首页 > 最新文献

Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers最新文献

英文 中文
Smartphone location identification and transport mode recognition using an ensemble of generative adversarial networks 智能手机位置识别和运输模式识别使用生成对抗网络的集合
Lukas Günthermann, Ivor Simpson, D. Roggen
We present a generative adversarial network (GAN) approach to recognising modes of transportation from smartphone motion sensor data, as part of our contribution to the Sussex-Huawei Locomotion-Transportation (SHL) recognition challenge 2020 as team noname. Our approach identifies the location where the smartphone of the test dataset is carried on the body through heuristics, after which a location-specific model is trained based on the available published data at this location. Performance on the validation data is 0.95, which we expect to be very similar on the test set, if our estimation of the location of the phone on the test set is correct. We are highly confident in this location estimation. If however it were wrong, an accuracy as low as 30% could be expected.
我们提出了一种生成对抗网络(GAN)方法,用于从智能手机运动传感器数据中识别交通方式,作为我们对2020年苏塞克斯-华为交通运输(SHL)识别挑战的贡献的一部分,作为团队名称。我们的方法通过启发式方法确定测试数据集的智能手机携带在身体上的位置,然后根据该位置的可用发布数据训练特定于位置的模型。验证数据上的性能为0.95,如果我们对手机在测试集上的位置的估计是正确的,我们期望在测试集上的性能非常相似。我们对这个位置估计非常有信心。然而,如果它是错误的,准确率可能会低至30%。
{"title":"Smartphone location identification and transport mode recognition using an ensemble of generative adversarial networks","authors":"Lukas Günthermann, Ivor Simpson, D. Roggen","doi":"10.1145/3410530.3414353","DOIUrl":"https://doi.org/10.1145/3410530.3414353","url":null,"abstract":"We present a generative adversarial network (GAN) approach to recognising modes of transportation from smartphone motion sensor data, as part of our contribution to the Sussex-Huawei Locomotion-Transportation (SHL) recognition challenge 2020 as team noname. Our approach identifies the location where the smartphone of the test dataset is carried on the body through heuristics, after which a location-specific model is trained based on the available published data at this location. Performance on the validation data is 0.95, which we expect to be very similar on the test set, if our estimation of the location of the phone on the test set is correct. We are highly confident in this location estimation. If however it were wrong, an accuracy as low as 30% could be expected.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79003937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Summary of the sussex-huawei locomotion-transportation recognition challenge 2020
Lin Wang, H. Gjoreski, Mathias Ciliberto, P. Lago, Kazuya Murao, Tsuyoshi Okita, D. Roggen
In this paper we summarize the contributions of participants to the third Sussex-Huawei Locomotion-Transportation (SHL) Recognition Challenge organized at the HASCA Workshop of UbiComp/ISWC 2020. The goal of this machine learning/data science challenge is to recognize eight locomotion and transportation activities (Still, Walk, Run, Bike, Bus, Car, Train, Subway) from the inertial sensor data of a smartphone in a user-independent manner with an unknown target phone position. The training data of a "train" user is available from smartphones placed at four body positions (Hand, Torso, Bag and Hips). The testing data originates from "test" users with a smartphone placed at one, but unknown, body position. We introduce the dataset used in the challenge and the protocol of the competition. We present a meta-analysis of the contributions from 15 submissions, their approaches, the software tools used, computational cost and the achieved results. Overall, one submission achieved F1 scores above 80%, three with F1 scores between 70% and 80%, seven between 50% and 70%, and four below 50%, with a latency of maximum of 5 seconds.
在本文中,我们总结了参与者在UbiComp/ISWC 2020的HASCA研讨会上组织的第三届suskes - huawei Locomotion-Transportation (SHL) Recognition Challenge中的贡献。这项机器学习/数据科学挑战的目标是在未知目标手机位置的情况下,以独立于用户的方式,从智能手机的惯性传感器数据中识别八种运动和交通活动(静止、步行、跑步、自行车、公共汽车、汽车、火车、地铁)。“训练”用户的训练数据可以通过放置在四种身体姿势(手、躯干、包和臀部)的智能手机获得。测试数据来自“测试”用户,他们将智能手机放在一个未知的身体位置。我们介绍了挑战赛中使用的数据集和比赛协议。我们对15篇论文的贡献、他们的方法、使用的软件工具、计算成本和取得的结果进行了荟萃分析。总体而言,F1得分在80%以上的有1份,在70% - 80%之间的有3份,在50% - 70%之间的有7份,在50%以下的有4份,延迟时间最长为5秒。
{"title":"Summary of the sussex-huawei locomotion-transportation recognition challenge 2020","authors":"Lin Wang, H. Gjoreski, Mathias Ciliberto, P. Lago, Kazuya Murao, Tsuyoshi Okita, D. Roggen","doi":"10.1145/3410530.3414341","DOIUrl":"https://doi.org/10.1145/3410530.3414341","url":null,"abstract":"In this paper we summarize the contributions of participants to the third Sussex-Huawei Locomotion-Transportation (SHL) Recognition Challenge organized at the HASCA Workshop of UbiComp/ISWC 2020. The goal of this machine learning/data science challenge is to recognize eight locomotion and transportation activities (Still, Walk, Run, Bike, Bus, Car, Train, Subway) from the inertial sensor data of a smartphone in a user-independent manner with an unknown target phone position. The training data of a \"train\" user is available from smartphones placed at four body positions (Hand, Torso, Bag and Hips). The testing data originates from \"test\" users with a smartphone placed at one, but unknown, body position. We introduce the dataset used in the challenge and the protocol of the competition. We present a meta-analysis of the contributions from 15 submissions, their approaches, the software tools used, computational cost and the achieved results. Overall, one submission achieved F1 scores above 80%, three with F1 scores between 70% and 80%, seven between 50% and 70%, and four below 50%, with a latency of maximum of 5 seconds.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79443735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Malware detection using artificial bee colony algorithm 利用人工蜂群算法进行恶意软件检测
F. Mohammadi, Farzan Shenavarmasouleh, M. Amini, H. Arabnia
Malware detection has become a challenging task due to the increase in the number of malware families. Universal malware detection algorithms that can detect all the malware families are needed to make the whole process feasible. However, the more universal an algorithm is, the higher number of feature dimensions it needs to work with, and that inevitably causes the emerging problem of Curse of Dimensionality (CoD). Besides, it is also difficult to make this solution work due to the real-time behavior of malware analysis. In this paper, we address this problem and aim to propose a feature selection based malware detection algorithm using an evolutionary algorithm that is referred to as Artificial Bee Colony (ABC). The proposed algorithm enables researchers to decrease the feature dimension and as a result, boost the process of malware detection. The experimental results reveal that the proposed method outperforms the state-of-the-art.
由于恶意软件家族数量的增加,恶意软件检测已成为一项具有挑战性的任务。为了使整个过程可行,需要能够检测所有恶意软件家族的通用恶意软件检测算法。然而,一个算法越通用,它需要处理的特征维数就越多,这就不可避免地导致了维度诅咒(CoD)问题的出现。此外,由于恶意软件分析的实时性,该解决方案也难以实现。在本文中,我们解决了这个问题,并旨在提出一种基于特征选择的恶意软件检测算法,该算法使用一种被称为人工蜂群(ABC)的进化算法。该算法使研究人员能够降低特征维数,从而提高恶意软件检测的速度。实验结果表明,所提出的方法优于现有的方法。
{"title":"Malware detection using artificial bee colony algorithm","authors":"F. Mohammadi, Farzan Shenavarmasouleh, M. Amini, H. Arabnia","doi":"10.1145/3410530.3414598","DOIUrl":"https://doi.org/10.1145/3410530.3414598","url":null,"abstract":"Malware detection has become a challenging task due to the increase in the number of malware families. Universal malware detection algorithms that can detect all the malware families are needed to make the whole process feasible. However, the more universal an algorithm is, the higher number of feature dimensions it needs to work with, and that inevitably causes the emerging problem of Curse of Dimensionality (CoD). Besides, it is also difficult to make this solution work due to the real-time behavior of malware analysis. In this paper, we address this problem and aim to propose a feature selection based malware detection algorithm using an evolutionary algorithm that is referred to as Artificial Bee Colony (ABC). The proposed algorithm enables researchers to decrease the feature dimension and as a result, boost the process of malware detection. The experimental results reveal that the proposed method outperforms the state-of-the-art.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81420475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
How particle detector can aid visual inspection for defect detection of TFT-LCD manufacturing 粒子探测器如何辅助TFT-LCD制造缺陷的目视检测
M. Khakifirooz, M. Fathi
Traditional defect classification of TFT-LCD array processing leaned on human decision-maker in which visual inspection used to categorize defects and consequently identify the rout-causes of defects. In practice, the main sources of defects in the TFT-LCD array process are particles. Due to the huge size of the machinery and production tools in the TFT-LCD array process, the sensor allocation for particle detection plays a critical role in the inadequacy and quality of sensor data. Therefore, where the adequacy and efficiency of human performance depend on human factors, emotion, and level of attention, this study aims to design a semi-automatic defect detection and classification method based on information capture by particle detector sensors to reduce the cognitive load devaluation and proceed with the process of defect classification.
传统的TFT-LCD阵列加工缺陷分类依赖于人工决策,通过目视检测对缺陷进行分类,从而识别缺陷产生的路径原因。在实际应用中,TFT-LCD阵列工艺中缺陷的主要来源是粒子。由于TFT-LCD阵列过程中机械和生产工具的巨大尺寸,用于粒子检测的传感器分配对传感器数据的不足和质量起着至关重要的作用。因此,在人的因素、情绪和注意力水平决定了人的表现是否足够和效率的情况下,本研究旨在设计一种基于粒子检测器传感器信息捕获的半自动缺陷检测和分类方法,以减少认知负荷贬值,并进行缺陷分类过程。
{"title":"How particle detector can aid visual inspection for defect detection of TFT-LCD manufacturing","authors":"M. Khakifirooz, M. Fathi","doi":"10.1145/3410530.3414596","DOIUrl":"https://doi.org/10.1145/3410530.3414596","url":null,"abstract":"Traditional defect classification of TFT-LCD array processing leaned on human decision-maker in which visual inspection used to categorize defects and consequently identify the rout-causes of defects. In practice, the main sources of defects in the TFT-LCD array process are particles. Due to the huge size of the machinery and production tools in the TFT-LCD array process, the sensor allocation for particle detection plays a critical role in the inadequacy and quality of sensor data. Therefore, where the adequacy and efficiency of human performance depend on human factors, emotion, and level of attention, this study aims to design a semi-automatic defect detection and classification method based on information capture by particle detector sensors to reduce the cognitive load devaluation and proceed with the process of defect classification.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85616259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nurse care activity recognition challenge: a comparative verification of multiple preprocessing approaches 护理活动识别挑战:多种预处理方法的比较验证
Hitoshi Matsuyama, Takuto Yoshida, Nozomi Hayashida, Yuto Fukushima, Takuro Yonezawa, Nobuo Kawaguchi
Although activity recognition has been studied considerably for the last two decades, it is still not so easy to handle complicated activity classes in a specific domain. The 2nd Nurse Care Activity Recognition Challenge Using Lab and Field Data aims to explore a part of those complicated activities by focusing on the nurse caring. Our team, "UCLab", found that the main problem in the challenge is the imbalance and unevenness of the dataset, each of which often happens in real-field data. Considering the problem, we approached the challenge using a Random Forest-based method with multiple preprocessing to classify 12 activity modes. Our approach consists of the following steps: We first preprocessed the acceleration data to obtain uniformly sampled signals. Then we extracted acceleration data with respect to each row of the given label data and extracted feature values. We adopted Random Forest for classification and performed post-processing to the predicted data obtained from the classifier. As a result, we obtained 51.5% accuracy with the trial-based evaluation.
尽管在过去的二十年里,人们对活动识别进行了大量的研究,但在特定领域中处理复杂的活动类仍然不是那么容易。利用实验室和现场数据的第二届护士护理活动识别挑战旨在通过关注护士护理来探索这些复杂活动的一部分。我们的团队“UCLab”发现,挑战中的主要问题是数据集的不平衡和不均匀,这些问题经常发生在实场数据中。考虑到这个问题,我们使用了一个基于随机森林的方法,并进行了多次预处理,对12种活动模式进行了分类。我们的方法包括以下步骤:我们首先对加速度数据进行预处理,以获得均匀采样的信号。然后根据给定标签数据的每一行提取加速度数据并提取特征值。我们采用Random Forest进行分类,并对从分类器中得到的预测数据进行后处理。结果,我们在基于试验的评估中获得了51.5%的准确率。
{"title":"Nurse care activity recognition challenge: a comparative verification of multiple preprocessing approaches","authors":"Hitoshi Matsuyama, Takuto Yoshida, Nozomi Hayashida, Yuto Fukushima, Takuro Yonezawa, Nobuo Kawaguchi","doi":"10.1145/3410530.3414333","DOIUrl":"https://doi.org/10.1145/3410530.3414333","url":null,"abstract":"Although activity recognition has been studied considerably for the last two decades, it is still not so easy to handle complicated activity classes in a specific domain. The 2nd Nurse Care Activity Recognition Challenge Using Lab and Field Data aims to explore a part of those complicated activities by focusing on the nurse caring. Our team, \"UCLab\", found that the main problem in the challenge is the imbalance and unevenness of the dataset, each of which often happens in real-field data. Considering the problem, we approached the challenge using a Random Forest-based method with multiple preprocessing to classify 12 activity modes. Our approach consists of the following steps: We first preprocessed the acceleration data to obtain uniformly sampled signals. Then we extracted acceleration data with respect to each row of the given label data and extracted feature values. We adopted Random Forest for classification and performed post-processing to the predicted data obtained from the classifier. As a result, we obtained 51.5% accuracy with the trial-based evaluation.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"83 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85540240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WatchOver WatchOver
Sahiti Kunchay, Saeed Abdullah
Simultaneous alcohol and marijuana (SAM) use can significantly impact young adults' physical and mental well-being. While SAM use is becoming increasingly prevalent in this population, there has not been much work to monitor and understand related behaviors and contexts. We aim to address this gap by using smartwatches to collect ecological momentary assessments (EMAs) and sensor data. In this paper, we describe the design and development of the smartwatch framework focusing on SAM use. We also collected pilot data from an n=1 deployment over 7 days using the framework. Our findings indicate that EMAs on smartwatches can be completed with lower perceived burden, which is important for longitudinal SAM use data collection. We also provide design guidelines and rationale for future work aiming to use smartwatches.
{"title":"WatchOver","authors":"Sahiti Kunchay, Saeed Abdullah","doi":"10.1145/3410530.3414373","DOIUrl":"https://doi.org/10.1145/3410530.3414373","url":null,"abstract":"Simultaneous alcohol and marijuana (SAM) use can significantly impact young adults' physical and mental well-being. While SAM use is becoming increasingly prevalent in this population, there has not been much work to monitor and understand related behaviors and contexts. We aim to address this gap by using smartwatches to collect ecological momentary assessments (EMAs) and sensor data. In this paper, we describe the design and development of the smartwatch framework focusing on SAM use. We also collected pilot data from an n=1 deployment over 7 days using the framework. Our findings indicate that EMAs on smartwatches can be completed with lower perceived burden, which is important for longitudinal SAM use data collection. We also provide design guidelines and rationale for future work aiming to use smartwatches.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"64 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78295680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS DOOM:一种新型的基于对抗性drl的操作码级变形恶意软件混淆器,用于增强IDS
Mohit Sewak, S. Sahay, Hemant Rathore
We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS. The ultimate goal of DOOM is not to give a potent weapon in the hands of cyber-attackers, but to create defensive-mechanisms against advanced zero-day attacks. Experimental results indicate that the obfuscated malware created by DOOM could effectively mimic multiple-simultaneous zero-day attacks. To the best of our knowledge, DOOM is the first system that could generate obfuscated malware detailed to individual op-code level. DOOM is also the first-ever system to use efficient continuous action control based deep reinforcement learning in the area of malware generation and defense. Experimental results indicate that over 67% of the metamorphic malware generated by DOOM could easily evade detection from even the most potent IDS. This achievement gains significance, as with this, even IDS augment with advanced routing sub-system can be easily evaded by the malware generated by DOOM.
我们设计并开发了DOOM(基于对抗性drl的操作码级混淆器,用于生成变形恶意软件),这是一个使用对抗性深度强化学习在操作码级混淆恶意软件以增强IDS的新系统。DOOM的最终目标不是为网络攻击者提供强大的武器,而是创建防御机制来对抗先进的零日攻击。实验结果表明,由DOOM创建的模糊恶意软件可以有效地模拟多个同时发生的零日攻击。据我们所知,DOOM是第一个可以生成详细到单个操作代码级别的模糊恶意软件的系统。DOOM也是第一个在恶意软件生成和防御领域使用基于深度强化学习的高效连续动作控制的系统。实验结果表明,DOOM生成的变形恶意软件中有67%以上可以很容易地逃避最强大的IDS的检测。这一成就具有重要意义,因为有了这一点,即使具有高级路由子系统的IDS也很容易被DOOM生成的恶意软件所规避。
{"title":"DOOM: a novel adversarial-DRL-based op-code level metamorphic malware obfuscator for the enhancement of IDS","authors":"Mohit Sewak, S. Sahay, Hemant Rathore","doi":"10.1145/3410530.3414411","DOIUrl":"https://doi.org/10.1145/3410530.3414411","url":null,"abstract":"We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS. The ultimate goal of DOOM is not to give a potent weapon in the hands of cyber-attackers, but to create defensive-mechanisms against advanced zero-day attacks. Experimental results indicate that the obfuscated malware created by DOOM could effectively mimic multiple-simultaneous zero-day attacks. To the best of our knowledge, DOOM is the first system that could generate obfuscated malware detailed to individual op-code level. DOOM is also the first-ever system to use efficient continuous action control based deep reinforcement learning in the area of malware generation and defense. Experimental results indicate that over 67% of the metamorphic malware generated by DOOM could easily evade detection from even the most potent IDS. This achievement gains significance, as with this, even IDS augment with advanced routing sub-system can be easily evaded by the malware generated by DOOM.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82155333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Nurse care activity recognition based on machine learning techniques using accelerometer data 基于加速计数据的机器学习技术的护士护理活动识别
Mohammad Sabik Irbaz, Abir Azad, Tanjila Alam Sathi, Lutfun Nahar Lota
Sensor-based human activity recognition has become one of the challenging and emerging research areas. Several machine learning algorithm with appropriate feature extraction has been used to solve human activity recognition task. However, recent research mainly focused on various deep learning algorithms, our focus of this study is measuring the performance of traditional machine learning algorithms with the incorporation of frequency-domain features. Because deep learning methods require a high computational cost. In this paper, we used Naive Bayes, K-Nearest Neighbour, SVM, Random Forest and Multilayer Perceptron with necessary feature extraction for our experimentation. We achieved best performance for K-Nearest Neighbour. Our experiment was a part of "The 2nd Nurse Care Activity Recognition Challenge Using Lab and Field Data" followed by the team MoonShot_BD. We concluded that with proper feature extraction, machine learning techniques may be useful to solve activity recognition with a low computational cost.
基于传感器的人体活动识别已成为具有挑战性和新兴的研究领域之一。一些具有适当特征提取的机器学习算法被用于解决人类活动识别任务。然而,最近的研究主要集中在各种深度学习算法上,我们的研究重点是通过结合频域特征来衡量传统机器学习算法的性能。因为深度学习方法需要很高的计算成本。在本文中,我们使用朴素贝叶斯、k近邻、支持向量机、随机森林和多层感知机进行实验,并进行必要的特征提取。我们在k近邻中获得了最好的性能。我们的实验是“使用实验室和现场数据的第二届护士护理活动识别挑战”的一部分,随后是MoonShot_BD团队。我们的结论是,通过适当的特征提取,机器学习技术可能有助于以低计算成本解决活动识别问题。
{"title":"Nurse care activity recognition based on machine learning techniques using accelerometer data","authors":"Mohammad Sabik Irbaz, Abir Azad, Tanjila Alam Sathi, Lutfun Nahar Lota","doi":"10.1145/3410530.3414339","DOIUrl":"https://doi.org/10.1145/3410530.3414339","url":null,"abstract":"Sensor-based human activity recognition has become one of the challenging and emerging research areas. Several machine learning algorithm with appropriate feature extraction has been used to solve human activity recognition task. However, recent research mainly focused on various deep learning algorithms, our focus of this study is measuring the performance of traditional machine learning algorithms with the incorporation of frequency-domain features. Because deep learning methods require a high computational cost. In this paper, we used Naive Bayes, K-Nearest Neighbour, SVM, Random Forest and Multilayer Perceptron with necessary feature extraction for our experimentation. We achieved best performance for K-Nearest Neighbour. Our experiment was a part of \"The 2nd Nurse Care Activity Recognition Challenge Using Lab and Field Data\" followed by the team MoonShot_BD. We concluded that with proper feature extraction, machine learning techniques may be useful to solve activity recognition with a low computational cost.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76558786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fine-grained activities recognition with coarse-grained labeled multi-modal data 使用粗粒度标记的多模态数据进行细粒度活动识别
Zhizhang Hu, Tong Yu, Yue Zhang, Shijia Pan
Fine-grained human activities recognition focuses on recognizing event- or action-level activities, which enables a new set of Internet-of-Things (IoT) applications such as behavior analysis. Prior work on fine-grained human activities recognition relies on supervised sensing, which makes the fine-grained labeling labor-intensive and difficult to scale up. On the other hand, it is much more practical to collect coarse-grained label at the level of activity of daily living (e.g., cooking, working), especially for real-world IoT systems. In this paper, we present a framework that learns fine-grained human activities recognition with coarse-grained labeled and a small amount of fine-grained labeled multi-modal data. Our system leverages the implicit physical knowledge on the hierarchy of the coarse- and fine-grained labels and conducts data-driven hierarchical learning that take into account the coarse-grained supervised prediction for fine-grained semi-supervised learning. We evaluated our framework and CFR-TSVM algorithm on the data gathered from real-world experiments. Results show that our CFR-TSVM achieved an 81% recognition accuracy over 10 fine-grained activities, which reduces the prediction error of the semi-supervised learning baseline TSVM by half.
细粒度的人类活动识别侧重于识别事件级或行动级活动,这使得一组新的物联网(IoT)应用程序(如行为分析)成为可能。先前的细粒度人类活动识别工作依赖于监督感知,这使得细粒度标记劳动密集型且难以扩大规模。另一方面,在日常生活(例如,烹饪,工作)的活动层面收集粗粒度标签更为实用,特别是对于现实世界的物联网系统。本文提出了一个基于粗粒度标记和少量细粒度标记的多模态数据学习细粒度人类活动识别的框架。我们的系统利用粗粒度和细粒度标签层次上的隐式物理知识,并进行数据驱动的分层学习,该学习将细粒度半监督学习的粗粒度监督预测考虑在内。我们在真实世界的实验数据上评估了我们的框架和CFR-TSVM算法。结果表明,我们的CFR-TSVM对10个细粒度活动的识别准确率达到81%,将半监督学习基线TSVM的预测误差降低了一半。
{"title":"Fine-grained activities recognition with coarse-grained labeled multi-modal data","authors":"Zhizhang Hu, Tong Yu, Yue Zhang, Shijia Pan","doi":"10.1145/3410530.3414320","DOIUrl":"https://doi.org/10.1145/3410530.3414320","url":null,"abstract":"Fine-grained human activities recognition focuses on recognizing event- or action-level activities, which enables a new set of Internet-of-Things (IoT) applications such as behavior analysis. Prior work on fine-grained human activities recognition relies on supervised sensing, which makes the fine-grained labeling labor-intensive and difficult to scale up. On the other hand, it is much more practical to collect coarse-grained label at the level of activity of daily living (e.g., cooking, working), especially for real-world IoT systems. In this paper, we present a framework that learns fine-grained human activities recognition with coarse-grained labeled and a small amount of fine-grained labeled multi-modal data. Our system leverages the implicit physical knowledge on the hierarchy of the coarse- and fine-grained labels and conducts data-driven hierarchical learning that take into account the coarse-grained supervised prediction for fine-grained semi-supervised learning. We evaluated our framework and CFR-TSVM algorithm on the data gathered from real-world experiments. Results show that our CFR-TSVM achieved an 81% recognition accuracy over 10 fine-grained activities, which reduces the prediction error of the semi-supervised learning baseline TSVM by half.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"124 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87993941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Using iOS for inconspicuous data collection: a real-world assessment 使用iOS进行不显眼的数据收集:现实世界的评估
Yuuki Nishiyama, Denzil Ferreira, Wataru Sasaki, T. Okoshi, J. Nakazawa, A. Dey, K. Sezaki
Mobile Crowd Sensing (MCS) is a method for collecting multiple sensor data from distributed mobile devices for understanding social and behavioral phenomena. The method requires collecting the sensor data 24/7, ideally inconspicuously to minimize bias. Although several MCS tools for collecting the sensor data from an off-the-shelf smartphone are proposed and evaluated under controlled conditions as a benchmark, the performance in a practical sensing study condition is scarce, especially on iOS. In this paper, we assess the data collection quality of AWARE iOS, installed on off-the-shelf iOS smartphones with 9 participants for a week. Our analysis shows that more than 97% of sensor data, provided by hardware sensors (i.e., accelerometer, location, and pedometer sensor), is successfully collected in real-world conditions, unless a user explicitly quits our data collection application.
移动人群感知(MCS)是一种从分布式移动设备收集多个传感器数据以理解社会和行为现象的方法。该方法需要全天候收集传感器数据,理想情况下不明显,以尽量减少偏差。尽管已经提出了几种用于从现成智能手机收集传感器数据的MCS工具,并在受控条件下作为基准进行了评估,但在实际传感研究条件下的性能很少,特别是在iOS上。在本文中,我们评估了AWARE iOS的数据收集质量,该系统安装在现成的iOS智能手机上,共有9名参与者,为期一周。我们的分析表明,除非用户明确退出我们的数据收集应用程序,否则由硬件传感器(即加速度计、位置和计步器传感器)提供的超过97%的传感器数据在实际条件下可以成功收集。
{"title":"Using iOS for inconspicuous data collection: a real-world assessment","authors":"Yuuki Nishiyama, Denzil Ferreira, Wataru Sasaki, T. Okoshi, J. Nakazawa, A. Dey, K. Sezaki","doi":"10.1145/3410530.3414369","DOIUrl":"https://doi.org/10.1145/3410530.3414369","url":null,"abstract":"Mobile Crowd Sensing (MCS) is a method for collecting multiple sensor data from distributed mobile devices for understanding social and behavioral phenomena. The method requires collecting the sensor data 24/7, ideally inconspicuously to minimize bias. Although several MCS tools for collecting the sensor data from an off-the-shelf smartphone are proposed and evaluated under controlled conditions as a benchmark, the performance in a practical sensing study condition is scarce, especially on iOS. In this paper, we assess the data collection quality of AWARE iOS, installed on off-the-shelf iOS smartphones with 9 participants for a week. Our analysis shows that more than 97% of sensor data, provided by hardware sensors (i.e., accelerometer, location, and pedometer sensor), is successfully collected in real-world conditions, unless a user explicitly quits our data collection application.","PeriodicalId":7183,"journal":{"name":"Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88395142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Adjunct Proceedings of the 2020 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2020 ACM International Symposium on Wearable Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1