Shu Chen,Yan Huang Department of Computer Science & Engineering University of North Texas Denton, TX 76207, USA Recognizing Human Activities from Multi-Modal.

Slides:



Advertisements
Similar presentations
A Comparison of Implicit and Explicit Links for Web Page Classification Dou Shen 1 Jian-Tao Sun 2 Qiang Yang 1 Zheng Chen 2 1 Department of Computer Science.
Advertisements

Presented by: Tom Staley. About Paper by Emiliano Miluzzo Alexander Varshavsky Suhrid Balakrishnan Romit Roy Choudhury Originally presented at MobiSys2012,
Smartphone-based Activity Recognition for Pervasive Healthcare - Utilizing Cloud Infrastructure for Data Modeling Bingchuan Yuan, John Herbert University.
Introduction Visual feedback mounted on surgical tool K. Carter, T. Vaughan, G. Gauvin, P. Pezeshki, A. Lasso, T. Ungi, E. Morin, J. Rudan, C. J. Engel,
Vikramaditya Jakkula Washington State University First International Workshop on Smart Homes for Tele-Health.
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
A Practical Approach to Recognizing Physical Activities Jonathan Lester Tanzeem Choudhury Gaetano Borriello.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
University of Athens, Greece Pervasive Computing Research Group Predicting the Location of Mobile Users: A Machine Learning Approach 1 University of Athens,
Wireless Sensor Networks Smart Environments: Technologies, Protocols, and Applications ed. D.J. Cook and S.K. Das, John Wiley, New York, B.Devi
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Home Health Care and Assisted Living John Stankovic, Sang Son, Kamin Whitehouse A.Wood, Z. He, Y. Wu, T. Hnat, S. Lin, V. Srinivasan AlarmNet is a wireless.
Data Mining By Andrie Suherman. Agenda Introduction Major Elements Steps/ Processes Tools used for data mining Advantages and Disadvantages.
OLAM and Data Mining: Concepts and Techniques. Introduction Data explosion problem: –Automated data collection tools and mature database technology lead.
SoundSense: Scalable Sound Sensing for People-Centric Application on Mobile Phones Hon Lu, Wei Pan, Nocholas D. lane, Tanzeem Choudhury and Andrew T. Campbell.
Intelligent Speed Adaptation in vehicles Date: 01/08/09 Tamil Eniyan. M 08MEA026 M.Tech-Automotive Electronics Review - 0.
의미정보 해석 - 지식기반 시스템 응용 최보윤 소프트컴퓨팅 연구실 연세대학교.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Data Mining Chun-Hung Chou
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Chapter 8 Prediction Algorithms for Smart Environments
ENN: Extended Nearest Neighbor Method for Pattern Recognition
PERSONAL MEDICAL MONITOR Jason Ewing, Morgan Hinchcliffe, Dina Irgebayeva and Aida Kulmambetova.
July 25, 2010 SensorKDD Activity Recognition Using Cell Phone Accelerometers Jennifer Kwapisz, Gary Weiss, Samuel Moore Department of Computer &
Introduction Kinect for Xbox 360, referred to as Kinect, is developed by Microsoft, used in Xbox 360 video game console and Windows PCs peripheral equipment.
September Activity Recognition and Biometric Identification Using Cell Phone Accelerometers WISDM Project Department of Computer & Info. Science.
Amin Rasekh, Chien-An Chen, Yan Lu CSCE 666 Project Presentation.
Side Channel Attacks through Acoustic Emanations
Human Gesture Recognition Using Kinect Camera Presented by Carolina Vettorazzo and Diego Santo Orasa Patsadu, Chakarida Nukoolkit and Bunthit Watanapa.
Vikramaditya Jakkula Washington State University IEEE Workshop of Data Mining in Medicine 2007 (DMMed '07) In conjunction with IEEE.
Extending the control of remote laboratories using domotic devices Ricardo Costa
A sensor for measuring the acceleration of a moving or vibrating body.
1 ENTROPY-BASED CONCEPT SHIFT DETECTION PETER VORBURGER, ABRAHAM BERNSTEIN IEEE ICDM 2006 Speaker: Li HueiJyun Advisor: Koh JiaLing Date:2007/11/6 1.
Extending Traditional Algorithms for Cyber-Physical Systems Sumeet Gujrati and Gurdip Singh Kansas State University.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
Second Line Intrusion Detection Using Personalization DISA Sponsored GWU-CS.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Fundamentals of Information Systems, Sixth Edition1 Natural Language Processing and Voice Recognition Processing that allows the computer to understand.
BEHAVIORAL TARGETING IN ON-LINE ADVERTISING: AN EMPIRICAL STUDY AUTHORS: JOANNA JAWORSKA MARCIN SYDOW IN DEFENSE: XILING SUN & ARINDAM PAUL.
Relative Hidden Markov Models Qiang Zhang, Baoxin Li Arizona State University.
Anomaly Detection in Data Mining. Hybrid Approach between Filtering- and-refinement and DBSCAN Eng. Ştefan-Iulian Handra Prof. Dr. Eng. Horia Cioc ârlie.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Curiosity-Driven Exploration with Planning Trajectories Tyler Streeter PhD Student, Human Computer Interaction Iowa State University
Data Mining BY JEMINI ISLAM. Data Mining Outline: What is data mining? Why use data mining? How does data mining work The process of data mining Tools.
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Approximate Nearest Neighbors: Towards Removing the Curse of Dimensionality Piotr Indyk, Rajeev Motwani The 30 th annual ACM symposium on theory of computing.
Ambient Assisted Living (AAL) setup to determine the wellness of a person living alone in their own home Dr. N. K. Suryadevara Senior Member IEEE Professor.
Kansas State University Department of Computing and Information Sciences CIS 730: Introduction to Artificial Intelligence Friday, 14 November 2003 William.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Using decision trees to build an a framework for multivariate time- series classification 1 Present By Xiayi Kuang.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Iris-based Authentication System Daniel Schonberg and Darko Kirovski, “Iris Compression for Cryptographically Secure Person Identification”, in Proceedings.
REU 2009 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Projekt „ESSNBS“ Niš, November 4 th – 7 th, DAAD Wireless Measurement System for Environmental Monitoring and Control MM. Srbinovska, V. Dimcev,
Under Guidance of Mr. A. S. Jalal Associate Professor Dept. of Computer Engineering and Applications GLA University, Mathura Presented by Dev Drume Agrawal.
Project GuideBenazir N( ) Mr. Nandhi Kesavan RBhuvaneshwari R( ) Batch no: 32 Department of Computer Science Engineering.
Ambient Assisted Living - Accessibility: Ambient awareness - Seminar Stefan Meißner
Lameness Detection in Sheep Through the Analysis of the Wireless Sensor Data The School of Science and Technology Department of Computer Science and Immersive.
Introduction to Machine Learning, its potential usage in network area,
Automated Experiments on Ad Privacy Settings
DATA MINING © Prentice Hall.
Prepared by: Mahmoud Rafeek Al-Farra
BAYESIAN APPROACH FOR INDOOR HUMAN ACTIVITY MONITORING
Waikato Environment for Knowledge Analysis
Neural Networks in RStudio with the H2O module
Majid Alshammari and Khaled Elleithy
Remah Alshinina and Khaled Elleithy DISCRIMINATOR NETWORK
Distributed Control Applications Within Sensor Networks
Detection Detect the breach and protect the data. By,
Presentation transcript:

Shu Chen,Yan Huang Department of Computer Science & Engineering University of North Texas Denton, TX 76207, USA Recognizing Human Activities from Multi-Modal Sensors

Content Introduction Related Work Overview Preparation Data Collection Preprocessing Experimental result Conclusion

Introduction Detecting and monitoring human activities are extremely useful for understanding human behaviors and recognizing human interactions in a social network. Applications: Activity monitoring and prediction E.g. Avoid calling in if your friend’s online status is “in a meeting” (recognized automatically) Patient Monitoring Military Application Motivation Auto-labeling is extremely useful Tedious and intrusive nature of traditional methods Emergence of new Infrastructures such as wireless sensor networks

Related Work Tanzeem et al. introduce some current approaches in activity recognition that use a variety of different sensors to collect data about users’ activities. Joshua et al. use RFID-based techniques to detect human-activity. Chen, D. presents a study on the feasibility of detecting social interaction using sensors in skilled nursing facility. T. Nicolai et al. use wireless devices to collect and analyze data in social context. Our approach extends current works of human activity recognition by using new wireless sensors with multiple modals.

Overview

Preparation Hardware (Crossbow) Iris motes MTS310 sensor board MIB520 base station SBC Software TinyOs An open-source OS for the networked Java, Python packages

Data Collection Multi-type sensor data collection (light, acceleration, magnetic, microphone, temperature … ) Activity List (Meeting,Running,Walking,Driving,Lecturing,Writing)

Preprocessing ADC readings converting Data format Example

Experimental Result We choose four types of classifiers to be compared in experiments. 1. Random Tree (random classifier) 2. KStar (nearest neighbor) 3. J48 (decision tree) 4. Naive Bayes

Experimental Result (cont’d) 80% data on each subjects(activities) are used for training, and the rest 20% are used to test

Experimental Result (cont’d) Observation1: high accuracy by all classifiers tried especially decision tree based algorithm like J48 Observation2: not all the sensor readings are useful for determine the activity type Observation3: using multi-type sensors the accuracy significantly increases ( % for single micphone data, % for single light and % for single acceleration by using J48 decision tree)

Conclusion and Future Work This work shows using multi-modal sensor can improve the accuracy of human activities recognition. Result shows all of 4 classifiers (especially for decision tree) can reach high recognition accuracy rate on a variety of 6 daily activities. Further research includes: Use temporal data to determine the sequential patterns Combine models built from multiple carriers to build a robust model for new carriers Implement something similar on hand-on devices, e.g. iphones, to provide automated activity recognition for social networking applications

Thanks! Questions?

References [1] L. Xie, S. fu Chang, A. Divakaran, and H. Sun, “Unsupervised mining of statistical temporal structures,” in Video Mining, Azreil Rosenfeld, David Doermann, Daniel Dementhon Eds. Kluwer Academic Publishers, [2] N. Ravi, N. Dandekar, P. Mysore, and M. L. Littman, “Activity recognition from accelerometer data,” American Association for Arti fi cial Intelligence, [Online]. Available: ∼ nravi/ accelerometer.pdf [3] E. R. Bachmann, X. Yun, and R. B. Mcghee, “Sourceless tracking of human posture using small inertial/magnetic sensors,” in Computational Intelligence in Robotics and Automation, Proceedings IEEE International Symposium on, vol. 2, 2003, pp. 822–829 vol.2. [Online]. Available: all.jsp?arnumber= [4] T. Choudhury, M. Philipose, D. Wyatt, and J. Lester, “Towards activity databases: Using sensors and statistical models to summarize people’s lives,” IEEE Data Eng. Bull., vol. 29, no. 1, pp. 49–58, 2006.

References [5] J. R. Smith, K. P. Fishkin, B. Jiang, A. Mamishev, M. Philipose, A. D. Rea, S. Roy, and K. Sundara-Rajan, “R fi d-based techniques for human- activity detection,” Commun. ACM, vol. 48, no. 9, pp. 39–44, September [Online]. Available: [6] D. Chen, J. Yang, R. Malkin, and H. D. Wactlar, “Detecting social interactions of the elderly in a nursing home environment,” ACM Trans. Multimedia Comput. Commun. Appl., vol. 3, no. 1, p. 6, [7] T. Nicolai, E. Yoneki, N. Behrens, and H. Kenn, “Exploring social context with the wireless rope,” in On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006, pp. 874–883. [Online]. Available: 112