共查询到20条相似文献,搜索用时 0 毫秒
1.
Abdu Gumaei Mabrook Al-Rakhami Hussain AlSalman Sk. Md. Mizanur Rahman Atif Alamri 《计算机、材料和连续体(英文)》2020,65(2):1033-1057
Human activity recognition is commonly used in several Internet of Things applications to recognize different contexts and respond to them. Deep learning has gained momentum for identifying activities through sensors, smartphones or even surveillance cameras. However, it is often difficult to train deep learning models on constrained IoT devices. The focus of this paper is to propose an alternative model by constructing a Deep Learning-based Human Activity Recognition framework for edge computing, which we call DL-HAR. The goal of this framework is to exploit the capabilities of cloud computing to train a deep learning model and deploy it on lesspowerful edge devices for recognition. The idea is to conduct the training of the model in the Cloud and distribute it to the edge nodes. We demonstrate how the DL-HAR can perform human activity recognition at the edge while improving efficiency and accuracy. In order to evaluate the proposed framework, we conducted a comprehensive set of experiments to validate the applicability of DL-HAR. Experimental results on the benchmark dataset show a significant increase in performance compared with the state-of-the-art models. 相似文献
2.
The two-stream convolutional neural network exhibits excellent performance
in the video action recognition. The crux of the matter is to use the frames already
clipped by the videos and the optical flow images pre-extracted by the frames, to train a
model each, and to finally integrate the outputs of the two models. Nevertheless, the
reliance on the pre-extraction of the optical flow impedes the efficiency of action
recognition, and the temporal and the spatial streams are just simply fused at the ends,
with one stream failing and the other stream succeeding. We propose a novel hidden twostream collaborative (HTSC) learning network that masks the steps of extracting the
optical flow in the network and greatly speeds up the action recognition. Based on the
two-stream method, the two-stream collaborative learning model captures the interaction
of the temporal and spatial features to greatly enhance the accuracy of recognition. Our
proposed method is highly capable of achieving the balance of efficiency and precision
on large-scale video action recognition datasets. 相似文献
3.
The ever-growing available visual data (i.e., uploaded videos and pictures by internet users) has attracted the research community's attention in the computer vision field. Therefore, finding efficient solutions to extract knowledge from these sources is imperative. Recently, the BlazePose system has been released for skeleton extraction from images oriented to mobile devices. With this skeleton graph representation in place, a Spatial-Temporal Graph Convolutional Network can be implemented to predict the action. We hypothesize that just by changing the skeleton input data for a different set of joints that offers more information about the action of interest, it is possible to increase the performance of the Spatial-Temporal Graph Convolutional Network for HAR tasks. Hence, in this study, we present the first implementation of the BlazePose skeleton topology upon this architecture for action recognition. Moreover, we propose the Enhanced-BlazePose topology that can achieve better results than its predecessor. Additionally, we propose different skeleton detection thresholds that can improve the accuracy performance even further. We reached a top-1 accuracy performance of 40.1% on the Kinetics dataset. For the NTU-RGB+D dataset, we achieved 87.59% and 92.1% accuracy for Cross-Subject and Cross-View evaluation criteria, respectively. 相似文献
4.
Zhaoquan Gu Yu Su Chenwei Liu Yinyu Lyu Yunxiang Jian Hao Li Zhen Cao Le Wang 《计算机、材料和连续体(英文)》2020,65(2):1437-1452
The license plate recognition system (LPRS) has been widely adopted in daily life due to its efficiency and high accuracy. Deep neural networks are commonly used in the LPRS to improve the recognition accuracy. However, researchers have found that deep neural networks have their own security problems that may lead to unexpected results. Specifically, they can be easily attacked by the adversarial examples that are generated by adding small perturbations to the original images, resulting in incorrect license plate recognition. There are some classic methods to generate adversarial examples, but they cannot be adopted on LPRS directly. In this paper, we modify some classic methods to generate adversarial examples that could mislead the LPRS. We conduct extensive evaluations on the HyperLPR system and the results show that the system could be easily attacked by such adversarial examples. In addition, we show that the generated images could also attack the black-box systems; we show some examples that the Baidu LPR system also makes incorrect recognitions. We hope this paper could help improve the LPRS by realizing the existence of such adversarial attacks. 相似文献
5.
Human action recognition under complex environment is a challenging work. Recently, sparse representation has achieved excellent results of dealing with human action recognition problem under different conditions. The main idea of sparse representation classification is to construct a general classification scheme where the training samples of each class can be considered as the dictionary to express the query class, and the minimal reconstruction error indicates its corresponding class. However, how to learn a discriminative dictionary is still a difficult work. In this work, we make two contributions. First, we build a new and robust human action recognition framework by combining one modified sparse classification model and deep convolutional neural network (CNN) features. Secondly, we construct a novel classification model which consists of the representation-constrained term and the coefficients incoherence term. Experimental results on benchmark datasets show that our modified model can obtain competitive results in comparison to other state-of-the-art models. 相似文献
6.
Muneeb Ur Rehman Fawad Ahmed Muhammad Attique Khan Usman Tariq Faisal Abdulaziz Alfouzan Nouf M. Alzahrani Jawad Ahmad 《计算机、材料和连续体(英文)》2022,70(3):4675-4689
Recognition of dynamic hand gestures in real-time is a difficult task because the system can never know when or from where the gesture starts and ends in a video stream. Many researchers have been working on vision-based gesture recognition due to its various applications. This paper proposes a deep learning architecture based on the combination of a 3D Convolutional Neural Network (3D-CNN) and a Long Short-Term Memory (LSTM) network. The proposed architecture extracts spatial-temporal information from video sequences input while avoiding extensive computation. The 3D-CNN is used for the extraction of spectral and spatial features which are then given to the LSTM network through which classification is carried out. The proposed model is a light-weight architecture with only 3.7 million training parameters. The model has been evaluated on 15 classes from the 20BN-jester dataset available publicly. The model was trained on 2000 video-clips per class which were separated into 80% training and 20% validation sets. An accuracy of 99% and 97% was achieved on training and testing data, respectively. We further show that the combination of 3D-CNN with LSTM gives superior results as compared to MobileNetv2 + LSTM. 相似文献
7.
8.
研究了钣金数控折弯加工特征信息的识别方法.可将三维CAD模型映射表示为由特征节点构成的网络图,这一方法可以对钣金零件的折弯加工工序模拟、折弯模具以及折弯夹具进行有效分析. 相似文献
9.
10.
11.
近年来,自动掌纹识别方法的研究吸引了越来越多的关注,已有的工作主要集中于二维掌纹识别。然而,二维掌纹图像存在着易伪造、抗噪能力差的缺陷,实际应用中会带来潜在的安全隐患。因此,三维掌纹识别被视为一种可行的解决方案来进一步提高识别的性能。基于局部纹理特征,本文提出一种有效的三维掌纹识别方法。该方法首先利用形状指数来描述三维掌纹的局部几何特征,接着提取形状指数图像的局部三值模式以及Gabor小波特征,最后在匹配分数层次上对这两种互补的局部纹理特征进行融合,随后的实验证明了融合特征较单独特征要好。在香港理工三维掌纹数据库上的实验结果表明,本文方法在识别率上要优于目前流行的其它三维掌纹识别方法,从而验证了本文方法的有效性。 相似文献
12.
目的 解决定制化木门尺寸规格不统一、表面纹理多样而导致的堆垛分类困难、搬运效率低下等问题。方法 提出采用深度学习方法进行定制式木门工件检测,以YOLOV3网络为基本框架开展机器人工件识别方法研究。首先,通过图像数据增强和预处理,扩充定制式木门数据;然后,进行YOLO V3损失函数改进,并根据木门特征进行定制式木门数据集锚框尺度的重新聚类;最后,应用空间金字塔池化层进行YOLO V3中特征金字塔网络改进,并通过随机选取的测试集验证本文方法的有效性。结果 测试数据集的平均检测准确率均值达到98.05%,检测每张图片的时间为137 ms。结论 研究表明,本文方法能够满足木门生产线对准确率和实时性的要求,可大大提高定制化木门转线及堆垛效率。 相似文献
13.
14.
With the development of Deep Convolutional Neural Networks (DCNNs), the
extracted features for image recognition tasks have shifted from low-level features to the
high-level semantic features of DCNNs. Previous studies have shown that the deeper the
network is, the more abstract the features are. However, the recognition ability of deep
features would be limited by insufficient training samples. To address this problem, this
paper derives an improved Deep Fusion Convolutional Neural Network (DF-Net) which
can make full use of the differences and complementarities during network learning and
enhance feature expression under the condition of limited datasets. Specifically, DF-Net
organizes two identical subnets to extract features from the input image in parallel, and
then a well-designed fusion module is introduced to the deep layer of DF-Net to fuse the
subnet’s features in multi-scale. Thus, the more complex mappings are created and the
more abundant and accurate fusion features can be extracted to improve recognition
accuracy. Furthermore, a corresponding training strategy is also proposed to speed up the
convergence and reduce the computation overhead of network training. Finally, DF-Nets
based on the well-known ResNet, DenseNet and MobileNetV2 are evaluated on
CIFAR100, Stanford Dogs, and UECFOOD-100. Theoretical analysis and experimental
results strongly demonstrate that DF-Net enhances the performance of DCNNs and
increases the accuracy of image recognition. 相似文献
15.
基于神经网络的货物列车超偏载车号自动识别系统 总被引:2,自引:0,他引:2
基于一种基于人工神经网络的货物列车超、偏载车号自动识别系统、重点讨论了车号区域定位分割方法、智能字符切割技术,具有选择注意参数的模板匹配神经网络及采用多级混合集成分类器字符识别方案。实际应用表明,该系统性能良好,工作稳定,车号区域定位正确率大于99.8%,字符识别正确率大于96.5%。 相似文献
16.
17.
Samra Rehman Muhammad Attique Khan Majed Alhaisoni Ammar Armghan Usman Tariq Fayadh Alenezi Ye Jin Kim Byoungchol Chang 《计算机、材料和连续体(英文)》2023,75(1):697-714
Identifying fruit disease manually is time-consuming, expert-required, and expensive; thus, a computer-based automated system is widely required. Fruit diseases affect not only the quality but also the quantity. As a result, it is possible to detect the disease early on and cure the fruits using computer-based techniques. However, computer-based methods face several challenges, including low contrast, a lack of dataset for training a model, and inappropriate feature extraction for final classification. In this paper, we proposed an automated framework for detecting apple fruit leaf diseases using CNN and a hybrid optimization algorithm. Data augmentation is performed initially to balance the selected apple dataset. After that, two pre-trained deep models are fine-tuning and trained using transfer learning. Then, a fusion technique is proposed named Parallel Correlation Threshold (PCT). The fused feature vector is optimized in the next step using a hybrid optimization algorithm. The selected features are finally classified using machine learning algorithms. Four different experiments have been carried out on the augmented Plant Village dataset and yielded the best accuracy of 99.8%. The accuracy of the proposed framework is also compared to that of several neural nets, and it outperforms them all. 相似文献
18.
目的人体测量项目是由测点定义的,在三维非接触人体测量中,测点识别是人体测量的关键。为快速有效地实现头面部测点的识别,本文研究提出了一种基于模板变形的三维人体头面部测点自动识别方法。方法建立了一个标注了50个测点的三维人体头面部三角网格模型作为模板网格,每个被测者的三维头面部扫描模型作为目标模型。首先通过自动查找模板网格和目标模型上对应的14个特征点作为约束进行初始变形,将模板网格变形为接近目标模型的最小二乘网格;然后进行精细配准,即在目标模型上不断增加与模板网格的顶点相对应的点进行变形配准。经过迭代计算,最终将模板网格变形为一个拓扑上与模板网格一致、几何上逼近目标模型的头部网格;最后,变形后的模板网格上测点即为目标模型的测点。结果对42名志愿者的三维扫描模型,将本方法所得到的测点与按照测点定义基于人体头面部几何特征所确定的测点进行对比。结果表明,以测点定义所确定的测点为圆心,用本方法所得到的测点,85%以上都落在半径为6mm圆内。结论本研究建立的方法实现了三维头面部测点的自动识别,对特征不明显的测点也能够达到较好的识别,对提高大样本三维头面部人体测量工作的效率有重要意义。 相似文献
19.
20.
In this advanced age, when smart phones are the norm, people utilize social networking, online shopping, and even private information storage through smart phones. As a result, identity authentication has become the most critical security activity in this period of the intelligent craze. By analyzing the shortcomings of the existing authentication methods, this paper proposes an identity authentication method based on the behavior of smartphone users. Firstly, the sensor data and touch-screen data of the smart phone users are collected through android programming. Secondly, the eigenvalues of this data are extracted and sent to the server. Thirdly, the Support Vector Machine (SVM) and Recurrent Neural Network (RNN) are introduced to train the collected data on the server end, and the results are finally yielded by the weighted average. The results show that the method this paper proposes has great FRR (False Reject Rate) and FAR (False Accept Rate). 相似文献