Virtual Mouse Using Hand Gesture Recognition
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 7
Abstract
As the computer technology is growing up, the importance of human computer interaction is rapidly increasing. Most devices use touch screen technology which cannot be affordable to all the applications. A virtual human computer interactive module such as virtual mouse, can be an alternative way for the traditional touch screen. The objective is to create an hand tracking application to interact with system, and develop a virtual human computer interaction module. This module can be used for creating an interface between computer and human using hand gestures. This module is expected to gain abundance of attention because of its applications for human machine interface and its most futuristic design.
Authors and Affiliations
Kishore Prabahar
Wireless Library Record System Using RFID Card
In this project we tend to demonstrate the concept of advance wireless library system with the assistance of touch panel and RFID card. In this project we demonstrate the utilization of RFID card to create the library r...
A Review on Water Absorption, Porosity and Sorptivity of Cement Mortar made with Copper Slag and Green Sand as Partial Replacement of Fine Aggregate.
Sustainability and resource efficiency are becoming increasing important issues within today’s construction industry. The possibility of substituting natural fine aggregate with industrial by-products such as copper sla...
Computer Network Topology
In recent day’s demands of high productivity, security of computer systems and computer networks is very important and popular issue. Communication network in a distributed computing environment, which is arranged in a...
Secure Data Deduplication in Cloud
Secure deduplication is a system for discarding duplicate copies of limit data, and offers security to them. To lessening storage space and exchange information move limit in circulated stockpiling deduplication has bee...
Achieving Anonymity with Fully Anonymous Attribute-Based Encryption and Controlling Access Privilege in Cloud
Cloud computing could be a revolutionary computing paradigm, that allows versatile, on-demand, and inexpensive usage of computing resources, however the info is outsourced to some cloud servers, and varied privacy consi...