Recognizing and Predicting Context by Learning from User Behavior

Similar documents
Feature Extraction in Wireless Personal and Local Area Networks

Context prediction based on learning user habits: A next step towards "smart" systems

Extending the Growing Neural Gas Classifier for Context Recognition

Extending the Growing Neural Gas Classifier for Context Recognition

MOBILE COMPUTING 2/14/17. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

MOBILE COMPUTING 2/11/18. System Structure. Context as Implicit Input. explicit input. explicit output. explicit input.

GENERATING HIGH LEVEL CONTEXT FROM SENSOR DATA FOR MOBILE APPLICATIONS

Machine Learning (CSMML16) (Autumn term, ) Xia Hong

Cluster Analysis. Mu-Chun Su. Department of Computer Science and Information Engineering National Central University 2003/3/11 1

Exploratory Data Analysis using Self-Organizing Maps. Madhumanti Ray

Context-Aware Systems. Michael Maynord Feb. 24, 2014

Data mining fundamentals

9/27/15 MOBILE COMPUTING. CSE 40814/60814 Fall System Structure. explicit output. explicit input

A SURVEY OF IMAGE MINING TECHNIQUES AND APPLICATIONS

Random Forest A. Fornaser

Policy-Based Context-Management for Mobile Solutions

D B M G Data Base and Data Mining Group of Politecnico di Torino

Homework # 4. Example: Age in years. Answer: Discrete, quantitative, ratio. a) Year that an event happened, e.g., 1917, 1950, 2000.

Machine Learning : Clustering, Self-Organizing Maps

Cooperative Communications and Wireless Body Area Networks. Xigang Huang

Slide07 Haykin Chapter 9: Self-Organizing Maps

INTRODUCTION TO DATA MINING

Music Similarity Clustering

A Survey of Context-Aware Mobile Computing Research

Input: Concepts, Instances, Attributes

CHAPTER 4: CLUSTER ANALYSIS

DI TRANSFORM. The regressive analyses. identify relationships

2. Basic Task of Pattern Classification

Chapter DM:II. II. Cluster Analysis

Chapter 7: Competitive learning, clustering, and self-organizing maps

CogniSight, image recognition engine

Data Sources for Cyber Security Research

Context Aware Computing

CS513-Data Mining. Lecture 2: Understanding the Data. Waheed Noor

Unsupervised Learning

Overview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!

Applied Statistics for Neuroscientists Part IIa: Machine Learning

Star rating driver safety behavior by the use of smart technologies

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

PARALLEL CLASSIFICATION ALGORITHMS

COMP90049 Knowledge Technologies

Department of Computer Science & Engineering University of Kalyani. Syllabus for Ph.D. Coursework

Efficient Method for Intrusion Detection in Multitenanat Data Center; A Review

Public Sensing Using Your Mobile Phone for Crowd Sourcing

Object perception by primates

Cluster analysis of 3D seismic data for oil and gas exploration

KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting

Why? SenseML 2014 Keynote. Immanuel Schweizer

Hybrid Models Using Unsupervised Clustering for Prediction of Customer Churn

Measuring the Capability of Smartphones for Executing Context Algorithms

Associative Cellular Learning Automata and its Applications

Location-Based Services & Route Planning

Personal Trusted Device in Personal Communications

Adaptive Spatiotemporal Node Selection in Dynamic Networks

Tizen apps with. Context Awareness, powered by AI. by Shashwat Pradhan, CEO Emberify

Data mining with sparse grids

Applying Supervised Learning

Table Of Contents: xix Foreword to Second Edition

MOBILE COMPUTING (Common to Computer Science & Engineering and Information Technology)

3D Hand Pose Estimation with Neural Networks

Slides for Data Mining by I. H. Witten and E. Frank

Big Data Methods. Chapter 5: Machine learning. Big Data Methods, Chapter 5, Slide 1

CSIS. Pattern Recognition. Prof. Sung-Hyuk Cha Fall of School of Computer Science & Information Systems. Artificial Intelligence CSIS

Machine Learning Techniques for Data Mining

Autoorganised Structures for Extraction of Perceptual Primitives

Stability Assessment of Electric Power Systems using Growing Neural Gas and Self-Organizing Maps

Data: a collection of numbers or facts that require further processing before they are meaningful

Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.

Machine Learning Chapter 2. Input

Lecture 6: Unsupervised Machine Learning Dagmar Gromann International Center For Computational Logic

Data Mining Practical Machine Learning Tools and Techniques

Pedestrian Detection with Radar and Computer Vision

The Role of a Context Service in a System that aims at integrating the Digital with the Real World

Image Processing, Analysis and Machine Vision

Image Mining: frameworks and techniques

Machine Learning for the Quantified Self. Lecture 2 Basic of Sensory Data

Robot Learning. There are generally three types of robot learning: Learning from data. Learning by demonstration. Reinforcement learning

Providing Information Superiority to Small Tactical Units

Figure 1: Workflow of object-based classification

Activity Recognition Using Cell Phone Accelerometers

Context Awareness for Group Interaction Support

Discovery of Agricultural Patterns Using Parallel Hybrid Clustering Paradigm

Modeling Context-Aware Behavior by Interpreted ECA Rules

TreeGNG - Hierarchical Topological Clustering

Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques

Observations and Measurements

CS 556: Computer Vision. Lecture 18

Data Mining. Practical Machine Learning Tools and Techniques. Slides for Chapter 3 of Data Mining by I. H. Witten, E. Frank and M. A.

Nexus A Global, Active,

Mining di Dati Web. Lezione 3 - Clustering and Classification

Semi-Supervised Clustering with Partial Background Information

Introduction to Data Mining and Data Analytics

Topics in AI (CPSC 532L): Multimodal Learning with Vision, Language and Sound. Lecture 12: Deep Reinforcement Learning

Swarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013

Diver Telemetry Wireless Groundwater & Surface Water Data Transmission

Ad hoc and Sensor Networks Chapter 3: Network architecture

Careers in Smart Technologies Jamie McCormick September 17 th, 18 th & 19 th

A Review on Cluster Based Approach in Data Mining

Event: PASS SQL Saturday - DC 2018 Presenter: Jon Tupitza, CTO Architect

An Analysis of the Usage of Mobile Phones for Personalized Interactions with Ubiquitous Public Displays

Transcription:

Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 >

Vision A Personal Digital Assistant that can live up to its name. < 2 >

Mission Problem: Most information appliances are difficult to use for non-technology-savy users Devices only react to user input Users have to adapt to the devices Aim: Make information appliances smarter in a sense that they are easier to use Devices should be proactive Devices should adapt to the user < 3 >

Approach Personal information appliances should learn from user s habits Exploiting multiple sensors for context awareness Predicting future user context by learning from the past information appliance sensors (low level data) current user context user habits high level context information application future user context < 4 >

Content Introduction Context awareness Proactivity Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 5 >

Context awareness Many definitions for context, e.g. by Dey as any information that can be used to characterize the situation of an entity, where an entity can be a person, place or a physical or computational object Context has many aspects Using multiple simple sensors seems more reasonable to capture different aspects of context < 6 >

Proactivity < 7 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 8 >

Architecture S 1 Feature extraction Classification Labeling Meeting n t Sensors S 2 S 3 C 1 C 2 At desk m t+ C m C k / P k S l Prediction <s 1, s 2,..., s l > t <f 1, f 2,..., f n > t <c 1, c 2,..., c m > t <c 1, c 2,..., c m > t+ Input vector (Sensor vector) Feature vector Class vector Future class vector < 9 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 10 >

Sensors for (mobile) information appliances Typical sensors available for monitoring the user context: Time Application/Window manager Brightness Microphone Bluetooth Wireless LAN Docked / undocked Other suitable sensors can be connected: GPS GSM Compass Accelerometer Tilt sensor Temperature sensor Pressure sensor Sharing of sensor data between appliances < 11 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction < 12 >

Feature Extraction Raw sensor data is transformed into more meaningful features Feature extraction exploits domain-specific knowledge Multiple features extracted from a single sensor High-dimensional input vectors Different types of features: Numerical (continuous) sensors: e.g. brightness sensor Numerical (discrete) sensors: e.g. number of access points in range Ordinal sensors: e.g. day of week Nominal sensors: e.g. WLAN-SSID, list of Bluetooth devices in spatial proximity Only two operations necessary for each feature: Distance metric Adaptation operator < 13 >

Feature extraction on a current PDA With current computational power easily possible Every feature implements distance metric and adaptation operator On-line classifications possible with any combination of features (user-selectable and loaded dynamically during startup) < 15 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 16 >

Classification: Introduction Classifies feature vectors and finds common patterns in sensor data Different types of classification algorithms Type (partitioning / hierarchical) Soft / hard classification Supervised / unsupervised Requirements for classifying user context in information appliances: On-line learning Adaptivity Variable number of classes and variable topology Soft classification Noise resistance Limited resources Simplicity Interpretability of classes / protection of data privacy < 17 >

Classification: Algorithms Algorithm Network topology Topology preserving Competitive SOM fixed yes soft RSOM fixed yes soft K-Means fixed no hard Leader variable no hard Growing K-Means variable no hard Neural Gas variable no soft Neural Gas + Competitive Hebbian Learning variable yes soft Growing Neural Gas variable yes soft Incremental DBSCAN variable No hard < 18 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 20 >

Assigning user-defined labels to user context t t t 1:{0,1} assignment of (meta-) clusters to context names Two possibilities: If the (meta-) clusters at the output of the classification step are stable, direct assignment to names If the (meta-) clusters are unstable due to learning and adaptation, use a second, simple classification step [van Laerhoven, 2001] ID 1 = at work ID 2 = meeting ID 3 = lunch ID 4 = ID 5 = at home < 21 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 22 >

Prediction of User Context Recognized context classes can be regarded as states of an abstract state machine Monitoring the state trajectory allows to predict future states Prediction algorithm requirements for predicting context states : Unsupervised model estimation On-line learning Incremental model growing Confidence estimation Automatic feedback Manual feedback Long-term vs. short-term Architecture allows prediction algorithms to be realized as plug-ins Algorithms can be changed according to the specific application needs < 23 >

Content Introduction Architecture Step 0: Sensor data acquisition Step 1: Feature extraction Step 2: Classification Step 3: Labeling Step 4: Prediction First results < 24 >

First Results Test data gathered over 10 days for a selection of features: Timestamp Bluetooth: list of MAC addresses in spatial proximity Bluetooth: number of peers in spatial proximity Wireless LAN: list of MAC addresses in spatial proximity (clients associated to a nearby access point) Currently active application Distance metrics and adaptation operators implemented in straight-forward ways (e.g. Hamming distance for lists of MAC addresses) Implementation of Lifelong Growing Neural Gas (LLGNG) as classification algorithm < 25 >

First Results One-pass (online) run through the log file yields (multiple test runs): ~ 40 clusters ~ 6 meta-clusters < 0.12 overall classification error (average distance of input data points to cluster centers) < 26 >

Summary Architecture allows recognition and prediction of user context from raw sensor data in an un-supervised, non-obtrusive way in 4 steps: Feature extraction Classification Labeling Prediction Simple interfaces between the architecture layers Multiple, simple sensors instead of a single, complex one Heterogeneous feature vector handled via specific implementation of: distance metric adaptation operator for each feature First implementations of feature extraction and classification show promising results < 27 >

Conclusions and Future Outlook Proactive applications could allow the development of more intuitive user interfaces A Personal Digital Assistant and information appliances in general should become proactive to achieve a wider acceptance Context awareness is one possibility to achieve proactivity in applications Learning user behavior allows to predict future user context and thus future user actions Future research on non-obtrusive user interfaces for labeling user context necessary Qualitative comparison of prediction methods will be performed using realworld data < 28 >

It is hard to predict, especially the future Neils Bohr Winner of a Nobel Prize for physics < 29 >

The best way to predict the future is to invent it. Alan Kay Inventor of Smalltalk < 30 >

Thank you for your attention! < 31 >