Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys) Volume 2 Kohei Arai instant download
Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys) Volume 2 Kohei Arai instant download
https://textbookfull.com/product/intelligent-systems-and-
applications-proceedings-of-the-2020-intelligent-systems-
conference-intellisys-volume-3-kohei-arai/
https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2020-computing-conference-volume-2-kohei-arai/
https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2020-computing-conference-volume-3-kohei-arai/
https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2020-computing-conference-volume-1-kohei-arai/
Intelligent Computing: Proceedings of the 2018
Computing Conference, Volume 2 Kohei Arai
https://textbookfull.com/product/intelligent-computing-
proceedings-of-the-2018-computing-conference-volume-2-kohei-arai/
https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2020-volume-1-kohei-arai/
https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-2-kohei-arai/
https://textbookfull.com/product/human-centred-intelligent-
systems-proceedings-of-kes-hcis-2020-conference-alfred-
zimmermann/
https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-1-kohei-arai/
Advances in Intelligent Systems and Computing 1251
Kohei Arai
Supriya Kapoor
Rahul Bhatia Editors
Intelligent
Systems and
Applications
Proceedings of the 2020 Intelligent
Systems Conference (IntelliSys)
Volume 2
Advances in Intelligent Systems and Computing
Volume 1251
Series Editor
Janusz Kacprzyk, Systems Research Institute, Polish Academy of Sciences,
Warsaw, Poland
Advisory Editors
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
Rafael Bello Perez, Faculty of Mathematics, Physics and Computing,
Universidad Central de Las Villas, Santa Clara, Cuba
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
Hani Hagras, School of Computer Science and Electronic Engineering,
University of Essex, Colchester, UK
László T. Kóczy, Department of Automation, Széchenyi István University,
Gyor, Hungary
Vladik Kreinovich, Department of Computer Science, University of Texas
at El Paso, El Paso, TX, USA
Chin-Teng Lin, Department of Electrical Engineering, National Chiao
Tung University, Hsinchu, Taiwan
Jie Lu, Faculty of Engineering and Information Technology,
University of Technology Sydney, Sydney, NSW, Australia
Patricia Melin, Graduate Program of Computer Science, Tijuana Institute
of Technology, Tijuana, Mexico
Nadia Nedjah, Department of Electronics Engineering, University of Rio de Janeiro,
Rio de Janeiro, Brazil
Ngoc Thanh Nguyen , Faculty of Computer Science and Management,
Wrocław University of Technology, Wrocław, Poland
Jun Wang, Department of Mechanical and Automation Engineering,
The Chinese University of Hong Kong, Shatin, Hong Kong
The series “Advances in Intelligent Systems and Computing” contains publications
on theory, applications, and design methods of Intelligent Systems and Intelligent
Computing. Virtually all disciplines such as engineering, natural sciences, computer
and information science, ICT, economics, business, e-commerce, environment,
healthcare, life science are covered. The list of topics spans all the areas of modern
intelligent systems and computing such as: computational intelligence, soft comput-
ing including neural networks, fuzzy systems, evolutionary computing and the fusion
of these paradigms, social intelligence, ambient intelligence, computational neuro-
science, artificial life, virtual worlds and society, cognitive science and systems,
Perception and Vision, DNA and immune based systems, self-organizing and
adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics
including human-machine teaming, knowledge-based paradigms, learning para-
digms, machine ethics, intelligent data analysis, knowledge management, intelligent
agents, intelligent decision making and support, intelligent network security, trust
management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are
primarily proceedings of important conferences, symposia and congresses. They
cover significant recent developments in the field, both of a foundational and
applicable character. An important characteristic feature of the series is the short
publication time and world-wide distribution. This permits a rapid and broad
dissemination of research results.
** Indexing: The books of this series are submitted to ISI Proceedings,
EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink **
Rahul Bhatia
Editors
Intelligent Systems
and Applications
Proceedings of the 2020 Intelligent Systems
Conference (IntelliSys) Volume 2
123
Editors
Kohei Arai Supriya Kapoor
Saga University The Science and Information
Saga, Japan (SAI) Organization
Bradford, West Yorkshire, UK
Rahul Bhatia
The Science and Information
(SAI) Organization
Bradford, West Yorkshire, UK
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Editor’s Preface
This book contains the scientific contributions included in the program of the
Intelligent Systems Conference (IntelliSys) 2020, which was held during September
3–4, 2020, as a virtual conference. The Intelligent Systems Conference is a pres-
tigious annual conference on areas of intelligent systems and artificial intelligence
and their applications to the real world.
This conference not only presented state-of-the-art methods and valuable
experience from researchers in the related research areas, but also provided the
audience with a vision of further development in the fields. We have gathered a
multi-disciplinary group of contributions from both research and practice to discuss
the ways how intelligent systems are today architectured, modeled, constructed,
tested and applied in various domains. The aim was to further increase the body of
knowledge in this specific area by providing a forum to exchange ideas and discuss
results.
The program committee of IntelliSys 2020 represented 25 countries, and authors
submitted 545 papers from 50+ countries. This certainly attests to the widespread,
international importance of the theme of the conference. Each paper was reviewed
on the basis of originality, novelty and rigorousness. After the reviews, 214 were
accepted for presentation, out of which 177 papers are finally being published in the
proceedings.
The conference would truly not function without the contributions and support
received from authors, participants, keynote speakers, program committee mem-
bers, session chairs, organizing committee members, steering committee members
and others in their various roles. Their valuable support, suggestions, dedicated
commitment and hard work have made the IntelliSys 2020 successful. We warmly
thank and greatly appreciate the contributions, and we kindly invite all to continue
to contribute to future IntelliSys conferences.
v
vi Editor’s Preface
It has been a great honor to serve as the General Chair for the IntelliSys 2020 and
to work with the conference team. We believe this event will certainly help further
disseminate new ideas and inspire more international collaborations.
Kind Regards,
Kohei Arai
Conference Chair
Contents
vii
viii Contents
Abstract. Despite the success over the recent years, convolutional neu-
ral network (CNN) has a major limitation of the inability to retain spa-
tial relationship between learned features in deeper layers. Capsule net-
work with dynamic routing (CapsNet) was introduced in 2017 with a
speculation that CapsNet can overcome this limitation. In our research,
we created a suitable collection of datasets and implemented a simple
CNN model and a CapsNet model with similar complexity to test this
speculation. Experimental results show that both the implemented CNN
and CapsNet models have the ability to capture the spatial relationship
between learned features. Counterintuitively, our experiments show that
our CNN model outperforms our CapsNet model using our datasets. This
implies that the speculation does not seem to be entirely correct. This
might be due to the fact that our datasets are too simple, hence requir-
ing a simple CNN model. We further recommend future research to be
conducted using deeper models and more complex datasets to test the
speculation.
1 Introduction
2 Related Works
The concept of CNN was first proposed by LeCun et al. [12] in 1989. However,
due to the lack of computational power and availability of dataset, it was not
until recent years that researchers are able to develop feasible models utilizing
modern high-performance computers. One notable breakthrough was the work of
Krizhevsky et al. [1] which achieved state-of-the-art performance in the ImageNet
challenge [13] in 2012. Since then, countless researches have been conducted to
develop more advanced CNN models to be used successfully in real-world appli-
cations such as speech recognition [14], gait recognition [15], steering controls in
self-driving cars [16], human crowd detection [17], and medical image segmenta-
tion [18].
Despite successful demonstrations of CNN models, one of the pioneers, Geof-
frey Hinton argued that the current CNNs “are misguided in what they are
CapsNet vs CNN 3
trying to achieve” [19], due to the use of pooling layers for subsampling in CNN
models. The models lose the ability to compute precise spatial relationships
between learned features in the deeper layers. When a pooling layer is used in
between convolutional layers, only the most active neuron in a local region of
a feature map would be retained while the rest of the neurons are disregarded.
Such disregard of neurons causes the loss of spatial information of the features.
Furthermore, due to the use of scalars instead of vectors, properties of fea-
tures such as orientation, thickness, and skewness are lost. Therefore, Hinton,
G. E. et al. [19] proposed to group neurons together as vectors and use them to
represent the features of an object. These vectors are called capsules.
In 2017, Hinton and his team [11] proposed an architecture called capsule
networks with dynamic routing (CapsNet) that performed better than CNN
on the MNIST dataset. It achieved state-of-the-art results in MNIST with only
0.25% of test error. The CapsNet model which achieved 99.23% on the expanded
MNIST set were able to reach an accuracy of 79% on affNIST test set while a
CNN that achieved 99.22% accuracy on the expanded MNIST test set only
achieved 66% accuracy on affNIST test set. This proves that CapsNet is more
robust to affine transformations.
We have implemented CapsNet based on the original research paper [11] and
through the reconstruction network as mentioned in the paper, it can be seen
that CapsNet preserves the properties of the features well as shown in Fig. 1.
3 Methodology
We implemented a CNN model and a CapsNet model for this study. In general, a
CNN model consists of several convolutional layers with pooling layers between
them followed by fully-connected layers as explained in Sect. 3.2. A CapsNet
model consists of several convolutional layers without any pooling layers followed
by a primary capsule layer and a digit capsule layer as explained in Sect. 3.3.
Both of the models were designed to have the same number of layers in order
for them to be comparable.
In order to test the speculation, we need to design a dataset in such a way
that there are two classes of images containing the same features but the features
from different classes have different spatial arrangements. Training our models
directly on such a dataset may not yield any insight into the models as the
models will learn to identify the shape of the entire objects successfully instead
of the distinct features as intended.
Therefore, we prepared two groups of datasets whereby the first group con-
tains images of only distinct features while the second group contains objects
formed by the composition of the features. Our models are first trained on the
dataset from Group 1. Once the training is completed, the weights of the con-
volutional layers in both models will be frozen while the weights of the rest of
the layers will be re-trained on the dataset from Group 2. This will ensure that
our models learn the distinct features first before learning to identify the objects
using the learned features. This strategy is known as transfer learning.
Below we describe in detail regarding the dataset generation, testing of con-
volutional neural network model, and testing of capsule network with dynamic
routing model. Since our datasets only consist of objects with simple features,
relatively simple models should be sufficient to achieve good accuracy on the
evaluations.
Our dataset consists of two groups. Figure 2 shows samples from Group 1, which
contains images of arrows and non-arrows. Figure 3 shows samples from Group
2, which contains images of equilateral triangles and rectangles. Each image is
of 64 × 64 pixels.
We chose to use generated images in our dataset because there is too much
ambiguity in real-life images. Furthermore, simple polygon objects were chosen as
they are well-defined mathematically. This would enable us to test out different
ideas on how to design our experiments. Table 1 shows the organizations of our
datasets.
CapsNet vs CNN 5
architecture of CapsNet is similar to the original paper [11] except that we added
an extra convolutional layer and we used 16-D capsules on primary capsule layer
and 32-D capsules in digit capsule layer. We used the activation function as
proposed in the paper. To prevent overfitting, a reconstruction network [11] was
used. There were no pooling layers used.
Similar to CNN, our experiment was carried out by first training our CapsNet
model on the dataset from Group 1 and once the model was trained, we re-trained
the weights of the primary capsule layer and digit capsule layer of the model on
the dataset from Group 2 while freezing the weights of the convolutional layers.
The trained model was evaluated on the testing sets from their respective groups
after each training.
The trainings and the evaluations of the models were performed on a workstation
running on Ubuntu 16.04 equipped with 16 GB RAM, Core i7-6700K processor,
and two NVIDIA GTX1080Ti GPUs. The models were trained using the training
subsets and were evaluated on their respective testing sets. The evaluation results
in terms of accuracy (acc), precision (prec), recall (rec) and F1-score (F1) for
both models are shown in Table 2 below.
Table 2. (a) Evaluation Results for CapsNet. (b) Evaluation Results for CNN
(a)
Subset 1 Subset 2 Subset 3
(%) Acc Prec Rec F1 Acc Prec Rec F1 Acc Prec Rec F1
Group 1
Triangles vs 88.4 88.7 87.2 87.9 91 92.5 89 90.7 90.4 92.8 87.6 90.1
Rectangles
Group 2
Arrows vs 67.6 70.6 59.7 64.7 77.8 86.6 62.1 72.3 80.4 83.9 75.1 79.3
Non-Arrows
(b)
Subset 1 Subset 2 Subset 3
(%) Acc Prec Rec F1 Acc Prec Rec F1 Acc Prec Rec F1
Group 1
Triangles vs 98.5 99.4 97.1 98.2 99.3 99.5 98.9 99.2 99.6 99.8 99.2 99.6
Rectangles
Group 2
Arrows vs 92.6 95 87.2 90.9 95.8 95.2 95.8 95.5 96.6 96.8 92.5 94.6
Non-Arrows
CapsNet vs CNN 7
All the images were shuffled in their respective sets and normalized before
they were used for training and evaluation purposes. From Table 2(a), it is evi-
dent that CapsNet is able to determine whether a given image contains an arrow
or non-arrow by computing the spatial relationship between the learned features.
It can also be seen in Table 2 (b) that CNN has achieved near-perfect accuracies.
This is due to the fact that the generated datasets do not contain any real-world
noise.
We expected the CNN model to perform worse than CapsNet based on the
speculation stated earlier but it can be seen from the results that CNN actually
performed better than CapsNet. This might be due to the dataset being too
simple hence not requiring a deeper CNN model.
The use of pooling layers in between the convolutional layers should cause
the loss of spatial information of the features in a CNN. Hence, it might be
the case where our model is not deep enough. We expected our CNN model to
perform poorly to at least some degree due to the use of 3 pooling layers but
based on the results this is not the case. We chose a CNN model with only 3
pooling layers due to the simplicity of the datasets. From the results, it is evident
that the problem of retaining the spatial relationship between features is not a
serious issue for a relatively shallow model such as a model with only 3 pooling
layers. However, it is questionable whether a deeper CNN model would perform
well on a more complex dataset or not.
In our experiment, the objects in the images are formed by composing simple
features. There is only one equilateral triangle and one rectangle in every image.
Given the success of CNN, identifying such generated simple objects without
real-world noise is rather a trivial task for CNN. This could be another reason for
the high accuracy that CNN models have achieved in this experiment despite the
use of pooling layers. Our implementations are publicly available in this github
link.1
In this work, we have designed an experiment to test the speculation that Cap-
sNet is able to retain the spatial relationship between features better than CNN.
In order to carry out the experiment, we have generated our own datasets.
From our results, both the shallow CNN and CapsNet models have shown
the capability to retain the spatial relationship between features. However, the
speculation that CapsNet is able to retain spatial relationship between features
better than CNN does not seem to be true for shallow models on simple datasets.
It is still uncertain whether this speculation is true for deeper models on more
complex datasets and on noisy datasets.
Considering the fact that CNN has been developed extensively since its inven-
tion in 1989 [12], it is possible that our experiment was too simple for CNN.
CapsNet on the other hand, is still at a rudimentary stage and the fact that its
1
https://github.com/MMU-VisionLab/CapsNet-vs-CNN.
8 U. Manogaran et al.
performance level is close to CNN in this experiment means that CapsNet has
great potential.
Future research in this area should consider the usage of more complex fea-
tures to represent the objects in the datasets and deeper models in order to
further understand the capabilities and limitations of these models. Gaining
deeper insights on these models in the retention of spatial relationship between
features will guide future developments in a better way.
References
1. Krizhevsky, A., Sutskever, I., Hinton, G.E.: ImageNet classification with deep con-
volutional neural networks. In: Advances in Neural Information Processing Sys-
tems, pp. 1097–1105 (2012)
2. Szegedy, C., Liu, W., Jia, Y., Sermanet, P., Reed, S., Anguelov, D., Rabinovich,
A.: Going deeper with convolutions. In: Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pp. 1–9 (2015)
3. Simonyan, K., Zisserman, A.: Very deep convolutional networks for large-scale
image recognition. arXiv preprint arXiv:1409.1556 (2014)
4. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified,
real-time object detection. In: Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, pp. 779–788 (2016)
5. Girshick, R., Donahue, J., Darrell, T., Malik, J.: Rich feature hierarchies for accu-
rate object detection and semantic segmentation. In: Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, pp. 580–587 (2014)
6. Nair, P., Doshi, R., Keselj, S.: Pushing the limits of capsule networks. Technical
note (2018)
7. Algamdi, A.M., Sanchez, V., Li, C.T.: Learning temporal information from spatial
information using CapsNets for human action recognition. In: 2019 IEEE Interna-
tional Conference on Acoustics, Speech and Signal Processing (ICASSP), ICASSP
2019, pp. 3867–3871 (2019)
8. Xi, E., Bing, S., Jin, Y.: Capsule network performance on complex data. arXiv
preprint arXiv:1712.03480 (2017)
9. Xiang, C., Zhang, L., Tang, Y., Zou, W., Xu, C.: MS-CapsNet: a novel multi-scale
capsule network. IEEE Signal Process. Lett. 25(12), 1850–1854 (2018)
10. Chidester, B., Do, M.N., Ma, J.: Rotation equivariance and invariance in convolu-
tional neural networks. arXiv preprint arXiv:1805.12301 (2018)
11. Sabour, S., Frosst, N., Hinton, G.E.: Dynamic routing between capsules. In:
Advances in Neural Information Processing Systems, pp. 3856–3866 (2017)
12. LeCun, Y., Boser, B., Denker, J.S., Henderson, D., Howard, R.E., Hubbard, W.,
Jackel, L.D.: Backpropagation applied to handwritten zip code recognition. Neural
Comput. 1(4), 541–551 (1989)
13. Deng, J., Dong, W., Socher, R., Li, L.J., Li, K., Fei-Fei, L.: ImageNet: a large-
scale hierarchical image database. In: IEEE Conference on Computer Vision and
Pattern Recognition (2009)
CapsNet vs CNN 9
14. Palaz, D., Magimai-Doss, M., Collobert, R.: Analysis of CNN-based speech recog-
nition system using raw speech as input. In: Sixteenth Annual Conference of the
International Speech Communication Association (2015)
15. Zhang, C., Liu, W., Ma, H., Fu, H.: Siamese neural network based gait recognition
for human identification. In: IEEE International Conference on Acoustics, Speech
and Signal Processing (ICASSP), pp. 2832–2836 (2016)
16. Bojarski, M., Del Testa, D., Dworakowski, D., Firner, B., Flepp, B., Goyal,
P., Zhang, X.: End to end learning for self-driving cars. arXiv preprint
arXiv:1604.07316 (2016)
17. Tzelepi, M., Tefas, A.: Human crowd detection for drone flight safety using
convolutional neural networks. In: 25th European Signal Processing Conference
(EUSIPCO), pp. 743–747. IEEE (2017)
18. Milletari, F., Navab, N., Ahmadi, S.A.: V-net: fully convolutional neural networks
for volumetric medical image segmentation. In: IEEE Fourth International Con-
ference on 3D Vision (3DV), pp. 565–571 (2016)
19. Hinton, G.E., Krizhevsky, A., Wang, S.D.: Transforming auto-encoders. In: Pro-
ceedings of the 21th International Conference on Artificial Neural Networks-
Volume Part I, pp. 44–51 (2011)
20. LaLonde, R., Bagci, U.: Capsules for object segmentation. arXiv preprint
arXiv:1804.04241 (2018)
Improved 2D Human Pose Tracking
Using Optical Flow Analysis
1 Introduction
Human motion tracking is an important application of machine vision algorithms
that could be used for many business purposes. The most popular tasks in the
digital world include distributed video surveillance system, solutions for digital
marketing, solutions for human tracking in an industrial environment.
This task can have different levels of details. The high-level approach is object
detection, when the position of human as a whole object is extracted and its
bounding box in 2D or 3D space is estimated.
A more interesting approach would be to detect a human pose in motion. This
task is more complicated because human pose has substantially more dimensions
compared to a bounding box.
Recent advances in deep learning have resulted in efficient single-frame pose
tracking algorithms, such as [6,14]. By applying them sequentially to a video
stream, a set of trajectories for joints may be obtained. However, since these
2 Related Work
The task of retrieving pose dynamics for all persons in the video may be con-
sidered as a variant of multiple object tracking (MOT) task, where the con-
sidered objects are not persons but individual pose keypoints. There are two
major paradigms in the field of MOT - detection-based tracking and detection-
free tracking [11]. In the first case, machine vision algorithm capable of detect-
ing individual objects is applied to every frame separately and then individual
detections are linked into trajectories. The second approach has no detection
algorithm and instead relies on temporal changes in the video stream to detect
objects. With the development of efficient real-time object detection algorithms
in recent years, the detection-based approach has become dominant in the lit-
erature. However, independent analysis of video frames results in inevitable loss
of information conveyed by temporal changes in the video. This information
may be relevant to object detection and could help improve the tracker perfor-
mance. Various approaches were suggested to combine these individual frame
and temporal features.
For example, in [12] a novel approach to combine temporal and spatial fea-
tures was proposed by adding recurrent temporal component to a convolutional
neural network (CNN) designed to detect objects in a single frame. The outputs
of object detection network in sequential frames were fed into recurrent neural
network (RNN). The resulting architecture is then trained to predict the refined
tracking locations.
In [1] a tracker using prior information about possible person pose dynamics
is proposed. This information is modelled as a hierarchical Gaussian process
latent variable model, and allows to impose some temporal coherency in detected
articulations.
In [17] a method leveraging optical flow for a pose tracking is proposed. The
velocities obtained from flow data are used to generate expected coordinates of
a pose in next frame. Predicted coordinates are used later to form tracks by
greedy matching.
Our research is based on OpenPose as a body pose detector, proposed in
[3]. It is a real-time solution capable to detect a 2D pose of multiple people
in an image. It uses a non-parametric representation, which is referred to as
Part Affinity Fields (PAFs), to learn to associate body parts with individuals in
the image. This bottom-up system achieves high accuracy and real-time perfor-
mance, regardless of the number of people in the image.
12 A. Khelvas et al.
3 Definitions
Fist let us define several frames of reference (FoR) for our research, which are
shown in Fig. 1.
4 Method
Our goal is to propose a novel algorithm for robust tracking of multiple person
poses in the video stream by leveraging both temporal and spatial features of the
data. To achieve this, we combine predictions done by a single-frame person/pose
detection algorithm (such as OpenPose and YOLO) with Optical Flow - based
estimations through a Kalman filter.
The complete algorithm is described below and shown in Fig. 2.
Improved 2D Human Pose Tracking Using Optical Flow Analysis 13
2. Objects detection step provides a set of bounding boxes for each person,
detected by YOLO or some other object detection algorithm.
3. Pose detection ROI generation step provides a set of input frame regions for
further pose detection.
6. Kalman Filtration step calculates the time series for filtered movement vectors
f p = {ûf p , v̂ f p , ûf p , v̂ f p , . . . , ûf p , v̂ f p , }.
B 1 1 2 2 N N
Let’s discuss each step in detail.
After performing necessary source-specific video pre-processing, the next step
would be extracting poses from single video frames where possible. We have
selected an OpenPose-based solution as a human pose detector. OpenPose is a
multi-person real-time pose keypoint detection algorithm, initially presented in
[3]. An open-source implementation of OpenPose is used, providing pose key-
points in BODY-25 format. Reduced model example for 18 keypoints is shown
in Fig. 3.
processing is a set of bounding boxes, with top left and bottom right corners
defined in Ocf , Ucf , Vcf FoR. A set of regions fully covering these rectangles is
generated with resolution matching the selected input resolution of OpenPose
network.
The result of video processing in the detection stage is a list of persons’
bounding boxes for each frame. For each detected object we have the bounding
box coordinates u1 , v1 , u2 , v2 , detection confidence and the OpenPose keypoint
data if a skeleton was successfully matched with YOLO object: vector B f p.
Additionally, we calculate approximate coordinates standard deviation for each
keypoint by integrating over part heatmaps returned by the OpenPose. These
values are later used as input for the Kalman filter as a measurement error
estimate.
To further refine poses extracted from single frames, algorithm uses an optical
flow solution. Optical flow is a technology used in various fields of computer
vision to find displacement of individual pixels between two video frames. It is
usually expressed as a 2D vector field {vf low = (dx, dy)T } for every pixel of the
initial frame In (x, y). Corresponding pixel in the next frame is In+m (x + dx, y +
dy). Many different approaches to optical flow calculation are proposed in the
literature. In our work, we use several open source optical flow implementations
provided by the OpenCV library.
The first one is presented in [7] called Dense Inverse Search. It belongs to the
family of ‘dense optical flow’ algorithms and is notable for low computational
complexity while it preserves good scores in standard optical flow benchmarks.
The another one is called DeepFlow and was presented in paper [15].
The example of used soccer game frame for optical flow visualization calcu-
lated by two different algorithms is presented in Fig. 4.
Fig. 4. The example of used soccer game frame for optical flow visualization calculated
by two different algorithms
For Optical Flow visualization we use the HSV model. Hue represents the
motion vector angle and saturation encodes the motion vector length.
16 A. Khelvas et al.
Kalman Filter was first proposed in 1960 [5] and, as a matter of fact, became
the industry standard in the tasks related to fusion of measures performed by
sensors of different types. Its application requires specification of a motion model
for modeled object. There are several common motion models used in case the
model of real motion is difficult or impossible to formalize [8]. Popular choices
for a 2D case include a constant Cartesian velocity model and polar velocity
non-linear model employing extended Kalman filter [2]. Alternative and more
complex models can be implemented when 3D pose information is available, but
their assessment lies beyond the scope of this work.
In our experiments we used the constant Cartesian velocity model applied
independently to joint coordinates in 2D video frame FoR. In this instance,
the state vector consists of 4 components representing estimated position and
velocity of pose keypoint: s(t) = (ût , v̂t , uˆ˙t , vˆ˙t )T . The state in the moment t + 1
may be linked to the state values in the moment t with the following equation:
⎛ ⎞⎛ ⎞ ⎛ ⎞
1 0 δt 0 ût 0.5δt2 0
⎜0 1 0 δt⎟ ⎜ v̂t ⎟ ⎜ 0 0.5δt2 ⎟ νx (t)
s(t + 1) = ⎜ ⎟⎜ ⎟ ⎜
⎝0 0 1 0 ⎠ ⎝uˆ˙t ⎠ + ⎝ δt
⎟ (1)
0 ⎠ νy (t)
00 0 1 vˆ˙t 0 δt
5 Results
The soccer match video had an additional pre-processing step - the fan stands
were cut.
Figure 7 presents skeletons for soccer and supermarket cases.
Examples of filtered trajectories are presented in Fig. 8, 9.
Figure 8(a) presents selected and filtered U coordinate trajectories of an
ankle of walking person on outdoor CCTV camera. Periodic increased difference
Another Random Document on
Scribd Without Any Related Topics
oppression of the people, resistance to lawful power, and a refuge
from justice for the wrongdoer. This was entirely incompatible with
the great reforms insisted upon by Edward I., and passed into law by
parliament; law and order became the rule and not the exception,
and the position of the castle grew anomalous.
SKIPTON CASTLE,
YORKSHIRE.
With the ascendancy of an efficient administration of justice came
the desire for comfort and a display of luxury, and probably no one
who has become acquainted with the internal disposition of an early
castle will qualify the assertion that the acme of discomfort and
inconvenience must have prevailed within them.
Consequent upon this alteration in the economic conditions of the
nation, the need for the impregnable stronghold of the past ages
ceased to exist, and in many parts of England, but more especially in
the south and east, the existing structures were largely altered or
added to in order to afford conditions suitable to the changed
amenities of social life. These alterations in nearly every case were
made at the sacrifice of efficiency, and many castles which had
played a notable part in the history of the nation became merely the
residences of their lords, who made no attempt to put them to their
original uses in time of war. Arundel, the great midland castles of
Warwick, Kenilworth, and many others, fall under this category.
So far as gunpowder is concerned the part which it played in causing
the abandonment of the feudal castle is strangely varied and
dependent upon local circumstances. A well-found castle with an
efficient and adequate garrison, supported by an army in active
operation in the field, had no more to fear from an attack in the
fifteenth century than it had in the thirteenth, perhaps not so much.
Very few bombards of the period mentioned could throw stone shot
weighing over 150 lbs., whereas the medieval trebuchet could hurl a
missile of twice that weight, or even more, and to almost as great a
distance. The effect of low-trajectory cannon upon castle walls in the
fifteenth century under ordinary conditions may almost be left out of
consideration, so small was the calibre. It is true that Sir Ralph Grey,
when besieged in Bamborough Castle in 1464, was forced to
surrender in a short space of time by the army of the Kingmaker,
who used his basilisks, aspiks, serpentines, dragons, syrens, and
sakers with excellent effect; but we may justly claim that this was an
exception, the configuration of the ground enabling Warwick to place
his pieces close up to the walls, while Grey could look for no effective
relief from a sympathetic army outside. Ten years afterwards the
Castle of Harlech, under the able governance of Davydd ap Ifan, held
out against all the force that Edward IV. could bring to bear upon it,
and was the last of the castles garrisoned by Lancastrians to render
up its keys.
But perhaps the greatest argument against the belief that the
"venomous saltpetre" was the chief cause of the decline in
castellation is that of the gallant resistance made by many of these
old strongholds in the Great Civil War. At that time the newest of the
castles was, perhaps, about two hundred years old and had not been
constructed entirely for defence; the older structures were in many
cases devoid of woodwork which had perished through age and
neglect. Yet these ancient buildings, now once more called upon to
play their part in deadly strife, in many cases showed a resistance to
attack which was simply marvellous, sometimes, as in the case of
Pembroke, defying the ordnance brought to bear upon them. If a
Royalist army of respectable proportions happened to be in the
vicinity of a beleaguered fortress, the Parliamentarians appeared to
regard its reduction as an impossibility, and in the first place devoted
their entire attention to the dispersal of the field force. It is true that
the condition of the unmetalled trackways, which were dignified by
the name of roads, at that time, presented almost insuperable
obstacles to the passage of heavy ordnance, and the advance of a
cumbrous baggage train was at times an impossibility.
But even if cannon of respectable proportions could be brought
against a castle in the Great Civil War, the effects produced were in
many cases out of all proportion to the enormous trouble involved.
Thus at the first siege of Pontefract Castle in 1644 a cannon
throwing a 42-lb. shot was used in conjunction with another of 36
lbs. and two of 24 lbs., the least being 9 lbs., and yet the siege failed
chiefly by reason of the small effect produced by the 1400 projectiles
which were fired into it. Again although Scarborough Castle was
quite ruinous in 1644 when its siege commenced, and in addition
was ill-supplied with ammunition or food, yet it gallantly sustained a
siege lasting for twelve months.
It may therefore be conceded from the foregoing that the assertion
respecting gunpowder causing the disuse of the castle in the British
Isles must be taken with a large degree of reservation, since many
other causes have to be considered, and even those who maintain
the assertion must admit that the reason assigned took an
unconscionably long time in effecting its object.
IGHTHAM MOTE, KENT.
In the very few castles which saw their origin during the fourteenth
and fifteenth centuries in Britain, domestic comforts and attempts at
effective defensive works appear to have run side by side, often to
the almost total exclusion of the latter. The substitution of brick for
stone masonry in many of these was in itself a startling change, but
when combined with this, large and lofty apartments were
introduced, many with magnificent carved and moulded wooden
ceilings, windows of large dimensions filled with beautiful tracery
characteristic of Perpendicular architecture, walls hung with rich
tapestry and decorated with gorgeous heraldic devices and trophies
of arms, costly furniture and other fittings betokening an advanced
education in domestic requirements,—the feeling was borne in upon
the minds of the nation that the feudal castle, as such, had seen its
day, and that the age of the baronial residence and the manorial
dwelling-house had superseded it.
In these later castellated residences the kitchens, larders, cellars,
dining halls, residential rooms and general offices became matters of
supreme moment, the defensive works of secondary importance, but
designed nevertheless with a view to impressiveness and an
assumption of strength which they rarely possessed. Within these
lordly halls the noble owners held high revel, while troops of
servitors, henchmen, and servants of every degree swarmed in the
passages and halls in marked contradistinction to the old time grim
men-at-arms, bearded archers, and steel-clad retainers of the feudal
fortress.
There was naturally a period of transition during which the
characteristics of the Castle predominated over the domestic
influences, and those which sprang into existence during the reigns
of Henry IV. and V. very ably show this feature. To this intermediate
period we may ascribe those structures which were chiefly reared by
the spoils acquired upon the Continent by soldiers of fortune who
"followed the wars," and returning to their native land built palatial
residences for themselves, out of their lawful, or it may be, ill-
acquired, gains. Many of these were based upon designs which the
adventurers had seen abroad, thus our first example, Bodiam, is a
replica of many castles which were to be found at the time of its
erection in Gascony. Bodiam Castle is one of the finest in Sussex, and
certainly one of the most picturesque in England; it is situated upon
the Rother, which here forms the boundary between Sussex and
Kent. The building owes its origin to Sir Edward Dalyngrugge, who
had served in France and Spain under the Black Prince with singular
credit to himself and marked advantage to his worldly estate. A
portion of this superfluous wealth was expended in erecting Bodiam
Castle, which, while affording every comfort as a residence,
possessed most of the essential qualities for effective defence.
It presents a singularly beautiful and romantic spectacle at the
present time, the towers and enceinte being entire, while a wealth of
foliage and the wide waters of the surrounding moat afford a coup
d'œil seldom equalled and probably not excelled in England. The
licence to crenellate dates from 1386; the building was erected in the
middle of a lake connected with the river, thus forming a broad and
deep moat. A causeway, defended by an ingenious system of bridges
and small gateways, leads across the latter, and terminates in a small
barbican, now partly dismantled; the entrance is between two tall
square towers which present beautiful examples of machicolation
upon their summits. Upon the opposite, or south face, is the postern
leading to the moat and defended by a massive square tower, being
one of nine in all surrounding the enclosure. The interior is now
simply an empty shell, all the domestic buildings having been
destroyed by Sir William Waller in 1643, after the siege of Arundel,
although the Chapel and the chief apartments are capable of being
located. We have therefore simply the outer walls remaining of a
particularly fine castle of the Perpendicular period.
The entrance consists of a vaulted passage with many openings for
the discharge of missiles upon assailants while they were
endeavouring to overcome the three portcullises and the massive
wooden gate defending it. In addition to ordinary loopholes there are
round holes for the discharge of harquebuses. The castle underwent
a siege by the Earl of Surrey in the reign of Richard III. in
consequence of a descendant of Sir Thomas Lewkenor, into whose
hands it had passed, proving obnoxious to the King.
Shirburn Castle is also of the same type and very similar to Bodiam;
it dates from the year 1377 and was erected by Warine de Lisle who
had gained wealth and distinction under Edward III. It stands in the
Chiltern Hills near Stokenchurch and is a large square pile
surrounded by a broad moat.
WRESSLE CASTLE, YORKSHIRE.
Wressle Castle, Yorkshire.—The Castle of Wressle lies to the south-
east of York, near the junction of the Derwent with the Ouse, the
navigation of which it was probably designed to protect. Sir Thomas
Percy, the brother of the first Earl of Northumberland, is reputed to
have been the founder. It fell to the Crown, and Henry IV. granted it
to his son John, Earl of Bedford, and after his demise to Sir Thomas
Percy, son of Henry, the second Earl of Northumberland. The Percies
seem to have maintained their Court in the Castle with a
magnificence befitting their illustrious race, and during their
occupation the Castle saw the most glorious portion of its history.
In 1642 and 1648 it was garrisoned by the Parliamentarians and
shortly afterwards was ordered to be dismantled. Three sides of the
quadrangle were thrown down, leaving only the south façade. It was
in the possession of the Seymour family from 1682 to 1750, when it
again passed into the hands of descendants of the Percy family, and
now is owned by Lord Leconfield.
The building originally possessed five towers, one at each corner and
another over the entrance on the south side, which still remains,
together with the curtain wall and flanking towers. These present a
very imposing appearance, but the general effect of the ruins
suggests the castellated mansion of the Perpendicular period more
than the grim sternness of a medieval castle. The square corner
towers appear singularly inadequate for an effective flanking fire,
and no doubt the building relied for defence chiefly upon the broad
moat which encompassed it upon three sides and the deep dry ditch
defending the approach.
Hever undoubtedly owes its fame partly to its magnificent
gatehouse, which forms by far the most impressive part of the
structure, and partly to the rich store of human interest imparted by
its intimate connection with the ill-fated Anne Boleyn. It was built in
the reign of Edward III. by Sir William de Hever, whose daughter
brought it to her husband, Lord Cobham. In the time of Henry VI.,
Sir Geoffrey Boleyn, Lord Mayor of London, an opulent mercer,
purchased it, and added greatly to the existing buildings, the work
being subsequently finished by his grandson, Sir Thomas, the father
of Anne.
HEVER CASTLE, KENT.
The latter was born in 1501, and brought up at Hever under a
French governess. After she attracted the notice of the King, her
father was created Viscount Rochford, and Earl of Wiltshire and
Ormond, while Anne was made Marchioness of Pembroke. It was in
the garden at Hever that Henry first saw her, and subsequently his
wooing of that unfortunate queen occurred there. After the execution
of Anne and her brother, the castle went to the Crown and was
settled on Anne of Cleves. In 1557 Sir Edward Waldegrave purchased
it, and it passed to Sir William Humfreys and subsequently to Sir T.
Waldo, whose descendant is the present owner.
The Castle is surrounded by a double moat, fed by the river Eden; it
is a small castellated house of the fifteenth century, the chief feature
being the superb entrance, battlemented and machicoulied, and
containing three portcullis grooves in the main passage. The
buildings completing the rectangle are chiefly of the Elizabethan
period, but have been very extensively restored by the present
owner.
Maxstoke is one of the very few castles which have come down to us
without the expression "dismantled by order of Parliament" being
applied to it. It affords us an idea of the beauty the face of England
would present, so far as magnificent castles are concerned, if the
forces of destruction and revolution had never been let loose upon
our fair isle. It dates from 1346, when William de Clynton, Earl of
Huntingdon, obtained licence to crenellate. The Duke of Buckingham
owned and occupied it in 1444; he was killed at Northampton in
1460, and his son Humphrey, Earl of Stafford, having died of wounds
received at the First Battle of St. Albans in 1455, his grandson Henry
succeeded him but was beheaded without trial at Salisbury in 1483.
Edward Stafford, however, succeeded to the estates in the reign of
Henry VII.; his death by beheading occurred on Tower Hill in 1521.
Maxstoke came to the Crown but was given by Henry VIII. to Sir
William Compton, from whose descendants it was purchased by the
family of Dilke in whose possession it still remains.
MAXSTOKE CASTLE,
WARWICKSHIRE.
The gatehouse is in excellent preservation, the entrance being
flanked by hexagonal towers, while the archway contains the
grooves for the portcullis, and also the old gates themselves, plated
with iron and bearing the arms of the Stafford family. A fine groined
roof is inside the gatehouse, while the battlements have an alur
behind them. The walls of the enceinte and the four towers at the
corners are in good preservation, and show marks of the wooden
buildings formerly erected against them for accommodating the
soldiers. The Chapel and a number of the domestic apartments are
original, dating from the time of Edward III.
Raglan, one of the most imposing ruins in the British Isles, was
erected shortly after 1415 by Sir William ap Thomas, who had
returned rich in honours and also in worldly wealth from many a
stricken field, the last being that of Agincourt. He married the
daughter of Sir David Gam, and commenced the erection of the
magnificent building which combines in such an excellent manner the
characteristics of a mansion and a fortress. If either predominates it
is undoubtedly the warlike portion since, presumably, the builder
could not at once forget his bellicose proclivities. His son was made a
baron by Edward IV. and afterwards Earl of Pembroke, and was
beheaded at Northampton, 1469. The Castle came into the
possession of the Somersets in 1503, the ancestors of the present
Duke of Beaufort. The fifth earl carried out extensive work upon the
pile, but shortly afterwards the demolition of the Castle was ordered
by the parliament. Probably the most striking feature of the Castle is
the detached Keep lying to the left of the main entrance, and called
the Yellow Tower. It is surrounded by a wide and deep moat, and
was undoubtedly a formidable obstacle before being slighted. It
underwent a vigorous siege in 1646, when Sir Thomas Fairfax
assailed it with a large force. The garrison ran short of ammunition,
and, the north wall being breached, a capitulation ensued.
Herstmonceaux Castle.—One of the finest examples of the later
castles is Herstmonceaux, in Sussex, dating from the year 1440. It
has been described as "the most perfect example of the mansion of
a feudal lord in the south of England," and, when visited by Walpole
in 1752, was in a perfect state of preservation; Grose, writing a few
decades later, gives a vivid description of all the principal
apartments, which seem to have suffered but little at that time. Now,
however, when there is some rumour prevailing of an intended
restoration, the building is in ruins,—roofless, ivy-grown, and in
many parts dismantled by the falling-in of roofs and floors. It is built
of the small bricks then in use, two inches or less in thickness; they
were brought to England from Belgium, strange to say the art of
brick-making having apparently been lost since the departure of the
Romans. Belgian workmen were also brought over to erect it.
Sir Roger Fiennes, an Agincourt veteran, was the founder, and
probably the site had borne a previous fortalice. Like Bodiam,
erected some half-century previously, the plan is quadrilateral,
almost square, with four octagonal towers at the corners and three
of pentagonal plan strengthening the curtain walls. The gateway is
one of the finest and most impressive in existence; the towers which
flank it rise over 80 feet in height, cylindrical at the upper parts and
superposed upon 50 feet of octagonal bases, with smaller turrets
rising still higher above them. A magnificent range of machicoulis
with crenellation above protects the towers and the curtain between,
the merlons being pierced with oillets. A moat, long since dry,
encircles the building, a bridge spanning it at the principal entrance.
There are three tiers of cross loopholes, and below occur openings
for matchlocks to defend the bridge. With the exception of the grand
towers of the south gateway and the shells of some adjoining
buildings, there are only broken arches and shattered walls, piers,
and buttresses now to be seen, and it is only by the description left
by Grose and Walpole that the ichnography of the interior can be
traced. Wyatt the architect is responsible for the vandalism
committed, as he dismantled the Castle to furnish material for the
owner's new residence adjacent.
HERSTMONCEAUX CASTLE, SUSSEX.
Although Herstmonceaux has never undergone any struggles in the
"fell arbitrament of war," yet painful memories cling to the ruins.
Thomas Fiennes, the ninth Lord Dacre, succeeded to the estate at
the age of seventeen. The youth had already laid the foundation of a
brilliant career at Court when an escapade, planned by himself and
some madcap companions, whereby they essayed to play the rôle of
poachers upon a neighbouring estate, led to the death of a keeper
whom they encountered. His three companions were arrested and
hanged for murder near Deptford; Dacre was also tried and
condemned, and the sentence was duly executed at Tyburn in 1541,
the young man being twenty-five years old at the time.
Tattershall Castle, on the Witham in Lincolnshire, is contemporary
with Herstmonceaux, and constructed likewise of Flemish brick
bonded with exquisite workmanship. The tower still standing
contains four stories with a total altitude of 112 feet; large Gothic-
headed windows occur filled with Perpendicular tracery, and these
windows are repeated on a smaller scale in the four octagonal
towers which clamp the angles of the building. Massive timber balks
once supported the various floors, and a number of carved chimney-
pieces are to be found. The walls are about 14 feet thick at the base,
and many passages and apartments have been made in their
thickness. The well in the base is covered by a massive arched crypt,
upon which the Castle has been erected. But perhaps the most
notable feature in this beautiful relic of the past is the grand and
markedly-perfect system of machicolation combined with the
bretasche, which is exemplified in the cornice surmounting the tops
of the curtain walls. Upon massive stone corbels is built a substantial
stone wall pierced with square apertures for an all-round fire with
various arms; in the floor of the alur are the openings for dropping
missiles upon assailants at the base of the walls; above this again
are the merlons and embrasures giving upon the battlement walk.
The Castle was erected by Ralph, Lord Cromwell, treasurer to King
Henry V., whose vast wealth sought for an opening in which to
display itself, and probably could not have done so more effectively
than in the rearing of a magnificent pile of buildings of which but a
small portion, the tower described, now remains. In its later years it
suffered a partial dismantling during the Commonwealth period,
followed by a rifling in the eighteenth century similar to that which
overtook the sister castle of Herstmonceaux.
After the middle of the fifteenth century castles were no longer built,
and we have to look to the fortified manor-house such as was
designed by the Lord Cromwell above mentioned at Wingfield,
Derbyshire, or that at Exburgh in Norfolk; these when surrounded by
moats were capable of being placed in a good state of defence, and
many a thrilling tale is told of the sieges they underwent during the
Civil War when the stout resistance they made was nearly or quite
equal to the defence of the massive ramparts and cyclopean bastions
of the earlier castle-builder.
PENSHURST PLACE. KENT.
Penshurst Place.—This was originally an embattled mansion of the
fourteenth century, and gradually expanded by constant additions
into an excellent example of a combined castle and a manorial
dwelling-house. The licence to crenellate is dated the fifteenth year
of Edward III., and stands in the name of Sir John de Pulteneye. This
opulent knight erected a stately mansion in the form of an irregular
square as to plan. It reverted to the Crown in the reign of Henry VI.
and was held by the Duke of Bedford, Regent for a time, and then by
his brother, Humphrey, Duke of Gloucester. The Staffords held it
afterwards, but at the decease of the Duke of Buckingham Edward
VI. gave it to Ralph Fane and then to Sir William Sydney, one of the
heroes of Flodden Field. Its associations with Sir Philip Sydney form
one of its chief claims upon the public. The spacious Hall measures
60 feet in length by the same in height; it is 40 feet wide, and is a
grand example of fourteenth-century architecture. The beautiful
windows reach from the floor to a considerable height, the roof is
open, there is a minstrels' gallery, and an elaborate arrangement for
the fire in the middle of the Hall. Adjacent is a range of buildings
much altered in the Elizabethan period, containing state rooms, the
Queen's drawing-room, etc. Portions of the wall of enceinte are to be
found upon the south and east.
Ightham Mote.—This building is undoubtedly one of the most perfect
examples of the combination of domestic convenience with an
efficient system of defence to be found in England. It stands about
two miles from Ightham village in Kent in a deep hollow, through
which runs a rivulet flowing into the moat surrounding the House,
from which the latter takes its name. Ivo de Haut possessed the
Mote in the reign of Henry II.; it reverted to the Crown for a time in
the reign of Richard III., but was restored to the family, and
subsequently passed through the hands of many owners.
The House appears to be of three distinct periods, Edward II., Henry
VII., and Elizabeth. The Hall is of the first period; it has a slender
stone arch to carry the roof and contains many ancient features;
some of the original shingles, for example, are still in existence,
though a modern roof covers them. Other objects are a Chapel,
original, and the Gateway Tower with the gateway itself and the
doors.
There are many examples in England of the simple manorial hall of
purely domestic type whose owners found it expedient, at some
critical period, to fortify in some manner, and these additions are of
the greatest interest to the antiquarian. Perhaps the best example to
be found is that of Stokesay, near Ludlow, which is a unique
specimen of a small mansion of the thirteenth century subsequently
fortified. The licence is dated 1291, and a stone wall is mentioned;
only a few yards remain of this.
A wide ditch surrounds the area, and a high tower, similar to two
towers joined together, affords the required defence. It is embattled,
the merlons being pierced, while the embrasures have the ancient
shutters still depending. It dates from the end of the thirteenth
century. The Hall stands adjacent and vies with that at Winchester in
being the most perfect example of a thirteenth-century hall
remaining to us. It is about 50 feet long by 30 wide and over 30 feet
in height. The windows are in the E.E. style, and the corbels carrying
the roof are of the same period. The lord's apartment overlooked the
Hall. It has been occupied by the de Says, the Verduns, and ten
generations of the Ludlows, the first of whom built the crenellated
parts. The prompt surrender of the Cavalier garrison to the
Parliamentarian army is no doubt responsible for the fact that no
destruction of the House occurred at that critical time.
The examples given of the Castellated Mansion and fortified Manor-
House are necessarily meagre in number, and many more, such as
Broughton Castle in Oxfordshire, Sudley in Gloucestershire, Wingfield
Manor, Derbyshire; Hilton, Durham; Hampton Court, Hereford;
Whitton, Durham, etc., call for remark if the exigencies of space
permitted.
CHAPTER X
THE CASTLES OF SCOTLAND
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com