ANALYSIS OF HUMAN ACTIVITY RECOGNITION USING ACTION RECOGNITION METHODS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3
Abstract
The labelling of image sequences with action labels is termed as human action recognition and the main goal of this process is the series observations on actions. Human activity recognition aims to make better representation using deep and shallow learning techniques. For humans moving in the scene, we use techniques for tracking, body pose estimation, or space-time shape templates and categorize activities based on the video’s over- all pattern of appearance and motion using spatio - temporal interest operators and local descriptors to build the representation. It can be support for different fields of studies such as human computer interaction, or sociology, medicine and other applications. The system uses Binary Motion Image (BMI) to perform human activity recognition after preprocessing and used as input for Convolutional neural network (CNN) algorithm to recognize the human activity. The CNN combined with support vector machine (SVM) algorithm can be used as the classifiers to recognize the human action. The algorithm has three kind of inputs test samples, train samples, train labels. This project proposes a joint learning framework to identify the performance of Deep and Shallow Classifiers in training videos.
Authors and Affiliations
Anuradha R. , RAVIMARAN S.
Sleep Apnea Detection using Heart Rate Variability and Classifiers
The Obstructive Sleep Apnea (OSA) or Obstructive Sleep Apnea Syndrome (OSAS) is the sleeping disorder causing the pause in breathing process or a very low breathing rate while sleeping. The standard technique for analyzi...
A SURVEY ON DATA PARTITIONING AND CLUSTER ENSEMBLE TECHNIQUES
Data mining methods are used to discover the knowledge from the databases. Association rule mining, classification and clustering techniques are applied for the knowledge discovery process. The dat...
SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW
The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users...
AN EXPERIMENTAL PRESENTATION OF RELATIONAL KEYWORD EXPLORATION METHOD
At present the relational keyword based search technique think about the great quantity of datas to give well-organized consequence at the same time as the client penetrating. There is an problem of...
A Survey on Several Techniques Used To Detect Selfish Node in MANET
Mobile Adhoc Network is a continuously self-configuring, infrastructure-less network of mobile devices connected without wires. Each device in a MANET is free to move independently in any direction, and will therefore ch...