In this paper we propose a system for dynamic hand gesture recognition of Arabic Sign Language. The proposed system takes the dynamic gesture (video stream) as input, extracts hand area and computes hand motion features, then uses these features to recognize the gesture. The system identifies the hand blob using YCbCr color space to detect skin color of hand.Thesystem classifies the inpu...
Paper Information
Authors Mohamed S. Abdalla, Elsayed E. Hemayed
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 33

In this paper we critically examine various morphologic edge detectors, the methods they apply, their orientation in detecting the edges accurately and to raise the de-noising capacity. Comparative analysis of these edge detectors reveals the various advantages and disadvantages of one approach over the other. ...
Paper Information
Authors Mohammed Aslam.C, Dr. Satya Narayana.D, Dr. Padma Priya.K, Murali.M
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 25

Websites are playing a very important role in field of information Technology. Usability is also of much importance in exploring the websites. The objective of this paper is assessing the usability of the websites of the Pakistani Universities and giving the idea of developing the websites of the universities/institutions fulfilling the user needs. Different parameters were analyzed in l...
Paper Information
Authors Muhammad Shahid Khan,Muhammad Abid Khan
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

Virtual Private Network framework provides Confidentiality, Integrity, Availability, Authentication and Anti- Replay services to the packets travelling through the shared medium like Internet. With the latest Advancement in the technology, Internet is available to the users thru all means like Wireless networks, GPRS, Satellite. When the VPN user roams or switches from one network to oth...
Paper Information
Authors Md. Hashmathur Rehman
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

The role of protuberant data analysis in selection of certain genes having distinctive level of activities between conditions of interest i.e diseased gene and normal genes is very significant. Nowa- days it is become a standard in gene analysis that microarray of DNA is a crucial data preparation step in systemization and other biological analysis. We consider the problem of constructin...
Paper Information
Authors Vrushali Dipak Fangal, Dr. Sk. Sarif Hassan
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 15

In this paper, a state feedback H∞ controller has been proposed in order to design an active queue management (AQM) system based on congestion control algorithm for networks supporting TCP protocols. In this approach, the available link bandwidth is modeled as a time-variant disturbance. The objective of this paper is to design controller which capable of achieving the queue ...
Paper Information
Authors Aakanksha Shirbhate
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. These bots are then controlled by single master termed as Botmaster. A Botmaster may inject commands though any bot to launch DDoS attack. In this paper, we have demonstrated the behavior of Botnet on network in real time Internet environment.This will be helpful for researcher to detect the ...
Paper Information
Authors Rathod R.P., Bhalchandra P.U., Dr. Khamitkar S.D, Lokhande S.N.
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 11

Now a day’s Remote Sensing is a mature research area. Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed pixel which always degrades the image quality. Mixed pixels are usually the biggest reason for degrading th...
Paper Information
Authors Mittu Mittal, Gagandeep Kaur
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

TEXT line segmentation is one of the major component of document image analysis. Text line segmentation is necessary to detect all text regions in the document image. In this paper we propose an algorithm based on multiple histogram projections using morphological operators to extract features of the image. Horizontal projection is performed on the text image, and then line segments are ...
Paper Information
Authors N.Anupama, Ch.Rupa, Prof E.Sreenivasa Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 15

Digital image watermarking is used to identify the authenticity and integrity and to show the identity of its owners. This paper presents a more secure method for copy right protection. In the proposed method, the color image is decomposed into 3 color channels Red, Green and Blue and then DWT and DCT are applied to B channel of the R, G and B channels. The colored Watermark image is dec...
Paper Information
Authors K.Chaitanya, E. Sreenivasa Reddy, K.Gangadhara Rao
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21