Anomaly Detection in the Elderly Daily Behavior

被引:10
|
作者
Parvin, Parvaneh [1 ]
Paterno, Fabio [2 ]
Chessa, Stefano [3 ]
机构
[1] Univ Pisa, CNR, ISTI, HIIS Lab, Pisa, Italy
[2] CNR, ISTI, HIIS Lab, Pisa, Italy
[3] Univ Pisa, CNR, ISTI, WN Lab, Pisa, Italy
关键词
Elderly Behavior Analysis; Deviations in Task performance; Ambient Assisted Living;
D O I
10.1109/IE.2018.00025
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing availability of sensors and intelligent objects enables new functionalities and services. In the Ambient Assisted Living (AAL) domain, such technologies can be used for monitoring and reasoning about the older people behavior to detect possible anomalous situations, which could be a sign of the next onset of chronic illness or initial physical and cognitive decline. We propose an approach to detecting abnormal behavior by developing a profiling strategy (in which task models specify the normal behavior), which can also work in case of rare anomaly data. Events corresponding to the user behavior is detecting by a middleware software(Context Manager). Afterward, our algorithm compares the planned and actual behavior to identify if any deviation occurred and also defines to which category the anomaly belongs. The resulting environment should be able to generate multi-modal actions (i.e alarms, reminders) based on detected anomalous behavior, aiming to provide useful support to improve older people well-being.
引用
收藏
页码:103 / 106
页数:4
相关论文
共 50 条
  • [41] Anomaly Detection for Smart Home Based on User Behavior
    Yamauchi, Masaaki
    Ohsita, Yuichi
    Murata, Masayuki
    Ueda, Kensuke
    Kato, Yoshiaki
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2019,
  • [42] An anomaly detection method based on ship behavior trajectory
    Xie, Zhexin
    Bai, Xiangen
    Xu, Xiaofeng
    Xiao, Yingjie
    OCEAN ENGINEERING, 2024, 293
  • [43] Timing behavior anomaly detection in enterprise information systems
    Rohr, Matthias
    Giesecke, Simon
    Hasselbring, Wilhelm
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 494 - 497
  • [44] Anomaly Upload Behavior Detection Based on Fuzzy Inference
    Han, Ting
    Zhan, Xuna
    Tao, Jing
    Cao, Ken
    Xiong, Yuheng
    2021 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS DASC/PICOM/CBDCOM/CYBERSCITECH 2021, 2021, : 923 - 929
  • [45] Behavior Deviation: An Anomaly Detection View of Rumor Preemption
    Chen, Weiling
    Yeo, Chai Kiat
    Lau, Chiew Tong
    Lee, Bu Sung
    7TH IEEE ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE IEEE IEMCON-2016, 2016,
  • [46] Understanding Home Inactivity for Human Behavior Anomaly Detection
    Masciadri, Andrea
    Scarantino, Carmelo
    Comai, Sara
    Salice, Fabio
    PROCEEDINGS OF THE 5TH EAI INTERNATIONAL CONFERENCE ON SMART OBJECTS AND TECHNOLOGIES FOR SOCIAL GOOD (GOODTECHS 2019), 2019, : 90 - 95
  • [47] Spatial scene temporal behavior framework for anomaly detection
    Li, Chaobo
    Li, Hongjun
    Zhang, Guoan
    DIGITAL SIGNAL PROCESSING, 2025, 160
  • [48] Driving Behavior Assessment and Anomaly Detection for Intelligent Vehicles
    Yang, Chule
    Renzaglia, Alessandro
    Paigwar, Anshul
    Laugier, Christian
    Wang, Danwei
    PROCEEDINGS OF THE IEEE 2019 9TH INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (CIS) ROBOTICS, AUTOMATION AND MECHATRONICS (RAM) (CIS & RAM 2019), 2019, : 524 - 529
  • [49] Finding the vocabulary of program behavior data for anomaly detection
    Michael, CC
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL I, PROCEEDINGS, 2003, : 152 - 163
  • [50] Anomaly Detection Based on Aggregated Network Behavior Metrics
    Shen, Gang
    Chen, Dalong
    Qin, Zhongping
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2210 - 2213