Towards improving feature extraction and classification for activity recognition on streaming data

Published on Apr 1, 2017in Journal of Ambient Intelligence and Humanized Computing7.104
路 DOI :10.1007/S12652-016-0412-1
Nawel Yala3
Estimated H-index: 3
,
Belkacem Fergani9
Estimated H-index: 9
,
Anthony Fleury22
Estimated H-index: 22
(university of lille)
Sources
Abstract
An activity recognition system on streaming data must analyze the drift in the sensing values and, at any significant change detected, decide if there is a change in the activity performed by the person. The performances of such system depend on both the feature extraction (FE) and the classification stages in the context of streaming data. In the context of streaming and high imbalanced data, this paper proposes and evaluates three FE methods in conjunction with five classification techniques. Our results on public smart home streaming data show better performances for our proposed methods comparing to the state-of-the-art baseline techniques in terms of classification accuracy, F-measure and computational time. Test on Aruba Database show an improvement in term of accuracy and computation time of the results when using the proposed method, using a KNN-based classifier (both around 87 % of correct classification but with a largely higher computing time for SVM).
Figures & Tables
Download
馃摉 Papers frequently viewed together
2016IDA: Intelligent Data Analysis
References19
Newest
#1Nawel YalaH-Index: 3
#2Belkacem FerganiH-Index: 9
Last. Anthony Fleury (university of lille)H-Index: 22
view all 3 authors...
An online recognition system must analyze the changes in the sensing data and at any significant detection; it has to decide if there is a change in the activity performed by the person. Such a system can use the previous sensor readings for decision-making (decide which activity is performed), without the need to wait for future ones. This paper proposes an approach of human activity recognition on online sensor data. We present four methods used to extract features from the sequence of sensor ...
Source
#1Narayanan C. Krishnan (WSU: Washington State University)H-Index: 18
#2Diane J. Cook (WSU: Washington State University)H-Index: 77
Many real-world applications that focus on addressing needs of a human, require information about the activities being performed by the human in real-time. While advances in pervasive computing have led to the development of wireless and non-intrusive sensors that can capture the necessary activity information, current activity recognition approaches have so far experimented on either a scripted or pre-segmented sequence of sensor events related to activities. In this paper we propose and evalua...
Source
#1Liang Wang (University of Southern Denmark)H-Index: 108
#2Tao Gu (University of Southern Denmark)H-Index: 33
Last. Jian Lu (NU: Nanjing University)H-Index: 28
view all 4 authors...
Real-time activity recognition in body sensor networks is an important and challenging task. In this paper, we propose a real-time, hierarchical model to recognize both simple gestures and complex activities using a wireless body sensor network. In this model, we first use a fast and lightweight algorithm to detect gestures at the sensor node level, and then propose a pattern based real-time algorithm to recognize complex, high-level activities at the portable device level. We evaluate our algor...
Source
May 24, 2011 in KDD (Knowledge Discovery and Data Mining)
#1Yuxuan Li (RMIT: RMIT University)H-Index: 4
#2Xiuzhen Zhang (RMIT: RMIT University)H-Index: 23
A k nearest neighbor (kNN) classifier classifies a query instance to the most frequent class of its k nearest neighbors in the training instance space. For imbalanced class distribution, a query instance is often overwhelmed by majority class instances in its neighborhood and likely to be classified to the majority class. We propose to identify exemplar minority class training instances and generalize them to Gaussian balls as concepts for the minority class. Our k Exemplar-based Nearest Neighbo...
Source
#1Chih-Chung Chang (NTU: National Taiwan University)H-Index: 6
#2Chih-Jen Lin (NTU: National Taiwan University)H-Index: 65
LIBSVM is a library for Support Vector Machines (SVMs). We have been actively developing this package since the year 2000. The goal is to help users to easily apply SVM to their applications. LIBSVM has gained wide popularity in machine learning and many other areas. In this article, we present all implementation details of LIBSVM. Issues such as solving SVM optimization problems theoretical convergence multiclass classification probability estimates and parameter selection are discussed in deta...
Source
#1Andrzej Pronobis (KTH: Royal Institute of Technology)H-Index: 19
#2Luo Jie (EPFL: 脡cole Polytechnique F茅d茅rale de Lausanne)H-Index: 8
Last. Barbara Caputo (Idiap Research Institute)H-Index: 55
view all 3 authors...
The capability to learn from experience is a key property for autonomous cognitive systems working in realistic settings. To this end, this paper presents an SVM-based algorithm, capable of learning model representations incrementally while keeping under control memory requirements. We combine an incremental extension of SVMs [43] with a method reducing the number of support vectors needed to build the decision function without any loss in performance [15] introducing a parameter which permits a...
Source
#1Karl Ni (UCSD: University of California, San Diego)H-Index: 11
#2Truong Q. Nguyen (UCSD: University of California, San Diego)H-Index: 59
We propose an image interpolation algorithm that is nonparametric and learning-based, primarily using an adaptive k-nearest neighbor algorithm with global considerations through Markov random fields. The empirical nature of the proposed algorithm ensures image results that are data-driven and, hence, reflect ldquoreal-worldrdquo images well, given enough training data. The proposed algorithm operates on a local window using a dynamic k -nearest neighbor algorithm, where k differs from pixel to p...
Source
#1Tao Gu (Institute for Infocomm Research Singapore)H-Index: 33
#2Zhanqing Wu (NU: Nanjing University)H-Index: 3
Last. Jian Lu (NU: Nanjing University)H-Index: 28
view all 5 authors...
Recognizing human activities from sensor readings has recently attracted much research interest in pervasive computing. This task is particularly challenging because human activities are often performed in not only a simple (i.e., sequential), but also a complex (i.e., interleaved and concurrent) manner in real life. In this paper, we propose a novel Emerging Patterns based approach to Sequential, Interleaved and Concurrent Activity Recognition (epSICAR). We exploit Emerging Patterns as powerful...
Source
#1Enrico Blanzieri (University of Trento)H-Index: 26
#2Farid Melgani (University of Trento)H-Index: 50
In this paper, we present a new variant of the k-nearest neighbor (kNN) classifier based on the maximal margin principle. The proposed method relies on classifying a given unlabeled sample by first finding its k-nearest training samples. A local partition of the input feature space is then carried out by means of local support vector machine (SVM) decision boundaries determined after training a multiclass SVM classifier on the considered k training samples. The labeling of the unknown sample is ...
Source
#1Zacharias Voulgaris (Lond: University of London)H-Index: 1
#2George D. Magoulas (Lond: University of London)H-Index: 32
The k Nearest Neighbour (kNN) method is a widely used technique which has found several applications in clustering and classification. In this paper, we focus on classification problems and we propose modifications of the nearest neighbour method that exploit information from the structure of a dataset. The results of our experiments using datasets from the UCI repository demonstrate that the classifiers produced perform generally better than the classic kNN and are more reliable, without being ...
Cited By29
Newest
#1Chanpreet Kaur (G.N.D.U.: Guru Nanak Dev University)
#2Prabhpreet Kaur (G.N.D.U.: Guru Nanak Dev University)H-Index: 7
Deep learning for the use of human activity detection in smart homes is predicted by the use of this work. Feature extraction and predicting further movement are a challenge, and one-time prediction at a particular time is possible. To accomplish, this RNN with HAR feature extraction is accomplished within the deep learning mechanism. The critical features are extracted at first place, and the rest of the features are extracted only if required. This process identifies the activities at a much f...
Source
#1Tan-Hsu Tan (NTUT: National Taipei University of Technology)H-Index: 18
#2Luubaatar Badarch (Mongolian University of Science and Technology)H-Index: 2
Last. Jun-Wei Hsieh (NCTU: National Chiao Tung University)H-Index: 26
view all 6 authors...
The recent growth of the elderly population has led to the requirement for constant home monitoring as solitary living becomes popular. This protects older people who live alone from unwanted instances such as falling or deterioration caused by some diseases. However, although wearable devices and camera-based systems can provide relatively precise information about human motion, they invade the privacy of the elderly. One way to detect the abnormal behavior of elderly residents under the condit...
Source
#1Yu Min Hwang (Electronics and Telecommunications Research Institute)
#2Sangjun Park (Electronics and Telecommunications Research Institute)H-Index: 3
Last. Byung-Tak Lee (Electronics and Telecommunications Research Institute)H-Index: 5
view all 5 authors...
We propose a novel data-driven feature extraction approach based on direct causality and fuzzy temporal windows (FTWs) to improve the precision of human activity recognition and mitigate the problems of easily-confused activities and unlabeled data, which significantly degrade classification performance owing to the correlation of labeled data. In recognizing activities, the proposed approach not only considers the importance of oncoming short-term sensor data but also considers the continuity f...
Source
#1Rui Hua (A&M: Texas A&M University)H-Index: 3
#2Ya Wang (A&M: Texas A&M University)H-Index: 17
Foot motion recognition in daily life faces two challenges imposed by traditional machine learning frameworks: how to robustly recognize various foot motions from continuous movements in uncontrolled environments, and how to accurately extract ground truths. To address these challenges, in this paper, we propose a stride detection method to robustly identify each stride (over 99% accuracy). We then investigate two weak supervision-based fast labeling frameworks to automatically label the stride ...
Source
#1Tanzila Saba (Prince Sultan University)H-Index: 56
#2Amjad Rehman (Prince Sultan University)H-Index: 50
Last. Muhammad Sharif (CUI: COMSATS Institute of Information Technology)H-Index: 24
view all 6 authors...
Intelligent visual surveillance systems are attracting much attention from research and industry. The invention of smart surveillance cameras with greater processing power has now been the leading stakeholder, making it conceivable to design intelligent visual surveillance systems. It is possible to assure the safety of people in both homes and public places. This work aims to distinguish the suspicious activities for surveillance environments. For this, a 63 layers deep CNN model is suggested a...
Source
#1Chi Cheng (THU: Tsinghua University)
#2Sheng Zhang (THU: Tsinghua University)
Source
#1Taiba WaniH-Index: 2
#2Teddy Surya GunawanH-Index: 16
Last. Eliathamby AmbikairajahH-Index: 30
view all 5 authors...
During the last decade, Speech Emotion Recognition (SER) has emerged as an integral component within Human-computer Interaction (HCI) and other high-end speech processing systems. Generally, an SER system targets the speaker鈥檚 existence of varied emotions by extracting and classifying the prominent features from a preprocessed speech signal. However, the way humans and machines recognize and correlate emotional aspects of speech signals are quite contrasting quantitatively and qualitatively, whi...
Source
Enormous amount of text documents that contains requirements expressed in form of unstructured text are obtained in big software development projects and they have to be transformed into structured documents. Collecting requirements from such huge volume of informal text is still a key mission to be achieved. The majority of the software requirements data that are available to software engineers are articulated in form of Natural Language text and there is no formal grammar or specified syntax a...
Source
#1Zimin Xu (SYSU: Sun Yat-sen University)H-Index: 1
#2Guoli Wang (SYSU: Sun Yat-sen University)H-Index: 24
Last. Xuemei Guo (SYSU: Sun Yat-sen University)H-Index: 13
view all 3 authors...
Abstract With the acceleration of aging process of population structure, the single resident lifestyle is increasing on account of the high cost of care services and the privacy invasion concern. It is essential to monitor the activities of solitary elderly to find the emergency and lifestyle deviation, as independent life cannot be maintained due to physical or mental problems. The unobtrusive systems are the most preferred choice for the real-life long-term monitoring, while the camera and wea...
Source
#1Sharipuddin (Sriwijaya University)H-Index: 1
#2Benni Purnama (Sriwijaya University)H-Index: 3
Last. Rahmat Budiarto (Al Baha University)H-Index: 13
view all 8 authors...
Feature extraction solves the problem of finding the most efficient and comprehensive set of features. A Principle Component Analysis (PCA) feature extraction algorithm is applied to optimize the effectiveness of feature extraction to build an effective intrusion detection method. This paper uses the Principal Components Analysis (PCA) for features extraction on intrusion detection system with the aim to improve the accuracy and precision of the detection. The impact of features extraction to at...
Source
This website uses cookies.
We use cookies to improve your online experience. By continuing to use our website we assume you agree to the placement of these cookies.
To learn more, you can find in our Privacy Policy.