Computer Science ›› 2017, Vol. 44 ›› Issue (7): 275-278.doi: 10.11896/j.issn.1002-137X.2017.07.049

Previous Articles     Next Articles

Research on Action Recognition Algorithm Based on Hybrid Cooperative Training

JING Chen-yong, ZHAN Yong-zhao and JIANG Zhen   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Human action recognition is an important issue in the field of computer vision.Existing action recognition methods mostly belong to supervised learning category,in which a large number of labeled data are needed to train the recognition model.However,in many real-world tasks,labeled data are often expensive to get,while unlabeled data are readily available in abundance.In this paper,a novel human action recognition algorithm,named as Co-KNN-SVM,was proposed based on hybrid collaborative training.Different types of recognition methods for action recognition field are employed in this method to build the base classifiers,which are then iteratively retrained to increase their generalization abilities.In general,our method can decrease the labeling cost and achieve complementary advantages of different recognition algorithms.In order to decrease the impact of the noise in pseudo labeled data and improved the recognition performance,we also improved the selection method for the pseudo label data and the iterative training strategy in co-trai-ning style algorithms.The experimental results show that the proposed algorithms can identify human action in the vi-deo more effectively.

Key words: Action recognition,Supervised learning,Hybrid collaborative training,Noise

[1] LI R F,WANG L L.A Survey of Human Body Action Recognition[J].Pattern Recognition and Artificial Intelligence,2014,7(1):35-48.(in Chinese) 李瑞峰,王亮亮.人体动作行为识别研究综述[J].模式识别与人工智能,2014,7(1):35-48.
[2] HU Q,QIN L,HUANG Q M.A Survey on Visual Human Action Recognition[J].Chinese Journal of Computers,2013,6(12):2512-2524.(in Chinese) 胡琼,秦磊,黄庆明.基于视觉的人体动作识别综述[J].计算机学报,2013,6(12):2512-2524.
[3] XIE L D.Research on complex human behavior recognition based on hierarchical method[D].Xiamen:Xiamen University,2014.(in Chinese) 谢立东.基于分层方法的复杂人体行为识别研究[D].厦门:厦门大学,2014.
[4] LIN Z,JIANG Z,DAVIS L S.Recognizing Actions by Shape-Motion Prototype Trees[C]∥IEEE International Conference on Computer Vision.2009:444-451.
[5] JIANG Z,LIN Z,DAVIS L S.A Tree-Based Approach to Integrated Action Localization,Recognition and Segmentation[M]∥Trends and Topics in Computer Vision.Springer Berlin Heidelberg,2010:114-127.
[6] LIU J G, ALI S,SHAH M.Recognizing human actions usingmultiple features [C]∥Computer Vision and Pattern Recognition,2008.IEEE Conference on IEEE,2008:1-8.
[7] MATIKAINEN P,HEBERT M,SUKTHANKAR R.Trajec-tons:Action recognition through the motion analysis of tracked features[C]∥International Conference on Computer Vision Workshops.IEEE,2009:514-521.
[8] MATIKAINEN P,HEBERT M,SUKTHANKAR R.Representing Pairwise Spatial and Temporal Relations for Action Recognition[C]∥European Conference on Computer Vision.2010:508-521.
[9] NATARAJAN P,NEVATIA R.Online,Real-time Tracking and Recognition of Human Actions[C]∥IEEE Workshop on Motion and video Computing,2008(WMVC 2008).2008:1-8.
[10] GUAN D,YUAN W,LEE Y K,et al.Activity RecognitionBased on Semi-supervised Learning[C]∥IEEE International Conference on Embedded and Real-Time Computing Systems and Applications.IEEE Computer Society,2007:469-475.
[11] LIU W,LI Y,TAO D,et al.A general framework for co-training and its applications[J].Neurocomputing,2015,7(c):112-121.
[12] JIANG Z,ZHANG S,ZENG J.A hybrid generative/discriminative method for semi-supervised classification[J].Knowledge-Based Systems,2013,37(2):137-145.
[13] GUPTA S,KIM J,GRAUMAN K,et al.Watch,Listen &Learn:Co-training on Captioned Images and Videos[M]∥Machine Learning and Knowledge Discovery in Databases.DBLP,2008:457-472.
[14] YU S,KRISHNAPURAM B,ROSALES R,et al.Bayesian Co-Training[J].Journal of Machine Learning Research,2007,12(3):2649-2680.
[15] LIU C,YUEN P C.A Boosted Co-Training Algorithm for Human Action Recognition[J].IEEE Transactions on Circuits & Systems for Video Technology,2011,21(9):1203-1213.
[16] TANG C,WANG W J,LI W,et al.Multi-Learner co-training model for human action recognition[J].Journal of Software,2015,6(11):2939-2950.
[17] BREFELD U,SCHEFFER T.Co-EM support vector learning[C]∥International Conference on Machine Learning.ACM,2004:121-128.
[18] LIU J,LUO J,SHAH M.Recognizing realistic actions from vi-deos “in the Wild”[C]∥IEEE Conference on Computer Vision &Pattern Recognition.2009:1996-2003.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .