This document provides an overview of gesture recognition technology. It begins with introducing gestures as a form of non-verbal communication and defines gesture recognition as interpreting human gestures through mathematical algorithms. It then discusses the motivation for gesture recognition, including its naturalness and applications in overcoming interaction problems with traditional input devices. The document outlines different types of gestures, input devices like gloves and cameras, challenges like developing standardized gesture languages, and uses like sign language recognition, virtual controllers, and assisting disabled individuals. It concludes with references for further reading.
Gesture recognition is a topic in computer science and language technology which interpret human gestures via mathematical algorithms.
Gestures can originate from any bodily motion or state but commonly originate from the face or hand.
Gesture recognition enables humans to communicate with the machine (HMI) and interact naturally without any mechanical devices.
The Gesture Recognition Technology is rapidly growing technology and this PPT describes about the working of gesture recognition technology,the sub fields in it, its applications and the challenges it faces.
Gesture recognition is a topic in computer science and language technology which interpret human gestures via mathematical algorithms.
Gestures can originate from any bodily motion or state but commonly originate from the face or hand.
Gesture recognition enables humans to communicate with the machine (HMI) and interact naturally without any mechanical devices.
The Gesture Recognition Technology is rapidly growing technology and this PPT describes about the working of gesture recognition technology,the sub fields in it, its applications and the challenges it faces.
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
It is the best and attractive ppt of Gesture Recognition Technology...This is the TOUCHLESS technology...and will surely hit the market...in coming days.
The project is about building a human-computer interaction system
using hand gesture by cheap alternative to depth camera. We present
a robust , efficient and real-time technique for depth mapping using
normal 2D -camera and Infrared LED arrays . We use HOG feature
based SVM classifiers to predict hand pose and dynamic hand gestures . The system also tracks hand movements and events like grabbing and
clicking bythe hand.
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
The goal of this project is to provide a platform that allows for communication between able-bodied and disabled people or between computers and human beings. There has been great emphasis on Human-Computer-Interaction research to create easy-to-use interfaces by directly employing natural communication and manipulation skills of humans . As an important part of the body, recognizing hand gesture is very important for Human-Computer-Interaction. In recent years, there has been a tremendous amount of research on hand gesture recognition
As Digital Still Cameras (DSC) become smaller, cheaper and higher in resolution, photographs are increasingly prone to blurring from shaky hands. Optical image stabilization (OIS) is an effective solution that addresses the quality of images, and is an idea that has been around for at least 30 years. It has only recently made its way into the low-cost consumer camera market, and will soon be migrating to the higher end camera phones. This paper provides an overview of common design practices and considerations for optical image stabilization and how silicon-based MEMS dual-axis gyroscopes with their size, cost and performance advantages are enabling this vital function for image capturing devices
Keyboard without keys, virtual keyboard uses sensor technology and artificial intelligence. Awesome replacement for QWERTY keyboard. Can implement all types of keyboards. Example of Augmented Reality.
Beyond controlling the robotic system through physical devices, recent method of gesture control has become very popular. The main purpose of using gestures is that it provides a more natural way of controlling and provides a rich and intuitive form of interaction with the robotic system.
Human Computer Interaction, Gesture provides a way for computers to understand human body language, Deals with the goal of interpreting hand gestures via mathematical algorithms, Enables humans to interface with the machine (HMI) and interact naturally without any mechanical devices
It is the best and attractive ppt of Gesture Recognition Technology...This is the TOUCHLESS technology...and will surely hit the market...in coming days.
The project is about building a human-computer interaction system
using hand gesture by cheap alternative to depth camera. We present
a robust , efficient and real-time technique for depth mapping using
normal 2D -camera and Infrared LED arrays . We use HOG feature
based SVM classifiers to predict hand pose and dynamic hand gestures . The system also tracks hand movements and events like grabbing and
clicking bythe hand.
Virtual Mouse using hand gesture recognitionMuktiKalsekar
This project is to develop a Virtual Mouse using Hand Gesture Recognition. Hand gestures are the most effortless and natural way of communication. The aim is to perform various operations of the cursor. Instead of using more expensive sensors, a simple web camera can identify the gesture and perform the action. It helps the user to interact with a computer without any physical or hardware device to control mouse operation.
The goal of this project is to provide a platform that allows for communication between able-bodied and disabled people or between computers and human beings. There has been great emphasis on Human-Computer-Interaction research to create easy-to-use interfaces by directly employing natural communication and manipulation skills of humans . As an important part of the body, recognizing hand gesture is very important for Human-Computer-Interaction. In recent years, there has been a tremendous amount of research on hand gesture recognition
As Digital Still Cameras (DSC) become smaller, cheaper and higher in resolution, photographs are increasingly prone to blurring from shaky hands. Optical image stabilization (OIS) is an effective solution that addresses the quality of images, and is an idea that has been around for at least 30 years. It has only recently made its way into the low-cost consumer camera market, and will soon be migrating to the higher end camera phones. This paper provides an overview of common design practices and considerations for optical image stabilization and how silicon-based MEMS dual-axis gyroscopes with their size, cost and performance advantages are enabling this vital function for image capturing devices
Keyboard without keys, virtual keyboard uses sensor technology and artificial intelligence. Awesome replacement for QWERTY keyboard. Can implement all types of keyboards. Example of Augmented Reality.
Beyond controlling the robotic system through physical devices, recent method of gesture control has become very popular. The main purpose of using gestures is that it provides a more natural way of controlling and provides a rich and intuitive form of interaction with the robotic system.
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...Nabil Bouzerna
A blockchain infrastructure, combined with cryptographic signatures, can improve availability and accountability for the deployment of IoT updates. However, cars with limited or intermittent Internet access may have difficulties in downloading full updates from the blockchain. Therefore, we allow cars that successfully downloaded updates to share them with other cars by means of a Peer-to-Peer (P2P) mechanism.
Résumé : Ce mémoire présente un système de recherche de contenus vidéos protégés mis en ligne sur le Web fondé sur l’analyse des échanges textuels présent sur les blogs et forums. Cette analyse textuelle est matérialisée par une empreinte lexicale qui se raffine selon 3 profils : statistique, linguistique et descriptif des documents. Puis ce système associe une approche de reformulation de requête (boucle de rétroaction de pertinence) à partir de documents trouvés et les techniques de l’algorithmique génétique pour mimer le comportement du cerveau humain dans le choix des termes de requêtes les plus pertinents.
Abstract: This master thesis presents a search system to retrieved protected video content published illegally on the Web thanks to analysis of textual exchanges present on blogs and forums. This textual analysis is materialized by a lexical fingerprint which is composed according to 3 profiles: statistical, linguistic and descriptive of the documents. Then this system combines a query reformulation approach (relevance feedback loop) from found documents and techniques of genetic algorithmic to mimic the behavior of the human brain in the choice of the most relevant query terms.
Word embeddings et leurs applications (Meetup TDS, 2016-06-30)Camille Pradel
Les récentes avancées dans le domaine du traitement du langage ont permis de repousser la qualité des applications présentes dans notre quotidien : traduction, analyse de sentiments, reconnaissance vocale, dialogue homme-machine (Chatbots). Camille nous invite à comprendre une structure de représentation du langage assez puissante : les word embeddings. Cela consiste à représenter le sens des mots dans un espace vectoriel continu présentant des propriétés remarquables ; on peut par exemple déterminer des analogies entre les mots : reine = roi – home + femme.
Glass Camp - Meetup #15 Presse & Media @Presstalis - Décembre 2014Glasscamp
Jeudi 11 décembre 2014, Presstalis et Glass Camp ont réalisés avec des acteurs de la presse (points de vente, éditeurs, logistique, etc) un Meetup spécial Presse & Media.
Le but : découvrir des technologies telles que Google Glass, Beacon ou encore les Smartwatches et proposer à partir de là de nouvelles idées d’applications.
En fin de soirée, le Prix ZEENS de la meilleure idée a été décerné au meilleur pitch : une Sony Smartwatch 3 !
Recently more & more hearing impaired people started using sign language. There are about 70 million people in the whole World that are not able to speak (dumb). A dumb person makes communication with other people using their motion of the hand or expressions. . Sign language helps the dumb people to make communication like normal people. The sign language translator which has been already developed uses a glove fitted with sensors that can interpret the 16 English letters in American Sign Language (ASL). Accelerometers and flex sensors are used in this system which increases its overall cost. We proposed a solution as a prototype called as “smart glove-for speech impaired people” which will translate sign language into text. It will help dump and deaf people to express their thoughts in more convenient way. As a sign language we have used traditional finger movements with contact switch wrapped around the user’s fingers. An IR transmitter receiver pair, HT12E and HT12D IC and, Arduino (Micro Controller) board helps transmitting data to PC. Moreover, use of contact switches reduces the system’s overall cost.
Keywords: - Arduino, HT12E IC & HT12D IC, IR transmitter receiver, contact switch.
Petit-déjeuner OCTO - Objets connectés : We Are Able !OCTO Technology
We Are Able : capables de quoi ? Mais de tout.
Il faut considérer ces nouveaux objets intelligents comme bien plus que des gadgets qui vont s’échanger sous le sapin. Leur ambition est bien *d’améliorer notre vie*. Les premiers domaines d’application visés sont notamment dans la santé sur les sujets du diabète, de l’obésité ou encore des maladies cardio-vasculaires. On parle même d’un marché (matériels, logiciels et services) estimé à plus de 40 Md de $ d’ici à 2020.
Le monde est-il prêt pour cette nouvelle disruption technologique ? Nous en sommes intimement convaincus. L’explosion des Smartphones a permis d’établir quelques standards clés qui sont des fondements : 4G, Bluetooth Low Energy, NFC sans oublier les écosystèmes de développement d’applications mobiles.
Les montres intelligentes captent l’attention médiatique et elles ne sont que la première manifestation tangible d’une toute nouvelle classe de produits. Des pans entiers de l’industrie sont en mouvement dans les domaines de la domotique, l’habillement, capteurs intelligents, bijouterie, lunettes ou casques immersifs.
Quant au Smartphone, loin de se faire détrôner, il devient le maître d’orchestre de ces nouveaux capteurs, notre porte d’entrée dans cet univers numérique.
Lors de ce petit-déjeuner, nous aborderons les thèmes suivants :
Quels produits sont disponibles sur le marché et que nous promettent les constructeurs ?
Que peut-on faire avec une montre ou des lunettes connectées ? Ces nouveaux terminaux vont-ils révolutionner nos usages ?
Comment réaliser une application adaptée ? Quel type d'équipe faut-il mobiliser ?
Pourquoi se positionner dès aujourd'hui sur ces nouveaux usages ? Quels retours ont obtenu ceux qui ont déjà franchi le cap ?
Au terme de ce petit-déjeuner, vous bénéficierez des retours d’expérience d’OCTO Technology et de trois entreprises françaises ayant déjà une application en production :
Meetic : Thomas Diavet - R&D Manager
BNP Paribas : David Dahan - Mobile Manager BNP Paribas & Hello bank!
Le Monde : Edouard Andrieu - Responsable nouveaux Écrans
Ces retours vous permettront de :
Connaître les motivations d'une entreprise pour les projets wearables
Découvrir les impacts de ces réalisations
Apprendre l'essentiel pour être prêts à lancer sereinement vos propres projets autour des wearables
Cyborg Design: Multimodal Interactions, Information, and Environments for Wea...Bennett King
This presentation provides an overview or wearable computing for the UX community and design principals that can be used for wearable experience design. It was first given at the IA Summit in San Diego on March 30th, 2014.
SODA-IIoT4Automotive: Blockchain to keep the Automotive ECU up-to-dateNabil Bouzerna
Co-designed with PSA Group and Valeo, SODA-IIoT4Automotive offers a secure way to update automotive ECU software/firmware.
Automotive vehicles are composed of several dozens of Electronic Control Units (ECU). With the increasing connectivity of the vehicles, the update of the ECU software will soon be performed Over-The-Air (OTA). This includes the update of the in-vehicle infotainment, but also the more critical ECUs such as the body, motion and Advanced Driving Assistance Systems (ADAS) ECUs. For PSA and Valeo the accountability and the availability of ECU software updates are crucial, particularly for security patches which require a fast deployment.
Cyborgs-The next generation human-robotic devicesRohit Agrawal
8th i.e (4x First Prize) consecutive wins on this Presentation of Cyborg.
A Cyborg is a Cybernetic Organism, part human part machine; it thrives on the inputs both from the living senses and from the machine interface, which acts as an enhancement module.
Gestures and movement provide the visuals that accompany your words. Learning to use them effectively will help you convey your message with confidence and your audience will see your message instead of just hearing it
Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly originate from the face or hand.
The Gesture Recognition Technology is rapidly growing technology and this PPT describes about the working of gesture recognition technology,the sub fields in it, its applications and the challenges it faces.
VSP will end the physical dependency of the mobile phone. VSP provides novel interaction method to seamlessly communicate with each other in a fun and intuitive way.
The recent advent of novel sensing and display technologies has encouraged the development of a variety of multi-touch and gesture based interactive systems.
In these systems user may interact directly with information using touch add natural hand gestures.
Unfortunately, most gestural and multi-touch based interactive systems are not mobile and small mobile devices fail to provide the intuitive experience of full-sized gestural systems.
We present VSP-Virtual Smart Phone, a multi-touch and gesture based interaction system
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
3. Introduction
What are Gestures?
A form of non-verbal communication.
Movement of the hands, face, or other parts of the body.
What is Gesture Recognition?
Interpreting human gestures via mathematical algorithms.
Gestures as input to control devices or applications.
3
5. Gesturing is a natural form of communication
Gesture naturally while talking
Babies gesture before they can talk
Interaction problems with the mouse
Have to locate cursor
Hard for some to control (Parkinsons or people on a train)
Limited forms of input from the mouse
5
Motivation
6. Gesture types
In computer interfaces, two types of gestures are
distinguished.
Offline gestures
Processed after the user’s interaction with the object.
Ex:- gesture to activate a menu.
Online gestures
Direct manipulations like scaling and rotating.
6
7. Basic Working of Gesture Recognition
Technology
User interface
display
Standard web
camera
user
7
8. Input devices
Tools to track a person's movements
Wired gloves
Depth aware cameras
Stereo cameras
Gestures based Controller
Single camera
8
9. Technology Behind it..
Wired gloves
Provides input to the computer about the
position and notation of the hands.
Uses fiber optic cables running down the
back of the hand. Light pulses are created
and when the fingers are bent, and is
registered giving an approximation of the
hand pose.
9
10. Technology Behind it..
Stereo cameras
It has two lenses about the same distance
apart as your eyes and take two pictures at
a same time.
A 3D representation can be approximated
by the output of the cameras.
10
12. Challenges
Lack of Gesture Language
Different users make gestures differently,
causing difficulty in identifying motions
Robustness
Many gesture recognition systems do not read
motions accurately or optimally due to factors
like insufficient background light, high
background noise etc.
12
13. Uses
1.Sign Language Recognition
13
Just as speech recognition can
transcribe speech to text, certain types
of gesture recognition software can
transcribe the symbols represented
through sign language into text.
14. 14
2.Virtual Controllers
For systems where the act of finding or
acquiring a physical controller could require
too much time, gestures can be used as an
alternative control mechanism. Controlling
secondary devices in a car, or controlling a
television set are examples of such usage.
3.Remote Control
Through the use of gesture
recognition, remote control with the
wave of a hand of various devices is
possible.
Uses/Conclusion
15. Machine wheel chairs are coming
with gesture based system. The
movement of the hand will act as
a controller of speed as well as
direction
In video game consoles such as
Microsoft X-box with kinect
sensors, often the user is the
controller and has to perform all
physical movements that they desire
the character in the game to do.
4.Aid to Physically
Challenged
5.Immersive Gaming
Technology
15Uses
16. References
Ying Wu and Thomas S. Huang, "Vision-Based Gesture
Recognition: A Review", In: Gesture-Based Communication in
Human-Computer Interaction, Volume 1739 of Springer Lecture
Notes in Computer Science, pages 103-115,
Matthias Rehm, Nikolaus Bee, Elisabeth André, Wave Like an
Egyptian - Accelerometer Based Gesture Recognition for
Culture Specific Interactions, British Computer Society, 2007
Pavlovic, V., Sharma, R. & Huang, T. (1997), "Visual
interpretation of hand gestures for human-computer interaction:
A review", IEEE Trans. Pattern Analysis and Machine
Intelligence., July, 1997. Vol. 19(7), pp. 677 -695
16