Deep Neural Network Approachesfor Video Based Human Activity Recognition
Deep Neural Network Approachesfor Video Based Human Activity Recognition
ISSN No:-2456-2165
Abstract:- In this paper we explained, tried, and tested develop new activity recognition algorithms and have the
methods of Human Action recognition for the application research of tried and tested methods by which we can get
of video surveillance. This paper provides a method for higher accuracy and stronger capability for handling various
automatically recognizing human activities included in scenarios.
video sequences captured by a single large view camera
in outdoor locations. The elaboration of the dataset which This study attempts to provide a comprehensive review
are videos are taken with the resolution of 720x480, of video-based human activity recognition, as well as an
precisely explained. The methods we implement are overview of various methodologies and their evolutions, by
CNN-VGG16 model and the Single-frame CNN model. covering both typical classic works of literature and theories
We demonstrated our techniques using real-world video of possible solutions. One of the method used in activity
data to automatically distinguish normal behaviors from recognition is CNN-LSTM, this method not only enhances
suspicious ones in a playground setting, films of the accuracy of predicting human actions from raw data, but
continuous performances of six different types of human- it also decreases the model's complexity and eliminates the
human interactions: handshakes, pointing, hugging, need for advanced feature engineering [1]. CNN is
pushing, kicking, and punching. As per the observation, increasingly being used as a feature learning method for
we concluded that the Single frame CNN model shows
human activity recognition [2]. Extracting significant
much better results as compared to CNN VGG16. The
temporal features from raw data is critical. The majority of
implementation was done in python. This paper consist of
HAR techniques need a significant amount of feature
how the convolution neural networks' simple classification
engineering and data pre-processing, which necessitates
method proved to be efficient for the prediction of the
activity by using a single frame method. The working of domain expertise [3]. Many applications, like as video
this method is briefly mentions in the methodology. The surveillance, health care, and human-computer interaction,
difference and the drawback of these methods for human are founded on vision-based HAR research (HCI) [4]. HAR
activity recognition can be clearly seen in the output and faces numerous difficulties, like enormous fluctuation of a
results of the respective. given activity, closeness between classes, time utilization,
and the high extent of Null class. These difficulties have
Keyword:- Artificial Intelligence (AI) Models Are Created to driven researchers to build techniques for methodical
Perceive the Movement of Human from the Provided Dataset. highlights and proficient acknowledgment strategies to viably
take care of these issues [5]. Many writers have used
I. INTRODUCTION sequential techniques and space-time volume approaches to
express actions and perceive action sets directly from
Human activity recognition has a lot of importance in images. Then, for anomalous action states, they employed
many applications including video surveillance, Human- hierarchical recognition approaches. For hierarchical
human interactions, and human- computer interaction. recognition, statistics-based approaches, syntactic
Automatically recognizing activities of interest plays a vital methodologies, and description-based methodologies are all
part in many of the present video surveillance. Human
activity recognition is one of the significant innovation to used [6]. Anomaly detection is one of the most well-known
screen the dynamism of an individual and this can be applications of human activity recognition [7].
accomplished with the help of Machine learning methods.
This is can be used for security purposes and most
importantly detect criminal activity within minutes. It has
wide use of applications. Therefore, it is always desirable to
IV. METHODOLOGY