skip to main content
10.1145/1839294.1839305acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Abnormal human behavioral pattern detection in assisted living environments

Authors Info & Claims
Published:23 June 2010Publication History

ABSTRACT

In recent years, there is a growing interest about assisted living environments especially for the elderly who live alone, due to the increasing number of aged people. In order for them to live safe and healthy, we need to detect abnormal behavior that may cause severe and emergent situations for the elderly. In this work, we suggest a method that detects abnormal behavior using wireless sensor networks. We model an episode that is a series of events, which includes spatial and temporal information about the subject being monitored. We define a similarity scoring function that compares two episodes taking into consideration temporal aspects. We propose a way to determine a threshold to divide episodes into two groups that reduces wrong classification. Weights on individual functions that consist the similarity function are determined experimentally so that they can produce the good results in terms of area under curve in receiver operating characteristic (ROC) curve.

References

  1. J. M. Agosta, C. Diuk-Wasser, J. Chandrashekar, and C. Livadas. An adaptive anomaly detector for worm detection. In SYSML'07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In J. B. Bocca, M. Jarke, and C. Zaniolo, editors, VLDB'94. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. M. Bezzi and R. Groenevelt. Towards understanding and modeling individual behavior and group dynamics. 2008.Google ScholarGoogle Scholar
  4. C.-S. Chao, Y.-X. Chen, and A.-C. Liu. Abnormal event detection for network flooding attacks. Journal of Information Science and Engineering, 20(6):1079--1091, 2004.Google ScholarGoogle Scholar
  5. P.-C. Chung and C.-D. Liu. A daily behavior enabled hidden markov model for human behavior understanding. Pattern Recognition, 41(5):1572--1580, May 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. H. Cormen, C. E. Leiserson, and R. Rivest. Introduction to Algorithms. 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. T. V. Duong, H. H. Bui, D. Q. Phung, and S. Venkatesh. Activity recognition and abnormality detection with the switching hidden semi-markov model. In CVPR '05. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. M. Faizal, M. M. Zaki, S. Shahrin, Y. Robiah, and S. S. Rahayu. Threshold verification technique for network intrusion detection system, June 2009.Google ScholarGoogle Scholar
  9. X. Geng, G. Li, Y. Ye, Y. Tu, and H. Dai. Abnormal behavior detection for early warning of terrorist attack. In AI 2006: Advances in Artificial Intelligence, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. P. D. Haghighi, M. M. Gaber, S. Krishnaswamy, and A. Z. S. W. Loke. Context-aware adaptive data stream mining. Special Issue on Knowledge Discovery from Data Streams, 2008.Google ScholarGoogle Scholar
  11. J. He, H. Li, and J. Tan. Real-time daily activity classification with wireless sensor networks using hidden markov model. In EMBS '07.Google ScholarGoogle Scholar
  12. S. Lühr, S. Venkatesh, G. West, and H. H. Bui. Duration abnormality detection in sequences of human activity. Technical Report TR-2004/02, Curtin University of Technology, 2004.Google ScholarGoogle Scholar
  13. S. Lühr, G. West, and S. Venkatesh. Recognition of emergent human behaviour in a smart home: A data mining approach. Pervasive Mob. Comput., 3(2):95--116, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Lymberopoulos, A. Bamis, and A. Savvides. Extracting spatiotemporal human activity patterns in assisted living using a home sensor network. In PETRA '08. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. Park, E. Becker, J. K. Vinjumur, Z. Le, and F. Makedon. Human behavioral detection and data cleaning in assisted living environment using wirless sensor networks. In PETRA 09, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. E. M. Tapia, S. S. Intille, and K. Larson. Activity recognition in the home using simple and ubiquitous sensors. In Pervasive Computing, pages 158--175, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  17. N. Vaswani, A. R. Chowdhury, and R. Chellappa. "shape activity": A continuous state hmm for moving/deforming shapes with application to abnormal activity detection. IEEE Trans. on Image Processing, 14(10):1603--1616, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Abnormal human behavioral pattern detection in assisted living environments

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      PETRA '10: Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
      June 2010
      452 pages
      ISBN:9781450300711
      DOI:10.1145/1839294

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 23 June 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader