SlideShare une entreprise Scribd logo
1  sur  27
SIFT-BASED ARABIC SIGN LANGUAGE 
RECOGNITION (ArSL) SYSTEM 
By 
Alaa Tharwat1,3 
And 
Tarek Gaber2,3 
1Faculty of Eng. Suez Canal University, Ismailia, Egypt 
2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt 
3Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia
Introduction 
Proposed Method 
Agenda 
General framework 
Feature extraction 
Classification 
Experimental Results 
Conclusions 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia 
3
Introduction 
Proposed Method 
Agenda 
General framework 
Feature extraction 
Classification 
Experimental Results 
Conclusions 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia 
4
Introduction: Why ArSL 
• Help vocally disabled people 
to speak freely. 
• Easy way of communication 
with non-mute people. 
• ArSL is the natural language 
for deaf like spoken language 
to vocal
Introduction: Aim of the work 
 Design a sign language recognition approach to transcribe 
sign gestures into meaningful text or speech so that 
communication between deaf and hearing society can 
easily be made. 
الشارع السيارة
What is ArSL? 
 Translating ArSL to spoken language, i.e. translate 
hand gestures to Arabic characters 
 Sign Language hand formations: 
 Hand shape 
 Hand location 
 Hand movement 
 Hand orientation
Introduction: Types of ArSL 
1- Vision-based Approach 
Requires special set up for camera, but needs some 
preprocessing and computational to extract features. 
Extract Features 
Collect gestures 
Classification 
Decision
Introduction: Types of ARSL (Continue) 
2-ElectronicGlove-based Approach 
Inconvenience of gloves, but ease of signal extractions 
The Electronic-gloves consists of: 
• 22 sensors 
• Light weight 
• Flexible
Introduction 
Proposed Method 
Agenda 
General framework 
Feature extraction 
Classification 
Experimental Results 
Conclusions 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia 
10
Proposed Method: General Framework 
Training Images Testing Images 
SIFT Feature Extraction Method 
Feature Vectors 
Difference 
of 
Gaussian 
Pyramid 
KeyPoints 
detection 
Unreliable 
KeyPoints 
Eliminatio 
n 
Orientatio 
n 
Assignme 
nt 
Descriptor 
Computatio 
n 
Feature Vectors 
Matching LDA
Proposed Method: General Framework 
 Training phase 
 Collecting all training images (i.e. 
gestures of Arabic Sign Language). 
 Extracting the features using SIFT 
 Representing each image by one feature 
vector. 
 Applying a dimensionality reduction 
(e.g, LDA) to reduce the number 
features in the vector 
 Testing phase 
 Collecting the testing image, 
 Extract the features 
 Feature vector is projected on LDA 
space. 
 Applying machine learning techniques 
for classifying the test feature vector to 
decide whether the animal is identified 
or not).
Proposed Method: Feature Extraction 
Feature Extraction SIFT (Scale Invariant Feature Transform 
SIFT feature extraction algorithm 
consists of the following steps: 
• Creating the Difference of Gaussian Pyramid 
(Scale-Space Peak Selection) 
• Extrema Detection 
• Unreliable Keypoints Elimination 
• Orientation Assignment 
• Descriptor Computation Keypoints or Extrema 
extracted from one image 
(gesture) using SIFT 
algorithm
Proposed Method: Feature Extraction 
Feature Extraction SIFT (Scale Invariant Feature Transform 
Matching between two getures based on SIFT features
Proposed Method: Feature Extraction 
Feature Extraction SIFT (Scale Invariant Feature Transform 
The Number of features extracted by SIFT depends its 
parameters which has been considered in our experiment: 
• Peak Threshold (PeakThr) 
• patch size (Psize) 
• number of angels (Nangels) and number of bins (Nbins)
Proposed Method: Classification Techniques 
 We have used the following classifiers assess their performance 
with our approach : 
 SVM is one of the classifers which deals with a problem of high dimensional 
datasets and gives very good results. 
 K-NN: unknown patterns are distinguished based on the similarity to known 
samples 
 Nearest Neighbor: Its idea is extremely simple as it does not require learning
Introduction 
Proposed Method 
Agenda 
General framework 
Feature extraction 
Classification 
Experimental Results 
Conclusions 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia 
17
Experimental Results: Dataset 
 We have used 210 gray level images 
with size 200x200. 
 These images represent 30 Arabic 
characters, 7 images for each 
character). 
 The images are collected in different 
illumination, rotation, quality levels, 
and image partiality. 
A sample of collected ArSL gestures 
representing different characters .
Experimental Scenarios 
We have designed three experiment Scenarios: 
 To select the most suitable parameters. 
 To understand the effect of changing the 
number of training images. 
 To prove that our proposed method is 
robust against rotation 
 To prove that our proposed method is 
robust against occlusion.
Experimental Results 
Experimental Results – 1st Scenario: Selecting SIFT parameters 
PeakThr Psize Nangels 
Accuracy results (in %) of our approach based on different SIFT 
parameters 
Classifier 
s 
32x3 2 4 8 
2 
16x1 
6 
0 0.1 0.2 4x4 8x8 
NN 100 97.7 94.2 94.2 99.2 100 93.2 94.2 98.9 100 
K-NN 100 98.9 96.3 96.3 99.2 100 93.6 96.3 98.9 100 
SVM 100 99.2 98.9 97.7 100 100 94.2 96.3 98.9 100
Experimental Results 
Experimental Results – 2nd Scenario: Different Training No. of images 
Classier No. of Training Images 
5 3 1 
Min. Dist. 100 99.2 98.9 
k-NN (k=5) 100 98.9 98.9 
SVM 100 99. 98.9 
Accuracy results (in %) of our approach using different training 
images
Experimental Results 
Experimental Results – 3rd Scenario: Rotated images 
F.E.M. Matching Angles of rotation (o) 
0 45 90 135 180 225 270 315 
Min Dist. 100 98.9 97.8 96.7 100 97.8 100 98.9 
SIFT 
k-NN_5 100 100 100 96.7 100 98.9 100 100 
SVM 100 100 98.9 98.9 100 98.9 100 100 
Accuracy in (%) of our approach when rotated images are used
Experimental Results 
Experimental Results – 4th Scenario: Occluded images 
F.E.M. Matching Percentage of Occlusion 
Horizontal Vertical 
20 40 60 20 40 60 
SIFT Nearest Neighbor 98.9 93.3 34.4 98.9 95.6 32.2 
k-NN_5 97.8 95.6 38.9 97.8 96.7 53.3 
SVM 98.9 95.6 52.2 98.9 96.7 45.6 
Accuracy of cattle identification based on image occlusion 
(%)
Experimental Results 
A comparison between proposed system and previous systems. 
Author Accuracy in (%) 
K. Assaleh et al. [1] 93.5 
Al-Jarrah et al. [6] 94.4 
Al-Jarrah et al. [9] 97.5 
Mohandes et al. [12] 87 
Our proposed 99 
Accuracy results (in %) of our approach using different training 
images
Introduction 
Proposed Method 
Agenda 
General framework 
Feature extraction 
Classification 
Experimental Results 
Conclusions 
AECIA 2014 –November17-19, Addis Ababa, Ethiopia 
25
Conclusions 
 Our proposal approach for ArSL Recognition 
 Achieve an excellent accuracy to identify ArSL from 2D images 
 Robust against to rotation images with different angels and occluded 
images horizontally or vertically. 
 Robust against many previous ArSL approaches. 
 Performance of this approach is measured by 
 Using captured images with Matlab implementation 
 Comparison with related work
Future Work 
 Improving the results of in case of image 
occlusion 
 Increase the size of the dataset to check its 
scalability. 
 Identify characters from video frames and then 
try to implement real time ArSL system.
Thanks Acknowledgement to By the respected co-authers 
Abul Ella Hassenian3,4, M. K. Shahin 1, Basma Refaat 1 
 1Faculty of Eng. Suez Canal University, Ismailia, Egypt 
 2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt 
 3Faculty of Computers and Information, Cairo University, Egypt 
 4Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University

Contenu connexe

Tendances

GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYjinal thakrar
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognitionNikhil Jha
 
Mouse simulation using coloured tape
Mouse simulation using coloured tapeMouse simulation using coloured tape
Mouse simulation using coloured tapeNeena R Krishna
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTSuraj Rai
 
Final Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingFinal Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingSabnam Pandey, MBA
 
Hand Gesture Recognition system for deaf and dump people
Hand Gesture Recognition system for deaf and dump peopleHand Gesture Recognition system for deaf and dump people
Hand Gesture Recognition system for deaf and dump peopleManu Devappa
 
Gesture recognition technology
Gesture recognition technologyGesture recognition technology
Gesture recognition technologySahil Abbas
 
Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...NidhinRaj Saikripa
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition TechnologyMuhammad Zeeshan
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Afnan Rehman
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
Gesture Recogntion Technology
Gesture Recogntion TechnologyGesture Recogntion Technology
Gesture Recogntion TechnologyMohit Sipani
 
Vision System and its application,Problems
Vision System and its application,ProblemsVision System and its application,Problems
Vision System and its application,ProblemsNikhil Chavda
 

Tendances (20)

GESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGYGESTURE RECOGNITION TECHNOLOGY
GESTURE RECOGNITION TECHNOLOGY
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
Mouse simulation using coloured tape
Mouse simulation using coloured tapeMouse simulation using coloured tape
Mouse simulation using coloured tape
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
 
Gesture Recognition
Gesture RecognitionGesture Recognition
Gesture Recognition
 
Final Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image ProcessingFinal Year Project-Gesture Based Interaction and Image Processing
Final Year Project-Gesture Based Interaction and Image Processing
 
Hand Gesture Recognition system for deaf and dump people
Hand Gesture Recognition system for deaf and dump peopleHand Gesture Recognition system for deaf and dump people
Hand Gesture Recognition system for deaf and dump people
 
Gesture recognition technology
Gesture recognition technologyGesture recognition technology
Gesture recognition technology
 
Finalgesture22
Finalgesture22Finalgesture22
Finalgesture22
 
GESTURE prestation
GESTURE prestation GESTURE prestation
GESTURE prestation
 
Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...Gesture recognition using artificial neural network,a technology for identify...
Gesture recognition using artificial neural network,a technology for identify...
 
Gesture Recognition Technology
Gesture Recognition TechnologyGesture Recognition Technology
Gesture Recognition Technology
 
Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)Hand gesture recognition system(FYP REPORT)
Hand gesture recognition system(FYP REPORT)
 
Nikppt
NikpptNikppt
Nikppt
 
Kinect sensor
Kinect sensorKinect sensor
Kinect sensor
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Gesture Recogntion Technology
Gesture Recogntion TechnologyGesture Recogntion Technology
Gesture Recogntion Technology
 
Vision System and its application,Problems
Vision System and its application,ProblemsVision System and its application,Problems
Vision System and its application,Problems
 
Soli sensor
Soli sensorSoli sensor
Soli sensor
 
Ppt final
Ppt finalPpt final
Ppt final
 

En vedette

Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberOWASP Delhi
 
MATLAB Based Vehicle Number Plate Identification System using OCR
MATLAB Based Vehicle Number Plate Identification System using OCRMATLAB Based Vehicle Number Plate Identification System using OCR
MATLAB Based Vehicle Number Plate Identification System using OCRGhanshyam Dusane
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat DetectionNapier University
 
Automatic number plate recognition
Automatic number plate recognitionAutomatic number plate recognition
Automatic number plate recognitionSaifullah Malik
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlabKongara Sudharshan
 
License Plate Recognition System
License Plate Recognition System License Plate Recognition System
License Plate Recognition System Hira Rizvi
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)Vidyut Singhania
 
Number plate recognition system using matlab.
Number plate recognition system using matlab.Number plate recognition system using matlab.
Number plate recognition system using matlab.Namra Afzal
 
A Review Paper on Automatic Number Plate Recognition (ANPR) System
A Review Paper on Automatic Number Plate Recognition (ANPR) SystemA Review Paper on Automatic Number Plate Recognition (ANPR) System
A Review Paper on Automatic Number Plate Recognition (ANPR) SystemAM Publications
 

En vedette (10)

Machine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed ZuberMachine Learning in Information Security by Mohammed Zuber
Machine Learning in Information Security by Mohammed Zuber
 
MATLAB Based Vehicle Number Plate Identification System using OCR
MATLAB Based Vehicle Number Plate Identification System using OCRMATLAB Based Vehicle Number Plate Identification System using OCR
MATLAB Based Vehicle Number Plate Identification System using OCR
 
Machine Learning for Threat Detection
Machine Learning for Threat DetectionMachine Learning for Threat Detection
Machine Learning for Threat Detection
 
Automatic number plate recognition
Automatic number plate recognitionAutomatic number plate recognition
Automatic number plate recognition
 
Vehicle number plate recognition using matlab
Vehicle number plate recognition using matlabVehicle number plate recognition using matlab
Vehicle number plate recognition using matlab
 
License Plate Recognition System
License Plate Recognition System License Plate Recognition System
License Plate Recognition System
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)Automatic Number Plate Recognition (ANPR)
Automatic Number Plate Recognition (ANPR)
 
Number plate recognition system using matlab.
Number plate recognition system using matlab.Number plate recognition system using matlab.
Number plate recognition system using matlab.
 
A Review Paper on Automatic Number Plate Recognition (ANPR) System
A Review Paper on Automatic Number Plate Recognition (ANPR) SystemA Review Paper on Automatic Number Plate Recognition (ANPR) System
A Review Paper on Automatic Number Plate Recognition (ANPR) System
 

Similaire à Sift based arabic sign language recognition aecia 2014 –november17-19, addis ababa, ethiopia- tarek-gaber

SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
 
Literature Review on Indian Sign Language Recognition System
Literature Review on Indian Sign Language Recognition SystemLiterature Review on Indian Sign Language Recognition System
Literature Review on Indian Sign Language Recognition SystemIRJET Journal
 
Real-Time Logo Detection and Tracking
Real-Time Logo Detection and TrackingReal-Time Logo Detection and Tracking
Real-Time Logo Detection and Trackingmelgeorge
 
SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.bhavinecindus
 
Using HOG Descriptors on Superpixels for Human Detection of UAV Imagery
Using HOG Descriptors on Superpixels for Human Detection of UAV ImageryUsing HOG Descriptors on Superpixels for Human Detection of UAV Imagery
Using HOG Descriptors on Superpixels for Human Detection of UAV ImageryWai Nwe Tun
 
Automated software testing cases generation framework to ensure the efficienc...
Automated software testing cases generation framework to ensure the efficienc...Automated software testing cases generation framework to ensure the efficienc...
Automated software testing cases generation framework to ensure the efficienc...Sheikh Monirul Hasan
 
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
A Re-evaluation of Pedestrian Detection on Riemannian ManifoldsA Re-evaluation of Pedestrian Detection on Riemannian Manifolds
A Re-evaluation of Pedestrian Detection on Riemannian ManifoldsDiego Tosato
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1San Kim
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171Yaxin Liu
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET Journal
 
Realtime pothole detection system using improved CNN Models
Realtime pothole detection system using improved CNN ModelsRealtime pothole detection system using improved CNN Models
Realtime pothole detection system using improved CNN Modelsnithinsai2992
 
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...WiMLDSMontreal
 
Avihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slidesAvihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slideswolf
 
Image Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningImage Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningIRJET Journal
 
Video Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPVideo Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPinventionjournals
 
Evaluation of conditional images synthesis: generating a photorealistic image...
Evaluation of conditional images synthesis: generating a photorealistic image...Evaluation of conditional images synthesis: generating a photorealistic image...
Evaluation of conditional images synthesis: generating a photorealistic image...SamanthaGallone
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingIAEME Publication
 

Similaire à Sift based arabic sign language recognition aecia 2014 –november17-19, addis ababa, ethiopia- tarek-gaber (20)

SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
 
E017443136
E017443136E017443136
E017443136
 
Literature Review on Indian Sign Language Recognition System
Literature Review on Indian Sign Language Recognition SystemLiterature Review on Indian Sign Language Recognition System
Literature Review on Indian Sign Language Recognition System
 
Real-Time Logo Detection and Tracking
Real-Time Logo Detection and TrackingReal-Time Logo Detection and Tracking
Real-Time Logo Detection and Tracking
 
SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.SYNOPSIS on Parse representation and Linear SVM.
SYNOPSIS on Parse representation and Linear SVM.
 
Using HOG Descriptors on Superpixels for Human Detection of UAV Imagery
Using HOG Descriptors on Superpixels for Human Detection of UAV ImageryUsing HOG Descriptors on Superpixels for Human Detection of UAV Imagery
Using HOG Descriptors on Superpixels for Human Detection of UAV Imagery
 
Fa19_P1.pptx
Fa19_P1.pptxFa19_P1.pptx
Fa19_P1.pptx
 
Automated software testing cases generation framework to ensure the efficienc...
Automated software testing cases generation framework to ensure the efficienc...Automated software testing cases generation framework to ensure the efficienc...
Automated software testing cases generation framework to ensure the efficienc...
 
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
A Re-evaluation of Pedestrian Detection on Riemannian ManifoldsA Re-evaluation of Pedestrian Detection on Riemannian Manifolds
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
 
Face recognition v1
Face recognition v1Face recognition v1
Face recognition v1
 
EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171EE660_Report_YaxinLiu_8448347171
EE660_Report_YaxinLiu_8448347171
 
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
IRJET - Effective Workflow for High-Performance Recognition of Fruits using M...
 
Realtime pothole detection system using improved CNN Models
Realtime pothole detection system using improved CNN ModelsRealtime pothole detection system using improved CNN Models
Realtime pothole detection system using improved CNN Models
 
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...
Using Feature Grouping as a Stochastic Regularizer for High Dimensional Noisy...
 
Avihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slidesAvihu Efrat's Viola and Jones face detection slides
Avihu Efrat's Viola and Jones face detection slides
 
Image Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine LearningImage Features Matching and Classification Using Machine Learning
Image Features Matching and Classification Using Machine Learning
 
Video Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAPVideo Manifold Feature Extraction Based on ISOMAP
Video Manifold Feature Extraction Based on ISOMAP
 
key.net
key.netkey.net
key.net
 
Evaluation of conditional images synthesis: generating a photorealistic image...
Evaluation of conditional images synthesis: generating a photorealistic image...Evaluation of conditional images synthesis: generating a photorealistic image...
Evaluation of conditional images synthesis: generating a photorealistic image...
 
Improved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matchingImproved nonlocal means based on pre classification and invariant block matching
Improved nonlocal means based on pre classification and invariant block matching
 

Plus de Tarek Gaber

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Tarek Gaber
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Tarek Gaber
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionTarek Gaber
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectTarek Gaber
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisTarek Gaber
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberTarek Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberTarek Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationTarek Gaber
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareTarek Gaber
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarekTarek Gaber
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014Tarek Gaber
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Tarek Gaber
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberTarek Gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...Tarek Gaber
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014Tarek Gaber
 

Plus de Tarek Gaber (15)

Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)Writing a Successful Paper (Academic Writing Engineering)
Writing a Successful Paper (Academic Writing Engineering)
 
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
Feature Selection Method Based on Chaotic Maps and Butterfly Optimization Alg...
 
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer DetectionThermal Imaging: Opportunities and Challenges for Breast Cancer Detection
Thermal Imaging: Opportunities and Challenges for Breast Cancer Detection
 
Using Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation projectUsing Google Scholar to get similar paper to your class/gradation project
Using Google Scholar to get similar paper to your class/gradation project
 
Brief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project ThesisBrief Guidelines for Writing Graduation Project Thesis
Brief Guidelines for Writing Graduation Project Thesis
 
Simple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_GaberSimple Overview of PKI and Digital signature by Tarek_Gaber
Simple Overview of PKI and Digital signature by Tarek_Gaber
 
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_GaberSimple Overview Caesar and RSA Encryption_by_Tarek_Gaber
Simple Overview Caesar and RSA Encryption_by_Tarek_Gaber
 
Integer Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image AuthenticationInteger Wavelet Transform for Thermal Image Authentication
Integer Wavelet Transform for Thermal Image Authentication
 
Segmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid shareSegmentation of thermograms breast cancer tarek-to-slid share
Segmentation of thermograms breast cancer tarek-to-slid share
 
Touch paper presentation-tarek
Touch paper presentation-tarekTouch paper presentation-tarek
Touch paper presentation-tarek
 
Overview on security and privacy issues in wireless sensor networks-2014
Overview on security and privacy issues in  wireless sensor networks-2014Overview on security and privacy issues in  wireless sensor networks-2014
Overview on security and privacy issues in wireless sensor networks-2014
 
Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...Fair and abuse free contract signing protocol supporting fair license reselli...
Fair and abuse free contract signing protocol supporting fair license reselli...
 
Drm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaberDrm digital rights managment-june2014-tarek gaber
Drm digital rights managment-june2014-tarek gaber
 
A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...A novel approach to allow multiple resales of DRM protected contents - icces2...
A novel approach to allow multiple resales of DRM protected contents - icces2...
 
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
تطبيق محمول للصم والبكم يحول الاشارات الى صوت Unesco-cairo-13-2-2014
 

Dernier

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Dernier (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Sift based arabic sign language recognition aecia 2014 –november17-19, addis ababa, ethiopia- tarek-gaber

  • 1. SIFT-BASED ARABIC SIGN LANGUAGE RECOGNITION (ArSL) SYSTEM By Alaa Tharwat1,3 And Tarek Gaber2,3 1Faculty of Eng. Suez Canal University, Ismailia, Egypt 2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt 3Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University AECIA 2014 –November17-19, Addis Ababa, Ethiopia
  • 2. Introduction Proposed Method Agenda General framework Feature extraction Classification Experimental Results Conclusions AECIA 2014 –November17-19, Addis Ababa, Ethiopia 3
  • 3. Introduction Proposed Method Agenda General framework Feature extraction Classification Experimental Results Conclusions AECIA 2014 –November17-19, Addis Ababa, Ethiopia 4
  • 4. Introduction: Why ArSL • Help vocally disabled people to speak freely. • Easy way of communication with non-mute people. • ArSL is the natural language for deaf like spoken language to vocal
  • 5. Introduction: Aim of the work  Design a sign language recognition approach to transcribe sign gestures into meaningful text or speech so that communication between deaf and hearing society can easily be made. الشارع السيارة
  • 6. What is ArSL?  Translating ArSL to spoken language, i.e. translate hand gestures to Arabic characters  Sign Language hand formations:  Hand shape  Hand location  Hand movement  Hand orientation
  • 7. Introduction: Types of ArSL 1- Vision-based Approach Requires special set up for camera, but needs some preprocessing and computational to extract features. Extract Features Collect gestures Classification Decision
  • 8. Introduction: Types of ARSL (Continue) 2-ElectronicGlove-based Approach Inconvenience of gloves, but ease of signal extractions The Electronic-gloves consists of: • 22 sensors • Light weight • Flexible
  • 9. Introduction Proposed Method Agenda General framework Feature extraction Classification Experimental Results Conclusions AECIA 2014 –November17-19, Addis Ababa, Ethiopia 10
  • 10. Proposed Method: General Framework Training Images Testing Images SIFT Feature Extraction Method Feature Vectors Difference of Gaussian Pyramid KeyPoints detection Unreliable KeyPoints Eliminatio n Orientatio n Assignme nt Descriptor Computatio n Feature Vectors Matching LDA
  • 11. Proposed Method: General Framework  Training phase  Collecting all training images (i.e. gestures of Arabic Sign Language).  Extracting the features using SIFT  Representing each image by one feature vector.  Applying a dimensionality reduction (e.g, LDA) to reduce the number features in the vector  Testing phase  Collecting the testing image,  Extract the features  Feature vector is projected on LDA space.  Applying machine learning techniques for classifying the test feature vector to decide whether the animal is identified or not).
  • 12. Proposed Method: Feature Extraction Feature Extraction SIFT (Scale Invariant Feature Transform SIFT feature extraction algorithm consists of the following steps: • Creating the Difference of Gaussian Pyramid (Scale-Space Peak Selection) • Extrema Detection • Unreliable Keypoints Elimination • Orientation Assignment • Descriptor Computation Keypoints or Extrema extracted from one image (gesture) using SIFT algorithm
  • 13. Proposed Method: Feature Extraction Feature Extraction SIFT (Scale Invariant Feature Transform Matching between two getures based on SIFT features
  • 14. Proposed Method: Feature Extraction Feature Extraction SIFT (Scale Invariant Feature Transform The Number of features extracted by SIFT depends its parameters which has been considered in our experiment: • Peak Threshold (PeakThr) • patch size (Psize) • number of angels (Nangels) and number of bins (Nbins)
  • 15. Proposed Method: Classification Techniques  We have used the following classifiers assess their performance with our approach :  SVM is one of the classifers which deals with a problem of high dimensional datasets and gives very good results.  K-NN: unknown patterns are distinguished based on the similarity to known samples  Nearest Neighbor: Its idea is extremely simple as it does not require learning
  • 16. Introduction Proposed Method Agenda General framework Feature extraction Classification Experimental Results Conclusions AECIA 2014 –November17-19, Addis Ababa, Ethiopia 17
  • 17. Experimental Results: Dataset  We have used 210 gray level images with size 200x200.  These images represent 30 Arabic characters, 7 images for each character).  The images are collected in different illumination, rotation, quality levels, and image partiality. A sample of collected ArSL gestures representing different characters .
  • 18. Experimental Scenarios We have designed three experiment Scenarios:  To select the most suitable parameters.  To understand the effect of changing the number of training images.  To prove that our proposed method is robust against rotation  To prove that our proposed method is robust against occlusion.
  • 19. Experimental Results Experimental Results – 1st Scenario: Selecting SIFT parameters PeakThr Psize Nangels Accuracy results (in %) of our approach based on different SIFT parameters Classifier s 32x3 2 4 8 2 16x1 6 0 0.1 0.2 4x4 8x8 NN 100 97.7 94.2 94.2 99.2 100 93.2 94.2 98.9 100 K-NN 100 98.9 96.3 96.3 99.2 100 93.6 96.3 98.9 100 SVM 100 99.2 98.9 97.7 100 100 94.2 96.3 98.9 100
  • 20. Experimental Results Experimental Results – 2nd Scenario: Different Training No. of images Classier No. of Training Images 5 3 1 Min. Dist. 100 99.2 98.9 k-NN (k=5) 100 98.9 98.9 SVM 100 99. 98.9 Accuracy results (in %) of our approach using different training images
  • 21. Experimental Results Experimental Results – 3rd Scenario: Rotated images F.E.M. Matching Angles of rotation (o) 0 45 90 135 180 225 270 315 Min Dist. 100 98.9 97.8 96.7 100 97.8 100 98.9 SIFT k-NN_5 100 100 100 96.7 100 98.9 100 100 SVM 100 100 98.9 98.9 100 98.9 100 100 Accuracy in (%) of our approach when rotated images are used
  • 22. Experimental Results Experimental Results – 4th Scenario: Occluded images F.E.M. Matching Percentage of Occlusion Horizontal Vertical 20 40 60 20 40 60 SIFT Nearest Neighbor 98.9 93.3 34.4 98.9 95.6 32.2 k-NN_5 97.8 95.6 38.9 97.8 96.7 53.3 SVM 98.9 95.6 52.2 98.9 96.7 45.6 Accuracy of cattle identification based on image occlusion (%)
  • 23. Experimental Results A comparison between proposed system and previous systems. Author Accuracy in (%) K. Assaleh et al. [1] 93.5 Al-Jarrah et al. [6] 94.4 Al-Jarrah et al. [9] 97.5 Mohandes et al. [12] 87 Our proposed 99 Accuracy results (in %) of our approach using different training images
  • 24. Introduction Proposed Method Agenda General framework Feature extraction Classification Experimental Results Conclusions AECIA 2014 –November17-19, Addis Ababa, Ethiopia 25
  • 25. Conclusions  Our proposal approach for ArSL Recognition  Achieve an excellent accuracy to identify ArSL from 2D images  Robust against to rotation images with different angels and occluded images horizontally or vertically.  Robust against many previous ArSL approaches.  Performance of this approach is measured by  Using captured images with Matlab implementation  Comparison with related work
  • 26. Future Work  Improving the results of in case of image occlusion  Increase the size of the dataset to check its scalability.  Identify characters from video frames and then try to implement real time ArSL system.
  • 27. Thanks Acknowledgement to By the respected co-authers Abul Ella Hassenian3,4, M. K. Shahin 1, Basma Refaat 1  1Faculty of Eng. Suez Canal University, Ismailia, Egypt  2Faculty of Computers & Informatics , Suez Canal University, Ismailia, Egypt  3Faculty of Computers and Information, Cairo University, Egypt  4Scientic Research Group in Egypt (SRGE), http://www.egyptscience.netSuez Canal University