Discovering and Tracking Patterns of Interest in Security Sensor Streams

Sensors can be used in a variety of settings to monitor the well-being of the environment and its occupants. In a home setting, sensor data can be analyzed to assess and promote the well-being of the residents. Sensor data can also be analyzed in home and industrial settings to ensure the safety and security of the residents and the premises. Using sensor data supplied by a smart environment, this chapter describes how our algorithms automatically discover recurring patterns from sensor streams and use the pattern definitions to identify normal and abnormal behavior in the setting. We demonstrate and evaluate our techniques using data collected from several smart home testbeds.

[1]  Vincent Rialle,et al.  What Do Family Caregivers of Alzheimer’s Disease Patients Desire in Smart Home Technologies? , 2009, Methods of Information in Medicine.

[2]  Hani Hagras,et al.  A fuzzy embedded agent-based approach for realizing ambient intelligence in intelligent inhabited environments , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[3]  Eamonn J. Keogh,et al.  Clustering of time-series subsequences is meaningless: implications for previous and future research , 2004, Knowledge and Information Systems.

[4]  Ping-Yu Hsu,et al.  Mining hybrid sequential patterns and sequential rules , 2002, Inf. Syst..

[5]  Diane J. Cook,et al.  Improving home automation by discovering regularly occurring device usage patterns , 2003, Third IEEE International Conference on Data Mining.

[6]  Gregory D. Abowd,et al.  Designing for the Human Experience in Smart Environments , 2005 .

[7]  Diane J. Cook,et al.  Keeping the Resident in the Loop: Adapting the Smart Home to the User , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[8]  Mohammed J. Zaki,et al.  ADMIT: anomaly-based data mining for intrusions , 2002, KDD.

[9]  B. Kröse,et al.  Bayesian Activity Recognition in Residence for Elders , 2007 .

[10]  Henry A. Kautz,et al.  Inferring activities from interactions with objects , 2004, IEEE Pervasive Computing.

[11]  Ramakrishnan Srikant,et al.  Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.

[12]  Jiong Yang,et al.  Towards automatic clustering of protein sequences , 2002, Proceedings. IEEE Computer Society Bioinformatics Conference.

[13]  Jesús Favela,et al.  Activity Recognition for the Smart Hospital , 2008, IEEE Intelligent Systems.

[14]  Gunnar Rätsch,et al.  An Introduction to Boosting and Leveraging , 2002, Machine Learning Summer School.

[15]  Stan Sclaroff,et al.  Sign Language Spotting with a Threshold Model Based on Conditional Random Fields , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[16]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[17]  Qiang Yang,et al.  Sensor-Based Abnormal Human-Activity Detection , 2008, IEEE Transactions on Knowledge and Data Engineering.

[18]  Mohammed J. Zaki,et al.  PlanMine: Sequence Mining for Plan Failures , 1998, KDD.

[19]  J. A. Hartigan,et al.  A k-means clustering algorithm , 1979 .

[20]  Jian Pei,et al.  Constraint-based sequential pattern mining: the pattern-growth methods , 2007, Journal of Intelligent Information Systems.

[21]  Bill N. Schilit,et al.  Activity Recognition for the Digital Home , 2008, Computer.

[22]  Emmanuel Munguia Tapia,et al.  Toward Scalable Activity Recognition for Sensor Networks , 2006, LoCA.

[23]  Karen L. Courtney,et al.  Brief Review: Defining Obtrusiveness in Home Telehealth Technologies: A Conceptual Framework , 2006, J. Am. Medical Informatics Assoc..

[24]  J. Rissanen,et al.  Modeling By Shortest Data Description* , 1978, Autom..

[25]  Yoram Singer,et al.  Improved Boosting Algorithms Using Confidence-rated Predictions , 1998, COLT' 98.

[26]  Jian Lu,et al.  epSICAR: An Emerging Patterns based approach to sequential, interleaved and Concurrent Activity Recognition , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[27]  Misha Pavel,et al.  Distributed Healthcare: Simultaneous Assessment of Multiple Individuals , 2007, IEEE Pervasive Computing.

[28]  Qiming Chen,et al.  PrefixSpan,: mining sequential patterns efficiently by prefix-projected pattern growth , 2001, Proceedings 17th International Conference on Data Engineering.

[29]  Martha E. Pollack,et al.  Intelligent Technology for an Aging Population: The Use of AI to Assist Elders with Cognitive Impairment , 2005, AI Mag..

[30]  B. Reisberg,et al.  The Alzheimer's Disease Activities of Daily Living International Scale (ADL-IS) , 2001, International Psychogeriatrics.

[31]  Tom Fawcett,et al.  An introduction to ROC analysis , 2006, Pattern Recognit. Lett..

[32]  Donald E. Brown,et al.  Health-status monitoring through analysis of behavioral patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[33]  Daniel P. Siewiorek,et al.  Activity recognition and monitoring using multiple sensors on different body positions , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[34]  Henry A. Kautz,et al.  An Overview of the Assisted Cognition Project , 2002 .

[35]  J. Barbenel,et al.  The efficacy of an intelligent cognitive orthosis to facilitate handwashing by persons with moderate to severe dementia , 2004 .

[36]  Oliver Brdiczka,et al.  Detecting Individual Activities from Video in a Smart Home , 2007, KES.

[37]  Inge Jonassen,et al.  Fast Sequence Clustering Using A Suffix Array Algorithm , 2003, Bioinform..

[38]  Diane J. Cook,et al.  MavHome: an agent-based smart home , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[39]  Diane J Cook,et al.  Assessing the Quality of Activities in a Smart Environment , 2009, Methods of Information in Medicine.

[40]  Henry A. Kautz,et al.  Location-Based Activity Recognition using Relational Markov Networks , 2005, IJCAI.

[41]  Catherine A. Sugar,et al.  Finding the Number of Clusters in a Dataset , 2003 .

[42]  Andrew J. Viterbi,et al.  Error bounds for convolutional codes and an asymptotically optimum decoding algorithm , 1967, IEEE Trans. Inf. Theory.

[43]  Yoav Freund,et al.  A decision-theoretic generalization of on-line learning and an application to boosting , 1997, EuroCOLT.

[44]  W. Eric L. Grimson,et al.  Learning Patterns of Activity Using Real-Time Tracking , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[45]  William C. Mann,et al.  The Gator Tech Smart House: a programmable pervasive space , 2005, Computer.

[46]  G. W. Milligan,et al.  An examination of procedures for determining the number of clusters in a data set , 1985 .

[47]  S Szewcyzk,et al.  Annotating smart environment sensor data for activity learning. , 2009, Technology and health care : official journal of the European Society for Engineering and Medicine.

[48]  Kent Larson,et al.  Activity Recognition in the Home Using Simple and Ubiquitous Sensors , 2004, Pervasive.

[49]  Ozioma C. Okonkwo,et al.  Mild cognitive impairment and everyday function: evidence of reduced speed in performing instrumental activities of daily living. , 2008 .

[50]  Anne Laurent,et al.  S2MP: Similarity Measure for Sequential Patterns , 2008, AusDM.