Advertisement

An Approach for Developing Intelligent Systems in Smart Home Environment

  • Tran Nguyen Minh-ThaiEmail author
  • Nguyen Thai-Nghe
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9446)

Abstract

Smart home systems are taken into account recently. By detecting abnormal usages in these systems may help users/organizations to better understand the usage of their home appliances and to distinguish unnecessary usages as well as abnormal problems which can cause waste, damages, or even fire. In this work, we first present an overview on the Smart Home Environments (SHEs) including their classification, architecture, and techniques which can be used in SHEs, as well as their applications in practice. We then propose a framework including methods for abnormal usage detection using home appliance usage logs. The proposed methods are validated by using a real dataset. Experimental results show that these methods perform nicely and would be promising for practice.

Keywords

Correlation Pattern Anomaly Detection Real World Dataset Home Appliance Gumbel Distribution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Chen, Y.-C., Chen, C.-C., Peng, W.-C., Lee, W.-C.: Mining correlation patterns among appliances in smart home environment. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L., Kao, Hung-Yu. (eds.) PAKDD 2014, Part II. LNCS, vol. 8444, pp. 222–233. Springer, Heidelberg (2014)CrossRefGoogle Scholar
  2. 2.
    Chen, Y.-C., Ko, Y.-L., Peng, W.-C., Lee, W.-C.: Mining appliance usage patterns in smart home environment. In: Pei, J., Tseng, V.S., Cao, L., Motoda, H., Xu, G. (eds.) PAKDD 2013, Part I. LNCS, vol. 7818, pp. 99–110. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  3. 3.
    Badica, C., Brezovan, M., Badica, A.: An overview of smart home environments: architectures, technologies and applications. In: Georgiadis, C.K., Kefalas, P., Stamatis, D. (eds.) BCI (Local). CEUR-WS.org, vol. 1036, p. 78 (2013)Google Scholar
  4. 4.
    Alam, M.R., Reaz, M.B.I., Ali, M.A.M.: A review of smart homes—past, present, and future. IEEE Trans. Syst. Man Cybern. Part C Appl. Rev. 42, 1190–1203 (2012)CrossRefGoogle Scholar
  5. 5.
    Luca, S., Karsmakers, P., Cuppens, K., Croonenborghs, T., Vel, A.V.D., Ceulemans, B., Lagae, L., Huffel, S.V., Vanrumste, B.: Detecting rare events using extreme value statistics applied to epileptic convulsions in children. Artif. Intell. Med. 60, 89–96 (2014)CrossRefGoogle Scholar
  6. 6.
    Jakkula, V., Cook, D.J., Crandall, A.S.: Temporal pattern discovery for anomaly detection in a smart home. In: 3rd IET International Conference on Intelligent Environments, 2007. IE 07, pp. 339–345 (2007)Google Scholar
  7. 7.
    Jakkula, V., Cook, D.J.: Detecting anomalous sensor events in smart home data for enhancing the living experience. Artif. Intell. Smarter Living, WS-11-07. AAAI (2011)Google Scholar
  8. 8.
    Ovidiu Aritoni, V.N.: A methodology for household appliances behaviour recognition in AmI systems. In: The Seventh International Conference on Autonomic and Autonomous Systems, ICAS 2011 (2011)Google Scholar
  9. 9.
    Lotfi, A., Langensiepen, C., Mahmoud, S., Akhlaghinia, M.J.: Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behaviour. J. Ambient Intell. Hum. Comput. 3, 205–218 (2012)CrossRefGoogle Scholar
  10. 10.
    Minor, B., Cook, D.J.: Regression tree classification for activity prediction in smart homes. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication, pp. 441–450. ACM, Seattle, Washington (2014)Google Scholar
  11. 11.
    Rashidi, P., Cook, D.J.: COM: a method for mining and monitoring human activity patterns in home-based health monitoring systems. ACM Trans. Intell. Syst. Technol. 4, 1–20 (2013)CrossRefGoogle Scholar
  12. 12.
    Juan, Y., Stevenson, G., Dobson, S.: Fault detection for binary sensors in smart home environments. In: 2015 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp. 20–28Google Scholar
  13. 13.
    Tran, A.C., Marsland, S., Dietrich, J., Guesgen, H.W., Lyons, P.: Use cases for abnormal behaviour detection in smart homes. In: Lee, Y., Bien, Z., Mokhtari, M., Kim, J.T., Park, M., Kim, J., Lee, H., Khalil, I. (eds.) ICOST 2010. LNCS, vol. 6159, pp. 144–151. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  14. 14.
    Gayathri, K.S., Elias, S., Ravindran, B.: Hierarchical activity recognition for dementia care using Markov Logic Network. Pers. Ubiquitous Comput. 19, 271–285 (2015)CrossRefGoogle Scholar
  15. 15.
    Huang, B., Tian, G., Wu, H., Zhou, F.: A method of abnormal habits recognition in intelligent space. Eng. Appl. Artif. Intell. 29, 125–133 (2014)CrossRefGoogle Scholar
  16. 16.
    Jarrah, M., Jaradat, M., Jararweh, Y., Al-Ayyoub, M., Bousselham, A.: A hierarchical optimization model for energy data flow in smart grid power systems. Inf. Syst. 53, 190–200 (2015)CrossRefGoogle Scholar
  17. 17.
    Andreeva, V.O., Tinykov, S.E., Ovchinnikovaa, O.P., Parahinc, G.P.: Extreme value theory and peaks over threshold model in the Russian stock market. J. Siberian Fed. Univ. Eng. Technol. 1, 111–121 (2012)Google Scholar
  18. 18.
    Clifton, D., Hugueny, S., Tarassenko, L.: Novelty detection with multivariate extreme value statistics. J. Sign. Process. Syst. 65, 371–389 (2011)CrossRefGoogle Scholar
  19. 19.
    Smith, M., Reece, S., Roberts, S., Rezek, I.: Online maritime abnormality detection using gaussian processes and extreme value theory. In: 2012 IEEE 12th International Conference on Data Mining (ICDM), pp. 645–654 (2012)Google Scholar
  20. 20.
    Nairac, A., Corbett-Clark, T.A., Ripley, R., Townsend, N.W., Tarassenko, L.: Choosing an appropriate model for novelty detection. In: Fifth International Conference on Artificial Neural Networks (Conf. Publ. No. 440), pp. 117–122 (1997)Google Scholar
  21. 21.
    Brezovan, M., Badica, C.: A review on vision surveillance techniques in smart home environments. In: 2013 19th International Conference on Control Systems and Computer Science (CSCS), pp. 471–478 (2013)Google Scholar
  22. 22.
    Minh-Thai, T.N., Thai-Nghe, N.: Methods for abnormal usage detection in developing intelligent systems for smart homes. In: Proceedings of the Seventh International Conference on Knowledge and Systems Engineering (KSE 2015), pp. 1–6. IEEE Xplore (2015)Google Scholar
  23. 23.
    Nagatsuka, H., Kamakura, T., Balakrishnan, N.: A consistent method of estimation for the three-parameter Weibull distribution. Comput. Stat. Data Anal. 58, 210–226 (2013)MathSciNetCrossRefzbMATHGoogle Scholar
  24. 24.
    Lauer, M.: A mixture approach to novelty detection using training data with outliers. In: Flach, P.A., De Raedt, L. (eds.) ECML 2001. LNCS (LNAI), vol. 2167, pp. 300–311. Springer, Heidelberg (2001)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.College of Information and Communication TechnologyCan Tho UniversityCan Tho CityVietnam

Personalised recommendations