2019
DOI: 10.11591/ijeecs.v15.i2.pp778-785
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection on in-home activities data based on time interval

Abstract: <span>The world population of the elderly is expected to have a continuous growth and the number of elderly living in solitude is also expected to increase in the coming years. As our health decline with age, early detection of possible deterioration in health becomes important. Behavioral changes in in-home activities can be used as an indicator of health decline. For example, changes in routine of in-home activities. Past research mainly focused on detecting anomalies in routine of each type of in-home… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…While Recall or also known as sensitivity is the ratio of predicted positive examples correctly to total positive examples. The F1 score is a balanced measure indicator based on Precision and Recall (Poh et al, 2019). For each model, the Precision, Recall, F1 score, and Accuracy are calculated.…”
Section: Model Evaluationmentioning
confidence: 99%
“…While Recall or also known as sensitivity is the ratio of predicted positive examples correctly to total positive examples. The F1 score is a balanced measure indicator based on Precision and Recall (Poh et al, 2019). For each model, the Precision, Recall, F1 score, and Accuracy are calculated.…”
Section: Model Evaluationmentioning
confidence: 99%
“…Wherefore, this gap is a favorable area for research to construct or devise a model regarding the behaviors of DDoS attacks. For this reason, there are several approaches that had not focused on detection ICMPv6-DDoS attacks are proposed which is based on anomaly detection [13], [33], [41], [42]. Additionally, must design a model detection the ICMPv6-DDoS patterns in IPv6 network depends the review outlines the features and protection constraints of IPv6 detection systems focusing mainly on ICMPv6-DDoS attacks.…”
Section: Figure 1 Users Reaching Google Services Over Ipv6mentioning
confidence: 99%
“…From anomaly detection advantages, is determined attacks more effectively than the signature-based IDS with few incorrect positive rates, in addition, automated training is generally used to distinction normal system behavior from abnormal [41]. The anomaly detection consists of four steps the procedure data collection, data preparation, modelling and model evaluation [42]. In this paper there are divided the anomaly detection into two types are rule-based and artificial Intelligence-based.…”
Section: Figure 5 Taxonomy Of Anomaly-based Detectionmentioning
confidence: 99%
“…In an aging world, it is essential to maintain good health and independence for as long as possible. Instead of hospitalization or institutionalization, the elderly and disabled can be assisted in their own environment 24 hours a day with many "smart" devices [19]. Solutions are needed to address the care demands of older adults to live independently.…”
Section: Technologiesmentioning
confidence: 99%