© 2005 Ritsumeikan Univ. All Rights Reserved. Embedded Action Detector to Enhance Freedom from Care Ritsumeikan University Graduate School of Computer.

Slides:



Advertisements
Similar presentations
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 A framework for.
Advertisements

CS188: Computational Models of Human Behavior
KEEPING YOUR HOME AND FAMILY SAFE
The results of repeated observations and/or experiments concerning a naturally occurring event (phenomenon) are reasonably the same when performed and.
Chapter 9 Code optimization Section 0 overview 1.Position of code optimizer 2.Purpose of code optimizer to get better efficiency –Run faster –Take less.
White Box and Black Box Testing Tor Stålhane. What is White Box testing White box testing is testing where we use the info available from the code of.
TOPIC : Finite State Machine(FSM) and Flow Tables UNIT 1 : Modeling Module 1.4 : Modeling Sequential circuits.
©2012 Cengage Learning. All Rights Reserved. Chapter 14 Facilitating Self-Care, Adaptive, and Independence Skills.
Bayesian Piggyback Control for Improving Real-Time Communication Quality Wei-Cheng Xiao 1 and Kuan-Ta Chen Institute of Information Science, Academia Sinica.
Academic Teacher Resources Student Wall Planner and Study Guide MOTIVATE YOURSELF.
Copyright © 2014 by The University of Kansas Collecting and Analyzing Data.
Kitchen alert Assistive Automation. Kitchen alert A person comes to an kitchen to make some food.
Graduate School of Information Sciences, Tohoku University
Probabilities Random Number Generators –Actually pseudo-random –Seed Same sequence from same seed Often time is used. Many examples on web. Custom random.
Software Engineering Laboratory1 Introduction of Bayesian Network 4 / 20 / 2005 CSE634 Data Mining Prof. Anita Wasilewska Hiroo Kusaba.
Temporal Pattern Matching of Moving Objects for Location-Based Service GDM Ronald Treur14 October 2003.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering On-line Alert Systems for Production Plants A Conflict Based Approach.
Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.
Computer Science 103 Chapter 4 Advanced JavaScript.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
1 Open Standard-Based Digital TV Browser in T-learning Päivi Aarreniemi-Jokipelto Helsinki University of Technology Seppo Kalli Tampere University of Technology.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Quality Assurance in the clinical laboratory
Quiz 4: Mean: 7.0/8.0 (= 88%) Median: 7.5/8.0 (= 94%)
Programming Games Computer science big ideas. Computer Science jargon. Show virtual dog Homework: [Catch up: dice game, credit card or other form.] Plan.
Water Contamination Detection – Methodology and Empirical Results IPN-ISRAEL WATER WEEK (I 2 W 2 ) Eyal Brill Holon institute of Technology, Faculty of.
Intrusion Detection for Grid and Cloud Computing Author Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall Federal.
1SSPD Back to Jackson Consider how JSP views programming- –Describe structure I/O datastreams –Combine to produce a program structure –List operations.
IIT Indore © Neminah Hubballi
1 Oppliger: Ch. 15 Risk Management. 2 Outline Introduction Formal risk analysis Alternative risk analysis approaches/technologies –Security scanning –Intrusion.
Suppose a given particle has a 0.01 probability of decaying in any given  sec. Does this mean if we wait 100  sec it will definitely have decayed? If.
An Agent-based Bayesian Forecasting Model for Enhancing Network Security J. PIKOULAS, W.J. BUCHANAN, Napier University, Edinburgh, UK. M. MANNION, Glasgow.
1 Probability and Statistics  What is probability?  What is statistics?
1 VeriSoft A Tool for the Automatic Analysis of Concurrent Reactive Software Represents By Miller Ofer.
Programming & Scratch. Programming Learning to program is ultimately about learning to think logically and to approach problems methodically. The building.
© 2005 Ritsumeikan Univ. All Rights Reserved. Context Aware Operation Reproduction for Safety Driving Satoshi Kaede Ritsumeikan University Graduate School.
Observation & Analysis. Observation Field Research In the fields of social science, psychology and medicine, amongst others, observational study is an.
Guide to State Transition Diagram. 2 Contents  What is state transition diagram?  When is state transition diagram used?  What are state transition.
A performance evaluation approach openModeller: A Framework for species distribution Modelling.
January Smart Environments: Artificial Intelligence in the Home and Beyond Diane J. Cook
1 6. Reliability computations Objectives Learn how to compute reliability of a component given the probability distributions on the stress,S, and the strength,
ETeacher: Providing personalized assistance to e-learning students Schiaffino, S., Garcia, P. & Amandi, A. (2008). eTeacher: Providing personalized assistance.
Statistical Power The power of a test is the probability of detecting a difference or relationship if such a difference or relationship really exists.
Software Engineering Laboratory, Department of Computer Science, Graduate School of Information Science and Technology, Osaka University July 21, 2008WODA.
BNJ 2.03α Beginner Developer Tutorial Chris H. Meyer (revised by William H. Hsu) Kansas State University KDD Laboratory
Advisor: Hsin-His Chen Reporter: Chi-Hsin Yu Date: From AAAI 2008 William Pentney, Department of Computer Science & Engineering University of.
Chapter 20 Classification and Estimation Classification – Feature selection Good feature have four characteristics: –Discrimination. Features.
1 COMPUTER LAB REGULATION
Variables and Functions ROBOTC Software © 2012 Project Lead The Way, Inc.Principles of Engineering.
CIS 530 Lecture 2 From frequency to meaning: vector space models of semantics.
A Behavioral Pattern Adapted to Individual for Providing Ubiquitous Service in Intelligent Space WSEAS CIMMACS2006 in Venice.
Event Handling. Objectives Using event handlers Simulating events Using event-related methods.
Problem solving in control of discrete-event systems Lenko Grigorov and Karen Rudie Queen’s University Kingston, Canada.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction to Probability (CSCE 317) January 21, 2016 Marco Valtorta SWRG.
Chapter 1 What is Biology? 1.1 Science and the Natural World.
Stay Kinected: A Home Monitoring System Combining Safety and Comfort Abstract The purpose of this project is to use the Microsoft Kinect sensor to implement.
Bayesian Networks in Document Clustering Slawomir Wierzchon, Mieczyslaw Klopotek Michal Draminski Krzysztof Ciesielski Mariusz Kujawiak Institute of Computer.
The Scientific Method. What is the Scientific Method? It is a series of steps that are used to find solutions to scientific problems. THEY MAY NOT ALWAYS.
Network Anomaly Diagnosis Analysis methodology March 23 rd, 2006.
Identifying the Elements of A Plot Diagram Ms. De La O.
Science Project Proposal Slide Show
Adding Dynamic Nodes to Reliability Graph with General Gates using Discrete-Time Method Lab Seminar Mar. 12th, 2007 Seung Ki, Shin.

CS223: Software Engineering
And Welcome to Mrs. Holderbaum’s Technology Class!
Logarithmic Functions
Boolean Bingo!.
Discrete Event Simulation - 4
And Welcome to Mrs. Holderbaum’s Technology Class!
Change-of-Base Property
Presentation transcript:

© 2005 Ritsumeikan Univ. All Rights Reserved. Embedded Action Detector to Enhance Freedom from Care Ritsumeikan University Graduate School of Computer Science Data Engineering Laboratory Kyohei Koyama

© 2005 Ritsumeikan Univ. All Rights Reserved. Tagged World Pocket Assistant Access Log Detect you going out RFID Tag Leaving Without locking Leaving something behind Coordination Alert ! Leaving the stove on Ubiquitous Facility Service !

© 2005 Ritsumeikan Univ. All Rights Reserved. Main Subject of This Presentation The Pocket Assistant is an embedded computer, thus it only has limited power resources The load can be huge, because the Pocket Assistant inspects all logs for each every access to the objects  The new way to reduce the load, keeping the accuracy of human activity recognition

© 2005 Ritsumeikan Univ. All Rights Reserved. Definitions of Human Activity The human activity is composed of three elements Act : A Minimum unit of human activity i.e. an access to an object Action : A sequence of acts Behavior : A set of actions

© 2005 Ritsumeikan Univ. All Rights Reserved. Definitions of Human Activity Turning the knob Undoing the door chain Pushing the power button Unlocking the door Opening the door Putting on shoes Turning off TV Going out Behavior Action Act Having a bag Having baggage Taking the remote control Putting on shoes Taking a shoehorn Taking shoes

© 2005 Ritsumeikan Univ. All Rights Reserved. Bayesian Network Bayesian Network methodology is applied for inspecting the access logs Shoes Chain Result (Going outside) Probability Propagation Observed Value is Assigned Probability Variable is Changed Look Knob Shoehorn Door Key The probability of user going outside is 78%!

© 2005 Ritsumeikan Univ. All Rights Reserved. Initial Approach Term Sequence Bayesian Network Access Log Candidates time Second Stage First Stage Act Detect a Behavior!!

© 2005 Ritsumeikan Univ. All Rights Reserved. Experiment “Going outside” behavior Two kinds of cases are prepared True case : When the user go outside False case : When it looks like the user is going outside, but actually staying home 324 cases have been sampled in total

© 2005 Ritsumeikan Univ. All Rights Reserved. Ideas from Experiment ( Threshold Value ) False Cases True Cases Threshold Value Threshold Value

© 2005 Ritsumeikan Univ. All Rights Reserved. Ideas from Experiment ( Key Event ) BN1 BN2 BN3 BN4 Shoes Shoehor n Shoe s Loc k Key Shoe s Lock Graph 1 Graph 2 Graph 3 Graph 4

© 2005 Ritsumeikan Univ. All Rights Reserved. Ideas from Experiment ( Key Event ) The occurrence probability does not change dramatically when accesses other than the key event occur It is reasonable to calculate the probability only when the Key Event occurs The Key Event is effective to reduce the number of calculation for the probability of the Bayesian Network

© 2005 Ritsumeikan Univ. All Rights Reserved. Revised Approach time Access Log Bayesian Network Trigger Layoff (0.5 ~ 1.0sec) Layoff ( 0.5 ~ 1.0sec ) Detection of Key Event Term Sequence Initial Approach

© 2005 Ritsumeikan Univ. All Rights Reserved. Evaluation Case ID Initial ApproachRevised Approach Number of Times (%) True TC1 TC2 TC3 TC4 TC5 TC (23.68) (26.92) (28.30) (27.27) (27.12) (10.81) False FC1 FC2 FC (11.11) (2.99) (2.63) Total-14.80% The revised approach reduces the number of calculation by 14.8% compared with the initial approach