2016
DOI: 10.1109/tkde.2016.2592527
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Daily Human Behavioral Pattern Mining from Multivariate Temporal Data

Abstract: This work introduces a set of scalable algorithms to identify patterns of human daily behaviors. These patterns are extracted from multivariate temporal data that have been collected from smartphones. We have exploited sensors that are available on these devices, and have identified frequent behavioral patterns with a temporal granularity, which has been inspired by the way individuals segment time into events. These patterns are helpful to both end-users and third parties who provide services based on this in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 88 publications
(56 citation statements)
references
References 44 publications
0
55
0
Order By: Relevance
“…Moreover, we will develop a retrieval component that can search and show behavioral patterns [20] of the smartwatch to the user. This work focused only on query and not information retrieval.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, we will develop a retrieval component that can search and show behavioral patterns [20] of the smartwatch to the user. This work focused only on query and not information retrieval.…”
Section: Discussionmentioning
confidence: 99%
“…⟨timestamp, employee ID, controlled zone ID, additional data⟩ (1) Additional fields may describe status (entrance permitted or denied), employee access level, and so forth. The logs could be complemented by the control zone plan, including description of the rooms located within a controlled zone, employees' position within organization hierarchy, and the location of the employees' work place within the controlled zones.…”
Section: The Approach Descriptionmentioning
confidence: 99%
“…It is necessary to monitor functioning of the technological equipment and people implementing its maintenance. The analysis of the movement of the employees of critical infrastructure and hazardous industries assists in monitoring observance of the safety and access control policies and is useful in detection of insider threat [1,2]. However, existing access control systems and employee activity monitoring systems are mostly targeted for employee productivity assessment by calculating working hours, estimating dynamics of employee lateness, and evaluating user activity on work place [3][4][5].…”
Section: Introductionmentioning
confidence: 99%
“…In motif discovery, which has its origins in DNA sequencing research [44,45], time series data are broken down into a set of reoccurring instances, i.e., motifs, by symbolizing the series and then searching for sets of connected symbols. These motifs, sometimes also called frequent patterns or sequences [46,47], can then be applied in several kinds of classification methods. Minnen et al [48] uses motif discovery in a three-step system that first searches for a set of seed motifs, refines these and then trains an HMM for each of the motifs.…”
Section: Unsupervised Ar: Motif Discoverymentioning
confidence: 99%