This document summarizes a research paper on human activity detection using edge point movements and spatiotemporal features from video recorded in indoor environments. The proposed method first extracts foreground objects from video frames using background subtraction. It then analyzes object shapes and extracts edge points using edge detection. Edge points across frames are stored in a database and compared to detect changes indicating activities. Activities are recognized by matching to stored patterns, or adding new patterns if unknown. In addition to movements, spatiotemporal features of location and time are considered to better detect activities as normal or abnormal. The goal is to develop a simple and accurate system for activity recognition to assist elderly or disabled people living independently.
human activity recognization using machine learning with data analysisVenkat Projects
Human activity recognition, or HAR for short, is a broad field of study concerned with identifying the specific movement or action of a person based on sensor data.
The sensor data may be remotely recorded, such as video, radar, or other wireless methods. It contains data generated from accelerometer, gyroscope and other sensors of Smart phone to train supervised predictive models using machine learning techniques like SVM , Random forest and decision tree to generate a model. Which can be used to predict the kind of movement being carried out by the person, which is divided into six categories walking, walking upstairs, walking down-stairs, sitting, standing and laying?
MLM and SVM achieved accuracy of more than 99.2% in the original data set and 98.1% using new feature selection method. Results show that the proposed feature selection approach is a promising alternative to activity recognition on smart phones.
Comparative Study of the Deep Learning Neural Networks on the basis of the Hu...saurav singla
The comparative study of the three most efficient Deep Learning models LSTM-RNN, GRU-RNN, and CNN has been performed on the most famous dataset ‘Human Activity Recognition using Smartphones Data Set’ present at UCI machine-learning repository.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
At Vietnam Frontier Summit 2019, CTO of Asilla - an AI startup in Vietnam - did not only introduce about the application of Human activity Recognition in reality but also go into details of the available approaches.
human activity recognization using machine learning with data analysisVenkat Projects
Human activity recognition, or HAR for short, is a broad field of study concerned with identifying the specific movement or action of a person based on sensor data.
The sensor data may be remotely recorded, such as video, radar, or other wireless methods. It contains data generated from accelerometer, gyroscope and other sensors of Smart phone to train supervised predictive models using machine learning techniques like SVM , Random forest and decision tree to generate a model. Which can be used to predict the kind of movement being carried out by the person, which is divided into six categories walking, walking upstairs, walking down-stairs, sitting, standing and laying?
MLM and SVM achieved accuracy of more than 99.2% in the original data set and 98.1% using new feature selection method. Results show that the proposed feature selection approach is a promising alternative to activity recognition on smart phones.
Comparative Study of the Deep Learning Neural Networks on the basis of the Hu...saurav singla
The comparative study of the three most efficient Deep Learning models LSTM-RNN, GRU-RNN, and CNN has been performed on the most famous dataset ‘Human Activity Recognition using Smartphones Data Set’ present at UCI machine-learning repository.
Human motion is fundamental to understanding behaviour. In spite of advancement on single image 3 Dimensional pose and estimation of shapes, current video-based state of the art methods unsuccessful to produce precise and motion of natural sequences due to inefficiency of ground-truth 3 Dimensional motion data for training. Recognition of Human action for programmed video surveillance applications is an interesting but forbidding task especially if the videos are captured in an unpleasant lighting environment. It is a Spatial-temporal feature-based correlation filter, for concurrent observation and identification of numerous human actions in a little-light environment. Estimated the presentation of a proposed filter with immense experimentation on night-time action datasets. Tentative results demonstrate the potency of the merging schemes for vigorous action recognition in a significantly low light environment.
At Vietnam Frontier Summit 2019, CTO of Asilla - an AI startup in Vietnam - did not only introduce about the application of Human activity Recognition in reality but also go into details of the available approaches.
Human Activity Recognition using Smartphone's sensor Pankaj Mishra
Human activity recognition plays significant role in medical field and in security system. In this project we have design a model which recognize a person’s activity based on Smartphone.
A 3- dimensional Smartphone sensor named accelerometer and gyroscope is used to collect time series signal, from which 26 features are generated in time and frequency domain. The activities are classified using 2 different dormant learning method i.e. k-nearest neighbor algorithm, decision tree algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Presentazione human daily activity recognition with sparse representation u...Fabio Greco
Abstract of case study—Human daily activity recognition using mobile personal sensing technology plays a central role in the field of pervasive healthcare. One major challenge lies in the inherent complexity of human body movements and the variety of styles when people perform a certain activity. To tackle this problem, is presented a novel human activity recognition framework based on recently developed compressed sensing and sparse representation theory using wearable inertial sensors. This approach represents human activity signals as a sparse linear combination of activity signals from all activity classes in the training set. The class membership of the activity signal is determined by solving a L^1 minimization problem. Experimentally is validated the effectiveness of the sparse representation-based approach by recognizing nine most common human daily activities performed by 14 subjects.This approach achieves a maximum recognition rate of 96.1%, which beats conventional methods based on nearest neighbor, naive Bayes, and support vector machine by as much as 6.7%. Furthermore ( in the original paper form Mi Zhang, Student Member, IEEE, and Alexander A. Sawchuk, Life Fellow, IEEE) is demonstrated that by using random projection, the task of looking for “optimal features” to achieve the best activity recognition performance is less important within this framework.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
The development of convolutional neural networks(CNN) has provided a new tool to make classification and prediction of human's body motion. This project tends to predict the drop point of a ball thrown out by experimenters by classifying the motion of their body in the process of throwing. Kinect sensor v2 is used to record depth maps and the drop points are recorded by a square infrared induction module. Firstly, convolutional neural networks are made use of to put the data obtained from depth maps in and get the prediction of drop point according to experimenters' motion. Secondly, huge amount of data is used to trainthe networks of different structure, and a network structure that could provide high enough accuracy for drop point prediction is established. The network model and parameters are modified to improve the accuracy of the prediction algorithm. Finally, the experimental data is divided into a training group and a test group. The prediction results of test group reflect that the prediction algorithm effectively improves the accuracy of human motion perception.
A COMPARATIVE STUDY ON HUMAN ACTION RECOGNITION USING MULTIPLE SKELETAL FEATU...mlaij
This paper proposes a framework for human action recognition (HAR) by using skeletal features from depth video sequences. HAR has become a basis for applications such as health care, fall detection, human position tracking, video analysis, security applications, etc. Wehave used joint angle quaternion
and absolute joint position to recognitionhuman action. We also mapped joint position on (3) Lie algebra and fuse it with other features. This approach comprised of three steps namely (i) an automatic skeletal feature (absolute joint position and joint angle) extraction (ii) HAR by using multi-class Support
Vector Machine and (iii) HAR by features fusion and decision fusion classification outcomes. The HAR methodsare evaluated on two publicly available challenging datasets UTKinect-Action and Florence3DAction datasets. The experimental results show that the absolute joint positionfeature is the best than other
features and the proposed framework being highly promising compared to others existing methods.
Background Subtraction Algorithm Based Human Behavior DetectionIJERA Editor
Consider all the features of subset information in video streaming there is a tremendous processes with real time applications. In this paper we introduce and develop a new video surveillance system. Using this technique we detect human normal and exponential behaviors in realistic format, and also we categories data event generation of human tracking in real time applications. In this technique we apply differencing, threshold segmentation, morphological operations and object tracking. The experimental result show efficient human tracking in video streaming operations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Activity Detection System based on Skeleton Joints Identification IJECEIAES
The increasing criminal activities in the current world has drawn lot of interest activity recognition techniques which helps to perform the sophistical analytical operations on human activity and also helps to interface the human and computer interactions. From the existing review analysis it is found that most of the existing systems are not emphasize on computational performance but are more application specific by identifying specific problems. Hence, it is found that all the features are not required for accurate and cost effective human activity detection. Thus, the human skelton action can be considered and presented a simple and accurate process to identify the significant joints only. From the outcomes it is found that the proposed system is cost effective and computational efficient activity recognition technique for human actions.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
Human body motion analysis is an important technology which modem bio-mechanics
combines with computer vision and has been widely used in intelligent control, human computer
interaction, motion analysis, and virtual reality and other fields. In which the moving human body
detection is the most important part of the human body motion analysis, the purpose is to detect the
moving human body with its behavior from the background image in video sequences, and for the follow-up treatment such as the target classification, the human body tracking and behavior understanding, its
effective detection plays a very important role
A presentation on Human Activity Recognition catered to the audience from an HCI or CS background. (Based on research by Bulling, A. et al. 2014. A tutorial on human activity recognition using body-worn inertial sensors. CSUR. 46, 3 (2014), 33.)
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...ijtsrd
Multimodal biometric system is a system that is viable in authentication and capable of carrying the robustness of the system. Most existing biometric systems ear fingerprint and face ear suffer varying challenges such as large variability, high dimensionality, small sample size and average recognition time. These lead to the degrading performance and accuracy of the system. Sequel to this, multimodal biometric system was developed to overcome those challenges. The system was implemented in MATLAB environment. Am improved self organizing feature map was used to classify the fused features into known and unknown. The performance of the developed multimodal was evaluated based on sensitivity, recognition accuracy and time. Olabode, A. O | Amusan, D. G | Ajao, T. A "An Improved Self Organizing Feature Map Classifier for Multimodal Biometric Recognition System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26458.pdfPaper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/26458/an-improved-self-organizing-feature-map-classifier-for-multimodal-biometric-recognition-system/olabode-a-o
Human Activity Recognition using Smartphone's sensor Pankaj Mishra
Human activity recognition plays significant role in medical field and in security system. In this project we have design a model which recognize a person’s activity based on Smartphone.
A 3- dimensional Smartphone sensor named accelerometer and gyroscope is used to collect time series signal, from which 26 features are generated in time and frequency domain. The activities are classified using 2 different dormant learning method i.e. k-nearest neighbor algorithm, decision tree algorithm.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Presentazione human daily activity recognition with sparse representation u...Fabio Greco
Abstract of case study—Human daily activity recognition using mobile personal sensing technology plays a central role in the field of pervasive healthcare. One major challenge lies in the inherent complexity of human body movements and the variety of styles when people perform a certain activity. To tackle this problem, is presented a novel human activity recognition framework based on recently developed compressed sensing and sparse representation theory using wearable inertial sensors. This approach represents human activity signals as a sparse linear combination of activity signals from all activity classes in the training set. The class membership of the activity signal is determined by solving a L^1 minimization problem. Experimentally is validated the effectiveness of the sparse representation-based approach by recognizing nine most common human daily activities performed by 14 subjects.This approach achieves a maximum recognition rate of 96.1%, which beats conventional methods based on nearest neighbor, naive Bayes, and support vector machine by as much as 6.7%. Furthermore ( in the original paper form Mi Zhang, Student Member, IEEE, and Alexander A. Sawchuk, Life Fellow, IEEE) is demonstrated that by using random projection, the task of looking for “optimal features” to achieve the best activity recognition performance is less important within this framework.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
The development of convolutional neural networks(CNN) has provided a new tool to make classification and prediction of human's body motion. This project tends to predict the drop point of a ball thrown out by experimenters by classifying the motion of their body in the process of throwing. Kinect sensor v2 is used to record depth maps and the drop points are recorded by a square infrared induction module. Firstly, convolutional neural networks are made use of to put the data obtained from depth maps in and get the prediction of drop point according to experimenters' motion. Secondly, huge amount of data is used to trainthe networks of different structure, and a network structure that could provide high enough accuracy for drop point prediction is established. The network model and parameters are modified to improve the accuracy of the prediction algorithm. Finally, the experimental data is divided into a training group and a test group. The prediction results of test group reflect that the prediction algorithm effectively improves the accuracy of human motion perception.
A COMPARATIVE STUDY ON HUMAN ACTION RECOGNITION USING MULTIPLE SKELETAL FEATU...mlaij
This paper proposes a framework for human action recognition (HAR) by using skeletal features from depth video sequences. HAR has become a basis for applications such as health care, fall detection, human position tracking, video analysis, security applications, etc. Wehave used joint angle quaternion
and absolute joint position to recognitionhuman action. We also mapped joint position on (3) Lie algebra and fuse it with other features. This approach comprised of three steps namely (i) an automatic skeletal feature (absolute joint position and joint angle) extraction (ii) HAR by using multi-class Support
Vector Machine and (iii) HAR by features fusion and decision fusion classification outcomes. The HAR methodsare evaluated on two publicly available challenging datasets UTKinect-Action and Florence3DAction datasets. The experimental results show that the absolute joint positionfeature is the best than other
features and the proposed framework being highly promising compared to others existing methods.
Background Subtraction Algorithm Based Human Behavior DetectionIJERA Editor
Consider all the features of subset information in video streaming there is a tremendous processes with real time applications. In this paper we introduce and develop a new video surveillance system. Using this technique we detect human normal and exponential behaviors in realistic format, and also we categories data event generation of human tracking in real time applications. In this technique we apply differencing, threshold segmentation, morphological operations and object tracking. The experimental result show efficient human tracking in video streaming operations.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
An Efficient Activity Detection System based on Skeleton Joints Identification IJECEIAES
The increasing criminal activities in the current world has drawn lot of interest activity recognition techniques which helps to perform the sophistical analytical operations on human activity and also helps to interface the human and computer interactions. From the existing review analysis it is found that most of the existing systems are not emphasize on computational performance but are more application specific by identifying specific problems. Hence, it is found that all the features are not required for accurate and cost effective human activity detection. Thus, the human skelton action can be considered and presented a simple and accurate process to identify the significant joints only. From the outcomes it is found that the proposed system is cost effective and computational efficient activity recognition technique for human actions.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
Human body motion analysis is an important technology which modem bio-mechanics
combines with computer vision and has been widely used in intelligent control, human computer
interaction, motion analysis, and virtual reality and other fields. In which the moving human body
detection is the most important part of the human body motion analysis, the purpose is to detect the
moving human body with its behavior from the background image in video sequences, and for the follow-up treatment such as the target classification, the human body tracking and behavior understanding, its
effective detection plays a very important role
A presentation on Human Activity Recognition catered to the audience from an HCI or CS background. (Based on research by Bulling, A. et al. 2014. A tutorial on human activity recognition using body-worn inertial sensors. CSUR. 46, 3 (2014), 33.)
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...ijtsrd
Multimodal biometric system is a system that is viable in authentication and capable of carrying the robustness of the system. Most existing biometric systems ear fingerprint and face ear suffer varying challenges such as large variability, high dimensionality, small sample size and average recognition time. These lead to the degrading performance and accuracy of the system. Sequel to this, multimodal biometric system was developed to overcome those challenges. The system was implemented in MATLAB environment. Am improved self organizing feature map was used to classify the fused features into known and unknown. The performance of the developed multimodal was evaluated based on sensitivity, recognition accuracy and time. Olabode, A. O | Amusan, D. G | Ajao, T. A "An Improved Self Organizing Feature Map Classifier for Multimodal Biometric Recognition System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26458.pdfPaper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/26458/an-improved-self-organizing-feature-map-classifier-for-multimodal-biometric-recognition-system/olabode-a-o
The complete human body or the various limb postures are involved in human action. These days,
Abnormal Human Activity Recognition (Abnormal HAR) is highly well noticed and surveyed in many
studies. However, because of complicated difficulties such as sensor movement, positioning, and so on,
as well as how individuals carry out their activities, it continues to be a difficult process. Identifying
particular activities benefits human-centric applications such as postoperative trauma recovery, gesture
detection, exercise, fitness, and home care help. The HAR system has the ability to automate or
simplify most of the people’s everyday chores. HAR systems often use supervised or unsupervised
learning as their foundation. Unsupervised systems operate according to a set of rules, whereas
supervised systems need to be trained beforehand using specific datasets. This study conducts detailed
literature reviews on the development of various activity identification techniques currently being used.
The three methods—wearable device-based, pose-based, and smartphone sensor—are examined in this
inquiry for identifying abnormal acts (AAD). The sensors in wearable devices collect data, whereas the
gyroscopes and accelerometers in smartphones provide input to the sensors in wearable devices. To
categorize activities, pose estimation uses a neural network. The Anomalous Action Detection Dataset
(Ano-AAD) is created and improved using several methods. The study examines fresh datasets and
innovative models, including UCF-Crime. A new pattern in anomalous HAR systems has emerged,
linking anomalous HAR tasks to computer vision applications including security, video surveillance,
and home monitoring. In terms of issues and potential solutions, the survey looks at visionbased HAR.
Gait Recognition using MDA, LDA, BPNN and SVMIJEEE
Recognition of any individual is a task to identify the human beings. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot of humans. Gait recognition is a type of biometric recognition and related to the behavioral characteristics of biometric recognition. Gait offers ability of distance recognition or at low resolution. In this paper it will present the review of gait recognition system where different approaches and classification categories of Gait recognition like model free and model based approach, MDA, BPNN, LDA, and SVM.
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
Abstract- India has the largest blind population in the world. The complex Indian environment makes it difficult for the people to navigate using the present technology. In-order to navigate effectively a wearable computing system should learn the environment by itself, thus providing enough information for making visually impaired adapt to the environment. The traditional learning algorithm requires the entire percept sequence to learn. This paper will propose algorithms for learning from various sensory inputs with selected percept sequence; analyze what feature and data should be considered for real time learning and how they can be applied for autonomous navigation for blind, what are the problem parameters to be considered for the blind navigation/protection, tools and how it can be used on other application.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
65
The 2D image is the input to the system and this was obtained from the video data collected by the cameras placed in the
indoor homes. The images at every 5secs are examined and the change in the shape of the person will be detected. If the
change in shape leads to an abnormal activity, then the alarm is rang and if it leads to any daily normal activity then the
activity should be detected. This detection system can be applicable at hospital rooms, especially for, patients reside
alone without any helper and at home environments. This will allow a great accuracy rate at the employed environments.
The edge point detection [5] and the spatio-temporal features play a vital role in the activity detection. The edge
point extraction is done for the foreground image that is obtained from the background subtraction. Also the place where
activity happens and the time at which activity happens decides the activity detection, whether it is normal or not. The
problems like battery recharging and uncomfortability while using wearable devices are not here. Also the simple
mechanisms are used with less overhead. While on a system crash situation, anyone without the expertise knowledge can
understand the problem and sometimes may recover them.
2. RELATED WORKS
In some related works, e.g.[6] the human action recognition can be viewed as a process of detecting the actions
of the individual persons. The input data set is collected from depth sensors (such as Microsoft kinect). Training was
given to both indoor and outdoor activities. Using skeleton joints, body position, motion and velocity information
features the activities are modelled. Then a multiclass SVM is used for classifying the dataset. The main merits are,
relatively large size of data set taken in multiple views can handle, 100% accurate in single person one activity, two
person interaction and single person perform two activities. One of the drawbacks is, only person dependent parameters
are considered, not only location/time related recognition.
The work by Dipak Surie, Saeed Partonia [7], and the human identification is done for some security purposes
in smart spaces. The input is the RGB image, acquired from the kinect. Then this is used for the face recognition using
some features and skeletal tracking. Then the information fusion from several sources is done. Each person’s identities
are stored in database earlier. Some advantages of this paper are, security system through face recognition, helps in
implementing smart homes. Some disadvantages are, not much / 100% accuracy rate, face detection should be difficult
because of large representational data set.
In the paper [8] an application of fuzzy set technique. The fall detection and the fall risk assessments are done
here. The Microsoft kinect camera system as well as sensors is used for activity segmentation during day time as well as
night time. Three image sensors are used here standard web camera under visible lighting, web cameras with IR
illumination, and kinect sensors. Some merits are, three sensors were used, so more accuracy is there, Day and night
recognition is done. Some demerits are, single camera used, fuzzy logic is difficult to implement, some activities can’t be
distinguished.
The paper [9] proposes a multiple 3D camera based human tracking method that is robust to illumination
changes and occlusion at indoor environment. Here the several image features such as collaboration intensity, hue, local
binary pattern (LBP) and depth from 3D camera are considered. The first step considered in this paper is a background
subtraction method, which is adaptive Gaussian mixture model, then the human identification, then integration of vertical
axes, and at last adaptive particle filter. Can used in different illuminations and robust to partial and complete occlusions.
But more costly and more calculations and methods are required.
The work [10] the realistic human action recognition through video based on spatio temporal interest points
(STIP’s). The existing system described here is based on spatio-temporal approach and operates on intensity
representation of image data. So these approaches are sensitive to shadow and highlights. Here the colour STIP’s are
used for recognition of human actions in different challenging areas. Mainly the challenging UCF sports counterparts are
recognized. Different UCF datasets are considered. Mainly the multi channel harris stip’s and multi channel gabor stip’s
are also used here for stip’s detection. This deal with large and small datasets and better representations are formed. For
more difficult/ complex data the performance should be less. And the robustness becomes an issue (i.e. more robustness).
A work by Bingbing Ni, Yong Pei, Pierre Moulin [11], combines the data from conventional camera and depth
sensors (e.g., Microsoft Kinect). Proposes a activity recognition by fuses the data from both the gray scale and depth
image channels at multiple levels of the video processing pipeline. The false detections can be avoided by using this
method. The 3D spatial and temporal contexts of objects and human are extracted here. The depth information’s used to
distinguish the different indoor activities. Accurate 3-D spatial and temporal interaction contextual modelling is possible
and High-detection accuracy for complex activity and interaction. If the tracklet extraction parameter value on final
action detection performance is higher the result is unreliable tracking. It affects final action recognition.
3. ACTIVITY CHARACTERISTICS
For the proper designing of the system, first of all understanding of the different types of the activities should
important. Activities are majorly classified in this paper as,
3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
66
3.1 Normal Daily activities
These are the activities which are usually done by the person. They have already data models stored in the
database. By simply comparing the activities data models with the input visuals and considering the location, time it
happens will detects the normal activities.
3.2 Unusual Activities (new activities)
The new activities are not the usual activities. That is not done by the person regularly. Such new activities have
no data models resides in the database. On the other hand, they have to store the models by themselves and forms
corresponding threshold to recognize each activity. At the learning time the system admin can recorded the threshold as a
new activity. At the next time the activity happens then it have data models and the system will recognize it.
3.3 Abnormal activities
Abnormal activities are the activities which causes any harm to the person. Examples are falls, changes in
medicine intake, unconscious moments. The abnormal activities are detected as well as a false alarm signal is sent to the
corresponding person or the nearby hospital etc.
The every activity is recognized mainly by considering the 3 factors. The changes occurring in the person’s edge
point movements are the initial factor to be considered. Then the location where the activity occurs and the time at which
the activity occurs are the deciding factors. Upon these 3 factors the nature of the activity should be recognized.
4. METHOD OVERVIEW
The system working is a simple process, were video data is taken as the input. The video data is taken and
converted into frames at each 5 seconds. The images are then fed into the system and these become the actual input data.
Then the system work within 6 major steps. Background subtraction, shape analysis, edge point extraction, learning new
activity, spatio-temporal feature analysis and checking activity is normal or not.
First of all the video data collected from the indoor cameras. Then those video will be converted into images at
every 5seconds. Those images one by one will be the input to the system. There after the actual process is started.
4.1 Background subtraction
Background subtraction or foreground detection is one of the major step in the image processing. Here the
images one by one should be fed as the input. Using the adaptive background subtraction method [12] the foreground
detection should be done here. This background subtraction gives a silhouette image of the foreground objects, which are
always the interesting points of the image. A probabilistic approach is used in this method.
By using this method the noise level can be reduced. The foreground objects in the scene can be detected by this
method. This object data is the key for the activity recognition system. By using this key data about the person and the
interacting objects the activity detection can be made smoother. The general equation used for the background
subtraction is:
|I(x,y) – B(x,y)| > Th (1)
Where, I(x,y) is the input image pixel, B(x,y) is the background image pixel, Th is the threshold value. If the
equation is true then, the image pixel should be a foreground pixel. Otherwise it is a background pixel. The output of this
level should be the input of the next step.
Fig.1: functional block diagram
4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
67
4.2 Shape analysis
The shape analysis is the 2nd stage in the activity detection system. Shape of the human can be recognized using
different methods. But here a database based approach is adapted. Already stored data models are compared with the
foreground images and thus the shape of human and the interacting objects are find out. The already stored foreground
data models of the human and the foreground models/ patterns of most probably interacting objects are the basic factors
of this stage.
The foreground images coming from the first step is taken and compares the each image with the data base
models. Thus the presence of the human in the image and the interacting objects are identified. This step involves the
concept of data base and pattern matching. At the end of this step, only the foreground image of the human and the
interacting object should be maintained/ considered for the further stages.
4.3 Edge point extraction
Then the edge point extraction is carried out. The edge points are extracted using the canny edge detector [13].
Using this technique, only the relevant edge points are figure out from the previous step’s output. The edge point
extraction is mainly done for the easier representation of the movements of the human and comparing the consecutive
images for activity recognition. Only select the particular number of landmarks for the images. This selection of a
particular increment for the regular landmarks is specified in [5], using the equation:
I = max (ni-1, ni) / N (2)
Where, I is the increment, N is the total number of landmarks used for the experiments, ni-1 & ni are
respectively the total number of edge points in the previous (t-1 time’s) and current (time t) foreground image. The
difference in this edge point images are noted and they are again compare with the already stored data patterns. From this
point the data flow is diverted to two directions. The edge point images are compared with the data models already
resides in the data bases, if the activity pattern is already there then the data flow on to the step (e), otherwise flow on to
step (d). This is a crucial step in this system. Because of that the edge point extraction will became the core of this
system.
4.4 Learning new activity
In the previous step, after the edge point extraction, if the activity is not exists in the models, then learning the
new activity become the next step. By taking the corresponding images the new set of activity is stored in the database
using a particular threshold. Learning the unmodelled activity will be very important for a scalable system. Updating the
database is done using an ontology based concept [14]. The similarities of the unlabelled image frames are found out and
these similar actions form a group and update the database with a new activity. Consider:
T1 = similarity (ni , ni +1),
T2 = similarity (ni +1, ni +2) etc. (3)
Were, ni, ni+1, ni+2 etc are each unidentified consecutive frames. T1, T2 are just the similarity thresholds.
If T1, T2 are similar then group them as the actions of the same activity. Form a threshold for the new activity
and save it in the database for the further usage.
4.5 Spatio-temporal feature analysis
If the activity is already modelled or the activity is known to the system, then next step is the spatio- temporal
feature analysis. The location of the activities taken and time at which the activities done are also crucial in the activity
recognition. From this data the activity is classified as normal or abnormal [15]. Based on the location the activities can
be detected. The activities done on different locations should be different. Only some normal activities are carried out
same in different locations. These activities are find out and already stored in the database.
Any activity that is done at different represents as an abnormal activity. Time has also considered. The time at
which any activity taken place is also important in the activity recognition. Some activities such as medicine intake
depend mainly on time. As the medicine intake greater than 3 or 4 in a day then it will mark as an abnormal activity.
Thus for some activities a threshold T is set. And the number of occurrence of the activity is counted by a counter and
when the threshold becomes less than the counter value, and then the false alarm is forwarded.
4.6 Checking activity is normal or not
After considering the spatio- temporal features, the final activity recognition is done. Here mainly the accidental
activities such as falls, injuries are identified. Help of the data bases and the spatio- temporal features these are done. If
the activity belongs to the abnormal category, then an alarm is triggered as a message to corresponding person or any
5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
68
hospitals/ medical institutions. Otherwise the activity is identified by the system and sends the information to the
corresponding person.
5. EXPECTED RESULTS
The demonstration of the proposed system can be done using an experiment video clip. The image frames are
extracted from the input video image and these frames are used for the further activities. Then the foreground will be
extracted using the background subtraction method. The background subtraction shall been done using the background
image extracted earlier and the frame with the person. The Fig. 1 shows the input data to the system.
Fig.2: example frame of the background and the input frames used for background subtraction
Then the shape of the person and the interacting objects can be detected from the foreground frame and then the
edge points of the human and the interacting objects are obtained. Then the database checking is done. The database data
has a crucial value in the recognition system. The pattern comparison is done using the most efficient classifiers. If the
data about the activity is not present a learning process is done. The time and the place where the activity is proceeding
are also dependent on the detection of the activity. The system can detect any of the activity, but here takes an abnormal
activity such as fall.
The expected outcome is a false alarm and the detection of the activity (i.e. fall an abnormal activity). The result
set can be demonstrated using the following table:
Table.1: Normal Vs abnormal activities
The abnormal activities like unusual medicine intake, lying over time etc are detected using the particular
threshold values given. The alarm is set in the form of SMS/ Voice alarm; this can be sent to the nearby hospitals or the
corresponding personalities.
6. CONCLUSION
The paper will overcome the existing tradition techniques of the activity recognition. Those may have highly
expensive. The proposed method adopts many simple methods for the detection of the each activity. By the combined
use of these simple techniques the system must be made efficient and will be of less expensive. The alarm system and the
database learning systems are act like separate modules. But which are incorporated in the main module of the activity
detection system. In future, the system can be expanded using the latest infrared technology and also researches can be
made on this area. Finally, we can believe that the system will perform efficiently to detect the activities.
6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
69
7. REFERENCES
[1] M. Kangas, A. Konttila, P. Lindgren, I. Winblad, and T. J¨ams¨a, Comparison of low complexity fall detection
algorithms for body attached accelerometers, Gait Posture, vol. 28, no. 2, pp. 285–291, 2008.
[2] M. Nyan, F. E. Tay, and E. Murugasu, A wearable system for pre-impact fall detection, J. Biomech., vol. 41,
no. 16, pp. 3475–3481, 2008.
[3] iLife. Fall Detection Sensor [Online]. Available: http://www. falldetection.com/iLifeFDS.asp.
[4] Directalert. Wireless Emergency Response System [Online]. Available:
http://www.directalert.ca/emergency/help-button.php.
[5] Caroline Rougier, Jean Meunier, Alain St-Arnaud, and Jacqueline Rousseau, Robust Video Surveillance for Fall
Detection Based on Human Shape Deformation, IEEE transactions on circuits and systems for video
technology, vol. 21, no. 5, may 2011 611.
[6] Megha D Bengalur, Human Activity Recognition using Body pose features and support vector machine,
International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2013, IEEE
Conference.
[7] Dipak Surie, Saeed Partonia, Helena Lindgren, Human Sensing using Computer Vision for Personized Smart
spaces, 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th
International Conference on Autonomic & Trusted Computing.
[8] Tanvi Banerjee, Student Member, IEEE, James M. Keller, Fellow, IEEE, Marjorie Skubic, Senior Member,
IEEE, and Erik Stone, Student Member, IEEE, Day or Night activity Recognition from Video using Fuzzy
Clustering Techniques, 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and
2013 IEEE 10th International Conference on Autonomic & Trusted Computing, IEEE transactions on fuzzy
systems, vol. 22, no. 3, June 2013.
[9] Choi, Chansu Kim, and Sung-Kee Park, 2013 IEEE RO-MAN, Human tracking with multiple 3D Cameras for
Perceptual Sensor Network, The 22nd IEEE International Symposium on Robot and Human Interactive
Communication Gyeongju, Korea, August 26-29, 2013.
[10] Ivo Everts, Jan C. van Gemert, and Theo Gevers, Member, Evaluation of Color Spatio-Temporal Interest Points
for Human Action Recognition, IEEE, IEEE transactions on image processing, vol. 23, no. 4, April 2014.
[11] Bingbing Ni, Yong Pei, Pierre Moulin, Fellow, IEEE, and Shuicheng Yan, Senior Member, IEEE, Multilevel
Depth and Image Fusion for Human Activity Detection, IEEE transactions on cybernetics, vol. 43, no. 5,
October 2013.
[12] J. Mike McHugh, Member, IEEE, Janusz Konrad, Fellow, IEEE, Venkatesh Saligrama, Senior Member, IEEE,
and Pierre-Marc Jodoin, Member, IEEE, Foreground-Adaptive Background Subtraction, IEEE signal processing
letters, vol. 16, no. 5, may 2009.
[13] J. Canny, A computational approach to edge detection, IEEE Trans. Pattern Anal. Mach. Intell., vol. 8, no. 6,
pp. 679–698, Nov. 1986.
[14] Liming Chen, Member, IEEE, Chris Nugent, Member, IEEE, and George Okeyo, Member, IEEE, “An
Ontology-Based Hybrid Approach to Activity Modeling for Smart Homes, IEEE transactions on human-
machine systems, vol. 44, no. 1, February 2014.
[15] Chen Wu, Amir Hossein Khalili and Hamid Aghajan Stanford University, Stanford CA , “Multiview Activity
Recognition in Smart Homes with Spatio-Temporal Features, Aug 31, 2010.
[16] Kavita P. Mahajan and Prof. S. V. Patil, “Tracking and Counting Human in Visual Surveillance System”,
International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3,
Issue 3, 2012, pp. 139 - 146, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[17] Najmuzzama Zerdi, Dr. Subhash S Kulkarni, Dr. V.D. Mytri and Kashyap D Dhruve, “Crowd Behaviour
Analysis Considering Inter-Personnel Activities in Surveillance Systems”, International Journal of Computer
Engineering & Technology (IJCET), Volume 5, Issue 2, 2014, pp. 71 - 87, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.