Hand Gesture Recognition Using Operating System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 3
Abstract
Gestures are important for communicating information among the human. Nowadays new technologies of Human Computer Interaction (HCI) are being developed to deliver user's command to the robots. Users can interact with machines through hand, head, facial expressions, voice and touch. The objective of this paper is to use one of the important modes of interaction i.e. hand gestures to control the robot or for offices and household applications. Hand gesture detection algorithms are based on various machine learning methods such as neural networks, support vector machine, and Adaptive Boosting. Among these methods, Adaptive Boost based hand-pose detectors are trained with a reduced Haar-like featureset to make the detector robust. Today in the information age computer has become a integral part of every body’s life. We use a computer to hear songs, read something, accessing information from the internet. We use computer everywhere. the computer and information age is not hardware independent. It cannot be accessed by cameras i.e using the system. Everything has to be told to it by using keyboard and mouse which makes the information access part a tedious one and a lot of time is wasted on just telling it how a information can be retrieved if it is retrieved daily which it tiresome and boring. Today hand gestures or any gesture used in information access can make a system intelligent enough to perform the task given to it by just a gesture and not by using keyboard and mouse.
Authors and Affiliations
Mr. Anap Avinash, Bhalerao Sushmita, Lambrud Aishwarya, Shelke Priyanka
Improving Efficiency in Image Encryption Then Compression System
As the use of digital techniques for transferring and storing images are increasing, it leads to an major issue that how to protect the security of images and also to reduce the size of the images to avoid the traffic i...
Evaluating Code Clone Techniques
In the last decade, several researchers have investigated techniques to detect duplicated code in programs exceeding hundreds of thousands lines of code. All of these techniques have known merits and deficiencies, but a...
Image Based Face Detection Using Probabilistic Neural Network
This paper presents an image based face detection using probabilistic neural network. The purpose is to localize and extract the face region from the background that will be fed into the face recognition system for iden...
Interlocking Brick DesignParadigm for Sustainable Construction
Recent change in mode of construction industry can be make out with the increasing demand of cement , cement mix product like concrete and clay bricks. All this increased demands for material is result of growth in worl...
Comparison of Handoff Using Mobile WiMAX
The next-generation Wireless Metropolitan Area Networks, using the Worldwide Interoperability for Microwave Access (WiMAX) as the core technology based on the IEEE 802.16 family of standards, is evolving as a Fourth-Gen...