2020
DOI: 10.2196/21209
|View full text |Cite
|
Sign up to set email alerts
|

Understanding User Behavior Through the Use of Unsupervised Anomaly Detection: Proof of Concept Using Internet of Things Smart Home Thermostat Data for Improving Public Health Surveillance

Abstract: Background One of the main concerns of public health surveillance is to preserve the physical and mental health of older adults while supporting their independence and privacy. On the other hand, to better assist those individuals with essential health care services in the event of an emergency, their regular activities should be monitored. Internet of Things (IoT) sensors may be employed to track the sequence of activities of individuals via ambient sensors, providing real-time insights on daily a… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
2
1

Relationship

3
7

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 40 publications
0
15
0
Order By: Relevance
“…Second, our system used anomaly detection algorithms (instead of a binary classification), which have been studied extensively in the detection of system failures in infrastructure and factories, malware detection, and computer vision [ 22 ]. Anomaly detection algorithms are also used in medicine, such as medical images [ 25 , 26 ], electrocardiograms [ 27 ], and remote medicine [ 28 , 29 ]. Although classification techniques are the most common approaches to anomaly detection, data sets often lack sufficient labeled anomalies.…”
Section: Discussionmentioning
confidence: 99%
“…Second, our system used anomaly detection algorithms (instead of a binary classification), which have been studied extensively in the detection of system failures in infrastructure and factories, malware detection, and computer vision [ 22 ]. Anomaly detection algorithms are also used in medicine, such as medical images [ 25 , 26 ], electrocardiograms [ 27 ], and remote medicine [ 28 , 29 ]. Although classification techniques are the most common approaches to anomaly detection, data sets often lack sufficient labeled anomalies.…”
Section: Discussionmentioning
confidence: 99%
“…Second, our system used anomaly detection algorithms (instead of a binary classification), which have been studied extensively in the detection of system failures in infrastructure and factories, malware detection, and computer vision [22]. Anomaly detection algorithms are also used in medicine, such as medical images [25,26], electrocardiograms [27], and remote medicine [28,29]. Although classification techniques are the most common approaches to anomaly detection, data sets often lack sufficient labeled anomalies.…”
Section: Principal Resultsmentioning
confidence: 99%
“…In this study, our team explored the use of the Donate Your Data (DYD) data from the ecobee smart home thermostat. The data are composed of the anonymized indoor activity of households captured every 5 minutes through the embedded motion sensors [ 18 ]. Approximately 98% of participating households in the DYD program are in North America.…”
Section: Methodsmentioning
confidence: 99%