AUTHORS: Nenad Katanić, Krešimir Fertalj
Download as PDF
ABSTRACT: With current maturity and wide accessibility of low-cost sensor technologies, sensor-based human activity recognition is becoming more and more popular in various domains and novel innovative applications. Huge amount of research in this area is driven by smart-home assistive living applications, many of them mostly focused on the development of efficient methods and applications that can help in supporting independent living and provide assistance with everyday instrumental activities of daily living. On the other hand, in today’s world filled with uncertainty and ever increasing security risks, personal physical security is becoming more important than ever. In this paper we report on the identified need and present the current status and future steps towards developing a robust physical intrusion detection method aimed at improving people’s personal physical security. Proposed method relies on machine learning techniques and on sensor-based human activity recognition and will be validated on the application prototype for robust physical intrusion detection on home doors in real-life environment.
KEYWORDS: activity recognition, machine learning, context-aware, real-time, dense-sensing, accelerometer, physical intrusion, physical security
REFERENCES:
[1] M. Philipose, K. P. Fishkin, M. Perkowitz, D. J. Patterson, D. Fox, H. Kautz, and D. Hahnel, Inferring activities from interactions with objects, IEEE Pervasive Comput., vol. 3, no. 4, pp. 50–57, Oct./Dec. 2004.
[2] T. Van Kasteren and B.Krose, Bayesian activity recognition in residence for elders, in Proc. Int. Conf. Intell. Environ., Feb. 2008, pp. 209–212.
[3] K. Van Laerhoven and K. A. Aidoo, Teaching context to applications, J. Pers. Ubiquitous Comput., vol. 5, no. 1, pp. 46–49, 2001.
[4] T. Choudhury, S. Consolvo, and B. Harrison, The mobile sensing platform: An embedded activity recognition system, IEEE Pervasive Comput., vol. 7, no. 2, pp. 32–41, Apr./Jun. 2008.
[5] R. Poppe, A survey on vision-based human action recognition, Image Vis. Comput., vol. 28, no. 6, pp. 976–990, 2010.
[6] L. Chen, J. Hoey, C. D. Nuget, D. J. Cook, Z. Yu, Sensor-based Activity Recognition, IEEE Transactions on Systens, Man, and Cypernetics – Part C: Applications and Reviews, vol. 42, No. 6, November 2012.
[7] Lock picking, https://en.wikipedia.org/wiki/Lock_picking, Nov. 2016.
[8] Lock bumping, https://en.wikipedia.org/wiki/Lock_bumping, Nov. 2016.
[9] Overview of basic indicators for public safety in the Republic of Croatia for 2006 – 2015, Republic of Croatia Ministry of the Interior, https://www.mup.hr/UserDocsImages/statistika /2016/statistika10_eng.pdf, Zagreb, March 2016.
[10] L. Bao and S. S. Intille, Activity recognition from user-annotated acceleration data, Pervasive Computing, Lecture Notes in Computer Science, vol. 3001, pp. 1–17, 2004.
[11] N. Ravi, N. Dandekar, P. Mysore, and M. L. Littman, Activity Recognition from Accelerometer Data, Proceedings of the Seventeenth Conference on Innovative Applications of Artificial Intelligence, vol. 5, pp. 1541-1546, 2005.
[12] E. M. Tapia, S. S. Intille, and K. Larson, Activity recognition in the home using simple and ubiquitous sensors, in Proc. Pervasive, 2004., pp. 158–175.
[13] C. R. Wren and E. M. Tapia, Toward scalable activity recognition for sensor networks, in Proc. 2nd Int. Workshop Location ContextAwareness, 2006, pp. 168–185.
[14] Yin X., Shen W., Sarnarabandu J., Wang X., Human Activity Detection Based on Multiple Smart Phone Sensors and Machine Learning Algorithms, Proceedings of the 2015 IEEE 19th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2015.
[15] Olutoyin Oshin T., Poslad S. Energy-Efficient Real-Time Human Mobitlity State Classification Using Smartphones, IEEE Transactions on computers, vol. 64, no. 6, June 2015.
[16] Trabelsi D., Mohammed S., Chamroukhi F., Oukhellou L., Amirat Y., An Unsupervised Approach for Automatic Activity Recognition Based on Hidden Markov Model Regression, IEEE Transactions on automation science and engineering, vol. 10, no. 3, July 2013.
[17] Cenedese A., Antonio Susto G., Belgioioso G., Ilario Cirillo G., Fraccaroli F., Home Automation Oriented Gesture Classification From Inertial Measurements, IEEE Transactions on automation science and engineering, vol. 12, no. 4, October 2015.
[18] Vepakomma P., Debraj D., Sajal K., Bhansali S., A-Wristocracy: Deep Learning on Wristworn Sensing for Recognition of User Complex Activities
[19] Alireza A. Dibazar, Ali Yousefi, Hyung O. Park, Bing Lu, Sageev George, and Theodore W. Berger, “Intelligent Recognition of Acoustic and Vibration Threats for Security Breach Detection, Close Proximity Danger Identification, and Perimeter Protection”, Proc. IEEE Technologies for Homeland Security (HST), IEEE Press, Dec. 2010, pp. 351- 356, doi: 10.1109/THS.2010.5654931.
[20] Licheng Z,. Xihong W., Dingsheng L., Improving Activity Recognition with Contextual Information, Proceedings of 2015 IEEE International Conference on Mechatronics and Automation, August 2 - 5, Beijing, China
[21] knowledge-driven approach to activity recognition in smart homes, IEEE Trans. Knowl. Data Eng., vol. 24, no. 6, pp. 961–974, Jun. 2012.
[22] Raspberry Pi Documentation, https://www.raspberrypi.org/documentation/, Nov. 2016.
[23] ADATA PV120 Rechargeable Li-polymer Battery Power Bank Specification, http://www.adata.com/us/mobile/specification/ 324, Nov. 2016.
[24] Analog Devices ADXL345 Accelerometer Specification, http://www.analog.com/media/en/technicaldocumentation/data-sheets/ADXL345.pdf, Nov. 2016.
[25] L. Chen, C. D. Nugent, and H. Wang, A AdaFruit ADXL345 Digital Accelerometer Documentation, https://learn.adafruit.com/adxl345-digitalaccelerometer, Nov. 2016.
[26] Neural Networks and Deep Learning, http://neuralnetworksanddeeplearning.com/
[27] S. R. Garner, Weka: The waikato environment for knowledge analysis, Proceedings of the New Zealand computer science research students conference, pp. 57-64, 1995.
[28] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten, The WEKA data mining software: an update, ACM SIGKDD explorations newsletter, vol. 11, pp. 10-18, 2009.