Albanian Sign Language (AlbSL) Number Recognition from Both Hand’s Gestures Acquired by Kinect Sensors
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Albanian Sign Language (AlbSL) is relatively new and until now there doesn’t exist a system that is able to recognize Albanian signs by using natural user interfaces (NUI). The aim of this paper is to present a real-time gesture recognition system that is able to automatically recognize number signs for Albanian Sign Language, captured from signer’s both hands. Kinect device is used to obtain data streams. Every pixel generated from Kinect device contains depth data information which is used to construct a depth map. Hands segmentation process is performed by applying a threshold constant to depth map. In order to differentiate signer’s hands a K-means clustering algorithm is applied to partition pixels into two groups corresponding to each signer’s hands. Centroid distance function is calculated in each hand after extracting hand’s contour pixels. Fourier descrip-tors, derived form centroid distance is used as a hand shape representation. For each number gesture there are 15 Fourier descriptors coefficients generated which represent uniquely that gesture. Every input data is compared against training data set by calculating Euclidean distance, using Fourier coefficients. Sign with the lowest Euclidean distance is considered as a match. The system is able to recognize number signs captured from one hand or both hands. When both signer’s hands are used, some of the methodology processes are executed in parallel in order to improve the overall performance. The proposed system achieves an accuracy of 91% and is able to process 55 frames per second.
Authors and Affiliations
Eriglen Gani, Alda Kika
Design of an Efficient Steganography Model using Lifting based DWT and Modified-LSB Method on FPGA
The data transmission with information hiding is a challenging task in today world. To protect the secret data or image from attackers, the steganography techniques are essential. The steganography is a process of hiding...
Prioritizing Road Maintenance Activities using GIS Platform and Vb.net
One of the most important factors for the sustainable development of any country is the quality and efficiency of its transportation system. The principled and accurate maintenance of roads, in addition to having a major...
Studying Data Mining and Data Warehousing with Different E-Learning System
Data Mining and Data Warehousing are two most significant techniques for pattern detection and concentrated data management in present technology. ELearning is one of the most important applications of data mining. The f...
Novel Conception of a Tunable RF MEMS Resonator
This paper presents a new monolithic microwave integrated circuit (MMIC) based on coplanar waveguide (CPW) design for a tunable resonator based on RF MEMS. This RF structure, which can be used for system on chip (SOC), i...
Impact of Anaphora Resolution on Opinion Target Identification
Opinion mining is an interesting area of research because of its wide applications in the decision-making process. Opinion mining aims to extract user’s perception from the text and to create a fast and accurate summary...