Data Mining for Hierarchical Model Creation G. Michael Youngblood and Diane J. Cook IEEE Transactions on Systems, Man, and Cybernetics, Part C, 37(4):561-572,

Slides:



Advertisements
Similar presentations
Putting Mobile Services into ContextDynamic Context-aware Personalisation for Smart Services S. Gallacher, E. Papadopoulou, N.K.Taylor, M.H.Williams Heriot-Watt.
Advertisements

Mining Frequent Patterns II: Mining Sequential & Navigational Patterns Bamshad Mobasher DePaul University Bamshad Mobasher DePaul University.
Background information Formal verification methods based on theorem proving techniques and model­checking –to prove the absence of errors (in the formal.
CS 795 – Spring  “Software Systems are increasingly Situated in dynamic, mission critical settings ◦ Operational profile is dynamic, and depends.
® IBM Software Group © 2006 IBM Corporation Rational Software France Object-Oriented Analysis and Design with UML2 and Rational Software Modeler 04. Other.
Insider Access Behavior Team May 06 Brandon Reher Jake Gionet Steven Bromley Jon McKee Advisor Client Dr. Tom DanielsThe Boeing Company Contact Dr. Nick.
Vikramaditya R. Jakkula, Diane J. Cook & Aaron S. Crandall Washington State University Presented by Aaron S. Crandall.
Vikramaditya Jakkula Washington State University First International Workshop on Smart Homes for Tele-Health.
Software Engineering COMP 201
Embedded Systems Details. Object Model: Four main system objects or classes Controller object might be made up of several controllers is the brains of.
Software Architecture Design Instructor: Dr. Jerry Gao.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Structural Knowledge Discovery Used to Analyze Earthquake Activity Jesus A. Gonzalez Lawrence B. Holder Diane J. Cook.
Uninformed Search Reading: Chapter 3 by today, Chapter by Wednesday, 9/12 Homework #2 will be given out on Wednesday DID YOU TURN IN YOUR SURVEY?
June 27-28, 2006 Vikramaditya Jakkula Monitoring Health by Detecting Drifts and Outliers for a Smart Environment Inhabitant Gaurav Jain, Diane J. Cook,
Embedded Systems: Review and OMT modeling Slides by Gretel Coombs and Betty H.C. Cheng.
Unified Modeling Language
Architectural Design.
PUBLIC: A Decision Tree Classifier that Integrates Building and Pruning RASTOGI, Rajeev and SHIM, Kyuseok Data Mining and Knowledge Discovery, 2000, 4.4.
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization.
“Curious Places” October, 2007 Key Centre of Design Computing and Cognition, University of Sydney A Room that Adapts using Curiosity and Supervised Learning.
Chapter 8 Prediction Algorithms for Smart Environments
MAKING COMPLEX DEClSlONS
DEVSView: A DEVS Visualization Tool Wilson Venhola.
Context Tailoring the DBMS –To support particular applications Beyond alphanumerical data Beyond retrieve + process –To support particular hardware New.
Virtualization. Virtualization  In computing, virtualization is a broad term that refers to the abstraction of computer resources  It is "a technique.
Modeling Process CSCE 668Set 14: Simulations 2 May be several algorithms (processes) runs on each processor to simulate the desired communication system.
Computer Science CPSC 322 Lecture 3 AI Applications 1.
An Integration Framework for Sensor Networks and Data Stream Management Systems.
DATABASEMODELSDATABASEMODELS  A database model ◦ defines the logical design of data. ◦ Describes the relationships between different parts of data.
Vikramaditya Jakkula Washington State University IEEE Workshop of Data Mining in Medicine 2007 (DMMed '07) In conjunction with IEEE.
University of Southern California Center for Systems and Software Engineering Approaching the Design Stages Pongtip Aroonvatanaporn November 25, /25/20091.
K. J. O’Hara AMRS: Behavior Recognition and Opponent Modeling Oct Behavior Recognition and Opponent Modeling in Autonomous Multi-Robot Systems.
1 Optimal Cycle Vida Movahedi Elder Lab, January 2008.
Vikramaditya Jakkula & Diane J. Cook Artificial Intelligence Lab Washington State University 2 nd International Conference on Technology and Aging (ICTA)
Modeling Shari L. Pfleeger and Joanne M. Atlee, Software Engineering: Theory and Practice, 4 th edition, Prentice Hall, Hans Van Vliet, Software.
Data Mining – Intro. Course Overview Spatial Databases Temporal and Spatio-Temporal Databases Multimedia Databases Data Mining.
CSC 480 Software Engineering Lecture 18 Nov 6, 2002.
What to remember from Chap 13 (Logical architecture)
Architectural Design of Distributed Applications Chapter 13 Part of Design Analysis Designing Concurrent, Distributed, and Real-Time Applications with.
Intelligent Environments1 Conclusions and Future Directions.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
SOFTWARE DESIGN. INTRODUCTION There are 3 distinct types of activities in design 1.External design 2.Architectural design 3.Detailed design Architectural.
Introduction  Use Allen’s Temporal Relations [3] to identify temporal relations among Activities in Daily Life of the resident.  Allen’s relations form.
Rational Agents (Chapter 2)
Theoretic Frameworks for Data Mining Reporter: Qi Liu.
12 Chapter 12: Advanced Topics in Object-Oriented Design Systems Analysis and Design in a Changing World, 3 rd Edition.
CHAPTER 1: Introduction. 2 Why “Learn”? Machine learning is programming computers to optimize a performance criterion using example data or past experience.
IS 320 Notes for April 15, Learning Objectives Understand database concepts. Use normalization to efficiently store data in a database. Use.
PnP Networks Self-Aware Networks Self-Aware Networks Self-Healing and Self-Defense via Aware and Vigilant Networks PnP Networks, Inc. August, 2002.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Formal Verification. Background Information Formal verification methods based on theorem proving techniques and model­checking –To prove the absence of.
ECE 101 An Introduction to Information Technology Information Coding.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Online Sequential Prediction via Incremental Parsing: The Active LeZi Algorithm Source: IEEE Intelligent Systems, 22(1), pp , 2007 Authors: Karthik.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
1 Passive Reinforcement Learning Ruti Glick Bar-Ilan university.
ECE 448 Lecture 3: Rational Agents
CHAPTER 2 CREATING AN ARCHITECTURAL DESIGN.
Logical architecture refinement
I don’t need a title slide for a lecture
Chapter 17 – Making Complex Decisions
Chapter 17 Designing Databases
Design Yaodong Bi.
Stumpf and Teague Object-Oriented Systems Analysis and Design with UML
Tools for the Automation of large distributed control systems
Modeling and Analysis Tutorial
Stumpf and Teague Object-Oriented Systems Analysis and Design with UML
Presentation transcript:

Data Mining for Hierarchical Model Creation G. Michael Youngblood and Diane J. Cook IEEE Transactions on Systems, Man, and Cybernetics, Part C, 37(4): , 2007 Reporter: Hsin-chan Tsai

Outline Markov decision process (MDS) Software architecture Kolmogorov (or descriptive) complexity Data mining for Model Creation

An intelligent agent agent environment Perception (Sensors) action (controller)

Markov decision process (MDS ) Same property as Naïve Bayesian Probability A B C

MavLab

Not in the Lab Lab entry to the desk Take a breakAlternate workstation work Leave the Lab from the desk end Going on breakGoing off break Return from alternate workstation end 1.0 Going alternate workstation

Software architecture Decision Information Communication Physical Device Physical Device Physical Device Physical Device Physical Device Hardware Interface Hardware Interface Hardware Interface Operating System OS Service Software Interface Software Interface Software Interface Logical Proxy Logical Proxy Logical Proxy Prediction (ALZ) Prediction (ED) MavCore Database Aggregator Decision Maker (ProPHet) Arbitration (Arbiter) CORBA Zero Conf point to pointNaming / Discovery

Decision Decision Maker  provides partially observable hierarchical based decision tasks Arbitration  A selected action filter  To prevent violation of security constraints or user preferences

MavHome

Data mining for Model Creation Mining sequential Patterns Using Episode discovery (ED) Predicting Activities Using ALZ ProPHeT Algorithm

Kolmogorov complexity for ED 01 重複 32 次   2 8 Minimum description length (MDL) bits

Minimum description length Input sequence O The sets of patterns θ The Description length (DL) Compression MDL(O)=arg max θ {Γ(θ|O)}

Θ = 110 (9)  3 bit 總 length 數 DL(O, Θ ) = DL( Θ )+DL(O| Θ )  (3)+(64-3*9+1*9)=49 Original length DL(O)  64 bit Compression Γ= DL(O)/ DL(O,Θ)  64 / 49 = 1.31

Θ = 01 (32)  2 bit Original length DL(O)  64 bit DL(O,Θ) = DL(Θ)+DL(O|Θ)  (2)+(32)=34 Compression Γ= DL(O)/ DL(O,Θ)  64 / 34 = 1.88 > 1.31 better

ALZ prediction aaababbbbaabccddcdaaaa  a-10,aa-5,aaa-2,ab-3,abc-1  b-6,ba-2,bb-3,bc-1,bcc-1  c-3,cc-1,ccd-1,cd-2,cda-1,cdd-1  d-3,da-1,daa-1,dc-1,dcd-1

ProPHeT Algorithm Input: Episode provide by ED for all abstract nodes Create abstract node S n for all episode instances if (instance contains low-level events) create product node S m else if S m first instance in set then insert S n into the location of S m create abstract node S m Assign horizontal trasition values between each node store observation history with each transition Create end node e n Assign horizontal transition value from last node in instance sequence to e n end for Assign the vertical tansition values Connect abstract node S n to root node S 1 Connect all abstract node to an end node directly linked to the root node end for

Example Episode: {123,154,143,257,705} 123’s instance {143, 257} 705’s instance {154} end 705 end 154 end root

Learning from the hierarchical model Reinforcement learning Q( s, a) – the utility value to incrementally estimate for state / action pair.  If the agent executes action a in state s  After each action the utility is updated as Q( s, a)  Q( s, a) + α[r + γQ( s’, a’) - Q( s, a)] Select highest expected utility to execute

Experimental results

ProPHeT-generated hierarchical model (figure 8) e_1_ e_2_ e_2_

Inhabitant interaction reduction in MavLab (top) and MavPad (bottom)

ProPHeT-generated hierarchical model e_1_ e_2_ e_2_ e_2_

Example based on MavHome Not in Lab (1) Lab entry to desk (28485) Alternate workstation Work (237845) Take a break (456370) Leave lab from desk (34566) end Go to alternate workstation (62435) Return from alternate workstation (67348) end V24 ON c12 OFF … v22 OFF V28 ON v25 OFF V30 ON v28 OFF a16 ON NO ACT end a14 ON

MavLab virtual inhabitant automation performance

MavLab virtual inhabitant interaction reducing during long-term experimentation