Volume 2022, Issue 1 4282569
Research Article
Open Access

Research on Contactless Identification and Evaluation of Unarmed Fitness Activity

Chengzhao Li

Corresponding Author

Chengzhao Li

College of Physical Education, Pingdingshan University, Pingdingshan 467000, China pdsu.edu.cn

Search for more papers by this author
Academic Editor: Sikandar Ali

Abstract

For low accuracy in the recognition and evaluation of unarmed fitness activities, analyzing the impact of the diversity of the execution speed of unarmed fitness activities on the recognition and evaluation results, a contactless recognition and evaluation method of unarmed fitness activities has been proposed by using the normalization to improve dynamic time warping (DTW) algorithm. As can be seen, the proposed method can reduce the influence of activity execution speed change on activity recognition and evaluation, so as to improve the contactless recognition accuracy of unarmed fitness activities. Meanwhile, the overall recognition accuracy can reach 0.91, and the positive rate can be more than 0.84, which has strong robustness.

1. Introduction

Unarmed fitness activities are an important part of national fitness. Because no additional equipment is required and there are no special requirements for fitness venues, unarmed fitness activities are favored by the vast number of people love. However, compared with exercise equipment, most unarmed fitness activities are less difficult. Trainers usually train in the gym or indoor or outdoor by themselves through text description or video. It can be seen that it lacks corresponding movement evaluation and feedback. When the trainer’s movement is not standard and not corrected, the trainer may be injured accidentally. In order to avoid this problem, it is necessary to find an automatic contactless method for identification and evaluation of unarmed fitness activities.

In recent years, the application of radio frequency identification (RFID) technology brings a new opportunity for the identification and evaluation of unarmed fitness activities. Guo Jun et al. proposed a feature fusion method of video and WiFi based on multimode learning, which improved the recognition accuracy of human actions. WiFi channel status information is used as the compensator of video stream. At the same time, convolutional neural network and statistical analysis algorithm are adopted to extract features of video and WiFi, respectively [1]. Xianshan Li et al. proposed a skeleton-based motion recognition method by improving the convolutional block attention module (CBAM). In addition, the improved module is applied to the adaptive network to capture the implicit weighted information of the channel domain and space domain [2]. Xu et al. proposed a dual-flow model of human motion recognition based on human skeleton and scene image, which realized human motion recognition under unstable lighting conditions. Here, the idea of the dual-flow model is used in [3]. Fang Lei and Ning Bai et al. used the self-similar structure of human object color as the basic feature to design adaptive template function to extract human actions, which can accurately and robustly extract human targets in videos [4, 5]. Li and Syed Hassan et al. constructed a three-layer human motion recognition information processing system. And LSTM recursive neural network is introduced to optimize the recognition efficiency of the system, simplify the recognition process, and reduce the data loss rate caused by dimension reduction. Thus, the human motion recognition is realized [6]. Li et al. proposed a method of coherent action recognition in live video with space-time attention and deep learning dictionary, which improved the accuracy and speed of coherent action recognition in live video [7]. Based on the fusion of shape and deep learning features, Muhammad Attique Khan et al. proposed an action recognition method based on entropy controlled geometric mean, which realized the recognition of human actions. Although the above methods have realized the recognition and evaluation of unarmed fitness activities to a certain extent, the accuracy of recognition needs to be further improved [8]. Che et al. proposed a nonnegative matrix factorization which can be used for feature extraction and further improve the motion recognition [911]. Moreover, the above methods have certain requirements for the fitness venues. Therefore, in order to solve the above problems and improve the accuracy of the identification and evaluation of unarmed fitness activities, this study adopts the normalized method to improve the angular frequency of activity signals on the basis of the DTW algorithm, which makes the contactless identification and evaluation of unarmed fitness interaction efficient and accurate.

2. Basic Methods

2.1. Introduction to DTW Algorithm

DTW algorithm is an algorithm to measure the similarity degree of time series of two different frames. And the search of optimal matching path is realized by calculating the vector distance of two different sequences. Assuming that the sequence T and R contain N and M frame vectors respectively, and NM, thus, the purpose of the DTW algorithm is to find a time warping function m = w(n). Furthermore, the feature vector of T is mapped to R time axis m and makes w satisfy
D = min w n n = 1 N d T n , R w n , (1)
where d[T(n), R(w(n))] represents the distance measure of nth frame vector T(n) and m = w(n)th frame vector R(m) and D is the cumulative distance of the vector.
In practical application, the global limit of optimal matching path of DTW algorithm is shown in Figure 1(a), and the local path limit is shown in Figure 1(b) [12], and its stop point (N, M) satisfies
22 N M , 23. M N (2)
Details are in the caption following the image
Optimal path limit diagram. (a) Optimal path global limit. (b) Optimal path local limit.
Details are in the caption following the image
Optimal path limit diagram. (a) Optimal path global limit. (b) Optimal path local limit.
To find the optimal matching path, DTW algorithm adopts the reverse decision process. With the minimum cumulative distance node (x, y) as the previous node, the minimum cumulative distance to this point can be calculated by [13]
D x , y = d T x , R y + min D x 1 , y , D x 11 , y , D x 12 , y , (3)
where nodes meet the optimal path local restriction mode in Figure 1.

When using DTW algorithm for contactless matching recognition and evaluation of unarmed fitness activities, it is easy to cause wrong recognition and evaluation due to the diversity of movement speed in different activities [14]. Therefore, the algorithm is improved in this study, and the normalization method is considered to eliminate the influence caused by the diversity of movement speed in fitness activities.

2.2. Improvement of DTW Algorithm

The improvement of DTW algorithm is mainly to normalize the angular frequency sequence of unarmed fitness activity signals. Longitudinal normalization is adopted to eliminate the influence of signal fluctuation amplitude on activity matching results [15]:
w i = w i n 1 N w n / N arg max w n 1 n N , w i 0 , w i = w i n 1 N w n / N arg min w n 1 n N , w i < 0 , (4)
where w′(i) represents the normalized signal, w(n) represents the original signal, n represents the number of elements, and n ∈ {1,2, …, N}.
Horizontal standardization is adopted to eliminate the effect of activity speed on time. Assuming that the activity sequence is expressed after longitudinal normalization as {(x1, w1), …, (xn, wn), …, (xN, wN)}, n = 1,2 … , N. In addition, the cubic differential matching of the spline curve S(x) is specified, namely, S 1 n x 1 = S 2 x 1 , to obtain
h 2 h 1 + h 2 h 1 0 h 1 2 h 1 + h 2 h 2 0 0 h 2 2 h 2 + h 3 h 3 0 0 0 0 0 h N 1 2 h + N 1 h N h N 0 h N h N 1 + h N 2 h N 1 , (5)
where hn = xn+1xn represents the step size [16]. The quadratic differential mn can be obtained by solving the equation. Thus, the spline curve coefficients of each subinterval xnxxn+1 can be written as
a n = w n , b n = w n + 1 w n h n h n 2 m n h n 6 m n + 1 m n , c n = m n 2 , d n = m n + 1 m n 6 h n . (6)
The spline curve is
s n x = a n + b n x x n + c n x x n 2 + d n x x n 3 . (7)
So, the interpolation of each subinterval can be calculated, and the new angular frequency sequence can be obtained as follows:
w 1 , w 2 , , w I . (8)

The comparison before and after normalization of the activity sequence by the improved DTW algorithm is shown in Figure 2.

Details are in the caption following the image
Comparison of activity sequences before and after normalization. (a) Before standardization. (b) After standardization.
Details are in the caption following the image
Comparison of activity sequences before and after normalization. (a) Before standardization. (b) After standardization.

3. Contactless Recognition and Evaluation Method of Unarmed Fitness Activities Based on Improved DTW

3.1. Whole Framework

Based on the above improved DTW algorithm, this study designs the process of contactless recognition and evaluation of unarmed fitness activities as Figure 3. First of all, the existing RFID reader is used to acquire phase information of the unarmed fitness activities, and the phase denoise, angular frequency calculation, and other pretreatment are adopted. Then, obtained phase information is transmitted to the computer through the Internet. After the activity is segmented, DTW (dynamic time warping) algorithm is used to identify activities. Finally, activities are evaluated, and the evaluation results are output.

Details are in the caption following the image
Contactless identification and evaluation process of unarmed fitness activities.

3.2. Signal Feature Acquisition

Signal angular frequency reflects the speed of action, so this study adopts signal frequency as the signal feature of unarmed fitness activity recognition. After the phase characteristics are acquired by RFID and preprocessed, the signal angular frequency is calculated according to [17]
w i = θ i θ i 1 t i t i 1 , i N , (9)
where w(i) represents the angular frequency of the ith sampling and t represents the arrival time of signal.
In order to extract accurate waveform, the angular frequency of signal is smoothed. Suppose that the filtering window length of signal angular frequency sequence w is l = 21; then, signal angular frequency sequence x of the nth window is
x m , x m + 1 , , x 0 , , x m 1 , x m . (10)
Each point is fitted as
y = a 0 + a 1 x + a 2 x 2 + a k 1 x k 1 , (11)
where k represents the number of fitted polynomials. Due to n > k, the equation is as follows:
y m y m + 1 y m = 1 m m k 1 1 m + 1 m + 1 k 1 1 m m k 1 a 0 a 1 a k 1 + e m e m + 1 e m , (12)
where m = l − 1/2 is the mth point from the midpoint of the window to both sides.
Equation (12) can be equivalent expressed as [18]
Y 2 m + 1 × 1 = X 2 m + 1 × k A K × 1 + E 2 m + 1 × 1 . (13)
The least square solution of A is solved by the least square method [19]:
A = X T X 1 X T Y . (14)
Then, x after filtering can be expressed as
X = X A = X X T X 1 X T Y . (15)

After N window processing, the signal angular frequency w′ after smoothing can be obtained.

3.3. Activity Segmentation

Movements of unarmed fitness activities are continuous. If the movements are directly recognized and evaluated, it is difficult to achieve ideal results both in recognition efficiency and evaluation accuracy [20]. In order to solve this problem, the activities are segmented. First of all, the coarse-grained segmentation method is adopted to segment the preprocessed long angular frequency sequence of unarmed fitness activity signals. The specific process is as follows.

The angular frequency sequence is divided into several fragments of equal length Llarge, and the formed set is expressed as
N large = n 1 large , n 2 large , , n p large , , n p large . (16)
The variance of each fragment is calculated, and the variance set is
V large = Var n 1 large , Var n 2 large , , Var n p large , , Var n p large . (17)

Compare the variance Var n p large p P of each equal length fragment with the preset threshold value Tlarge, and synthesize all fragments larger than the threshold value, as shown in Figure 4(a).

Details are in the caption following the image
Schematic diagram of activity segmentation. (a) Synthesize all fragments larger than the threshold value. (b) Smaller than the threshold and themselves larger than the threshold value.
Details are in the caption following the image
Schematic diagram of activity segmentation. (a) Synthesize all fragments larger than the threshold value. (b) Smaller than the threshold and themselves larger than the threshold value.

Then, the fine-grained method is used to segment again, and specific operations are as follows.

The group activity sequence is divided into several segments of equal length Lsmall, and the combination of the components is expressed as
N small = n 1 small , n 2 small , , n q small , , n Q small . (18)
The variance of each fragment is calculated, and the variance set is
V small = Var n 1 small , Var n 2 2 small , , Var n q small , , Var n Q small . (19)
In order to further improve the accuracy of segmentation, the above variance Var n q small q Q of each adjacent fragment is subtracted and the absolute value is taken [21]:
H i = Var n i + 1 small Var n i small , i = 1,21. , , Q (20)
Finally, merge the three adjacent segments that are smaller than the threshold and themselves larger than the threshold, as shown in Figure 4(b); thus, we obtain the activity sequence of group J:
S J = S 1 J , S 2 J , , S m J , , S M J . (21)

3.4. Activity Identification

The basic idea of improving DTW algorithm for activity recognition is as follows.

Suppose that the mth activity sequence is T m and the number of sampling points is I′; then, the equation is as follows:
T m = T m 1 , T m 2 , , T m i , , T m I . (22)
R n is the fingerprint sequence corresponding to the nth action of the standard action fingerprint set R. For 1 ≤ nN, n is the number of template actions and J is the number of sampling points of this fingerprint sequence; thus, the equation is as follows:
R n = R n 1 , R n 2 , , R n j , , R n J , (23)
where l and J are not necessarily equal.
Construct a cost matrix C, and its size is I′×J′. In addition, d(i′, j′) is the Euclidean distance of element i′ in T m and element j′ in R n , which can be calculated by
d i , j = T m i R n j 2 . (24)
Find all paths in matrix C that satisfy the following two constraints:
  • (1)

    The first is that w1 = d(1,1)andwK = (I′, J′)

  • (2)

    When wk = d(i′, j′) and wk+1 = d(x′, y′), x′−i′≤1, y′−j′≤1 and x′−i′≥0, y′−j′≥0

Finally, find a path Wmin = {w1, …, wq, …, wQ} with the lowest cost. The cumulative DTW distance of T m and R n is calculated under this path:
DTW T m , R n = q 1 Q w q . (25)

3.5. Activity Evaluation

Activity evaluation is mainly carried out from the following three aspects:
  • (1)

    Duration of a group of actions: set the sampling point at the beginning of the action as O and the sampling point at the end of the action as P; then, the duration of the set of actions is [22]

    t = n e i n s i f s , (26)

  • where fs represents the sampling rate of RFID reader.

  • (2)

    The number of a set of actions: set the number of a set of actions as M, which can be counted according to the action segmentation segment, and it can be expressed as

    S J = s 1 J , s 2 J , , s M J R 1 × M , (27)

  • where J is the activity of group J.

  • (3)

    Consistency of movement speed: set the maximum set of activities of group J as Peej J = p 1 J , p 2 J , , p M J and the minimum set as Valley J = v 1 J , v 2 J , , v M J ; then, the equations are as follows:

    Peek  Std J = std Peek J , Valley  Std J = std Valley J , (28)

  • where std stands for standard deviation. If the value of Peek StdJ and Valley StdJ is small, it indicates that the action speed is consistent.

4. Simulation Experiment

4.1. Construction of Experimental Environment

Impinj RFID H47 and Impinj Speedway R420 are used as basic equipment to collect the relative data and information of unarmed fitness movements. Internet technology is used to communicate with computer. The computer is configured with 64 bit Windows10 operating system. The CPU is Intel(R) Core(TM) i5-2040m, 2.5 GHz, and the memory is 4 GB DDR3. Furthermore, the hard disk is 500 GB machine hard disk. The simulation is realized through MATLAB R2017a.

In order to comprehensively evaluate the effectiveness of the proposed method, a 3.2 m∗1.6 m area is selected to build a contactless experiment area of unarmed fitness from three scenarios: fitness room, office, and indoor home. The Impinj RFID H47 passive tag is deployed at the edge of the experimental area. The Impinj Speedway R420 reader is positioned in the experimental area, and the trainer is located in the center of the experimental area. Figure 5 shows the deployment of gym scenario. The deployment of office and indoor home are the same.

Details are in the caption following the image
Deployment of gym scenario.

4.2. Data Sources and Preprocessing

There are eight kinds of unarmed fitness activities selected as the research objects, such as kneeling back, squat, and fast curl-up, which are common and representative, as shown in Figure 6[23]. In three experimental scenarios, the above eight movements are tracked by ten volunteers for ten times of training, and the experimental dataset for the contactless recognition and evaluation of unarmed fitness movements is obtained. There are a total of 2400 movements. By tracking the above eight movements trained by an excellent fitness trainer at standard speed, the standard fingerprint database for contactless recognition and evaluation of unarmed fitness movements is obtained. There are 24 movements.

Details are in the caption following the image
Movements diagram of unarmed fitness activities. (a) Squat. (b) Hip arch. (c) Lying leg raises.
Since Gaussian noise in the environment exists in the collected signal, it will affect the activity recognition effect of the proposed algorithm, and discrete wavelet transform is used to process it [24]:
x n = 1 L k a j 0 , k ϕ j 0 k + 1 L j j 0 k β j , k ψ j k n , (29)
where x[n] is the discrete signal, L is the length of x[n], ϕ j 0 , k n is the scaling function, a(j0, k) is the approximate coefficient, ψj.k(n) is the wavelet function, and β(j, k) is the factor coefficient, and phase information is introduced in order to reduce the influence of environmental multipath signals on the recognition accuracy.
In addition, due to the presence of objects around the deployed bare-handed fitness activities, the activity with the smallest multipath effect is selected as the experimental phase information. Assuming that there is no multipath effect, the phase difference Δφ measured by the center frequencies difference Δf of the two channels is shown as [25]
Δ φ 22 π ×    d c mod 2 π × Δ f + Δ δ , (30)
where c is the speed of light and Δδ is phase noise. Select the minimum Δφ to achieve equation (30).

4.3. Evaluation Indicators

Accuracy is selected to test the activity recognition effect before and after normalization of the proposed method. The calculation method is shown as [26]
P r = D r _ correct D r _ all , (31)
where Dr_correct represents the movements correctly recognized and Dr_all represents the total number of movements.
Loss ratio, fragment ratio, combination ratio, and accuracy are selected as indicators to evaluate the segmentation effect of the proposed method on unarmed fitness activities [27]. The accuracy rate can be calculated by
p s = D S _ correct D s _ all , (32)
where Ds_correct represents the movements correctly divided and Ds_all indicates the total number of times that an action is performed.

True positive rate (TPR) and false positive rate (FPR) are selected as indicators to evaluate the recognition effect of the proposed method on unarmed fitness activities [28].

4.4. Experimental Results

4.4.1. Algorithm Verification

For the effectiveness verification of proposed algorithm normalization, the contactless recognition accuracy [29] of the algorithm for each unarmed fitness activity at different speeds is analyzed. Figure 7 shows the activity recognition accuracy of the algorithm at different speeds without normalization improvement. Figure 8 shows the activity recognition accuracy of the algorithm at different speeds after normalization. Under slow, uniform, and fast execution, the activity recognition accuracy before the algorithm improved is 0.73, 0.90, and 0.51, respectively. While the recognition accuracy after the algorithm improved is 0.89, 0.92, and 0.77, respectively. The accuracy is up 16.4%, 2.2%, and 25.8%, respectively. Thus, the improved algorithm in this study is effective. However, the recognition accuracy of the improved algorithm under fast execution is low. The reason is that the basic RFID equipment [30] has a low sampling rate so that there is a large deformation of the action sequence captured under the fast execution. Considering that normal fitness activities do not involve rapid unarmed movements, it is still effective. Therefore, the algorithm proposed in this study is effective to some extent.

Details are in the caption following the image
Recognition accuracy before algorithm improved at different speeds.
Details are in the caption following the image
Recognition accuracy after algorithm improved at different speeds.

In order to verify the effectiveness of the proposed algorithm in improving the DTW algorithm [31], the 8 movements in the study are repeated 10 times in the directions of 0°, 30°, 60°, and 90°, respectively, and the proposed method is used to identify the results, as shown in Figure 9. As can be seen from the figure, the movement recognition accuracy before the algorithm improved in the directions of 0°, 30°, 60°, and 90° is 0.91, 0.85, 0.72, and 0.61, respectively, while the recognition accuracy after the algorithm improved is 0.93, 0.89, 0.86, and 0.84, respectively. Thus, recognition accuracy of the improved algorithm under different activity directions is improved varying degree. Furthermore, with the increase of the deviation angle, the improvement degree is higher. Therefore, the improvement of DTW algorithm in this study has certain validity.

Details are in the caption following the image
Comparison of recognition results before and after algorithm improved in different activity directions.

4.4.2. Verification of Activity Segmentation Results

In order to verify the effectiveness of the proposed method in the segmentation of unarmed fitness activities, all activity segments are segmented in three real scenes, and the results are shown in Figures 10 and 11. It can be seen from Figure 10 that all the unarmed fitness activities have low loss ratios [32]. The loss ratio of movement nos. 2, 4, and 7 is 0, and the loss ratios of other movements are less than 0.01, which indicates that the proposed method has strong sensitivity to activities. As for the fragment ratio index, the fragment ratio of nos. 1, 7, 5, and 08 is high, and the fragment ratio of other actions is lower than 0.015, but the fragment ratio of all actions is lower than 0.07, which indicates that the proposed method can segment the movement completely. For the combination ratio index, the combination ratio of nos. 2, 4, and 7 is generally low, and the combination ratio of nos. 3, 5, and 8, which has a short rest between actions, is generally high, but the overall ratio is still lower than 0.065. Thus, the proposed method has a low probability of dividing an activity into multiple movements. It can be seen from Figure 11 that the segmentation accuracy of all actions is high. The segmentation accuracy of nos. 1, 5, and 8 is above 0.85, and the segmentation accuracy of other actions is above 0.9. In conclusion, the proposed method can well segment the unarmed fitness activities and has strong robustness.

Details are in the caption following the image
Effect of activity segmentation.
Details are in the caption following the image
Precision of active segmentation.

4.4.3. Verification of Activity Identification Results

In order to verify the contactless recognition effect of the proposed method on unarmed fitness activities, the proposed method is verified in three real scenarios. Figure 12 is the confusion matrix of all unarmed fitness activities. In the figure, the rows are the interactions matched and identified by the proposed method, and each element represents the probability of each activity identified. Columns are the actions that actually took place, and each element represents the probability that the activity actually took place. As can be seen from the figure, the average recognition rate of the proposed method for activities is 0.91, that is, the proposed method has a high contactless recognition rate for unarmed fitness activities, which can effectively identify unarmed fitness activities in different scenarios.

Details are in the caption following the image
Activity confusion matrix.

4.4.4. Robustness Evaluation

In order to verify the robustness of the proposed method, the contactless recognition of unarmed fitness activities by the proposed method in different scenarios is statistically analyzed. The true positive rate and false positive rate of activity recognition by the proposed method are shown in Figures 13 and 14. As can be seen from Figure 13, the true positive recognition rate of the proposed method for unarmed fitness activities in all scenarios is above 0.84, and the true positive recognition rate in three scenarios is 0.91, 0.90, and 0.89, respectively. As can be seen from Figure 14, the false positive recognition rate of the proposed method for unarmed fitness activities in all scenarios is less than 0.16, and the false positive recognition rate in three scenarios is 0.08, 0.10, and 0.11, respectively. Therefore, the proposed method can accurately identify the unarmed fitness activities in different scenarios and has strong robustness.

Details are in the caption following the image
True positive rate of activity recognition.
Details are in the caption following the image
False positive rate of activity recognition.

5. Conclusion

To sum up, the proposed activity recognition and evaluation method based on improved DTW can improve the contactless recognition accuracy of algorithm for unarmed fitness activities at different speeds and in different directions by normalizing the activity sequence. And the overall recognition accuracy reaches 0.91. The true positive rate of the unarmed fitness activities in all scenarios is more than 0.84, which can effectively identify the unarmed fitness activities in different scenarios with strong robustness. However, there are still some deficiencies. Specifically, the proposed method mainly identifies and evaluates a single activity. If there is more than one trainer at the same time for unarmed fitness activities, the recognition efficiency and evaluation accuracy will be affected. Therefore, how to solve the problem of activity identification and evaluation of multitrainers needs to be further studied, and the next step will be discussed from this aspect.

Conflicts of Interest

The author declares no conflicts of interest regarding this work.

Data Availability

The experimental data used to support the findings of this study are available from the corresponding author upon request.

    The full text of this article hosted at iucr.org is unavailable due to technical difficulties.