Implementation of Security Access Control using American Sign Language Recognition via Deep Learning Approach

Julie Ann B. Susa, Jonel R. Macalisang, Rovenson V. Sevilla, R. S. Evangelista, Allan Q. Quismundo, Mark P. Melegrito, R. Reyes
{"title":"Implementation of Security Access Control using American Sign Language Recognition via Deep Learning Approach","authors":"Julie Ann B. Susa, Jonel R. Macalisang, Rovenson V. Sevilla, R. S. Evangelista, Allan Q. Quismundo, Mark P. Melegrito, R. Reyes","doi":"10.1109/ICETECC56662.2022.10069513","DOIUrl":null,"url":null,"abstract":"Sign language is a kind of conversation that consists of a set of gestures or postures used to converse with the deaf and mute. It is usually accomplished with hands, which implies profound signals, especially when both the receiver and sender are well-versed in the subject. Signals generated by hand gestures can also be used in a variety of applications such as augmented reality (AR), gaming, robotics, and vision-based applications. However, sign language interpretation via computer vision has yet to be implemented as a security access control, which could provide a significantly greater authentication method and better statutory provisions. The trained model’s use as a security access control system was also taken into consideration. It is done by creating a Python-based GUI that takes a single frame from a camera. A layer loss of 2.803 and an mAP of 98.69 % were the final results after 14 epochs. The study shows that when compared to earlier comparable research pursuing the same objective, this study’s validation accuracy is the highest.","PeriodicalId":364463,"journal":{"name":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Emerging Technologies in Electronics, Computing and Communication (ICETECC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETECC56662.2022.10069513","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Sign language is a kind of conversation that consists of a set of gestures or postures used to converse with the deaf and mute. It is usually accomplished with hands, which implies profound signals, especially when both the receiver and sender are well-versed in the subject. Signals generated by hand gestures can also be used in a variety of applications such as augmented reality (AR), gaming, robotics, and vision-based applications. However, sign language interpretation via computer vision has yet to be implemented as a security access control, which could provide a significantly greater authentication method and better statutory provisions. The trained model’s use as a security access control system was also taken into consideration. It is done by creating a Python-based GUI that takes a single frame from a camera. A layer loss of 2.803 and an mAP of 98.69 % were the final results after 14 epochs. The study shows that when compared to earlier comparable research pursuing the same objective, this study’s validation accuracy is the highest.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于深度学习方法的美国手语识别安全访问控制实现
手语是一种对话,由一组手势或姿势组成,用于与聋哑人交谈。它通常是用手完成的,这意味着深刻的信号,特别是当接收者和发送者都精通主题时。手势产生的信号也可以用于各种应用,如增强现实(AR)、游戏、机器人和基于视觉的应用。然而,通过计算机视觉的手语翻译尚未作为安全访问控制实施,这可以提供更大的认证方法和更好的法律规定。还考虑了训练后的模型作为安全访问控制系统的应用。它是通过创建一个基于python的GUI来完成的,该GUI从相机中获取单个帧。14期后的最终失层率为2.803,mAP为98.69%。研究表明,与早期追求相同目标的可比研究相比,本研究的验证精度最高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
CROPBot: Customized Rigid Organic Plantation Robot Sentiment Analysis on Hydroponic Technology Application for Urban Farming Limitations Multi-Active Multi-Datacenter Distributed Database Architecture Design based-on Secondary Development Zookeeper Assessing Security threats Perception of LayeredInternet of Things using Multiple Linear Regression Model Performance Comparison of Outer and Inner Rotor Flux Reversal Machine for Direct Drive Application
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1