International Journal Of Engineering And Computer Science, 2015
Human computer interaction technique has become a bottleneck in the effective utilization of the ... more Human computer interaction technique has become a bottleneck in the effective utilization of the available information. The development of user interfaces influences the change in the human computer interaction (HCI). Dynamic hand posture recognition is one of the difficult tasks due to its complex background. The proposed method is implemented for hand postures taken in the natural environment. Challenges such as change of illumination and similar background are taken into consideration. Working system is based on two steps, namely hand detection and hand gesture recognition. In the hand detection process, normalized colour space skin locus is used to threshold the skin pixels from its varying background. Morphological filtering and canny edge detection is used efficaciously for removing object noise and obtain counter edges of hand gestures. Normalized cross correlation is used for pixel-wise comparison between the input image and the depository images and the best matching is considered as region of interest.
Cloud computing technologies are elaborated and popularized the power, networking, communications... more Cloud computing technologies are elaborated and popularized the power, networking, communications and storage speculated the human race to procreate process and share digital information to new demand for more impressive computing infrastructure. Although the Cloud computing is a very promising and challenging internet based computing infrastructure, Distributed Denial of Service (DDoS) is the one of the main attack. This attack can accord the obtainability of the assistance and can be conveniently initiated, it leads to financial damages or affecting the notoriety and this attack is tricky to detect and filter. With respect to the above scenario the detailed survey is made in this paper which focuses on different defeating mechanisms of DDoS attacks such as Detection Techniques, Filtering Techniques and Traceback.
International Journal Of Engineering And Computer Science, 2015
Human computer interaction technique has become a bottleneck in the effective utilization of the ... more Human computer interaction technique has become a bottleneck in the effective utilization of the available information. The development of user interfaces influences the change in the human computer interaction (HCI). Dynamic hand posture recognition is one of the difficult tasks due to its complex background. The proposed method is implemented for hand postures taken in the natural environment. Challenges such as change of illumination and similar background are taken into consideration. Working system is based on two steps, namely hand detection and hand gesture recognition. In the hand detection process, normalized colour space skin locus is used to threshold the skin pixels from its varying background. Morphological filtering and canny edge detection is used efficaciously for removing object noise and obtain counter edges of hand gestures. Normalized cross correlation is used for pixel-wise comparison between the input image and the depository images and the best matching is considered as region of interest.
Cloud computing technologies are elaborated and popularized the power, networking, communications... more Cloud computing technologies are elaborated and popularized the power, networking, communications and storage speculated the human race to procreate process and share digital information to new demand for more impressive computing infrastructure. Although the Cloud computing is a very promising and challenging internet based computing infrastructure, Distributed Denial of Service (DDoS) is the one of the main attack. This attack can accord the obtainability of the assistance and can be conveniently initiated, it leads to financial damages or affecting the notoriety and this attack is tricky to detect and filter. With respect to the above scenario the detailed survey is made in this paper which focuses on different defeating mechanisms of DDoS attacks such as Detection Techniques, Filtering Techniques and Traceback.
Uploads
Papers by Divya Sree
Conference Presentations by Divya Sree