RFID-Based Personalized Behavior Modeling

In this research, we aim at building an intelligent system that can detect abnormal behavior for the elderly at home. Deployment of RFID tags at home helps us collect the daily movement data of the elderly. The clustering technique is then used to build a personalized model of normal behavior based on these RFID data. After the model is built, any incoming datum outside the model can be seen as abnormal. In this paper, we present the design of the system architecture and show the preliminary results for data collection and preprocessing.

[1]  Panos K. Chrysanthis,et al.  On indoor position location with wireless LANs , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[2]  Songmin Jia,et al.  Obstacle Recognition for a Mobile Robot in Indoor Environments using RFID and Stereo Vision , 2007, 2007 International Conference on Mechatronics and Automation.

[3]  C. A. Murthy,et al.  Unsupervised Feature Selection Using Feature Similarity , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[4]  Kai-Tai Song,et al.  Traffic monitoring based on real-time image tracking , 2003, 2003 IEEE International Conference on Robotics and Automation (Cat. No.03CH37422).

[5]  Michele Zorzi,et al.  Managing heterogeneous sensors and actuators in ubiquitous computing environments , 2007, SANET '07.

[6]  R.S. Sangwan,et al.  Using RFID tags for tracking patients, charts and medical equipment within an integrated health delivery network , 2005, Proceedings. 2005 IEEE Networking, Sensing and Control, 2005..

[7]  J. Hsu,et al.  Context-Aware Service Integration for Elderly Care in A Smart Environment , 2006 .

[8]  Melody Moh,et al.  A prototype on RFID and sensor networks for elder healthcare: progress report , 2005, E-WIND '05.

[9]  Chu-Hsing Lin,et al.  Anomaly Detection Using LibSVM Training Tools , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[10]  Andrew S. Miner,et al.  Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[11]  Pau-Choo Chung,et al.  A daily behavior enabled hidden Markov model for human behavior understanding , 2008, Pattern Recognit..

[12]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[13]  Howon Kim,et al.  A Design of Context aware Smart Home Safety Management using by Networked RFID and Sensor , 2007, IHN.

[14]  R. Oktem,et al.  Study of an RFID Based Moving Object Tracking System , 2007, 2007 1st Annual RFID Eurasia.

[15]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[16]  Wei Jiang,et al.  A Tracking Algorithm in RFID Reader Network , 2006, 2006 Japan-China Joint Workshop on Frontier of Computer Science and Technology.

[17]  Takashi Omori,et al.  Detection of unusual human behavior in intelligent house , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[18]  Jan Žižka,et al.  The Selection of Electronic Text Documents Supported by Only Positive Examples , 2006 .