1 Location Modeling and Machine Learning in Smart Environments Robert Whitaker Supervisor: A/Prof Judy Kay A/Prof Bob Kummerfeld A/Prof Bob Kummerfeld.

Slides:



Advertisements
Similar presentations
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
Advertisements

© 2005 Avaya Inc. All rights reserved. A Client-Side Architecture for Supporting Pervasive Enterprise Communications Amogh Kavimandan, Reinhard Klemm,
TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
Blue Eye T E C H N O L G Y.
1 Planetary Network Testbed Larry Peterson Princeton University.
Beyond Prototypes: Challenges in Deploying Ubiquitous Systems N. Davies and H. Gellersen IEEE pervasive computing, 2002 Presenter: Min Zhang
Context-Aware User Interfaces. Gent, 21 maart 2005 Context-Aware User Interfaces Context-Aware User Interfaces is a requirement for all defined scenarios.
© 2006 Carnegie Mellon Robotics Academy Designed for use with the LEGO MINDSTORMS ® Education NXT Software and Base Set #9797 Mine Mapping Remote Communication.
A Context Aware Framework Mark Assad Supervisor: Bob Kummerfeld.
Selected Location Sensors Judy Kay CHAI: Computer human adapted interaction research group School of Information Technologies.
Kodak Kiosk Locator Team kiLO Shawn Ellis Tom Guzewich Lora Magliocco Amanda Merritt Nick Shaw.
Many kinds of clients and servers This work is licensed under a Creative Commons Attribution-Noncommercial- Share Alike 3.0 License. Skills: none IT concepts:
L4-1-S1 UML Overview © M.E. Fayad SJSU -- CmpE Software Architectures Dr. M.E. Fayad, Professor Computer Engineering Department, Room #283I.
Connecting the Invisible Extremes of Computing David Culler U.C. Berkeley Summer Inst. on Invisible Computing July,
Interpret Application Specifications
C++ Training Datascope Lawrence D’Antonio Lecture 11 UML.
Mobile Commerce and Ubiquitous Computing
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
HACS HOME IN YOUR POCKET. Today’s Topic User Interaction User Interaction User Authentication User Authentication Database Database Design of Devices.
Smart Home Technologies CSE 4392 / CSE 5392 Spring 2006 Manfred Huber
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Domestic Nuclear Detection Office (DNDO) NITRD Workshop What are the Biggest Opportunities in Networking Problem? Sept. 20, 2012 Timothy Ashenfelter, PhD.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Kaifei Chen, Siyuan He, Beidi Chen, John Kolb, Randy H. Katz, David E
Windows 7 Firewall.
Chapter 11 Analysis Concepts and Principles
Information System Development Courses Figure: ISD Course Structure.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
About the Master class The Master Class is offered to experienced evaluators or those who have already attended several Clear Horizon courses, or other.
Supporting rapid design and evaluation of pervasive application: challenges and solutions Lei Tang 1,2, Zhiwen Yu 1, Xingshe Zhou 1, Hanbo Wang 1, Christian.
Uichin Lee KAIST KSE KSE801: Mobile and Pervasive Computing for Knowledge Services.
Module 5: Configuring Internet Explorer and Supporting Applications.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
Challenges in UbiComp Take 2 Sushmita Subramanian.
Distributed System Concepts and Architectures 2.3 Services Fall 2011 Student: Fan Bai
Automating Context-Aware Application Development Ted McFadden and Karen Henricksen CRC for Enterprise Distributed Systems Technology (DSTC) Jadwiga Indulska.
Application of Operating System Concepts to Coordination in Pervasive Sensing and Computing Systems Benjamin J. Ewy, Larry M. Sanders Ambient Computing,
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Unit 9: Distributing Computing & Networking Kaplan University 1.
Indoor Positioning System
ROVER TECHNOLOGY PRESENTED BY Gaurav Dhuppar Final Year I.T. GUIDED BY Ms. Kavita Bhatt Lecturer I.T.
Tangible User Interfaces and Reinforcement Learning (Smart Toys) An honours thesis presentation by… Trent Apted Supervised by A/Prof Bob Kummerfeld Smart.
Smart Instant HKU Context-aware Instant Messenger for Mobile Users Supervisor: Dr.Cho-Li Wang CS Final Year Project (Year )
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Towards ‘Ubiquitous’ Ubiquitous Computing: an alliance with ‘the Grid’ Oliver Storz, Adrian Friday, and Nigel Davies Computing Department, Lancaster University,
APRIL 10, Meeting Agenda  Prototype 2 Goals  Robust Connections Demo  System Diagnostics Tool Demo  Final Prototype Risk Mitigation  Final.
APRIL 10, Meeting Agenda  Prototype 2 Goals  Robust Connections Demo  System Diagnostics Tool Demo  Final Prototype Risk Mitigation  Final.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
 Background  Introduction  Purpose  Basic rover services  Physical architecture of Rover System  Server operation  Logical Architecture of A Rover.
ConfigMgr Discovering and Organizing Resources Mariusz Zarzycki, Phd, MCT, MCTS, MCITP, MCSE, MCSA.....
System Design Basics IB Computer Science.
A SEMINAR ON ROVER TECHNOLOGY
Supporting Windows 8.1 Krystle Portocarrero | Training Experts Inc.
Module 10: Managing and Monitoring Network Access
Definition of Distributed System
System Design Basics IB Computer Science.
Context-Aware Computing
How SCADA Systems Work?.
System Design Basics IB Computer Science.
University of Technology
Mobile Commerce and the Internet of Things
Advanced Operating Systems
Outline Overview Development Tools
Mobile Commerce and Ubiquitous Computing
WELCOME TO SEMINAR.
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

1 Location Modeling and Machine Learning in Smart Environments Robert Whitaker Supervisor: A/Prof Judy Kay A/Prof Bob Kummerfeld A/Prof Bob Kummerfeld

2 Overview Problem Previous Work Possible Data Sources Tools Available Issues

3 Thesis Topic Explore ways of determining a persons current location and activity Explore ways of predicting a persons location/activity using Location Modeling and Machine Learning The results returned must be scrutable

4 Possible Situation Where’s Boris Scenario Wish to organize a meeting with another person where the time suits both parties

5 Possible Steps Contact the person you wish to meet Both people would look at their schedules and negotiate a time Both parties agree on the time they are to meet

6 Possible Problems One of the persons schedule may be incomplete When you arrive at the meeting time the person is not there. Should you wait? Where is the person? What if you can’t connect the person to organise the meeting

7 High Level View

8 Previous Work Active Badge Project Lancaster Guide Project Doppelganger Activity Compass Project

9 Active Badge Project First Indoor positioning system Users wear badges to emit their location Applied to teleporting Active Bat project extended the basic concepts developed Source: Nigel Davies and Hans-Werner Gellersen Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEE Pervasive Computing, Volume 1 (Jan-March 2002)

10 Lancaster Guide Project A tourist guide for the city of Lancaster Used tablet PC’s connected to a network Limited by the infrastructure capabilities. Source: 1. Nigel Davies and Hans-Werner Gellersen Beyond Prototypes: Challenges in Deploying Ubiquitous Systems. IEEE Pervasive Computing, Volume 1 (Jan-March 2002) The Guide Project,

11 Lancaster Guide Interface Source: The Guide Project,

12 Doppelganger Generalized tool for gathering, processing and providing information about users Learning Techniques  Beta Distribution  Linear Prediction  Markov Models DopMail Source: Orwant, J., Heterogeneous Learning in the Doppelganger User Modeling System. in User Modeling and User-Adapted Interaction, (1995),

13 Doppelganger Applications Beta Distribution Linear Prediction Markov Models Learning Toolbox Sensors Source: Orwant, J., Heterogeneous Learning in the Doppelganger User Modeling System. in User Modeling and User-Adapted Interaction, (1995),

14 Activity Compass Project Location Modeling to help disabled PDA device application developed to assist with location tracking Tracking movements and comparing them to a map Prediction algorithms used Relational Markov Models Source: Patterson, D.J., Etzioni, O. and Kautz, H. The Activity Compass, University of Washington, 2003.

15 Prototype of Activity Compass Source: Patterson, D.J., Etzioni, O. and Kautz, H. The Activity Compass, University of Washington, 2003.

16 Possible Data Sources Bluetooth Devices Machine Learning  Windows Based  Unix Based

17 Tools Personis Elvin Messaging Bspy Markov Modeling Toolkits Manual Logs for Evaluation Purposes

18 Personis User modeling software Accretion representation  Consists of components which model aspects of the user Allows the user model to be scruntised Source: Kay, J., Kummerfeld, B. and Lauder, P., Managing private user models and shared personas. in Workshop on User Modelling for Ubiquitous Computing, (Pittsburgh, USA, 2003).

19 Example of User Model Output from Personis: Modeling the locations where the user has been

20 Elvin Messaging Publish/Subscribe Messaging System Messages routed by content Application: sending messages between sensors and modeling software Elvin Router Client Source: Mantara Software Elvin Administrator's Guide, 2003.

21 Bspy Bluetooth positioning system Detects Bluetooth devices and logs them to a database Uses Elvin messages to send information from sensor to database

22 Example Data

23 Markov Modeling Toolkits Hidden Markov Modeling Package – Python Matlab Hidden Markov Package Markov Chain Algorithm Cambridge Markov Modeling Toolkit

24 Manual Logs Records activity and location in 15 min blocks Provides some example data to develop the algorithms off Used for the evaluation of the learning algorithm

25 Code Sheet

26 Manual Log

27 Research Issues Representation of location and activity Creation of data sets Modeling Time

28 Questions