2014 World Congress on Computing and Communication Technologies 2014
DOI: 10.1109/wccct.2014.34
|View full text |Cite
|
Sign up to set email alerts
|

Activity Recognition with Fuzzy Finite Automata

Abstract: Offering context aware services to users is one of the main objectives of pervasive computing. A context aware system needs to know the activities being performed by the user. Deciding what a user is doing at a given time poses a number of challenges. One significant challenge is dealing with the variation in the number, order and duration of the constituent steps of an activity. There happens to be considerable variation in these parameters even if the same user is performing the same activity at different ti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
12
0
1

Year Published

2015
2015
2018
2018

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 12 publications
1
12
0
1
Order By: Relevance
“…Many works have focused on proposing techniques for the task of activity recognition, including fuzzy finite automata [1], ensemble methods combining support vector machines, artificial neural networks, and 1-nearest neighbors [57] or combining C4.5, multilayer perceptron and logistic regression [12], Hough transformation along with random projection trees [55], online multitask learning [49] or Naive Bayes and k-nearest neighbors [23]. A review of the topic's literature from the years 2011 and 2012 along with a proposal using C4.5 and AdaBoost is provided by Ugulino et al [50], while this work was published before the PAMAP2 dataset used in this work was released.…”
Section: Activity Recognition Systemsmentioning
confidence: 99%
“…Many works have focused on proposing techniques for the task of activity recognition, including fuzzy finite automata [1], ensemble methods combining support vector machines, artificial neural networks, and 1-nearest neighbors [57] or combining C4.5, multilayer perceptron and logistic regression [12], Hough transformation along with random projection trees [55], online multitask learning [49] or Naive Bayes and k-nearest neighbors [23]. A review of the topic's literature from the years 2011 and 2012 along with a proposal using C4.5 and AdaBoost is provided by Ugulino et al [50], while this work was published before the PAMAP2 dataset used in this work was released.…”
Section: Activity Recognition Systemsmentioning
confidence: 99%
“…The data collected from triaxis accelerators seem insensitive, but they could be applied to discriminate the identity by means of machine learning. There have been several researches about recognizing one's identity by the data collected from triaxis accelerators [9][10][11].…”
Section: 2mentioning
confidence: 99%
“…We focus on the data collected by the triaxis accelerator for its popularity [9][10][11]15], and its insensitive impression. Experiment results would verify the effectiveness of the clustering -anonymity.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…The condensed group shown in fig.3 is called the condensed vector sequence (CVS) of and is represented by [26]. In the CVS the subsequent occurrence of a vector implies that the vector gets repeated a certain number of times in the actual data set.…”
Section: Figure 2 Observation Vectors and Activity Labelsmentioning
confidence: 99%
“…This is because the number, order, and duration of the different steps involved in such activities vary significantly, even when the activities are performed by the same user at different times. So, in our previous work [3] we proposed a method for constructing a fuzzy finite automata to recognize user activities directly from the streams of sensor data, with no user intervention. In this paper we propose to enhance it with the ability to recognize user activities in real time.…”
Section: Introductionmentioning
confidence: 99%