael C. Kreissl*8 1. Department of Nuclear Medicine, Peking Union Medical College (PUMC) Hospital, Chinese Academy of Medical Science & PUMC 2. Department of Nuclear Medicine, Beijing Key Laboratory of Molecular Targeted Diagnosis and Therapy in Nuclear Medicine 3. Department of Surgery. Peking Union Medical College Hospital, Chinese Academy of Medical Science & PUMC 4. Department of Endocrine. Peking Union Medical College Hospital, Chinese Academy of Medical Science & PUMC 5. Department of Ultrasound; Peking Union Medical College Hospital, Chinese Academy of Medical Science & PUMC 6. Department of Pathology. Peking Union Medical College Hospital, Chinese Academy of Medical Science & PUMC 7. Division of Nuclear Medicine, Department of Biomedical Imaging and Image-guided Therapy. Medical University of Vienna, Vienna, Austria. 8. Department of Radiology and Nuclear Medicine, University Hospital Magdeburg, Magdeburg, Germany. *shared senior author The first author Dr. Yimin Liu Department of Nuclear Medicine, Peking Union Medical College (PUMC) Hospital, Chinese Academy of Medical Science & PUMC, Beijing, China E-mail: [email protected] 1 Corresponding authors Prof. Dr. Li Huo Department of Nuclear Medicine, Peking Union Medical College (PUMC) Hospital, Chinese Academy of Medical Science & PUMC, Beijing, China E-mail: [email protected] And Ass.
    [Show full text]
  • Chinese Romanization Table
    239 Chinese Romanization Table Common Alphabetic (CA) follows the formula “consonants as in English, vowels as in Italian,” plus æ as in “cat,” v [compare the linguist’s !] as in “gut,” z as in “adz,” and yw (after l or n, simply w) for “umlaut u.” A lost initial ng- is restored to distinguish the states of We"! !! and Ngwe"! !!, both now “We"!.” Tones are h#!gh, r$!sing, lo%w, and fa"lling. The other systems are Pinyin (PY) and Wade-Giles (WG). CA PY WG CA PY WG a a a chya qia ch!ia ai ai ai chyang qiang ch!iang an an an chyau qiao ch!iao ang ang ang chye qie ch!ieh ar er erh chyen qian ch!ien au ao ao chyou qiu ch!iu ba ba pa chyung qiong ch!iung bai bai pai chyw qu ch!ü ban ban pan chywæn quan ch!üan bang bang pang chywe que ch!üeh bau bao pao chywn qun ch!ün bei bei pei da da ta bi bi pi dai dai tai bin bin pin dan dan tan bing bing ping dang dang tang bu bu pu dau dao tao bvn ben pen dei dei tei bvng beng peng di di ti bwo bo po ding ding ting byau biao piao dou dou tou bye bie pieh du du tu byen bian pien dun dun tun cha cha ch!a dung dong tung chai chai ch!ai dv de te chan chan ch!an dvng deng teng chang chang ch!ang dwan duan tuan chau chao ch!ao dwei dui tui chi qi ch!i dwo duo to chin qin ch!in dyau diao tiao ching qing ch!ing dye die tieh chou chou ch!ou dyen dian tien chr chi ch!ih dyou diu tiu chu chu ch!u dz zi tzu chun chun ch!un dza za tsa chung chong ch!ung dzai zai tsai chv che ch!e dzan zan tsan chvn chen ch!en dzang zang tsang chvng cheng ch!eng dzau zao tsao chwai chuai ch!uai dzei zei tsei chwan chuan ch!uan dzou
    [Show full text]
  • CJK NACO Searching
    10/7/2017 CJK NACO Searching Revised by Ryan Finnerty and Shi Deng, UC San Diego Library, 2017‐09 With assistance by Hideyuki Morimoto, Columbia University Libraries, Jessalyn Zoom, Library of Congress, and the CJK NACO Project reviewers Korean examples and search tips provided by Erica Chang (University of Hawai’i) and Sarah Byun (Library of Congress) NACO Searching: Purpose & Outlines • Keep the database clean by searching before contributing • Discuss why searching is important with CJK examples • To prevent duplicate NARs • To prevent conflict in authorized access points and variant access points • To gather information from existing bibliographic records • To identify existing records that may need to be evaluated and re‐coded for RDA • To identify bibliographic records that may need BFM • Searching tips in Connexion 2 1 10/7/2017 Why Search? To Prevent Duplicate NARs • Duplicates are normally created by inefficient searching and the 24‐ hour upload gap in the Name Authority File. • Before creating a name authority record: 1. Search the OCLC authority file for the authorized access point, including variant forms of the access point. 2. In addition, search WorldCat for bibliographic records that contain the authorized access point or variant forms. • If you put your record in a save file, remember to search again if more than 24 hours have passed. • If you encounter duplicate records in the authority file, be sure to notify your NACO Coordinator so the records can be reported to LC. 3 Duplicate NARs for Personal Names (1) • 24 hours rule: If you put your record in a save file, remember to search again if more than 24 hours have passed.
    [Show full text]
  • What Were the Four Divisions of Middle Chinese?
    What were the four Divisions of Middle Chinese ? Michel Ferlus To cite this version: Michel Ferlus. What were the four Divisions of Middle Chinese ? . Diachronica, Netherlands: John Benjamins, 2009, 26 (2), pp.184-213. 10.1075/dia.26.2.02fer. halshs-01581138v2 HAL Id: halshs-01581138 https://halshs.archives-ouvertes.fr/halshs-01581138v2 Submitted on 13 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution - NonCommercial - ShareAlike| 4.0 International License What were the four Divisions of Middle Chinese ? (updated version) Michel FERLUS Centre National de la Recherche Scientifique, France The text presented here is the final result of a series of versions of our research on the four divisions (or grades) of ancient Chinese (Middle Chinese) : 1. (1998) Du chinois archaïque au chinois ancien : monosyllabisation et formation des syllabes tendu/lâche (Nouvelle théorie sur la phonétique historique du chinois), The 31st International Conference on Sino-Tibetan Languages and Linguistics, University of Lund, Swiden, Sept. 30th – Oct. 4th (22 pages). (Available: https://halshs.archives-ouvertes.fr/halshs-00927220) 2. (2006) What were the four divisions (děng) of Middle Chinese ?, The 39th International Conference on Sino-Tibetan Languages and Linguistics, University of Washington, Seattle, September 15-17 (12 pages).
    [Show full text]
  • Surname Methodology in Defining Ethnic Populations : Chinese
    Surname Methodology in Defining Ethnic Populations: Chinese Canadians Ethnic Surveillance Series #1 August, 2005 Surveillance Methodology, Health Surveillance, Public Health Division, Alberta Health and Wellness For more information contact: Health Surveillance Alberta Health and Wellness 24th Floor, TELUS Plaza North Tower P.O. Box 1360 10025 Jasper Avenue, STN Main Edmonton, Alberta T5J 2N3 Phone: (780) 427-4518 Fax: (780) 427-1470 Website: www.health.gov.ab.ca ISBN (on-line PDF version): 0-7785-3471-5 Acknowledgements This report was written by Dr. Hude Quan, University of Calgary Dr. Donald Schopflocher, Alberta Health and Wellness Dr. Fu-Lin Wang, Alberta Health and Wellness (Authors are ordered by alphabetic order of surname). The authors gratefully acknowledge the surname review panel members of Thu Ha Nguyen and Siu Yu, and valuable comments from Yan Jin and Shaun Malo of Alberta Health & Wellness. They also thank Dr. Carolyn De Coster who helped with the writing and editing of the report. Thanks to Fraser Noseworthy for assisting with the cover page design. i EXECUTIVE SUMMARY A Chinese surname list to define Chinese ethnicity was developed through literature review, a panel review, and a telephone survey of a randomly selected sample in Calgary. It was validated with the Canadian Community Health Survey (CCHS). Results show that the proportion who self-reported as Chinese has high agreement with the proportion identified by the surname list in the CCHS. The surname list was applied to the Alberta Health Insurance Plan registry database to define the Chinese ethnic population, and to the Vital Statistics Death Registry to assess the Chinese ethnic population mortality in Alberta.
    [Show full text]
  • A Guide to Names and Naming Practices
    March 2006 AA GGUUIIDDEE TTOO NN AAMMEESS AANNDD NNAAMMIINNGG PPRRAACCTTIICCEESS This guide has been produced by the United Kingdom to aid with difficulties that are commonly encountered with names from around the globe. Interpol believes that member countries may find this guide useful when dealing with names from unfamiliar countries or regions. Interpol is keen to provide feedback to the authors and at the same time develop this guidance further for Interpol member countries to work towards standardisation for translation, data transmission and data entry. The General Secretariat encourages all member countries to take advantage of this document and provide feedback and, if necessary, updates or corrections in order to have the most up to date and accurate document possible. A GUIDE TO NAMES AND NAMING PRACTICES 1. Names are a valuable source of information. They can indicate gender, marital status, birthplace, nationality, ethnicity, religion, and position within a family or even within a society. However, naming practices vary enormously across the globe. The aim of this guide is to identify the knowledge that can be gained from names about their holders and to help overcome difficulties that are commonly encountered with names of foreign origin. 2. The sections of the guide are governed by nationality and/or ethnicity, depending on the influencing factor upon the naming practice, such as religion, language or geography. Inevitably, this guide is not exhaustive and any feedback or suggestions for additional sections will be welcomed. How to use this guide 4. Each section offers structured guidance on the following: a. typical components of a name: e.g.
    [Show full text]
  • And Natural-Gas-Fired Power Plants With
    International Journal of Greenhouse Gas Control 44 (2016) 249–261 Contents lists available at ScienceDirect International Journal of Greenhouse Gas Control j ournal homepage: www.elsevier.com/locate/ijggc Life cycle water use of coal- and natural-gas-fired power plants with and without carbon capture and storage ∗ Yang Ou, Haibo Zhai , Edward S. Rubin College of Engineering, Carnegie Mellon University, Pittsburgh, PA 15213, USA a r t i c l e i n f o a b s t r a c t Article history: This study conducts a hybrid life cycle analysis to estimate and characterize the water use of coal- and Received 29 August 2015 natural-gas-fired power plants with and without carbon capture and storage (CCS), including quantifi- Received in revised form 5 November 2015 cation of variability and uncertainty in the life cycle water use. The addition of CCS would remarkably Accepted 26 November 2015 increase the plant and life cycle water use, depending on the CO2 capture level. The life cycle water Available online 10 December 2015 use also varies with fuel type and cooling technology. Among multiple supply stages for electricity gen- eration, the power plant operation dominates the life cycle water use for both types of power plants. Keywords: The probabilistic simulation results show that the plant operation is the stage contributing the most to Coal-fired power plant the uncertainty of life cycle water use for a pulverized coal-fired power plant, whereas the hydraulic Natural-gas-fired power plant fracturing is the dominant stage of uncertainty for a shale-gas-fired combined cycle power plant.
    [Show full text]