{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T21:08:23Z","timestamp":1725916103931},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319696041"},{"type":"electronic","value":"9783319696058"}],"license":[{"start":{"date-parts":[[2017,11,12]],"date-time":"2017-11-12T00:00:00Z","timestamp":1510444800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-69605-8_8","type":"book-chapter","created":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T23:03:26Z","timestamp":1510355006000},"page":"81-90","source":"Crossref","is-referenced-by-count":1,"title":["Research on Algorithm and Model of Hand Gestures Recognition Based on HMM"],"prefix":"10.1007","author":[{"given":"Junhui","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yun","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Zhenli","family":"He","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"issue":"03","key":"8_CR1","first-page":"504","volume":"17","author":"C Ma","year":"2011","unstructured":"Ma, C., Ren, L., Teng, D., Wang, H., Dai, G.: Ubiquitous human-computer interaction in cloud manufacturing. Comput. Integr. Manuf. Syst. 17(03), 504\u2013510 (2011)","journal-title":"Comput. Integr. Manuf. Syst."},{"issue":"01","key":"8_CR2","first-page":"57","volume":"19","author":"Z Fang","year":"1998","unstructured":"Fang, Z., Wu, X., Ma, W.: The progress on the study of human computer interaction technology. Comput. Eng. Des. 19(01), 57\u201363 (1998)","journal-title":"Comput. Eng. Des."},{"key":"8_CR3","unstructured":"Gao, N.: Research on gesture recognition technology based on vision. Hebei University of Technology (2015)"},{"key":"8_CR4","unstructured":"ITU: ITU Internet reports 2005: the Internet of things. ITU, Geneva, Switzerland (2005)"},{"key":"8_CR5","unstructured":"Guan R., Xu, X., Luo, Y., Miao, J., Qiu, S.: A computer vision-based gesture detection and recognition technique. Comput. Appl. Softw. (01) (2013)"},{"issue":"9","key":"8_CR6","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/2.84899","volume":"24","author":"A Marcus","year":"1991","unstructured":"Marcus, A., van Dam, A.: User-interface developments for the nineties. IEEE Comput. 24(9), 49\u201357 (1991)","journal-title":"IEEE Comput."},{"key":"8_CR7","unstructured":"Wang, J.: Integration of eye-gaze, voice and manual response in multimodel user interface. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics, vol. 15 (1995)"},{"key":"8_CR8","unstructured":"Wang, L.: Dynamic gesture tracking and recognition and human computer interaction technology research. Xidian University (2014)"},{"key":"8_CR9","first-page":"099","volume":"09","author":"Q Wang","year":"2012","unstructured":"Wang, Q., Qi, X., Jiang, Y., Xu, W.: 3D handwriting recognition method based on hidden Markov models. Appl. Res. Comput. 09, 099 (2012)","journal-title":"Appl. Res. Comput."},{"key":"8_CR10","unstructured":"Fan, Z.: Parallel gesture recognition system based on depth learning in complex background. Xidian University (2014)"},{"key":"8_CR11","unstructured":"Qu, Q.Y.: The gesture recognition depth image and dexterous hand based interaction. Shanghai University (2014)"},{"key":"8_CR12","unstructured":"Wang, D.: Based on gesture recognition method of human-computer interaction system. Lanzhou University of Technology (2013)"},{"key":"8_CR13","unstructured":"Hu, W.: The research of human-computer interaction system based on gesture. Wuhan University of Technology (2010)"},{"key":"8_CR14","unstructured":"Tan, D.: Research on vision-based dynamic hand gesture recognition. Harbin Institute of Technology (2014)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing, Security, Privacy in New Computing Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69605-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,10]],"date-time":"2017-11-10T23:06:25Z","timestamp":1510355185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69605-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,12]]},"ISBN":["9783319696041","9783319696058"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69605-8_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2017,11,12]]}}}