Deaf and dumb peoples are suffering difficulties most of the time in communicating with society. They use sign language to communicate with each other and with normal people. But Normal people find it more difficult to understand the sign language and gestures made by deaf and dumb people. Therefore, many techniques have been employed to tackle this problem by converting the sign language to a text or a voice and vice versa. In recent years, research has progressed steadily in regard to the use of computers to recognize and translate the sign language. This paper reviews significant projects in the field beginning with important steps of sign language translation. These projects can be classified according to the use of an input device into image-based and device-based. Image-based is used the traditional methods of image processing and features extraction, by using a digital camera such as a webcam. Device-based uses different devices like (Microsoft Kinect sensor, electronic glove and leap motion controller). These devices are used to reduce the time of both image processing and extraction features. Then the accuracy rates of using device-based are ranged between in 90%-99% where the accuracy rates of using image-based are ranged between 85%-93%.
Abstract
The current research aims to examine the effectiveness of a training program for children with autism and their mothers based on the Picture Exchange Communication System to confront some basic disorders in a sample of children with autism. The study sample was (16) children with autism and their mothers in the different centers in Taif city and Tabuk city. The researcher used the quasi-experimental approach, in which two groups were employed: an experimental group and a control group. Children aged ranged from (6-9) years old. In addition, it was used the following tools: a list of estimation of basic disorders for a child with autism between (6-9) years, and a training program for children with autism
... Show MoreThe media, especially the satellite channels in our time, are one of the most important pillars of daily life, public and private, for society and people, and are considered by sociologists and sociologists as one of the most important factors of social upbringing and the most important, as a result of the technological and technological development of the media as well as increasing their numbers and vertical and horizontal expansion locally, As well as entering into the lives of individuals and people and leading them to important sites within their interests and preferences, not to mention the long time spent exposure to those media and benefit from the programs offered or broadcast. , The problem of this research is that there is a l
... Show MoreThe current research aims to know the extent of the impact of performance evaluation in its dimensions as an explanatory variable in the behavioural and attitudinal work outputs with its dimensions as a response variable in order to reach appropriate solutions through which the University of Fallujah seeks to achieve its goal in the process of diagnosing the axes of strength and to benefit from them in the process of strengthening the status and sobriety of the academic position of the professor and the researcher relied on The descriptive and analytical approach in carrying out this study, and data was collected from university professors, including leaders, heads of departments and divisions, who numbered (97) teachers. And fie
... Show MoreInˑthis work, we introduce the algebraic structure of semigroup with KU-algebra is called KU-semigroup and then we investigate some basic properties of this structure. We define the KU-semigroup and several examples are presented. Also,we study some types of ideals in this concept such as S-ideal,k- ideal and P-ideal.The relations between these types of ideals are discussed and few results for product S-ideals of product KU-semigroups are given. Furthermore, few results of some ideals in KU-semigroup under homomorphism are discussed.
in recent years cryptography has played a big role especially in computer science for information security block cipher and public
Let R be a commutative ring with identity, and let M be a unitary left R-module. M is called Z-regular if every cyclic submodule (equivalently every finitely generated) is projective and direct summand. And a module M is F-regular if every submodule of M is pure. In this paper we study a class of modules lies between Z-regular and F-regular module, we call these modules regular modules.
The most influential theory of ‘Politeness’ was formulated in 1978 and revised in 1987 by Brown and Levinson. ‘Politeness’, which represents the interlocutors’ desire to be pleasant to each other through a positive manner of addressing, was claimed to be a universal phenomenon. The gist of the theory is the intention to mitigate ‘Face’ threats carried by certain ‘Face’ threatening acts towards others.
‘Politeness Theory’ is based on the concept that interlocutors have ‘Face’ (i.e., self and public – image) which they consciously project, try to protect and to preserve. The theory holds that various politeness strategies are used to prot
... Show MoreEmotion could be expressed through unimodal social behaviour’s or bimodal or it could be expressed through multimodal. This survey describes the background of facial emotion recognition and surveys the emotion recognition using visual modality. Some publicly available datasets are covered for performance evaluation. A summary of some of the research efforts to classify emotion using visual modality for the last five years from 2013 to 2018 is given in a tabular form.