Exploiting Semantics for Sensor Re-Calibration in Event Detection Systems Ronen Vaisenberg, Shengyue Ji, Bijit Hore, Sharad Mehrotra and Nalini Venkatasubramanian.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Pat Langley Computational Learning Laboratory Center for the Study of Language and Information Stanford University, Stanford, California
Change-Point Detection Techniques for Piecewise Locally Stationary Time Series Michael Last National Institute of Statistical Sciences Talk for Midyear.
Energy Efficient Data Collection In Distributed Sensor Environments Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian {qhan, sharad,
Matthias Wimmer, Bernd Radig, Michael Beetz Chair for Image Understanding Computer Science TU München, Germany A Person and Context.
A System to Generate Test Data and Symbolically Execute Programs Lori A. Clarke September 1976.
Road-Sign Detection and Recognition Based on Support Vector Machines Saturnino, Sergio et al. Yunjia Man ECG 782 Dr. Brendan.
Kien A. Hua Division of Computer Science University of Central Florida.
Sensor-Based Abnormal Human-Activity Detection Authors: Jie Yin, Qiang Yang, and Jeffrey Junfeng Pan Presenter: Raghu Rangan.
New Kind of Logic The first step to approch this questions consists of a new definition of logic operators able to explain the richness of the events happened.
Patch to the Future: Unsupervised Visual Prediction
Models and Security Requirements for IDS. Overview The system and attack model Security requirements for IDS –Sensitivity –Detection Analysis methodology.
1 SAFIRE Project DHS Update – July 15, 2009 Introductions  Update since last teleconference Demo Video - Fire Incident Command Board (FICB) SAFIRE Streams.
 Firewalls and Application Level Gateways (ALGs)  Usually configured to protect from at least two types of attack ▪ Control sites which local users.
Design and Implementation of a Middleware for Sentient Spaces Bijit Hore, Hojjat Jafarpour, Ramesh Jain, Shengyue Ji, Daniel Massaguer Sharad Mehrotra,
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
CS292 Computational Vision and Language Pattern Recognition and Classification.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
A Study of Approaches for Object Recognition
Detecting and Tracking Moving Objects for Video Surveillance Isaac Cohen and Gerard Medioni University of Southern California.
Jessica Lin, Eamonn Keogh, Stefano Loardi
Towards a Learning Incident Detection System ICML 06 Workshop on Machine Learning for Surveillance and Event Detection June 29, 2006 Tomas Singliar Joint.
Hand Movement Recognition By: Tokman Niv Levenbroun Guy Instructor: Todtfeld Ari.
Programming Fundamentals (750113) Ch1. Problem Solving
Energy-efficient Self-adapting Online Linear Forecasting for Wireless Sensor Network Applications Jai-Jin Lim and Kang G. Shin Real-Time Computing Laboratory,
HDM-4 Calibration. 2 How well the available data represent the real conditions to HDM How well the model’s predictions fit the real behaviour and respond.
CS Machine Learning. What is Machine Learning? Adapt to / learn from data  To optimize a performance function Can be used to:  Extract knowledge.
EE513 Audio Signals and Systems Statistical Pattern Classification Kevin D. Donohue Electrical and Computer Engineering University of Kentucky.
1. Introduction Generally Intrusion Detection Systems (IDSs), as special-purpose devices to detect network anomalies and attacks, are using two approaches.
Extracting Places and Activities from GPS Traces Using Hierarchical Conditional Random Fields Yong-Joong Kim Dept. of Computer Science Yonsei.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2007 (TPDS 2007)
Layered Approach using Conditional Random Fields For Intrusion Detection.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
3D SLAM for Omni-directional Camera
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
MURI: Integrated Fusion, Performance Prediction, and Sensor Management for Automatic Target Exploitation 1 Dynamic Sensor Resource Management for ATE MURI.
1 Machine Learning 1.Where does machine learning fit in computer science? 2.What is machine learning? 3.Where can machine learning be applied? 4.Should.
Maximum Entropy (ME) Maximum Entropy Markov Model (MEMM) Conditional Random Field (CRF)
Building Simulation Model In this lecture, we are interested in whether a simulation model is accurate representation of the real system. We are interested.
Tracking and event recognition – the Etiseo experience Son Tran, Nagia Ghanem, David Harwood and Larry Davis UMIACS, University of Maryland.
Distributed Models for Decision Support Jose Cuena & Sascha Ossowski Pesented by: Gal Moshitch & Rica Gonen.
CS 1120: Computer Science II Software Life Cycle Slides courtesy of: Prof. Ajay Gupta and Prof. James Yang (format and other minor modifications by by.
GENDER AND AGE RECOGNITION FOR VIDEO ANALYTICS SOLUTION PRESENTED BY: SUBHASH REDDY JOLAPURAM.
At what level do I trust the outcomes of the model? Verification Calibration Validation Exploration of the model structure. the activity of adjusting the.
1 Chapter 17 2 nd Part Making Complex Decisions --- Decision-theoretic Agent Design Xin Lu 11/04/2002.
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Refined Online Citation Matching and Adaptive Canonical Metadata Construction CSE 598B Course Project Report Huajing Li.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
An unsupervised conditional random fields approach for clustering gene expression time series Chang-Tsun Li, Yinyin Yuan and Roland Wilson Bioinformatics,
Recalibration Problem Virtual Sensors (VS’s) Detect Events E.g., Coffee Level Rescue Kitchen, West-East Traffic light Next to Calit(2). VS-Output Coffee.
Pattern Recognition. What is Pattern Recognition? Pattern recognition is a sub-topic of machine learning. PR is the science that concerns the description.
Kalman Filter and Data Streaming Presented By :- Ankur Jain Department of Computer Science 7/21/03.
An E-Textiles. Virginia Tech e-Textiles Group Design of an e-textile computer architecture – Networking – Fault tolerance – Power aware – Programming.
IOT – Firefighting Example
CS201 Lecture 02 Computer Vision: Image Formation and Basic Techniques
Supervised Time Series Pattern Discovery through Local Importance
Structured Analysis and Dataflow Diagrams
Machine Learning Basics
Liang Chen Advisor: Gagan Agrawal Computer Science & Engineering
Chapter 10 Verification and Validation of Simulation Models
Programming Fundamentals (750113) Ch1. Problem Solving
System Testing.
Maintaining order and safety in a city is no small task
Presented By: Darlene Banta
Exploiting Semantics for Event Detection Systems
Programming with data Lecture 3
Airport Parking Space Navigation
M. Kezunovic (P.I.) S. S. Luo D. Ristanovic Texas A&M University
Introduction to Artificial Intelligence Instructor: Dr. Eduardo Urbina
Presentation transcript:

Exploiting Semantics for Sensor Re-Calibration in Event Detection Systems Ronen Vaisenberg, Shengyue Ji, Bijit Hore, Sharad Mehrotra and Nalini Venkatasubramanian School of Information and Computer Sciences University of California - Irvine

Outline  Motivation – Self Managed Sensors  Event detection systems  Task  Challenge  Our approach  Exploiting semantics in Event Detection Systems  Algorithms  Analysis  Experiments and results

Motivation – Self Managed Sensors Managing Networks of Sensors can be very Challenging when sensors are: Distant and isolated Deployed in Large numbers Human intervention is not desirable.

Example 1 – Isolated/Distant Sensors Microwave radio-meters are used to provide continuous measurements of integrated water vapor (IWV) and integrated liquid water (ILW). Deployed in isolation. (Rural Oklahoma and Kansas, the north slope of Alaska). Physical changes in the sensor: Operates Based on mirrors that tend to slip as much as 1 degree on their stepper motor shafts due to continuous use. Human intervention is not desirable, Too far for frequent visits

The Task – Geographically Distributed Sensors Traffic sensors are to collect accurate reads of the current traffic on state roads.

Example 2 – Correct Functioning is a Matter of Life or Death Collect accurate reads of the pressure under the bridge and in strategic points to detect dangerous pressure levels. Pressure sensors need to accurately reset “zero” pressure. Human intervention is not desirable, can’t wait until technician becomes available

Example 3 – Network with Large Number of Video Sensors Video surveillance systems are being used in a variety of public spaces such as metro stations, airports, shipping docks, etc.

The Challenge: Inner-Sensor Change Physical Changes in the System The detection algorithm in the ARM microwave radio-meter has to adjust to changes in the physical location of its mirrors that tend to slip as much as 1 degree on their stepper motor shafts due to continuous use.

Example 3 – Network with Large Number of Video Sensors (Cont.) Changes in the field of view Human intervention is not desirable, Too many cameras

Outline  Motivation – Self Managed Sensors  Event detection systems  Task  Challenge  Our approach  Exploiting semantics in Event Detection Systems  Algorithms  Analysis  Experiments and results

The System Monitored – The context: Event Detection Systems (EDS) The fundamental concept underlying EDS’s is the gathering, managing, analyzing, and interpreting of different information streams in a timely manner to recognize potential incidents early enough to respond effectively. In most cases, event detection systems gather streams from sensors. Each sensor monitors a system of interest. This system can be modeled.

The System Monitored – The Modeling: Finite State Machine Many systems of interest and observed environments can be modeled as Finite State Machines. For example: Level of pressure (“Critical", ”High", “Medium", “Low") on the foundations of a bridge are of crucial importance to maintenance authorities. Traffic light states (“Red”, “Orange”, ”Green”)

The Sensor’s Task Event Detection Task Given an FSM representation of a system, containing states S={s 1..s n } generate an accurate time-series:

Coffee-Level Example – A More Complicated System Application: detect when there is fresh coffee. Can be modeled as a finite state machine Challenge: changes in view.

System Evolution – Change of Camera Example of Small Change of View State A State B State C State D Timeline System Evolution Time State A State D

The Challenge: Recover from “System Evolution” State A State B State C State D Timeline System Evolution Time State A State B State D State C

The Challenge Formally How can we perform autonomous re- calibration under a generic setting assumption? Video data: General purpose object recognition proves to be very limited... And even if you detect the object, how would you translate sensed features to different states. Other streams: What is an object? How to search for a system of interest.

Semantics to the rescue Semantics (one of the definitions) The meanings assigned to symbols and sets of symbols in a language. If a computer understands the semantics of a system, it understands the meaning, rather than just interpreting a set of features.

The Proposed Solution State A State B State C State D Timeline System Evolution Time State A State B State D State C

Semantic Model States of the FSM: Red, Orange, Green) State transition: {G->O,O->R,R->G} Semantics used for re-calibration: transition times between states should be in [avg-2std, avg+2std]. AvgStdavg-2stdavg+2std G->O O->R R->G

Fireflies – Exploiting Semantics in Nature Semantics are used by fireflies to search for the best mate. Source: BBC Transition time between “on” and “off” should be in: (0,maxTime]

Directory  Motivation – Self Managed Sensors  Event detection systems  Task  Challenge  Our approach  Exploiting semantics in Event Detection Systems  Algorithms  Analysis  Experiments and results

Information Flow – Regular Detection Process Perform State Detection User Specified Prediction Parameters Time Series State Data Real Time Image Input OutputSensingAuxiliary Services Extract Features Parameterized Prediction State A State B State C State D ….. t i =“Red”

Information Flow – Semantics Based Detection Process Perform State Detection User Specified Prediction Parameters Time Series State Data Real Time Image Input OutputSensingAuxiliary Services Extract Features Parameterized Prediction State A State B State C State D Sliding Window of Images ….. t i =“Red” Manage Semantic Module System Evolution Occurred Detect System Evolution No Perform Recalibration Yes Auto Generated Parameters Semantic State A State B State D State C

Parameter Recalibration Search in the space of parameters for new parameters that optimize consistency of the stream generated with the model. Forall p 1,p 2,..,p n do Use p 1, p 2,..,p n to generate a new stream based on features in the buffer Evaluate the previous stream against the semantic model return p 1,p 2,…,p n if consistent

DEMO: Searching for the correct field of view Using Semantics Only Search in the space of parameters for new parameters that optimize consistency of the stream generated with the model. Forall p 1,p 2,..,p n do Use p 1, p 2,..,p n to generate a new stream based on features in the buffer Evaluate the previous stream against the semantic model return p 1,p 2,…,p n if consistent Forall different fields of view do Extract features from the field of view from all images in buffer. Cluster features extracted to m clusters (m is the number of states). Forall possible m! state assignments to the different states do Use labeled centroids of clusters to generate a new state stream Evaluate the previous stream against the semantic model return p 1,p 2,…,p n if consistent

Detect System Evolution Evaluate the consistency of the last M time series data elements generated using current prediction model. The consistency value found in the previous step is compared to a predefined threshold. Forall (M) State Transitions (s i →s j ) determined based on features in buffer do avg ← get average transition time from model for ( s i →s j ) stdv ← get standard deviation time from model for (si→sj) If transition time for (s i →s j ) is not in [avg-2*stdv, avg+2*stdv] faults++ if faults/(number of State Transitions)>threshold declare “system evolution”

Probabilistic Analysis – Probability to avoid re-calibration under normal operation (No System Evolution) Probability of the observations collected in the WindowBuffer to have less than C=ThresholdConsistent percent of deviations observing a system with p = 4.4% probability to generate a transition outside the 2 stdv range.

Analysis After a system evolution is declared at timedetected, we know evolution happened before timedetected. The problem is we don't know exactly when. Since we want to search for new parameters only for the evolved state, we propose waiting until WindowBuffer contains only features that were recorded after timedetected before engaging in the re-calibration phase. System at New State Actual System Evolution Time System at Old State Sliding Window Time of Evolution Detection Sliding Window

Experimental Results - Coffee-Level Detection Data Collection Two cameras: From June 11 th to June 13 th Record an image when changes are detected anywhere in view 1174 images (60MB) were collected Number of actual transition transitions: 203 Bounding box adjusted correctly in both cameras when changed to make the prediction algorithm confuse two states Empty↔Off Empty↔Half-Full

Experimental Results - Coffee-Level Detection After semantic based calibration, detection is much more accurate

Future Work Multi sensor systems Incorporating better models for anomaly detection Incorporating features in the process of re- calibration

Questions/Comments?