2020
DOI: 10.3390/e22080845
|View full text |Cite
|
Sign up to set email alerts
|

An Entropy-Based Approach for Anomaly Detection in Activities of Daily Living in the Presence of a Visitor

Abstract: This paper presents anomaly detection in activities of daily living based on entropy measures. It is shown that the proposed approach will identify anomalies when there are visitors representing a multi-occupant environment. Residents often receive visits from family members or health care workers. Therefore, the residents’ activity is expected to be different when there is a visitor, which could be considered as an abnormal activity pattern. Identifying anomalies is essential for healthcare management, as thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 57 publications
0
21
0
Order By: Relevance
“…Data that is contaminated with outliers could lead to poor performance by the model. The authors in [25] utilised ADL data collected with ambient sensors to detect abnormal activity instances using different entropy measures. Activities with entropy value exceeding a certain range are predicted as outliers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Data that is contaminated with outliers could lead to poor performance by the model. The authors in [25] utilised ADL data collected with ambient sensors to detect abnormal activity instances using different entropy measures. Activities with entropy value exceeding a certain range are predicted as outliers.…”
Section: Related Workmentioning
confidence: 99%
“…a is NOT an outlier −1 a is an outlier [16] Inferred ADL data CAAB and regression model Correlation and RMSE [22] Inferred ADL data Causal association rule and Markov logic network Accuracy, precision and recall [49] Inferred ADL data OC-SVM Accuracy [2,5] Inferred ADL data IADL-C, Regression and classification model RMSE, correlation, F-Score, accuracy, sensitivity and ROC-AUC [7] Raw binary data CNN + LSTM Sensitivity, specificity [30] Raw binary and inferred ADL data ESN RMSE [24] Inferred ADL data DBSCAN Precision and recall [27] Inferred ADL data OC-SVM Error rate, F-measure and accuracy [6] Raw binary data Vanilla RNN, GRU, LSTM Accuracy [18] Inferred ADL data DBSCAN EER [20] Inferred ADL data HMM + FRBS Accuracy, precision, recall, F-measure, ROC-AUC [50] Inferred ADL and synthetic data Ensemble (OC-SVM, LOF, iForest, RCE) Accuracy [34,35] Raw binary data SOM Accuracy [25] Raw binary data Entropy measures Accuracy, precision and recall [47] Inferred ADL data HCRF & SVM Accuracy [4] ADL data (video stream) 3D-CNN + LSTM Accuracy, precision, recall, F-measre and specificity [37] ADL data (depth) Fuzzy inference system Percentage error rate [32] Inferred ADL data (ODHMAD) Precision, false alarm and false prediction rate [51] Inferred ADL data LSTM, CNN, CNN-LSTM and autoencoder Accuracy…”
Section: The Radial Basis Function (Rbf) Kernel With Spread Parametermentioning
confidence: 99%
“…In this study, Shannon Entropy is utilized with an online machine learning method to detect malicious traffic including DDoS attacks and Flash Event traffic. Paper [27] presented anomaly detection in activities of daily living based on entropy measures.…”
Section: Entropy-based Technologiesmentioning
confidence: 99%
“…As the measure of uncertainty, entropy can be used to summarize feature distributions in a compact form [22]. ere are many forms of entropy, but only a few have been applied to network anomaly detection [23][24][25][26][27]. On this basis, we apply a Euclidean Distance-Based Multiscale Fuzzy Entropy (EDM-Fuzzy) algorithm which we proposed to detect abnormal network traffic as a useful supplement of other approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Being able to detect anomalies has many applications, including in the fields of medicine and healthcare management [ 1 , 2 ]; in data acquisition, such as filtering out anomalous readings [ 3 ]; in computer security [ 4 ]; in media monitoring [ 5 ]; and many in the realm of public safety such as identifying thermal anomalies that may precede earthquakes [ 6 ], identifying potential safety issues in bridges over time [ 7 ], detecting anomalous conditions for trains [ 8 ], system level anomaly detection among different air fleets [ 9 ], and identifying which conditions pose increased risk in aviation [ 10 ]. Given a dataset, anomaly detection is about identifying individual data that are quantitatively different from the majority of other members of the dataset.…”
Section: Introductionmentioning
confidence: 99%