의미 모델링 Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning + Mining Models of Human Activities from the Web 지능 기반 시스템 응용 2006. 11.

Slides:



Advertisements
Similar presentations
Opportunity Knocks: A Community Navigation Aid Henry Kautz Don Patterson Dieter Fox Lin Liao University of Washington Computer Science & Engineering.
Advertisements

1 VLDB 2006, Seoul Mapping a Moving Landscape by Mining Mountains of Logs Automated Generation of a Dependency Model for HUG’s Clinical System Mirko Steinle,
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
Assisted Cognition Henry Kautz University of Rochester Computer Science.
Patch to the Future: Unsupervised Visual Prediction
Location and Tracking Spring 2004: Location Recognition Larry Rudolph Location of what? Services applications, resources, sensors, actuators where.
Civil and Environmental Engineering Carnegie Mellon University Sensors & Knowledge Discovery (a.k.a. Data Mining) H. Scott Matthews April 14, 2003.
CSE 574 – Artificial Intelligence II Statistical Relational Learning Instructor: Pedro Domingos.
LinkSelector: A Web Mining Approach to Hyperlink Selection for Web Portals Xiao Fang University of Arizona 10/18/2002.
EnLoc: Energy-Efficient Localization for Mobile Phones Written By, Ionut Constandache (Duke), Shravan Gaonkar (UIUC), Matt Sayler (Duke), Romit Roy Choudhary.
LinkSelector: Select Hyperlinks for Web Portals Prof. Olivia Sheng Xiao Fang School of Accounting and Information Systems University of Utah.
Advance Information Retrieval Topics Hassan Bashiri.
Visual Information Retrieval Chapter 1 Introduction Alberto Del Bimbo Dipartimento di Sistemi e Informatica Universita di Firenze Firenze, Italy.
1 Information Retrieval and Extraction 資訊檢索與擷取 Chia-Hui Chang, Assistant Professor Dept. of Computer Science & Information Engineering National Central.
Article by: Feiyu Xu, Daniela Kurz, Jakub Piskorski, Sven Schmeier Article Summary by Mark Vickers.
Searching and Researching the World Wide: Emphasis on Christian Websites Developed from the book: Searching and Researching on the Internet and World Wide.
Latent Semantic Analysis (LSA). Introduction to LSA Learning Model Uses Singular Value Decomposition (SVD) to simulate human learning of word and passage.
Learning Programs Danielle and Joseph Bennett (and Lorelei) 4 December 2007.
Feature extraction Feature extraction involves finding features of the segmented image. Usually performed on a binary image produced from.
Creating Web Page Forms
報告日期 :2012/03/07 指導教授 : 蔡亮宙 報 告 者 : 吳烱華 自製率 :100%.
Jason Li Jeremy Fowers Ground Target Following for Unmanned Aerial Vehicles.
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Mining and Summarizing Customer Reviews
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
D YNAMIC B UILDING OF D OMAIN S PECIFIC L EXICONS U SING E MERGENT S EMANTICS Final Presentation Matt Selway Supervisor: Professor Markus Stumptner.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
MediaEval Workshop 2011 Pisa, Italy 1-2 September 2011.
Research paper: Web Mining Research: A survey SIGKDD Explorations, June Volume 2, Issue 1 Author: R. Kosala and H. Blockeel.
Novel Sensing Networks for Intelligent Monitoring (Newton) Z Q Lang, H Chen, T Dodd Department of Automatic Control & Systems Engineering University of.
Push Singh & Tim Chklovski. AI systems need data – lots of it! Natural language processing: Parsed & sense-tagged corpora, paraphrases, translations Commonsense.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Inferring High-Level Behavior from Low-Level Sensors Don Peterson, Lin Liao, Dieter Fox, Henry Kautz Published in UBICOMP 2003 ICS 280.
K. J. O’Hara AMRS: Behavior Recognition and Opponent Modeling Oct Behavior Recognition and Opponent Modeling in Autonomous Multi-Robot Systems.
Recognizing Activities of Daily Living from Sensor Data Henry Kautz Department of Computer Science University of Rochester.
Lexical Analysis Hira Waseem Lecture
DEPARTMENT of COMPUTER SCIENCE University of Rochester  Activities  Abductive Inference of Multi-Agent Interaction  Capture the Flag Data Collection.
Web Usage Mining for Semantic Web Personalization جینی شیره شعاعی زهرا.
Machine Learning Tutorial Amit Gruber The Hebrew University of Jerusalem.
Multifactor GPs Suppose now we wish to model different mappings for different styles. We will add a latent style vector s along with x, and define the.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Fundamentals of Information Systems, Sixth Edition1 Natural Language Processing and Voice Recognition Processing that allows the computer to understand.
Date : 2013/03/18 Author : Jeffrey Pound, Alexander K. Hudek, Ihab F. Ilyas, Grant Weddell Source : CIKM’12 Speaker : Er-Gang Liu Advisor : Prof. Jia-Ling.
For Friday Finish chapter 24 No written homework.
For Monday Read chapter 26 Last Homework –Chapter 23, exercise 7.
Automatic Video Tagging using Content Redundancy Stefan Siersdorfer 1, Jose San Pedro 2, Mark Sanderson 2 1 L3S Research Center, Germany 2 University of.
Digital Libraries Lillian N. Cassel Spring A digital library An informal definition of a digital library is a managed collection of information,
Groupe de Recherche en Informatique Université du Québec à Chicoutimi A Logical Approach to ADL Recognition for Alzheimer’s patients ICOST 2006 Bruno Bouchard,
Inferring High-Level Behavior from Low-Level Sensors Donald J. Patterson, Lin Liao, Dieter Fox, and Henry Kautz.
© 2010 Pearson Addison-Wesley. All rights reserved. Addison Wesley is an imprint of Designing the User Interface: Strategies for Effective Human-Computer.
For Friday Finish chapter 23 Homework –Chapter 23, exercise 15.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Motivation and Overview
Predicting the Location and Time of Mobile Phone Users by Using Sequential Pattern Mining Techniques Mert Özer, Ilkcan Keles, Ismail Hakki Toroslu, Pinar.
Stochastic Grammars: Overview Representation: Stochastic grammar Representation: Stochastic grammar Terminals: object interactions Terminals: object interactions.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph 1 Tracking Indoors.
1 An infrastructure for context-awareness based on first order logic 송지수 ISI LAB.
Sensor Analysis – Part II A literature based exploration Thomas Plötz [material taken from the original papers and John Krumm “Ubiquitous Computing Fundamentals”
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
For Monday Read chapter 26 Homework: –Chapter 23, exercises 8 and 9.
Overview of Statistical NLP IR Group Meeting March 7, 2006.
Thrust IIA: Environmental State Estimation and Mapping Dieter Fox (Lead) Nicholas Roy MURI 8 Kickoff Meeting 2007.
Assisted Cognition Systems Henry Kautz Department of Computer Science.
Ubiquitous Computing and Augmented Realities
Summary Presented by : Aishwarya Deep Shukla
Discovering Activities of Daily Life Using RFID’s
CHAPTER 14: Information Visualization
Introduction to Search Engines
Presentation transcript:

의미 모델링 Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning + Mining Models of Human Activities from the Web 지능 기반 시스템 응용 민준기

2 Agenda  B. Morgan and P. Singh, “Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning,” BSN The Problem Space LifeNet : A First-Person Model The Plug Sensor Network  M. Perkowitz, et al., “Mining Models of Human Activities from the Web,” WWW Introduction Proposed Technique Evaluation Summary and Future Work

3 The Problem Space  Two distinct directions for research Human-out (This paper) Telephone Technology-in (Much sensor network research) Text messaging on cell phones  Three topics LifeNet probabilistic human model The Plug sensor network An experimental design for evaluation of the LifeNet learning method

4 LifeNet : A First-Person Model  First-person common-sense inference model OpenMind Common Sense, ConceptNet, The PlaceLab data, Honda’s indoor common sense data  Attempts to anticipate and predict what humans do in the world  All of the reasoning in LifeNet is based on probabilistic propositional logic “I am washing my hair” before “my hair is clean”

5 The Plug Sensor Network  Using for both learning common sense and for recognizing and predicting human behavior  Using this sensor network to monitor how individuals interact with their physical environment  Nine sensor modalities: sound, vibration, brightness, current, wall voltage, acceleration

6 Agenda  B. Morgan and P. Singh, “Elaborating Sensor Data using Temporal and Spatial Commonsense Reasoning,” BSN The Problem Space LifeNet : A First-Person Model The Plug Sensor Network  M. Perkowitz, et al., “Mining Models of Human Activities from the Web,” WWW Introduction Proposed Technique Evaluation Summary and Future Work

7 Introduction : Recognize Humans Activities  Applications include activity-based actuation Dimming lights when a video is being watched Providing directions for someone using unfamiliar facilities etc.  Ubiquitous, proactive, disappearing computing Computers have to understand people’s needs by observing their physical activities (and to act autonomously) The cost of developing recognition infrastructure is too high Even small classes of activities is hard to recognize  A broadly applicable system should be general-purpose and easy to use

8 Motivation  Vision based systems None have reported detecting more than tens of activities in practice The features robustly detectable from vision are coarse Represent the relationships between “blobs” in the image rather than specific objects Each activity is expensive to model  Learning of the models The developers define the structure of the possible models System tunes the parameters of the model based on examples from the user The user is expected to label the patterns The variety of activities is quite restricted Introduction

9 Proposed Technique  RFID (Radio Frequency Identification) Cheap: Postage-stamp sized, forty-cent Wireless and battery free  Activity modeling Define an activity in terms of the probability and sequence of the objects Generate the models by translating textual definitions Structured like recipes Produced automatically by mining appropriate web sites Mining models is part of a larger activity recognition system, PROACT (Proactive Activity Toolkit)

10 Usage Model  Assumes that interesting objects in the environment contain RFID tags (tens ~ hundreds) Making a database entry mapping the tag ID to a name Within a few years, many household objects may be RFID- tagged before purchase, thus eliminating the overhead of tagging Medium-range readers (Tag-detecting Gloves) and Long-range readers (Run robots, Carts, …)  PROACT uses the sequence and timing of object to deduce what activity is happening Likelihood of various activities, details of those activities, degree of certainty, etc… Proposed Technique

11 System Overview  PROACT provides an activity viewer for debugging Real-time view of activities in progress The sensor data seen Changing of belief in each activity with the data  Inference Engine converts the activity models produced by the mining engine into Dynamic Bayesian Networks D. Patterson, L. Liao, D. Fox, H. Kautz, “Inferring High-Level Behavior from Low-Level Sensors,” Ubicomp Proposed Technique

12 Sensors and Models  Sensors Use two different kinds of RFID readers Long-range reader (mobile robot): map the location of objects Short-range reader (glove): determine the objects that are touched  Models Each model (activity) is composed of a sequence (step) s1 ~sn Each step si has optional duration ti and object oij involved along with the probability pij Proposed Technique

13 The Model Extractor  Builds formal models of activities using directions  Directions are written in natural language by human How-to (ehow.com), recipes (epicurious.com), training manuals, protocols, etc.  Syntactic structure of directions 1.A title t for the activity 2.A textual list r1~rm, Each step ri has: Possibly a special keyword delimiting duration di What to do during the step: subset of the objects and duration Proposed Technique

14 Converting Directions to Activity Models  Key steps 1.Labeling Set label of the mined model to title of the directions 2.Parsing steps Duration: Gaussian with mean = d, stdev = S(d, i, l ) Object Oi and Probability P 3.Tagged object filtering  Functions Object Object extraction: WordNet ontology Noun-phrase extraction: QTag tagger Probability Fixed probabilities Google conditional probabilities (GCP) Proposed Technique For example, [“making tea”] has 24,200 matches, and [“making tea” cup] has 7,340 matches, then conditional probability of a cup being involved in making tea is 7340/2400 = 0.3

15 Example Proposed Technique

16 Evaluation  Mined models ehow.com: 2300 directions ffts.com: 400 recipes epicurious.com: 18,600 recipes  Three strategies to approximate comprehensive evaluation Human activity-trace recognition Activities of Daily Living (ADLs) Inter-corpus consistency Making cookies recipes Intra-corpus distinguish-ability Distinguish-ability within activity domains

17 Distinguish-ability

18 Human and inter-corpus trace recognition  ADLs domain Many objects were not tagged, missed, and interleaved Models were not perfect  Cookie domain The identical recipe can have quite different structure For some of the recipes, there is no counterpart in the other corpus Evaluation

19 Impact of techniques on accuracy  ADLs Domain is fairly sparse, with many activities involving only few object  Cookie domain Each activity model involves many more objects Evaluation

20 Impact of techniques on compactness Evaluation

21 Summary and Future Work  An introduction to the idea of mining activity detection from the web  Future work Perform a more comprehensive evaluation Improving the effectiveness of mined models Include location Synonymous words Synsets (collections of synonymous words) can be extracted from WordNet