• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhang Liangguo, Gao Wen, Chen Xilin, Chen Yiqiang, Wang Chunli. A Medium Vocabulary Visual Recognition System for Chinese Sign Language[J]. Journal of Computer Research and Development, 2006, 43(3): 476-482.
Citation: Zhang Liangguo, Gao Wen, Chen Xilin, Chen Yiqiang, Wang Chunli. A Medium Vocabulary Visual Recognition System for Chinese Sign Language[J]. Journal of Computer Research and Development, 2006, 43(3): 476-482.

A Medium Vocabulary Visual Recognition System for Chinese Sign Language

More Information
  • Published Date: March 14, 2006
  • As one of the most important parts of human-computer interaction, the research and implementation of sign language recognition (SLR) has significant academic value as well as broad application prospect. In this paper, a framework of tied-mixture hidden Markov models (TMHMM) is proposed for vision-based SLR. TMHMM can efficiently speed up the vision-based SLR without significant loss of recognition accuracy compared with the continuous hidden Markov models (CHMM) due to its excellent properties, i.e., the modeling resolution of TMHMM approximates that of CHMM and the computation cost of TMHMM is greatly reduced by tying similar Gaussian mixture components. For the sign feature extraction, an effective hierarchical feature characterization scheme is proposed, which is more suitable to realize medium or larger vocabulary SLR, through employing principal component analysis to characterize the finger area distribution feature more elaborately. Further, by integrating the techniques of robust hands detection, background subtraction and pupils detection to extract the feature information precisely with the aid of simple colored gloves against the unconstrained background, a medium vocabulary vision-based recognition system for Chinese sign language (CSL) is implemented. Experimental results show that the proposed methods can work well for the medium vocabulary CSL recognition in the environment without special constraints.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Wei Junyu, Zhang Guangyan, Chen Junchao. Data-Pattern-Aware Low-Cost Cloud Log Storage Systems[J]. Journal of Computer Research and Development, 2023, 60(11): 2442-2452. DOI: 10.7544/issn1000-1239.202330178
    [3]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [4]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [5]Xiao Fangxiong, Huang Zhiqiu, Cao Zining, Yuan Min, and Zhang Junhua. Describing and Cost Analyzing of Web Services Composition Using PPA[J]. Journal of Computer Research and Development, 2009, 46(5): 832-840.
    [6]Zhao Jia, Han Jun, Zeng Xiaoyang, and Han Lin. A Two-Dimensional Parity-Based Concurrent Error Detection Method for AES Against Differential Fault Attack and Its VLSI Implementation[J]. Journal of Computer Research and Development, 2009, 46(4): 593-601.
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [8]Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng. Power Analysis Attacks Against AES Based on Maximal Bias Signal[J]. Journal of Computer Research and Development, 2009, 46(3): 370-376.
    [9]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.
    [10]Wu Min, Zeng Xiaoyang, Han Jun, Ma Yongxin, Wu Yongyi, and Zhang Guoquan. A Low Cost RSA Chip Design Based on CRT[J]. Journal of Computer Research and Development, 2006, 43(4): 639-645.

Catalog

    Article views (945) PDF downloads (631) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return