{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T11:41:09Z","timestamp":1767008469818,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100009696","name":"Research Program Foundation of Minjiang University","doi-asserted-by":"publisher","award":["Grants No. MYK17021","MYK18033","MJW201831408"],"award-info":[{"award-number":["Grants No. MYK17021","MYK18033","MJW201831408"]}],"id":[{"id":"10.13039\/501100009696","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2019,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>In order to solve the problem of human motion recognition in multimedia interaction scenarios in virtual reality environment, a motion classification and recognition algorithm based on linear decision and support vector machine (SVM) is proposed. Firstly, the kernel function is introduced into the linear discriminant analysis for nonlinear projection to map the training samples into a high-dimensional subspace to obtain the best classification feature vector, which effectively solves the nonlinear problem and expands the sample difference. The genetic algorithm is used to realize the parameter search optimization of SVM, which makes full use of the advantages of genetic algorithm in multi-dimensional space optimization. The test results show that compared with other classification recognition algorithms, the proposed method has a good classification effect on multiple performance indicators of human motion recognition and has higher recognition accuracy and better robustness.<\/jats:p>","DOI":"10.1186\/s13673-019-0203-8","type":"journal-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:03:14Z","timestamp":1573776194000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Human motion recognition based on SVM in VR art media interaction environment"],"prefix":"10.1186","volume":"9","author":[{"given":"Fuquan","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8970-2452","authenticated-orcid":false,"given":"Tsu-Yang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jeng-Shyang","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Gangyi","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Zuoyong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"key":"203_CR1","doi-asserted-by":"publisher","first-page":"49232","DOI":"10.1109\/ACCESS.2019.2909040","volume":"7","author":"TY Wu","year":"2019","unstructured":"Wu TY, Chen CM, Wang KH, Wu JM (2019) Security analysis and enhancement of a certificateless searchable public key encryption scheme for IIoT environments. IEEE Access 7:49232\u201349239","journal-title":"IEEE Access"},{"issue":"8","key":"203_CR2","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1007\/s12652-018-1029-3","volume":"10","author":"CM Chen","year":"2019","unstructured":"Chen CM, Wang KH, Yeh KH, Xiang B, Tsu-Yang W (2019) Attacks and solutions on a three-party password-based authenticated key exchange protocol for wireless communications. J Ambient Intell Humaniz Comput 10(8):3133\u20133142","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"6","key":"203_CR3","first-page":"1717","volume":"19","author":"JS Pan","year":"2018","unstructured":"Pan JS, Kong L, Sung TW, Tsai PW, Snasel V (2018) alpha-Fraction first strategy for hierarchical wireless sensor networks. J Internet Technol 19(6):1717\u20131726","journal-title":"J Internet Technol"},{"issue":"7","key":"203_CR4","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TIFS.2015.2414399","volume":"10","author":"H Xiong","year":"2015","unstructured":"Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442\u20131455","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"203_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1186\/s13638-019-1406-4","volume":"2019","author":"L Ni","year":"2019","unstructured":"Ni L, Tian F, Ni Q, Yan Y, Zhang J (2019) An anonymous entropy based location privacy protection scheme in mobile social networks. EURASIP J Wirel Commun Netw 2019:93","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"203_CR6","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1016\/j.future.2019.03.008","volume":"97","author":"H Xiong","year":"2019","unstructured":"Xiong H, Zhao Y, Peng L, Zhang H, Yeh KH (2019) Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener Comput Syst 97:453\u2013461","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"203_CR7","doi-asserted-by":"publisher","first-page":"12047","DOI":"10.1109\/ACCESS.2019.2891105","volume":"7","author":"CM Chen","year":"2019","unstructured":"Chen CM, Xiang B, Liu Y, Wang KH (2019) A secure authentication protocol for internet of vehicles. IEEE Access 7(1):12047\u201312057","journal-title":"IEEE Access"},{"issue":"1","key":"203_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1080\/02533839.2018.1537807","volume":"42","author":"TY Wu","year":"2019","unstructured":"Wu TY, Chen CM, Wang KH, Meng C, Wang EK (2019) A provably secure certificateless public key encryption with keyword search. J Chin Inst Eng 42(1):20\u201328","journal-title":"J Chin Inst Eng"},{"issue":"7","key":"203_CR9","doi-asserted-by":"publisher","first-page":"1614","DOI":"10.1109\/TVLSI.2019.2903289","volume":"27","author":"JS Pan","year":"2019","unstructured":"Pan JS, Lee CY, Sghaier A, Zeghid M, Xie J (2019) Novel systolization of subquadratic space complexity multipliers based on toeplitz matrix-vector product approach. IEEE Trans Very Large Scale Integr Syst 27(7):1614\u20131622","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"203_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/tcyb.2019.2896267","author":"W Gan","year":"2019","unstructured":"Gan W, Lin JC, Fournier-Viger P, Chao HC, Philip SY (2019) HUOPM: high-utility occupancy pattern mining. IEEE Trans Cybern. https:\/\/doi.org\/10.1109\/tcyb.2019.2896267","journal-title":"IEEE Trans Cybern"},{"key":"203_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03829-3","author":"JC Lin","year":"2019","unstructured":"Lin JC, Zhang Y, Zhang B, Fournier-Viger P, Djenouri Y (2019) Hiding sensitive itemsets with multiple objective optimization. Soft Comput. https:\/\/doi.org\/10.1007\/s00500-019-03829-3","journal-title":"Soft Comput"},{"key":"203_CR12","doi-asserted-by":"crossref","unstructured":"Lin JC, Fournier-Viger P, Wu L, Gan W, Djenouri Y, Zhang J (2018 ) PPSF: an open-source privacy-preserving and security mining framework. In: IEEE international conference on data mining workshops (ICDMW), pp. 1459\u20131463, 17\u201320 Nov. 2018, Singapore","DOI":"10.1109\/ICDMW.2018.00208"},{"key":"203_CR13","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1016\/j.engappai.2018.10.010","volume":"77","author":"JC Lin","year":"2019","unstructured":"Lin JC, Yang L, Fournier-Viger P, Hong TP (2019) Mining of skyline patterns by considering both frequent and utility constraints. Eng Appl Artif Intell 77:229\u2013238","journal-title":"Eng Appl Artif Intell"},{"key":"203_CR14","doi-asserted-by":"publisher","DOI":"10.1145\/3363571","author":"JMT Wu","year":"2019","unstructured":"Wu JMT, Lin JCW, Tamrakar A (2019) High-utility itemset mining with effective pruning strategies. ACM Trans Knowl Discov Data. https:\/\/doi.org\/10.1145\/3363571","journal-title":"ACM Trans Knowl Discov Data"},{"key":"203_CR15","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.knosys.2018.09.002","volume":"163","author":"Z Zhao","year":"2019","unstructured":"Zhao Z, Li C, Zhang X, Chiclana F, Viedma EH (2019) An incremental method to detect communities in dynamic evolving social networks. Knowl Based Syst 163:404\u2013415","journal-title":"Knowl Based Syst"},{"key":"203_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-019-01490-9","author":"X Wang","year":"2019","unstructured":"Wang X, Ji S, Liang Y, Leung H, Chiu DKW (2019) An unsupervised strategy for defending against multifarious reputation attacks. Appl Intell. https:\/\/doi.org\/10.1007\/s10489-019-01490-9","journal-title":"Appl Intell"},{"key":"203_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s13673-019-0179-4","volume":"9","author":"J Wang","year":"2019","unstructured":"Wang J, Gu X, Liu W, Sangaiah AK, Kim HJ (2019) An empower hamilton loop based data collection algorithm with mobile agent for WSNs. Hum Centric Comput Inf Sci 9:18","journal-title":"Hum Centric Comput Inf Sci"},{"issue":"11","key":"203_CR18","doi-asserted-by":"publisher","first-page":"2579","DOI":"10.3390\/s19112579","volume":"19","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Wang K, Sangaiah AK, Lim SJ (2019) An affinity propagation based self-adaptive clustering method for wireless sensor networks. Sensors 19(11):2579","journal-title":"Sensors"},{"key":"203_CR19","doi-asserted-by":"publisher","DOI":"10.1080\/10790268.2019.1575554","author":"PD Austin","year":"2019","unstructured":"Austin PD, Siddall PJ (2019) Virtual reality for the treatment of neuropathic pain in people with spinal cord injuries: a scoping review. J Spinal Cord Med. https:\/\/doi.org\/10.1080\/10790268.2019.1575554","journal-title":"J Spinal Cord Med"},{"key":"203_CR20","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7298-9","author":"C Huang","year":"2019","unstructured":"Huang C, Zhang Y, Zhu C, Zhang C, Meng H (2019) Chinese sports basketball teaching tactics training system combined with multimedia interactive model and virtual reality technology. Multimed Tools Appl. https:\/\/doi.org\/10.1007\/s11042-019-7298-9","journal-title":"Multimed Tools Appl"},{"key":"203_CR21","doi-asserted-by":"publisher","DOI":"10.1080\/13645706.2018.1539012","author":"K Hagelsteen","year":"2019","unstructured":"Hagelsteen K, Johansson R, Ekelund M, Bergenfelz A, Anderberg M (2019) Performance and perception of haptic feedback in a laparoscopic 3D virtual reality simulator. Minim Invasive Ther Allied Technol. https:\/\/doi.org\/10.1080\/13645706.2018.1539012","journal-title":"Minim Invasive Ther Allied Technol"},{"issue":"6","key":"203_CR22","first-page":"1430","volume":"9","author":"Fuquan Zhang","year":"2018","unstructured":"Zhang Fuquan, Ding Gangyi, Lin Qing, Lin Xu, Li Zuoyong, Li Lijie (2018) Research of Simulation of Creative Stage Scene Based on the 3DGans Technology. J Inf Hiding Multimed Signal Process 9(6):1430\u20131443","journal-title":"J Inf Hiding Multimed Signal Process"},{"key":"203_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.compedu.2013.07.033","volume":"70","author":"Zahira Merchant","year":"2014","unstructured":"Merchant Zahira, Goetz Ernest T, Cifuentes Lauren, Keeney-Kennicutt Wendy, Davis Trina J (2014) Effectiveness of virtual reality-based instruction on students\u2019 learning outcomes in K-12 and higher education: a meta-analysis. Comput Educ 70:29\u201340","journal-title":"Comput Educ"},{"key":"203_CR24","series-title":"VTCA","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-04585-2_20","volume-title":"Advances in smart vehicular technology, transportation, communication and applications","author":"F Zhang","year":"2018","unstructured":"Zhang F, Ding G, Ma L, Zhu Y, Li Z, Xu L (2018) Research on stage creative scene model generation based on series key algorithms. In: Zhao Y, Wu TY, Chang TH, Pan JS, Jain L (eds) Advances in smart vehicular technology, transportation, communication and applications, vol 128. VTCA. Smart Innovation, Systems and Technologies, Springer, pp 170\u2013177"},{"issue":"5","key":"203_CR25","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/105474602320935810","volume":"11","author":"BE Riecke","year":"2015","unstructured":"Riecke BE, Veen HA, B\u00fclthoff HH (2015) Visual homing is possible without landmarks: a path integration study in virtual reality. Presence Teleoperators Virtual Environ 11(5):443\u2013473","journal-title":"Presence Teleoperators Virtual Environ"},{"issue":"4","key":"203_CR26","first-page":"1","volume":"14","author":"F Zhang","year":"2018","unstructured":"Zhang F, Ding G, Lin X, Chen B, Li Z (2018) An effective method for the abnormal monitoring of stage performance based on visual sensor network. Int J Distrib Sens Netw 14(4):1\u201311","journal-title":"Int J Distrib Sens Netw"},{"issue":"10","key":"203_CR27","first-page":"2401","volume":"27","author":"X Shi","year":"2015","unstructured":"Shi X, Liu Y, Zhang D (2015) Human body motion recognition method based on key frames. J Syst Simul 27(10):2401\u20132408","journal-title":"J Syst Simul"},{"issue":"7","key":"203_CR28","first-page":"75","volume":"40","author":"QIN Qin","year":"2014","unstructured":"Qin QIN, Yanwei LI (2014) Real-time recognition system of human gestures based on DSP[J]. Electron Technol Appl 40(7):75\u201378","journal-title":"Electron Technol Appl"},{"key":"203_CR29","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-019-0455-2","author":"F Zhang","year":"2019","unstructured":"Zhang F, Wu TY, Zheng G (2019) Video salient region detection model based on wavelet transform and feature comparison. EURASIP J Image Video Process. https:\/\/doi.org\/10.1186\/s13640-019-0455-2","journal-title":"EURASIP J Image Video Process"},{"issue":"2","key":"203_CR30","first-page":"3500104","volume":"3","author":"R Zhang","year":"2019","unstructured":"Zhang R, Cao S (2019) Real-time human motion behavior detection via CNN using mmWave radar. IEEE Sensors Lett 3(2):3500104","journal-title":"IEEE Sensors Lett"},{"issue":"14","key":"203_CR31","doi-asserted-by":"publisher","first-page":"19587","DOI":"10.1007\/s11042-019-7356-3","volume":"78","author":"Z Li","year":"2019","unstructured":"Li Z, Zheng Z, Lin F, Leung H, Li Q (2019) Action recognition from depth sequence using depth motion maps-based local ternary patterns and CNN. Multimed Tools Appl 78(14):19587\u201319601","journal-title":"Multimed Tools Appl"},{"issue":"11","key":"203_CR32","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.3390\/s17112556","volume":"17","author":"A Murad","year":"2017","unstructured":"Murad A, Pyun J-Y (2017) Deep recurrent neural networks for human activity recognition. Sensors 17(11):2556","journal-title":"Sensors"},{"key":"203_CR33","doi-asserted-by":"crossref","unstructured":"Li C, Lu Y, Wu J, Zhang Y, Xia Z, Wang T, Yu D, Chen X, Liu P, Guo J. LDA meets Word2Vec: a novel model for academic abstract clustering. In: International World Wide Web Conferences, in the 2018 web conference companion (WWW 2018). April 23\u201327, 2018, Lyon, France, ACM, New York, pp 1699\u20131706","DOI":"10.1145\/3184558.3191629"},{"key":"203_CR34","first-page":"749","volume":"9","author":"Y Yu","year":"2016","unstructured":"Yu Y, Pan Z, Hu G, Mo X, Xue J (2016) Kernel dimensionality reduction method based on KLDA. J Univ Sci Technol China 9:749\u2013756","journal-title":"J Univ Sci Technol China"},{"key":"203_CR35","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.ins.2014.02.140","volume":"274","author":"B Zamani","year":"2014","unstructured":"Zamani B, A A, Nasersharif B (2014) Evolutionary combination of kernels for nonlinear feature transformation. Inf Sci 274:95\u2013107","journal-title":"Inf Sci"},{"issue":"3","key":"203_CR36","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1109\/TII.2016.2543145","volume":"12","author":"A Jindal","year":"2016","unstructured":"Jindal A, Dua A, Kaur K, Singh M, Kumar N, Mishra S (2016) Decision tree and svm-based data analytics for theft detection in smart grid. IEEE Trans Ind Inform 12(3):1005\u20131016","journal-title":"IEEE Trans Ind Inform"},{"issue":"6","key":"203_CR37","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.1007\/s00521-015-1964-2","volume":"27","author":"BM Aslahi-Shahri","year":"2016","unstructured":"Aslahi-Shahri BM, Rahmani R, Chizari M, Maralani A, Eslami M, Golkar MJ, Ebrahimi A (2016) A hybrid method consisting of GA and SVM for intrusion detection system. Neural Comput Appl 27(6):1669\u20131676","journal-title":"Neural Comput Appl"},{"issue":"6","key":"203_CR38","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10765-016-2057-x","volume":"37","author":"A Rostami","year":"2016","unstructured":"Rostami A, Masoudi M, Ghaderi-Ardakani A, Arabloo M, Amani M (2016) Effective thermal conductivity modeling of sandstones: SVM framework analysis. Int J Thermophys 37(6):59","journal-title":"Int J Thermophys"},{"key":"203_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/cav.1762","author":"S Narang","year":"2017","unstructured":"Narang S, Best A, Feng A, Kang S, Manocha D, Shapiro A (2017) Motion recognition of self and others on realistic 3D avatars. Comput Anim Virtual Worlds. https:\/\/doi.org\/10.1002\/cav.1762","journal-title":"Comput Anim Virtual Worlds"},{"key":"203_CR40","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.asoc.2019.01.019","volume":"78","author":"JM Wu","year":"2019","unstructured":"Wu JM, Tsai MH, Huang YZ, Islam SH, Hassan MM, Alelaiwi A, Fortino G (2019) Applying an ensemble convolutional neural network with Savitzky-Golay filter to construct a phonocardiogram prediction model. Appl Soft Comput 78:29\u201340","journal-title":"Appl Soft Comput"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0203-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-019-0203-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-019-0203-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T11:52:40Z","timestamp":1627645960000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-019-0203-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["203"],"URL":"https:\/\/doi.org\/10.1186\/s13673-019-0203-8","relation":{},"ISSN":["2192-1962"],"issn-type":[{"type":"electronic","value":"2192-1962"}],"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"5 June 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"40"}}