Eyeball Movement Detection Using Sector Line Distance Approach and Learning Vector Quantization

被引:0
|
作者
Pangestu, Gusti [1 ]
Bachtiar, Fitra A. [2 ]
机构
[1] Brawijaya Univ, Comp Vis Lab, Fac Comp Sci, Malang, Indonesia
[2] Brawijaya Univ, Intelligent Syst Lab, Fac Comp Sci, Malang, Indonesia
关键词
Eyeball; Movement Detection; LVQ; Sector Line Distance; E-Learning; Affective; EYE-MOVEMENTS;
D O I
10.1109/icsitech46713.2019.8987443
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The shifting of education to learning supported by technology facing challenges. One of the challenges is to able to detect student learning processes, especially student affective state. Some studies implemented affective detection. However, the detection in obtrusive manner. Thus, there is a need to propose a method to detect student learning state in unobtrusive manner. This research propose a method to take advantage of eyeball movements as the measuring media as a feedback in the e-learning process. This study focuses in detecting eyeball movement. The eye movement to be detected in this study is in 5 directions center, upward, downward, leftward, and rightward. The eyeball movements is detected using the Sector Line Distance and classification method namely LVQ (Learning Vector Quantization). The result of the experiment shows that the average accuracy in detecting 5 eyeball direction shows a value of 81,72% accuracy. In addition, the proposed method also able to detect 5 directions of the eyeball movements including center. This result outperforming the previous method which only can detect 4 gaze of eyeball movements. Using center and 4 other directions of the eyeballs, the interesting value of the content can be measured and discovered.
引用
收藏
页码:199 / 204
页数:6
相关论文
共 50 条
  • [31] Image recognition by using generalized learning vector quantization
    Sato A.
    Sato, Atsushi, 1600, Japan Society for Precision Engineering (83): : 335 - 340
  • [32] Facial Expression Recognition Using Learning Vector Quantization
    de Vries, Gert-Jan
    Pauws, Steffen
    Biehl, Michael
    COMPUTER ANALYSIS OF IMAGES AND PATTERNS, CAIP 2015, PT II, 2015, 9257 : 760 - 771
  • [33] Text categorization using the learning vector quantization algorithm
    Martín-Valdivia, MT
    García-Vega, M
    García-Cumbreras, MA
    López, LAU
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, 2004, : 341 - 348
  • [34] A Vector Quantization Approach for Life-Long Learning of Categories
    Kirstein, Stephan
    Wersing, Heiko
    Gross, Horst-Michael
    Koerner, Edgar
    ADVANCES IN NEURO-INFORMATION PROCESSING, PT I, 2009, 5506 : 805 - +
  • [35] Using Vector Quantization of Hough Transform for Circle Detection
    Zhou, Bing
    2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, : 447 - 450
  • [36] Automatic target detection using vector quantization error
    Wemett, Brian D.
    AUTOMATIC TARGET RECOGNITION XVIII, 2008, 6967
  • [37] Recurrent nasal papilloma detection using a fuzzy algorithm learning vector quantization neural network
    Chuan-Yu Chang
    Da-Feng Zhuang
    2006 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-6, PROCEEDINGS, 2006, : 556 - +
  • [38] Aggregated Learning: A Vector-Quantization Approach to Learning Neural Network Classifiers
    Soflaei, Masoumeh
    Guo, Hongyu
    Al-Bashabsheh, Ali
    Mao, Yongyi
    Zhang, Richong
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 5810 - 5817
  • [39] Nearest neighbor and learning vector quantization classification for damage detection using time series analysis
    de Lautour, Oliver R.
    Omenzetter, Piotr
    STRUCTURAL CONTROL & HEALTH MONITORING, 2010, 17 (06): : 614 - 631
  • [40] Distributed Detection of Attacks in Mobile Ad-hoc Networks Using Learning Vector Quantization
    Cannady, James
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 571 - 574