Behavior Detection Using Confidence Intervals of Hidden Markov Models

Markov models are commonly used to analyze real-world problems. Their combination of discrete states and stochastic transitions is suited to applications with deterministic and stochastic components. Hidden Markov models (HMMs) are a class of Markov models commonly used in pattern recognition. Currently, HMMs recognize patterns using a maximum-likelihood approach. One major drawback with this approach is that data observations are mapped to HMMs without considering the number of data samples available. Another problem is that this approach is only useful for choosing between HMMs. It does not provide a criterion for determining whether or not a given HMM adequately matches the data stream. In this paper, we recognize complex behaviors using HMMs and confidence intervals. The certainty of a data match increases with the number of data samples considered. Receiver operating characteristic curves are used to find the optimal threshold for either accepting or rejecting an HMM description. We present one example using a family of HMMs to show the utility of the proposed approach. A second example using models extracted from a database of consumer purchases provides additional evidence that this approach can perform better than existing techniques.

[1]  Alain Biem,et al.  Minimum classification error training for online handwriting recognition , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  James P. Crutchfield,et al.  An Algorithm for Pattern Discovery in Time Series , 2002, ArXiv.

[3]  Sung-Bae Cho,et al.  Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.

[4]  Biing-Hwang Juang,et al.  Discriminative learning for minimum error classification [pattern recognition] , 1992, IEEE Trans. Signal Process..

[5]  Sudeep Sarkar,et al.  Effect of silhouette quality on hard problems in gait recognition , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[6]  L. Baum,et al.  An inequality with applications to statistical estimation for probabilistic functions of Markov processes and to a model for ecology , 1967 .

[7]  Daniel Ray Upper,et al.  Theory and algorithms for hidden Markov models and generalized hidden Markov models , 1998 .

[8]  James Bennett,et al.  The Netflix Prize , 2007 .

[9]  Mohammed J. Zaki,et al.  Mining residue contacts in proteins using local structure predictions , 2000, Proceedings IEEE International Symposium on Bio-Informatics and Biomedical Engineering.

[10]  A. Agresti,et al.  Approximate is Better than “Exact” for Interval Estimation of Binomial Proportions , 1998 .

[11]  L. Baum,et al.  Growth transformations for functions on manifolds. , 1968 .

[12]  Donghyun Kim,et al.  Linear Spectral Transformation for Robust Speech Recognition Using Maximum Mutual Information , 2007, IEEE Signal Processing Letters.

[13]  Kristina Lisa Shalizi,et al.  Pattern Discovery in Time Series, Part I: Theory, Algorithm, Analysis, and Convergence , 2002 .

[14]  Kaizhu Huang,et al.  Imbalanced learning with a biased minimax probability machine , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[15]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .

[16]  Li Min,et al.  A Network-wide Traffic Anomaly Detection Method Based on HSMM , 2006, 2006 International Conference on Communications, Circuits and Systems.

[17]  Qu Dan,et al.  Discriminative training of GMM based on Maximum Mutual Information for language identification , 2006, 2006 6th World Congress on Intelligent Control and Automation.

[18]  H. Kobayashi,et al.  An efficient forward-backward algorithm for an explicit-duration hidden Markov model , 2003, IEEE Signal Processing Letters.

[19]  Lawrence R. Rabiner,et al.  A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.

[20]  K. Kiguchi,et al.  Modular fuzzy-neuro controller driven by spoken language commands , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[21]  David Goldberg,et al.  What every computer scientist should know about floating-point arithmetic , 1991, CSUR.

[22]  Jin Hyung Kim,et al.  Network-based approach to online cursive script recognition , 1999, IEEE Trans. Syst. Man Cybern. Part B.

[23]  Naonori Ueda,et al.  Exploitation of Unlabeled Sequences in Hidden Markov Models , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[24]  S. Katagiri,et al.  Discriminative Learning for Minimum Error Classification , 2009 .

[25]  Bernadette Dorizzi,et al.  On Using the Viterbi Path Along With HMM Likelihood Information for Online Signature Verification , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[26]  L. Baum,et al.  A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains , 1970 .

[27]  R. John Linear Statistical Models: An Applied Approach , 1986 .

[28]  L. Brown,et al.  Interval Estimation for a Binomial Proportion , 2001 .

[29]  Yangsheng Xu,et al.  Human action learning via hidden Markov model , 1997, IEEE Trans. Syst. Man Cybern. Part A.

[30]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[31]  Radford M. Neal Pattern Recognition and Machine Learning , 2007, Technometrics.