2021
DOI: 10.1016/j.imavis.2020.104090
|View full text |Cite
|
Sign up to set email alerts
|

A framework of human action recognition using length control features fusion and weighted entropy-variances based feature selection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
51
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
2

Relationship

4
6

Authors

Journals

citations
Cited by 115 publications
(52 citation statements)
references
References 23 publications
1
51
0
Order By: Relevance
“…The significance of multifaceted applications of hand gestures has increased in the industry and research fields [ 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 ]. Computer vision, pattern recognition, and human-computer interaction (HCI) are among the popular areas that involve 3D hand-gesture modeling [ 31 , 32 ].…”
Section: Methodsmentioning
confidence: 99%
“…The significance of multifaceted applications of hand gestures has increased in the industry and research fields [ 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 ]. Computer vision, pattern recognition, and human-computer interaction (HCI) are among the popular areas that involve 3D hand-gesture modeling [ 31 , 32 ].…”
Section: Methodsmentioning
confidence: 99%
“…Deep learning showed much success in the area of machine learning in the past two decades. Well known applications of deep learning include visual surveillance, biometrics, and medicine, among others [44,45]. Biometrics is an important application and much research attends to this field [46].…”
Section: Related Workmentioning
confidence: 99%
“…In previous decades, different techniques have been used for HAR, such as computer vision methods [7][8][9] that use cameras to track human motion and actions, and wearable devices that should be carried by users, such as wearable sensors [10], smartwatches [11], and smartphones [12,13]. Additionally, there are other techniques, such as environment installed sensors [14], and WiFi signals, which include three techniques, namely received signal strength [15], channel state information [16], and WiFi radar (micro-Doppler radar) [17].…”
Section: Introductionmentioning
confidence: 99%