SlideShare a Scribd company logo
1 of 11
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 5, October 2020, pp. 2265~2275
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i5.13725  2265
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Hand gesture recognition using discrete wavelet
transform and hidden Markov models
Erizka Banuwati Candrasari, Ledya Novamizanti, Suci Aulia
Telkom University, Indonesia
Article Info ABSTRACT
Article history:
Received Jul 25, 2019
Revised Mar 30, 2020
Accepted May 1, 2020
Gesture recognition based on computer-vision is an important part of
human-computer interaction. But it lacks in several points, that was image
brightness, recognition time, and accuracy. Because of that goal of this
research was to create a hand gesture recognition system that had good
performances using discrete wavelet transform and hidden Markov models.
The first process was pre-processing, which done by resizing the image to
128x128 pixels and then segmented the skin color. The second process was
feature extraction using the discrete wavelet transform. The result was
the feature value in the form of a feature vector from the image. The last
process was gesture classification using hidden Markov models to calculate
the highest probability of feature matrix which had obtained from the feature
extraction process. The result of the system had 72% of accuracy using
150 training and 100 test data images that consist five gestures. The newness
thing found in this experiment were the effect of acquisition and
pre-processing. The accuracy had been escalated by 14% compared to
Sebastien’s dataset at 58%. The increment effect propped by brightness and
contrast value.
Keywords:
Discrete wavelet transform
Hand gesture
Recognition
This is an open access article under the CC BY-SA license.
Corresponding Author:
Erizka Banuwati Candrasari,
Telkom University,
Telekomunikasi St., Terusan Buah Batu St., Sukapura, Dayeuhkolot,
Bandung, West Java, 40257, Indonesia.
Email: erizkabanuwatic@gmail.com
1. INTRODUCTION
The technology can be used for human-physical recognition [1-10], one of which is the recognition
of the hand that can be applied as a communication tool [11-13]. The previous research used DWT and support
vector machine (SVM) classification [14]. In this study, they obtained 94% of accuracy where they did cross
validation five times with 50 data samples from seven actions. Then when 231 samples were used for training
data and the remaining 119 were used for test data, they obtained an accuracy of 93.27%. Tests also carried
out with 256×256 pixel images with level 5 decomposition which produced an accuracy of 93.14%. DWT can
provides the information of time and frequency simultaneously and wavelets can be arranged and adapted as
needed [15]. HMM has the advantage at being able to overcome the problem of evaluation, inference, and
learning [16]. HMM often used in various applications, an effective learning algorithm, and can handle
variations in record structure [2]. Referring to the research [17], a static hand gesture recognition using
the HMM has an average accuracy rate of 93.38%.
The purpose of this research was to be able to design a hand gesture recognition system based on
digital images using DWT as feature extraction and HMM as a classification algorithm. Then, test the results
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275
2266
and analyze the system performances. The problems contained in this research including how to make
the system design and simulation of hand gesture recognition for dataset using the DWT method and HMM
classification, how does the effect in changing the value of input parameters on system performances using
DWT feature extraction methods and HMM classification, how is the performances, and how the accuracy and
timing of computing system compared to. The data was self collected using own dataset consist of a collection
of hand gesture images using smartphone with 13MP resolution.
2. RESEARCH METHOD
2.1. Discrete wavelet transform
DWT method is utilized to conduct hand feature extraction. The method is used to create characteristic
matrix of an image to represent value of the matrix of the related image. Explanation of the feature extraction
process using DWT with example in Table 1. First, calculate the average value of pixle row of a hand gesture
conture image as in Table 2 and the result is in Table 3. Second, calculate the average value of each pixel column
set in Table 3 by inputing the previous calculation result illustrated in Table 4. Then, it would produce an output
of image conture value sub-band LL, LH, HL, HH illustrated in Table 5. Final process, process of repetitive
extraction of DWT characteristic will finish if every conture image data is succesfully extracted [18-21].
Table 1. 6x6 matrix sample
Matrix Sample
135 120 90 98 132 122
140 126 95 94 121 114
144 129 88 90 119 111
129 121 85 78 109 109
116 106 73 72 106 99
98 80 50 53 88 79
Table 2. Illustration of calculation process of average pixel pair based on the row
Pixel Pair
135 + 120
2
90 + 98
2
132 + 122
2
135 − 120
2
90 − 98
2
132 − 122
2
140 + 126
2
95 + 94
2
121 + 114
2
140 − 126
2
95 − 94
2
121 − 114
2
144 + 129
2
88 + 90
2
119 + 111
2
144 − 129
2
88 − 90
2
119 − 111
2
129 + 121
2
85 + 78
2
109 + 109
2
129 − 121
2
85 − 78
2
109 − 109
2
116 + 106
2
73 + 72
2
106 + 99
2
116 − 106
2
73 − 72
2
106 − 99
2
98 + 80
2
50 + 53
2
88 + 79
2
98 − 80
2
50 − 53
2
88 − 79
2
Table 3. Illustration of pixel pair based on the row calculation result
Pixel Pair
127.5 94 127 7.5 -4 5
133 94.5 117.5 7 0.5 3.5
136.5 89 115 7.5 -1 4
125 81.5 109 4 3.5 0
111 72.5 102.5 5 0.5 3.5
89 51.5 83.5 9 -1.5 4.5
Table 4. Illustration of the process of calculating the average pixel pair
Pixel Pair
127.5 + 133
2
94 + 94.5
2
127 + 117.5
2
7.5 + 7
2
−4 + 0.5
2
5 + 3.5
2
… .. … .. … .. … .. … .. … ..
… .. … .. … .. … .. … .. … ..
127.5 − 133
2
94 − 94.5
2
127 − 117.5
2
7.5 − 7
2
−4 − 0.5
2
5 − 3.5
2
… .. … .. … .. … .. … .. … ..
… .. … .. … .. … .. … .. … ..
TELKOMNIKA Telecommun Comput El Control 
Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari)
2267
Table 5. Illustration of the result from calculating average pixel pair based on the column
Pixel Pair
LL 130.25 94.25 122.25 7.25 -1.75 4.25 HL
130.75 85.25 112 5.75 1.25 2
100 62 93 7 -0.5 4
LH -2.75 -0.25 4.75 0.25 -2.25 0.75 HH
5.75 3.75 3 1.75 -2.25 2
11 10.5 9.5 -2 1 -0.5
2.2. Hidden Markov models
Each hidden Markov models are defined by state, probability state, probability of transition,
probability of emission and the early probability. To describe the entire HMM, the following five elements
should be elaborated:
a. N is a state of a model, defined as follows:
𝑆𝑆 = {𝑆𝑆1, … , 𝑆𝑆𝑁𝑁} (1)
b. M is symbol representing observation per state 𝑉𝑉 = {𝑣𝑣1, … , 𝑣𝑣𝑀𝑀}. The observation has continuous value as
the M value is infinity.
c. Probability distribution of transition state 𝐴𝐴 = �𝑎𝑎𝑖𝑖𝑖𝑖�, 𝑎𝑎𝑖𝑖𝑖𝑖 stands for state probability at t+1 symbolized as
𝑆𝑆𝑗𝑗, given when state in time t valued 𝑆𝑆𝑗𝑗.
𝑎𝑎𝑖𝑖𝑖𝑖 = 𝑝𝑝{𝑞𝑞𝑡𝑡+1 = 𝑗𝑗|𝑞𝑞𝑡𝑡 = 𝑖𝑖}, where 1≤ 𝑖𝑖, 𝑗𝑗 ≤ 𝑁𝑁 (2)
The 𝑞𝑞𝑡𝑡 displays the current state. Transition probability should, meet the normal limit. 𝑎𝑎𝑖𝑖𝑖𝑖 ≥ 0, 1 ≤ 𝑖𝑖, 𝑗𝑗 ≤ 𝑁𝑁
and ∑ 𝑎𝑎𝑖𝑖𝑖𝑖 = 1, 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁.𝑁𝑁
𝑗𝑗=1
d. The Observation of symbol probability distribution in each state, 𝐵𝐵 = �𝑏𝑏𝑗𝑗(𝑘𝑘)� where 𝑏𝑏𝑗𝑗(𝑘𝑘) serves as
probability of symbol 𝑣𝑣𝑘𝑘 occurred in state Sj.
𝑏𝑏𝑗𝑗(𝑘𝑘) = 𝑝𝑝{𝑜𝑜𝑡𝑡 = 𝑣𝑣𝑘𝑘|𝑞𝑞𝑡𝑡 = 𝑗𝑗}, 1≤ 𝑗𝑗 ≤ 𝑁𝑁, 1≤ 𝑘𝑘 ≤ 𝑀𝑀 (3)
𝑣𝑣𝑘𝑘 shows symbol in observation 𝑘𝑘 with alphabet and 𝑜𝑜𝑡𝑡 serve as current vector parameter. Following
stochastic limit must be met 𝑏𝑏𝑗𝑗(𝑘𝑘) ≥ 0, 1≤ 𝑗𝑗 ≤ 𝑁𝑁, 1≤ 𝑘𝑘 ≤ 𝑀𝑀 and ∑ 𝑏𝑏𝑗𝑗(𝑘𝑘) = 1, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁𝑀𝑀
𝑘𝑘=1 .
e. HMM is the first distribution of state 𝜋𝜋 = {𝜋𝜋𝑖𝑖}, 𝜋𝜋𝑖𝑖 stands for model probability in state 𝑆𝑆𝑖𝑖 in time 𝑡𝑡 = 0
𝜋𝜋𝑖𝑖 = 𝑝𝑝{𝑞𝑞1 = 𝑖𝑖} and 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁 (4)
In order to carry out further analysis, firstly two basic issues of HMM should be solved as follow:
a. Evaluation and forward and backward issues
Calculate the value by inserting scaling function.
− Scaling function
𝐶𝐶𝑡𝑡 =
1
∑ 𝑎𝑎𝑖𝑖(𝑡𝑡)𝑁𝑁
𝑖𝑖=1
(5)
− Forward
− Initialization :
𝑎𝑎�𝑡𝑡(1) = 𝐶𝐶1 𝑎𝑎𝑖𝑖(1)
𝑎𝑎𝑡𝑡(1) = 𝜋𝜋𝑖𝑖 𝑏𝑏𝑖𝑖( 𝑂𝑂1) (6)
− Recursion:
1 ≤ 𝑡𝑡 ≤ 𝑇𝑇 − 1, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁.
𝑎𝑎𝑡𝑡+1(𝑗𝑗) = 𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1) ∑ 𝑎𝑎𝑡𝑡(𝑖𝑖). 𝑎𝑎𝑖𝑖𝑖𝑖
𝑁𝑁
𝑖𝑖=1 ,
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275
2268
𝑎𝑎�𝑡𝑡+1(𝑗𝑗) = [∏ 𝐶𝐶𝑠𝑠
𝑡𝑡+1
𝑠𝑠=1 ]𝑎𝑎𝑡𝑡+1(𝑗𝑗), (7)
− Termination :
log[ 𝑃𝑃( 𝑂𝑂|𝜆𝜆)] = − ∑ log 𝐶𝐶𝑡𝑡
𝑇𝑇
𝑡𝑡=1 (8)
− Backward
− Initialization :
𝛽𝛽̂𝑡𝑡(𝑇𝑇) = 𝐶𝐶𝑇𝑇 𝛽𝛽𝑖𝑖(𝑇𝑇)
𝛽𝛽𝑡𝑡(𝑇𝑇) = 1 (9)
− Recursion :
𝑡𝑡 = 𝑇𝑇 − 1, 𝑇𝑇 − 2, … , 1 ≤ 𝑖𝑖𝑖𝑖 ≤ 𝑁𝑁.
𝛽𝛽𝑡𝑡(𝑖𝑖) = ∑ 𝑎𝑎𝑖𝑖𝑖𝑖 𝑏𝑏𝑗𝑗( 𝑂𝑂𝑡𝑡+1) 𝛽𝛽𝑡𝑡+1(𝑖𝑖),𝑁𝑁
𝑖𝑖=1 (10)
b. Learning issue
Followings are the step to compute for solving learning issue:
𝛾𝛾𝑖𝑖(𝑡𝑡) =
𝑎𝑎�𝑖𝑖(𝑡𝑡)𝛽𝛽�𝑖𝑖(𝑡𝑡)
∑ 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝛽𝛽�𝑖𝑖(𝑡𝑡)𝑁𝑁
𝑖𝑖=1
(11)
𝜉𝜉𝑖𝑖𝑖𝑖(𝑡𝑡) =
𝑎𝑎�𝑖𝑖(𝑡𝑡)𝑎𝑎𝑖𝑖𝑖𝑖 𝛽𝛽�𝑖𝑖(𝑡𝑡+1)𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1)
∑ ∑ 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝑎𝑎𝑖𝑖𝑖𝑖 𝛽𝛽�𝑖𝑖(𝑡𝑡+1)𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1)𝑁𝑁
𝑗𝑗=1
𝑁𝑁
𝑖𝑖=1
(12)
Next step is re-estimating parameter A, B, and 𝜋𝜋:
𝑎𝑎�𝑖𝑖𝑖𝑖 =
∑ 𝜉𝜉𝑖𝑖𝑖𝑖
𝑘𝑘
(𝑡𝑡)𝑇𝑇−1
𝑡𝑡=1
∑ 𝛾𝛾𝑖𝑖(𝑡𝑡)𝑇𝑇−1
𝑡𝑡=1
, 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁 (13)
𝑏𝑏�𝑖𝑖𝑖𝑖(𝑂𝑂𝑘𝑘) =
∑ 𝛾𝛾𝑡𝑡(𝑗𝑗)𝑇𝑇−1
𝑡𝑡=1 𝑑𝑑𝑑𝑑 𝑑𝑑 𝑑𝑑𝑑𝑑𝑑𝑑 𝑂𝑂𝑡𝑡=𝑉𝑉 𝑘𝑘
∑ 𝛾𝛾𝑡𝑡(𝑗𝑗)𝑇𝑇−1
𝑡𝑡=1
(14)
𝜋𝜋�𝑖𝑖 = 𝛾𝛾𝑖𝑖(𝑖𝑖),1 ≤ 𝑖𝑖 ≤ 𝑁𝑁 (15)
The process above should be carried out until a decent value is obtained [22-27].
2.3. Image pre-processing
In this research, a system has been designed to recognizing hand gestures through images. In general,
the design illustrated in Figure 1. The inputs were training images from a RGB-layered dataset. The inputs
were testing images from a RGB-layered dataset using DWT as feature extraction method. The final process
was to train the parameters of forward and backward training images in each class using HMM and the inputs
were feature vector from training images as seen in Figure 1 (a). In Figure 1 (b) the inputs had been testing
from a dataset that had a RGB layer then generated a contour image by image resizing and skin color
segmentation. The last had been processing with DWT method and HMM method, the process that happened
was calculating the forward parameters and determined the class from the highest probability.
The image pre-procesding based on Figure 1 was to resize the image to 128×128 pixels then second
step was change the image from RGB to YcbCr, Blue-layered. In this process, the input was RGB-layered hand
gesture image. The third step was segment the skin by setting up the pixel value threshold, the final result from
this process was a segmented image. The fourth step called denoising, where this process had been removing
the noise in the signal while maintain signal characteristics. The fifth step was to filled up the noise that cannot
be removed from the previous process. The sixth step was a dilation process to thicken the edge of
the segmented image from the last process so that the required pixels can be detected. The seventh step was
the erosion process which would eroded the edge of the segmented image from the last process so that
TELKOMNIKA Telecommun Comput El Control 
Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari)
2269
unnecessary pixels can be removed. The output was YCbCr-layered hand gesture contours. The main process
in pre-processing was a process of separating the background and objects, which in this research was the right
hand as seen in Figure 2.
(a) (b) (c)
(d) (e)
Figure 2. Hand gesture; (a) letter A, (b) letter B, (c) letter C, (d) point gesture, and (e) number 5
2.4. Feature extraction and classification
In this research, we used the DWT to find the hand features and to create a feature matrix from
an image to denote the matrix value of the image itself. The result was a contour image value within LL, LH, HL,
HH subband as an example seen in Table 5. The classification process with HMM as illustrated
in Figure 3, input was a combined vector from training image’s characteristic vector resulting from the feature
extraction process using DWT. In addition, HMM required A, B, π, state, and cluster values. It was
necessary to determine the required state value and calculated the cluster value as the 𝑂𝑂𝑇𝑇 observation value by
seeking the k-means value. The next process was calculating the forward variable, namely the process of
initialization [10, 28], recursion and termination [2].
Before the process, there was an added process of calculate the scaling function. Next was a backward
algorithm calculation. The process consisted of two stages, the initialization and recursion stages. Calculated
the variable ξ𝑡𝑡(𝑖𝑖, 𝑗𝑗) and 𝛾𝛾𝑡𝑡(𝑖𝑖) based on the variables defined in the previous forward and backward procedures.
Afterthe four variables was obrtained, reestimated the parameters A, B, and π. The final step was to take
the highest probability value of the testing image to be used as the final value of the hand gesture classification.
(a) (b)
Figure 1. System design flowchart; (a) training, (b) testing
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275
2270
(a) (b)
Figure 3. Flowchart of classification process; (a) training, (b) testing
3. RESULTS AND ANALYSIS
System testing was performed out from self collected dataset with an image that through a resizing
process measured at 128×128 pixels. The purpose of examining this system was to compare the accuracy,
system performances, and the best-performed parameters for hand gesture recognition systems. In this research,
the total image data used was 250 images from dataset. The hand gesture image consists of 5 word classes
which each consisted of 50 images.
3.1. Testing the system parameters
The parameter testing goal was to obtain the results of parameters with the best performance, more
spesific, the accuracy and timing of the system.
− Layer-type parameters impact
Done by using one type of layer for testing and then DWT feature extraction was performed and
classified using HMM as shown in Table 6. It can be seen that the best parameter was in the YCbCr layer.
In Table 6 it appears that the blue layer have the highest accuracy. This was due to the high frequency of pixels,
from 0 to 45 for high-intensity values at pixels 0 to 231 compared to other types of layers as in Figure 4.
− Sub-band-type parameters impact
Done by using layers that had the best performance in the previous test, the blue layer, and DWT
parameters, that was the four types of sub-band consisting in low-low (LL), low-high (LH), high-low (HL),
high-high (HH). The performance results in sub-chapter were described in Table 7 and can be seen that
the best parameter was in the LL sub-band type. The LL sub-band had a smoothest than other sub-band types
as shown in Figure 5.
− Decomposition level parameters impact
The previous test was conducted by analyzing the value of DWT decomposition level parameters
of level 1, 2, 3, and 4 in the dataset. The tests were carried out with the best parameters in the two previous
testing parameters, the blue layer and LL sub-band. The performance results were described in Table 8. Graphs
of characteristics that were influenced by level decomposition were shown in Figure 6. The changes of level
decomposition resulting in the acquired characteristics had no many characteristic. The smaller
the decomposition level, the faster the computational time would be. However, this was not the case with
TELKOMNIKA Telecommun Comput El Control 
Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari)
2271
accuracy, there were several values for level decomposition parameters that had clear characteristic values to
able to made different between classes.
Table 6. Layer-type parameters performances
Layer Total testing data Total correct data Accuracy (%) Computation time (s)
Red 100 50 50 46
Green 100 20 20 41
Blue 100 68 68 43
Grayscale 100 59 59 49
Binary 100 32 32 56
YCbCr (Cr) 100 53 53 44
HSV (V) 100 20 20 40
Table 7. Sub-band-type parameters performances
Sub-band Total testing data Total correct data Accuracy (%) Comp. time (s)
LL 100 68 68 43
LH 100 20 20 57
HL 100 20 20 54
HH 100 20 20 55
Figure 4. Histogram of blue layer images Figure 5. Illustration of images in sub-band
Table 8. Performances of decomposition level parameters
Level Total testing data Total correct data Accuracy (%) Computation time (s)
1 100 68 68 43
2 100 20 20 57
3 100 20 20 54
4 100 20 20 55
Figure 6. Feature values of various levels of decomposition
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275
2272
− Mother wavelet parameters impact
The tests were carried out with four types of mother wavelet parameters: Haar, db3, db5, and
db7. Tested it with the best parameters in the previous parameters: the Blue layer, LL sub-band, and
level 1 decomposition. The performance results were listed in Table 9. The best test results obtained from Haar
mother wavelet. In Figure 7, the graph shows that the different types of mother wavelets cause different forms
of characteristic in the same class. So, the used of certain mother wavelets in a system can provided
a uniqueness for each class so that they can be distinguished between each class
Table 9. Mother wavelet parameters performances
Mother Wavelet Total testing data Total correct data Accuracy (%) Computation time (s)
Haar 100 68 68 43
db3 100 20 20 43
db5 100 34 34 43
db7 100 50 50 44
Figure 7. Feature values of various mother wavelet
− Amount of cluster parameters impact
Done to test the cluster parameters used in HMM classification. Clusters that were being analyzed
ere 50, 100, 200, 400, 800, and 1000. Tested it with the best parameters from previous tests. In Table 10,
the best number obtained in 800. In Figure 8, it can be seen in the graph that the characteristics of the clusters
of 50 caused the characteristics at the same type obtained the small accuracy compared to 800 clusters.
Table 10. Amount of cluster parameters performances
Cluster total Total testing data Total correct data Accuracy (%) Computation time (s)
50 100 58 58 52
100 100 36 36 51
200 100 45 45 51
400 100 55 55 52
800 100 68 68 43
1000 100 25 25 53
− Number of state impact
The next step was to test the state parameters used in the HMM classification to system accuracy and
computation time. The state that were used: 4, 5, 25, 50, 100, and 150. The best performance results was
5 states and the rest were listed in Table 11. The best parameters with the number of similar states was 5 states.
This happened because the concept of HMM that basically broke down the data as many as the desired state.
So, if the value of the state used is not right, it will make it difficult to identify the test data.
TELKOMNIKA Telecommun Comput El Control 
Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari)
2273
Figure 8. Feature value in cluster 50
Table 11. Number of state impact performances
State total Total testing data Total correct data Accuracy (%) Computation time (s)
4 100 30 30 42,4
5 100 72 72 53
25 100 49 49 53
50 100 32 32 58
100 100 51 51 63
150 100 42 42 71
3.2. Testing the data batch
The data that tested were shown in Table 12. The conclusion was the recognition system with
the DWT and the HMM can identify well if the training and test images presented was between 60% and 40%
of all data in each class.
Table 12. Data batch testing performances
Data (Training- Test) Accuracy (%) Computation time (s)
40 – 10 20 22
30 – 20 72 53
25 – 25 20 53
3.3. Classification testing
Classification testing was done by comparing the accuracy and computation time of two classification
methods, K-Nearest Neighbor (K-NN) and HMM. The classification data was taken from the training data to
the training data and training data to the test data as shown in Table 13. Based on Table 12, HMM had a lower
accuracy when tested a training to training data, when compared to training to test data. This happened due to
the percentage of data when the training tested with training data is 50-50%. Whereas, when tested training to
the test data had a presentation of 60-40%. Based on Table 13, it can be seen that the test was also done with
other datasets with accuracy and computational time better than a performance with Marcel static hand posture
database [29, 30]. The dataset had a lower performance compared to the Author dataset that has a resize image
measured at 76×66 pixels which in this research was the right hand as seen in Figure 9.
Table 13. Classification testing performance on classification methods
Dataset Classification
Accuracy (%) Computation time (s)
Training Test Training Test
Dataset Sebastien K-NN 100% 100% 3.78 2.7
HMM 38% 58% 2.6 2.01
Writer’s Dataset K-NN 100% 100% 58 40
HMM 55% 72% 68 53
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275
2274
(a) (b) (c) (d) (e)
Picture Sebatien’s dataset of hand gesture;
(a) Letter A, (b) Letter B, (c) Letter C, (d) Point Gesture, (e) Number 5
4. CONCLUSION
This paper proposed a hand gesture recognition system that has 5 types of gestures: letter A, letter B,
letter C, point, and number 5 (five). The best parameters are blue layer, low-low sub-band, level 1
decomposition, Haar mother wavelet on DWT parameters, 800 cluster numbers and 5 state states on the HMM
parameter. The accuracy and computation time outcome from the system were 72% and 53 seconds
respectively. The best amount of data tested is on 30 training images and 20 test images. Layers that had high
accuracy would have a good contrast and brightness ratio. The dataset image had a high contrast and brightness
on the Blue layer due to the high frequency of pixels which are 0 to 45 for high-intensity values at pixels 0 to
231 compared to other layer.
DWT had three test parameters they are sub-band type, decomposition level, and mother wavelet.
The sub-band parameter was processed to obtain a smooth image characteristic in the LL sub-band.
Decomposition level parameters was the process of converting images into a simple form to obtain
unique characteristics of a good image. Next, different type of mother wavelet caused the uniqueness in
the characteristic. The HMM classification had two test parameters, the clusters and the states. Effect of cluster
parameters was taking the features to be used. The cluster values must be appropriated determinate because
the characteristic values of each class will be similar. In testing the classification for training to training had
a lower accuracy of 55% compared with testing training to data which is 72%. This happened due to
the percentage of data when the training tested with other training data was 50-50%. Whereas, when testing
training data to the test data had a presentation of 60%-40%. Cogitated and concluded to create our own dataset
because when Sebastien dataset was used, it just had the accuracy at 58% with the image size of 76×66 pixel.
Further, it had 2nd
level decomposition and db5 mother wavelet. The mentioned caused by feature extraction
process with 2nd
level DWT and classification with HMM encountered three times the compression process.
The consequences were the gestures taken from the images was so small so its harder to classified it. Hence,
to made the accuracy higher we produced our own dataset with a good brightess and contrast value. Thereafter,
the resolution was boosted to 128×128 pixels resulting the accuracy jumped up by 14% to 72%.
REFERENCE
[1] Astaneh A. A., Gheisari S., “Review and Comparison of Routing Metrics in Cognitive Radio Networks,” Emerg Sci
J., vol. 2, no. 4, pp. 191-201, 2018.
[2] Buono A., Ramdhan A., Ruvinna, “Introduction of Indonesian Words with Hidden Markov Model (HMM) Using the
Baum-Welch Algorithm (In Bahasa: Pengenalan Kata Berbahasa Indonesia dengan Hidden Markov Model (HMM)
Menggunakan Algoritme Baum-Welch),” Jurnal Ilmu Komputer, vol. 6, no. 2, pp. 32-40, 2008.
[3] Daniel J., Martin J. H., “Speech and Language Processing an introduction to natural language processing,
computational linguistics, and speech recognition,” PEARSON, Second Edition, 2018.
[4] Fink G. A., “Markov Models for Pattern Recognition,” Springer London, Secon Edition, 2014.
[5] Gopi E. S., “Digital Speech Processing Using Matlab,” 2014. [Online]. Available: http://link.springer.com/10.1007/978-81-
322-1677-3
[6] Jamaludin A., Huda A. F., Sahyandari R., “Introduction of Dead Noon Law Using the Hidden Markov Model (In Bahasa:
Pengenalan Lafal Hukum Nun Mati Menggunakan Hidden Markov Model,” LOGIK@, vol. 6, no. 1, pp. 1-10, 2016.
[7] Keskin C., Erkan A., Akarun L., “Real time hand tracking and 3D gesture recognition for interactive interfaces using
HMM,” Proceedings of International Conference on Artificial Neural Networks, 2003.
[8] Mardhiyya A., Hidayat B., Aulia S., “Hand writing detection using adaptive segmentation and hidden markov model
methods (In Bahasa: Deteksi tulisan tangan menggunakan metode segmentasi adaptif dan hidden markov model,”
Conference: CITEE 2015, at Yogyakarya, vol. 7, 2015.
TELKOMNIKA Telecommun Comput El Control 
Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari)
2275
[9] Mehrinejad Khotbehsara E., Safari H., “A Systematic Review of Affective Factors on Locating Specialized Hospitals,”
Civil Engineering Journal, vol. 4, no. 9, pp. 2210-2217, 2018.
[10] Z. Moghaddam and M. Piccardi, "Training Initialization of Hidden Markov Models in Human Action Recognition,"
in IEEE Transactions on Automation Science and Engineering, vol. 11, no. 2, pp. 394-408, April 2014.
[11] Gamil Y., Abdul Rahman I., “Identification of Causes and Effects of Poor Communication in Construction Industry:
A Theoretical Review,” Emerg Sci J., vol. 1, no. 4, pp. 239-247, 2017.
[12] Omidi A., Karami R., Emadi P. S., Moradi H., “Design of the Low Noise Amplifier Circuit in Band L for Improve the
Gain and Circuit Stability,” Emerg Sci J., vol. 1, no. 4, pp. 192-200, 2017.
[13] Sergeevich K. D., “Wireless Video Monitoring of the Megacities Transport Infrastructure,” Civ. Eng. J., vol. 5,
no. 5, pp. 1033-1040, 2019.
[14] Agarwal R., Raman B., Mittal A., “Hand Gesture Recognition using Discrete Wavelet Transform and Support Vector
Machine,” 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015.
[15] Sifuzzaman M., Islam M. R., Ali M. Z., “Application of Wavelet Transform and its Advantages Compared to Fourier
Transform,” J. Phys. Sci., vol. 13, 2009.
[16] Prasetyo M. E. B., “Basic Theory of the Hidden Markov Model (in Bahasa: Teori Dasar Hidden Markov Model),”
Makal Probab Stat STEI, 2011. [Online]. Available: http://informatika.stei.itb.ac.id/~rinaldi.munir/Probstat/2010-
2011 /Makalah2010/MakalahProbstat2010-025.pdf
[17] R. L. Vieriu, I. Mironicǎ, and B. T. Goras, “Background invariant static hand gesture recognition based on Hidden
Markov Models,” International Symposium on Signals, Circuits and Systems ISSCS2013, 2013.
[18] Gonzalez R. C., Woods R. E., “Digital Image Processing,” Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 3rd
Edition, 2006.
[19] Liu C. L., “A Tutorial of the Wavelet Transform,” NTUEE, 2010.
[20] Suci A., Arif S., “Handwriting recognition of Hiragana characters using Dct, Dwt, and K-Nearest Neighbor (In Bahasa:
Pengenalan Tulisan Tangan Karakter Hiragana menggunakan Dct, Dwt, dan K-Nearest Neighbor), Jurnal Elektro dan
Telekomunikasi Terapan, vol. 4, no. 1, pp. 467-476, 2017.
[21] Kouemou G. L., “History and Theoretical Basics of Hidden Markov Models, Hidden Markov Models, Theory and
Applications, Przemyslaw Dymarski,” IntechOpen, pp. 3-26, 2011.
[22] Firdaniza, Gusriani N., Akmal, “Hidden Markov Model,” Prosiding: Seminar Nasional Matematika dan Pendidikan
Matematika, 2006.
[23] Giron-sierra J. M., “Digital Signal Processing with Matlab Examples,” Signals & Communication, 2017.
[24] Khiatani D., Ghose U., “Weather forecasting using Hidden Markov Model,” 2017 International Conference on
Computing and Communication Technologies for Smart Nation, 2017.
[25] Mulyana S., Afiahayati, Surya W. A., “Application of Hidden Markov Model in Clustering Globin Protein Sequence
(In Bahasa: Penerapan Hidden Markov Model Dalam Clustering Sequence Protein Globin,” Prosiding Seminar
Nasional Teknoin, 2008.
[26] Petrov Y., “Hidden Markov Models, Theory and Applications,” PLoS One, 2012.
[27] Ikhsan, L. Novamizanti, I. N. A. Ramatryana, “Automatic musical genre classification of audio using Hidden Markov
Model,” 2nd International Conference on Information and Communication Technology (ICoICT), 2014. Available
from: doi: 10.1109/ICoICT.2014.6914095
[28] K. Nathan, A. Senior and J. Subrahmonia, "Initialization of hidden Markov models for unconstrained on-line
handwriting recognition," 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing
Conference Proceedings, Atlanta, GA, USA, pp. 3502-3505 vol. 6, 1996.
[29] Marcel S., “Hand posture recognition in a body-face centered space,” Proceedings of the Conference on Human
Factors in Computer Systems, 1999.
[30] E. B. Candrasari, L. Novamizanti, and S. Aulia, “Discrete Wavelet Transform on static hand gesture recognition,”
J. Phys. Conf. Ser., vol. 1367, no. 1, 2019. Available from: doi: 10.1088/1742-6596/1367/1/012022

More Related Content

What's hot

Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)VARUN KUMAR
 
Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss function Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss function ijscmcj
 
Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss functionEstimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss functionijscmcj
 
Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)VARUN KUMAR
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...CSCJournals
 
Image processing
Image processingImage processing
Image processingmaheshpene
 
SmoothedAggregation
SmoothedAggregationSmoothedAggregation
SmoothedAggregationTingting Sun
 
Digital Image Processing (Lab 07)
Digital Image Processing (Lab 07)Digital Image Processing (Lab 07)
Digital Image Processing (Lab 07)Moe Moe Myint
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programmingGopi Saiteja
 
Computer graphic
Computer graphicComputer graphic
Computer graphicnusratema1
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...IJORCS
 
Image Processing using Matlab ( using a built in Highboost filtering,averagin...
Image Processing using Matlab ( using a built in Highboost filtering,averagin...Image Processing using Matlab ( using a built in Highboost filtering,averagin...
Image Processing using Matlab ( using a built in Highboost filtering,averagin...Majd Khaleel
 
Digital Image Processing (Lab 05)
Digital Image Processing (Lab 05)Digital Image Processing (Lab 05)
Digital Image Processing (Lab 05)Moe Moe Myint
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionAnish Patel
 
beyond linear programming: mathematical programming extensions
beyond linear programming: mathematical programming extensionsbeyond linear programming: mathematical programming extensions
beyond linear programming: mathematical programming extensionsAngelica Angelo Ocon
 
Two algorithms to accelerate training of back-propagation neural networks
Two algorithms to accelerate training of back-propagation neural networksTwo algorithms to accelerate training of back-propagation neural networks
Two algorithms to accelerate training of back-propagation neural networksESCOM
 

What's hot (19)

Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)Lecture 8 (Stereo imaging) (Digital Image Processing)
Lecture 8 (Stereo imaging) (Digital Image Processing)
 
Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss function Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss function
 
Estimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss functionEstimation of mean and its function using asymmetric loss function
Estimation of mean and its function using asymmetric loss function
 
Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)Lecture 9 (Digital Image Processing)
Lecture 9 (Digital Image Processing)
 
Dynamic pgmming
Dynamic pgmmingDynamic pgmming
Dynamic pgmming
 
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
Segmentation by Fusion of Self-Adaptive SFCM Cluster in Multi-Color Space Com...
 
Image processing
Image processingImage processing
Image processing
 
SmoothedAggregation
SmoothedAggregationSmoothedAggregation
SmoothedAggregation
 
Digital Image Processing (Lab 07)
Digital Image Processing (Lab 07)Digital Image Processing (Lab 07)
Digital Image Processing (Lab 07)
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Computer graphic
Computer graphicComputer graphic
Computer graphic
 
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...
 
Image Processing using Matlab ( using a built in Highboost filtering,averagin...
Image Processing using Matlab ( using a built in Highboost filtering,averagin...Image Processing using Matlab ( using a built in Highboost filtering,averagin...
Image Processing using Matlab ( using a built in Highboost filtering,averagin...
 
Digital Image Processing (Lab 05)
Digital Image Processing (Lab 05)Digital Image Processing (Lab 05)
Digital Image Processing (Lab 05)
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Data Structure and Algorithm - Divide and Conquer
Data Structure and Algorithm - Divide and ConquerData Structure and Algorithm - Divide and Conquer
Data Structure and Algorithm - Divide and Conquer
 
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer VisionSimple Pendulum Experiment and Automatic Survey Grading using Computer Vision
Simple Pendulum Experiment and Automatic Survey Grading using Computer Vision
 
beyond linear programming: mathematical programming extensions
beyond linear programming: mathematical programming extensionsbeyond linear programming: mathematical programming extensions
beyond linear programming: mathematical programming extensions
 
Two algorithms to accelerate training of back-propagation neural networks
Two algorithms to accelerate training of back-propagation neural networksTwo algorithms to accelerate training of back-propagation neural networks
Two algorithms to accelerate training of back-propagation neural networks
 

Similar to Hand gesture recognition using DWT and HMM

SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESSURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESZac Darcy
 
Method for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Method for a Simple Encryption of Images Based on the Chaotic Map of BernoulliMethod for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Method for a Simple Encryption of Images Based on the Chaotic Map of BernoulliAIRCC Publishing Corporation
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIAIRCC Publishing Corporation
 
4 CG_U1_M3_PPT_4 DDA.pptx
4 CG_U1_M3_PPT_4 DDA.pptx4 CG_U1_M3_PPT_4 DDA.pptx
4 CG_U1_M3_PPT_4 DDA.pptxssuser255bf1
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesIJERA Editor
 
Optimization of a 2D localization system of a moving object based on the prop...
Optimization of a 2D localization system of a moving object based on the prop...Optimization of a 2D localization system of a moving object based on the prop...
Optimization of a 2D localization system of a moving object based on the prop...IRJET Journal
 
Faster Interleaved Modular Multiplier Based on Sign Detection
Faster Interleaved Modular Multiplier Based on Sign DetectionFaster Interleaved Modular Multiplier Based on Sign Detection
Faster Interleaved Modular Multiplier Based on Sign DetectionVLSICS Design
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171Yaxin Liu
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAScientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAAhmed Gamal Abdel Gawad
 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMTELKOMNIKA JOURNAL
 
An artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancerAn artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancerTELKOMNIKA JOURNAL
 
Image Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS AlgorithmImage Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS AlgorithmIRJET Journal
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...TELKOMNIKA JOURNAL
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE TechniquePerformance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE TechniqueIJMER
 

Similar to Hand gesture recognition using DWT and HMM (20)

SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESSURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
 
Method for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Method for a Simple Encryption of Images Based on the Chaotic Map of BernoulliMethod for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
Method for a Simple Encryption of Images Based on the Chaotic Map of Bernoulli
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
 
4 CG_U1_M3_PPT_4 DDA.pptx
4 CG_U1_M3_PPT_4 DDA.pptx4 CG_U1_M3_PPT_4 DDA.pptx
4 CG_U1_M3_PPT_4 DDA.pptx
 
Comparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition TechniquesComparative Analysis of Hand Gesture Recognition Techniques
Comparative Analysis of Hand Gesture Recognition Techniques
 
Optimization of a 2D localization system of a moving object based on the prop...
Optimization of a 2D localization system of a moving object based on the prop...Optimization of a 2D localization system of a moving object based on the prop...
Optimization of a 2D localization system of a moving object based on the prop...
 
Faster Interleaved Modular Multiplier Based on Sign Detection
Faster Interleaved Modular Multiplier Based on Sign DetectionFaster Interleaved Modular Multiplier Based on Sign Detection
Faster Interleaved Modular Multiplier Based on Sign Detection
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
 
All projects
All projectsAll projects
All projects
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
CMT
CMTCMT
CMT
 
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAScientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
 
Eigenfaces
EigenfacesEigenfaces
Eigenfaces
 
Face recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVMFace recognition based on curvelets, invariant moments features and SVM
Face recognition based on curvelets, invariant moments features and SVM
 
An artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancerAn artificial neural network approach for detecting skin cancer
An artificial neural network approach for detecting skin cancer
 
Image Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS AlgorithmImage Compression using DPCM with LMS Algorithm
Image Compression using DPCM with LMS Algorithm
 
paper
paperpaper
paper
 
Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...Stereo matching algorithm using census transform and segment tree for depth e...
Stereo matching algorithm using census transform and segment tree for depth e...
 
Performance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE TechniquePerformance of MMSE Denoise Signal Using LS-MMSE Technique
Performance of MMSE Denoise Signal Using LS-MMSE Technique
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
ResNet-n/DR: Automated diagnosis of diabetic retinopathy using a residual neu...
 

Recently uploaded

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Hand gesture recognition using DWT and HMM

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 5, October 2020, pp. 2265~2275 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i5.13725  2265 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Hand gesture recognition using discrete wavelet transform and hidden Markov models Erizka Banuwati Candrasari, Ledya Novamizanti, Suci Aulia Telkom University, Indonesia Article Info ABSTRACT Article history: Received Jul 25, 2019 Revised Mar 30, 2020 Accepted May 1, 2020 Gesture recognition based on computer-vision is an important part of human-computer interaction. But it lacks in several points, that was image brightness, recognition time, and accuracy. Because of that goal of this research was to create a hand gesture recognition system that had good performances using discrete wavelet transform and hidden Markov models. The first process was pre-processing, which done by resizing the image to 128x128 pixels and then segmented the skin color. The second process was feature extraction using the discrete wavelet transform. The result was the feature value in the form of a feature vector from the image. The last process was gesture classification using hidden Markov models to calculate the highest probability of feature matrix which had obtained from the feature extraction process. The result of the system had 72% of accuracy using 150 training and 100 test data images that consist five gestures. The newness thing found in this experiment were the effect of acquisition and pre-processing. The accuracy had been escalated by 14% compared to Sebastien’s dataset at 58%. The increment effect propped by brightness and contrast value. Keywords: Discrete wavelet transform Hand gesture Recognition This is an open access article under the CC BY-SA license. Corresponding Author: Erizka Banuwati Candrasari, Telkom University, Telekomunikasi St., Terusan Buah Batu St., Sukapura, Dayeuhkolot, Bandung, West Java, 40257, Indonesia. Email: erizkabanuwatic@gmail.com 1. INTRODUCTION The technology can be used for human-physical recognition [1-10], one of which is the recognition of the hand that can be applied as a communication tool [11-13]. The previous research used DWT and support vector machine (SVM) classification [14]. In this study, they obtained 94% of accuracy where they did cross validation five times with 50 data samples from seven actions. Then when 231 samples were used for training data and the remaining 119 were used for test data, they obtained an accuracy of 93.27%. Tests also carried out with 256×256 pixel images with level 5 decomposition which produced an accuracy of 93.14%. DWT can provides the information of time and frequency simultaneously and wavelets can be arranged and adapted as needed [15]. HMM has the advantage at being able to overcome the problem of evaluation, inference, and learning [16]. HMM often used in various applications, an effective learning algorithm, and can handle variations in record structure [2]. Referring to the research [17], a static hand gesture recognition using the HMM has an average accuracy rate of 93.38%. The purpose of this research was to be able to design a hand gesture recognition system based on digital images using DWT as feature extraction and HMM as a classification algorithm. Then, test the results
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275 2266 and analyze the system performances. The problems contained in this research including how to make the system design and simulation of hand gesture recognition for dataset using the DWT method and HMM classification, how does the effect in changing the value of input parameters on system performances using DWT feature extraction methods and HMM classification, how is the performances, and how the accuracy and timing of computing system compared to. The data was self collected using own dataset consist of a collection of hand gesture images using smartphone with 13MP resolution. 2. RESEARCH METHOD 2.1. Discrete wavelet transform DWT method is utilized to conduct hand feature extraction. The method is used to create characteristic matrix of an image to represent value of the matrix of the related image. Explanation of the feature extraction process using DWT with example in Table 1. First, calculate the average value of pixle row of a hand gesture conture image as in Table 2 and the result is in Table 3. Second, calculate the average value of each pixel column set in Table 3 by inputing the previous calculation result illustrated in Table 4. Then, it would produce an output of image conture value sub-band LL, LH, HL, HH illustrated in Table 5. Final process, process of repetitive extraction of DWT characteristic will finish if every conture image data is succesfully extracted [18-21]. Table 1. 6x6 matrix sample Matrix Sample 135 120 90 98 132 122 140 126 95 94 121 114 144 129 88 90 119 111 129 121 85 78 109 109 116 106 73 72 106 99 98 80 50 53 88 79 Table 2. Illustration of calculation process of average pixel pair based on the row Pixel Pair 135 + 120 2 90 + 98 2 132 + 122 2 135 − 120 2 90 − 98 2 132 − 122 2 140 + 126 2 95 + 94 2 121 + 114 2 140 − 126 2 95 − 94 2 121 − 114 2 144 + 129 2 88 + 90 2 119 + 111 2 144 − 129 2 88 − 90 2 119 − 111 2 129 + 121 2 85 + 78 2 109 + 109 2 129 − 121 2 85 − 78 2 109 − 109 2 116 + 106 2 73 + 72 2 106 + 99 2 116 − 106 2 73 − 72 2 106 − 99 2 98 + 80 2 50 + 53 2 88 + 79 2 98 − 80 2 50 − 53 2 88 − 79 2 Table 3. Illustration of pixel pair based on the row calculation result Pixel Pair 127.5 94 127 7.5 -4 5 133 94.5 117.5 7 0.5 3.5 136.5 89 115 7.5 -1 4 125 81.5 109 4 3.5 0 111 72.5 102.5 5 0.5 3.5 89 51.5 83.5 9 -1.5 4.5 Table 4. Illustration of the process of calculating the average pixel pair Pixel Pair 127.5 + 133 2 94 + 94.5 2 127 + 117.5 2 7.5 + 7 2 −4 + 0.5 2 5 + 3.5 2 … .. … .. … .. … .. … .. … .. … .. … .. … .. … .. … .. … .. 127.5 − 133 2 94 − 94.5 2 127 − 117.5 2 7.5 − 7 2 −4 − 0.5 2 5 − 3.5 2 … .. … .. … .. … .. … .. … .. … .. … .. … .. … .. … .. … ..
  • 3. TELKOMNIKA Telecommun Comput El Control  Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari) 2267 Table 5. Illustration of the result from calculating average pixel pair based on the column Pixel Pair LL 130.25 94.25 122.25 7.25 -1.75 4.25 HL 130.75 85.25 112 5.75 1.25 2 100 62 93 7 -0.5 4 LH -2.75 -0.25 4.75 0.25 -2.25 0.75 HH 5.75 3.75 3 1.75 -2.25 2 11 10.5 9.5 -2 1 -0.5 2.2. Hidden Markov models Each hidden Markov models are defined by state, probability state, probability of transition, probability of emission and the early probability. To describe the entire HMM, the following five elements should be elaborated: a. N is a state of a model, defined as follows: 𝑆𝑆 = {𝑆𝑆1, … , 𝑆𝑆𝑁𝑁} (1) b. M is symbol representing observation per state 𝑉𝑉 = {𝑣𝑣1, … , 𝑣𝑣𝑀𝑀}. The observation has continuous value as the M value is infinity. c. Probability distribution of transition state 𝐴𝐴 = �𝑎𝑎𝑖𝑖𝑖𝑖�, 𝑎𝑎𝑖𝑖𝑖𝑖 stands for state probability at t+1 symbolized as 𝑆𝑆𝑗𝑗, given when state in time t valued 𝑆𝑆𝑗𝑗. 𝑎𝑎𝑖𝑖𝑖𝑖 = 𝑝𝑝{𝑞𝑞𝑡𝑡+1 = 𝑗𝑗|𝑞𝑞𝑡𝑡 = 𝑖𝑖}, where 1≤ 𝑖𝑖, 𝑗𝑗 ≤ 𝑁𝑁 (2) The 𝑞𝑞𝑡𝑡 displays the current state. Transition probability should, meet the normal limit. 𝑎𝑎𝑖𝑖𝑖𝑖 ≥ 0, 1 ≤ 𝑖𝑖, 𝑗𝑗 ≤ 𝑁𝑁 and ∑ 𝑎𝑎𝑖𝑖𝑖𝑖 = 1, 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁.𝑁𝑁 𝑗𝑗=1 d. The Observation of symbol probability distribution in each state, 𝐵𝐵 = �𝑏𝑏𝑗𝑗(𝑘𝑘)� where 𝑏𝑏𝑗𝑗(𝑘𝑘) serves as probability of symbol 𝑣𝑣𝑘𝑘 occurred in state Sj. 𝑏𝑏𝑗𝑗(𝑘𝑘) = 𝑝𝑝{𝑜𝑜𝑡𝑡 = 𝑣𝑣𝑘𝑘|𝑞𝑞𝑡𝑡 = 𝑗𝑗}, 1≤ 𝑗𝑗 ≤ 𝑁𝑁, 1≤ 𝑘𝑘 ≤ 𝑀𝑀 (3) 𝑣𝑣𝑘𝑘 shows symbol in observation 𝑘𝑘 with alphabet and 𝑜𝑜𝑡𝑡 serve as current vector parameter. Following stochastic limit must be met 𝑏𝑏𝑗𝑗(𝑘𝑘) ≥ 0, 1≤ 𝑗𝑗 ≤ 𝑁𝑁, 1≤ 𝑘𝑘 ≤ 𝑀𝑀 and ∑ 𝑏𝑏𝑗𝑗(𝑘𝑘) = 1, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁𝑀𝑀 𝑘𝑘=1 . e. HMM is the first distribution of state 𝜋𝜋 = {𝜋𝜋𝑖𝑖}, 𝜋𝜋𝑖𝑖 stands for model probability in state 𝑆𝑆𝑖𝑖 in time 𝑡𝑡 = 0 𝜋𝜋𝑖𝑖 = 𝑝𝑝{𝑞𝑞1 = 𝑖𝑖} and 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁 (4) In order to carry out further analysis, firstly two basic issues of HMM should be solved as follow: a. Evaluation and forward and backward issues Calculate the value by inserting scaling function. − Scaling function 𝐶𝐶𝑡𝑡 = 1 ∑ 𝑎𝑎𝑖𝑖(𝑡𝑡)𝑁𝑁 𝑖𝑖=1 (5) − Forward − Initialization : 𝑎𝑎�𝑡𝑡(1) = 𝐶𝐶1 𝑎𝑎𝑖𝑖(1) 𝑎𝑎𝑡𝑡(1) = 𝜋𝜋𝑖𝑖 𝑏𝑏𝑖𝑖( 𝑂𝑂1) (6) − Recursion: 1 ≤ 𝑡𝑡 ≤ 𝑇𝑇 − 1, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁. 𝑎𝑎𝑡𝑡+1(𝑗𝑗) = 𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1) ∑ 𝑎𝑎𝑡𝑡(𝑖𝑖). 𝑎𝑎𝑖𝑖𝑖𝑖 𝑁𝑁 𝑖𝑖=1 ,
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275 2268 𝑎𝑎�𝑡𝑡+1(𝑗𝑗) = [∏ 𝐶𝐶𝑠𝑠 𝑡𝑡+1 𝑠𝑠=1 ]𝑎𝑎𝑡𝑡+1(𝑗𝑗), (7) − Termination : log[ 𝑃𝑃( 𝑂𝑂|𝜆𝜆)] = − ∑ log 𝐶𝐶𝑡𝑡 𝑇𝑇 𝑡𝑡=1 (8) − Backward − Initialization : 𝛽𝛽̂𝑡𝑡(𝑇𝑇) = 𝐶𝐶𝑇𝑇 𝛽𝛽𝑖𝑖(𝑇𝑇) 𝛽𝛽𝑡𝑡(𝑇𝑇) = 1 (9) − Recursion : 𝑡𝑡 = 𝑇𝑇 − 1, 𝑇𝑇 − 2, … , 1 ≤ 𝑖𝑖𝑖𝑖 ≤ 𝑁𝑁. 𝛽𝛽𝑡𝑡(𝑖𝑖) = ∑ 𝑎𝑎𝑖𝑖𝑖𝑖 𝑏𝑏𝑗𝑗( 𝑂𝑂𝑡𝑡+1) 𝛽𝛽𝑡𝑡+1(𝑖𝑖),𝑁𝑁 𝑖𝑖=1 (10) b. Learning issue Followings are the step to compute for solving learning issue: 𝛾𝛾𝑖𝑖(𝑡𝑡) = 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝛽𝛽�𝑖𝑖(𝑡𝑡) ∑ 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝛽𝛽�𝑖𝑖(𝑡𝑡)𝑁𝑁 𝑖𝑖=1 (11) 𝜉𝜉𝑖𝑖𝑖𝑖(𝑡𝑡) = 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝑎𝑎𝑖𝑖𝑖𝑖 𝛽𝛽�𝑖𝑖(𝑡𝑡+1)𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1) ∑ ∑ 𝑎𝑎�𝑖𝑖(𝑡𝑡)𝑎𝑎𝑖𝑖𝑖𝑖 𝛽𝛽�𝑖𝑖(𝑡𝑡+1)𝑏𝑏𝑗𝑗(𝑂𝑂𝑡𝑡+1)𝑁𝑁 𝑗𝑗=1 𝑁𝑁 𝑖𝑖=1 (12) Next step is re-estimating parameter A, B, and 𝜋𝜋: 𝑎𝑎�𝑖𝑖𝑖𝑖 = ∑ 𝜉𝜉𝑖𝑖𝑖𝑖 𝑘𝑘 (𝑡𝑡)𝑇𝑇−1 𝑡𝑡=1 ∑ 𝛾𝛾𝑖𝑖(𝑡𝑡)𝑇𝑇−1 𝑡𝑡=1 , 1 ≤ 𝑖𝑖 ≤ 𝑁𝑁, 1 ≤ 𝑗𝑗 ≤ 𝑁𝑁 (13) 𝑏𝑏�𝑖𝑖𝑖𝑖(𝑂𝑂𝑘𝑘) = ∑ 𝛾𝛾𝑡𝑡(𝑗𝑗)𝑇𝑇−1 𝑡𝑡=1 𝑑𝑑𝑑𝑑 𝑑𝑑 𝑑𝑑𝑑𝑑𝑑𝑑 𝑂𝑂𝑡𝑡=𝑉𝑉 𝑘𝑘 ∑ 𝛾𝛾𝑡𝑡(𝑗𝑗)𝑇𝑇−1 𝑡𝑡=1 (14) 𝜋𝜋�𝑖𝑖 = 𝛾𝛾𝑖𝑖(𝑖𝑖),1 ≤ 𝑖𝑖 ≤ 𝑁𝑁 (15) The process above should be carried out until a decent value is obtained [22-27]. 2.3. Image pre-processing In this research, a system has been designed to recognizing hand gestures through images. In general, the design illustrated in Figure 1. The inputs were training images from a RGB-layered dataset. The inputs were testing images from a RGB-layered dataset using DWT as feature extraction method. The final process was to train the parameters of forward and backward training images in each class using HMM and the inputs were feature vector from training images as seen in Figure 1 (a). In Figure 1 (b) the inputs had been testing from a dataset that had a RGB layer then generated a contour image by image resizing and skin color segmentation. The last had been processing with DWT method and HMM method, the process that happened was calculating the forward parameters and determined the class from the highest probability. The image pre-procesding based on Figure 1 was to resize the image to 128×128 pixels then second step was change the image from RGB to YcbCr, Blue-layered. In this process, the input was RGB-layered hand gesture image. The third step was segment the skin by setting up the pixel value threshold, the final result from this process was a segmented image. The fourth step called denoising, where this process had been removing the noise in the signal while maintain signal characteristics. The fifth step was to filled up the noise that cannot be removed from the previous process. The sixth step was a dilation process to thicken the edge of the segmented image from the last process so that the required pixels can be detected. The seventh step was the erosion process which would eroded the edge of the segmented image from the last process so that
  • 5. TELKOMNIKA Telecommun Comput El Control  Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari) 2269 unnecessary pixels can be removed. The output was YCbCr-layered hand gesture contours. The main process in pre-processing was a process of separating the background and objects, which in this research was the right hand as seen in Figure 2. (a) (b) (c) (d) (e) Figure 2. Hand gesture; (a) letter A, (b) letter B, (c) letter C, (d) point gesture, and (e) number 5 2.4. Feature extraction and classification In this research, we used the DWT to find the hand features and to create a feature matrix from an image to denote the matrix value of the image itself. The result was a contour image value within LL, LH, HL, HH subband as an example seen in Table 5. The classification process with HMM as illustrated in Figure 3, input was a combined vector from training image’s characteristic vector resulting from the feature extraction process using DWT. In addition, HMM required A, B, π, state, and cluster values. It was necessary to determine the required state value and calculated the cluster value as the 𝑂𝑂𝑇𝑇 observation value by seeking the k-means value. The next process was calculating the forward variable, namely the process of initialization [10, 28], recursion and termination [2]. Before the process, there was an added process of calculate the scaling function. Next was a backward algorithm calculation. The process consisted of two stages, the initialization and recursion stages. Calculated the variable ξ𝑡𝑡(𝑖𝑖, 𝑗𝑗) and 𝛾𝛾𝑡𝑡(𝑖𝑖) based on the variables defined in the previous forward and backward procedures. Afterthe four variables was obrtained, reestimated the parameters A, B, and π. The final step was to take the highest probability value of the testing image to be used as the final value of the hand gesture classification. (a) (b) Figure 1. System design flowchart; (a) training, (b) testing
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275 2270 (a) (b) Figure 3. Flowchart of classification process; (a) training, (b) testing 3. RESULTS AND ANALYSIS System testing was performed out from self collected dataset with an image that through a resizing process measured at 128×128 pixels. The purpose of examining this system was to compare the accuracy, system performances, and the best-performed parameters for hand gesture recognition systems. In this research, the total image data used was 250 images from dataset. The hand gesture image consists of 5 word classes which each consisted of 50 images. 3.1. Testing the system parameters The parameter testing goal was to obtain the results of parameters with the best performance, more spesific, the accuracy and timing of the system. − Layer-type parameters impact Done by using one type of layer for testing and then DWT feature extraction was performed and classified using HMM as shown in Table 6. It can be seen that the best parameter was in the YCbCr layer. In Table 6 it appears that the blue layer have the highest accuracy. This was due to the high frequency of pixels, from 0 to 45 for high-intensity values at pixels 0 to 231 compared to other types of layers as in Figure 4. − Sub-band-type parameters impact Done by using layers that had the best performance in the previous test, the blue layer, and DWT parameters, that was the four types of sub-band consisting in low-low (LL), low-high (LH), high-low (HL), high-high (HH). The performance results in sub-chapter were described in Table 7 and can be seen that the best parameter was in the LL sub-band type. The LL sub-band had a smoothest than other sub-band types as shown in Figure 5. − Decomposition level parameters impact The previous test was conducted by analyzing the value of DWT decomposition level parameters of level 1, 2, 3, and 4 in the dataset. The tests were carried out with the best parameters in the two previous testing parameters, the blue layer and LL sub-band. The performance results were described in Table 8. Graphs of characteristics that were influenced by level decomposition were shown in Figure 6. The changes of level decomposition resulting in the acquired characteristics had no many characteristic. The smaller the decomposition level, the faster the computational time would be. However, this was not the case with
  • 7. TELKOMNIKA Telecommun Comput El Control  Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari) 2271 accuracy, there were several values for level decomposition parameters that had clear characteristic values to able to made different between classes. Table 6. Layer-type parameters performances Layer Total testing data Total correct data Accuracy (%) Computation time (s) Red 100 50 50 46 Green 100 20 20 41 Blue 100 68 68 43 Grayscale 100 59 59 49 Binary 100 32 32 56 YCbCr (Cr) 100 53 53 44 HSV (V) 100 20 20 40 Table 7. Sub-band-type parameters performances Sub-band Total testing data Total correct data Accuracy (%) Comp. time (s) LL 100 68 68 43 LH 100 20 20 57 HL 100 20 20 54 HH 100 20 20 55 Figure 4. Histogram of blue layer images Figure 5. Illustration of images in sub-band Table 8. Performances of decomposition level parameters Level Total testing data Total correct data Accuracy (%) Computation time (s) 1 100 68 68 43 2 100 20 20 57 3 100 20 20 54 4 100 20 20 55 Figure 6. Feature values of various levels of decomposition
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275 2272 − Mother wavelet parameters impact The tests were carried out with four types of mother wavelet parameters: Haar, db3, db5, and db7. Tested it with the best parameters in the previous parameters: the Blue layer, LL sub-band, and level 1 decomposition. The performance results were listed in Table 9. The best test results obtained from Haar mother wavelet. In Figure 7, the graph shows that the different types of mother wavelets cause different forms of characteristic in the same class. So, the used of certain mother wavelets in a system can provided a uniqueness for each class so that they can be distinguished between each class Table 9. Mother wavelet parameters performances Mother Wavelet Total testing data Total correct data Accuracy (%) Computation time (s) Haar 100 68 68 43 db3 100 20 20 43 db5 100 34 34 43 db7 100 50 50 44 Figure 7. Feature values of various mother wavelet − Amount of cluster parameters impact Done to test the cluster parameters used in HMM classification. Clusters that were being analyzed ere 50, 100, 200, 400, 800, and 1000. Tested it with the best parameters from previous tests. In Table 10, the best number obtained in 800. In Figure 8, it can be seen in the graph that the characteristics of the clusters of 50 caused the characteristics at the same type obtained the small accuracy compared to 800 clusters. Table 10. Amount of cluster parameters performances Cluster total Total testing data Total correct data Accuracy (%) Computation time (s) 50 100 58 58 52 100 100 36 36 51 200 100 45 45 51 400 100 55 55 52 800 100 68 68 43 1000 100 25 25 53 − Number of state impact The next step was to test the state parameters used in the HMM classification to system accuracy and computation time. The state that were used: 4, 5, 25, 50, 100, and 150. The best performance results was 5 states and the rest were listed in Table 11. The best parameters with the number of similar states was 5 states. This happened because the concept of HMM that basically broke down the data as many as the desired state. So, if the value of the state used is not right, it will make it difficult to identify the test data.
  • 9. TELKOMNIKA Telecommun Comput El Control  Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari) 2273 Figure 8. Feature value in cluster 50 Table 11. Number of state impact performances State total Total testing data Total correct data Accuracy (%) Computation time (s) 4 100 30 30 42,4 5 100 72 72 53 25 100 49 49 53 50 100 32 32 58 100 100 51 51 63 150 100 42 42 71 3.2. Testing the data batch The data that tested were shown in Table 12. The conclusion was the recognition system with the DWT and the HMM can identify well if the training and test images presented was between 60% and 40% of all data in each class. Table 12. Data batch testing performances Data (Training- Test) Accuracy (%) Computation time (s) 40 – 10 20 22 30 – 20 72 53 25 – 25 20 53 3.3. Classification testing Classification testing was done by comparing the accuracy and computation time of two classification methods, K-Nearest Neighbor (K-NN) and HMM. The classification data was taken from the training data to the training data and training data to the test data as shown in Table 13. Based on Table 12, HMM had a lower accuracy when tested a training to training data, when compared to training to test data. This happened due to the percentage of data when the training tested with training data is 50-50%. Whereas, when tested training to the test data had a presentation of 60-40%. Based on Table 13, it can be seen that the test was also done with other datasets with accuracy and computational time better than a performance with Marcel static hand posture database [29, 30]. The dataset had a lower performance compared to the Author dataset that has a resize image measured at 76×66 pixels which in this research was the right hand as seen in Figure 9. Table 13. Classification testing performance on classification methods Dataset Classification Accuracy (%) Computation time (s) Training Test Training Test Dataset Sebastien K-NN 100% 100% 3.78 2.7 HMM 38% 58% 2.6 2.01 Writer’s Dataset K-NN 100% 100% 58 40 HMM 55% 72% 68 53
  • 10.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2265 - 2275 2274 (a) (b) (c) (d) (e) Picture Sebatien’s dataset of hand gesture; (a) Letter A, (b) Letter B, (c) Letter C, (d) Point Gesture, (e) Number 5 4. CONCLUSION This paper proposed a hand gesture recognition system that has 5 types of gestures: letter A, letter B, letter C, point, and number 5 (five). The best parameters are blue layer, low-low sub-band, level 1 decomposition, Haar mother wavelet on DWT parameters, 800 cluster numbers and 5 state states on the HMM parameter. The accuracy and computation time outcome from the system were 72% and 53 seconds respectively. The best amount of data tested is on 30 training images and 20 test images. Layers that had high accuracy would have a good contrast and brightness ratio. The dataset image had a high contrast and brightness on the Blue layer due to the high frequency of pixels which are 0 to 45 for high-intensity values at pixels 0 to 231 compared to other layer. DWT had three test parameters they are sub-band type, decomposition level, and mother wavelet. The sub-band parameter was processed to obtain a smooth image characteristic in the LL sub-band. Decomposition level parameters was the process of converting images into a simple form to obtain unique characteristics of a good image. Next, different type of mother wavelet caused the uniqueness in the characteristic. The HMM classification had two test parameters, the clusters and the states. Effect of cluster parameters was taking the features to be used. The cluster values must be appropriated determinate because the characteristic values of each class will be similar. In testing the classification for training to training had a lower accuracy of 55% compared with testing training to data which is 72%. This happened due to the percentage of data when the training tested with other training data was 50-50%. Whereas, when testing training data to the test data had a presentation of 60%-40%. Cogitated and concluded to create our own dataset because when Sebastien dataset was used, it just had the accuracy at 58% with the image size of 76×66 pixel. Further, it had 2nd level decomposition and db5 mother wavelet. The mentioned caused by feature extraction process with 2nd level DWT and classification with HMM encountered three times the compression process. The consequences were the gestures taken from the images was so small so its harder to classified it. Hence, to made the accuracy higher we produced our own dataset with a good brightess and contrast value. Thereafter, the resolution was boosted to 128×128 pixels resulting the accuracy jumped up by 14% to 72%. REFERENCE [1] Astaneh A. A., Gheisari S., “Review and Comparison of Routing Metrics in Cognitive Radio Networks,” Emerg Sci J., vol. 2, no. 4, pp. 191-201, 2018. [2] Buono A., Ramdhan A., Ruvinna, “Introduction of Indonesian Words with Hidden Markov Model (HMM) Using the Baum-Welch Algorithm (In Bahasa: Pengenalan Kata Berbahasa Indonesia dengan Hidden Markov Model (HMM) Menggunakan Algoritme Baum-Welch),” Jurnal Ilmu Komputer, vol. 6, no. 2, pp. 32-40, 2008. [3] Daniel J., Martin J. H., “Speech and Language Processing an introduction to natural language processing, computational linguistics, and speech recognition,” PEARSON, Second Edition, 2018. [4] Fink G. A., “Markov Models for Pattern Recognition,” Springer London, Secon Edition, 2014. [5] Gopi E. S., “Digital Speech Processing Using Matlab,” 2014. [Online]. Available: http://link.springer.com/10.1007/978-81- 322-1677-3 [6] Jamaludin A., Huda A. F., Sahyandari R., “Introduction of Dead Noon Law Using the Hidden Markov Model (In Bahasa: Pengenalan Lafal Hukum Nun Mati Menggunakan Hidden Markov Model,” LOGIK@, vol. 6, no. 1, pp. 1-10, 2016. [7] Keskin C., Erkan A., Akarun L., “Real time hand tracking and 3D gesture recognition for interactive interfaces using HMM,” Proceedings of International Conference on Artificial Neural Networks, 2003. [8] Mardhiyya A., Hidayat B., Aulia S., “Hand writing detection using adaptive segmentation and hidden markov model methods (In Bahasa: Deteksi tulisan tangan menggunakan metode segmentasi adaptif dan hidden markov model,” Conference: CITEE 2015, at Yogyakarya, vol. 7, 2015.
  • 11. TELKOMNIKA Telecommun Comput El Control  Hand gesture recognition using discrete wavelet transform and... (Erizka Banuwati Candrasari) 2275 [9] Mehrinejad Khotbehsara E., Safari H., “A Systematic Review of Affective Factors on Locating Specialized Hospitals,” Civil Engineering Journal, vol. 4, no. 9, pp. 2210-2217, 2018. [10] Z. Moghaddam and M. Piccardi, "Training Initialization of Hidden Markov Models in Human Action Recognition," in IEEE Transactions on Automation Science and Engineering, vol. 11, no. 2, pp. 394-408, April 2014. [11] Gamil Y., Abdul Rahman I., “Identification of Causes and Effects of Poor Communication in Construction Industry: A Theoretical Review,” Emerg Sci J., vol. 1, no. 4, pp. 239-247, 2017. [12] Omidi A., Karami R., Emadi P. S., Moradi H., “Design of the Low Noise Amplifier Circuit in Band L for Improve the Gain and Circuit Stability,” Emerg Sci J., vol. 1, no. 4, pp. 192-200, 2017. [13] Sergeevich K. D., “Wireless Video Monitoring of the Megacities Transport Infrastructure,” Civ. Eng. J., vol. 5, no. 5, pp. 1033-1040, 2019. [14] Agarwal R., Raman B., Mittal A., “Hand Gesture Recognition using Discrete Wavelet Transform and Support Vector Machine,” 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015. [15] Sifuzzaman M., Islam M. R., Ali M. Z., “Application of Wavelet Transform and its Advantages Compared to Fourier Transform,” J. Phys. Sci., vol. 13, 2009. [16] Prasetyo M. E. B., “Basic Theory of the Hidden Markov Model (in Bahasa: Teori Dasar Hidden Markov Model),” Makal Probab Stat STEI, 2011. [Online]. Available: http://informatika.stei.itb.ac.id/~rinaldi.munir/Probstat/2010- 2011 /Makalah2010/MakalahProbstat2010-025.pdf [17] R. L. Vieriu, I. Mironicǎ, and B. T. Goras, “Background invariant static hand gesture recognition based on Hidden Markov Models,” International Symposium on Signals, Circuits and Systems ISSCS2013, 2013. [18] Gonzalez R. C., Woods R. E., “Digital Image Processing,” Prentice-Hall, Inc. Upper Saddle River, NJ, USA, 3rd Edition, 2006. [19] Liu C. L., “A Tutorial of the Wavelet Transform,” NTUEE, 2010. [20] Suci A., Arif S., “Handwriting recognition of Hiragana characters using Dct, Dwt, and K-Nearest Neighbor (In Bahasa: Pengenalan Tulisan Tangan Karakter Hiragana menggunakan Dct, Dwt, dan K-Nearest Neighbor), Jurnal Elektro dan Telekomunikasi Terapan, vol. 4, no. 1, pp. 467-476, 2017. [21] Kouemou G. L., “History and Theoretical Basics of Hidden Markov Models, Hidden Markov Models, Theory and Applications, Przemyslaw Dymarski,” IntechOpen, pp. 3-26, 2011. [22] Firdaniza, Gusriani N., Akmal, “Hidden Markov Model,” Prosiding: Seminar Nasional Matematika dan Pendidikan Matematika, 2006. [23] Giron-sierra J. M., “Digital Signal Processing with Matlab Examples,” Signals & Communication, 2017. [24] Khiatani D., Ghose U., “Weather forecasting using Hidden Markov Model,” 2017 International Conference on Computing and Communication Technologies for Smart Nation, 2017. [25] Mulyana S., Afiahayati, Surya W. A., “Application of Hidden Markov Model in Clustering Globin Protein Sequence (In Bahasa: Penerapan Hidden Markov Model Dalam Clustering Sequence Protein Globin,” Prosiding Seminar Nasional Teknoin, 2008. [26] Petrov Y., “Hidden Markov Models, Theory and Applications,” PLoS One, 2012. [27] Ikhsan, L. Novamizanti, I. N. A. Ramatryana, “Automatic musical genre classification of audio using Hidden Markov Model,” 2nd International Conference on Information and Communication Technology (ICoICT), 2014. Available from: doi: 10.1109/ICoICT.2014.6914095 [28] K. Nathan, A. Senior and J. Subrahmonia, "Initialization of hidden Markov models for unconstrained on-line handwriting recognition," 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings, Atlanta, GA, USA, pp. 3502-3505 vol. 6, 1996. [29] Marcel S., “Hand posture recognition in a body-face centered space,” Proceedings of the Conference on Human Factors in Computer Systems, 1999. [30] E. B. Candrasari, L. Novamizanti, and S. Aulia, “Discrete Wavelet Transform on static hand gesture recognition,” J. Phys. Conf. Ser., vol. 1367, no. 1, 2019. Available from: doi: 10.1088/1742-6596/1367/1/012022