Human Activity Recognition using LSTM with depth data
Keywords:
HAR, deep learning, CNN, neural networkAbstract
For many academics, HAR is a hot topic. They can do this with ease because to a number of cutting-edge technologies, including deep learning, which is useful in a number of contexts. While most of the current body of work has focused on wearable sensor data, it is not always practical to get such data. Publicly accessible video datasets are mined for human activity detection in the proposed study using deep learning techniques including CNNand long short-term memory. CNN extracts relevant characteristics from input data, whereas LSTM eliminates and rejects superfluous data to increase performance. The confusion matrix's precision and recall are used to evaluate the suggested technique. Accuracy is high across the board, as shown by the fact that the diagonals of the confusion matrices for all actions are near to 1.
Downloads
References
M. M. Hassan, S. Huda, M. Z. Uddin, A. Almogren, and M. Alrubaian, “Human Activity Recognition from Body Sensor Data using Deep Learning,” J. Med. Syst., vol. 42, no. 6, 2018, doi: 10.1007/s10916-018-0948-z.
D. Nikolova, I. Vladimirov, and Z. Terneva, “Human Action Recognition for Pose-based Attention: Methods on the Framework of Image Processing and Deep Learning,” 2021 56th Int. Sci. Conf. Information, Commun. Energy Syst. Technol. ICEST 2021 - Proc., pp. 23–26, 2021, doi: 10.1109/ICEST52640.2021.9483503.
R. Poppe, “Vision-based human motion analysis : An overview,” vol. 108, pp. 4–18, 2007, doi: 10.1016/j.cviu.2006.10.016.
T. Özyer, D. S. Ak, and R. Alhajj, “Human action recognition approaches with video datasets—A survey,” Knowledge-Based Syst., vol. 222, p. 106995, 2021, doi: 10.1016/j.knosys.2021.106995.
R. Bodor, “Vision-Based Human Tracking and Activity Recognition.”
S. Patil and K. S. Prabhushetty, “Bi-attention LSTM with CNN based multi-task human activity detection in video surveillance,” Int. J. Eng. Trends Technol., vol. 69, no. 11, pp. 192–204, 2021, doi: 10.14445/22315381/IJETT-V69I11P225.
S. S. Begampure and P. M. Jadhav, “Intelligent Video Analytics For Human Action Detection: A Deep Learning Approach With Transfer Learning,” Int. J. Comput. Digit. Syst., vol. 11, no. 1, pp. 63–71, 2022, doi: 10.12785/ijcds/110105.
D. Cavaliere, V. Loia, A. Saggese, S. Senatore, and M. Vento, “Knowledge-Based Systems A human-like description of scene events for a proper UAV-based video content analysis ✩,” Knowledge-Based Syst., vol. 178, no. 2019, pp. 163–175, 2020, doi: 10.1016/j.knosys.2019.04.026.
H. Yu et al., “Multiple human tracking in wearable camera videos with informationless intervals,” Pattern Recognit. Lett., vol. 112, pp. 104–110, 2018, doi: 10.1016/j.patrec.2018.06.003.
H. Madokoro, S. Nix, H. Woo, and K. Sato, “A mini-survey and feasibility study of deep-learning-based human activity recognition from slight feature signals obtained using privacy-aware environmental sensors,” Appl. Sci., vol. 11, no. 24, pp. 1–31, 2021, doi: 10.3390/app112411807.
X. Yang et al., “A CNN-based posture change detection for lactating sow in untrimmed depth videos,” Comput. Electron. Agric., vol. 185, no. March, p. 106139, 2021, doi: 10.1016/j.compag.2021.106139.
I. U. Khan, S. Afzal, and J. W. Lee, “Human activity recognition via hybrid deep learning based model,” Sensors, vol. 22, no. 1, 2022, doi: 10.3390/s22010323.
L. Mo, F. Li, Y. Zhu, and A. Huang, “Human physical activity recognition based on computer vision with deep learning model,” Conf. Rec. - IEEE Instrum. Meas. Technol. Conf., vol. 2016-July, 2016, doi: 10.1109/I2MTC.2016.7520541.
P. Y. Chen and V. W. Soo, “Humor recognition using deep learning,” NAACL HLT 2018 - 2018 Conf. North Am. Chapter Assoc. Comput. Linguist. Hum. Lang. Technol. - Proc. Conf., vol. 2, pp. 113–117, 2018, doi: 10.18653/v1/n18-2018.
A. A. Abed and S. A. Rahman, “Python-based Raspberry Pi for Hand Gesture Recognition Python-based Raspberry Pi for Hand Gesture Recognition,” no. September, 2017, doi: 10.5120/ijca2017915285.
M. Latah, “Human action recognition using support vector machines and 3D convolutional neural networks,” Int. J. Adv. Intell. Informatics, vol. 3, no. 1, pp. 47–55, 2017, doi: 10.26555/ijain.v3i1.89.
Z. Shi, J. A. Zhang, R. Xu, and G. Fang, “Human Activity Recognition Using Deep Learning Networks with Enhanced Channel State Information,” 2018 IEEE Globecom Work. GC Wkshps 2018 - Proc., 2019, doi: 10.1109/GLOCOMW.2018.8644435.
S. Chung, J. Lim, K. J. Noh, G. Kim, and H. Jeong, “Sensor data acquisition and multimodal sensor fusion for human activity recognition using deep learning,” Sensors (Switzerland), vol. 19, no. 7, 2019, doi: 10.3390/s19071716.
O. S. Amosov, S. G. Amosova, Y. S. Ivanov, and S. V Zhiganov, “ScienceDirect ScienceDirect ScienceDirect Using the Ensemble of Deep Neural Networks for Normal and Using the Ensemble of Deep Neural Networks for Normal and Abnormal Situations Detection and Recognition in the Continuous Abnormal Situations Detection and,” Procedia Comput. Sci., vol. 150, pp. 532–539, 2019, doi: 10.1016/j.procs.2019.02.089.
V. Mavani, S. Raman, and K. P. Miyapuram, “Facial Expression Recognition using Visual Saliency and Deep Learning Viraj Mavani L . D . College of Engineering Shanmuganathan Raman Indian Institute of Technology Krishna P Miyapuram Indian Institute of Technology,” pp. 2783–2788, 2012.
A. B. Sargano, X. Wang, P. Angelov, and Z. Habib, “Human action recognition using transfer learning with deep representations,” Proc. Int. Jt. Conf. Neural Networks, vol. 2017-May, pp. 463–469, 2017, doi: 10.1109/IJCNN.2017.7965890.
T. B. Moeslund, A. Hilton, and V. Kru, “A survey of advances in vision-based human motion capture and analysis,” vol. 104, pp. 90–126, 2006, doi: 10.1016/j.cviu.2006.08.002.
Singh, S. ., Wable, S. ., & Kharose, P. . (2021). A Review Of E-Voting System Based on Blockchain Technology. International Journal of New Practices in Management and Engineering, 10(04), 09–13. https://doi.org/10.17762/ijnpme.v10i04.125
Veeraiah, D., Mohanty, R., Kundu, S., Dhabliya, D., Tiwari, M., Jamal, S. S., & Halifa, A. (2022). Detection of malicious cloud bandwidth consumption in cloud computing using machine learning techniques. Computational Intelligence and Neuroscience, 2022 doi:10.1155/2022/4003403
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.