Recognition of any individual is a task to identify the human beings. Human identification using Gait is method to identify an individual by the way he walk or manner of moving on foot of humans. Gait recognition is a type of biometric recognition and related to the behavioral characteristics of biometric recognition. Gait offers ability of distance recognition or at low resolution. In this paper it will present the review of gait recognition system where different approaches and classification categories of Gait recognition like model free and model based approach, MDA, BPNN, LDA, and SVM.
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection of moving objects in video surveillance system. Moving body detection is first important task for any video surveillance system. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame. In this survey,paper described about optical flow method, Background subtraction, frame differencing to detect moving object. It also described tracking method based on Morphology technique.
Keywords -- Frame separation, Pre-processing, Object detection using frame difference, Optical flow,
Temporal Differencing and background subtraction. Object tracking
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRYIJCSEA Journal
ABSTRACT
Human gait, which is a new biometric aimed to recognize individuals by the way they walk have come to play an increasingly important role in visual surveillance applications. In this paper a novel hybrid holistic approach is proposed to show how behavioural walking characteristics can be used to recognize unauthorized and suspicious persons when they enter a surveillance area. Initially background is modelled from the input video captured from cameras deployed for security and the foreground moving object in the individual frames are segmented using the background subtraction algorithm. Then gait representing spatial, temporal and wavelet components are extracted and fused for training and testing multi class support vector machine models (SVM). The proposed system is evaluated using side view videos of NLPR database. The experimental results demonstrate that the proposed system achieves a pleasing recognition rate and also the results indicate that the classification ability of SVM with Radial Basis Function (RBF) is better than with other kernel functions.
Automatic Isolated word sign language recognitionSana Fakhfakh
This paper suggests a new system to help the
deaf and the hearing-impaired community improve their
connection with the hearing world and communicate
freely. The most important thing in this system is
how to help the users be free and finally have a more
natural way of communication. For this reason, we
present a new process based on two levels: a static-level
aiming to extract the most head/hands key points and
a dynamic-level with the objective of accumulating the
key-point trajectory matrix. Also our proposed approach
takes into account the signer-independence constraint.
A SIGNUM database is applied in the classification
stage and our system performances have improved with
a 94.3% recognition rate. Furthermore, a reduction
in time processing is obtained when the removing of
redundant frame step is applied. The obtained results
prove the superiority of our system compared to the
state-of- the-art methods in terms of recognition rate and
execution time.
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
This paper proposes a new hand detection and wrist localization method which presents an important step in the hand gesture recognizing process. The wrist localization step has not been given much attention and the existing works are limited and include many conditions. Our proposed approach was evaluated on a public dataset whose obtained results underscore its performance. We highlight through a comparative study with existing work, the superiority of our approach and the importance of the wrist localization step. We also propose to benefit from our proposed method which can be applied in the sign language recognition domain, and more precisely in the Arabic digit sign language recognition.
This paper represents a survey of various methods of video surveillance system which improves the security. The aim of this paper is to review of various moving object detection technics. This paper focuses on detection of moving objects in video surveillance system. Moving body detection is first important task for any video surveillance system. Detection of moving object is a challenging task. Tracking is required in higher level applications that require the location and shape of object in every frame. In this survey,paper described about optical flow method, Background subtraction, frame differencing to detect moving object. It also described tracking method based on Morphology technique.
Keywords -- Frame separation, Pre-processing, Object detection using frame difference, Optical flow,
Temporal Differencing and background subtraction. Object tracking
BIOMETRIC AUTHORIZATION SYSTEM USING GAIT BIOMETRYIJCSEA Journal
ABSTRACT
Human gait, which is a new biometric aimed to recognize individuals by the way they walk have come to play an increasingly important role in visual surveillance applications. In this paper a novel hybrid holistic approach is proposed to show how behavioural walking characteristics can be used to recognize unauthorized and suspicious persons when they enter a surveillance area. Initially background is modelled from the input video captured from cameras deployed for security and the foreground moving object in the individual frames are segmented using the background subtraction algorithm. Then gait representing spatial, temporal and wavelet components are extracted and fused for training and testing multi class support vector machine models (SVM). The proposed system is evaluated using side view videos of NLPR database. The experimental results demonstrate that the proposed system achieves a pleasing recognition rate and also the results indicate that the classification ability of SVM with Radial Basis Function (RBF) is better than with other kernel functions.
Automatic Isolated word sign language recognitionSana Fakhfakh
This paper suggests a new system to help the
deaf and the hearing-impaired community improve their
connection with the hearing world and communicate
freely. The most important thing in this system is
how to help the users be free and finally have a more
natural way of communication. For this reason, we
present a new process based on two levels: a static-level
aiming to extract the most head/hands key points and
a dynamic-level with the objective of accumulating the
key-point trajectory matrix. Also our proposed approach
takes into account the signer-independence constraint.
A SIGNUM database is applied in the classification
stage and our system performances have improved with
a 94.3% recognition rate. Furthermore, a reduction
in time processing is obtained when the removing of
redundant frame step is applied. The obtained results
prove the superiority of our system compared to the
state-of- the-art methods in terms of recognition rate and
execution time.
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
Sign Language SL is a medium of communication for physically disabled people. It is a gesture based language for communication of dumb and deaf people. These people communicate by using different actions of hands, where each different action means something. Sign language is the only way of conversation for deaf and dumb people. It is very difficult to understand this language for the common people. Hence sign language recognition has become an important task. There is a necessity for a translator to communicate with the world. Real time translator for sign language provides a medium to communicate with others. Previous methods employs sensor gloves, hat mounted cameras, armband etc. which has wearing difficulties and have noisy behaviour. To alleviate this problem, a real time gesture recognition system using Deep Learning DL is proposed. It enables to achieve improvements on the gesture recognition performance. Jeni Moni | Anju J Prakash ""A Deep Neural Framework for Continuous Sign Language Recognition by Iterative Training: Survey"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30032.pdf
Paper Url : https://www.ijtsrd.com/engineering/computer-engineering/30032/a-deep-neural-framework-for-continuous-sign-language-recognition-by-iterative-training-survey/jeni-moni
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
This paper proposes a new hand detection and wrist localization method which presents an important step in the hand gesture recognizing process. The wrist localization step has not been given much attention and the existing works are limited and include many conditions. Our proposed approach was evaluated on a public dataset whose obtained results underscore its performance. We highlight through a comparative study with existing work, the superiority of our approach and the importance of the wrist localization step. We also propose to benefit from our proposed method which can be applied in the sign language recognition domain, and more precisely in the Arabic digit sign language recognition.
A COMPARATIVE STUDY ON HUMAN ACTION RECOGNITION USING MULTIPLE SKELETAL FEATU...mlaij
This paper proposes a framework for human action recognition (HAR) by using skeletal features from depth video sequences. HAR has become a basis for applications such as health care, fall detection, human position tracking, video analysis, security applications, etc. Wehave used joint angle quaternion
and absolute joint position to recognitionhuman action. We also mapped joint position on (3) Lie algebra and fuse it with other features. This approach comprised of three steps namely (i) an automatic skeletal feature (absolute joint position and joint angle) extraction (ii) HAR by using multi-class Support
Vector Machine and (iii) HAR by features fusion and decision fusion classification outcomes. The HAR methodsare evaluated on two publicly available challenging datasets UTKinect-Action and Florence3DAction datasets. The experimental results show that the absolute joint positionfeature is the best than other
features and the proposed framework being highly promising compared to others existing methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Framework for Human Action Detection via Extraction of Multimodal FeaturesCSCJournals
This work discusses the application of an Artificial Intelligence technique called data extraction and a process-based ontology in constructing experimental qualitative models for video retrieval and detection. We present a framework architecture that uses multimodality features as the knowledge representation scheme to model the behaviors of a number of human actions in the video scenes. The main focus of this paper placed on the design of two main components (model classifier and inference engine) for a tool abbreviated as VASD (Video Action Scene Detector) for retrieving and detecting human actions from video scenes. The discussion starts by presenting the workflow of the retrieving and detection process and the automated model classifier construction logic. We then move on to demonstrate how the constructed classifiers can be used with multimodality features for detecting human actions. Finally, behavioral explanation manifestation is discussed. The simulator is implemented in bilingual; Math Lab and C++ are at the backend supplying data and theories while Java handles all front-end GUI and action pattern updating. To compare the usefulness of the proposed framework, several experiments were conducted and the results were obtained by using visual features only (77.89% for precision; 72.10% for recall), audio features only (62.52% for precision; 48.93% for recall) and combined audiovisual (90.35% for precision; 90.65% for recall).
There has been over the past few years, a very increased popularity for yoga. A lot of literatures have been published that claim yoga to be beneficial in improving the overall lifestyle and health especially in rehabilitation, mental health and more. Considering the fast-paced lives that individuals live, people usually prefer to exercise or work-out from the comfort of their homes and with that a need for an instructor arises. Hence why, we have developed a self-assisted system which can be used to detect and classify yoga asanas, which is discussed in-depth in this paper. Especially now when the pandemic has taken over the world, it is not feasible to attend physical classes or have an instructor over. Using the technology of Computer Vision, a computer-assisted system such as the one discussed, comes in very handy. The technologies such as ml5.js, PoseNet and Neural Networks are made use for the human pose estimation and classification. The proposed system uses the above-mentioned technologies to take in a real-time video input and analyze the pose of an individual, and classifies the poses into yoga asanas. It also displays the name of the yoga asana that is detected along with the confidence score.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
The development of convolutional neural networks(CNN) has provided a new tool to make classification and prediction of human's body motion. This project tends to predict the drop point of a ball thrown out by experimenters by classifying the motion of their body in the process of throwing. Kinect sensor v2 is used to record depth maps and the drop points are recorded by a square infrared induction module. Firstly, convolutional neural networks are made use of to put the data obtained from depth maps in and get the prediction of drop point according to experimenters' motion. Secondly, huge amount of data is used to trainthe networks of different structure, and a network structure that could provide high enough accuracy for drop point prediction is established. The network model and parameters are modified to improve the accuracy of the prediction algorithm. Finally, the experimental data is divided into a training group and a test group. The prediction results of test group reflect that the prediction algorithm effectively improves the accuracy of human motion perception.
Gait is the style of walking or limb movement of a
person. Gait recognition is a biometric technology that is based
on behavioral features of human. It finds applications in different
areas such as banks, military, airports, and many other areas for
threat detection and security purposes. Biometric gait recognition
is a popular area of research as it is an unobtrusive process to
recognize a person. In the current paper we review several
approaches of gait recognition, discuss their advantages and
disadvantages and then show directions for future research.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
Human body motion analysis is an important technology which modem bio-mechanics
combines with computer vision and has been widely used in intelligent control, human computer
interaction, motion analysis, and virtual reality and other fields. In which the moving human body
detection is the most important part of the human body motion analysis, the purpose is to detect the
moving human body with its behavior from the background image in video sequences, and for the follow-up treatment such as the target classification, the human body tracking and behavior understanding, its
effective detection plays a very important role
Gesture Recognition using Principle Component Analysis & Viola-Jones AlgorithmIJMER
Gesture recognition pertains to recognizing meaningful expressions of motion by a human,
involving the hands, arms, face, head, and/or body. It is of utmost importance in designing an intelligent
and efficient human–computer interface. The applications of gesture recognition are manifold, ranging
from sign language through medical rehabilitation to virtual reality. In this paper, we provide a survey on
gesture recognition with particular emphasis on hand gestures and facial expressions. Applications
involving wavelet transform and principal component analysis for face and hand gesture recognition on
digital images
A presentation on Human Activity Recognition catered to the audience from an HCI or CS background. (Based on research by Bulling, A. et al. 2014. A tutorial on human activity recognition using body-worn inertial sensors. CSUR. 46, 3 (2014), 33.)
In our World of today, the quest to get rich at all cost without working for our money has led some of our youth into crimes such as robbery and kidnapping. As a result of this and by the sheer fact that vehicles are now very expensive to buy these days, there is a need for people to safeguard their vehicles against these hoodlums to avoid loss of their precious Assets to these rampaging criminals. Tracking is technology that is used by many companies and individuals to track a vehicle, an individual or an asset by using many ways like GPS that operates using satellites and ground-based stations or by using our approach which depends on the cellular mobile towers. Vehicle tracking system is a system that can be used in monitoring and locating a vehicle, avoid theft or recover a stolen vehicle, for monitoring of vehicle routes to ensure strict compliance to an already defined vehicle routes, monitor driver’s behavior, predict bus arrival as well as for fleet management. Internet of things has made it very possible to devices to inter communicate amongst themselves and exchange information, helping in acquiring and analyzing information faster that we used to know in the past and this has helped more especially in vehicle monitoring to ensure that vehicle owners feel safe about their investments without fearing about their loss. In this paper, we propose a vehicle monitoring system based on IOT technology, using 4G/LTE to get the get the coordinate, speed, and overall condition of the vehicle, process and send to a remote server to be analyzed and used in locating the vehicle and monitor its other configured parameters. This is realized using Raspberry pi, 4G/LTE, GPS, Accelerometer and other sensors with communicate amongst themselves to get the environmental parameters which is processed and sent to a remote server where it is analyzed and represented on a map to locate the vehicle and monitor the other set parameters. 4G/LTE provides fast internet connectivity with overcomes the usual delay usually experienced in sending the acquired signals to be processed. The True Vehicle position is represented using google geolocation service and the actual position triangulated in real-time.
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTORsipij
Identifying human behaviors is a challenging research problem due to the complexity and variation of
appearances and postures, the variation of camera settings, and view angles. In this paper, we try to
address the problem of human behavior identification by introducing a novel motion descriptor based on
statistical features. The method first divide the video into N number of temporal segments. Then for each
segment, we compute dense optical flow, which provides instantaneous velocity information for all the
pixels. We then compute Histogram of Optical Flow (HOOF) weighted by the norm and quantized into 32
bins. We then compute statistical features from the obtained HOOF forming a descriptor vector of 192- dimensions. We then train a non-linear multi-class SVM that classify dif erent human behaviors with the
accuracy of 72.1%. We evaluate our method by using publicly available human action data set. Experimental results shows that our proposed method out performs state of the art methods.
A COMPARATIVE STUDY ON HUMAN ACTION RECOGNITION USING MULTIPLE SKELETAL FEATU...mlaij
This paper proposes a framework for human action recognition (HAR) by using skeletal features from depth video sequences. HAR has become a basis for applications such as health care, fall detection, human position tracking, video analysis, security applications, etc. Wehave used joint angle quaternion
and absolute joint position to recognitionhuman action. We also mapped joint position on (3) Lie algebra and fuse it with other features. This approach comprised of three steps namely (i) an automatic skeletal feature (absolute joint position and joint angle) extraction (ii) HAR by using multi-class Support
Vector Machine and (iii) HAR by features fusion and decision fusion classification outcomes. The HAR methodsare evaluated on two publicly available challenging datasets UTKinect-Action and Florence3DAction datasets. The experimental results show that the absolute joint positionfeature is the best than other
features and the proposed framework being highly promising compared to others existing methods.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Framework for Human Action Detection via Extraction of Multimodal FeaturesCSCJournals
This work discusses the application of an Artificial Intelligence technique called data extraction and a process-based ontology in constructing experimental qualitative models for video retrieval and detection. We present a framework architecture that uses multimodality features as the knowledge representation scheme to model the behaviors of a number of human actions in the video scenes. The main focus of this paper placed on the design of two main components (model classifier and inference engine) for a tool abbreviated as VASD (Video Action Scene Detector) for retrieving and detecting human actions from video scenes. The discussion starts by presenting the workflow of the retrieving and detection process and the automated model classifier construction logic. We then move on to demonstrate how the constructed classifiers can be used with multimodality features for detecting human actions. Finally, behavioral explanation manifestation is discussed. The simulator is implemented in bilingual; Math Lab and C++ are at the backend supplying data and theories while Java handles all front-end GUI and action pattern updating. To compare the usefulness of the proposed framework, several experiments were conducted and the results were obtained by using visual features only (77.89% for precision; 72.10% for recall), audio features only (62.52% for precision; 48.93% for recall) and combined audiovisual (90.35% for precision; 90.65% for recall).
There has been over the past few years, a very increased popularity for yoga. A lot of literatures have been published that claim yoga to be beneficial in improving the overall lifestyle and health especially in rehabilitation, mental health and more. Considering the fast-paced lives that individuals live, people usually prefer to exercise or work-out from the comfort of their homes and with that a need for an instructor arises. Hence why, we have developed a self-assisted system which can be used to detect and classify yoga asanas, which is discussed in-depth in this paper. Especially now when the pandemic has taken over the world, it is not feasible to attend physical classes or have an instructor over. Using the technology of Computer Vision, a computer-assisted system such as the one discussed, comes in very handy. The technologies such as ml5.js, PoseNet and Neural Networks are made use for the human pose estimation and classification. The proposed system uses the above-mentioned technologies to take in a real-time video input and analyze the pose of an individual, and classifies the poses into yoga asanas. It also displays the name of the yoga asana that is detected along with the confidence score.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
MOTION PREDICTION USING DEPTH INFORMATION OF HUMAN ARM BASED ON ALEXNETgerogepatton
The development of convolutional neural networks(CNN) has provided a new tool to make classification and prediction of human's body motion. This project tends to predict the drop point of a ball thrown out by experimenters by classifying the motion of their body in the process of throwing. Kinect sensor v2 is used to record depth maps and the drop points are recorded by a square infrared induction module. Firstly, convolutional neural networks are made use of to put the data obtained from depth maps in and get the prediction of drop point according to experimenters' motion. Secondly, huge amount of data is used to trainthe networks of different structure, and a network structure that could provide high enough accuracy for drop point prediction is established. The network model and parameters are modified to improve the accuracy of the prediction algorithm. Finally, the experimental data is divided into a training group and a test group. The prediction results of test group reflect that the prediction algorithm effectively improves the accuracy of human motion perception.
Gait is the style of walking or limb movement of a
person. Gait recognition is a biometric technology that is based
on behavioral features of human. It finds applications in different
areas such as banks, military, airports, and many other areas for
threat detection and security purposes. Biometric gait recognition
is a popular area of research as it is an unobtrusive process to
recognize a person. In the current paper we review several
approaches of gait recognition, discuss their advantages and
disadvantages and then show directions for future research.
Analysis of Human Behavior Based On Centroid and Treading TrackIJMER
Human body motion analysis is an important technology which modem bio-mechanics
combines with computer vision and has been widely used in intelligent control, human computer
interaction, motion analysis, and virtual reality and other fields. In which the moving human body
detection is the most important part of the human body motion analysis, the purpose is to detect the
moving human body with its behavior from the background image in video sequences, and for the follow-up treatment such as the target classification, the human body tracking and behavior understanding, its
effective detection plays a very important role
Gesture Recognition using Principle Component Analysis & Viola-Jones AlgorithmIJMER
Gesture recognition pertains to recognizing meaningful expressions of motion by a human,
involving the hands, arms, face, head, and/or body. It is of utmost importance in designing an intelligent
and efficient human–computer interface. The applications of gesture recognition are manifold, ranging
from sign language through medical rehabilitation to virtual reality. In this paper, we provide a survey on
gesture recognition with particular emphasis on hand gestures and facial expressions. Applications
involving wavelet transform and principal component analysis for face and hand gesture recognition on
digital images
A presentation on Human Activity Recognition catered to the audience from an HCI or CS background. (Based on research by Bulling, A. et al. 2014. A tutorial on human activity recognition using body-worn inertial sensors. CSUR. 46, 3 (2014), 33.)
In our World of today, the quest to get rich at all cost without working for our money has led some of our youth into crimes such as robbery and kidnapping. As a result of this and by the sheer fact that vehicles are now very expensive to buy these days, there is a need for people to safeguard their vehicles against these hoodlums to avoid loss of their precious Assets to these rampaging criminals. Tracking is technology that is used by many companies and individuals to track a vehicle, an individual or an asset by using many ways like GPS that operates using satellites and ground-based stations or by using our approach which depends on the cellular mobile towers. Vehicle tracking system is a system that can be used in monitoring and locating a vehicle, avoid theft or recover a stolen vehicle, for monitoring of vehicle routes to ensure strict compliance to an already defined vehicle routes, monitor driver’s behavior, predict bus arrival as well as for fleet management. Internet of things has made it very possible to devices to inter communicate amongst themselves and exchange information, helping in acquiring and analyzing information faster that we used to know in the past and this has helped more especially in vehicle monitoring to ensure that vehicle owners feel safe about their investments without fearing about their loss. In this paper, we propose a vehicle monitoring system based on IOT technology, using 4G/LTE to get the get the coordinate, speed, and overall condition of the vehicle, process and send to a remote server to be analyzed and used in locating the vehicle and monitor its other configured parameters. This is realized using Raspberry pi, 4G/LTE, GPS, Accelerometer and other sensors with communicate amongst themselves to get the environmental parameters which is processed and sent to a remote server where it is analyzed and represented on a map to locate the vehicle and monitor the other set parameters. 4G/LTE provides fast internet connectivity with overcomes the usual delay usually experienced in sending the acquired signals to be processed. The True Vehicle position is represented using google geolocation service and the actual position triangulated in real-time.
CHARACTERIZING HUMAN BEHAVIOURS USING STATISTICAL MOTION DESCRIPTORsipij
Identifying human behaviors is a challenging research problem due to the complexity and variation of
appearances and postures, the variation of camera settings, and view angles. In this paper, we try to
address the problem of human behavior identification by introducing a novel motion descriptor based on
statistical features. The method first divide the video into N number of temporal segments. Then for each
segment, we compute dense optical flow, which provides instantaneous velocity information for all the
pixels. We then compute Histogram of Optical Flow (HOOF) weighted by the norm and quantized into 32
bins. We then compute statistical features from the obtained HOOF forming a descriptor vector of 192- dimensions. We then train a non-linear multi-class SVM that classify dif erent human behaviors with the
accuracy of 72.1%. We evaluate our method by using publicly available human action data set. Experimental results shows that our proposed method out performs state of the art methods.
Interactive Full-Body Motion Capture Using Infrared Sensor Network ijcga
Traditional motion capture (mocap) has been well-studied in visual science for the last decades. However the field is mostly about capturing precise animation to be used in specific applications after intensive post processing such as studying biomechanics or rigging models in movies. These data sets are normally captured in complex laboratory environments with sophisticated equipment thus making motion capture a
field that is mostly exclusive to professional animators. In addition, obtrusive sensors must be attached to actors and calibrated within the capturing system, resulting in limited and unnatural motion. In recent year the rise of computer vision and interactive entertainment opened the gate for a different type of motion capture which focuses on producing optical markerless or mechanical sensorless motion capture. Furthermore a wide array of low-cost device are released that are easy to use for less mission critical applications. This paper describes a new technique of using multiple infrared devices to process data from multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap using commodity
devices such as Kinect. The method involves analyzing each individual sensor data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasizes on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability.
Interactive full body motion capture using infrared sensor networkijcga
Traditional motion capture (mocap) has been
well
-
stud
ied in visual science for
the last decades
. However
the fie
ld is mostly about capturing
precise animation to be used in
specific
application
s
after
intensive
post
processing such as studying biomechanics or rigging models in movies. These data set
s are normally
captured in complex laboratory environments with
sophisticated
equipment thus making motion capture a
field that is mostly exclusive to professional animators.
In
addition
, obtrusive sensors must be attached to
actors and calibrated within t
he capturing system, resulting in limited and unnatural motion.
In recent year
the rise of computer vision and interactive entertainment opened the gate for a different type of motion
capture which focuses on producing
optical
marker
less
or mechanical sens
orless
motion capture.
Furtherm
ore a wide array of low
-
cost
device are released that are easy to use
for less mission critical
applications
.
This paper
describe
s
a new technique of using multiple infrared devices to process data from
multiple infrared sensors to enhance the flexibility and accuracy of the markerless mocap
using commodity
devices such as Kinect
. The method involves analyzing each individual sensor
data, decompose and rebuild
them into a uniformed skeleton across all sensors. We then assign criteria to define the confidence level of
captured signal from
sensor. Each sensor operates on its own process and communicates through MPI.
Our method emphasize
s on the need of minimum calculation overhead for better real time performance
while being able to maintain good scalability
Comparison Analysis of Gait Classification for Human Motion Identification Us...IJECEIAES
In this paper, it will be discussed about comparison between two kinds of classification methods in order to improve security system based of human gait. Gait is one of biometric methods which can be used to identify person. K-Nearest Neighbour has parallelly implemented with Support Vector Machine for classifying human gait in same basic system. Generally, system has been built using Histogram and Principal Component Analysis for gait detection and its feature extraction. Then, the result of the simulation showed that K-Nearest Neighbour is slower in processing and less accurate than Support Vector Machine in gait classification.
The complete human body or the various limb postures are involved in human action. These days,
Abnormal Human Activity Recognition (Abnormal HAR) is highly well noticed and surveyed in many
studies. However, because of complicated difficulties such as sensor movement, positioning, and so on,
as well as how individuals carry out their activities, it continues to be a difficult process. Identifying
particular activities benefits human-centric applications such as postoperative trauma recovery, gesture
detection, exercise, fitness, and home care help. The HAR system has the ability to automate or
simplify most of the people’s everyday chores. HAR systems often use supervised or unsupervised
learning as their foundation. Unsupervised systems operate according to a set of rules, whereas
supervised systems need to be trained beforehand using specific datasets. This study conducts detailed
literature reviews on the development of various activity identification techniques currently being used.
The three methods—wearable device-based, pose-based, and smartphone sensor—are examined in this
inquiry for identifying abnormal acts (AAD). The sensors in wearable devices collect data, whereas the
gyroscopes and accelerometers in smartphones provide input to the sensors in wearable devices. To
categorize activities, pose estimation uses a neural network. The Anomalous Action Detection Dataset
(Ano-AAD) is created and improved using several methods. The study examines fresh datasets and
innovative models, including UCF-Crime. A new pattern in anomalous HAR systems has emerged,
linking anomalous HAR tasks to computer vision applications including security, video surveillance,
and home monitoring. In terms of issues and potential solutions, the survey looks at visionbased HAR.
Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wirel...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Hand gesture recognition using support vector machinetheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Abnormal gait detection by means of LSTM IJECEIAES
This article presents a system focused on the detection of three types of abnormal walk patterns caused by neurological diseases, specifically Parkinsonian gait, Hemiplegic gait, and Spastic Diplegic gait. A Kinect sensor is used to extract the Skeleton from a person during its walk, to then calculate four types of bases that generate different sequences from the 25 points of articulations that the Skeleton gives. For each type of calculated base, a recurrent neural network (RNN) is trained, specifically a Long short term memory (LSTM). In addition, there is a graphical user interface that allows the acquisition, training, and testing of trained networks. Of the four trained networks, 98.1% accuracy is obtained with the database that was calculated with the distance of each point provided by the Skeleton to the Hip-Center point.
Similar to Gait Recognition using MDA, LDA, BPNN and SVM (20)
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
Wireless Sensor Networks (WSN) plays a very important role in transmitting the data from source to destination but energy consumption is one of the major challenges in these networks. WSN consists of hundreds to thousands of nodes which consume energy while transmitting the information and with a span of time whole energy get consumed and network life time gets reduced. Clustering and Cluster head (CH) selection are important parameters used to enhance the lifetime of the WSN. Clustering use two methods: rotating CH periodically in every round to distribute the energy consumption among nodes and the node with more residual energy becomes CH.This research paper is focused on the performance of the techniques used to enhance the energy efficiency in Wireless Sensor Networks (WSNs). Low- Energy Adaptive Clustering Hierarchy (LEACH), Fuzzy- Based and Neural Network are some of the important techniques used. MATLAB simulation tool is considered in this paper.
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
Artificial neural network has been widely used for solving non-linear complex tasks. With the development of computer technology, machine learning techniques are becoming good choice. The selection of the machine learning technique depends upon the viability for particular application. Most of the non-linear problems have been solved using back propagation based neural network. The training time of neural network is directly affected by convergence speed. Several efforts are done to improve the convergence speed of back propagation algorithm. This paper focuses on the implementation of back-propagation algorithm and an effort to improve its convergence speed. The algorithm is written in SCILAB. UCI standard data set is used for analysis purposes. Proposed modification in standard backpropagation algorithm provides substantial improvement in the convergence speed.
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
The output voltage of a three level inverter is stepped voltage in which the output voltage have three possible values. Such systems can be used to interface renewable energy sources with the grid. Temperature has significant effect on performance of power MOSFETs. Typically, the MOSFETs used as power switches in such applications are a significant source of heat, and the heat energy dissipated by these components must be carefully controlled if operating temperatures are to be maintained. So for the system to work efficiently cooling of MOSFETs is required. This paper proposed an automated air cooled 3 level H-bridge inverter. The system consists of MOSFETs, LM 35 temperature sensor, Optocouplers for isolation. Arduino is used to control the on-off operation of fan. When temperature rises above certain level fan turns on to cool the MOSFETs.
In this work, a Split Ring Resonator (SRR) unit cell is simulated in a waveguide with electromagnetic field solver High Frequency Structure Simulator (HFSS). Analytical calculations of the inductance and capacitance have been also carried out to obtain the resonant frequencies for SRR dimensions. A comparison between calculated and simulated resonance frequencies)) is done. A good correlation between simulated and measured resonance frequencies is achieved.
In this paper, we provide the average bit error probabilities of MQAM and MPSK in the presence of log normal shadowing using Maximal Ratio Combining technique for L diversity branches. We have derived probability of density function (PDF) of received signal to noise ratio (SNR) for L diversity branches in Log Normal fadingfor Maximal Ratio Combining (MRC). We have used Fenton-Wilkinson method to estimate the parameters for a single log-normal distribution that approximates the sum of log-normal random variables (RVs). The results that we provide in this paper are an important tool for measuring the performance ofcommunication links in a log-normal shadowing.
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
Biometrics is the science and technology of human identification and verification through the use of feature set extracted from the biological data of the individual to be recognized. Unimodal and Multimodal systems are the two modal systems which have been developed so far. Unimodal biometric systems use a single biometric trait but they face limitations in the system performance due to the presence of noise in data, interclass variations and spoof attacks. These problems can be resolved by using multimodal biometrics which rely on more than one biometric information to produce better recognition results. This paper presents an overview of the multimodal biometrics, various fusion levels used in them and suggests the use of iris and speech using score level fusion for a multimodal biometric system.
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
Data communication systems are increasingly engrossing optical fiber communication system as the transmission paths for the information, the information is in the form of light pulses sending from one place to another through the optical fiber. Several types of optical amplifiers have been developed in optical fiber communication system to amplify the optical signals. The erbium doped fiber amplifier is one of the optical fiber amplifiers which are used for long distance communication. The most significant points in any optical amplifier design are gain and noise figure. They are connected to one another. The other optical amplifier, Raman amplifier has wide gain bandwidth. The EDFA gain spectrum has variations over 1536 to 1552 nm, therefore the gain flattening is a research issue in recent years with the development of high capacity DWDM. The gain variation becomes a problem as the number of channels increases. The gain of EDFA depends on large number of device parameters such as, Erbium ion concentration, amplifier length, core radius, pump power. Raman amplifiers can be combined with EDFAs to expand the optical gain flattened bandwidth. This paper focuses on different methods used for the gain flattening.
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
This paper presents an efficient design and implementation of a 64 bit RISC Processor for Data Logging System. RISC is a design mechanism to reduce the amount of space, time, cost, power and heat etc. reduces the complexity of instruction. The processor is designed for both fixed and floating point number arithmetic calculation. A Data Logger is an electronic instrument that records environmental parameters such as temperature, Humidity, Wind Speed light intensity, water level and water quality. Data Loggers find its key application where automation and control is required. The necessary code written in the hardware description language Verilog HDL.
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
In the past few years Autonomous vehicles have gained importance due to its widespread applications in the field of civilian and military applications. On-board camera on autonomous vehicles captures the images which need to be processed in real time using the image segmentation algorithm. On board processing of video(frames)in real time is a big challenging task as it involves extracting the information and performing the required operations for navigation.This paper proposes an approach for vision based autonomous vehicle navigation in indoor environment using the designed image segmentation algorithm. The vision based navigation is applied to autonomous vehicle and it is implemented using the Raspberry Pi camera module on Raspberry Pi Model-B+ with the designed image segmentation algorithm. The image segmentation algorithm has been built using smoothing,thresholding, morpho- logical operations, and edge detection. The reference images of directions in the path are detected by the vehicle and accordingly it moves in right or left directions or stops at destination. The vehicle finds the path from source to destination using reference directions. It first captures the video,segments the video(frame by frame), finds the edges in the segmented frame and moves accordingly. The Raspberry Pi also transmits the capture video and segmented results using the Wi-Fi to the remote system for monitoring. The autonomous vehicle is also capable of finding obstacle in its path and the detection is done using the ultrasonic sensors.
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
Today, in metro cities BTSs are increasing day by day and interference is also increasing. This paper shows the received power of the cell depends on a number of factors. Antenna gain and antenna type are one of the important parameters for this. This paper reveals the effect of signal received power by changing the antenna gain and antenna type.The antenna used is omnidirectional and switched beam and gain varies from 5 to 15 dB.The GSM network is simulated for 6 users in Qualnet software.
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
Composite multipath/shadowing fading environments are frequently encountered in different mobile realistic scenarios. These channels are generally modeled differentComposite multipath/shadowing fading. In this paper wepresent the performance analysis of composite (Weibull-Lognormal shadowed) fading. We adopt efficient toolproposed by Holtzman to approximate composite (Weibull-Lognormal shadowed) fading. The performance measures offading communication systems such as Probability densityfunction (PDF) of Signal to Noise ratio (SNR), Amount offading (AF), Outage probability (Pout) and ChannelCapacity(C/B) will be calculated. Graphical results will bepresented for different signals and fading parameters. Thedifferent expressions that will be provided are of greatimportance in assessing the performance of communicationsystems in composite channels.
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
This paper presents low area and power efficient delay register using CMOS transistors. The proposed register has reduced area than the conventional register. This resistor design consists of 6 NMOS and 6 PMOS. The proposed delay register has been designed in logic editor and simulated using 90nm technology. Also the layout simulation and parametric analysis has been done to find out the results. In this paper register has been designed using full automatic layout design and semicustom layout design. Then the performance of these different designs has been analyzed and compared in terms of power, delay and area. The simulation result shows that circuit design of delay register using PTL techniques improved by power 0.05% and 61.8% area.
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
In this review paper, we discuss various gas sensors based on technique and sensing materials used in there fabrication. Various sensors are designed making use of salient features of carbon nanotubes and its electrical, mechanical, and electromechanical properties. Effect of using nano-composites on sensitivity and selectivity of gas sensor have been studied.
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
ZigBee is the new standard developed wireless personal area network (WPAN) based on IEEE 802.15.4 for low cost, low data rate and low power consumption wireless network. In present times, zigbee has become a hot topic for research and development all over the world. This paper briefly describes various ZigBee network topologies including star, cluster tree and mesh topology and further introduces different ZigBee routing protocols such as AODV, AODVjr, Hierarchical, Integrated and Enhanced hierarchical routing protocol (EHRP).
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
This paper presents an area, delay and power efficient design of SR flip flop. As the chip manufacturing technology is on the threshold of evaluation, which shrinks a chip in size and enhances its performance, here the flip flop is implemented in a layout level which develops an optimized design using recent CMOS layout tools. The proposed SR flip flop has been designed and simulated using 45nm technology. After that, parametric analysis has been done. In this paper, flip flop has been developed using full automatic design flow and semi-custom design flow. The performance of SR flip flop layouts using different design flows has been analyzed and compared in terms of area, delay and power consumption. The simulation results show that the design of SR flip flop using semi-custom design flow improved the area occupied by 46.9% and power consumption is reduced by 38.4%.
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
This paper presents a codec scheme for optimizing power in VLSI Interconnects. It is based on the traditional bus encoding method which is considered to be one of the most effective ways of power and delay reduction. The work done aims at optimizing power by designing the scheme using Full-Custom design approach. The model has been designed and implemented using Cadence Virtuoso Analog Design Suite in 0.18µm CMOS technology. Power has been computed for different possible combinations of input data. Delay has been reckoned for the maximum power consuming input combination. Layout editor has been used to generate the physical description of the circuit. The 4 bit input data combination consuming maximum dynamic power of 6.44µW and propagation delay of 722.7ps is “1000” with previously transmitted 4 bit data being “0111”. A significant power reduction of 38.89% has been observed by designing the scheme using Full-Custom approach as compared to the conventional Semi-Custom approach of design.
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
Planar Inverted F- Antenna (PIFA) is widely used in handheld devices because of its various advantages like compact size, good bandwidth and moderate radiation patterns. In this paper, a design of Planar Inverted F- Antenna(PIFA) is proposed that resonates at the frequency of 2.5 GHz with a bandwidth of 300MHz. The relative permittivity of the substrate used is 2.2. The antenna is fed by coaxial feed. Also, gain, VSWR and radiation pattern of the antenna are studied.
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
Comparator is a very useful and basic arithmetic component of digital system. In the world of technology the demand of portable devices are increasing day by day. This paper presents CMOS design of 1-bit comparator on 180nm technology. The layout of 1-bit comparator has been developed using Automatic and semi-custom techniques. Both the layouts are compared and analyzed in terms of their Power and Area consumption. Automatic layout is generated from its equivalent schematic whereas semi-custom layout is developed manually. The result shows that semi-custom consumes less power as compared to Automatic.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
1. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 92
Gait Recognition using MDA, LDA,
BPNN and SVM
1
RishamPuri, 2
Jatinder Kumar, 3
Rakesh Kumar
1
Student M.Tech (CSE) SSCET, Manawala (Amritsar), 2,3
A.P. (CSE) SSCET, Manawala (Amritsar),
1
risham.16990@gmail.com,2
jkteji@gmail.com,3
rakeshsharma2311@gmail.com
Abstract: - Recognition of any individual is a task to identify
the human beings. Human identification using Gait is method
to identify an individual by the way he walk or manner of
moving on foot of humans. Gait recognition is a type of
biometric recognition and related to the behavioral
characteristics of biometric recognition. Gait offers ability of
distance recognition or at low resolution. In this paper it will
present the review of gait recognition system where different
approaches and classification categories of Gait recognition
like model free and model based approach, MDA, BPNN,
LDA, and SVM.
Keywords: -Gait Recognition, Back Propagation Neural
Network (BPNN), SVM, MDA, LDA and identification.
I. GAIT RECOGNITION
The identification through biometric is a better way
because it associate with individual not with information
passing from one place to another. The biometric is a field
of technology that uses automated methods for identifying
and verifying a human. In real time applications like in
banks; airports; authentications and verifications are
always required. In such type of applications biometric
identification methods are used [1].
The biometric has two main characteristics:
A. Physiological:
These are biometrics which is derived from a direct
measurement of a part of a human body. Then most
prominent and successful of these types of measures that
are Face, fingerprints, iris, palm print, DNA etc. These are
related to body.
B. Behavioural:
Voice and Gait are related to behaviour of the person.
Extract characteristics based on an action performed by an
individual; they are an indirect measure of the
characteristic of the human form. The main feature of a
behavioural biometric is the use of time as a metric. Then
established measures include keystroke-scan and speech
patterns. Biometric identification should be an automated
process. Therefore manual feature extraction would be
both undesirable and time consuming; due to the large
amount of data that must be acquired and processed in
order to produce a biometric signature. And inability to
automatically extract the desired characteristics which
would render the process infeasible on realistic size data
sets in a real-world application.
C. Gait Analysis:
Gait analysis is the systematic study of human locomotion;
augmented by instrumentation for measuring body
movements; body mechanics and the activity of the
muscles [2]. Gait based recognition is more suitable in
video surveillance applications because of following
advantages:
1. Recognition using gait do not need any user cooperation.
2. The gait of an individual can be captured at a distance.
3. Gait recognition does not require images of very
High quality and provide good results in low resolution.
D. Approaches for Gait Recognition:
Some basic methods and approaches for gait recognition
[3]:
D.1. Moving Video based gait recognition:
In this approach, gait is captured using a video-camera
from a distance. Image and video processing techniques
are employed to extract gait features for the purpose of
recognition. For example stride, cadence, static body
parameters extra.
D.2. Floor Sensor based gait recognition:
In this approach, a set of sensors or force plates are
installed on the floor and such sensors enable to measure
gait related features, when a person walks on them, e.g.
maximum time value of heel strike and maximum
amplitude value of the heel strike extra.
D.3. Wearable Sensor based gait recognition:
In this approach, gait is collected using body worn motion
recording (MR) Sensors on human body. The MR sensors
can be worn at different locations on the human body. The
acceleration of gait, which is recorded by the MR sensor, is
utilized for authentication [4, 5].
E. Steps of Gait Recognition System
E.1. the Background Subtraction:
In this approach moving objects from background in the
scene are identified first. Then some of the background
subtraction techniques are applied on it .A common
approach is to perform background subtraction; which
identifies moving objects from the portion of video frame
that differs from the background model. The background
subtraction generates binary images containing black and
white (moving pixels) also known as binary silhouettes.
The background subtraction is a class of techniques for
segmenting out objects of interest in a scene for
applications such as surveillance. Therefore there are many
challenges in developing a good background subtraction
algorithm. 1st
it must be robust against changes in
illumination task. 2nd
it should avoid detecting non-
stationary background objects such as moving leaves; rain;
snow and shadows cast by moving objects. And finally; its
internal background model should react quickly to changes
in background such as starting and stopping of vehicles.
E.2. Pre-processing:
Pre-processing is done on video frames to reduce presence
of noise then some filters are applied which in turns blur
the frames of image, which helps in shadow removal, after
pre-processing motion detection is performed. Background
2. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
93 NITTTR, Chandigarh EDIT-2015
subtraction technique uses the difference of current image
and background to detect the motion. It delineates the
foreground from background. Background subtraction
generate binary image containing black (background) and
white (moving pixel) then post processing is applied to
obtain normalized silhouette images with less noise. They
used morphological operators such as dilation and erosion
to fill small holes inside silhouette and to filter small noise
on the background. To reduce computational cost they
proposed new silhouette representation method which only
uses some of pixel on the contour [6].
E.3. Feature Extraction:
Feature extraction is a special form of dimensionality
reduction. And when the input data is too large to be
processed and it is suspected to be notoriously redundant
(e.g. the same measurement in both feet) then the input
data will be transformed into a reduced representation set
of features (also named features vector). Then transforming
the input data into the set of features is called feature
extraction.
E.4. Recognition:
This is the final step of human identification using gait. In
this step input videos are compared with sequences stored
in database. Different types of classifiers are used for the
recognition. Such as: MDA (Multi-linear Discriminant
analysis) and LDA (Linear Discriminant Analysis).They
use MDA approach to optimize the separability of gait
features [7].
F. Gait Recognition System
System will identify unauthorized individual and compare
his gait with stored sequences and recognize. The
background subtraction is the common approach of gait
recognition.
Using background subtraction, pre-processing is done to
reduce noise. The background subtraction techniques are
also classified into two types: non- recursive methods and
recursive methods. Non recursive techniques use sliding
window approach for background subtraction. The
recursive methods use single Gaussian method and
Gaussian mixture model. The Gait recognition method
contains two parts
1. Training part
2. Testing part
Gait analysis laboratory has several cameras (video or
infrared) placed around treadmill. Then person has markers
located at various points of body (e.g. spines of the pelvis,
ankle malleolus). When person walks down the treadmill
and the computer calculates the trajectory of each marker
in three dimensions. And model is applied to calculate the
movement of bones.
Applications of gait:
Gait recognition technology is not limited to security
applications researchers also envision medical
applications. For example, recognizing changes in walking
patterns early on can help to identify conditions such as
Parkinson’s disease and multiple sclerosis in their earliest
stages.
Medical diagnostics: In computerized gait analysis and
patient walks or run with sensors in his foot. The sensor
sends some points of info- about foot pressure and timing
and range of motion to computer and creates diagram.
Doctor can review them and came up with treatment plan.
Biometric identification and forensics: Gait Pal and Pal
Entropy Minor variations in gait style can be used as
a biometric identifier to identify individual people [8].
II. BPNN
In this paper, we use one classical type of neural networks
–BPNN. BPNN usually has input and output layers with
some hidden layers. Actually BPNN can be likened to a
flexible mathematical function which has many
configurable internal parameters to find the results. In
order to accurately represent the complicated relationships
among gait variables and these internal parameters need to
be adjusted through training process. In training process
gait features and corresponding labels are input to the
network, which iteratively self-adjusts to accurately
classify as many gait features as possible. Training is
complete when some criterion is satisfied (e.g., interaction
times reach a preset value or prediction error falls below a
preset threshold). Once the neural network is trained we
can use it to predict the gait features of sequences of gait
testing. It is to be noted that the trained neural network
simply performs function evaluation using the internal
parameters established during training process to produce
an output [9].
III. SUPPORT VECTOR MACHINE
The theory of SVM is based on the idea of structural risk
minimization. In many applications SVM has been
introduced as a powerful tool for solving classification
problems. There are many researchers have used SVM on
gait recognition. It is to be noted that SVM is
fundamentally a classifier of two-tier. SVM first maps the
training samples into a high dimension space (typically
much higher than the original data space) and then finds a
separating hyper plane that maximizes the margin between
two classes. Maximizing the margin is a quadratic
programming (QP) problem and can be solved from its
dual problem by introducing Lagrangian multipliers of
technique. Without any knowledge of the mapping the
SVM can find the optimal hyper plane by using the dot
product functions in original space that are called kernels
of image. There are several kernels proposed by
researchers. Here we use radial basis function (RBF). Once
the optimal hyper plane is established we can directly use a
decision function to classify testing samples. For solving
multi-class problems and various methods have been
proposed for combining multiple two classes SVMs in
order to build a multi-class classifier such as one-against-
one and one-against-rest method. In this paper we use the
one against-one method in which k (k*1) =2 classifiers are
constructed and each one trains samples. In classification
we use a voting strategy: each two-class SVM is
considered as a voter (i.e. k (k * 1) =2 voters in all) and
then each testing sample is classified to the class with
maximum number of votes [10].
IV. MULTILINEAR DISCRIMINANT ANALYSIS
The linear Discriminant analysis (LDA) is a classical
algorithm that has been successfully applied and extended
to various biometric signal recognition problems. The
recent advancement in multi-linear algebra led to a number
of multi-linear extensions of the LDA, multi-linear
3. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 94
Discriminant analysis (MLDA), being proposed for the
recognition of biometric signals using their natural
tonsorial representation. In general, MLDA seeks a multi-
linear projection that maps the input data from one space to
another (lower dimensional, more discriminative) space.
V. LINEAR DISCRIMINANT ANALYSIS
Linear Discriminant Analysis (LDA) is a well-known
scheme for feature extraction and reduction in dimension.
It has been used widely in many applications involving
highly dimensional data, such as face recognition and
image recognition. Linear Discriminant Analysis easily
handles the case where the within-class frequencies are
unequal and their performances have been examined on
randomly test data that are generated. This method
maximizes the ratio of between-class variance to the
within-class variance in any particular data set thereby
guaranteeing maximal separability. We decided to
implement an algorithm for LDA in hopes of providing
better classification compared to Principal Components
Analysis. Linear Discriminant Analysis (LDA) is a
techniques used for data classification and dimensionality
reduction in this section we give a brief overview of
classical LDA.
= ∑ ∑ ( − )∏ ( − )) … (1.1)
And
= ∑ ( -m) ( -m) … (1.2)
where
= ∑ ∏ is the mean of the ith class… (1.3)
and
m = ∑ ∑ ∏ x is the global mean … (1.4)
In Discriminant analysis, two scatter matrices, called
within-class (Sw) and between-class (Sb) matrices are
defined to quantify the quality. Linear Discriminant
Analysis is a well-known scheme for feature extraction and
dimension reduction. It has been used widely in many
applications such as face recognition, image retrieval,
microarray data classification, etc. The LDA method is
employs to perform training and projecting on original gait
feature. They decrease dimensionality of high dimensional
feature with PCA, and perform optimal classification on
low dimensional space with the LDA algorithm. The
objective of LDA is to perform dimensionality reduction
while preserving as much of the class discriminatory
information as possible [10].
VI. RESULTS
In the following figures, result of proposed algorithm is
highlighted.
Figure 1: Correct Classification Rate
Figure 2: Comparison of CCR between previous and proposed work
Figure 3: Matching Results
walk. Therefore Several Parameters has been proposed for
Gait Recognition previously but there have been always
need for better parameters to improve recognition. The
existing Gait Recognition Technique in doesn't consider
the distance between hands as parameters as we are
considering this. Thus propose an Enhanced Gait
Recognition Technique which is based on model based
approach. The existing Correct Classification Rate is poor.
They gave their better CCR results using SVM technique.
They are less accurate and needs enhancement by BPNN
technique. Our objective is to obtained better result using
BPNN +SVM + MDA and LDA technique.
ACKNOWLEDGMENT
Thanks to my Guide and family member who always
support and guide me during my dissertation. Special
thanks to my father who always support my innovative
ideas.
REFERENCES
VII. CONCLUSION
Gait recognition aims to identify people by the way they
[1] Lili Liu, Yilong Yin, Wei Qin & Ying Li, 2011. “Gait Recognition
Based on Outermost Contour”, International Journal of
Computational Intelligence Systems International Journal of
Computational IntelligenceSystems, Vol. 4, No. 5.
[2] Shalini Agarwal, Shaili Mishra, 2012. ” A study of multiple human
tracking for visual surveillance”, Department of CS, Banasthali
University, Rajasthan, International Journal of Advances in Engineering
& Technology.
[3] Alese, B. K., Mogaji, S. A., Adewale, O. S. and Daramola, O., 2012. ”
Design and Implementation of Gait Recognition System”, Department of
Computer Science, Federal University of Technology, Akure,
Nigeria, International Journal of Engineering and Technology Volume 2
No. 7.
[4] M.Pushparani & D.Sasikala, 2012. “ A Survey of Gait
Recognition Approaches Using PCA & ICA”, Mother Teresa
Women’s University, Kodaikanal, India, Global Journal of Computer
Science and Technology Volume 12 Issue 10 Version 1.0.
[5] Liang Wang, Tieniu Tan, Huazhong Ning, and Weiming Hu,
2003. “Silhouette Analysis-Based Gait Recognition for Human
Identification”, IEEE transactions on pattern analysis and machine
intelligence, VOL. 25, NO. 12.
[6] Sanjeev Sharma, Ritu Tiwari, Anupam shukla and Vikas Singh, 2011.
“Identification of People Using Gait Biometrics” International Journal of
Machine Learning and Computing, Vol. 1, No. 4.
4. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
95 NITTTR, Chandigarh EDIT-2015
[7] M.K. Bhuyan and Aragala Jagan, 2010. “Person Identification uses
Gait by Combined Features of Width and Shape of the Binary Silhouette”,
International Journal of Computer and Information Engineering.
[8] Qiong Cheng, Bo Fu, and Hui Chen, 2009. “Gait Recognition Based
on PCA and LDA“, School of Electrical & Electronic Engineering, Hubei
University of Technology Proceedings of the Second Symposium
International Computer Science and Computational Technology(ISCSCT
’09) Huangshan, P. R. China, pp. 26-28.
[9] A. Hayder, J. Dargham, A. Chekima, and G. M. Ervin, 2011. “Person
Identification Using Gait”, International Journal of Computer and
Electrical Engineering, Vol. 3, No. 4.
[10] Amit Kale, Aravind Sundaresan, A. N. Rajagopalan, Naresh P.
Cuntoor, Amit K. Roy-Chowdhury, Volker Krüger, and Rama Chellappa,
2004. “Identification of Humans Using Gait” IEEE transactions on image
processing, VOL. 13, NO. 9.