BYOD with Multi-Factor Authentication
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.104-107, Jun-2015
Abstract
Data is currency in today’s world. Security teams are now tasked with protecting the brand and intellectual property through the protection of the second-most important asset of a company: data (the first one being people). There are two approaches here. The first is to label – or classify – information so users know if they can place it in the cloud or not. The second is to look at how IT provision can be changed to make security less burdensome. As tablets and smartphones become the primary work computing device, offering easy access to the cloud, users will be less tolerant of VPN, multiple logins etc. Smaller organizations typically rely on services such as iCloud. For these businesses, it would make sense to implement additional security measures provided such as two-factor authentication. In this paper I have highlighted the options which can be useful in the two-factor authentication.
Key-Words / Index Term
SLA. QoS, RBAC, IDM, OTP
References
[1] www.wikipedia.com
[2] www.techgig.com
[3] www.webopedia.com
[4] “Security and Privacy Challenges in Cloud Computing Environments”; IEEE security & privacy nov/dec 2010.
[5] “Information Assurance Framework”;2010
[6] Lee and Sill ;“A Design Space for dynamic service level agreements in Openstack”; Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:17
[7] Kuyoro S. O., Ibikunle F., Awodele O.;“Cloud Computing Security Issues and Challenges”;International Journal of Computer Networks (IJCN), Volume (3) : Issue (5) : 2011.
[8] Surabhi Shukla and Dharamjeet Singh;”Cloud’s Software-Security as a Service(S-SaaS) via Biometrics”; IJCSE, Volume (2): Issue (3):2014.
[9] Surabhi Shukla;”Public Cloud Security Challenges and Solutions”; IJSER, Volume (3): Issue (4): April 2015.
Citation
Surabhi Shukla and Neelam Joshi, "BYOD with Multi-Factor Authentication," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.104-107, 2015.
Data Document Image Binarization for Preserving Historical: A Review
Review Paper | Journal Paper
Vol.3 , Issue.6 , pp.108-112, Jun-2015
Abstract
The basic requirement of physical document analysis system is to digitalize the physical document. Recently number of researcher presented numerous techniques that can vary in sensitivity, quality and some more control parameters. Document binarization plays an important role in preserving the historical documents. The document image binarization focuses on extracting the text and background of the image. In doing this the edge detection approach also play the crucial role. This paper presents general review on the various approaches of document binarization. Various edge detection approaches are also been discussed. In addition various available data sets for image binarization developed in Document Image Binarization Contest (DIBCO) 2009 and Handwritten Document Image Binarization Competition (H-DIBCO) 2011 has also discussed.
Key-Words / Index Term
Document Digitization, Edge Detection, Gaussian Filter
References
[1] Reza Farrahi Moghaddamn, Mohamed Cheriet “AdOtsu: An adaptive and parameterless generalization of Otsu’s method for document image binarization”, Elsevier transaction of Pattern Recognition,2012, pg no- 2419–2431.
[2] B. Gatos, K. Ntirogiannis, I. Pratikakis, ICDAR 2009 document image binarization contest (DIBCO 2009), ICDAR’09,2009, pp. 1375–1382.
[3] Pratikakis, I., Gatos, B., Ntirogiannis, K.: ICDAR 2011 document image binarization contest (DIBCO 2011), International Conference on Document Analysis and Recognition,2011, pp. 1506–1510.
[4] M. Sezgin, B. Sankur, “Survey over image thresholding techniques and quantitative performance evaluation”, Journal of Electronic Imaging 13 (1),2004, pp.146–168.
[5] R. Farrahi Moghaddam, M. Cheriet, “A multi-scale framework for adaptive binarization of degraded document images”, Pattern Recognition 43 (6),2010, pp. 2186–2198.
[6] B. Gatos, I. Pratikakis, S.J. Perantonis, “Adaptive degraded document image Binarization”, Pattern Recognition 39 (3),2006, pp. 317–327.
[7] B. Gatos, K. Ntirogiannis, I. Pratikakis, DIBCO 2009: document image binarization contest, International Journal on Document Analysis and Recognition, 2010,pp. 1-10.
[8] J. Fabrizio, B. Marcotegui, M. Cord, “Text segmentation in natural scenes using toggle-mapping”, ICIP’09, 2009, pp. 2373–2376.
[9] B. Gatos, K. Ntirogiannis, I. Pratikakis, ICDAR 2009 document image binarization contest (DIBCO 2009), in: ICDAR’09,2009, pp. 1375–1382.
[10] R. Hedjam, R. Farrahi Moghaddam, M. Cheriet, “A spatially adaptive statistical method for the binarization of historical manuscripts and degraded document images”, Pattern Recognition 44 (9),2011, pp.2184–2196.
[11] B. Su, S. Lu, C.L. Tan, “A self-training learning document binarization frame work”, ICPR’10,2010, pp. 3187–3190.
Citation
Bharti Bansinge and R.K.Pateriya, "Data Document Image Binarization for Preserving Historical: A Review," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.108-112, 2015.
Performance Analysis of Hadoop with Pseudo-Distributed Mode on Different Machines
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.113-117, Jun-2015
Abstract
Data cannot be managed by the traditional database management systems when it comes in a large amount. So there comes the Big Data. Hadoop and MapReduce are the solution to handle, manage and analyze Big Data. Hadoop is an open source implementation of MapReduce programming paradigm which is a parallel distributed programming model for handling large data intensive applications. In this paper, we present our experimental work done on Hadoop with pseudo-distributed mode on different machines and analyze the time taken by Hadoop to perform the same operations on different machines.
Key-Words / Index Term
Big Data; Hadoop; MapReduce; Pseudo-distributed Mode; Distributed Programming
References
[1] Xuelian Lin, Zide Meng, Chuan Xu, Meng Wang,”A Pratical Performance Model for Hadoop MapReduce”, in proc. Of the 2012 IEEE International Conference on Cluster Computing Workshops,ISBN: 978-1-4673-2893-7,Page No (231-239), Sept 24-28,2012.
[2] M. Maurya, S. Mahajan,”Performance Analysis of MapReduce Programs on Hadoop Cluster”, in proc. of 2012 World Congress on Information and Communication Technologies, ISBN:978-1-4673-4806-5,Page No (505-510), Oct 30-Nov 2,2012.
[3] M. Ishii, Jungkyu Han, H. Mankino,”Design and Performance Evaluation for Hadoop Clusters on Virtualized Environment”, in proc. of 2103 International Conference on Information Networking, E-ISBN:978-1-4673-5741-8, Page No (244-249), Jan 28-30,2013.
[4] Han Jungkyu, M. Ishii, H. Makino,”A Hadoop Performance Model For Multi-Rack Clusters”,in proc. of 2013 5th International Conference on Computer Science and Information Technology, Page No (265-274), Mar 27-27,2013.
[5] Zhuoyao Zhang, Ludmila Cherksova, Boon Thau Loo,”Performance Modeling od MapReduce Jobs in Heterogeneous Cloud Environments”, in proc. of the 2013 IEEE Sixth International Conference on Cloud Computing, ISBN: 978-0-7695-5028-2, Page No (839-846), June 28- July 3,2013.
[6] J. Nandimath, E. Banerjee, A.Patil, P. Kakade, “Big Data Analysis using Apache Hadoop”, in proc. of 2013 IEEE 14th International Conference on Information Reuse and Intergration, Page No (700-703), Aug 14-16,2013.
[7] A. Pal, K.Jain, P.Agarwal,S.Agarwal, “A Performance Analysis of MapReduce Task With Large Number of Files Dataset in Big Data Using Hadoop”, in proc. of 2014 Fourth International Conference on Communication Systems and Network Technologies, ISBN: 978-1-4799-3069-2, Page No (587-591), Apr 07-09,2014.
[8] Invanilton Polato, Reginaldo Re, Alfredo Goldman, Fabio Kon, “A Comprehensive view of Hadoop Research- A Systematic Literature Review”, Elsevier- Journal of Network and Computer Applications,Volume-46,Page No (1-25), Aug 2014.
[9] Chia-Wei Lee, Kuang-Yu Hsieh Sun-Yuan Hsieh , Hung-Chang Hsiao,”A Dynamic Data Placement Strategy for Hadoop in Heterogeneous Environments ”, Elsevier-Big Data Research, Volume-1, Page No (14-22), Aug 2014.
[10] D. Dev, R. Patgiri, “Performance Evaluation of HDFS in Big Data Management”, in proc. of 2014 International Conference on High Performance Computing and Applications,ISBN: 978-1-4799-5957-0, Page No (1-7), Dec 22-24,2014.
[11] M.F. Hyder, M.A. Ismail, H. Ahmed, “Performance Comparison of Hadoop Clusters Configured on Virtual Machines and as a Cloud Service”, in proc. of 2014 International Conference on International Technologies,ISBN: 978-1-4799-6088-0, Page No (60-64), Dec 8-9,2014.
[12] Hadoop Tutorial [online]. Available: https:// hadoop.apache.org
Citation
Ruchi Mittal and Ruhi Bagga, "Performance Analysis of Hadoop with Pseudo-Distributed Mode on Different Machines," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.113-117, 2015.
HTTP service based Network Intrusion Detection System in Cloud Computing
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.118-123, Jun-2015
Abstract
Recently, the usages of Cloud Computing are increasing rapidly and gained tremendous success over the internet. Therefore, security is the major challenge in Cloud computing and one of the major issues is to protect the Cloud resources and the services against network intrusions. So Network Intrusion Detection System (NIDS) are installed in the Cloud networks to detect the intrusions in the system. In this paper we proposed an NIDS based on Naïve Bayes Classifier to be implemented in Cloud. The main aim of the NIDS is to improve the performance by preparing the training dataset which can detect the malicious connections that exploit the Cloud HTTP services. In the training phase, the Naïve Bayes Classifiers select the important Network traffic that can be used to detect the attacks. In the testing and execution phases the proposed IDS using the Naïve Bayes Classifier classifies the services based on the selected features into normal or attacks. The proposed IDS carried out on NSL-KDD’99 dataset and results in high detection with low false alarm as compared with other similar IDS.
Key-Words / Index Term
Cloud Computing; Cloud security;Network based Intrusion Detection System; Naïve Bayes Classifier
References
[1] Dewan F, Mohammad R, Chowdhury R. “Adaptive intrusion detection based on boosting and Naive Bayesian classifier”, International Journal of Computer Application 2011;24(3):12–9.
[2] Yang L. “The research of Bayesian classifier algorithms in intrusion detection system”, IEEE international conference on E-Business and E-Government, ICEE 2010. Guangzhou, China; May 2010. pp. 2174–8.
[3] Hari O, Aritra K. “A hybrid system for reducing the false alarm rate of anomaly intrusion detection system”, IEEE international conference on recent advances in information technology, RAIT 2012. Dhanbad, India; March 2012. pp. 131–6.
[4] Alexander T, Aleksey P, So Grigory. “Efficient computer network anomaly detection by change point detection methods”. IEEE J Sel Top Signal Process 2013,7(1):4–11.
[5] Sumaiya T, Aswani C. “An analysis of supervised tree based classifiers for intrusion detection system”, IEEE proceedings of the international conference on pattern recognition, informatics and mobile engineering, PRIME 2013. Salem, India; February 2013. pp. 294–9.
[6] Chirag M, Dhiren P.” Bayesian classifier and snort based network intrusion detection system in cloud computing”, The third IEEE international conference on computing communication & networking technologies, ICCCNT 2012. Coimbatore, India; July 2012. pp. 1–7.
[7] S. Roschke, C. Feng and C. Meinel,” An Extensible and Virtualization Compartible IDS Management Architecture,” Fifth International Conference on information Assurance and Security, vol, 2,2009, pp. 130-134.
[8] Wafa .AL-Sarafat, and Reyadh Naoum” Development of Genetic –based Machine Learning for Network Intrusion Detection “World Academy of Science, Engineering and Technology 55,2009.
[9] D. Nurmi, R. Wolski, C.Grzegorczyk, G. Obertelli, S. Soman, L. Youseff and D. Zagordnov. (2008) “Eucalyptus: A Technical Report on an Elastric Utility Computing Architecture Linking Your Programs to Useful Systems”, UCSB Computer Science Technical Report Number 2008-10.
[10] Nabil A, Soroush H, Ljiljana T. “Feature selection for classification of BGP anomalies using Bayesian models”, Proceedings of the international conference on machine learning and cybernetics. ICMLC 2012. Xian, Shaanxi, China; July 2012. pp. 140–7.
[11] Peng H, Fulmi L, Ding C. “Feature selection based on mutual information criteria of max-dependency, max-relevance, and minredundancy”, IEEE Trans Pattern Anal Mach Intell 2005;27(8):1226–38.
[12] Chandrasekhar M, Raghuveer K. Intrusion detection technique by using k-means, fuzzy neural network and SVM classifiers. In: IEEE international conference on computer communication and informatics. Coimbatore, India; January 2013. pp. 1–7.
[13] Mohamed M. Abd-Eldayem, “A proposed HTTP service based IDS”, Egyptian Informatics Journal (2014) 15, 13–24.
[14] The NSL-KDD data set http://nsl.cs.unb.ca/NSL-KDD/.
Citation
Sudhansu Ranjan Lenka and Bikram Keshari Rath , "HTTP service based Network Intrusion Detection System in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.118-123, 2015.
Analysis of Present Transport System of Aurangabad City Using Geographic Information System
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.124-128, Jun-2015
Abstract
The quality of life of the citizens is highly relies on the efficiency and effectiveness of its transportation system. The main goal of transportation is to get easy access to each and every location in the city. Effective transportation system helps to reduce time consumption as well as pollution at some extent. This paper presents an analysis of the Aurangabad city transportation system, role of Geographic Information System in transportation, pitfalls in the existing system and discuss different techniques for network analysis. It will show us clear picture where we need to focus to make Aurangabad as a smart city.
Key-Words / Index Term
Geographical Information System (GIS), Transportation, Smart City
References
[1] Khaja Fareeduddin, “Urban Transportation Planning, Challenges And Policy Initiatives Ways For Hyderabad City – A GIS Approach”, International Journal of Environmental Research and Development, Vol. 04, No. 04, page no. 309-316, 2014.
[2] Praveen Kumar, Varun Singh, Dhanunjaya Reddy, “Advanced Traveler Information System for Hyderabad City”, IEEE Transactions on Intelligent Transportation Systems, Vol. 06, No. 01, 2005.
[3] Pallavi U. Pandagale, “Geospatial Technology for Tourism Management in Aurangabad City”, International Journal of Computer Applications, Vol. 102, No.16, 2014.
[4] Ajay D. Nagne, Amol D. Vibhute, Bharti W.Gawali, Suresh C. Mehrotra, “Spatial Analysis of Transportation Network for Town Planning of Aurangabad City by using Geographic Information System”, International Journal of Scientific & Engineering Research, Vol. 04, Issue 07, 2013.
[5] http://www.aurangabadinfotainment.com/city_map_with_district.php, [Accessed on 20 June 2015].
[6] Trinh Tu Anh and Yordphol Tanaboriboon, “Analyzing Of Bus Service In Hanoi, Vietnam”, Proceedings of the Eastern Asia Society for Transportation Studies, Vol. 05, page no. 352 – 362, 2005.
[7] R. A. Ganorkar, P.I.Rode and Ashtashil V. Bhambulkar, “Application of GIS In Transportation Engineering”, International Journal of Engineering, Vol. 03, Issue 02, page no. 540-542, 2013.
[8] Joana Maria Seguí Pons, Maurici Ruiz Pérez, “Geographic Information Systems And Intelligent Transport Systems : Technologies Used to Form New Communication Networks”, Networks and Communication Studies NETCOM, vol. 17, page no. 53-70, 2003.
[9] GIS for Transportation Infrastructure Management, www.esri.com/library/brochures/pdfs/transportationinfrastructure.pdf, [Accessed on 23 June 2015].
[10] Olowosegun Adebola and Okoko Enosko, “Analysis of Bus stops locations using Geographic Information System in Ibadan North L.G.A Nigeria”, Industrial Engineering Letters, Vol 02, No.03, 2012.
[11] Pal Sarvjeet and Singh Varun, “GIS Based Transit Information System for Metropolitan Cities in India”, Geospatial World Forum, page no. 18-21, 2011.
[12] http://www.citypopulation.de/php/indiamaharashtra.php?adm2id=2719 [Accessed on 20 June 2015].
[13] Andy Johnson, “Bus Transit and Land Use:Illuminating the Interaction”, Journal of Public Transportation, Vol. 06, No. 04, 2003.
[14] Russ Johnson, “GIS Technology for Disasters and Emergency Management”, An ESRI White Paper, 2000.
[15] Christos Chalkias, Katia Lasaridi, “A GIS based model for the optimization of municipal solid waste collection: the case study of Nikea, Athens, Greece”, WSEAS Transactions on Environment & Development, Issue 10, Vol. 05, 2009.
[16] Gilbert Laporte, “The Vehicle Routing Problem: An overview of exact and approximate algorithms”, European Journal of Operational Research, Vol. 59 , page no. 345-358, 1992.
[17] G.H. Dastghaibifard, E. Ansari, S.M. Sheykhalishahi, A. Bavandpouri, E. Ashoor, “A Parallel Branch and Bound Algorithm for Vehicle Routing Problem”, Proceedings of the International MultiConference of Engineers and Computer Scientists, Vol 02, page no. 19-21, 2008.
[18] Jean-François Cordeau, Gilbert Laporte, Martin W.P. Savelsbergh , Daniele Vigo , “Vehicle Routing”, Handbook in OR & MS , Elsevier, Vol. 14, 2007.
[19] Sang Gu Lee, Mark Hickman, and Daoqin Tong, “Development of a temporal and spatial linkage between transit demand and landuse patterns”, The Journal of Transport and Land Use, vol.06 no.02, page no 33–46, 2013.
[20] Musara Chipumuro, Romeo Mawonike and Tendai Makoni “Optimizing Routing Of Residential Solid Waste Collection: Case Study Of Chikova Residential Area In Zimbabwe”, International Research Journal Of Mathematics, Engineering & IT, Vol. -01, Issue-03, 2014.
[21] EunSu Lee, Alan D. Dybing and Sumadhur Shakya, “Facility Location Problem of Beverage Distribution Considering Time Window and Land Use Plan Using GIS, vol 01, page no. 55-69, 2015.
[22] Suresh Nanda Kumar, Ramasamy Panneerselvam, “A Survey on the Vehicle Routing Problem and Its Variants”, Intelligent Information Management, vol. 04, page no. 66-74, 2012.
[23] Danhuai Guo, Ziqi Zhao, Wei Xu, Jinsong Lan, Tao Zhang, Shuguang Liu, Jianhui Li and Yuanchun Zhou, “How to Find a Comfortable Bus Route - Towards Personalized Information Recommendation Services”, Data Science Journal, 14: 14, page no. 1-11, 2015.
[24] Ajay D. Nagne, Dr. Bharti W.Gawali, “Transportation Network Analysis By Using Remote Sensing & GIS A Review”, Vol. 03, Issue 03, page no. 070-076, 2013.
[25] Mukti Advani, B.Srirama, S.K.Pathan, “Improvement In Transit Service Using GIS – Case Study Of Bhavnagar State Transport Depot”, Proceedings ESRI National Conference held at Noida, India, 2005.
Citation
Dhananjay B. Nalawade, Sumedh D. Kashid , Rajesh K. Dhumal, Ajay D. Nagne, Karbhari V. Kale, "Analysis of Present Transport System of Aurangabad City Using Geographic Information System," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.124-128, 2015.
Hand Gesture Recognition for Nepali Sign Language Using Shape Information
Research Paper | Journal Paper
Vol.3 , Issue.6 , pp.129-135, Jun-2015
Abstract
With the advance of technology the use of human computer interaction (HCI) has improved day by day. Computer vision plays an important role to provide information to design more simple and efficient approaches for HCI. The proposed approach uses skin color model to identify the hand from the image, and further preprocessing is done in order to remove unwanted noise and areas. Blob analysis is done in-order to extract the hand gesture from the image considering that the largest blob is the hand. Then the blob is resized into a standard size in order to eliminate size variant constraint. Sampling of the boundary line of the hand gesture is done by overlapping grid lines and extracting the point of intersection of the grid line and the boundary. Freeman chain code is used to represent the boundary of the hand gesture. In order to minimize the length of chain code run-length encoding is done. Finding the first difference of the chain code its shape number is obtained. Shape number can be used to identify each of the gesture uniquely.
Key-Words / Index Term
Human Computer Interaction, Computer Vision, Static Gesture, Nepali Sign Language, Blob, Freeman Chain Code, Shape Number
References
[1] A. Kirillov, “Hand Gesture Recognition”, 2008. [available online: http://www.codeproject.com/Articles/26280/Hands-Gesture-RecognitionDate: 9/9/2014]
[2] A. Shamaie, A. Sutherland, “Accurate Recognition of Large Number of Hand Gesture”, Machine Vision Group, Centre for Digital Video Processing School of Computer Applications, Dublin City University, Dublin 9, Ireland, 2003.
[3] A. Malima, E. Ozgur and M. Cetin, “A Fast Algorithm for Vision Based Hand Gesture Recognition for Robot control”, IEEE 14th on Signal Processing and Communications Applications, pp.1-4, 2006.
[4] Acharya K., Sharma D., “Nepali Sign Language Dictionary”, Nepal Federation of Deaf & Hard of Hearing (NFDH), Nepali Sign Dictionary , pp.209, 2003.
[5] C Manresa, J Varona, R Mas, FJ Perales”, Real–Time Hand Tracking and Gesture Recognition for Human-Computer Interaction”, Electronic Letters on Computer Vision and Image Analysis, pp. 96-104,2005.
[6] Carl A. Pickering, Keith J. Burnham, Michael J. Richardson, “A Research Study of Hand Gesture Recognition Technologies and Applications for Human Vehicle Interaction”, Automotive Electronics, 3rd Institution of Engineering and Technology Conference,pp.1-15,2007.
[7] Elena Sánchez-Nielsen, Luis Antón-Canalís, Mario Hernández-Tejera, “Hand Gesture Recognition for Human-Machine Interaction”, Journal of WSCG, pp.1-8, 2003.
[8] E. Stergiopoulou, N. Papamarkos, “Hand Gesture Recognition Using a Neural Network Shape Fitting Technique”, Engineering Applications of Artificial Intelligence archive, pp.1141-1158, 2009.
[9] Harshith. C, Karthik. R. Shastry, ManojRavindran, M.V.V.N.S Srikanth, Naveen Lakshmikhanth,“ Survey On Various Gesture Recognition Techniques for Interfacing Machines Based On Ambient Intelligence”, IJCSES, pp. 31-42, 2010.
[10] He, Guan-Feng, Sun-Kyung Kang, Won-Chang Song, and Sung-Tae Jung. "Real-time gesture recognition using 3D depth camera", IEEE 2nd International Conference on In Software Engineering and Service Science (ICSESS), pp. 187-190,2011.
[11] HervéLahamy and Derek Litchi, “Real-Time Hand Gesture Recognition Using Range Cameras”, In Proceedings of the Canadian Geomatics Conference, Calgary, Canada ,pp.1-6,2010.
[12] I. Sterinberg, T. M. London and D.D Castro, “Hand Gesture Recognition in Images and Video”, Center For Communication And Information Technologies, pp 1-20, 2010.
[13] J. Rekha, J. Bhattacharya, and S. Majumder. "Shape, texture and local movement hand gesture features for indian sign language recognition”, 3rd International Conference on Trendz in Information Sciences and Computing (TISC), pp. 30-35, 2011.
[14] James MacLeant, Rainer Herperst, Caroline Pantofaru, Laura Wood, KonstantinosDerpanis, Doug Topalovic, John Tsotsos, “Fast Hand Gesture Recognition for Real-Time Teleconferencing Applications”, IEEE ICCV Proceedings In Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, pp. 133-140, 2001.
[15] J. Macheant, R. Herperst, C. Pantofaru, L. Wood, K. Derpanis, D. Topalovic, J. Tosotsos, “Fast Hand Gesture Recognition for Real-Time Teleconferencing Application”, IEEE ICCV Proceedings In Recognition, Analysis, and Tracking of Faces and Gestures in Real-Time Systems, pp.133-140, 2001.
[16] JukkaIivarinen and Ari Visa, “Shape recognition of irregular objects”, In Photonics East'96, International Society for Optics and Photonics, pp. 25-32, 1996.
[17] L. Bretzer, I. Laptev and T. Lindeberg, “Hand Gesture Using Multi-Scale Colour Features, Hierarchical Models and Particle filtering”, Fifth IEEE international conference proceedings on In Automatic face and gesture recognition, pp.423-428, 2002.
[18] M. H. Yang and N. Ahuja, “Recognizing Hand Gesture using Motion Trajectories”, In Face Detection and Gesture Recognition for Human-Computer Interaction, Springer US, pp.53-81, 2001.
[19] M. Tang, “Recognizing Hand Gesture with Microsoft’s Kinect”, Department of Electrical Engineering, Stanford University, pp.1-12, 2011.
[20] P. Garg, N. Aggarwal and S. Sofat, “Vision Based Hand Gesture Recognition”, World Academy of Science, Engineering and Technology,pp.972-977,2009.
[21] P.N.V.S Gowtham, “An Interactive Hand Gesture Recognition System on the Beagle Board”, International Journal of Information and Education Technology (IACSIT), pp.36-42, 2012.
[22] Q. Chen, N. D. Gerorganas, E. M. Petriu, “Real-Time Vision Based Hand Gesture Recognition Using Haar-Like Features”, IEEE In Instrumentation and Measurement Technology Conference Proceedings (IMTC), pp.1-6, 2007.
[23] S. Marcel, O. Bernier, J. E. Viallet and D. Collobert, “Hand Gesture Recognition using Input-Output Hidden Markov Models”, In10th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), pp.456-456, 2000.
[24] Thomas Coogan, George Awad, Junwei Han, Alistair Sutherland, “Real Time Hand Gesture Recognition Including Hand Segmentation and Tracking”, Advances in Visual Computing, pp.495-504, 2006.
[25] W.T Freeman and M.Roth, “Orientation Histograms for Hand Gesture Recognition”, In International workshop on automatic face and gesture recognition, pp.296-301, 1995.
[26] X. Zabulist, H. Baltzakist, A. Argyrosit, “Vision-Based Hand Gesture Recognition for Human Computer Interaction”, The Universal Access Handbook. LEA, pp.1-56, 2006.
[27] Y.Fang, K.Wang, J.Cheng and H.Lu, “A real-time hand gesture recognition method”, IEEE International Conference in Multimedia and Expo, pp.995-998, 2007.
Citation
Jhuma Sunuwar and Ratika Pradhan, "Hand Gesture Recognition for Nepali Sign Language Using Shape Information," International Journal of Computer Sciences and Engineering, Vol.3, Issue.6, pp.129-135, 2015.