Gesture Based Educational Software for Children with Acquired Brain Injuries
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
"GESBI” is gesture based audio visual teaching tool designed to help children with acquired brain injuries, providing hours of entertainment in a play-and-learn environment while ntroducing the foundation skills in basic arithmetic, spelling, reading and solving puzzles. These children communicate with the computer via gestures based on my previous research paper “KONCERN- Hand Gesture Recognition for Physically Impaired” in which gestures are captured by camera and processed without the need of wearing any sensor based gloves etc
Authors and Affiliations
Er. Zainab Pirani , Dr. Mahesh Kolte
NOISE REMOVAL IN COMPOUND IMAGE USING MEDIAN FILTER
Compound image is a combination of text, picture and graphs. Noise reduction in compound image is necessary to maintain the quality of images. Noise is added into an image at the time of image acquisition (or) image capt...
A Framework for the View Selection Problem in Data Warehousing Environment
A set of essential new concepts and tools have evolved into a new technology that makes it possible to access and produce accurate and timely management information for the competitive world. The phrase that has come to...
Reclaiming Individuality of Mysterious Passage
Authorship attribution, the science of inferring characteristics of author from characteristics of documents written by that author become an urgent need to find the original author of anonymous text. In this paper, a no...
Drag and Drop: Influences on the Design of Reusable Software Components
The fundamental unit of large scale software construction is he component. A component is the fundamental user interface object in Java. Everything you see on the display in a java pplication is a component. The abilit...
A Comparative study of Forward Secure Publickey Method Using HIBE and BTE
T h e threat of key exposure becoming more acute as yptographic computations are performed more frequently on poorly protected devices (smart-cards, mobile phones, even PCs), new techniques are needed to deal with this...