A Demonstration of a Robust Context Classification System (CCS) and its Context ToolChain (CTC)



Similar documents
Knowledge Discovery from patents using KMX Text Analytics

How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

Is a Data Scientist the New Quant? Stuart Kozola MathWorks

Data Mining. SPSS Clementine Clementine Overview. Spring 2010 Instructor: Dr. Masoud Yaghini. Clementine

The ArubaOS Spectrum Analyzer Module

Data Mining mit der JMSL Numerical Library for Java Applications

The Scientific Data Mining Process

Training for Big Data

Demo: Real-time Tracking of Round Object

Applications of Deep Learning to the GEOINT mission. June 2015

The Big Data methodology in computer vision systems

From Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data

Going Big in Data Dimensionality:

Talend Real-Time Big Data Sandbox. Big Data Insights Cookbook

Performing a data mining tool evaluation

Restorable Logical Topology using Cross-Layer Optimization

Applying Deep Learning to Car Data Logging (CDL) and Driver Assessor (DA) October 22-Oct-15

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

Depth and Excluded Courses

Power over Ethernet technology for industrial Ethernet networks

Final Project Report

An Evaluation Study of Driver Profiling Fuzzy Algorithms using Smartphones

Sensor Integration in the Security Domain

INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS

TDWI Best Practice BI & DW Predictive Analytics & Data Mining

Search and Data Mining: Techniques. Applications Anya Yarygina Boris Novikov

Predictive Analytics

WAITER: A Wearable Personal Healthcare and Emergency Aid System

TI 313 (1.0 EN) d&b Remote network - Integration

IMPLEMENTATION OF DATA PROCESSING AND AUTOMATED ALGORITHM BASED FAULT DETECTION FOR SOLAR THERMAL SYSTEMS

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Artificial Intelligence: Fuzzy Logic Explained

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems

BIG DATA IN THE CLOUD : CHALLENGES AND OPPORTUNITIES MARY- JANE SULE & PROF. MAOZHEN LI BRUNEL UNIVERSITY, LONDON

Designing and Embodiment of Software that Creates Middle Ware for Resource Management in Embedded System

Rapid Audio Prototyping

not possible or was possible at a high cost for collecting the data.

DMDSS: Data Mining Based Decision Support System to Integrate Data Mining and Decision Support

Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network

An Overview of Knowledge Discovery Database and Data mining Techniques

Prediction of DDoS Attack Scheme

300Mbps Wireless N Ceiling Mount Access Point

Course Syllabus For Operations Management. Management Information Systems

Dynamic M2M Event Processing Complex Event Processing and OSGi on Java Embedded

Human Activities Recognition in Android Smartphone Using Support Vector Machine

DATA MINING TECHNIQUES SUPPORT TO KNOWLEGDE OF BUSINESS INTELLIGENT SYSTEM

An Introduction to Data Mining

GROW WITH BIG DATA Third Eye Consulting Services & Solutions LLC.

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

CS231M Project Report - Automated Real-Time Face Tracking and Blending

Monitoring Software using Sun Spots. Corey Andalora February 19, 2008

Toolkit for Bar Code Recognition and Resolving on Camera Phones - Jump-Starting the Internet of Things

Server Consolidation with SQL Server 2008

Accelerometer Based Real-Time Gesture Recognition

inc.jet Software Solutions Design, Control and Monitor

PSG College of Technology, Coimbatore Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

Detection of Leak Holes in Underground Drinking Water Pipelines using Acoustic and Proximity Sensing Systems

Where is... How do I get to...

ANALYTICS IN BIG DATA ERA

Alternative Biometric as Method of Information Security of Healthcare Systems

VitalJacket SDK v Technical Specifications

Advanced In-Database Analytics

Course DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

Report of Research Results

Customer Classification And Prediction Based On Data Mining Technique

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Improving Decision Making and Managing Knowledge

IFS-8000 V2.0 INFORMATION FUSION SYSTEM

Huawei One Net Campus Network Solution

VDI FIT and VDI UX: Composite Metrics Track Good, Fair, Poor Desktop Performance

Big Data with Rough Set Using Map- Reduce

Image Compression through DCT and Huffman Coding Technique

Estimating Trust Value for Cloud Service Providers using Fuzzy Logic

Data Mining for Manufacturing: Preventive Maintenance, Failure Prediction, Quality Control

Statistical Challenges with Big Data in Management Science

Big Data Analytics. An Introduction. Oliver Fuchsberger University of Paderborn 2014

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

The Department of Electrical and Computer Engineering (ECE) offers the following graduate degree programs:

From Control Loops to Software

Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization

CREDIT CARD FRAUD DETECTION SYSTEM USING GENETIC ALGORITHM

2. IMPLEMENTATION. International Journal of Computer Applications ( ) Volume 70 No.18, May 2013

Sensor Devices and Sensor Network Applications for the Smart Grid/Smart Cities. Dr. William Kao

Increase System Efficiency with Condition Monitoring. Embedded Control and Monitoring Summit National Instruments

Big Data Text Mining and Visualization. Anton Heijs

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

Voice Communication Package v7.0 of front-end voice processing software technologies General description and technical specification

Enabling Cloud Architecture for Globally Distributed Applications

VitalJacket SDK v Technical Specifications

Anomaly Detection and Predictive Maintenance

MEng, BSc Applied Computer Science

Transcription:

A Demonstration of a Robust Context Classification System () and its Context ToolChain (CTC) Martin Berchtold, Henning Günther and Michael Beigl Institut für Betriebssysteme und Rechnerverbund Abstract. This demonstration aims to show the functionality of our tool chain, which supports the robust Context Classification System () system. The tool chain is developed to collect and annotate sensor data, extract features and to identify the with machine learning techniques. A hands on experience starts by collecting data, visualization and annotation, identification of the, deployment on a commodity phone (e.g. OpenMoko Freerunner [1]) and then test of the through the user. Due to the novel design of our, we are able to detect a high amount of activities (>10 classes with acceleration sensor) and contexts (>5 classes due audio) on the phone in realtime with less than 50% processor load. 1 Overview Fig. 1. Example activities recognizable in demonstration and demo equipment. The purpose of this demonstration is to show the capabilities of our Context-Tool Chain (CTC) [2] and our novel robust Context Classification System (). We will show that using our CTC simplifies the process of collecting and annotating sensory data, the training of classifiers and the deployment of the. Also, the usage of the will demonstrate the capabilities of the classification system, which are high recognition rates for a high amount of classes with a low calculation effort in mean. The also delivers a fuzzy uncertainty with every classification, whereas a filtering upon this demonstrates a further improvement in reliability.

First, we show how data is collected and possibly annotated with the Data Collector Tool (DCT). The data can directly be annotated on the phone with the DCT or, in a second step, be annotated afterwards in the Context Annotator Tool (CAT). The CAT also is responsible for data conversion and visualization. In a next step the features are extracted and the identification of the is done. The identification is done through our novel machine learning algorithm. After identification, the parameters get transmitted to the phone, where a parser interprets them and builds the running. Finally, the can be evaluated through the user, whereas the filtering upon the fuzzy uncertainty can show further improvements. All steps are visualized in figure 2. 1 Annotated 3 Training Data Raw Data Feature Extraction Audio Data Collection DCT Phone Non Annotated Raw Data Manual Annotation CAT 2 Conversion CAT FFT for Audio Data Mean/ Variance for Acceleration Data Personal Computer Training Data Accelerometer 4 5 Identification Algorithm Audio Accel Phone Fig. 2. Training Data Gain using DCT, CAT and Feature Extraction 2 Classification ToolChain The ToolChain consists of the following tools: Data Collector Tool: The DCT is a simple application which runs on a mobile phone and collects sensor data. The data is stored using the Annotation Package Format, a file format that combines sensor data with annotation data. Annotating the data onthe-fly with context information is also possible. The tool will run on a OpenMoko Freerunner mobile phone for the demonstration. Context Annotator Tool: The recorded sensor data is then annotated using the CAT. This tool presents the sensor data as graphs to the user, who can then annotate it with context information. Being implemented in python the CAT can run on almost any computer platform. See figure 3 for a screenshot of a running instance. Context Classifier System () identification algorithm: The identification algorithm is used to generate suitable classifiers from the annotated sensor data. The algorithm uses a combination of a clustering algorithm, linear regression and genetic algorithm generalization. Details of the algorithm are described in [2]. Context Classification System: The is (for performance reasons) implemented as a native application on the OpenMoko Freerunner. It fetches sensor data and infers the current user-context using the algorithm described in section 3. Context information is either presented to the user (on the phone or remote on a laptop) or e.g. used in an application to switch phone profiles.

Fig. 3. The Context Annotator Tool and a Freerunner running the Context Collector Tool 3 Context Classification System () The consists of several steps of processing from a real world value to a tuple of class and reliability. The first step is the sensory, that converts the real world signal into a digital measurement. Secondly, the desired features are extracted from the measurements. In the third step the Recurrent Fuzzy Inference System (RFIS) maps the features onto a classifiable linear set. The linear set is fuzzily classified according to designated fuzzy numbers in the last step. 1. Feature Extraction: Sensors for classification are e.g. audio and acceleration. The features used for classifying the acceleration measurements are mostly variance and mean values, since they can be calculated with low resource consumption and give good classification results. For audio data the standard extraction method is a Fast Fourier Transformation (FFT). Since the dimensionality after the FFT is too high to be used as input for a classifier, mean, variance and frequency centroid is calculated. 2. Recurrent FIS Mapping: A TSK-FIS [3] is used to map the extracted features onto a set, whose values can be assigned to a class identifier in a separate classification process. The outcome of the mapping at time t is fed back as additional input dimension for the TSK-FIS mapping at t + 1. The recurrency not only delivers the desired reliability value, but also stabilizes and improves the mapping accuracy [4]. Our goal is to classify on as many classes as possible. As shown in [5] the abilities of monolithic classifiers are limited, so we use a divide and conquer approach to cope with this problem. Instead of using one classifier to classify on all classes, we use many classifiers each classifying on a small subset of classes. To recognize not only the respective classes, but also the transition between classifiers, each classifier classifies on a complementary class as well. All classifiers are chained in a dynamic queue, where the last classifier classifying on a class different from the complementary class is put first in queue. 3. Fuzzy Classification: The assignment of mapping result to a class is done fuzzily, so the result is not only a class identifier, but also a membership, representing the reliability of the classification process. Each class is interpreted as a triangular shaped fuzzy number. The mean of the fuzzy number is the identifier itself. The crisp decision (which identifier is the mapping outcome) is carried out based on the highest degree of

membership to one of the classes fuzzy number. The overall output of the RFIS mapping and the classification is a tuple (C A, µ A ) of a class identifier and the membership to it. Two of the above described are running on the phone, one is classifying the audio, the other one the accelerometer data stream. The for the audio data stream is producing about 16 and the for the accelerometer about 13 classifications per second. A filtering upon the fuzzy uncertainty (µ) reduces the amount of data, but increases reliability sufficiently. The filtering will be part of the demonstration. 4 Summary In this demonstration the participant can have a hands-on experience of building a context-aware system for a commodity phone. The experience starts by collecting data, whereas the participant does the activities she wants to recognize. An annotation of the data set can be done on the phone or in a separate process with a graphical tool. The machine learning algorithm produces the classification system, which is deployed onto the phone. In an evaluation phase, the participant can experience the accuracy and performance of the built system. A filtering upon a fuzzy uncertainty should show, how the accuracy can be improved. References 1. : OpenMoko project http://www.openmoko.org. 2. Günther, H., Simrany, F.E., Berchtold, M., Beigl, M.: A tool chain for a lightweight, robust and uncertainty-based context classification system. ARCS Workshop CoSDEO (2010) 3. Tagaki, T., Sugeno, M.: Fuzzy identification of systems and its application to modelling and control. Syst., Man and Cybernetics (1985) 4. Berchtold, M., Beigl, M.: Increased robustness in context detection and reasoning using uncertainty measures - concept and application. Proceedings of the European Conference on Ambient Intelligence (AmI 09) (2009) 5. Berchtold, M., Riedel, T., Beigl, M., Decker, C.: Awarepen - classfication probability and fuzziness in a context aware application. Ubiquitous Intelligence and Computing (2008)

A Demonstration of a Robust Context Classification System () and its Context ToolChain (CTC) - Demonstration Description Henning Günther Fig. 1. Example activities recognizable in demonstration and demo equipment. 1 Hardware requirements The demonstration uses the following hardware components: 2-3 OpenMoko Freerunner mobile phones 1-2 laptop computers Possibly a W-LAN router The laptop computer is connected via W-LAN (or if wireless is buggy via USB) to both phones. The space the demo requires is as large as a table the laptop(s) are placed on and an additional area of 1m 1m for the user to do the activities. 2 Procedure 1. The user uses a OpenMoko Freerunner phone to collect sensor data. This requires the user to perform certain activities (e.g. walking around, sitting down and/or dancing) or audio contexts (e.g. talking, typing on a keyboard and/or clapping hands). The respective annotation can here already be done on the phone. 2. The collected data is uploaded to the laptop, where its investigated and possibly annotated. 3. A set of classifiers is generated on the laptop through machine learning. 4. The classifiers are uploaded to the phone and the user can try them by performing the same activities used in step 1. The recognized activities and contexts are shown on the phone and remote on a laptop. Possibly a application of automatic phone profiles is triggered.