ANALYSIS OF HUMAN ACTIVITY RECOGNITION USING ACTION RECOGNITION METHODS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3
Abstract
The labelling of image sequences with action labels is termed as human action recognition and the main goal of this process is the series observations on actions. Human activity recognition aims to make better representation using deep and shallow learning techniques. For humans moving in the scene, we use techniques for tracking, body pose estimation, or space-time shape templates and categorize activities based on the video’s over- all pattern of appearance and motion using spatio - temporal interest operators and local descriptors to build the representation. It can be support for different fields of studies such as human computer interaction, or sociology, medicine and other applications. The system uses Binary Motion Image (BMI) to perform human activity recognition after preprocessing and used as input for Convolutional neural network (CNN) algorithm to recognize the human activity. The CNN combined with support vector machine (SVM) algorithm can be used as the classifiers to recognize the human action. The algorithm has three kind of inputs test samples, train samples, train labels. This project proposes a joint learning framework to identify the performance of Deep and Shallow Classifiers in training videos.
Authors and Affiliations
Anuradha R. , RAVIMARAN S.
SUSTAINING SECLUSION FORTIFICATION IN BESPOKE WEB EXPLORATION
Bespoke web exploration (BWE) has established its helpfulness in humanizing the eminence of a variety of exploration services on the Internet. Though, evidence illustrates to facilitate users’ disinclination t...
SECURITY THREATS AND BENEFITS OF CLOUD COMPUTING TRANSITIONING TO A NEW WAY OF DOING BUSINESS
: Cloud computing provides a new environment that enables organizations to leverage emerging technologies that address growing business challenges and to position their companies to be more competitive in a cost-effecti...
AN EXPERIMENTAL PRESENTATION OF RELATIONAL KEYWORD EXPLORATION METHOD
At present the relational keyword based search technique think about the great quantity of datas to give well-organized consequence at the same time as the client penetrating. There is an problem of...
COMPARATIVE STUDY ON RESOURCE ALLOCATION METHODS IN CLOUD COMPUTING
Cloud Computing is a contribution-based service where you can procure networked storage space and computer resource. Resource allocation is the process of assigning and managing assets in a manner that su...
STATIC ANALYSIS FOR EXTRACTING PERMISSION CHECKS IN ANDROID USING EVENT GRAPH TECHNIQUE
Applications for Android are written in Java which is then compiled into Dalvik byte code. Memory and processing power are limited, when the byte code is improve to run on devices. An Android applicat...