ANALYSIS OF HUMAN ACTIVITY RECOGNITION USING ACTION RECOGNITION METHODS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 3, Issue 3
Abstract
The labelling of image sequences with action labels is termed as human action recognition and the main goal of this process is the series observations on actions. Human activity recognition aims to make better representation using deep and shallow learning techniques. For humans moving in the scene, we use techniques for tracking, body pose estimation, or space-time shape templates and categorize activities based on the video’s over- all pattern of appearance and motion using spatio - temporal interest operators and local descriptors to build the representation. It can be support for different fields of studies such as human computer interaction, or sociology, medicine and other applications. The system uses Binary Motion Image (BMI) to perform human activity recognition after preprocessing and used as input for Convolutional neural network (CNN) algorithm to recognize the human activity. The CNN combined with support vector machine (SVM) algorithm can be used as the classifiers to recognize the human action. The algorithm has three kind of inputs test samples, train samples, train labels. This project proposes a joint learning framework to identify the performance of Deep and Shallow Classifiers in training videos.
Authors and Affiliations
Anuradha R. , RAVIMARAN S.
Enhanced Segmentation Of Brain Tumour Detection Using Cnn Techniques
As the Magnetic Resonance Imaging (MRI) technique is the most popular non-invasive technique, the imaging of biological structures by MRI imaging is a common investigating procedure in these days. Due to this reason, the...
SMART HOME ENERGY MANAGEMENT SYSTEM USING RS485 NETWORK
Home Energy Management System (HEMS) (for information as effectively at home to the load equipment through the use of renewable energy Water heater, washing machine and the fan, etc.), and to regulate...
DETECTION AND PREVENTION OF MALICIOUS FEEDBACK RATING IN WEB SERVICE RECOMMENDATION SYSTEMS
To facilitate a recommendation to users for selecting an appropriate or reputed web service from mass of services by avoiding dishonest recommendation. To prevent, avoid and de...
An Efficient Copy-Move Forgery Detection scheme using Segmentation
The development of new hardware and improved human-computer interfaces can effortlessly generate the fake images. Multiple image processing softwares are used to detect the image forgeries that could not be se...
Electrocardiogram Signal Modeling Using Adaptive Framework Based SVM Classification Method
Automatic electrocardiogram (ECG) signal classification plays a significant role in the clinical applications, to overcome the problems occur during manual annotation of the ECG recordings. The ECG beat m...