2021
DOI: 10.1155/2021/6690606
|View full text |Cite|
|
Sign up to set email alerts
|

[Retracted] Complex System of Vertical Baduanjin Lifting Motion Sensing Recognition under the Background of Big Data

Abstract: Nowadays, the development of big data is getting faster and faster, and the related research on motion sensing recognition and complex systems under the background of big data is gradually being valued. At present, there are relatively few related researches on vertical Baduanjin in the academic circles; research in this direction can make further breakthroughs in motion sensor recognition. In order to carry out related action recognition research on the lifting action of vertical Baduanjin, this paper uses se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Deep networks can be used by DL-based techniques to learn behavioral representations of videos from beginning to end. Compared to conventional approaches, it is more adaptable and flexible [ 22 ]. The action recognition algorithms based on DL can be broadly categorized as single-flow, dual-flow, and multi-flow networks according to the quantity of input data flows[ 23 ].…”
Section: Research Modelmentioning
confidence: 99%
“…Deep networks can be used by DL-based techniques to learn behavioral representations of videos from beginning to end. Compared to conventional approaches, it is more adaptable and flexible [ 22 ]. The action recognition algorithms based on DL can be broadly categorized as single-flow, dual-flow, and multi-flow networks according to the quantity of input data flows[ 23 ].…”
Section: Research Modelmentioning
confidence: 99%
“…We investigate the setting for the adversary network for the poison attack, the assumption, the first case, taken as perfect knowledge gained by the adversary on the target classifier ( P TC ) and known feature space t ( x ).The second case, is that adversaries gained the less or limited knowledge ( L TC ), target classifier. We assumed that attacker may have knowledge of features representation, but not the training dataset (Rathore et al, 2022; Poongodi, Bourouis et al, 2022; Ramesh, Lihore et al, 2022; Poongodi, Malviya, Hamdi et al, 2022; Poongodi, Malviya, Kumar et al, 2022; Poongodi, Hamdi, & Wang 2022; Poongodi et al, 2021; Ramesh, Vijayaragavan et al, 2022; Hamdi et al, 2022; Poongodi, Hamdi, Malviya et al, 2022; Kamruzzaman 2021; Hossain et al, 2022; Chen et al, 2019; Kamruzzaman 2013, 2014; Zhang et al, 2021; Hossain, Kamruzzaman et al, 2022; Sarker et al, 2021; Shi et al, 2020; Chen et al, 2020).…”
Section: Attack Modelsmentioning
confidence: 99%
“…To address urbanization, the urban planners and concerned authorities focus on emerging technologies for cutting the costs, specifically by ensuring optimal utilization of resources and creating a sustainable environment for living [ 1 ]. In this regard, Karale and Ranaware [ 2 ] and several other researchers have highlighted that big data, the Internet of Things (IoT), artificial intelligence, machine learning, multimedia, blockchain, cyber-physical system, and cloud computing have gained prominence due to their wide-ranging benefits in different domains [ 3 8 ]. It is anticipated that the application of these technologies would contribute to the development of fully automated secure smart cities [ 9 14 ].…”
Section: Introductionmentioning
confidence: 99%