The International Arab Journal of Information Technology (IAJIT)


Pedestrian Target Recognition Algorithm in Public Places Based on Representation Learning and Similarity Learning

Xiaowen Li,

To ensure public safety, the government has placed a lot of cameras in public places and used them to monitor key targets. In target detection, pedestrian target detection is undoubtedly a research hotspot. How to realize the high efficiency of pedestrian detection is the focus of this field. As a result, this research suggests an algorithm for pedestrian target detection in public spaces that is based on representation learning and similarity learning. The algorithm uses representation learning to extract pedestrian features and Singular Value Decomposition (SVD) to build a more trustworthy Feature Extraction Network (FEN). In addition, the improved softmax function is used for similarity learning, and the K-Nearest Neighbor algorithm (KNN is applied for image retrieval to fgreatly increase the identification accuracy of pedestrians. The algorithm proposed in this study only needs two rounds of constraint training to achieve the best state. The mean absolute error and mean square error are 0.31 and 9.38, respectively. Its Relative Robustness (RR), Relative Generalization (RG) and Relative Scalability (RS) are excellent. In the final practical test, the model finally achieved 98.8% accuracy and 2.1% false positive rate. The proposed algorithm in this study has good application value in pedestrian target detection, and can better promote the development of social public safety.

[1] Ali A., Yaseen M., Aljanabi M., and Abed S., “Transfer Learning: A New Promising Techniques,” Mesopotamian Journal of Big Data, vol. 2023, pp. 29-30, 2023.

[2] An H., Hu H., Guo Y., Zhou Q., and Li B., “Hierarchical Reasoning Network for Pedestrian Attribute Recognition,” IEEE Transactions on Multimedia, vol. 23, no.1, pp. 268-280, 2021. DOI:10.1109/TMM.2020.2975417

[3] Bagyaraj S., Tamilselvi R., Gani P., and Sabarinathan D., “Brain Tumour Cell Segmentation and Detection Using Deep Learning Networks,” IET Image Processing, vol. 15, no. 10, pp. 2363-2371, 2021.

[4] Bi D., Kadry S., and Kumar P., “Internet of Things Assisted Public Security Management Platform for Urban Transportation Using Hybridised Cryptographic‐Integrated Steganography,” IET Intelligent Transport Systems, vol. 14, no. 11, pp. 1497-1506, 2020. DOI:10.1049/iet-its.2019.0833

[5] Dow C., Ngo H., Lee L., Lai P., Wang K., and Bui V., “A Crosswalk Pedestrian Recognition System by Using Deep Learning and Zebra-Crossing Recognition Techniques,” Software: Practice and Experience, vol. 50, no. 5, pp. 630-644, 2020.

[6] Fang B., Jiang M., Shen J., and Stenger B., “Deep Generative Inpainting with Comparative Sample Augmentation,” Journal of Computational and Cognitive Engineering, vol. 1, no. 4, pp. 174-180, 392 The International Arab Journal of Information Technology, Vol. 21, No. 3, May 2024 2022. DOI: 10.47852/bonviewJCCE2202319

[7] Fetene D., Higgs P., Nielsen S., Djordjevic F., and Dietze P., “The impact of Victoria’s Real Time Prescription Monitoring System (SafeScript) in a Cohort of People Who Inject Drugs,” The Medical Journal of Australia, vol. 214, no. 5, pp. 234-235, 2021. DOI: 10.5694/mja2.50958

[8] Gan W., Sun Y., and Sun Y., “Knowledge Structure Enhanced Graph Representation Learning Model for Attentive Knowledge Tracing,” International Journal of Intelligent Systems, vol. 37, no. 3, pp. 2012-2045, 2021.

[9] Kapoor S., Sharma A., Verma A., Dhull V., and Goyal C., “A Comparative Study on Deep Learning and Machine Learning Models for Human Action Recognition in Aerial Videos,” The International Arab Journal of Information Technology, vol. 20, no. 4, pp. 567-574, 2023.

[10] Li C., Yang X., Yin K., Chang Y., Wang Z., and Yin G., “Pedestrian Re-Identification Based on Attribute Mining and Reasoning,” IET Image Processing, vol. 15, no. 11, pp. 2399-2411, 2021.

[11] Li K., Zhuang Y., Lai J., and Zeng Y., “PFYOLOv4: An Improved Small Object Pedestrian Detection Algorithm,” IEEE Access, vol. 11, pp. 17197-17206, 2023. DOI:10.1109/ACCESS.2023.3244981

[12] Luo X., Ma Z., Cheng W., and Deng M., “Improve Deep Unsupervised Hashing via Structural and Intrinsic Similarity Learning,” IEEE Signal Processing Letters, vol. 29, no. 1, pp. 602-606, 2022. DOI: 10.1109/LSP.2022.3148674

[13] Na G., Jang S., Lee Y., and Chang H., “Tuplewise Material Representation Based Machine Learning for Accurate Band Gap Prediction,” The Journal of Physical Chemistry A, vol. 124, no. 50, pp. 10616-10623, 2020.

[14] Ogura R., Nagasaki T., and Matsubara H., “Improving the Visibility of Nighttime Images for Pedestrian Recognition Using in-Vehicle Camera,” Electronics and Communications in Japan, vol. 103, no. 10, pp. 35-43, 2020.

[15] Saho K., Shioiri K., and Inuzuka K., “Accurate Person Identification Based on Combined Sit-to- Stand and Stand-to-Sit Movements Measured Using Doppler Radars,” IEEE Sensors Journal, vol. 21, no. 4, pp. 4563-4570, 2020. DOI:10.1109/JSEN.2020.3032960

[16] Sumari F., Machaca L., Huaman J., Clua E., and Guérin J., “Towards Practical Implementations of Person Re-Identification from Full Video Frames,” Pattern Recognition Letters, vol. 138, no. 10, pp. 513-519, 2020.

[17] Totaro S., Hussain A., and Scardapane S., “A Non- Parametric Softmax for Improving Neural Attention in Time-Series Forecasting,” Neurocomputing, vol. 381, pp. 177-185, 2020.

[18] Uras M., Cossu R., Ferrara E., Liotta A., and Atzori L., “PmA: A Real-World System for People Mobility Monitoring and Analysis Based on Wi-Fi Probes,” Journal of Cleaner Production, vol. 270, pp. 1-14, 2020.

[19] Wang Y., “MRCNNAM: Mask Region Convolutional Neural Network Model Based on Attention Mechanism and Gabor Feature for Pedestrian Detection,” Journal of Applied Science and Engineering, vol. 26, no. 11, pp. 1555-1561. 0005

[20] Xue F., Ji H., and Zhang W., “Mutual Information Guided 3D ResNet for Self-Supervised Video Representation Learning,” IET Image Processing, vol. 14, no. 13, pp. 3066-3075, 2020. DOI:10.1049/iet-ipr.2020.0019

[21] Yang F., Wang X., Zhu X., Liang B., and Li W., “Relation-Based Global-Partial Feature Learning Network for Video-Based Person Re- Identification,” Neurocomputing, vol. 488, pp. 424-435, 2022.

[22] Zhang H., Li P., Du Z., and Dou W., “Risk Entropy Modeling of Surveillance Camera for Public Security Application,” IEEE Access, vol. 8, no. 1, pp. 45343-45355, 2020. DOI:10.1109/ACCESS.2020.2978247

[23] Zhao Z., Sun R., Yang Z., and Gao J., “Visible- Infrared Person Re-Identification Based on Frequency-Domain Simulated Multispectral Modality for Dual-Mode Cameras,” IEEE Sensors Journal, vol. 22, no. 1, pp. 989-1002, 2021. DOI:10.1109/JSEN.2021.3130181

[24] Zhong G. and Pun C., “Subspace Clustering by Simultaneously Feature Selection and Similarity Learning,” Knowledge-Based Systems, vol. 193, no. 1, pp. 105512, 2020.