Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
|
|
|
- Osborne Lucas
- 9 years ago
- Views:
Transcription
1 IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: ) Journal home page: Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu and 2 C. Nagavani 1 PG Student, Kamaraj College of engineering and technology, Virudhunagar, Tamilnadu, India. 2 Assistant professor, Kamaraj College of engineering and technology, Virudhunagar, Tamilnadu, India. A R T I C L E I N F O Article history: Received 22 February 2015 Accepted 20 March 2015 Keywords: Human action recognition, Key pose, Key pose sequence, Silhouette, Weizmann dataset. A B S T R A C T Vision based human action recognition allows to detect and understand meaningful human motion. In this method, human silhouette extraction technique like background subtraction is applied. The extracted human silhouettes are processed in order to obtain the contour based feature. Finding the most characteristic poses among the training data returns the key poses. K-means clustering is an efficient technique to cluster poses based on attributes like distance. With reference to Weizmann dataset, six actions such as running, walking, jumping, bending, waving one hand and waving two hands are considered. The actions are learned by making use of sequences of key poses. The sequence of key poses model the temporal evolution between key poses with respect to the original training sequences. Action recognition is done by means of Minimum Distance Classifier. Action recognition of unknown key poses is matched with known classes of cluster center, then the correct action is recognized. Weizmann dataset deals with single view scenarios with an average success rate of 93% IWNEST Publisher All rights reserved. To Cite This Article: T. Sindhu and C. Nagavani., Adaptive sequence of Key Pose Detection for Human Action Recognition. J. Ind. Eng. Res., 1(3), 10-15, 2015 INTRODUCTION Human action recognition has recently become of important interest in recent years due to its direct application and need in Surveillance, Ambient Intelligence, Ambient-Assisted Living (AAL) and Human- Computer Interaction systems. In this paper, a simple but yet very effective approach is presented in order to support accurate human action recognition at the level of basic human motion, like walking, running, jumping, bending, waving one hand and waving two hands. Human action recognition has recently become of important interest due to its wide variety of applications. Improvements in vision-based recognition of short-temporal human behaviors have led to advanced visual surveillance systems [1], as well as sophisticated human-computer interaction (HCI) techniques [2], which are applied to gaming or intelligent environments, among others. Although visual interpretation of human motion, like actions or gestures, has been studied extensively[3], specific requirements of dynamic environments have only sparingly been taken into account [4], [5] Especially at home, robots can be useful supporting several safety and health care scenarios as, for instance, monitoring or mobility assistance [6]. These care services among others, can potentially improve the independent living of the elderly, or serve senior assisted living facilities. Reliable support can only be ensured if robots are intelligent enough to analyse and understand the scenario they perform in and the events that occur, in order to be able to interact appropriately. The application of human action recognition (HAR) to this specific case of HCI comes along with several additional hurdles: 1) since human behaviours are subject to change depending on the specific scenario and actor, and moreover, the behaviours can vary over time. The system has to adapt its knowledge dynamically to recognise new scenarios as, for instance, new actions or new actors. This process needs to happen incrementally, as the system should be able to learn continuously over time without requiring to start from scratch. Furthermore, the recognition capabilities need to evolve and adapt to the new data that needs to be discriminated. Therefore, a simple camera setup should be employed and real time recognition algorithms are required. Constraints are considered choosing a low-cost feature extraction and a state-of-the-art real-time HAR recognition method. Proposed Method: Key poses are defined as a set of frames that uniquely distinguishes an action from others. Therefore, the goal of using key poses is to model an action by its most characteristic poses in time. This makes it possible to significantly reduce the problem scale in exemplar-based recognition methods and, at the same time, to avoid Corresponding Author: T. Sindhu, PG Student, Kamaraj College of engineering and technology, Virudhunagar, Tamilnadu, India.
2 11 T. Sindhu and C. Nagavani, 2015 redundant or superfluous learning. The under-lying idea is that if the human brain is able to recognise what a person is doing based on a few individual images, why should not action recognition methods be able to sustain only on pose information. In this regard, Baysal et al. and Cheema et al. [4] use no temporal information at all, Thurau and Hlavac model the short-term temporal relation between consecutive key poses with n-grams (trigrams showed good results at acceptable computational cost), and Eweiwi et al. take into account the temporal context of a small number of frames by means of obtaining temporal key poses based on MHI. While our approach is very similar to these works at the training stage when applied to a single view, our contribution considers long-term temporal relation between key poses and thus takes advantage of the known temporal evolution of key poses over a whole sequence To achieve an adaptive human action recognition by evolving bag of key poses in order to provide optimized solution with less processing time. Human action recognition can be obtained based on sequences of key poses. A complete overview of the involved stages of the learning process can be seen in figure 1. Fig. 1: Overview of the learning process. Human silhouette extraction technique like background subtraction needs to be applied. Then the extracted human silhouettes are processed in order to obtain the contour-based feature. The silhouette s contour leads to the used pose representation, by means of a distance signal feature which, in conjunction with the model learning approach and the action classification, shows to be a highly efficient technique. At the training stage, the method learns the per class features that make up the most characteristic poses, the so called key poses. Using the ground truth data, the sequences of key poses corresponding to the labeled videos are obtained. These sequences are matched later with the current test sequence based on Minimum Distance Classifier. Fig. 2: Block Diagram of the Proposed System. Methodology: Action Video into Image Sequences: The action video of Weizmann dataset consists of different actions acted by various actors. These videos are decomposed into number of image sequences. Each image is composed of RGB Components.
3 12 T. Sindhu and C. Nagavani, 2015 Silhouette Extraction: The method relies on a global pose representation based on the contour points of the silhouette. Binary silhouette is obtained by human silhouette extraction techniques, e.g. background subtraction. Using only the contour points and not the whole silhouette is motivated by getting rid of the redundancy that introduces the inside part of the human silhouette, leading therefore to a less expensive feature extraction. In addition, usage of contours avoids the need of morphological pre-processing steps and reduces the sensitivity to small viewpoint variations or lighting changes. Specifically, the contour-based feature has been chosen, which is described briefly in the following. First, the contour points of the silhouette need to be obtained. For this purpose, contour extraction is applied. Second, the centre of mass of the silhouette s contour points is calculated with respect to the n number of points:, (1) Third, the distance signal is generated by determining the Euclidean distance between each contour point and the centre of mass. Contour points should be considered always in the same order. For instance, the set of points can start at the most left point with equal y-axis value as the centre of mass, and follow a clockwise order (2) Finally, scale-invariance is achieved by fixing the size of the distance signal, sub-sampling the feature size to a constant length L, and normalising its values to unit sum. (3) (4) Key pose Detection: The first step of the learning process is to process all the frames of the video sequences in order to obtain their pose representation. The per class key poses are learned by means of K-means clustering with Euclidean distance. Hence, the extracted features of all available images of the same action class are grouped into K clusters; where each cluster represents a key pose as it is a characteristic pose among the training data. The process of clustering is repeated times, so as to avoid local minimum, and the best result is taken.given that the clustering process returns the corresponding label of each sample in which stands for the index of the cluster assigned to, clustering results are evaluated with the following compactness metric : (5) where the instance with the lowest value is taken as the final result. This key pose learning process is repeated individually for the training samples of each action class. This way, a set of key poses is obtained for each action class. Key Pose Features Database: As stated before, the goal is to learn the long-term temporal evolution of key poses. Consequently, our interest resides on the successive key poses that are involved in an action performance. As the training data is made up of sequences of labelled action performances, the corresponding sequences of key poses can be modelled. For the pose representation of each frame of a sequence, i.e. minimum distance key pose is found. The successive key poses constitute the simplified sequence of known characteristic poses and their evolution. This way, a set of sequences of key poses is obtained for each action class. This decisive step significantly improves exemplar-based action recognition by shifting the training data to a common and known domain.
4 13 T. Sindhu and C. Nagavani, 2015 Sequence Matching: At the recognition stage, a final class label output needs to be given. To that end, two steps have to be taken: (1) in the same way as with training sequences, silhouette contour points are processed and their corresponding pose representations are obtained. Recognition techniques based on matching represent each class by a prototype pattern vector. An unknown pattern is assigned to the class to which it is closest in terms of predefined metric. The simplest approach is minimum distance classifier, which computes the Euclidean distance between the unknown. It chooses smallest distance to make a decision. (6) where Class of human action label key pose of action index - number of cluster for each action Cluster center of human action classes - unknown class of action An action recognition of unknown key poses is matched with (trained) known classes of human action cluster center. The distance metric (sum squared distance) computed between unknown key poses of action and known action cluster center and then summed distance between and. The summed distance process is repeated for each class of action in database which stores cluster center of known class s action. The unknown action recognized from selecting minimum distance action among distances belongs to different human action as best matched with th action. Experimental Results: The Weizmann dataset presented is a single-view (static front-side camera) outdoor dataset. It provides 180 *144 px resolution images of different actions performed by many actors. It has a relatively simple background, provides automatically extracted silhouettes and has become a reference in human action recognition. Actions include bending (bend), jumping (jump), running (run), walking (walk), waving one hand (wave1) and waving two hands (wave2). Fig. 3: GUI Design for Human Action Recognition. In MATLAB GUIs are created using a tool called guide, the GUI Development Environment. This tool allows a programmer to layout the GUI, selecting and aligning the GUI components to be placed in it. Checkboxes may be added to a GUI by using the checkbox tool in the Layout Editor which are used to display on/off options. Figure 3 shows that six actions (Walk, Run, Jump, Bend, Wave1, Wave2) are provided for human segmentation where silhouette extraction take place. Here the actions are selected which will undergo background model and load every person s selected action in the dataset performs background subtraction. In Figure 4, Binary silhouette is obtained by human silhouette extraction techniques e.g. background subtraction. The inside part of the human silhouette, leading therefore to a less expensive feature extraction. In addition, usage of contours avoids the need of morphological pre-processing steps and reduces the sensitivity to small viewpoint variations or lighting changes. In Figure 5, selected action key pose will be obtained in the temporal evolution. The per class key poses are learned by means of K-means clustering with Euclidean distance. Hence, the extracted features of all available images of the same action class samples are grouped into K clusters; where each cluster centre of centres represents a key pose as it is a characteristic pose among the training data. The process of clustering is repeated
5 14 T. Sindhu and C. Nagavani, 2015 K times, so as to avoid local minimum, and the best result is taken. Given that the clustering process returns the corresponding label of each sample index of the cluster instance with the lowest value is taken as the final result. This key pose learning process is repeated individually for the training samples of each action class. K key poses is obtained for each action class where k refers to this six actions. Here the long-term temporal evolution of key poses for every single action is obtained. Successive key poses that are involved in an action performance in the training data is made up of sequences of labeled action performances, the corresponding sequences of key poses are modeled. At the recognition stage, a final class label output is obtained. Fig. 4: Human silhouette extraction and contour based feature. Fig. 5: Key Poses for bend action. Fig. 6: Recognized action from test video. An action recognition of unknown key poses is matched with (trained) known classes of human action cluster center. The distance metric (sum squared distance) computed between unknown key poses of action and known action cluster center and then summed distance between trained classes and cluster center. The summed distance process is repeated for each class of action in database which stores cluster center of known class s action. The unknown action recognized from selecting minimum distance action among distances belongs to different human action as matched action. Thus Figure 6 shows the load training dataset in the test video slider window where one video data is selected and so the action is recognized while clicking the test action button.
6 15 T. Sindhu and C. Nagavani, 2015 Table 1: Confusion matrix of the Weizmann dataset. Run Walk Jump Bend Wave1 Wave2 Run 5/6 1/6 Walk 1/7 6/7 Jump 6/6 Bend 6/6 Wave1 7/7 Wave 2 9/9 The above table1 shows while taking a closer look to the misclassifications of sequences from the run action class, it can be seen that the running or walking speed of the actors varied significantly. In addition, some of the actors do not move their arms along when running, which increases even more the similarity between running and walking. It is analysed that a specific misclassification of a run sequence and walk sequence. The ten closest sequences include seven sequences of the right class, which means that, for instance, a Minimum Distance Classifier approach could have worked better in this case. Conclusion: In this project, the human silhouette obtained with background subtraction is used as initial input. The silhouette s contour leads to the used pose representation by means of a distance signal feature which in conjunction with the model learning approach and the action classification shows to be a highly efficient technique. Accurate recognition results are obtained using minimum distance classifier in which an action recognition of unknown key poses is matched with known classes of cluster center achieves an average success rate of 93%.The future work include evaluating the method using other available datasets and also with real time videos. Various other actions can also be trained using this recognition method. REFERENCES [1] Aggarwal, J., M. Ryoo, Human activity analysis: A review. ACM Comput. Surv., 43: 16:1-16:43. [2] Angeles Mendoza, M., N. Pérez de la Blanca, Hmm-based action recognition using contour histograms. In: Martí, J., Benedí, J.Mendonça, A. Serrat, J. (Eds.), Pattern Recognition and Image Analysis, Lecture Notes in Computer Science, Springer, Berlin/Heidelberg, pp: [3] Chaaraoui, A.A., P. Climent-Pérez, F. Flórez-Revuelta, A review on vision techniques applied to human behaviour analysis for ambient-assisted living. Exp. Systems Appl., 39: [4] Cheema, S., A. Eweiwi, C. Thurau, C. Bauckhage, Action recognition by learning discriminative key poses. In: IEEE Internat. Conf. on Computer Vision Workshops (ICCV Workshops), pp: [5] Cherla, S., K. Kulkarni, A. Kale, V. Ramasubramanian, Towards fast, view-invariant human action recognition. In: IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops CVPRW 08, pp: 1-8. [6] Hernández, J., A. Montemayor, J. Pantrigo, A. Sánchez, Human action recognition based on tracking features. In: Ferrández, J., Álvarez Sánchez, J., de la Paz, F., Toledo, F. (Eds.), Foundations on Natural and Artificial Computation, Lecture Notes in Computer Science, 6686: [7] Saghafi, B., D. Rajan, Human action recognition using pose-based discriminant embedding. Signal Process. Image Commun., 27: [8] Schuldt, C., I. Laptev, B. Caputo, Recognizing human actions: A local svm approach. In: Proc. of the 17th Internat. Conf. on Pattern Recognition, ICPR 2004, 3: [9] Singh, S., S. Velastin, H. Ragheb, Muhavi: A multicamera human action video dataset for the evaluation of action recognition methods. In: Seventh IEEE Internat. Conf. on Advanced Video and Signal Based Surveillance (AVSS), pp: [10] Wang, J., M. She, S. Nahavandi, A. Kouzani, A review of vision-based gait recognition methods for human identification. In: Internat. Conf. on Digital Image Computing: Techniques and Applications (DICTA) 2010, pp:
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
Journal of Computer Science 6 (9): 1008-1013, 2010 ISSN 1549-3636 2010 Science Publications Support Vector Machine-Based Human Behavior Classification in Crowd through Projection and Star Skeletonization
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras
Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras Chenyang Zhang 1, Yingli Tian 1, and Elizabeth Capezuti 2 1 Media Lab, The City University of New York (CUNY), City College New
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
K-means Clustering Technique on Search Engine Dataset using Data Mining Tool
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 505-510 International Research Publications House http://www. irphouse.com /ijict.htm K-means
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin
Classifying Manipulation Primitives from Visual Data
Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
A General Framework for Tracking Objects in a Multi-Camera Environment
A General Framework for Tracking Objects in a Multi-Camera Environment Karlene Nguyen, Gavin Yeung, Soheil Ghiasi, Majid Sarrafzadeh {karlene, gavin, soheil, majid}@cs.ucla.edu Abstract We present a framework
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
False alarm in outdoor environments
Accepted 1.0 Savantic letter 1(6) False alarm in outdoor environments Accepted 1.0 Savantic letter 2(6) Table of contents Revision history 3 References 3 1 Introduction 4 2 Pre-processing 4 3 Detection,
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Human behavior analysis from videos using optical flow
L a b o r a t o i r e I n f o r m a t i q u e F o n d a m e n t a l e d e L i l l e Human behavior analysis from videos using optical flow Yassine Benabbas Directeur de thèse : Chabane Djeraba Multitel
Vision based approach to human fall detection
Vision based approach to human fall detection Pooja Shukla, Arti Tiwari CSVTU University Chhattisgarh, [email protected] 9754102116 Abstract Day by the count of elderly people living alone at home
GLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Removing Moving Objects from Point Cloud Scenes
1 Removing Moving Objects from Point Cloud Scenes Krystof Litomisky [email protected] Abstract. Three-dimensional simultaneous localization and mapping is a topic of significant interest in the research
Speed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA [email protected], [email protected] Abstract. A speed
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
An automatic system for sports analytics in multi-camera tennis videos
Workshop on Activity Monitoring by Multiple Distributed Sensing (AMMDS) in conjunction with 2013 10th IEEE International Conference on Advanced Video and Signal Based Surveillance An automatic system for
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
Interactive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
Low-resolution Character Recognition by Video-based Super-resolution
2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Tracking Groups of Pedestrians in Video Sequences
Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS
VEHICLE LOCALISATION AND CLASSIFICATION IN URBAN CCTV STREAMS Norbert Buch 1, Mark Cracknell 2, James Orwell 1 and Sergio A. Velastin 1 1. Kingston University, Penrhyn Road, Kingston upon Thames, KT1 2EE,
An Automatic Optical Inspection System for the Diagnosis of Printed Circuits Based on Neural Networks
An Automatic Optical Inspection System for the Diagnosis of Printed Circuits Based on Neural Networks Ahmed Nabil Belbachir 1, Alessandra Fanni 2, Mario Lera 3 and Augusto Montisci 2 1 Vienna University
Building an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor
A Genetic Algorithm-Evolved 3D Point Cloud Descriptor Dominik Wȩgrzyn and Luís A. Alexandre IT - Instituto de Telecomunicações Dept. of Computer Science, Univ. Beira Interior, 6200-001 Covilhã, Portugal
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
Open-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Observing Human Behavior in Image Sequences: the Video Hermeneutics Challenge
Observing Human Behavior in Image Sequences: the Video Hermeneutics Challenge Pau Baiget, Jordi Gonzàlez Computer Vision Center, Dept. de Ciències de la Computació, Edifici O, Campus UAB, 08193 Bellaterra,
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Model-Based 3D Human Motion Capture Using Global-Local Particle Swarm Optimizations
Model-Based 3D Human Motion Capture Using Global-Local Particle Swarm Optimizations Tomasz Krzeszowski, Bogdan Kwolek, and Konrad Wojciechowski Abstract. We present an approach for tracking the articulated
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Automatic Traffic Estimation Using Image Processing
Automatic Traffic Estimation Using Image Processing Pejman Niksaz Science &Research Branch, Azad University of Yazd, Iran [email protected] Abstract As we know the population of city and number of
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Video Surveillance System for Security Applications
Video Surveillance System for Security Applications Vidya A.S. Department of CSE National Institute of Technology Calicut, Kerala, India V. K. Govindan Department of CSE National Institute of Technology
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
Data Mining Solutions for the Business Environment
Database Systems Journal vol. IV, no. 4/2013 21 Data Mining Solutions for the Business Environment Ruxandra PETRE University of Economic Studies, Bucharest, Romania [email protected] Over
Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm
Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm Choon Kiat Lee 1, Vwen Yen Lee 2 1 Hwa Chong Institution, Singapore [email protected] 2 Institute
A NATURAL HAND GESTURE HUMAN COMPUTER INTERFACE USING CONTOUR SIGNATURES
A NATURAL HAND GESTURE HUMAN COMPUTER INTERFACE USING CONTOUR SIGNATURES Paulo Peixoto ISR - Institute of Systems and Robotics Department of Electrical and Computer Engineering University of Coimbra Polo
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Clustering. Adrian Groza. Department of Computer Science Technical University of Cluj-Napoca
Clustering Adrian Groza Department of Computer Science Technical University of Cluj-Napoca Outline 1 Cluster Analysis What is Datamining? Cluster Analysis 2 K-means 3 Hierarchical Clustering What is Datamining?
Advanced Ensemble Strategies for Polynomial Models
Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
Clustering on Large Numeric Data Sets Using Hierarchical Approach Birch
Global Journal of Computer Science and Technology Software & Data Engineering Volume 12 Issue 12 Version 1.0 Year 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
Grid Density Clustering Algorithm
Grid Density Clustering Algorithm Amandeep Kaur Mann 1, Navneet Kaur 2, Scholar, M.Tech (CSE), RIMT, Mandi Gobindgarh, Punjab, India 1 Assistant Professor (CSE), RIMT, Mandi Gobindgarh, Punjab, India 2
The use of computer vision technologies to augment human monitoring of secure computing facilities
The use of computer vision technologies to augment human monitoring of secure computing facilities Marius Potgieter School of Information and Communication Technology Nelson Mandela Metropolitan University
Categorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow
, pp.233-237 http://dx.doi.org/10.14257/astl.2014.51.53 A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow Giwoo Kim 1, Hye-Youn Lim 1 and Dae-Seong Kang 1, 1 Department of electronices
The Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
Sequence of the Most Informative Joints (SMIJ): A New Representation for Human Skeletal Action Recognition
Sequence of the Most Informative (SMIJ): A New Representation for Human Skeletal Action Recognition Ferda Ofli 1, Rizwan Chaudhry 2, Gregorij Kurillo 1,RenéVidal 2 and Ruzena Bajcsy 1 1 Tele-immersion
Automatic parameter regulation for a tracking system with an auto-critical function
Automatic parameter regulation for a tracking system with an auto-critical function Daniela Hall INRIA Rhône-Alpes, St. Ismier, France Email: [email protected] Abstract In this article we propose
The Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE IMPROVISATION OF STUDYING COMPUTER BY CLUSTER STRATEGIES C.Priyanka 1, T.Giri Babu 2 1 M.Tech Student, Dept of CSE, Malla Reddy Engineering
A Method for Controlling Mouse Movement using a Real- Time Camera
A Method for Controlling Mouse Movement using a Real- Time Camera Hojoon Park Department of Computer Science Brown University, Providence, RI, USA [email protected] Abstract This paper presents a new
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Tracking performance evaluation on PETS 2015 Challenge datasets
Tracking performance evaluation on PETS 2015 Challenge datasets Tahir Nawaz, Jonathan Boyle, Longzhen Li and James Ferryman Computational Vision Group, School of Systems Engineering University of Reading,
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Local features and matching. Image classification & object localization
Overview Instance level search Local features and matching Efficient visual recognition Image classification & object localization Category recognition Image classification: assigning a class label to
Cluster analysis with SPSS: K-Means Cluster Analysis
analysis with SPSS: K-Means Analysis analysis is a type of data classification carried out by separating the data into groups. The aim of cluster analysis is to categorize n objects in k (k>1) groups,
Visibility optimization for data visualization: A Survey of Issues and Techniques
Visibility optimization for data visualization: A Survey of Issues and Techniques Ch Harika, Dr.Supreethi K.P Student, M.Tech, Assistant Professor College of Engineering, Jawaharlal Nehru Technological
A ROBUST BACKGROUND REMOVAL ALGORTIHMS
A ROBUST BACKGROUND REMOVAL ALGORTIHMS USING FUZZY C-MEANS CLUSTERING ABSTRACT S.Lakshmi 1 and Dr.V.Sankaranarayanan 2 1 Jeppiaar Engineering College, Chennai [email protected] 2 Director, Crescent
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia [email protected]
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
COURSE RECOMMENDER SYSTEM IN E-LEARNING
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 159-164 COURSE RECOMMENDER SYSTEM IN E-LEARNING Sunita B Aher 1, Lobo L.M.R.J. 2 1 M.E. (CSE)-II, Walchand
Tracking And Object Classification For Automated Surveillance
Tracking And Object Classification For Automated Surveillance Omar Javed and Mubarak Shah Computer Vision ab, University of Central Florida, 4000 Central Florida Blvd, Orlando, Florida 32816, USA {ojaved,shah}@cs.ucf.edu
