Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038114
R. Sharma, Asok De
All Classical cryptographic methods used in our life based on mathematical ideas & computational assumption are actually unsafe, so quantum cryptography is proposed nowadays Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks. Firstly, In this paper At quantum key distribution protocol process is introduced. Secondly, several improvements to the basic steps of two references are reviewed because of its defects, mainly about identity authentication in order to prevent communication partners' counterfeit, including errors removing, estimating Attacker's information, secrecy enhancement, etc. At last, based upon original improvements reserved selectively, the whole process of quantum key distribution protocol after improvement & then comparison is introduced in detail.
{"title":"A new secure model for quantum key distribution protocol","authors":"R. Sharma, Asok De","doi":"10.1109/ICIINFS.2011.6038114","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038114","url":null,"abstract":"All Classical cryptographic methods used in our life based on mathematical ideas & computational assumption are actually unsafe, so quantum cryptography is proposed nowadays Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks. Firstly, In this paper At quantum key distribution protocol process is introduced. Secondly, several improvements to the basic steps of two references are reviewed because of its defects, mainly about identity authentication in order to prevent communication partners' counterfeit, including errors removing, estimating Attacker's information, secrecy enhancement, etc. At last, based upon original improvements reserved selectively, the whole process of quantum key distribution protocol after improvement & then comparison is introduced in detail.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038122
S. Krithiga, N. A. Gounden
A PIC microcontroller based closed loop speed control scheme has been developed for the speed control of a separately excited DC motor fed from PV array. An IGBT based boost converter is used as an interface between PV array and the DC motor. The microcontroller has been programmed to automatically vary the duty cycle of the boost converter depending upon the set/required speed of the motor. The DC motor model has been developed and the complete simulink model of the proposed scheme has been built using MATLAB/PSB. Simulation studies and experimental investigations have been carried out on a laboratory size prototype separately excited DC motor fed from a PV array and the results are presented. The comparison of experimental and simulation results shows very close agreement between the two thus validating the controller proposed.
{"title":"A microcontroller based power electronic controller for PV assisted DC motor control","authors":"S. Krithiga, N. A. Gounden","doi":"10.1109/ICIINFS.2011.6038122","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038122","url":null,"abstract":"A PIC microcontroller based closed loop speed control scheme has been developed for the speed control of a separately excited DC motor fed from PV array. An IGBT based boost converter is used as an interface between PV array and the DC motor. The microcontroller has been programmed to automatically vary the duty cycle of the boost converter depending upon the set/required speed of the motor. The DC motor model has been developed and the complete simulink model of the proposed scheme has been built using MATLAB/PSB. Simulation studies and experimental investigations have been carried out on a laboratory size prototype separately excited DC motor fed from a PV array and the results are presented. The comparison of experimental and simulation results shows very close agreement between the two thus validating the controller proposed.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116865092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038115
M. B. Dissanayake, S. Worrall, W. Fernando
The paper presents a novel error robustness method for H.264/AVC video data, based on the redundant data encoding concept. The proposed redundant data codec incorporates the Wyner-Ziv (WZ) theory and motion vectors (MV) of the H.264/AVC scheme. The performance of the proposed method is evaluated under both error free and error prone Internet Protocol (IP) Packet network environments. The proposed architecture improves the error recovery of the system in terms of objective quality. Furthermore, the simulation outcome shows that the proposed method outperforms the existing redundant coding method of JSVM by 0.7 dB in an error free environment and by 0.4 dB in a 10% packet loss rate (PLR) environment with medium and high motion sequences.
{"title":"Wyner-Ziv based error correction of non-key frames for low complexity streaming applications","authors":"M. B. Dissanayake, S. Worrall, W. Fernando","doi":"10.1109/ICIINFS.2011.6038115","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038115","url":null,"abstract":"The paper presents a novel error robustness method for H.264/AVC video data, based on the redundant data encoding concept. The proposed redundant data codec incorporates the Wyner-Ziv (WZ) theory and motion vectors (MV) of the H.264/AVC scheme. The performance of the proposed method is evaluated under both error free and error prone Internet Protocol (IP) Packet network environments. The proposed architecture improves the error recovery of the system in terms of objective quality. Furthermore, the simulation outcome shows that the proposed method outperforms the existing redundant coding method of JSVM by 0.7 dB in an error free environment and by 0.4 dB in a 10% packet loss rate (PLR) environment with medium and high motion sequences.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128588811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038117
G. Dissanayake, Shoudong Huang, Zhan Wang, Ravindra Ranasinghe
Simultaneous Localization and Mapping (SLAM) problem has been an active area of research in robotics for more than a decade. Many fundamental and practical aspects of SLAM have been addressed and some impressive practical solutions have been demonstrated. The aim of this paper is to provide a review of the current state of the research on feature based SLAM, in particular to examine the current understanding of the fundamental properties of the SLAM problem and associated issues with the view to consolidate recent achievements.
{"title":"A review of recent developments in Simultaneous Localization and Mapping","authors":"G. Dissanayake, Shoudong Huang, Zhan Wang, Ravindra Ranasinghe","doi":"10.1109/ICIINFS.2011.6038117","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038117","url":null,"abstract":"Simultaneous Localization and Mapping (SLAM) problem has been an active area of research in robotics for more than a decade. Many fundamental and practical aspects of SLAM have been addressed and some impressive practical solutions have been demonstrated. The aim of this paper is to provide a review of the current state of the research on feature based SLAM, in particular to examine the current understanding of the fundamental properties of the SLAM problem and associated issues with the view to consolidate recent achievements.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038097
A. Perera, P. Kumarage, K. Perera
Optimal load management of energy system is been widely discussed due to the higher depletion rate of fossil fuel resources and ever increasing energy demands. In such circumstances, optimal design and control of boiler systems play a major role. New algorithm based on fuzzy-evolutionary hybrid techniques is being introduced in this study to carry out this work. Detailed energy flow and lifecycle cost model was introduced in order to support the optimization. Finally, optimization algorithm was tested for two different load curves and obtained results were discussed.
{"title":"Optimal design and control of multiple boiler systems using fuzzy-evolutionary hybrid algorithm","authors":"A. Perera, P. Kumarage, K. Perera","doi":"10.1109/ICIINFS.2011.6038097","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038097","url":null,"abstract":"Optimal load management of energy system is been widely discussed due to the higher depletion rate of fossil fuel resources and ever increasing energy demands. In such circumstances, optimal design and control of boiler systems play a major role. New algorithm based on fuzzy-evolutionary hybrid techniques is being introduced in this study to carry out this work. Detailed energy flow and lifecycle cost model was introduced in order to support the optimization. Finally, optimization algorithm was tested for two different load curves and obtained results were discussed.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038110
Roshan D'Souza, B. Kariyappa, B. Kumar, M. Kumari
The Short Message Service (SMS) is one of the most successful services in existing cellular networks. The SMS provides a means of sending messages of limited size to and from Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications System (UMTS) phones. SMS technology has evolved out of the GSM standard and presently, the 3rd Generation Partnership Project (3GPP) maintains the SMS standards. Because of its ease to use and cost effectiveness SMS has become one of the popular services in the mobile communication world. The main objective of this paper is to introduce a methodology to provide Short Message Service over Internet Protocol (SoIP) network, which is addressed to mobile or soft phone users connected over IP network. The proposed method is based on sending SMS directly to the Short Message Switching Centre (SMSC) using the Short Message Peer to Peer (SMPP) communication protocol over IP network. SMPP protocol design has been coded in Java/Microsoft Visual Basic and simulated in Android Mobile Simulator. The design is synthesized using Eclipse Integrated Development Environment (IDE) with Android development plug-in. The results obtained are validated against design specifications. At present SoIP system is tested on Android mobile simulator and the work is underway in implementing the solution on Android mobile platform. Using this method, direct communication with SMSC, higher degree of message throughput and reduced cost per SMS can be achieved.
短消息服务(SMS)是现有蜂窝网络中最成功的服务之一。SMS提供了一种向全球移动通信系统(GSM)或通用移动通信系统(UMTS)手机发送有限大小信息的方法。短信技术是从GSM标准发展而来的,目前,第三代合作伙伴计划(3GPP)维护着短信标准。由于其易于使用和成本效益,短信已成为移动通信领域的热门服务之一。本文的主要目的是介绍一种通过互联网协议(SoIP)网络提供短消息服务的方法,该方法针对通过IP网络连接的移动电话或软电话用户。该方法基于在IP网络上使用短消息点对点(SMPP)通信协议将SMS直接发送到短消息交换中心(SMSC)。SMPP协议设计是用Java/Microsoft Visual Basic编写的,并在Android Mobile Simulator中进行了仿真。本设计采用Eclipse集成开发环境(IDE)和Android开发插件进行综合设计。根据设计规范对所得结果进行了验证。目前SoIP系统已经在Android移动模拟器上进行了测试,解决方案正在Android移动平台上进行实现。使用该方法可以实现与SMSC的直接通信,提高了消息吞吐量,降低了每条短信的成本。
{"title":"Protocol implementation for Short Message Service over IP","authors":"Roshan D'Souza, B. Kariyappa, B. Kumar, M. Kumari","doi":"10.1109/ICIINFS.2011.6038110","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038110","url":null,"abstract":"The Short Message Service (SMS) is one of the most successful services in existing cellular networks. The SMS provides a means of sending messages of limited size to and from Global System for Mobile Communications (GSM) or Universal Mobile Telecommunications System (UMTS) phones. SMS technology has evolved out of the GSM standard and presently, the 3rd Generation Partnership Project (3GPP) maintains the SMS standards. Because of its ease to use and cost effectiveness SMS has become one of the popular services in the mobile communication world. The main objective of this paper is to introduce a methodology to provide Short Message Service over Internet Protocol (SoIP) network, which is addressed to mobile or soft phone users connected over IP network. The proposed method is based on sending SMS directly to the Short Message Switching Centre (SMSC) using the Short Message Peer to Peer (SMPP) communication protocol over IP network. SMPP protocol design has been coded in Java/Microsoft Visual Basic and simulated in Android Mobile Simulator. The design is synthesized using Eclipse Integrated Development Environment (IDE) with Android development plug-in. The results obtained are validated against design specifications. At present SoIP system is tested on Android mobile simulator and the work is underway in implementing the solution on Android mobile platform. Using this method, direct communication with SMSC, higher degree of message throughput and reduced cost per SMS can be achieved.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133158378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038100
Rambir Singh, Ashutosh Kumar Singh, Pradeep Kumar
For power quality improvement, shunt active power filters (SAPF) having PWM controlled voltage source inverter (VSI) topology is extensively used in distribution networks, which utilizes the PI controller for reference voltage tracking. PI controller tuning with the assumption of linear PWM model leads to unsatisfactory results under varying operating conditions. Optimal tuning of PI gains is required to get the best response of PI controllers. This paper presents a comparative study of PI controller tuning in a SAPF using three evolutionary algorithms (EAs), viz. bacteria foraging (BF), bacteria foraging with swarming (BFS) and particle swarm optimisation (PSO), for current harmonic mitigation. The minimization of integral time square error (ITSE) and integral time absolute error (ITAE) as performance indices is used as objective function for optimisation. The simulation results show that PSO tuned PI with ITSE as minimized parameter performs better.
{"title":"Comparison of three evolutionary algorithms for harmonic mitigation using SAPF","authors":"Rambir Singh, Ashutosh Kumar Singh, Pradeep Kumar","doi":"10.1109/ICIINFS.2011.6038100","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038100","url":null,"abstract":"For power quality improvement, shunt active power filters (SAPF) having PWM controlled voltage source inverter (VSI) topology is extensively used in distribution networks, which utilizes the PI controller for reference voltage tracking. PI controller tuning with the assumption of linear PWM model leads to unsatisfactory results under varying operating conditions. Optimal tuning of PI gains is required to get the best response of PI controllers. This paper presents a comparative study of PI controller tuning in a SAPF using three evolutionary algorithms (EAs), viz. bacteria foraging (BF), bacteria foraging with swarming (BFS) and particle swarm optimisation (PSO), for current harmonic mitigation. The minimization of integral time square error (ITSE) and integral time absolute error (ITAE) as performance indices is used as objective function for optimisation. The simulation results show that PSO tuned PI with ITSE as minimized parameter performs better.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"52 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132076636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038031
L. Perera, H.M.A. Herath
The frequency spectrum bandwidth used in modern wireless systems is limited while the number of wireless systems is rapidly increasing. In order to alleviate the spectrum scarcity, secondary systems can opportunistically access the temporarily unused licensed bands of primary systems which are known as spectrum holes or white spaces, by altering their transmitting parameters so that the interference is minimal to primary user while coordinating access to this channel with other cognitive radio (CR) users in the vicinity. Spectrum sensing is necessary to enable dynamic spectrum access without interfering with primary users. This optimizes the use of available radio frequency spectrum while minimizing interference to other licensed or unlicensed users by detecting and utilizing only the white spaces. This paper explores various sensing methods, their performance, applicability and effectiveness under different transmission conditions and advantages and disadvantages incorporated with each sensing method.
{"title":"Review of spectrum sensing in cognitive radio","authors":"L. Perera, H.M.A. Herath","doi":"10.1109/ICIINFS.2011.6038031","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038031","url":null,"abstract":"The frequency spectrum bandwidth used in modern wireless systems is limited while the number of wireless systems is rapidly increasing. In order to alleviate the spectrum scarcity, secondary systems can opportunistically access the temporarily unused licensed bands of primary systems which are known as spectrum holes or white spaces, by altering their transmitting parameters so that the interference is minimal to primary user while coordinating access to this channel with other cognitive radio (CR) users in the vicinity. Spectrum sensing is necessary to enable dynamic spectrum access without interfering with primary users. This optimizes the use of available radio frequency spectrum while minimizing interference to other licensed or unlicensed users by detecting and utilizing only the white spaces. This paper explores various sensing methods, their performance, applicability and effectiveness under different transmission conditions and advantages and disadvantages incorporated with each sensing method.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129158975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038082
H. M. P. B. Ranasinghe, K. Abeyrathne, A. Bandara, K. Narampanawe
The free-space path loss is proportional to the square of the distance between a wireless transmitter and a receiver. The mathematical model of that can be used to determine the signal intensity of transmitted radio signal at a definite distance from the transmitting antenna. Nevertheless different environments present multipath effects and other active/ passive interferences that affect Received Signal Strength (RSS). Therefore pure mathematical models become less robust for object localization. The objective of this research was to conduct an empirical analysis based on received signal strength measurements in different environments using various wireless transmitters and receivers. Robust localization algorithm is developed by analyzing empirically obtained data sets. The system is tested for different terrains and frequencies with calibration.
{"title":"An empirical characterization of wireless objects localization","authors":"H. M. P. B. Ranasinghe, K. Abeyrathne, A. Bandara, K. Narampanawe","doi":"10.1109/ICIINFS.2011.6038082","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038082","url":null,"abstract":"The free-space path loss is proportional to the square of the distance between a wireless transmitter and a receiver. The mathematical model of that can be used to determine the signal intensity of transmitted radio signal at a definite distance from the transmitting antenna. Nevertheless different environments present multipath effects and other active/ passive interferences that affect Received Signal Strength (RSS). Therefore pure mathematical models become less robust for object localization. The objective of this research was to conduct an empirical analysis based on received signal strength measurements in different environments using various wireless transmitters and receivers. Robust localization algorithm is developed by analyzing empirically obtained data sets. The system is tested for different terrains and frequencies with calibration.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128650542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-10-10DOI: 10.1109/ICIINFS.2011.6038061
D. Kumarage, S. Fernando, P. Fernando, D. Madushanka, R. Samarasinghe
A sign language is a language which uses visually transmitted sign patterns, instead of acoustically conveyed sound patterns, to deliver the meaning. Sign languages are typically constructed by simultaneous combination of hand shapes, orientations and movements of the hands, arms or body, with facial expressions to fluidly express a speaker's thoughts. This paper presents a less costly approach to develop a computer vision based sign language recognition application in real time context with motion recognition. We explore new concepts of breaking down motion gestures to sub components for parallel processing and mapping motion data into static data representations. This concept can be used to identify sign language gestures, without performing computational intensive tasks of each and every frame captured. Moreover, sign language gestures can be evaluated with minimal image processing and map the motion to linear/non-linear equations using functionalities proposed in this paper.
{"title":"Real-time sign language gesture recognition using still-image comparison & motion recognition","authors":"D. Kumarage, S. Fernando, P. Fernando, D. Madushanka, R. Samarasinghe","doi":"10.1109/ICIINFS.2011.6038061","DOIUrl":"https://doi.org/10.1109/ICIINFS.2011.6038061","url":null,"abstract":"A sign language is a language which uses visually transmitted sign patterns, instead of acoustically conveyed sound patterns, to deliver the meaning. Sign languages are typically constructed by simultaneous combination of hand shapes, orientations and movements of the hands, arms or body, with facial expressions to fluidly express a speaker's thoughts. This paper presents a less costly approach to develop a computer vision based sign language recognition application in real time context with motion recognition. We explore new concepts of breaking down motion gestures to sub components for parallel processing and mapping motion data into static data representations. This concept can be used to identify sign language gestures, without performing computational intensive tasks of each and every frame captured. Moreover, sign language gestures can be evaluated with minimal image processing and map the motion to linear/non-linear equations using functionalities proposed in this paper.","PeriodicalId":353966,"journal":{"name":"2011 6th International Conference on Industrial and Information Systems","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116374235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}