Abnormal Human Action Detection using Sensor-based Unsupervised Machine Learning

DOI : 10.17577/IJERTCONV10IS12015

Download Full-Text PDF Cite this Publication

Text Only Version

Abnormal Human Action Detection using Sensor-based Unsupervised Machine Learning

Prof. Lokesh H.D1, Ranjit kr. Yadav2, Rahul Kr. Sap, Sailesh Dhakal4

1 Faculty CSE Department, Sri Krishna Institute of Technology, Blore-560090, India

2,3,4,5 CSE Department, Sri Krishna Institute of Technology, Blore-560090, India

Abstract:- Currently, several applications have come from the various implementation of software package development and hardware use, called the web of things. One of the most important areas for the use of this type of technology is in health care sector like hospitals, for old aged people at home many applications are there in our day-to-day life to enhance the standard of our life style and market improvements within the reception of patients suffering from a different pathologist.

That's why there has emerged a line of labor of nice interest, centered on the study and analysis of standard of living activities, on the employment of various knowledge analysis techniques to spot and to help manage this kind of patient. Technology is growing rapidly, making it easier to spot and detect unusual activities. There are many strategies and methods available in the field of finding unusual jobs.

  1. INTRODUCTION

    Personal action recognition has attracted growing attention, and your apps are important within the extremes of video and security police work, video annotation and recovery, job statistics and human-computer interactions, and more. The notion of action-based action is a way of looking at human activities through video sequencing with PC perception of trauma. The term work refers to basic movement patterns that often kill individuals and often extend the length of your time. The goal of action recognition is to analyze continuous actions from unknown video, as a result. Thus, one of the most common barriers to the recognition of human activities arises from the major conflicts associated with the positive diversity of categories,scales, barriers, and clutter. Video-based action detection has a variety of applications for personal computing, viewing, video editing, and recovery. Functions or movements produce a number of unstable patterns depending on the patio-temporal forms in the recording, which can be used as descriptions of elements to determine actions.

    threshold to support the distribution of unlabeled data, or by distributing high-quality running labels that are more reliable on unlabeled data.

    Another connected analysis direction is unattended learning. The unattended learning is trained to focus on many or one pattern discovery instead of classification. In human action understanding is split into activity recognition and activity pattern discovery. The first phase focuses on the accuratedetection of human activities that support a pre-defined or pre-trained work model, while the second phase focuses on finding inaccurate patterns directly in low-level sensory data.

    There are also rules based on job recognition rules.

    In, Store

    l. drafted the rules of multi-agent framework exploitation and handwritten configuration within the long language format (XML). The authors also use ex thought. Acquisition of foodpreparation work includes a set of cases and rules.

    METHODOLOGY

    The method for the abnormal human action detection duringthe video victimization using unsupervised machine learning strategies is shown in the given flowchart.

  2. RELATED WORK

In the field of portable computer, portable, and ubiquitous, in-depth analysis was performed to monitor human activities (e.g., sitting, walking, running). In terms of teaching methodology, a large proportion of the research in this field has used supervised learning methods, as well as discriminating dividers (e.g., tree drum, SVM) and productive models. In order to reduce reliance on marked training information and to utilize the benefits of long- tagged data, previous work has included less supervised learning at workor context recognition programs.

Slightly monitored reading methods will improve the accuracy of the thunderstorm by refining the selected

Figure 1: Flowchart of methodology

It has been observed that the belief of characteristic engineeringhas advanced from 2D to 3-D capabilities at some point of time that allows you to higher motion representation. However, the complexity of designing handmade capabilities is extraordinarily high, that is one of the number one motives formoving capabilities from the shallow to deep regions, which has expanded the sensible applicability of motion popularity algorithms to a brand-new stage of excellence via way of meansof making use of deep getting to know know-how to popularitysystems. It consists of 2 predominant approaches:

  • Single man or woman primarily based totally strangehuman motion popularity.

  • Multiple folks primarily based totally strange occasiondetection.

  1. EXECUTION

    The process of implementation includes the particular materialization of the concepts expressed within the document

    The proposed methodology contains the following set of phases for detecting the abnormal human action from the system

    1. Data set assortment:

      During this paper, we have a tendency to take video file from our system as input for detecting work in the abnormal human activities. It contains both video and audio files.

    2. Initialization of Data:

      The video file is provided as input to the framework, which is displayed before handling process. The video is converted into frames of images known as outlines and these edges are handled consecutively. The RGB vector hereis 3-D whereas grey scaled vector is 1-D.

    3. Extracting Features:

      We have removed functions from our execution section process map module in motion. Removing paintings at the motion effect map, a rectangular wherein unusual motion occurs along its neighboring squares, has precise vector improvement effect removing Features. Following a

      continuous series of 't' of casings divided into uber obstacles, a powerful vector corresponding to eight t- dimensional segments is split at all edges in all positive rectangular.

    4. K-means Clustering Algorithm:

      For the removed features, we now apply the k-meanscluster algorithm. we tend to cluster for every mega block utilizing the s patio-fleeting highlights, and set all our main focus to the code words of program. Because of it, an magnificent square code words will have a model of the sample of action that is supposed to happen within the area of the concerned authority.

    5. Frame -wise Detection:

      When we take the video as input then while processing the videos are converted into various frames and then the frame wise detection of the abnormal activities in the given processing file starts to take place. The abnormal and normal frames are separated and distinguished from each other for other process to take place.

    6. Pixel Level Detection:

    Now in the pixel level detection the pixels are taken in consideration and the process start. What is the pixel of the framethat is identified so that the accuracy can be increased of the algorithm and the process can be done in smooth manner.

    In this, we tend to use python programming language, additionally the needs are Python Open CV three and NumPy, Pandas respectively.

    Implementation ought to be a perfect mapping of the design document in a suitable programming language to realizethe specified finish product. And we've also had short discussion on the relevant modules and ways gift duringthis paper. Our implementation code was divided into 5 modules they are,

    a) Optical flow of Blocks:

    1. Generator of mega Block:

      Mega blocks from the frames are developed and is split into non-overlapping mega blocks, all of that could be a mix of various squares which will be managed during the process of the movement.

      Once we provide video as an input to the system, the

    2. Training:

    We have a tendency to solely use video clips of

    file divided into different frames. After dividing frames into blocks, we have to determine the optical flow which is done by predicting the movement of theblock as in which direction it will go and similarly, we predict the next move.

    b) Generation of Motion influence:

    Motion Influence Map will affect the different factors of the frames. Let us suppose that in a rush environment someparticular person in walking in which direction, movementof vehicles in traffic and many more. The two factors of it :

    • Object moving in which direction and

    • Objects speed

    The speed of an article is directly proportional to the construct which are under the control of item.

    traditional activities throughout our coaching stage. So,a mega-block' code words model samples of regular exercises which will happen within the separate zone.

    e) Testing:

    Currently that we've made the code words for normal

    activity, it' time to check the created model with a test knowledge set containing uncommon activity.

  2. RESULT ANALYSIS & DISCUSSION:

    Finally, we can see the results of the experiment ofAbnormal Human Action Detection using

    Sensor-Based Unsupervised Machine Learning

    1. Figure 2: Input video shown as image

Figure 3: Image as shown divided into blocks

Figure 4: Unusual Frame 1

VI. ACKNOWLEDGEMENT

We would like to thank Prof. Lokesh H.D for his valuable suggestion, expert advice and moral support in the process ofpreparing this paper.

Figure 5: Unusual Frame 2

Figure 6: Abnormal Crowd Action detection

CONCLUSION

There is an enormous demand for the event of a sensible closed-circuit television that not solely reduces human involvement in monitoring however conjointly alerts the several authorities on time from the long run miss happening. Since people are alert to the existence of CCTV nearly everywhere, in most situations, behavior of individuals concerned in crimes could seem normal. however too several false alarms might also lead to irritations or a loss of trust within the system. Hence, developing such a completely unique model with less coaching time and information set, with high accuracy and self-learning with time is extremely in need