Quantitative evaluation of Segmentation algorithms based on level set method for ISL datasets
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
The enormous potential research efforts have been taken for sophisticated and natural human computer interaction using gestures. This work has got motivated from long ago as 1980’s since sign language is the only communicate mode for deaf community people. In signing, the face and a hand of a signer often overlap, thus the system needs to segment these for the purpose of feature extraction. This research work concentrates with the separation of the face and hand by detecting contour of the static object using reference labels and different snake algorithms. Indian sign language dataset is used to evaluate a few level set computer vision algorithms. Specifically different feature sets, segmentation algorithms and color constancy algorithms are evaluated quantitatively. In future, it is possible to evaluate the accuracy of sign on a large scale due to the availability of large annotated databases.
Authors and Affiliations
Ms. M. Krishnaveni , Dr. V. Radha
A Study on Enhancement of Loadability of Large-Scale Emerging Power Systems by Using FACTS Controllers
This study presents comprehensive review of various ethods/techniques for incorporation of differential algebraic equations (DAE) model of FACTS controllers and different type of loads such as a static, dynamic, and com...
Adaptive Enhancement of routing protocol under CBR and TCP traffic source
The main objective of this article is to study and enhance on demand routing protocol under different traffic consideration so that our proposed routing protocol give an better result then other reactive and proactive ro...
WWDC SERVER SOFTWARE INVENTORY MANAGEMENT AND AUTOMATION
Many organizations maintain a large Data Centre for its business operation. In that different administration team works on large set of servers and performs several tasks on need basis. It’s too complicate to handle this...
Symmetric-key Inter-domain end-to-end Authentication Protocols for Mobile System
Our goal is to propose and design a symmetric-key interdomain end-to-end authentication protocols for a mobile system. We will be considering three mobile service domains; each has an authentication server. We denote by...
Study and Constructing RDF model for a well formatted Valid XML document
In recent years semantic web is one of the technologies to make the WWW as machineunderstandable. The Resource Description Framework (RDF) proposed by W3C is used for describing metadata about (Web) resources. The RDF da...