Mostrar el registro sencillo del ítem
Predictive model for the identification of activities of daily living (ADL) in indoor environments using classification techniques based on Machine Learning
dc.contributor.author | García-Restrepo, Johanna | spa |
dc.contributor.author | Ariza Colpas, Paola Patricia | spa |
dc.contributor.author | Oñate-Bowen, Alvaro Agustín | spa |
dc.contributor.author | Suarez Brieva, Eydy | spa |
dc.contributor.author | Urina-Triana, Miguel | spa |
dc.contributor.author | De-La-Hoz-Franco, Emiro | spa |
dc.contributor.author | Díaz-Martínez, Jorge Luis | spa |
dc.contributor.author | Butt Shariq, Aziz | spa |
dc.contributor.author | Molina Estren, Diego | spa |
dc.date.accessioned | 2021-09-14T16:21:56Z | |
dc.date.available | 2021-09-14T16:21:56Z | |
dc.date.issued | 2021 | |
dc.identifier.issn | 1877-0509 | spa |
dc.identifier.uri | https://hdl.handle.net/11323/8691 | spa |
dc.description.abstract | AI-based techniques have included countless applications within the engineering field. These range from the automation of important procedures in Industry and companies, to the field of Process Control. Smart Home (SH) technology is designed to help house residents improve their daily activities and therefore enrich the quality of life while preserving their privacy. An SH system is usually equipped with a collection of software interrelated with hardware components to monitor the living space by capturing the behavior of the resident and their occupations. By doing so, the system can report risks, situations, and act on behalf of the resident to their satisfaction. This research article shows the experimentation carried out with the human activity recognition dataset, CASAS Kyoto, through preprocessing and cleaning processes of the data, showing the Vía Regression classifier as an excellent option to process this type of data with an accuracy 99.7% effective | spa |
dc.format.mimetype | application/pdf | spa |
dc.language.iso | eng | |
dc.publisher | Corporación Universidad de la Costa | spa |
dc.rights | CC0 1.0 Universal | spa |
dc.rights.uri | http://creativecommons.org/publicdomain/zero/1.0/ | spa |
dc.source | Procedia Computer Science | spa |
dc.subject | HAR | spa |
dc.subject | Human activity recognition | spa |
dc.subject | Machine learning | spa |
dc.subject | ADL | spa |
dc.subject | Activity daily living | spa |
dc.title | Predictive model for the identification of activities of daily living (ADL) in indoor environments using classification techniques based on Machine Learning | spa |
dc.type | Artículo de revista | spa |
dc.source.url | https://www.sciencedirect.com/science/article/pii/S1877050921014721 | spa |
dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
dc.identifier.doi | https://doi.org/10.1016/j.procs.2021.07.069 | spa |
dc.identifier.instname | Corporación Universidad de la Costa | spa |
dc.identifier.reponame | REDICUC - Repositorio CUC | spa |
dc.identifier.repourl | https://repositorio.cuc.edu.co/ | spa |
dc.relation.references | [1][Nagi, S. Z., Burk, R. D., & Potter, H. R. (1965). Back disorders and rehabilitation achievement. Journal of Chronic Diseases, 18(2), 181–197. https://doi.org/10.1016/0021-9681(65)90101-3 | spa |
dc.relation.references | [2] Lladó, M. R., Código, H., Lennin, A., Quiroz, P., & Lima -Perú, V. (2020). ENTORNO DOMÓTICO ADAPTADO A PERSONAS CON DISCAPACIDAD FÍSICA UTILIZANDO MODELOS OCULTOS DE MARKOV Tesis para optar el Título Profesional de Ingeniero de Sistemas. In Repositorio Institucional - Ulima. Universidad de Lima. http://repositorio.ulima.edu.pe/handle/20.500.12724/11664 | spa |
dc.relation.references | [3] Carlos, A., D’negri, E., De Vito, E. L., & Zadeh, L. A. (2006). Introducción al razonamiento aproximado: lógica difusa. In Revista Argentina de Medicina Respiratoria Año (Vol. 6). | spa |
dc.relation.references | [4] Marcondes, C. H., & Almeida Campos, M. L. de. (2008). ONTOLOGIA E WEB SEMÂNTICA: O ESPAÇO DA PESQUISA EM CIÊNCIA DA INFORMAÇÃO. PontodeAcesso, 2(1), 107. https://doi.org/10.9771/1981-6766rpa.v2i1.2669 | spa |
dc.relation.references | [5] DANE. Archivo Nacional de Datos ANDA. 2014. [Citado Marzo 20,2016]. Available in: http://formularios.dane.gov.co/Anda_4_1/index.php/home | spa |
dc.relation.references | [6] Ronao, C. A., & Cho, S. B. (2016). Human activity recognition with smartphone sensors using deep learning neural networks. Expert Systems with Applications, 59, 235–244. https://doi.org/10.1016/j.eswa.2016.04.032 | spa |
dc.relation.references | [7] Capela, N. A., Lemaire, E. D., & Baddour, N. (2015). Feature selection for wearable smartphone-based human activity recognition with able bodied, elderly, and stroke patients. PLoS ONE, 10(4), e0124414. https://doi.org/10.1371/journal.pone.0124414 | spa |
dc.relation.references | [8] Gudivada, V. N., Ding, J., & Apon, A. (2017). Data Quality Considerations for Big Data and Machine Learning: Going Beyond Data Cleaning and Transformations Flow Cytometry of 3-D structure View project Data Quality Considerations for Big Data and Machine Learning: Going Beyond Data Cleaning and Transf. October, 1–20. https://www.researchgate.net/publication/318432363 | spa |
dc.relation.references | [9] Ren, X., & Malik, J. (2003). Learning a classification model for segmentation. Proceedings of the IEEE International Conference on Computer Vision, 1, 10– 17. https://doi.org/10.1109/iccv.2003.1238308 | spa |
dc.relation.references | [10] Galván-Tejada, C. E., Galván-Tejada, J. I., Celaya-Padilla, J. M., elgadoContreras, J. R., Magallanes-Quintanar, R., Martinez-Fierro, M. L., GarzaVeloz, I., López-Hernández, Y., & Gamboa-Rosales, H. (2016). An Analysis of Audio Features to Develop a Human Activity Recognition Model Using Genetic Algorithms, Random Forests, and Neural Networks. Mobile Information Systems, 2016, 1–10. https://doi.org/10.1155/2016/1784101 | spa |
dc.relation.references | [11] Eddy, S. R. (1998). Profile hidden Markov models. Academic.Oup.Com, 144(9), 755–763. https://academic.oup.com/bioinformatics/articleabstract/14/9/755/259550 Envejecimiento y salud. (2018, February 5). | spa |
dc.relation.references | [12] Shah,C. (2020). Supervised Learning. In A Hands-On Introduction to Data Science (pp.235–289). | spa |
dc.relation.references | [13] Nettleton, D. F., Orriols-Puig, A., & Fornells, A. (2010). A study of the effect of different types of noise on the precision of supervised learning techniques. Artificial Intelligence Review, 33(4), 275–306.https://doi.org/10.1007/s10462-010-9156-z | spa |
dc.relation.references | [14] Caruana, R., & Niculescu-Mizil, A. (2006). An empirical comparison of supervised learning algorithms. ACM International Conference Proceeding Series, 148, 161–168. https://doi.org/10.1145/1143844.1143865 | spa |
dc.relation.references | [15] Mejia-Ricart, L. F., Helling, P., & Olmsted, A. (2018). Evaluate action primitives for human activity recognition using unsupervised learning approach. 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, 186–188. https://doi.org/10.23919/ICITST.2017.8356374 | spa |
dc.relation.references | [16] Crandall, A. S. (2011). BEHAVIOMETRICS FOR MULTIPLE RESIDENTS IN A SMART ENVIRONMENT. https://scihub.si/http://research.wsulibs.wsu.edu/xmlui/handle/2376/2855 | spa |
dc.relation.references | [17] Hoey, J., Pltz, T., Jackson, D., Monk, A., Pham, C., & Olivier, P. (2011). Rapid specification and automated generation of prompting systems to assist people with dementia. Pervasive and Mobile Computing, 7(3), 299–318. https://doi.org/10.1016/j.pmcj.2010.11.007 | spa |
dc.relation.references | [18] Fahad, L. G., Tahir, S. F., & Rajarajan, M. (2015). Feature selection and data balancing for activity recognition in smart homes. IEEE International Conference on Communications, 2015-Septe, 512–517. https://doi.org/10.1109/ICC.2015.724837310 | spa |
dc.relation.references | [19] Chawla, N. V, Bowyer, K. W., Hall, L. O., & Kegelmeyer, W. P. (2002). SMOTE: Synthetic Minority Over-sampling Technique. In Journal of Artificial Intelligence Research (Vol. 16). https://scihub.si/http://www.jair.org/index.php/jair/article/view/10302 | spa |
dc.relation.references | [20] López Saca, F., Ferreyra Ramírez, A., Avilés Cruz, C., Villegas Cortez, J., Zúñiga López, A., & Rodrigez Martinez, E. (2018). Preprocesamiento de bases de datos de imágenes para mejorar el rendimiento de redes neuronales convolucionales. Research in Computing Science, 147(7), 35–45. https://doi.org/10.13053/rcs147-7-3 | spa |
dc.relation.references | [21] Ruan, Y. X., Lin, H. T., & Tsai, M. F. (2014). Improving ranking performance with cost-sensitive ordinal classification via regression. Information Retrieval, 17(1), 1–20. https://doi.org/10.1007/s10791-013-9219-2 | spa |
dc.relation.references | [22] Ho, T. K. (1998). The random subspace method for constructing decision forests. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), 832– 844. https://doi.org/10.1109/34.709601 | spa |
dc.relation.references | [23] Breiman, L. (1996). Bagging predictors. Machine Learning, 24(2), 123–140. https://doi.org/10.1007/bf00058655 | spa |
dc.relation.references | [24] Nagalla, R., Pothuganti, P., & Pawar, D. S. (2017). Analyzing Gap Acceptance Behavior at Unsignalized Intersections Using Support Vector Machines, Decision Tree and Random Forests. Procedia Computer Science, 109, 474–481. https://doi.org/10.1016/j.procs.2017.05.312 | spa |
dc.relation.references | [25] Salzberg, S. L. (1994). C4.5: Programs for Machine Learning by J. Ross Quinlan. Morgan Kaufmann Publishers, Inc., 1993. Machine Learning, 16(3), 235–240. https://doi.org/10.1007/bf00993309 | spa |
dc.relation.references | [26] Kumar, K., Kumar, G., & Kumar, Y. (2013). Feature Selection Approach for Intrusion Detection System. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), 2(5), 47–53. | spa |
dc.relation.references | [27] Ariza Colpas, P., Vicario, E., De-La-Hoz-Franco, E., Pineres-Melo, M., Oviedo-Carrascal, A., & Patara, F. (2020). Unsupervised human activity recognition using the clustering approach: A review. Sensors, 20(9), 2702. | spa |
dc.relation.references | [28] Chandra, S., & Maheshkar, S. (2017). Verification of static signature pattern based on random subspace, REP tree and bagging. Multimedia Tools and Applications, 76(18), 19139–19171. https://doi.org/10.1007/s11042-017-4531-2 | spa |
dc.relation.references | [29] Asaju, L. B., Shola, P. B., Franklin, N., & Abiola, H. M. (2017). Intrusion Detection System on a Computer Network Using an Ensemble of Randomizable Filtered Classifier, K-Nearest …. Ftstjournal.Com, 2(1), 550– 553. www.ftstjournal.com | spa |
dc.relation.references | [30] Kalmegh, S. (2015). Analysis of WEKA Data Mining Algorithm REPTree , Simple Cart and RandomTree for Classification of Indian News. International Journal of Innovative Science, Engineering & Technology, 2(2), 438–446. www.ijiset.com | spa |
dc.relation.references | [31] Rajput, A., Aharwal, R. P., Dubey, M., Saxena, S. P., & Raghuvanshi, M. (2011). J48 and JRIP rules for e-governance data. International Journal of Computer Science and Security, 5(2), 201–207.11 | spa |
dc.relation.references | [32] Cai, Y. D., Feng, K. Y., Lu, W. C., & Chou, K. C. (2006). Using LogitBoost classifier to predict protein structural classes. Journal of Theoretical Biology, 238(1), 172–176. https://doi.org/10.1016/j.jtbi.2005.05.034 | spa |
dc.relation.references | [33] Qian, H., Mao, Y., Xiang, W., & Wang, Z. (2010). Recognition of human activities using SVM multi-class classifier. Pattern Recognition Letters, 31(2), 100–111. https://doi.org/10.1016/j.patrec.2009.09.019 | spa |
dc.relation.references | [34] Suykens, J. A. K., & Vandewalle, J. (1999). Training multilayer perceptron classifiers based on a modified support vector method. IEEE Transactions on Neural Networks, 10(4), 907–911. https://doi.org/10.1109/72.774254 | spa |
dc.relation.references | [35] Khalajzadeh, H., Mansouri, M., & Teshnehlab, M. (2014). Face recognition using convolutional neural network and simple logistic classifier. Advances in Intelligent Systems and Computing, 223, 197–207. https://doi.org/10.1007/978-3-319-00930-8_18 | spa |
dc.relation.references | [36] Choudhury, S., & Bhowal, A. (2015). Comparative analysis of machine learning algorithms along with classifiers for network intrusion detection. 2015 International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials, ICSTM 2015 - Proceedings, 89–95. https://doi.org/10.1109/ICSTM.2015.7225395 | spa |
dc.type.coar | http://purl.org/coar/resource_type/c_6501 | spa |
dc.type.content | Text | spa |
dc.type.driver | info:eu-repo/semantics/article | spa |
dc.type.redcol | http://purl.org/redcol/resource_type/ART | spa |
dc.type.version | info:eu-repo/semantics/acceptedVersion | spa |
dc.type.coarversion | http://purl.org/coar/version/c_ab4af688f83e57aa | spa |
dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Artículos científicos [3156]
Artículos de investigación publicados por miembros de la comunidad universitaria.