Volume 03 Number 3 September 2013

    
Hand Gesture Detection and Classification Using Boosted Classifier

Abdul Manan Ahmad, Sami M Halawani

https://doi.org/

Abstract There are many approaches to detect hand gestures. To narrow the search region, most existing methods construct fixed postures. However, under natural condition it is not realistic to make a user stick on a certain pose. In this paper a method to quickly detect hand shape quickly and robustly is experimented. Firstly, a skin color detector will be utilized to... Read More


e-Onama: Mobile High Performance Computing for Engineering Research

Deepu C V, NishaKurkure, Abhishek Das, Abhinav Gupta, Goldi Misra

https://doi.org/

Abstract With the fast growing popularity of smartphone technology, the percentage of people accessing critical information from their handheld devices such as tablets, and e-readers, is increasing rapidly. Advanced computing devices are changing the paradigm of mobile communication. In this research paper, a solution called e-Onama is described in detail along with its applicability and future enhancement opportunities. e-Onama is an... Read More


Audit of Virtual Systems Based on Vague Inputs Conducted by One or More Auditors

Jirí Bartoš, Cyril Klimeš

https://doi.org/

Abstract This article deals with the risk analysis and audits of virtual infrastructures. It gives a brief look into today’s risk mitigation approaches and extends one with the evaluation of security by the evaluation based on linguistic variables with the expert system. The proposed methodology is able to cover audit process conducted by one or more auditors (users/ testers).... Read More


A Novel Method for a Reliable and Secure Building Monitoring, Warning and Remote Controlling System

Mohammed M. Jasim, Oleg Vector

https://doi.org/

Abstract Modern communication and data transaction technologies offered good solutions to important problems appeared in human modern life. Several researches tried to find solutions to the building remote control, monitoring and alarming system using the modern technology. Many of them proposed methods to solve these problems. However, these solutions created new problems regarding security and reliability efficiency. In this work, a... Read More


Enhancing Open Space Method in Data Hiding Technique – Text under Text

Yaman F. Abdullah, Hebah H. O. Nasereddin

https://doi.org/

Abstract We are involved in this research study methodology for hide data within different texts. That’s where the data masking process is one of the areas of information security to hide and encrypt data and other branches that represent information security. The process of hiding data within the text are completely different from the rest of methods of concealment, it will... Read More