{"title":"Tracking of Fingertips and Centers of Palm Using KINECT","authors":"J. Raheja, Ankit Chaudhary, Kunal Singal","doi":"10.1109/CIMSIM.2011.51","DOIUrl":"https://doi.org/10.1109/CIMSIM.2011.51","url":null,"abstract":"Hand Gesture is a popular way to interact or control machines and it has been implemented in many applications. The geometry of hand is such that it is hard to construct in virtual environment and control the joints but the functionality and DOF encourage researchers to make a hand like instrument. This paper presents a novel method for fingertips detection and centres of palms detection distinctly for both hands using MS KINECT in 3D from the input image. KINECT facilitates us by providing the depth information of foreground objects. The hands were segmented using the depth vector and centres of palms were detected using distance transformation on inverse image. This result would be used to feed the inputs to the robotic hands to emulate human hands operation.","PeriodicalId":125671,"journal":{"name":"2011 Third International Conference on Computational Intelligence, Modelling & Simulation","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131767165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Neural Network Application for Lightning Characteristics & Mapping for Peninsular Malaysia","authors":"R. A. Rahman, A. C. Soh, Siti Nur Naznin Adnan","doi":"10.1109/CIMSIM.2011.11","DOIUrl":"https://doi.org/10.1109/CIMSIM.2011.11","url":null,"abstract":"","PeriodicalId":125671,"journal":{"name":"2011 Third International Conference on Computational Intelligence, Modelling & Simulation","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rouhollah Mousavi, A. Mohammadbagheri, R. K. Moghaddam
{"title":"ACGHSIM: A Simulation Tool for Accelerated Conjugate Hessian Gradient Optimization Algorithm","authors":"Rouhollah Mousavi, A. Mohammadbagheri, R. K. Moghaddam","doi":"10.1109/CIMSIM.2011.39","DOIUrl":"https://doi.org/10.1109/CIMSIM.2011.39","url":null,"abstract":"In this article a graphical user interface (GUI), \"ACGHSIM\" is developed for Simulation the accelerated conjugate Hessian optimization algorithm (ACGHES). ACGHSIM is provided for educational purpose to improve the understanding the convergence and acceleration of ACGHES algorithm in solving large-scale unconstrained optimization problems. ACGHSIM contains a library for 73 different test functions in optimization. The user has option to select one of these functions and simulate the ACGHES algorithm to calculate the minimum. Additionally the users are able to apply themselves initial points or use the suggested initial points by this application. In order to demonstrate the User Friendly features of ACGHSIM, some examples are given.","PeriodicalId":125671,"journal":{"name":"2011 Third International Conference on Computational Intelligence, Modelling & Simulation","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks","authors":"Idrees Sarhan Gawdan, C. Chow, T. Zia, Q. Sarhan","doi":"10.1109/CIMSIM.2011.63","DOIUrl":"https://doi.org/10.1109/CIMSIM.2011.63","url":null,"abstract":"Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient scalable post-distribution key establishment that allows the hierarchical clustering topology platform to provision acceptable security services. To the best of our knowledge this module is the first implemented security module for wireless sensor networks that provisions reasonable resistance against replay and node capture attacks. Furthermore, it provides highly lightweight and scalable scheme. Also it is acceptable to be used in a wireless sensor network of thousands of sensor nodes.","PeriodicalId":125671,"journal":{"name":"2011 Third International Conference on Computational Intelligence, Modelling & Simulation","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128829426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Particle Swarm Optimization Algorithm in Dynamic Environments","authors":"Iman Rezazadeh, M. Meybodi, A. Naebi","doi":"10.1007/978-3-642-21515-5_15","DOIUrl":"https://doi.org/10.1007/978-3-642-21515-5_15","url":null,"abstract":"","PeriodicalId":125671,"journal":{"name":"2011 Third International Conference on Computational Intelligence, Modelling & Simulation","volume":"48 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}