1 |
J. Kim, C. J. Nan, and B. T. Zhang, "Deep Learning-based Video Analysis Techniques," Communications of the Korean Institute of Information Scientists and Engineers, Vol.33, No.9, pp.21-31, 2015.
|
2 |
E. Kim, S. Helal, and D. Cook, "Human activity recognition and pattern discovery," IEEE Pervasive Computing, Vol.9, No.1, pp.48-53, 2010.
DOI
|
3 |
L. Yann, B. Yoshua, and H. Geoffrey, "Deep learning," Nature, Vol.521, No.7553, pp.436-444, 2015.
DOI
|
4 |
I. J. Kim, "Recent advances in deep learning technologies for visual recognition," Communications of the Korean Institute of Information Scientists and Engineers, Vol.33, No.9, pp.15-20, 2015.
|
5 |
D. Jeffrey et al, "Long-term recurrent convolutional networks for visual recognition and description," in Proceeding of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2015), Boston-Massachusetts: US, pp.2625-2634, Jun., 2015.
|
6 |
NUREG-1959, Intrusion Detection Systems and Subsystems, USNRC (United States Nuclear Regulatory Commission), p.19, Nov., 2010.
|
7 |
Wikipedia, Activity Recognition [Internet], https://en.wikipedia.org/wiki/Activity_recognition.
|
8 |
C. Liming and K. Ismail, "Activity recognition: Approaches, practices and trends," in Activity Recognition in Pervasive Intelligent Environments, 1st ed. Atlantis Press Pub., ch.3, pp.1-31, 2011.
|
9 |
V. Michalis, N. Christophoros, and I. A. Kakadiaris, "A Review of Human Activity Recognition Methods," Frontiers in Robotics and AI 2:28, 2015.
|