Introduction  Use Allen’s Temporal Relations [3] to identify temporal relations among Activities in Daily Life of the resident.  Allen’s relations form.

Slides:



Advertisements
Similar presentations
Data Mining (Apriori Algorithm)DCS 802, Spring DCS 802 Data Mining Apriori Algorithm Spring of 2002 Prof. Sung-Hyuk Cha School of Computer Science.
Advertisements

CS548 Spring 2015 Showcase By Yang Liu, Viseth Sean, Azharuddin Priyotomo Showcasing work by Le, Abrahart, and Mount on "M5 Model Tree applied to modelling.
Fast Algorithms For Hierarchical Range Histogram Constructions
Industrial Diagnostics Using Algebra of Uncertain Temporal Relations Vladimir Ryabov, Vagan Terziyan* IASTED-2003 Innsbruck, Austria.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Vikramaditya Jakkula. MavPad Argus Sensor Network  around 100 Sensors.  include Motion, Devices, Light, Pressure, Humidity and more.
Vikramaditya R. Jakkula, Diane J. Cook & Aaron S. Crandall Washington State University Presented by Aaron S. Crandall.
Vikramaditya Jakkula Washington State University First International Workshop on Smart Homes for Tele-Health.
Vikramaditya R. Jakkula & Diane J. Cook Washington State University.
1 Learning to Detect Objects in Images via a Sparse, Part-Based Representation S. Agarwal, A. Awan and D. Roth IEEE Transactions on Pattern Analysis and.
Introduction Time is very essential component in everyday life and would act as great source of information for any smart home. We hypothesize that anomaly.
June 27-28, 2006 Vikramaditya Jakkula Monitoring Health by Detecting Drifts and Outliers for a Smart Environment Inhabitant Gaurav Jain, Diane J. Cook,
2-1 Sample Spaces and Events Conducting an experiment, in day-to-day repetitions of the measurement the results can differ slightly because of small.
Data Mining Presentation Learning Patterns in the Dynamics of Biological Networks Chang hun You, Lawrence B. Holder, Diane J. Cook.
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9 Kendall & Kendall Systems Analysis and Design, 9e Process Specifications.
Mining Behavior Models Wenke Lee College of Computing Georgia Institute of Technology.
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 11 Management Decision Making.
Experimental Evaluation
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
ALBERT PARK EEL 6788: ADVANCED TOPICS IN COMPUTER NETWORKS Energy-Accuracy Trade-off for Continuous Mobile Device Location, In Proc. of the 8th International.
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall 9 Kendall & Kendall Systems Analysis and Design, 9e Process Specifications.
A P STATISTICS LESSON 9 – 1 ( DAY 1 ) SAMPLING DISTRIBUTIONS.
Verification technique on SA applications using Incremental Model Checking 컴퓨터학과 신영주.
Attention Deficit Hyperactivity Disorder (ADHD) Student Classification Using Genetic Algorithm and Artificial Neural Network S. Yenaeng 1, S. Saelee 2.
Chapter 8 Prediction Algorithms for Smart Environments
1 Data Mining Books: 1.Data Mining, 1996 Pieter Adriaans and Dolf Zantinge Addison-Wesley 2.Discovering Data Mining, 1997 From Concept to Implementation.
Event Stream Processing for Intrusion Detection in ZigBee Home Area Networks Sandra Pogarcic, Samujjwal Bhandari, Kedar Hippalgaonkar, and Susan Urban.
INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION INTRUSION DETECTION.
Appendix: The WEKA Data Mining Software
Data Mining Applied to Document Imaging Jeff Rekoske.
Vikramaditya Jakkula Washington State University IEEE Workshop of Data Mining in Medicine 2007 (DMMed '07) In conjunction with IEEE.
1 ENTROPY-BASED CONCEPT SHIFT DETECTION PETER VORBURGER, ABRAHAM BERNSTEIN IEEE ICDM 2006 Speaker: Li HueiJyun Advisor: Koh JiaLing Date:2007/11/6 1.
Describing Process Specifications and Structured Decisions Systems Analysis and Design, 7e Kendall & Kendall 9 © 2008 Pearson Prentice Hall.
1 CO Games Development 2 Week 19 Probability Trees + Decision Trees (Learning Trees) Gareth Bellaby.
January Smart Environments: Artificial Intelligence in the Home and Beyond Diane J. Cook
Vikramaditya Jakkula & Diane J. Cook Artificial Intelligence Lab Washington State University 2 nd International Conference on Technology and Aging (ICTA)
Temporal Analysis using Sci2 Ted Polley and Dr. Katy Börner Cyberinfrastructure for Network Science Center Information Visualization Laboratory School.
Online Kinect Handwritten Digit Recognition Based on Dynamic Time Warping and Support Vector Machine Journal of Information & Computational Science, 2015.
A Process Control Screen for Multiple Stream Processes An Operator Friendly Approach Richard E. Clark Process & Product Analysis.
1 Discovering Robust Knowledge from Databases that Change Chun-Nan HsuCraig A. Knoblock Arizona State UniversityUniversity of Southern California Journal.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Stefan Mutter, Mark Hall, Eibe Frank University of Freiburg, Germany University of Waikato, New Zealand The 17th Australian Joint Conference on Artificial.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
Nordic Process Control Workshop, Porsgrunn, Norway Application of the Enhanced Dynamic Causal Digraph Method on a Three-layer Board Machine Cheng.
REU 2004 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Distributed Rational.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology Mining Logs Files for Data-Driven System Management Advisor.
AUTOMATIC TARGET RECOGNITION AND DATA FUSION March 9 th, 2004 Bala Lakshminarayanan.
Vikramaditya R. Jakkula, G. Michael Youngblood and Diane J. Cook AAAI ’06 Workshop on Computational Aesthetics July 16, 2006.
1 Doing Statistics for Business Doing Statistics for Business Data, Inference, and Decision Making Marilyn K. Pelosi Theresa M. Sandifer Chapter 2 The.
REU 2007 Computer Science and Engineering Department The University of Texas at Arlington Research Experiences for Undergraduates in Information Processing.
Implementing a Consistency Checker for Uncertain or Incomplete Temporal System Yue Wang, Jixin Ma, Brian Knight School of Computing and Mathematical Sciences.
Logical Clocks. Topics r Logical clocks r Totally-Ordered Multicasting.
Learning Photographic Global Tonal Adjustment with a Database of Input / Output Image Pairs.
Mining Sequential Patterns © Tan,Steinbach, Kumar Introduction to Data Mining 4/18/2004 Slides are adapted from Introduction to Data Mining by Tan, Steinbach,
Anomaly Detection. Network Intrusion Detection Techniques. Ştefan-Iulian Handra Dept. of Computer Science Polytechnic University of Timișoara June 2010.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
Data Mining for Hierarchical Model Creation G. Michael Youngblood and Diane J. Cook IEEE Transactions on Systems, Man, and Cybernetics, Part C, 37(4): ,
Online Sequential Prediction via Incremental Parsing: The Active LeZi Algorithm Source: IEEE Intelligent Systems, 22(1), pp , 2007 Authors: Karthik.
Computer Science and Engineering Department The University of Texas at Arlington MavHome: An Intelligent Home Environment.
CASAS Smart Home Project Center for Advanced Studies in Adaptive Systems Washington State University.
WEKA: A Practical Machine Learning Tool WEKA : A Practical Machine Learning Tool.
Introduction to Machine Learning, its potential usage in network area,
Personal Home Healthcare System for the Cardiac Patient of Smart City Using Fuzzy Logic Shijia Liu.
QianZhu, Liang Chen and Gagan Agrawal
Akbar Akbari Esfahani1, Theodor Asch2
Daniela Stan Raicu School of CTI, DePaul University
Algorithm Discovery and Design
Pervasive Computing Happening?
Daniela Stan Raicu School of CTI, DePaul University
Presentation transcript:

Introduction  Use Allen’s Temporal Relations [3] to identify temporal relations among Activities in Daily Life of the resident.  Allen’s relations form the basic representation of the temporal intervals, which when used with constraints become a powerful method of expressing expected temporal orderings between events in a smart environment.  In this poster we consider the problem of activity prediction based on the discovery and application of temporal relations. Smart Home Goals: Data Collection Environment Literature cited Temporal Relations “It is common to describe scenarios using time intervals rather than time points” - James F. Allen Step 3: Temporal Rules Enhancement to the Prediction. Mining Sensor Data in Smart Environment for Temporal Activity Prediction Vikramaditya R. Jakkula & Diane J. Cook Washington State University First International Workshop on Knowledge Discovery from Sensor Data (Sensor-KDD '07) Conclusions Figure 2. Real & Synthetic Datasets. Figure 3. Smart Home Scenario illustrated using temporal relations. Acknowledgments This work is supported by NSF grant IIS Contact Us: Vikramaditya R. Jakkula Diane J. Cook Algorithm : Temporal Interval Analyzer Input: data timestamp, event name and state Repeat While [Event && Event + 1 found] Find paired “ON” or “OFF” events in data to determine temporal range. Read next event and find temporal range. Identify relation type between event pair from possible relation types (see Table 1). Record relation type and related data. Increment Event Pointer Loop until End of Input..  Due to small datasets used, we use the top rules generated with a minimum confidence of 0.5 and a minimum support of  Confidence level above 0.5 and support above 0.05 could not be used, as they could not result in any viable rules.  The major goal of MavHome project is to design an environment that acts as an intelligent agent and can acquire information about the resident and the environment in order to adapt the environment to the residents and meet the goals of comfort and efficiency.  This sensor network consists of around 100 sensors include motion, devices, light, pressure, humidity and more.  Unified project incorporating varied AI techniques cross disciplinary with mobile computing, databases,multimedia, and others. Figure 1. MavHome Smart Home Architecture [1] Adapt to Needs Cost Effective and Reliable Maximum Comfort and Security Food “Contains” water or Water “Before” pills or Food “Meets” pills or Food “Contains” water “before” pills Food Water Pills Time Interval  Why Temporal Relations? Reminder system based on temporal relations. Reminder Assistance If pills are to be taken “After” food, we can notice violation of this activity! Anomaly Detection If cooker is spoiled should we call emergency or a normal repair? Maintenance If oven used for turkey, is turkey at home? Temporary Need Analysis Increase predictive accuracy by incorporating additional temporal information. Improve Prediction Temporal Relation Usable Before X After During Contains X Overlaps X Overlapped-By Meets X Met-by Starts Started-By Finishes Finished-By Equals Allen’s 13 Relations Experimentation & Results Step 1: Process raw data to form temporal intervals Datasets Parameter Setting No of Days No of Events No of Intervals Identified Size of Data Synthetic KB Real KB [3] Raw Sensor Data Interval Data Temporal Relations Data Raw Sensor Data Timestamp Sensor State Sensor ID 3/3/ :18:00 AM OFF E16 3/3/ :23:00 AM ON G12 Identify Time Intervals Date Sensor ID Start Time End time. 03/02/2003 G11 01:44:00 01:48:00 03/02/2003 G19 02:57:00 01:48:00 Associated Temporal Relations Date time Sensor ID Temporal Relation Sensor ID 3/3/ :00:00 AM G12 DURING E16 3/3/ :00:00 AM E16 BEFORE I14 Step 2: Association rule generation using Weka  Use Apriori classifier in Weka [2] for generating best rules with a given support and confidence. Equation to calculate evidence using Probability of occurrence: P(Z|Y) = |After(Y,Z)| + |During(Y,Z)| + |OverlappedBy(Y,Z)| + |MetBy(Y,Z)| + |Starts(Y,Z)| + |StartedBy(Y,Z)| + |Finishes(Y,Z)| + |FinishedBy(Y,Z)| + |Equals(Y,Z)| / |Y| Results: D ATA S ET A CCURACY %E RROR % R EAL (W ITHOUT R ULES )5545 S YNTHETIC (W ITHOUT R ULES ) 6436 R EAL (W ITH R ULES )5644 S YNTHETIC (W ITH R ULES )6931 Online Model: Enhance existing ALZ prediction [4]. Prediction c :=P(C|P) :=P(C|P) SEQ +P(C|P) TEM/Global – (α * P(C|P) TEM) Where α = | #C PHRASE | / | #C GLOBAL |.  Real data had 1.86% and synthetic data had 7.81% prediction improvements.  Good model for offline prediction of multiple events.  Cannot adapt to online dynamic model of the environment. Pseudo code: Temporal Rules Enhanced prediction. [1] Get the current predicted output and check for any rule which satisfies it. If yes proceed else goto next predicted. [2] Now we check for the relation and based on the evidence as calculated by equation displayed below if it is greater than Mean+2* Std. Dev. Then add this to the predicted. [3] If relation is after the evidence becomes cumulative until greater then Mean +2*Std. Dev. [1] G. Michael Youngblood, Lawrence B. Holder, and Diane J. Cook. Managing Adaptive Versatile Environments. Proceedings of the IEEE International Conference on Pervasive Computing and Communications, [2] Ian H. Witten, Eibe Frank Data Mining: Practical Machine Learning Tools and Techniques, 2nd Edition. Morgan Kaufmann, San Francisco. [3]James F. Allen, and George Ferguson, Actions and Events in Interval Temporal Logic, Technical Report 521, July [4] K. Gopalratnam & D. J. Cook (2004). Active LeZi: An Incremental Parsing Algorithm for Sequential Prediction. International Journal of Artificial Intelligence Tools. 14(1-2):  Unique and new Approach.  Real data had 1.86% and synthetic data had 7.81% improvement.  Larger datasets would be incorporated.  Extended model includes direct application of temporal relations based probability to calculate the prediction.  expansion of the temporal relations by including more temporal relations, such as until, since, next, and so forth, to create a richer collection of useful temporal relations. Sample of the best rules observed in a real smart environment dataset: Activity=C11 Relation=CONTAINS 36 ==> Activity=A14 36 Activity=D15 Relation=FINISHES 32 ==> Activity=D9 32 Activity=D15 Relation=FINISHESBY 32 ==> Activity=D9 32 Activity=C14 Relation=DURING 18 ==> Activity=B9 18