SlideShare una empresa de Scribd logo
1 de 16
Amsterdam, The Netherlands
July 06-10, 2013
Real World Applications: RWA4.
Room: 02A00
10:40 – 12:20
Session Chair:
Alexandros Andre Chaaraoui
(University of Alicante, Spain)
ALEXANDROS ANDRE CHAARAOUI AND
FRANCISCO FLÓREZ-REVUELTA
… …
Amsterdam,
July 6-10, 2013
Geneticand
Evolutionary
Computation
Conference2013
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
Contents
3
1. Introduction
2. Radial Summary Feature
3. Evolutionary Feature Subset
Selection
4. Human Action Recognition Method
5. Experimentation & Results
6. Conclusions
7. References
Q & A and Discussion
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
1. Introduction
4
 Motivation and starting point
Recognition of actions such as walking,
jumping or falling.
Requirements:
High and stable recognition rates
Real-time suitability
Proposal of a visual feature with reduced
extraction cost and low dimensionality
Feature subset selection
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
2. Radial Summary Feature
5
 Human Silhouettes
 Relatively simple extraction
process
 Rich shape information
 Contour points
 Radial Summary feature
proposal
 Spatial alignment  Feature
selection
 Low dimensionality, reduced
extraction cost, …
Fig 1: Sample silhouette of the
MuHAVi dataset [1].
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
2. Radial Summary Feature
6
Fig 2: Overview of the
proposed Radial Summary
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
3. Evolutionary Feature Subset
Selection7

©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
4. Human Action Recognition
Method8
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
4. Human Action Recognition
Method9
 Learning based on Bag-of-Key-Poses
Model
The available pose representations are
reduced to a representative subset of
key poses
We use the K-means clustering
algorithm
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
4. Human Action Recognition
Method10
 Sequence recognition
 Sequences of key poses
 Nearest-neighbour key poses
 Sequence matching (dynamic time warping)
Fig 3: Sequences of key
poses.
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
5. Experimentation & Results
11
 Tested on the MuHAVi-MAS Dataset [1]
 Two versions with 14 and 8 actions
 Manually Annotated Silhouettes
 Leave-one-actor-out (LOAO) and leave-one-sequence
out (LOSO) cross validations
Dataset Test Chaaraoui
et al. [2]
Radial
Summary
Feature
Selection
State of
the Art
Rate [3]
MuHAVi-14 LOSO 94.1% 95.6% 98.5% 91.9%
MuHAVi-14 LOAO 86.8% 91.2% 94.1% 77.9%
MuHAVi-8 LOSO 98.5% 100% 100% 98.5%
MuHAVi-8 LOAO 95.6% 97.1% 100% 85.3%
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
5. Experimentation & Results
12
 Result of the feature
selection
 ~47% feature size
reduction
 ~14% temporal reduction
 96 FPS overall recognition
rate
Fig 4: Resulting feature subset selection
of the MuHAVi-14 LOSO cross validation
test (dismissed radial bins are shaded in
gray).
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
6. Conclusions
13
 Conclusions
 An evolutionary algorithm has been applied to
optimize action recognition.
 An appropriate feature for feature subset
selection has been proposed.
 We demonstrated that a guided selection of
feature elements can improve the recognition rate
and reduce the computational cost.
 Future work
 Real-valued weights instead of binary selection
 Action-class specific feature selection
©AlexandrosAndreChaaraouiandFranciscoFlórez-Revuelta(GECCO’13)
7. References
14
 [1] Singh, S., Velastin, S.A., Ragheb, H.: Muhavi: A multicamera
human action video dataset for the evaluation of action recognition
methods. In: 2010 Seventh IEEE International Conference on
Advanced Video and Signal Based Surveillance (AVSS), pp. 48–55
(2010)
 [2] Chaaraoui, A.A., Climent-Perez, P., Florez-Revuelta, F.: An
Efficient Approach for Multi-view Human Action Recognition based
on Bag-of-Key-Poses. In Salah, A., ed.: Human Behavior
Understanding. Lecture Notes in Computer Science. Springer Berlin
/ Heidelberg (2012)
 [3] A. Eweiwi, S. Cheema, C. Thurau, and C. Bauckhage. Temporal
key poses for human action recognition. In Computer Vision
Workshops (ICCV Workshops), IEEE International Conference on,
pp. 1310-1317 (2011)
Q & A and Discussion15
ALEXANDROS ANDRE CHAARAOUI AND
FRANCISCO FLÓREZ-REVUELTA
… …
Amsterdam,
July 6-10, 2013
Geneticand
Evolutionary
Computation
Conference2013

Más contenido relacionado

Destacado

PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS pptsravya raju
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networkingsubhradeep mitra
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks Musfiqur Rahman
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)no0orcom
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionOfsted
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area networkPratik Gondaliya
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)kramsheeda
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEAswinraj Manickam
 
Moving object detection
Moving object detectionMoving object detection
Moving object detectionManav Mittal
 

Destacado (11)

PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 
Wireless Body Area Networking
Wireless Body Area NetworkingWireless Body Area Networking
Wireless Body Area Networking
 
Wireless Body Area Networks
Wireless Body Area Networks Wireless Body Area Networks
Wireless Body Area Networks
 
Wireless Body Area Networks for healthcare (Wban)
Wireless Body Area Networks  for healthcare (Wban)Wireless Body Area Networks  for healthcare (Wban)
Wireless Body Area Networks for healthcare (Wban)
 
Child Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspectionChild Internet Safety summit: online safety and inspection
Child Internet Safety summit: online safety and inspection
 
Wireless body area network
Wireless body area networkWireless body area network
Wireless body area network
 
Body Area Network
Body Area NetworkBody Area Network
Body Area Network
 
wireless body area networks(WBAN)
wireless body area networks(WBAN)wireless body area networks(WBAN)
wireless body area networks(WBAN)
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 
Moving object detection
Moving object detectionMoving object detection
Moving object detection
 
Surveillance
SurveillanceSurveillance
Surveillance
 

Similar a Human action recognition optimization based on evolutionary feature

Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall Detection
Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall DetectionTriaxial Accelerometer Located on the Wrist for Elderly People’s Fall Detection
Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall DetectionDavid F. Barrero
 
Interactive Dialogue Technique based Computer Vision with Palm Tracking
Interactive Dialogue Technique based Computer Vision with Palm TrackingInteractive Dialogue Technique based Computer Vision with Palm Tracking
Interactive Dialogue Technique based Computer Vision with Palm Trackinggiamuhammad
 
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisAutonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisIJECEIAES
 
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...CSCJournals
 
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHIAutogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHIAsiri Wijesinghe
 
A Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionA Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionIRJET Journal
 
Driver detection system_final.ppt
Driver detection system_final.pptDriver detection system_final.ppt
Driver detection system_final.pptMaseeraAhmed1
 
Breast Thermograms Features Analysis based on Grey Wolf Optimizer
Breast Thermograms Features Analysis  based on Grey Wolf OptimizerBreast Thermograms Features Analysis  based on Grey Wolf Optimizer
Breast Thermograms Features Analysis based on Grey Wolf OptimizerAboul Ella Hassanien
 
Accurate metaheuristic deep convolutional structure for a robust human gait r...
Accurate metaheuristic deep convolutional structure for a robust human gait r...Accurate metaheuristic deep convolutional structure for a robust human gait r...
Accurate metaheuristic deep convolutional structure for a robust human gait r...IJECEIAES
 
DROWSINESS DETECTION USING COMPUTER VISION
DROWSINESS DETECTION USING COMPUTER VISIONDROWSINESS DETECTION USING COMPUTER VISION
DROWSINESS DETECTION USING COMPUTER VISIONIRJET Journal
 
Surgeons and registrar education 1
Surgeons and registrar education 1Surgeons and registrar education 1
Surgeons and registrar education 1Dr Alfred Egedovo
 
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...ijaia
 
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNING
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNINGHUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNING
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNINGgerogepatton
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsIRJET Journal
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsIRJET Journal
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
 
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...Hossam Shafiq I
 
Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology DesignJeffrey Funk
 
Real time pedestrian detection with deformable part models [h. cho, p. rybski...
Real time pedestrian detection with deformable part models [h. cho, p. rybski...Real time pedestrian detection with deformable part models [h. cho, p. rybski...
Real time pedestrian detection with deformable part models [h. cho, p. rybski...tino
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...Maynooth University
 

Similar a Human action recognition optimization based on evolutionary feature (20)

Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall Detection
Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall DetectionTriaxial Accelerometer Located on the Wrist for Elderly People’s Fall Detection
Triaxial Accelerometer Located on the Wrist for Elderly People’s Fall Detection
 
Interactive Dialogue Technique based Computer Vision with Palm Tracking
Interactive Dialogue Technique based Computer Vision with Palm TrackingInteractive Dialogue Technique based Computer Vision with Palm Tracking
Interactive Dialogue Technique based Computer Vision with Palm Tracking
 
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory AnalysisAutonomous Abnormal Behaviour Detection Using Trajectory Analysis
Autonomous Abnormal Behaviour Detection Using Trajectory Analysis
 
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
A Parametric Approach to Gait Signature Extraction for Human Motion Identific...
 
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHIAutogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI
Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI
 
A Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall DetectionA Review Paper on Elderly Fall Detection
A Review Paper on Elderly Fall Detection
 
Driver detection system_final.ppt
Driver detection system_final.pptDriver detection system_final.ppt
Driver detection system_final.ppt
 
Breast Thermograms Features Analysis based on Grey Wolf Optimizer
Breast Thermograms Features Analysis  based on Grey Wolf OptimizerBreast Thermograms Features Analysis  based on Grey Wolf Optimizer
Breast Thermograms Features Analysis based on Grey Wolf Optimizer
 
Accurate metaheuristic deep convolutional structure for a robust human gait r...
Accurate metaheuristic deep convolutional structure for a robust human gait r...Accurate metaheuristic deep convolutional structure for a robust human gait r...
Accurate metaheuristic deep convolutional structure for a robust human gait r...
 
DROWSINESS DETECTION USING COMPUTER VISION
DROWSINESS DETECTION USING COMPUTER VISIONDROWSINESS DETECTION USING COMPUTER VISION
DROWSINESS DETECTION USING COMPUTER VISION
 
Surgeons and registrar education 1
Surgeons and registrar education 1Surgeons and registrar education 1
Surgeons and registrar education 1
 
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...
INSIGHTS IN EEG VERSUS HEG AND RT-FMRI NEURO FEEDBACK TRAINING FOR COGNITION ...
 
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNING
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNINGHUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNING
HUMAN ACTIVITY TRACKING BY MOBILE PHONES THROUGH HEBBIAN LEARNING
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue Operations
 
Person Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue OperationsPerson Detection in Maritime Search And Rescue Operations
Person Detection in Maritime Search And Rescue Operations
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...
05 Traffic Data Collection (Traffic Engineering هندسة المرور & Prof. Saad AlG...
 
Wearable Technology Design
Wearable Technology DesignWearable Technology Design
Wearable Technology Design
 
Real time pedestrian detection with deformable part models [h. cho, p. rybski...
Real time pedestrian detection with deformable part models [h. cho, p. rybski...Real time pedestrian detection with deformable part models [h. cho, p. rybski...
Real time pedestrian detection with deformable part models [h. cho, p. rybski...
 
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
PAMS: A new position-aware multi-sensor dataset for human activity recognitio...
 

Más de Francisco (Paco) Florez-Revuelta

Visual monitoring of people in private spaces. From the “Big Brother” to the...
Visual monitoring of people in private spaces.  From the “Big Brother” to the...Visual monitoring of people in private spaces.  From the “Big Brother” to the...
Visual monitoring of people in private spaces. From the “Big Brother” to the...Francisco (Paco) Florez-Revuelta
 
Topology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary AlgorithmTopology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary AlgorithmFrancisco (Paco) Florez-Revuelta
 
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...Francisco (Paco) Florez-Revuelta
 
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...Francisco (Paco) Florez-Revuelta
 
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014Francisco (Paco) Florez-Revuelta
 
Evolutionary algorithm for dense pixel matching in presence of distortions
Evolutionary algorithm for dense pixel matching in presence of distortionsEvolutionary algorithm for dense pixel matching in presence of distortions
Evolutionary algorithm for dense pixel matching in presence of distortionsFrancisco (Paco) Florez-Revuelta
 
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...Francisco (Paco) Florez-Revuelta
 
Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...Francisco (Paco) Florez-Revuelta
 
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...Francisco (Paco) Florez-Revuelta
 
Specific crossover and mutation operators for a grouping problem based on int...
Specific crossover and mutation operators for a grouping problem based on int...Specific crossover and mutation operators for a grouping problem based on int...
Specific crossover and mutation operators for a grouping problem based on int...Francisco (Paco) Florez-Revuelta
 
Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...Francisco (Paco) Florez-Revuelta
 

Más de Francisco (Paco) Florez-Revuelta (16)

AAL Forum 2016
AAL Forum 2016AAL Forum 2016
AAL Forum 2016
 
Visual monitoring of people in private spaces
Visual monitoring of people in private spacesVisual monitoring of people in private spaces
Visual monitoring of people in private spaces
 
Visual monitoring of people in private spaces. From the “Big Brother” to the...
Visual monitoring of people in private spaces.  From the “Big Brother” to the...Visual monitoring of people in private spaces.  From the “Big Brother” to the...
Visual monitoring of people in private spaces. From the “Big Brother” to the...
 
Topology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary AlgorithmTopology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
Topology-Preserving Ordering of the RGB Space with an Evolutionary Algorithm
 
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
Using Wavelet Transform to Disaggregate Electrical Power Consumption into the...
 
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
A Multiple Kernel Learning Based Fusion Framework for Real-Time Multi-View Ac...
 
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014
Visual Privacy by Context: A Level-Based Visualisation Scheme - UCAmI 2014
 
Vision-based monitoring of people in private spaces
Vision-based monitoring of people in private spacesVision-based monitoring of people in private spaces
Vision-based monitoring of people in private spaces
 
Evolutionary algorithm for dense pixel matching in presence of distortions
Evolutionary algorithm for dense pixel matching in presence of distortionsEvolutionary algorithm for dense pixel matching in presence of distortions
Evolutionary algorithm for dense pixel matching in presence of distortions
 
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...
Fusion of Skeletal and Silhouette-based Features for Human Action Recognition...
 
Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...Analysis of the topology preservation of accelerated Growing Neural Gas in th...
Analysis of the topology preservation of accelerated Growing Neural Gas in th...
 
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
Producto Topográfico Geodésico: Mejora para medir la preservación de la topol...
 
Specific crossover and mutation operators for a grouping problem based on int...
Specific crossover and mutation operators for a grouping problem based on int...Specific crossover and mutation operators for a grouping problem based on int...
Specific crossover and mutation operators for a grouping problem based on int...
 
Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...Ambient Assisted Living. ICT for the support of the daily living of elderly a...
Ambient Assisted Living. ICT for the support of the daily living of elderly a...
 
Use of Kinect in a Smart Home
Use of Kinect in a Smart HomeUse of Kinect in a Smart Home
Use of Kinect in a Smart Home
 
Metaltic
MetalticMetaltic
Metaltic
 

Último

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Último (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Human action recognition optimization based on evolutionary feature

Notas del editor

  1. I’ma PhD. Fellow at theUniversity of Alicante and a VisitingResearcherat Kingston University.Thisworkiscoauthoredby Francisco Flórez-Revuelta and, as thetitlesummarises, ourcontributiondealswithoptimization of human actionrecognitionbymeans of evolutionaryfeaturesubsetselection.
  2. Helloeverybody! MynameisAlexandros and I’m a PhD. Fellow at theUniversity of Alicante and a visitingresearcher at Kingston University.Thisworkiscoauthoredby Francisco Flórez-Revuelta and, as thetitlesummarises, ourcontributiondealswithoptimization of human actionrecognitionbymeans of evolutionaryfeaturesubsetselection.