Skip to main content

Behavior Analysis with Combined RFID and Video Information

  • Conference paper
Ubiquitous Intelligence and Computing (UIC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Included in the following conference series:

Abstract

In order for the hidden computer to interact with human beings, a variety of sensors are used to collect data of human behavior. Using video cameras is quite straightforward on this matter. However, it is still a difficult task to do human motion analysis through only video data. In this paper, we discuss the necessity and the way to combine information from video sensors and other types of sensors, especially, the RFID reader. Data acquisition of RFID and video data is discussed first. Combinatorial information fusion techniques for multiple sources of information are then introduced. On the other hand, rule based methods provide an alternative solution for combining the two sources of information. An example in monitoring real-life learning behavior is also given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hu, W., Tan, T., Wang, L., Maybank, S.: A Survey on Visual Surveillance of Object Motion and Behaviors. IEEE Trans. on Systems, Man, and Cybernetics—Part C: Applications and Review 34(3), 334–352 (2004)

    Article  Google Scholar 

  2. Satoh, I.: Location-Based Services in Ubiquitous Computing Environments. In: Orlowska, M.E., Weerawarana, S., Papazoglou, M.P., Yang, J. (eds.) ICSOC 2003. LNCS, vol. 2910, pp. 527–542. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Masters, A., Michael, K.: Humancentric Applications of RFID Implants: the Usability Contexts of Control, Convenience and Care. In: Proc. the 2nd Workshop on Mobile Commerce and Services (IEEE WMCS) (2005)

    Google Scholar 

  4. Collins, R.T., Lipton, A.J., Fujiyoshi, H., Kanade, T.: Algorithms for Cooperative Multisensor Surveillance. Proceedings of the IEEE 89(10), 1456–1477 (2001)

    Article  Google Scholar 

  5. Shoji, K., Mito, A., Toyama, F.: Pose Estimation of a 2D Articulated Object from its Silhouette Using a GA. In: Proc. the 15th Int’l Conf. on Pattern Recognition, vol. 3, pp. 713–717 (2000)

    Google Scholar 

  6. Hsu, D.F., Chung, Y.-S., Kristal, B.S.: Combinatorial Fusion Analysis: Methods and Practices of Combining Multiple Scoring System. In: Hsu, H.-H. (ed.) Advanced Data Mining Technologies in Bioinformatics, pp. 32–62. Idea Group Publishing, Hershey (2006)

    Google Scholar 

  7. Cheng, Z., Han, Q., Sun, S., Kansen, M., Hosokawa, T., Huang, T., He, A.: A Proposal on a Learner’s Context-Aware Personalized Education Support Method based on Principles of Behavior Science. In: Proc. the 20th International Conference on Advanced Information Networking and Applications (AINA 2006) (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hsu, HH., Cheng, Z., Huang, T., Han, Q. (2006). Behavior Analysis with Combined RFID and Video Information. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_18

Download citation

  • DOI: https://doi.org/10.1007/11833529_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics