Discovering Activities of Daily Life Using RFID’s

Slides:



Advertisements
Similar presentations
By Klejdi Muca & Stephen Quinn. A method used by companies like IMDB or Netlfix to turn raw data into useful information, for example It helps companies.
Advertisements

Becerra-Fernandez, et al. -- Knowledge Management 1/e -- © 2004 Prentice Hall Chapter 7 Technologies to Manage Knowledge: Artificial Intelligence.
Transportation mode detection using mobile phones and GIS information Leon Stenneth, Ouri Wolfson, Philip Yu, Bo Xu 1University of Illinois, Chicago.
Xyleme A Dynamic Warehouse for XML Data of the Web.
Modeling Gene Interactions in Disease CS 686 Bioinformatics.
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
Chapter 8 Prediction Algorithms for Smart Environments
Human Gesture Recognition Using Kinect Camera Presented by Carolina Vettorazzo and Diego Santo Orasa Patsadu, Chakarida Nukoolkit and Bunthit Watanapa.
Overviews of ITCS 6161/8161: Advanced Topics on Database Systems Dr. Jianping Fan Department of Computer Science UNC-Charlotte
의미 모델링 Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning + Mining Models of Human Activities from the Web 지능 기반 시스템 응용
I Robot.
1 Dr Paula Fonseca Lecturer Phone apps, Computer Software EBU4201: Introductory Java Programming (JP) EBU6042: Advanced Network Programming (JP) ECS501U:
Chapter 9 Genetic Algorithms.  Based upon biological evolution  Generate successor hypothesis based upon repeated mutations  Acts as a randomized parallel.
Design of On-Demand Analysis for Cloud Service Configuration using Related-Annotation Hyogun Yoon', Hanku Lee' 2 `, ' Center for Social Media Cloud Computing,
1 Introduction to Data Mining C hapter 1. 2 Chapter 1 Outline Chapter 1 Outline – Background –Information is Power –Knowledge is Power –Data Mining.
Data Mining and Decision Support
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Sensor Analysis – Part II A literature based exploration Thomas Plötz [material taken from the original papers and John Krumm “Ubiquitous Computing Fundamentals”
Date of download: 7/8/2016 Copyright © 2016 SPIE. All rights reserved. A scalable platform for learning and evaluating a real-time vehicle detection system.
GraphiCon 2008 | 1 Trajectory classification based on Hidden Markov Models Jozef Mlích and Petr Chmelař Brno University of Technology, Faculty of Information.
Instructor: Dr. Wen-Hung Liao 2/21/2017
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
Detecting Web Attacks Using Multi-Stage Log Analysis
Brief Intro to Machine Learning CS539
Computable Contracts as Functional Elements
Seethru Range of Home Surveillance Systems
Data Mining – Intro.
The Client-Server Model
Fundamentals of Information Systems, Sixth Edition
Deep Learning Amin Sobhani.
Examples of pattern-recognition and fMRI applied to real-world problems: Dyslexia and detecting consciousness.
Automatic Video Shot Detection from MPEG Bit Stream
DATA MINING © Prentice Hall.
An Artificial Intelligence Approach to Precision Oncology
School of Computer Science & Engineering
CS201 Lecture 02 Computer Vision: Image Formation and Basic Techniques
Done Done Course Overview What is AI? What are the Major Challenges?
Conditional Random Fields for ASR
Evolution strategies Can programs learn?
Software engineering – 1
Implementing Boosting and Convolutional Neural Networks For Particle Identification (PID) Khalid Teli .
Machine Learning for dotNET Developer Bahrudin Hrnjica, MVP
Phone apps, Computer Software and Multimedia
Pearson Lanka (Pvt) Ltd.
Why do we monitor things?
Research-Lab! Status 2010 Invitation for research
Basic Intro Tutorial on Machine Learning and Data Mining
EXPERT SYSTEMS.
11/15/2018 Drug Side Effects Data Representation and Full Spectrum Inferencing using Knowledge Graphs in Intelligent Telehealth Presented on Student-Faculty.
Advanced Embodiment Design 26 March 2015
Prepared by: Mahmoud Rafeek Al-Farra
Identifying Confusion from Eye-Tracking Data
Geography & Technology
Chapter 5: Software effort estimation
Intelligent Systems and
CSCI 5832 Natural Language Processing
3.1.1 Introduction to Machine Learning
Presenter : Seokjun Lee Kyonggi University
Microarray Data Set The microarray data set we are dealing with is represented as a 2d numerical array.
Rachit Saluja 03/20/2019 Relation Extraction with Matrix Factorization and Universal Schemas Sebastian Riedel, Limin Yao, Andrew.
A task of induction to find patterns
Using Bayesian Network in the Construction of a Bi-level Multi-classifier. A Case Study Using Intensive Care Unit Patients Data B. Sierra, N. Serrano,
A task of induction to find patterns
Modeling IDS using hybrid intelligent systems
Instructor: Vincent Conitzer
Power Consuming Activity Recognition in Home Environment
CS249: Neural Language Model
Visual Grounding.
Getting Started with Microsoft Azure Machine Learning
Presentation transcript:

Discovering Activities of Daily Life Using RFID’s Masters Thesis Sandor Dornbush

Overview What are activities of daily life and why do we care? How it’s been done in the past. How to use RFID to determine ADLs. How I will do it better. Filip Perich 2/16/2019

Activities of Daily Life ADL It’s what we do every day. Brush teeth Eat Sleep Etc. Filip Perich 2/16/2019

Who Cares About ADLs? Mostly senior care. Gives children and care givers a way to remotely monitor a senior citizens life. Allows senior citizens to live independently longer. Also useful for smart spaces. Filip Perich 2/16/2019

Overview What are activities of daily life and why do we care? How it’s been done in the past. How to use RFID to determine ADLs. How I will do it better. Filip Perich 2/16/2019

Previous Techniques Machine Vision Motion Detectors Imbed cameras into the living space. Try to extract meaningful information from the video stream. Very hard problem, low success rate. Motion Detectors Can only detect the region of the house that a person is in. It’s possible to infer activities, but with low success rate. Filip Perich 2/16/2019

Overview What are activities of daily life and why do we care? How it’s been done in the past. How to use RFID to determine ADLs. How I will do it better. Filip Perich 2/16/2019

Philipose Et Al. Put RFID tags on important objects in the house. Create a wearable tag reader. Currently a glove. I imagine a bracelet being the final form. Can determine what objects a user has interacted with. Filip Perich 2/16/2019

Determining ADLs from RFID Data How can one map from a stream of RFID tag readings to a concrete ADL? Philipose Et Al. Approach Parse natural language recipes into a machine representation of a series of objects. Combine those objects into a Bayesian Network. Derive the probabilities of the Bayesian Network from the Google API. Filip Perich 2/16/2019

Overview What are activities of daily life and why do we care? How it’s been done in the past. How to use RFID to determine ADLs. How I will do it better. Filip Perich 2/16/2019

Proposed Improvements Software Only I will not try to improve on the design of the glove reader. Learning Systems In the study the participants recorded their activities to check the accuracy of their system. These records can be used for supervised learning. Instead of Bayesian Networks from the Google API try a variety of techniques. Genetic Algorithms Learning Bayesian Networks Decision Trees Neural Networks Filip Perich 2/16/2019

Personal Vs. General A learning system could learn the behaviors of the user. Personalization could provide higher accuracy. For example; if a person drinks their tea black, interacting with the refrigerator should not indicate that they may be making tea. Filip Perich 2/16/2019

Knowledge Representation Express the recipe for an ADL in a concise machine readable format. XML or RDF Provides more precise representation of the ADL. Allows for more attributes, such as duration of the ADL. Filip Perich 2/16/2019