{"title":"Applications of Human Activity Recognition in Different Fields: A Review","authors":"Yash Daga, S. Meena","doi":"10.1109/UPCON56432.2022.9986408","DOIUrl":null,"url":null,"abstract":"Human activity recognition is a field where not enough work has been done yet, but its applications can be helpful in numerous domains. In this paper, we have discussed different methods by which implementation of human activity recognition can be carried away and compared those methods in terms of advantages, performance, accuracy, techniques, datasets, and limitations. We have also discussed numerous domains where this can be helpful such as healthcare, security, and augmented reality, along with the challenges and the type of method used.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON56432.2022.9986408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Human activity recognition is a field where not enough work has been done yet, but its applications can be helpful in numerous domains. In this paper, we have discussed different methods by which implementation of human activity recognition can be carried away and compared those methods in terms of advantages, performance, accuracy, techniques, datasets, and limitations. We have also discussed numerous domains where this can be helpful such as healthcare, security, and augmented reality, along with the challenges and the type of method used.