2018
DOI: 10.3390/s18072134
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Annotation of Unlabeled Data from Smartphone-Based Motion and Location Sensors

Abstract: Automatic data annotation eliminates most of the challenges we faced due to the manual methods of annotating sensor data. It significantly improves users’ experience during sensing activities since their active involvement in the labeling process is reduced. An unsupervised learning technique such as clustering can be used to automatically annotate sensor data. However, the lingering issue with clustering is the validation of generated clusters. In this paper, we adopted the k-means clustering algorithm for an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 43 publications
0
6
0
Order By: Relevance
“…This information is then could be inputted as in designing access control in terms of adding user permission and its level. Another promising path is in the protection of metadata using technologies which are secure and tamper proof such as blockchain technologies [41]. The mechanisms of authentication are divided based on authenticator IDS, channel/communications, protocol and technologies and authentication requirements.…”
Section: Discussion: Safeguarding Cyberspace With Authentication and Authorizationmentioning
confidence: 99%
“…This information is then could be inputted as in designing access control in terms of adding user permission and its level. Another promising path is in the protection of metadata using technologies which are secure and tamper proof such as blockchain technologies [41]. The mechanisms of authentication are divided based on authenticator IDS, channel/communications, protocol and technologies and authentication requirements.…”
Section: Discussion: Safeguarding Cyberspace With Authentication and Authorizationmentioning
confidence: 99%
“…To apply unsupervised approaches, one needs to define to which labels these underlying structures refer and the applicability of them within the particular application domain. Unsupervised approaches successfully used in the wearables domain include clustering methods [20], cross-correlation-based ones [17] and information gain-based methods [21]. Part of our data was completely unlabeled and so we used a basic peak detector and compared it to the local cyclicity estimator, the cross-correlation-based unsupervised method from [17].…”
Section: Related Workmentioning
confidence: 99%
“…Despite its benefits, MCS applications still face challenges such as quality and reliability of sensed data (data and user trustworthiness) [10], incentivizing participants [11,12], energy consumption of mobile sensing devices [9,13], sensor data annotation [14], security and privacy [15,16]. The quality and reliability of sensed data is a lingering issue in MCS applications, as participants could deliberately report low-quality or fake data.…”
Section: Introductionmentioning
confidence: 99%