Call Center Stress Recognition with Person-Specific Models
|
|
|
- Gloria Cannon
- 10 years ago
- Views:
Transcription
1 Call Center Stress Recognition with Person-Specific Models Javier Hernandez, Rob R. Morris, and Rosalind W. Picard Media Lab, Massachusetts Institute of Technology, Cambridge, USA Abstract. Nine call center employees wore a skin conductance sensor on the wrist for a week at work and reported stress levels of each call. Although everyone had the same job profile, we found large differences in how individuals reported stress levels, with similarity from day to day within the same participant, but large differences across the participants. We examined two ways to address the individual differences to automatically recognize classes of stressful/non-stressful calls, namely modifying the loss function of Support Vector Machines (SVMs) to adapt to the varying priors, and giving more importance to training samples from the most similar people in terms of their skin conductance lability. We tested the methods on 1500 calls and achieved an accuracy across participants of 78.03% when trained and tested on different days from the same person, and of 73.41% when trained and tested on different people using the proposed adaptations to SVMs. Keywords: Stress recognition, skin conductance, interpersonal variability, Support Vector Machines, Affective Computing. 1 Introduction Chronic psychological stress carries a wide array of pathophysiological risks, including cardiovascular disease, cerebrovascular disease, diabetes, and immune deficiencies [8]. An important step in managing stress, before it becomes chronic, is recognizing precisely when and where it occurs. Technologies that automatically recognize stress can be extremely powerful, both diagnostically and therapeutically. As a diagnostic tool, technologies such as these could help individuals and clinicians gain insight into the conditions that consistently provoke maladaptive stress responses. As a therapeutic tool, these technologies could be used to automatically initiate stress-reduction interventions. In stressful work settings, such as a call center, these technologies could not only lead to more timely and reduced-cost interventions, but also to more productive environments where employees could better manage their workload, so that they could provide a better experience for customers. While research on automated stress recognition has taken many different forms, the systems that have been proposed in the engineering literature typically contain two principle components: 1) a sensor-based architecture that records S. D Mello et al. (Eds.): ACII 2011, Part I, LNCS 6974, pp , c Springer-Verlag Berlin Heidelberg 2011
2 126 J. Hernandez, R.R. Morris, and R.W. Picard relevant features and 2) a software-based system that makes predictions about an individual s current stress level. The sensing modalities can take many forms, including audio and visual modalities, but biosensors provide the most direct access into the physiological changes that accompany stress-induced changes [3]. While great strides have been made in real-life biosensing [13], the computational task of inferring stress levels from biosensor data is still a considerable challenge. There is often great variability in how people experience stress [10] and how they express it physiologically [11], and this interpersonal variability can stymie efforts to build a one-size-fits all stress recognition system. This work explores using data from each individual to help manage the problem of interpersonal variability. In particular, we modify the loss function of SVMs to encode a person s tendency to report stressful events, and give more importance to the training samples of the most similar participants. These changes were validated in a case study where skin conductance (SC) was monitored in nine call center employees during a one-week period of their regular work. This paper is organized as follows. Section 2 reviews previous studies on the subject of this work. Section 3 provides details about the data collection. Section 4 presents the problem of interpersonal variability and proposes two complementary methods to address it. Section 5 explains the data preprocessing and experimental protocols. Section 6 provides results and analysis. 2 Background and Previous Work 2.1 Physiological Stress and Skin Conductance Stress-induced changes can be monitored with biosensors, and a particular focus is often placed on the sympathetic nervous system, which is designed to mobilize the body s resources in response to a challenge or a threat. While most visceral organs are dually innervated by both the para- and sympathetic nervous systems, the eccrine sweat glands are thought to be solely controlled by the sympathetic nervous system [3]. Thus, skin conductance sensors that measure eccrine sweat gland activity are often used to monitor sympathetic nervous system activity. A century of short-term lab measurements have shown that SC is subject to inter-person variability, with differences in age, gender, ethnicity, and hormonal cycles contributing to individual differences [3]. Furthermore, many researchers suggest that stable personality differences may contribute to differences in skin conductance lability - a psychophysiological trait characterized by high SC responsivity and slow habituation [12]. As early as 1950, researchers have seen links between SC lability and such personality characteristics as emotional expressiveness, and antagonism [5]. Moreover, individuals defined as SC labiles have been seen to show greater myocardial reactivity in response to stress [9]. When developing stress recognition algorithms that incorporate measures of SC, interpersonal sources of variance should be considered.
3 Call Center Stress Recognition with Person-Specific Models Automatic Stress Recognition Several automatic stress recognition techniques have been explored in the research literature. In most cases, data are collected in the laboratory where variables that introduce noise are controlled or eliminated. Researchers have explored a variety of classification methods, and techniques to reduce interpersonal variability. Barreto, Zhai and Adjouadi [1], for example, used SVMs to discriminate between stressful and non stressful responses in a laboratory setting. The SVMs outperformed other classification algorithms, obtaining an accuracy of 90.1%. Various physiological signals were used in the classification, including SC, blood volume pulse, pupil diameter (PD) and skin temperature (ST). To account for participant variability, they divided extracted features from each participant with their corresponding baseline features. In a separate study, Setz et. al. [14] used SC to automatically distinguish between cognitive load and psychosocial stress. In this case, Linear Discriminant Analysis (LDA) obtained 82.8% accuracy, outperforming SVMs. Setz et al. found that the average number of SC peaks, as well as their height distributions, were the most relevant features to the problem. To account for participant variability, distributions were computed for each participant independently. In another study, Shi et al. [15] discriminated between stressful and non-stressful responses under social, cognitive and physical stressors. They obtained 68% precision and 80% recall using SVMs with SC, electrocardiogram (ECG), respiration (R) and ST. The problem of participant variability was addressed by subtracting a person-specific parameter to the features of each participant. This parameter was estimated as the average feature of all-non-stressful events of the participant. In an effort to automatically recognize stress in a real-life setting, Healey and Picard [6] monitored ECG, electromyogram, SC and R from people during a driving task. They used LDA to automatically discriminate between low (at rest), medium (highways) and high (city) levels of stress with 97% accuracy. In this case, the signals from each participant were normalized between zero and one, as proposed by [11]. All of these studies, except for Setz et. al. [14], used a combination of physiological signals, an approach that typically improves recognition accuracy. Nevertheless, some of the signals, such as PD and ECG, may not be easily recorded in real-life settings where comfortable and inconspicuous sensors are required to preserve natural behavior. 3 Study Design Location and Participants. The study was conducted at a call center in Rhode Island, and was approved by the Institutional Review Board at the Massachusetts Institute of Technology. Nine call center employees (five females and four males) agreed to participate in the study. The employees all had the same job description and they all handled the same types of calls. Throughout the course of one week, and only during work hours, participants wore a wristband biosensor and made self-report ratings at the end of each call
4 128 J. Hernandez, R.R. Morris, and R.W. Picard they received. Besides those two, minimally invasive conditions, the participants went about their work as usual. Their day is primarily spent on the phone, and they handle high volumes of calls, many of which come from angry and frustrated customers. Data Collection. Three sources of data were collected in this study: SC, selfreport measures, and worker call logs. SC was collected at a sampling rate of 8 Hz, similar to [10] and [15], and was recorded from dry Ag-AgCl 1cm diameter electrodes on the wrist, using an early beta version of the Affectiva 1 Q TM Sensor, a commercial sensor based on [13]. Throughout the study, participants were also asked to rate each call they received in terms of stress. Specifically, they were asked How was the last call? using a 7 point likert scale, with the endpoints labeled as extremely good indicating non-stressful and extremely bad indicating very stressful. While this question may not capture other types of stressors, it allowed for quick (1-2 seconds) and non-disruptive self-report ratings. The call center also provided break times and detailed call logs for each participant containing the start-time, end-time, and duration of every call our participants received. A total of 1500 calls were included in our study, averaging 4.51 minutes in length. Calls that had missing stress ratings, or corrupted SC (due to beta hardware problems or motion artifacts), were excluded. Fig. 1 shows a one day example of collected raw data SC 0 10:27 Time 17:40 Fig. 1. Example of data from one participant that contain calls (dots), stress ratings (darker areas represent more stressful calls), and break times (squares) 4 Proposed Method Throughout this paper, we shall focus on the problem of supervised classification. Let {(x i,y i )} n i=1 be an i.i.d. training set, where x i represents the feature vector of the sample i, andy i its class label, where y i = { 1, 1}. Let the class priors of this set be P + = #y=1 n = n+ n and P = n n. Similarly, we define the testing set as {(x i, y i )} n i=1,anditspriorsp +,andp. 1
5 Call Center Stress Recognition with Person-Specific Models 129 We consider the problem where training data comes from the observation of a set of participants, and the testing data belongs to a new participant. This methodology introduces the common problem of participant variability, which usually violates the i.i.d. assumption and leads to an overall decrease in performance. To address the participant variability problem, we propose incorporating information of the testing participant into the loss function of SVMs. Support Vector Machines [2] are considered state-of-the-art supervised classification algorithms, and their main goal is to find the hyperplane w that maximizes the margin between data samples belonging to two classes (e.g., stressful vs non-stressful responses). The standard formulation of SVMs is as follows: min w n + n 1 2 w 2 + C ξ i + ξ j } {{ } n i {y=+1} j {y= 1} regularization } {{ } loss function, (1) s.t. y i (w T x i ) 1 ξ i and ξ i 0, i =1, 2,...n (2) where C is the misclassification cost, and ξ i is the slack variable for the sample x i. For any new sample x, prediction is performed through y = w T x. 4.1 Changing Class Priors In the context of stress recognition, class priors indicate the probability to report stressful events. In equation 1, priors of the training data are directly integrated into the loss function, and will condition the predictions of the classifier. Since different people may report more or less stressful events, we propose modifying SVMs loss function to encode the class priors of the testing participant. A standard method to modify the class priors is the introduction of class weights (S + and S ) for each type of misclassification error such as: loss function = C n + n S + ξ i + S ξ j. (3) n i {y=+1} j {y= 1} If S+ S = P P +, the classifier will tend to equally predict positive and negative samples [7]. To predict with the same priors of the testing data, we propose to use S + = P+ P +,ands = P P. These weights come from enforcing the testing class priors n + S + n S P + = and P =, (4) n S + n + S + n S + n + S + while preserving the same magnitude of the misclassification error: n + + n = S + n + + S n. (5)
6 130 J. Hernandez, R.R. Morris, and R.W. Picard 4.2 Selecting Training Samples As described in Section 2, most of the approaches to address the interpersonal variability problem are based on feature transformations. Although these normalizations work well in practice, some participants may be less relevant than others to the classification because their display of physiologically responses is very different to the ones of the testing participant. Using a small set of unlabeled testing data, we propose finding the similarity of each training subject with the testing subject and use it during classification. We can encode this information as follows: loss function = C p r n v p, (6) n p=1 i participant p ξ i where r is the number of training participants, n p is the number of samples of the participant p, andv p defines the similarity of the participant p for classification, based on SC lability. In particular, we computed the average number of peaks (at least 0.05 μs of amplitude) per second and their height average for each training participant, and used k-means clustering with k = 2 to divide the participants. Given a new testing participant, we computed the same information and assigned v = 1 to the participants of the closer cluster, and v = 0 to the participants of the furthest one. 5 Experimental Setting Preprocessing. Prior to our analysis, stress ratings were normalized for each participant in order to use all of the scale and to attenuate subjectivity. Furthermore, since the call ratings were quite unbalanced (see Table 1), we transformed the problem to a binary case where calls defined as definitely non-stressful (rating of extremely good ) were grouped into the negative class, and the remaining calls were grouped into the positive class. Table 2 shows the average P + value of different days for each participant. As hypothesized, the tendency to report stressful events is very different between participants and similar for different days of the same person. Table 1. Distribution of call ratings (1 - extremely good and 7 - extremely bad ) Rating Number of Calls Exponential smoothing (α =0.8) was applied to the SC signals to reduce noise and motion artifacts. Skin conductance signals for each participant were also normalized between zero and one to reduce the overall variability of the group [11]. From each signal, we extracted the following features: duration, maximum and minimum values and their relative positions to the signal duration, mean, standard deviation, slope between the first and last signal values, number of zero crossings, and quantile thresholds to capture the distribution of peak heights as described in [14]. These features were normalized to have zero mean and unit standard deviation.
7 Call Center Stress Recognition with Person-Specific Models 131 Table 2. Average and standard deviation (STD) of P + for the nine participants Participant Average STD Average (%) STD (%) Experiments. Two testing protocols were used for the analysis. The first protocol (A) used leave-one-day-out cross-validation to obtain the stress ratings of one participant. That is, we used all days of a participant s data to train the algorithm, except one day that was used for testing. The process was repeated until all days were used as testing data. We expect this protocol to give the best performance for this data set, because both training and testing data come from the same participant. In practice, however, this protocol scales badly because it requires annotated information for each new participant. The second protocol (B) used leave-one-participant-out cross-validation. Here, the algorithm was trained with data from eight participants to predict the stress levels of the remaining participant, and it was repeated until all of the participants had been part of the testing data. This is a more realistic but difficult protocol in which the distribution of the training data and the testing data are dissimilar due to interpersonal variance. We tested the proposed modifications in this protocol with the expectation that it would mitigate the variance while preserving scalability. To perform classification, we used the publicly available LIBSVM library [4] that provides an efficient implementation of SVMs. We used the Radial Basis function as the kernel function to allow non-linear decision boundaries. For each training set, leave-one-participant/day-out was also used to find the parameters (log 2 C { 3:2:5}) andlog 2 kernel width { 15 : 2 : 1}) that maximized the following expression: TN 2(FN + FP +2TN) + TP 2(FN + FP +2TP), (7) where TP and TN arethe number ofcorrectlypredicted stressful (true positives) and non-stressful (true negatives) calls respectively, and FN and FP correspond to the number of misclassified stressful (false negatives) and non-stressful (false positives) calls respectively. This expression enforces the same relevance to both classes independently of their class priors. 6 Results Following the previous experimental settings, Fig. 2 shows the results for protocol A, protocol B, and improvements of protocol B - correcting class priors (CCP) and selecting training samples (STS). As expected, when no improvements were applied, protocol B showed consistently lower average performance than protocol A, 58.45% and 78.03% respectively. This finding confirms that participant variability is difficult to model even though our data was appropriately
8 132 J. Hernandez, R.R. Morris, and R.W. Picard A B + STS + CCP B + STS B + CCP B 100% 90% 80% 70% 60% 50% 40% 30% 20% 10% 0% Average Fig. 2. Classification accuracy for each participant normalized for all experiments. While CCP and STS individually increased the average accuracy to 69.83% and 70.91% respectively, the combination of the two improvements increased performance to 73.41%. Moreover, STS has the additional benefit of reducing the amount of training samples and therefore reducing the computational cost of the training phase. Closer inspection of Fig. 2 shows that the improvements did not increase performance for two out of the nine participants (4 and 6). No significant relationships could be made between the two participants, but a replication of similar experiments with a larger number of participants could shed light on this topic. To compare the overall performance, Fig. 3 (left) shows the Receiver Operating Characteristic (ROC) curves of protocol A, protocol B and B + STS + CCP. By observing the area under the curve (AUC), we can conclude that both improvements increased the overall accuracy. Although accuracy has been used for most of the research papers to compare performance, it may not be the most adequate metric for real-life settings where class labels may be very unbalanced. For instance, accuracy values could be high if the algorithm predicted just the most likely class which could potentially True Positive Rate A (AUC: 0.78) 0.1 B + STS + CCP (AUC: 0.71) B (AUC: 0.54) False Positive Rate Precision A (0.78 prec. at 0.6 rec.) 0.1 B + STS + CCP (0.66 prec. at 0.6 rec.) B (0.47 prec. at 0.6 rec.) Recall Fig. 3. ROCs and precision-recall curves
9 Call Center Stress Recognition with Person-Specific Models 133 ignore the class of interest (e.g., stressful calls.) As a complementary metric, we use precision-recall curves (see Fig. 3, right.) To analyze this curve, we can study a real case application where the company wants to collect stressful calls to train their new employees. In this case, the company wants to know how many of the calls predicted as stressful by the classifier were also reported as stressful by the employees. For instance, if we optimize our methods to correctly detect stressful calls 60% of the time (i.e., recall = 0.6), the percentage of these detections that are also reported as stressful calls (precision) is 78.40% for protocol A, 65.84% for B + STS + CCP, and 46.82% for B alone. These results are in line with the results using accuracy and, therefore, we can conclude that the proposed methods partly address the participant variability problem. 7 Conclusions This is one of the few research studies on stress recognition in an uncontrolled (real-life) setting. Unlike many other studies on workplace stress, we did not alter the working conditions to artificially create stressful scenarios. This naturalistic approach introduced undesired real-life variables (e.g., unbalanced reports, artifacts), many of which accentuated the problem of participant variability. In this context, we proposed two methods to account for individual differences in order to discriminate stressful vs. non-stressful calls of nine call-center employees. The two improvements - correction of the class priors and the selection of training samples - rely on the use of data from the testing participant. In many cases, the recovery of testing class priors may be unfeasible or expensive but, in this case, simple questionnaires can be used to obtain that information. As we showed great similarity in participants stress reports across days, we can also use one day of labeled monitoring to obtain the priors. As for the STS, we explored the use of SC lability to encode similarity between participants, a method that does not require any labeling. In the future, we intend to explore other similarity measures based on demographic characteristics (e.g., age, gender or ethnicity), and we intend to incorporate temporal models (e.g., Hidden Markov Models) to capture the dynamics of stress. In this paper we have illustrated the benefits of using person-specific models for stress recognition in a call center setting, but the methods explored in this paper can generalize to many areas of Affective Computing. Indeed, participant variability is a common issue in many types of affect recognition applications, and new methods are sorely needed to help tackle this problem. Acknowledgements. This work was supported in part by the MIT Media Lab Consortium. Javier Hernandez was supported by the Caja Madrid fellowship. References 1. Barreto, A., Zhai, J., Adjouadi, M.: Non-intrusive physiological monitoring for automated stress detection in human-computer interaction. In: ICCV-HCI, pp (2007)
10 134 J. Hernandez, R.R. Morris, and R.W. Picard 2. Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: 5th Annual ACM workshop on Computational Learning Theory, pp ACM Press, New York (1992) 3. Boucsein, W.: Electrodermal Activity. Plenum Press, New York (1992) 4. Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines (2001), software 5. Crider, A.: Personality and electrodermal response lability: an interpretation. Applied Psychophysiol Biofeedback 33(3), (2008) 6. Healey, J.A., Picard, R.W.: Detecting stress during real-world driving tasks using physiological sensors. IEEE Trans. Intell. Transport. Syst. 6, (2005) 7. Huang, Y.M., Du, S.X.: Weighted support vector machine for classification with uneven training class sizes. In: 4th International Conference on Machine Learning and Cybernetics, vol. 7, pp IEEE Press, Los Alamitos (2005) 8. Cacioppo, J.T., Tassinary, L.G., Berntson, G.G.: Handbook of Psychophysiology. Cambridge University Press, Cambridge (2000) 9. Kelsey, R.M.: Electrodermal lability and myocardial reactivity to stress. Psychophysiology 28(6), (1991) 10. Lunn, D., Harper, S.: Using galvanic skin response measures to identify areas of frustration for older web 2.0 users. In: International Cross Disciplinary Conference on Web Accessibility, p. 34. ACM, New York (2010) 11. Lykken, D.T., Venables, P.H.: Direct measurement of skin conductance: A proposal for standarization. Psychophysiology 8(5), (1971) 12. Mundy-Castle, A.C., McKiever, B.L.: The psychophysiological significance of the galvanic skin response. Experimental Psychology 46(1), (1953) 13. Poh, M., Swenson, N., Picard, R.: A wearable sensor for unobtrusive, long-term assessment of electrodermal activity. IEEE Trans. Biomed. Eng. 57(5), (2010) 14. Setz, C., Arnrich, B., Schumm, J., La Marca, R., Troster, G., Ehlert, U.: Discriminating stress from cognitive load using a wearable eda device. IEEE Transactions on Information Technology in Biomedicine 14(2), (2010) 15. Shi, Y., Nguyen, M.H., Blitz, P., French, B., Fisk, S., De la Torre, F., Smailagic, A., Siewiorek, D.P., al Absi, M., Ertin, E., Kamarck, T., Kumar, S.: Personalized stress detection from physiological measurements. In: International Symposium on Quality of Life Technology (2010)
FEEL: Frequent EDA and Event Logging A Mobile Social Interaction Stress Monitoring System
FEEL: Frequent EDA and Event Logging A Mobile Social Interaction Stress Monitoring System Yadid Ayzenberg MIT Media Lab 75 Amherst St. Cambridge, MA 02142, USA [email protected] Javier Hernandez MIT Media
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms
Comparing the Results of Support Vector Machines with Traditional Data Mining Algorithms Scott Pion and Lutz Hamel Abstract This paper presents the results of a series of analyses performed on direct mail
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
Stress Recognition using Wearable Sensors and Mobile Phones
2013 Humaine Association Conference on Affective Computing and Intelligent Interaction Stress Recognition using Wearable Sensors and Mobile Phones Akane Sano Massachusetts Institute of Technology Media
Towards Inferring Web Page Relevance An Eye-Tracking Study
Towards Inferring Web Page Relevance An Eye-Tracking Study 1, [email protected] Yinglong Zhang 1, [email protected] 1 The University of Texas at Austin Abstract We present initial results from a project,
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Search Taxonomy. Web Search. Search Engine Optimization. Information Retrieval
Information Retrieval INFO 4300 / CS 4300! Retrieval models Older models» Boolean retrieval» Vector Space model Probabilistic Models» BM25» Language models Web search» Learning to Rank Search Taxonomy!
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.
Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
Scalable Developments for Big Data Analytics in Remote Sensing
Scalable Developments for Big Data Analytics in Remote Sensing Federated Systems and Data Division Research Group High Productivity Data Processing Dr.-Ing. Morris Riedel et al. Research Group Leader,
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
SVM Ensemble Model for Investment Prediction
19 SVM Ensemble Model for Investment Prediction Chandra J, Assistant Professor, Department of Computer Science, Christ University, Bangalore Siji T. Mathew, Research Scholar, Christ University, Dept of
Spam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
Predict Influencers in the Social Network
Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, [email protected] Department of Electrical Engineering, Stanford University Abstract Given two persons
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Activity recognition in ADL settings. Ben Kröse [email protected]
Activity recognition in ADL settings Ben Kröse [email protected] Content Why sensor monitoring for health and wellbeing? Activity monitoring from simple sensors Cameras Co-design and privacy issues Necessity
BEDA: Visual analytics for behavioral and physiological data
BEDA: Visual analytics for behavioral and physiological data Jennifer Kim 1, Melinda Snodgrass 2, Mary Pietrowicz 1, Karrie Karahalios 1, and Jim Halle 2 Departments of 1 Computer Science and 2 Special
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
How To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
Determining optimal window size for texture feature extraction methods
IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec
Human Activities Recognition in Android Smartphone Using Support Vector Machine
2016 7th International Conference on Intelligent Systems, Modelling and Simulation Human Activities Recognition in Android Smartphone Using Support Vector Machine Duc Ngoc Tran Computer Engineer Faculty
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
Three Key Factors that Influence EDA in Observational Studies of Occupational Therapy
Three Key Factors that Influence EDA in Observational Studies of Occupational Therapy Elliott Hedman 1, Rosalind Picard 1,Lucy Jane Miller 2, and Matthew Goodwin 1 1. Media Lab, MIT, Cambridge, Massachusetts
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH
1 SURVIVABILITY OF COMPLEX SYSTEM SUPPORT VECTOR MACHINE BASED APPROACH Y, HONG, N. GAUTAM, S. R. T. KUMARA, A. SURANA, H. GUPTA, S. LEE, V. NARAYANAN, H. THADAKAMALLA The Dept. of Industrial Engineering,
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
Bijan Raahemi, Ph.D., P.Eng, SMIEEE Associate Professor Telfer School of Management and School of Electrical Engineering and Computer Science
Bijan Raahemi, Ph.D., P.Eng, SMIEEE Associate Professor Telfer School of Management and School of Electrical Engineering and Computer Science University of Ottawa April 30, 2014 1 Data Mining Data Mining
International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013
A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:
Emotion Detection from Speech
Emotion Detection from Speech 1. Introduction Although emotion detection from speech is a relatively new field of research, it has many potential applications. In human-computer or human-human interaction
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent Trends and Challenges
Sensors 2013, 13, 17472-17500; doi:10.3390/s131217472 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Review Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent
Proactive Drive Failure Prediction for Large Scale Storage Systems
Proactive Drive Failure Prediction for Large Scale Storage Systems Bingpeng Zhu, Gang Wang, Xiaoguang Liu 2, Dianming Hu 3, Sheng Lin, Jingwei Ma Nankai-Baidu Joint Lab, College of Information Technical
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
A fast multi-class SVM learning method for huge databases
www.ijcsi.org 544 A fast multi-class SVM learning method for huge databases Djeffal Abdelhamid 1, Babahenini Mohamed Chaouki 2 and Taleb-Ahmed Abdelmalik 3 1,2 Computer science department, LESIA Laboratory,
IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION
http:// IDENTIFIC ATION OF SOFTWARE EROSION USING LOGISTIC REGRESSION Harinder Kaur 1, Raveen Bajwa 2 1 PG Student., CSE., Baba Banda Singh Bahadur Engg. College, Fatehgarh Sahib, (India) 2 Asstt. Prof.,
Making Sense of the Mayhem: Machine Learning and March Madness
Making Sense of the Mayhem: Machine Learning and March Madness Alex Tran and Adam Ginzberg Stanford University [email protected] [email protected] I. Introduction III. Model The goal of our research
Getting Even More Out of Ensemble Selection
Getting Even More Out of Ensemble Selection Quan Sun Department of Computer Science The University of Waikato Hamilton, New Zealand [email protected] ABSTRACT Ensemble Selection uses forward stepwise
Supervised Learning (Big Data Analytics)
Supervised Learning (Big Data Analytics) Vibhav Gogate Department of Computer Science The University of Texas at Dallas Practical advice Goal of Big Data Analytics Uncover patterns in Data. Can be used
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data
CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
Embodied decision making with animations
Embodied decision making with animations S. Maggi and S. I. Fabrikant University of Zurich, Department of Geography, Winterthurerstr. 19, CH 857 Zurich, Switzerland. Email: {sara.maggi, sara.fabrikant}@geo.uzh.ch
Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification
Department of Telecommunication Engineering Hijjawi Faculty for Engineering Technology Yarmouk University Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Prepared by Orobh
Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j
Analysis of kiva.com Microlending Service! Hoda Eydgahi Julia Ma Andy Bardagjy December 9, 2010 MAS.622j What is Kiva? An organization that allows people to lend small amounts of money via the Internet
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Less naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:[email protected] also CoSiNe Connectivity Systems
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control
Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control Andre BERGMANN Salzgitter Mannesmann Forschung GmbH; Duisburg, Germany Phone: +49 203 9993154, Fax: +49 203 9993234;
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM
A DECISION TREE BASED PEDOMETER AND ITS IMPLEMENTATION ON THE ANDROID PLATFORM ABSTRACT Juanying Lin, Leanne Chan and Hong Yan Department of Electronic Engineering, City University of Hong Kong, Hong Kong,
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
Accelerometer Based Real-Time Gesture Recognition
POSTER 2008, PRAGUE MAY 15 1 Accelerometer Based Real-Time Gesture Recognition Zoltán PREKOPCSÁK 1 1 Dept. of Telecomm. and Media Informatics, Budapest University of Technology and Economics, Magyar tudósok
Support Vector Machine (SVM)
Support Vector Machine (SVM) CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Margin concept Hard-Margin SVM Soft-Margin SVM Dual Problems of Hard-Margin
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
Time series analysis of data from stress ECG
Communications to SIMAI Congress, ISSN 827-905, Vol. 3 (2009) DOI: 0.685/CSC09XXX Time series analysis of data from stress ECG Camillo Cammarota Dipartimento di Matematica La Sapienza Università di Roma,
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
How To Predict Web Site Visits
Web Site Visit Forecasting Using Data Mining Techniques Chandana Napagoda Abstract: Data mining is a technique which is used for identifying relationships between various large amounts of data in many
Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction
Choosing the Best Classification Performance Metric for Wrapper-based Software Metric Selection for Defect Prediction Huanjing Wang Western Kentucky University [email protected] Taghi M. Khoshgoftaar
Classification of Bad Accounts in Credit Card Industry
Classification of Bad Accounts in Credit Card Industry Chengwei Yuan December 12, 2014 Introduction Risk management is critical for a credit card company to survive in such competing industry. In addition
Introduction to Machine Learning Lecture 1. Mehryar Mohri Courant Institute and Google Research [email protected]
Introduction to Machine Learning Lecture 1 Mehryar Mohri Courant Institute and Google Research [email protected] Introduction Logistics Prerequisites: basics concepts needed in probability and statistics
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Data Refinery with Big Data Aspects
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 7 (2013), pp. 655-662 International Research Publications House http://www. irphouse.com /ijict.htm Data
Online Learning in Biometrics: A Case Study in Face Classifier Update
Online Learning in Biometrics: A Case Study in Face Classifier Update Richa Singh, Mayank Vatsa, Arun Ross, and Afzel Noore Abstract In large scale applications, hundreds of new subjects may be regularly
MAXIMIZING RETURN ON DIRECT MARKETING CAMPAIGNS
MAXIMIZING RETURN ON DIRET MARKETING AMPAIGNS IN OMMERIAL BANKING S 229 Project: Final Report Oleksandra Onosova INTRODUTION Recent innovations in cloud computing and unified communications have made a
Advanced Ensemble Strategies for Polynomial Models
Advanced Ensemble Strategies for Polynomial Models Pavel Kordík 1, Jan Černý 2 1 Dept. of Computer Science, Faculty of Information Technology, Czech Technical University in Prague, 2 Dept. of Computer
RESEARCH ON SPOKEN LANGUAGE PROCESSING Progress Report No. 29 (2008) Indiana University
RESEARCH ON SPOKEN LANGUAGE PROCESSING Progress Report No. 29 (2008) Indiana University A Software-Based System for Synchronizing and Preprocessing Eye Movement Data in Preparation for Analysis 1 Mohammad
WebFOCUS RStat. RStat. Predict the Future and Make Effective Decisions Today. WebFOCUS RStat
Information Builders enables agile information solutions with business intelligence (BI) and integration technologies. WebFOCUS the most widely utilized business intelligence platform connects to any enterprise
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
Fraud Detection for Online Retail using Random Forests
Fraud Detection for Online Retail using Random Forests Eric Altendorf, Peter Brende, Josh Daniel, Laurent Lessard Abstract As online commerce becomes more common, fraud is an increasingly important concern.
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment
A Performance Study of Load Balancing Strategies for Approximate String Matching on an MPI Heterogeneous System Environment Panagiotis D. Michailidis and Konstantinos G. Margaritis Parallel and Distributed
Support Vector Machine. Tutorial. (and Statistical Learning Theory)
Support Vector Machine (and Statistical Learning Theory) Tutorial Jason Weston NEC Labs America 4 Independence Way, Princeton, USA. [email protected] 1 Support Vector Machines: history SVMs introduced
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm
Constrained Classification of Large Imbalanced Data by Logistic Regression and Genetic Algorithm Martin Hlosta, Rostislav Stríž, Jan Kupčík, Jaroslav Zendulka, and Tomáš Hruška A. Imbalanced Data Classification
Automated Problem List Generation from Electronic Medical Records in IBM Watson
Proceedings of the Twenty-Seventh Conference on Innovative Applications of Artificial Intelligence Automated Problem List Generation from Electronic Medical Records in IBM Watson Murthy Devarakonda, Ching-Huei
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
A Segmentation Algorithm for Zebra Finch Song at the Note Level. Ping Du and Todd W. Troyer
A Segmentation Algorithm for Zebra Finch Song at the Note Level Ping Du and Todd W. Troyer Neuroscience and Cognitive Science Program, Dept. of Psychology University of Maryland, College Park, MD 20742
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
A Context Server to Allow Peripheral Interaction
A Context Server to Allow Peripheral Interaction Borja Gamecho, Luis Gardeazabal and Julio Abascal Egokituz: Laboratory of HCI for Special Needs, University of the Basque Country (UPV/EHU), Donostia, Spain
Using Heart Rate Monitors to Detect Mental Stress
2009 Body Sensor Networks Using Heart Rate Monitors to Detect Mental Stress Jongyoon Choi and Ricardo Gutierrez-Osuna Department of Computer Science and Engineering Texas A&M University College Station,
Domain Classification of Technical Terms Using the Web
Systems and Computers in Japan, Vol. 38, No. 14, 2007 Translated from Denshi Joho Tsushin Gakkai Ronbunshi, Vol. J89-D, No. 11, November 2006, pp. 2470 2482 Domain Classification of Technical Terms Using
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm
1 Enhancing the SNR of the Fiber Optic Rotation Sensor using the LMS Algorithm Hani Mehrpouyan, Student Member, IEEE, Department of Electrical and Computer Engineering Queen s University, Kingston, Ontario,
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
