EP3163546A1 - Method and device for detecting anomalous behavior of a user - Google Patents

Method and device for detecting anomalous behavior of a user Download PDF

Info

Publication number
EP3163546A1
EP3163546A1 EP15306726.9A EP15306726A EP3163546A1 EP 3163546 A1 EP3163546 A1 EP 3163546A1 EP 15306726 A EP15306726 A EP 15306726A EP 3163546 A1 EP3163546 A1 EP 3163546A1
Authority
EP
European Patent Office
Prior art keywords
user
patterns
time
duration
identified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP15306726.9A
Other languages
German (de)
French (fr)
Inventor
Marie Guegan
Anne Lambert
Eric Gautier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thomson Licensing SAS
Original Assignee
Thomson Licensing SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thomson Licensing SAS filed Critical Thomson Licensing SAS
Priority to EP15306726.9A priority Critical patent/EP3163546A1/en
Publication of EP3163546A1 publication Critical patent/EP3163546A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0407Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis
    • G08B21/0423Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons based on behaviour analysis detecting deviation from an expected pattern of behaviour or schedule

Definitions

  • the proposed method and apparatus relates to detection of anomalies in the duration of activities of daily living of elderly or handicapped users in their homes or non-medical residences.
  • the proposed method and apparatus uses non-intrusive sensors in the home or non-medical residences to detect deviations in the time spent on activities of daily living. While principally directed to detecting anomalous behavior of elderly or handicapped individuals, the proposed method and apparatus are not so limited and may be employed to monitor prisoners, children or other individuals that find themselves in restricted environments. The description of the proposed method and apparatus uses elderly or handicapped individuals as examples.
  • the proposed method and apparatus Using time-stamped sensor events, the proposed method and apparatus identifies and mines patterns in the sequence of sensor activation signals and records the patterns in a data base. The duration of patterns is then computed. The computed pattern durations are assigned to each pattern in the data base.
  • a new behavior pattern occurs and is assigned an anomaly score based on the similarity of the new pattern's duration to known pattern durations.
  • a care giver is alerted if the anomaly score of the new pattern is above a threshold.
  • the detection of anomalous behavior is used to alert a care giver of the anomalous behavior.
  • the care giver may be a nurse, a doctor, an aide, a family member etc. In a prison or other environment, a care giver may be a person who monitors the activities of the individual being monitored.
  • the alert may be by phone, by email, by text message or any other reasonable means.
  • the proposed method and apparatus use the non-intrusive approach to detect anomalies in the behavior of elderly or handicapped individuals in their homes or non-medical residences.
  • the home or non-medical residences are equipped with sensors such as motion sensors and door contacts (non-intrusive sensors). It would be advantageous to detect anomalous behavior of users using the duration of activities of daily living. Detection of anomalous behavior is crucial to an ability to alert and dispatch help or a caregiver in response to the anomalous behavior. If an elderly or handicapped individual takes significantly more time for a given activity (bathroom, moving from room to room), this is often due to a physical problem (issue) or injury that has slowed the individual down. If the anomalous behavior is detected early enough then a care worker (giver) may be alerted and dispatched to help or provide intervention before the problem worsens and become critical requiring hospitalization or other more intense and costly intervention.
  • a method for detecting anomalous behavior of a user including logging first time-stamped event data of initial behavior of the user from sensors in an environment of the user for a period of time, mining the logged time-stamped event data to identify patterns of life routines of the user, determining which of the identified patterns are frequent patterns of life routines of the user, determining a duration of each of the identified frequent patterns, logging second time-stamped event data of subsequent behavior of the user from the sensors in the environment of the user and identifying a new occurrence of a known pattern of the life routines of the user, detecting anomalous behavior and creating an alert based on the detected anomalous behavior.
  • a server for detecting anomalous behavior of a user including a receive data module, the receive data module logging first time-stamped event data of initial behavior of the user from sensors in an environment of the user for a period of time, an identify patterns module, the identify patterns module mining the time-stamped event data to identify patterns of life routines of the user, the identify patterns module in communication with the receive data module, a determine frequent patterns module, the determine frequent patterns module determining a duration of each of the identified frequent patterns, the determine frequent patterns module in communication with the identify patterns module, the receive data module logging second time-stamped event data of subsequent behavior of the user from the sensors in the environment of the user and identifying a new occurrence of a known pattern of the life routines of the user and an anomaly detection module, the anomaly detection module detecting anomalous behavior and creating an alert based on the detected anomalous behavior.
  • processor or “controller” should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, read only memory (ROM) for storing software, random access memory (RAM), and nonvolatile storage.
  • DSP digital signal processor
  • ROM read only memory
  • RAM random access memory
  • any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
  • any element expressed as a means for performing a specified function is intended to encompass any way of performing that function including, for example, a) a combination of circuit elements that performs that function or b) software in any form, including, therefore, firmware, microcode or the like, combined with appropriate circuitry for executing that software to perform the function.
  • the disclosure as defined by such claims resides in the fact that the functionalities provided by the various recited means are combined and brought together in the manner which the claims call for. It is thus regarded that any means that can provide those functionalities are equivalent to those shown herein.
  • Fig. 1 shows an exemplary case, where one individual is living in a residence equipped with a non-intrusive data collection infrastructure and where each main room is covered by one omni-directional motion detector installed on the ceiling.
  • These main rooms are labeled the “bedroom”, the “living”, the “kitchen”, the “bedroom2”, the “office” and the corresponding motion sensors are respectively indicated as “mB”, “mL”, “mK”, “mB2", “mO”.
  • one external "door” is equipped with a door contactor indicated as "cD”. It should also be noted that should there be any corridors (halls), these could also be covered with one or more sensors.
  • the sensors emit ON/OFF signals whether they are activated by something moving in front of the sensors (ON) or the sensors become silent (OFF).
  • Door contacts may also be installed on the bedroom door, the office door, the bathroom door and perhaps even the refrigerator door.
  • the door contacts emit OPEN/CLOSE signals whenever the door is opened or closed. All signals are collected in a single time-stamped file, one signal per line.
  • the format includes the date, the time, the sensor identification and the event type (ON/OFF/OPEN/CLOSE).
  • a representation of a time-stamped event includes listing the events corresponding to the sensor activations together with the date and time at which the events occurred.
  • the first step of the proposed method and apparatus includes detecting frequent patterns in the sequence of sensor activations or in the sequence of activities of the daily living (e.g. presence in room). If a pattern has occurred only once, for example, it is may not be useful, for among other reasons, that no typical duration distribution can be calculated (computed) in a later step.
  • the motion sensors and door contacts are not necessarily smart devices and they do not have sufficient processing power to perform the proposed method so the time-stamped event data is transmitted to a server for recordation (storage) and processing.
  • the collected time-stamped event data is, thus, forwarded to a server where the collected time-stamped event data is used to identify the user's life patterns in their home or non-medical residence.
  • a pattern could be:
  • a set (collection) of frequent patterns each being characteristic of an activity of the daily living of the person is obtained by the server and recorded (stored) for further processing. Each pattern is represented by a set of its occurrences in the data set (data base).
  • the frequently occurring pattern occurrences in the dataset and their duration are considered.
  • the duration of the occurrence of a pattern may be computed as the time difference between the time-stamp of the last item in the pattern and the timestamp of the first item in the pattern.
  • a set of known typical durations of the data base (data set) of patterns of activities of daily living is obtained (determined, calculated).
  • the probability of this duration is tested against known typical durations for this pattern. This may be done using statistical hypothesis testing or any other method that would compute a deviation score between the observed duration and the set of typical durations. For example, if a set of typical durations has a Gaussian distribution, then a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern). This step produces a confidence anomaly score for this new occurrence.
  • the anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test.
  • an anomaly may be detected if the monitored user goes to the bathroom from the bedroom and the usual duration is exceeded.
  • the duration of each pattern is recomputed using the last (latest) occurrence of the pattern. Once the pattern duration exceeds usual durations for the pattern, an anomaly is detected and an alert is sent (transmitted).
  • the monitored person user usually spends half an hour and almost never spends a whole hour in the bathroom after leaving the bedroom, then it would take about an hour to detect the anomaly (incident).
  • the sensitivity of anomaly detection may be adapted according to use cases (for example, it may be preferable to receive too many alerts as opposed to not enough alerts so the anomaly detection sensitivity may be set higher thus anomaly detection may occur earlier and vice versa).
  • a same pattern may be characteristic of several activities of the daily living. For example, going in the kitchen at night to drink water and going in the kitchen at noon to prepare lunch may exhibit similar patterns but very different durations. Thus, a pattern may exhibit several types of duration distributions. This may be detected by modeling the durations of the pattern as a mixture of distributions. These patterns may also be labeled differently based on the time of day at which the pattern occurred. In a last optional step (alert), a threshold may be used to determine which alerts should be raised for care givers. An alert may show the pattern occurrence, the duration observed and the confidence score for the anomaly.
  • Fig. 2 is a schematic diagram of an exemplary embodiment of a proposed method and apparatus
  • the time-stamped event data is received and forwarded to a server for recordation (logging, storage) in a data base (data set).
  • the data base (data set) is mined for frequently occurring patterns.
  • the frequent patterns are stored at the server.
  • the server then calculates (computes) the duration of the patterns.
  • the typical pattern duration distributions are then calculated (computed).
  • a new pattern occurrence is then received by the server and the new pattern is compared to the existing patterns and their durations to determine if there is anomalous behavior (an anomaly).
  • An anomaly score is then calculated (computed).
  • the anomaly score is a confidence anomaly score.
  • a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern).
  • the anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test.
  • Fig. 3 is a flowchart of an exemplary embodiment of a proposed method.
  • the server mines the time-stamped event data to identify frequent patterns of user life routines. The number of occurrences of the patterns may be compared to a threshold to determine if they are occurring with sufficient frequency. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step. These patterns may be found using known methods of data base (data set) mining. During this step, it is unnecessary to use the time-stamp, although the time-stamp could also be used.
  • a set of frequently occurring patterns each being characteristic of an activity of the daily living of the person is obtained by the server and recorded (logged, stored) for further processing.
  • Each pattern is represented by a set of its occurrences in the data set (data base).
  • the duration of the frequently occurring patterns is calculated (computed).
  • the duration of the occurrence of a pattern may be computed as the time difference between the time-stamp of the last item in the pattern and the time-stamp of the first item in the pattern.
  • Given its set of occurrences, a set of known typical durations of the data base (data set) of patterns of activities of daily living is obtained (determined, calculated).
  • the server receives new time-stamped event data and identifies a new pattern occurrence from the newly received time-stamped event data. Given a new occurrence of an already known pattern, together with its duration, the probability of this duration is tested against known typical durations for this pattern. This may be done using statistical hypotheses testing or any other method that would compute a deviation score between the observed duration and the set of typical durations. For example, if a set of typical durations has a Gaussian distribution, then a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern). This step produces a confidence anomaly score for this new occurrence.
  • the anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test.
  • the server creates one or more alerts based on the anomalous behavior of the user and at 320 the server forwards the alerts to the care giver.
  • Fig. 4 is a flowchart of an exemplary implementation of step 305 of Fig. 3 .
  • the server receives time-stamped event data for a period of time and logs (records, stores) the received time-stamped data.
  • the period of time for collection of the time-stamped event data is a period of time necessary to collect and identify enough patterns to be statistically meaningful.
  • the server identifies patterns of user life routines.
  • the server uses a threshold to isolate frequently occurring pattern of user life routines. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step.
  • the frequent occurring patterns of user life routines are stored in a data base.
  • Fig. 5 is a flowchart of an exemplary implementation of step 310 of Fig. 3 .
  • the duration for each frequently occurring pattern is calculated (computed). This is accomplished by taking the difference of the time-stamp of the first item of each frequently occurring pattern of the user's life routine from the time-stamp of the last item of the respective frequently occurring pattern of user's life routine.
  • the time duration of each frequently occurring pattern of user's life routine is stored back in the server's data base (data set) along with the corresponding frequently occurring pattern of the user's life routine.
  • Fig. 6 is a flowchart of an exemplary implementation of step 315 of Fig. 3 .
  • the server receives and logs (stores, records) new time-stamped event data and at 610 the server identifies a new pattern. Both 605 and 610 are or can be performed by 405 and 410 of the frequent pattern mining process described above and shown in Fig. 4 .
  • the server determines the duration of the new pattern. This is or can be performed by 505 of the pattern duration computation process described above and shown in Fig. 5 .
  • the server determines if the new pattern is known.
  • Determination of if the new pattern is known can be performed before duration computation or during new pattern identification if a list of known patterns exists to which a new pattern can be compared.
  • the server compares the new known pattern against the typical pattern duration distribution of the pattern.
  • the server determines if there is an anomaly (anomalous behavior). That is, an anomaly score (confidence anomaly score) is calculated (computed, determined) for the new pattern.
  • the server also creates one or more alerts based on the detected anomalous behavior at 630.
  • Fig. 7 is a block diagram of an exemplary server that performs the proposed method.
  • the server has three main modules each of which has submodules.
  • the three main modules are the Frequent Pattern Item Mining Module, the Pattern Duration Computation Module and the Anomaly Detection Module.
  • the Frequent Pattern Item Mining Module logs time-stamped event data of initial behavior of the user for a period of time at the Receive Data Module.
  • the period of time for collection of the time-stamped event data is a period of time necessary to collect and identify enough patterns to be statistically meaningful.
  • the logged time-stamped event data of the initial behavior of the user is forwarded to the Identify Patterns Module which identifies (mines) patterns of user life routines.
  • the Identify Patterns Module forwards the identified patterns of the user's life routine to the Determine Frequent Patterns Module, which uses a threshold to isolate frequently occurring pattern of user life routines. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step.
  • the Determine Frequent Patterns Module forwards the frequent patterns to the Store Frequent Patterns Module which stores the frequent occurring patterns of user life routines in a data base (data set).
  • the Store Frequent Patterns Module is in communication with the Calculate Duration of Each Pattern Occurrence Module which calculates (computes) the duration for each frequently occurring pattern. This is accomplished by taking the difference of the time-stamp of the first item of each frequently occurring pattern of the user's life routine from the time-stamp of the last item of the respective frequently occurring pattern of user's life routine.
  • the Calculate Duration of Each Pattern Occurrence Module forwards the durations of each frequently occurring pattern to the Store Durations Module which stores the time duration of each frequently occurring pattern of user's life routine in the server's data base (data set) along with the corresponding frequently occurring pattern of the user's life routine.
  • the Store Frequent Patterns Module and the Identify Patterns Module are in communication with the Determine if New Pattern is Known Module which determines if the new logged pattern of subsequent behavior of the user is known.
  • the Determine if New Pattern is Known Module forwards the new known pattern to the Compare New Pattern against Typical Pattern Duration Distribution Module which compares the new known pattern against the typical pattern duration distribution of the pattern.
  • the Store Durations Module and the Calculate Duration of Each Pattern Occurrence Module are in communication with the Compare New Pattern against Typical Pattern Duration Distribution Module.
  • the Compare New Pattern against Typical Pattern Duration Distribution Module forwards the results of the comparison to the Detect Anomaly Module which determines if there is an anomaly (anomalous behavior).
  • an anomaly score (confidence anomaly score) is calculated (computed, determined) for the new pattern.
  • the Detect Anomaly Module also creates an alert based on the detected anomalous behavior of the user.
  • the Detect Anomaly Module forwards any detected anomalies and alerts to the Report Anomaly Module which reports detected anomalies to a care giver.
  • the proposed method and apparatus may be implemented in various forms of hardware, software, firmware, special purpose processors, or a combination thereof.
  • Special purpose processors may include application specific integrated circuits (ASICs), reduced instruction set computers (RISCs) and/or field programmable gate arrays (FPGAs).
  • ASICs application specific integrated circuits
  • RISCs reduced instruction set computers
  • FPGAs field programmable gate arrays
  • the proposed method and apparatus is implemented as a combination of hardware and software.
  • the software is preferably implemented as an application program tangibly embodied on a program storage device.
  • the application program may be uploaded to, and executed by, a machine comprising any suitable architecture.
  • the machine is implemented on a computer platform having hardware such as one or more central processing units (CPU), a random access memory (RAM), and input/output (I/O) interface(s).
  • CPU central processing units
  • RAM random access memory
  • I/O input/output
  • the computer platform also includes an operating system and microinstruction code.
  • the various processes and functions described herein may either be part of the microinstruction code or part of the application program (or a combination thereof), which is executed via the operating system.
  • various other peripheral devices may be connected to the computer platform such as an additional data storage device and a printing device.
  • the elements shown in the figures may be implemented in various forms of hardware, software or combinations thereof. Preferably, these elements are implemented in a combination of hardware and software on one or more appropriately programmed general-purpose devices, which may include a processor, memory and input/output interfaces.
  • general-purpose devices which may include a processor, memory and input/output interfaces.
  • the phrase "coupled" is defined to mean directly connected to or indirectly connected with through one or more intermediate components. Such intermediate components may include both hardware and software based components.

Landscapes

  • Health & Medical Sciences (AREA)
  • Psychiatry (AREA)
  • Psychology (AREA)
  • Social Psychology (AREA)
  • General Health & Medical Sciences (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

A method for detecting anomalous behavior of a user is described including logging first time-stamped event data of initial behavior of the user from sensors in an environment of the user for a period of time, mining the logged time-stamped event data to identify patterns of life routines of the user, determining which of the identified patterns are frequent patterns of life routines of the user, determining a duration of each of the identified frequent patterns, logging second time-stamped event data of subsequent behavior of the user from the sensors in the environment of the user and identifying a new occurrence of a known pattern of the life routines of the user, detecting anomalous behavior and creating an alert based on the detected anomalous behavior.

Description

    FIELD
  • The proposed method and apparatus relates to detection of anomalies in the duration of activities of daily living of elderly or handicapped users in their homes or non-medical residences.
  • BACKGROUND
  • This section is intended to introduce the reader to various aspects of art, which may be related to the present embodiments that are described below. This discussion is believed to be helpful in providing the reader with background information to facilitate a better understanding of the various aspects of the present disclosure. Accordingly, it should be understood that these statements are to be read in this light.
  • In the domain of the care of elderly and handicapped people staying in their own homes or in non-medical residences (such as senior apartment complexes or assisted living facilities), one key area of interest is the life habits of the individual. Care workers (givers) monitoring the elderly or handicapped individuals may effectively use a report on the life patterns of the person as a tool for diagnosis of behavioral or health problems. Anomalies may be detected for further investigation and alerts may be raised for immediate action in the case of an emergency.
  • To monitor the health of a smart home resident and detect anomalous behavior, some solutions rely on automatic recognition of daily living activities like standing, sitting, sleeping, etc... This approach requires a data collection infrastructure in the home implementing generally a large number of sensors (bed and chair occupancy sensors, etc...), which can be complex and expensive to implement. In addition sensors may sometimes be considered to be intrusive by the individual (camera, wearable sensors, etc...), consequently not widely accepted by elderly or handicapped individuals. Finally these solutions are frequently based on supervised machine learning techniques and require labeling a large amount of data to learn a model for activities. This is not always feasible.
  • Other nonintrusive anomaly detection approaches rely on sensors located in the living environment such as motion detectors or door contactors, enabling the individual not to be disturbed with the technology. These solutions, which are generally accepted by elderly and handicapped people are frequently based on unsupervised machine learning techniques and use sensory data directly to find outliers. However, such a model of a user's behavior does not have any information or knowledge as to whether the individual is sitting, standing, walking, etc.
  • SUMMARY
  • The proposed method and apparatus uses non-intrusive sensors in the home or non-medical residences to detect deviations in the time spent on activities of daily living. While principally directed to detecting anomalous behavior of elderly or handicapped individuals, the proposed method and apparatus are not so limited and may be employed to monitor prisoners, children or other individuals that find themselves in restricted environments. The description of the proposed method and apparatus uses elderly or handicapped individuals as examples. Using time-stamped sensor events, the proposed method and apparatus identifies and mines patterns in the sequence of sensor activation signals and records the patterns in a data base. The duration of patterns is then computed. The computed pattern durations are assigned to each pattern in the data base. A new behavior pattern occurs and is assigned an anomaly score based on the similarity of the new pattern's duration to known pattern durations. A care giver is alerted if the anomaly score of the new pattern is above a threshold. The detection of anomalous behavior is used to alert a care giver of the anomalous behavior. The care giver may be a nurse, a doctor, an aide, a family member etc. In a prison or other environment, a care giver may be a person who monitors the activities of the individual being monitored. The alert may be by phone, by email, by text message or any other reasonable means.
  • Because it is preferable to rely on non-intrusive sensors, the proposed method and apparatus use the non-intrusive approach to detect anomalies in the behavior of elderly or handicapped individuals in their homes or non-medical residences. The home or non-medical residences are equipped with sensors such as motion sensors and door contacts (non-intrusive sensors). It would be advantageous to detect anomalous behavior of users using the duration of activities of daily living. Detection of anomalous behavior is crucial to an ability to alert and dispatch help or a caregiver in response to the anomalous behavior. If an elderly or handicapped individual takes significantly more time for a given activity (bathroom, moving from room to room), this is often due to a physical problem (issue) or injury that has slowed the individual down. If the anomalous behavior is detected early enough then a care worker (giver) may be alerted and dispatched to help or provide intervention before the problem worsens and become critical requiring hospitalization or other more intense and costly intervention.
  • A method for detecting anomalous behavior of a user is described including logging first time-stamped event data of initial behavior of the user from sensors in an environment of the user for a period of time, mining the logged time-stamped event data to identify patterns of life routines of the user, determining which of the identified patterns are frequent patterns of life routines of the user, determining a duration of each of the identified frequent patterns, logging second time-stamped event data of subsequent behavior of the user from the sensors in the environment of the user and identifying a new occurrence of a known pattern of the life routines of the user, detecting anomalous behavior and creating an alert based on the detected anomalous behavior. A server for detecting anomalous behavior of a user is also described including a receive data module, the receive data module logging first time-stamped event data of initial behavior of the user from sensors in an environment of the user for a period of time, an identify patterns module, the identify patterns module mining the time-stamped event data to identify patterns of life routines of the user, the identify patterns module in communication with the receive data module, a determine frequent patterns module, the determine frequent patterns module determining a duration of each of the identified frequent patterns, the determine frequent patterns module in communication with the identify patterns module, the receive data module logging second time-stamped event data of subsequent behavior of the user from the sensors in the environment of the user and identifying a new occurrence of a known pattern of the life routines of the user and an anomaly detection module, the anomaly detection module detecting anomalous behavior and creating an alert based on the detected anomalous behavior.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The proposed method and apparatus is best understood from the following detailed description when read in conjunction with the accompanying drawings. The drawings include the following figures briefly described below:
    • Fig. 1 shows an exemplary case, where one individual is living in a residence equipped with a non-intrusive data collection infrastructure and where each main room is covered by one omni-directional motion detector installed on the ceiling.
    • Fig. 2 is a schematic diagram of the proposed method and apparatus.
    • Fig. 3 is a flowchart of an exemplary embodiment of the proposed method.
    • Fig. 4 is a flowchart of an exemplary implementation of step 305 of Fig. 3.
    • Fig. 5 is a flowchart of an exemplary implementation of step 310 of Fig. 3.
    • Fig. 6 is a flowchart of an exemplary implementation of step 315 of Fig. 3.
    • Fig. 7 is a block diagram of an exemplary server that performs the proposed method.
  • It should be understood that the drawing(s) are for purposes of illustrating the concepts of the disclosure and is not necessarily the only possible configuration for illustrating the disclosure.
  • DETAILED DESCRIPTION
  • The present description illustrates the principles of the present disclosure. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described or shown herein, embody the principles of the disclosure and are included within its scope.
  • All examples and conditional language recited herein are intended for educational purposes to aid the reader in understanding the principles of the disclosure and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions.
  • Moreover, all statements herein reciting principles, aspects, and embodiments of the disclosure, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future, i.e., any elements developed that perform the same function, regardless of structure.
  • Thus, for example, it will be appreciated by those skilled in the art that the block diagrams presented herein represent conceptual views of illustrative circuitry embodying the principles of the disclosure. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudocode, and the like represent various processes which may be substantially represented in computer readable media and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.
  • The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared. Moreover, explicit use of the term "processor" or "controller" should not be construed to refer exclusively to hardware capable of executing software, and may implicitly include, without limitation, digital signal processor (DSP) hardware, read only memory (ROM) for storing software, random access memory (RAM), and nonvolatile storage.
  • Other hardware, conventional and/or custom, may also be included. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the implementer as more specifically understood from the context.
  • In the claims hereof, any element expressed as a means for performing a specified function is intended to encompass any way of performing that function including, for example, a) a combination of circuit elements that performs that function or b) software in any form, including, therefore, firmware, microcode or the like, combined with appropriate circuitry for executing that software to perform the function. The disclosure as defined by such claims resides in the fact that the functionalities provided by the various recited means are combined and brought together in the manner which the claims call for. It is thus regarded that any means that can provide those functionalities are equivalent to those shown herein.
  • Fig. 1 shows an exemplary case, where one individual is living in a residence equipped with a non-intrusive data collection infrastructure and where each main room is covered by one omni-directional motion detector installed on the ceiling. These main rooms are labeled the "bedroom", the "living", the "kitchen", the "bedroom2", the "office" and the corresponding motion sensors are respectively indicated as "mB", "mL", "mK", "mB2", "mO". Furthermore, one external "door" is equipped with a door contactor indicated as "cD". It should also be noted that should there be any corridors (halls), these could also be covered with one or more sensors. The sensors emit ON/OFF signals whether they are activated by something moving in front of the sensors (ON) or the sensors become silent (OFF). Door contacts may also be installed on the bedroom door, the office door, the bathroom door and perhaps even the refrigerator door. The door contacts emit OPEN/CLOSE signals whenever the door is opened or closed. All signals are collected in a single time-stamped file, one signal per line. The format includes the date, the time, the sensor identification and the event type (ON/OFF/OPEN/CLOSE).
  • Depending on the way data is collected and the way information is organized, in numerous cases data format can be reconstructed from data originally collected and provided by the collection infrastructure as a sequence of ordered time-stamped events. A representation of a time-stamped event (TSE) includes listing the events corresponding to the sensor activations together with the date and time at which the events occurred. The following is a short sample of such a data format for types of sensor including door activator and motion sensors:
    Date Time Sensor Event
    2014-11-06 T16:59:10.966903 cD OPEN
    2014-11-06 T16:59:11.528494 mL ON
    2014-11-06 T16:59:12.773843 mL OFF
    2014-11-06 T16:59:13.768215 mL ON
    2014-11-06 T16:59:20.492125 mL OFF
    2014-11-06 T16:59:22.162185 cD CLOSE
    2014-11-06 T16:59:22.934276 mK ON
    2014-11-06 T16:59:24.467157 mL ON
    2014-11-06 T16:59:24.536898 mK OFF
    2014-11-06 T16:59:26.95258 mL OFF
    2014-11-06 T16:59:28.374536 mB ON
    2014-11-06 T16:59:30.897865 mB OFF
  • In order to simplify the problem and without loss of generality, the special case where the person has been localized in the rooms using the sensor signals is considered. The sensor data is represented one time-stamped event per line below:
    2014-11-06 T16:59:11.528494 LIVING
    2014-11-06 T16:59:22.934276 KITCHEN
    2014-11-06 T16:59:24.467157 LIVING
    2014-11-06 T16:59:28.374536 BEDROOM
  • Here the person (individual, user) activated a sensor while he/she was in the living at 2014-11-06 T16:59:11.528494. The first step of the proposed method and apparatus (identification and mining patterns in the sequence of sensor activation signals and recording the patterns in a data base) includes detecting frequent patterns in the sequence of sensor activations or in the sequence of activities of the daily living (e.g. presence in room). If a pattern has occurred only once, for example, it is may not be useful, for among other reasons, that no typical duration distribution can be calculated (computed) in a later step. The motion sensors and door contacts are not necessarily smart devices and they do not have sufficient processing power to perform the proposed method so the time-stamped event data is transmitted to a server for recordation (storage) and processing. The collected time-stamped event data is, thus, forwarded to a server where the collected time-stamped event data is used to identify the user's life patterns in their home or non-medical residence. For example, a pattern could be:
    • LIVING - KITCHEN - LIVING - BEDROOM
  • These patterns may be found using known methods of data base (data set) mining. During this step, it is unnecessary to use the time-stamp, although the time-stamp could also be used. A set (collection) of frequent patterns, each being characteristic of an activity of the daily living of the person is obtained by the server and recorded (stored) for further processing. Each pattern is represented by a set of its occurrences in the data set (data base).
  • In the second step (pattern duration computation), the frequently occurring pattern occurrences in the dataset and their duration are considered. For example, the duration of the occurrence of a pattern may be computed as the time difference between the time-stamp of the last item in the pattern and the timestamp of the first item in the pattern. Given its set of occurrences, a set of known typical durations of the data base (data set) of patterns of activities of daily living is obtained (determined, calculated).
  • In the third step (anomaly detection), given a new occurrence of an already known pattern, together with its duration, the probability of this duration is tested against known typical durations for this pattern. This may be done using statistical hypothesis testing or any other method that would compute a deviation score between the observed duration and the set of typical durations. For example, if a set of typical durations has a Gaussian distribution, then a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern). This step produces a confidence anomaly score for this new occurrence. The anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test.
  • If there is a pattern already stored for going to the bathroom from the bedroom in the middle of the night and there is a usual duration, then an anomaly may be detected if the monitored user goes to the bathroom from the bedroom and the usual duration is exceeded. The duration of each pattern is recomputed using the last (latest) occurrence of the pattern. Once the pattern duration exceeds usual durations for the pattern, an anomaly is detected and an alert is sent (transmitted). In practice, if the monitored person (user) usually spends half an hour and almost never spends a whole hour in the bathroom after leaving the bedroom, then it would take about an hour to detect the anomaly (incident). The sensitivity of anomaly detection may be adapted according to use cases (for example, it may be preferable to receive too many alerts as opposed to not enough alerts so the anomaly detection sensitivity may be set higher thus anomaly detection may occur earlier and vice versa).
  • It should be noted that a same pattern may be characteristic of several activities of the daily living. For example, going in the kitchen at night to drink water and going in the kitchen at noon to prepare lunch may exhibit similar patterns but very different durations. Thus, a pattern may exhibit several types of duration distributions. This may be detected by modeling the durations of the pattern as a mixture of distributions. These patterns may also be labeled differently based on the time of day at which the pattern occurred. In a last optional step (alert), a threshold may be used to determine which alerts should be raised for care givers. An alert may show the pattern occurrence, the duration observed and the confidence score for the anomaly.
  • Referring to Fig. 2, which is a schematic diagram of an exemplary embodiment of a proposed method and apparatus, the time-stamped event data is received and forwarded to a server for recordation (logging, storage) in a data base (data set). The data base (data set) is mined for frequently occurring patterns. The frequent patterns are stored at the server. The server then calculates (computes) the duration of the patterns. The typical pattern duration distributions are then calculated (computed). A new pattern occurrence is then received by the server and the new pattern is compared to the existing patterns and their durations to determine if there is anomalous behavior (an anomaly). An anomaly score is then calculated (computed). The anomaly score is a confidence anomaly score. If a set of typical durations has a Gaussian distribution, then a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern). The anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test.
  • Fig. 3 is a flowchart of an exemplary embodiment of a proposed method. At 305 the server mines the time-stamped event data to identify frequent patterns of user life routines. The number of occurrences of the patterns may be compared to a threshold to determine if they are occurring with sufficient frequency. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step. These patterns may be found using known methods of data base (data set) mining. During this step, it is unnecessary to use the time-stamp, although the time-stamp could also be used. A set of frequently occurring patterns, each being characteristic of an activity of the daily living of the person is obtained by the server and recorded (logged, stored) for further processing. Each pattern is represented by a set of its occurrences in the data set (data base). At 310 the duration of the frequently occurring patterns is calculated (computed). The duration of the occurrence of a pattern may be computed as the time difference between the time-stamp of the last item in the pattern and the time-stamp of the first item in the pattern. Given its set of occurrences, a set of known typical durations of the data base (data set) of patterns of activities of daily living is obtained (determined, calculated). At 315 the server receives new time-stamped event data and identifies a new pattern occurrence from the newly received time-stamped event data. Given a new occurrence of an already known pattern, together with its duration, the probability of this duration is tested against known typical durations for this pattern. This may be done using statistical hypotheses testing or any other method that would compute a deviation score between the observed duration and the set of typical durations. For example, if a set of typical durations has a Gaussian distribution, then a duration that is greater than the mean plus (or minus) twice the standard deviation is an anomaly (it is outside of the confidence interval of 95% for this pattern). This step produces a confidence anomaly score for this new occurrence. The anomaly score may for instance be a Boolean (yes/no value) or the p-value obtained from the statistical hypothesis test. The server creates one or more alerts based on the anomalous behavior of the user and at 320 the server forwards the alerts to the care giver.
  • Fig. 4 is a flowchart of an exemplary implementation of step 305 of Fig. 3. At 405 the server receives time-stamped event data for a period of time and logs (records, stores) the received time-stamped data. The period of time for collection of the time-stamped event data is a period of time necessary to collect and identify enough patterns to be statistically meaningful. At 410 the server identifies patterns of user life routines. At 415 the server uses a threshold to isolate frequently occurring pattern of user life routines. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step. At 420 the frequent occurring patterns of user life routines are stored in a data base.
  • Fig. 5 is a flowchart of an exemplary implementation of step 310 of Fig. 3. At 505 the duration for each frequently occurring pattern is calculated (computed). This is accomplished by taking the difference of the time-stamp of the first item of each frequently occurring pattern of the user's life routine from the time-stamp of the last item of the respective frequently occurring pattern of user's life routine. At 510 the time duration of each frequently occurring pattern of user's life routine is stored back in the server's data base (data set) along with the corresponding frequently occurring pattern of the user's life routine.
  • Fig. 6 is a flowchart of an exemplary implementation of step 315 of Fig. 3. At 605 the server receives and logs (stores, records) new time-stamped event data and at 610 the server identifies a new pattern. Both 605 and 610 are or can be performed by 405 and 410 of the frequent pattern mining process described above and shown in Fig. 4. At 615 the server determines the duration of the new pattern. This is or can be performed by 505 of the pattern duration computation process described above and shown in Fig. 5. At 620 the server determines if the new pattern is known. Determination of if the new pattern is known can be performed before duration computation or during new pattern identification if a list of known patterns exists to which a new pattern can be compared. At 625 the server compares the new known pattern against the typical pattern duration distribution of the pattern. At 630 the server determines if there is an anomaly (anomalous behavior). That is, an anomaly score (confidence anomaly score) is calculated (computed, determined) for the new pattern. The server also creates one or more alerts based on the detected anomalous behavior at 630.
  • Fig. 7 is a block diagram of an exemplary server that performs the proposed method. The server has three main modules each of which has submodules. The three main modules are the Frequent Pattern Item Mining Module, the Pattern Duration Computation Module and the Anomaly Detection Module. There is also a module to report detected anomalies of the user's behavior to a care giver. The Frequent Pattern Item Mining Module logs time-stamped event data of initial behavior of the user for a period of time at the Receive Data Module. The period of time for collection of the time-stamped event data is a period of time necessary to collect and identify enough patterns to be statistically meaningful. The logged time-stamped event data of the initial behavior of the user is forwarded to the Identify Patterns Module which identifies (mines) patterns of user life routines. The Identify Patterns Module forwards the identified patterns of the user's life routine to the Determine Frequent Patterns Module, which uses a threshold to isolate frequently occurring pattern of user life routines. If a pattern has occurred only once, for example, it is not going to be useful for among other reasons no typical duration distribution can be calculated (computed) in a later step. The Determine Frequent Patterns Module forwards the frequent patterns to the Store Frequent Patterns Module which stores the frequent occurring patterns of user life routines in a data base (data set).
  • The Store Frequent Patterns Module is in communication with the Calculate Duration of Each Pattern Occurrence Module which calculates (computes) the duration for each frequently occurring pattern. This is accomplished by taking the difference of the time-stamp of the first item of each frequently occurring pattern of the user's life routine from the time-stamp of the last item of the respective frequently occurring pattern of user's life routine. The Calculate Duration of Each Pattern Occurrence Module forwards the durations of each frequently occurring pattern to the Store Durations Module which stores the time duration of each frequently occurring pattern of user's life routine in the server's data base (data set) along with the corresponding frequently occurring pattern of the user's life routine.
  • The Store Frequent Patterns Module and the Identify Patterns Module are in communication with the Determine if New Pattern is Known Module which determines if the new logged pattern of subsequent behavior of the user is known. The Determine if New Pattern is Known Module forwards the new known pattern to the Compare New Pattern Against Typical Pattern Duration Distribution Module which compares the new known pattern against the typical pattern duration distribution of the pattern. The Store Durations Module and the Calculate Duration of Each Pattern Occurrence Module are in communication with the Compare New Pattern Against Typical Pattern Duration Distribution Module. The Compare New Pattern Against Typical Pattern Duration Distribution Module forwards the results of the comparison to the Detect Anomaly Module which determines if there is an anomaly (anomalous behavior). That is, an anomaly score (confidence anomaly score) is calculated (computed, determined) for the new pattern. The Detect Anomaly Module also creates an alert based on the detected anomalous behavior of the user. The Detect Anomaly Module forwards any detected anomalies and alerts to the Report Anomaly Module which reports detected anomalies to a care giver.
  • It is to be understood that the proposed method and apparatus may be implemented in various forms of hardware, software, firmware, special purpose processors, or a combination thereof. Special purpose processors may include application specific integrated circuits (ASICs), reduced instruction set computers (RISCs) and/or field programmable gate arrays (FPGAs). Preferably, the proposed method and apparatus is implemented as a combination of hardware and software. Moreover, the software is preferably implemented as an application program tangibly embodied on a program storage device. The application program may be uploaded to, and executed by, a machine comprising any suitable architecture. Preferably, the machine is implemented on a computer platform having hardware such as one or more central processing units (CPU), a random access memory (RAM), and input/output (I/O) interface(s). The computer platform also includes an operating system and microinstruction code. The various processes and functions described herein may either be part of the microinstruction code or part of the application program (or a combination thereof), which is executed via the operating system. In addition, various other peripheral devices may be connected to the computer platform such as an additional data storage device and a printing device.
  • It should be understood that the elements shown in the figures may be implemented in various forms of hardware, software or combinations thereof. Preferably, these elements are implemented in a combination of hardware and software on one or more appropriately programmed general-purpose devices, which may include a processor, memory and input/output interfaces. Herein, the phrase "coupled" is defined to mean directly connected to or indirectly connected with through one or more intermediate components. Such intermediate components may include both hardware and software based components.
  • It is to be further understood that, because some of the constituent system components and method steps depicted in the accompanying figures are preferably implemented in software, the actual connections between the system components (or the process steps) may differ depending upon the manner in which the proposed method and apparatus is programmed. Given the teachings herein, one of ordinary skill in the related art will be able to contemplate these and similar implementations or configurations of the proposed method and apparatus.

Claims (14)

  1. A method for detecting anomalous behavior of a user, said method comprising:
    logging (305, 405) first time-stamped event data of initial behavior of said user from sensors in an environment of said user for a period of time;
    mining (305, 410) said logged time-stamped event data to identify patterns of life routines of said user;
    determining (305, 415) which of said identified patterns are frequent patterns of life routines of said user;
    determining (310, 405) a duration of each of the identified frequent patterns;
    logging (315, 605) second time-stamped event data of subsequent behavior of said user from said sensors in said environment of said user and identifying a new occurrence of a known pattern of said life routines of said user;
    detecting (315, 630) anomalous behavior responsive to said determined duration of each of the identified frequent patterns compared to said identified new occurrence of said known pattern of said life routines of said user; and
    creating (315, 630) an alert based on said detected anomalous behavior.
  2. The method according to claim 1, wherein said mining further comprises:
    determining frequent occurring patterns by comparing a number of occurrences of said pattern to a threshold;
    storing said identified frequent occurring patterns; and
    reporting said alert of detected anomalous behavior of said user to a care giver.
  3. The method according to claim 2, wherein said threshold is selected based on a statistically meaningful number of occurrences of patterns.
  4. The method according to claim 1, wherein said duration further comprises:
    calculating said duration of each of the identified frequent patterns by subtracting a time-stamp of a first item of each of the identified frequent patterns from a time-stamp of a last item of each of the identified frequent patterns; and
    storing said calculated durations of each of said identified frequent patterns.
  5. The method according to claim 1, wherein said detecting further comprises:
    determining if the new occurrence of an identified pattern is an anomaly;
    comparing a duration of said new occurrence against typical durations for said known pattern of said user's life routine; and
    calculating an anomaly score.
  6. The method according to claim 5, wherein said anomaly score is a Boolean value.
  7. The method according to claim 5, wherein said anomaly score is a p-value obtained from a statistical hypothesis test.
  8. An apparatus for detecting anomalous behavior by a user, comprising:
    means for logging time-stamped event data of initial behavior of said user from sensors in an environment of said user for a period of time (1, 11);
    means for mining said logged time-stamped event data to identify patterns of life routines of said user(1, 12);
    means for determining which of said identified patterns are frequent patterns of life routines of said user (1, 13);
    means for determining a duration of each of the identified frequent patterns (3, 31);
    means for logging new time-stamped event data of subsequent behavior of said user from said sensors in said environment of said user and identifying a new occurrence of a known pattern of said life routines of said user (1, 11);
    means for detecting anomalous behavior responsive to said determined duration of each of the identified frequent patterns compared to said identified new occurrence of said known pattern of said life routines of said user (2, 22); and
    means for creating an alert based on said detected anomalous behavior (2, 23).
  9. The apparatus according to claim 8, wherein said means for mining further comprises:
    means for determining frequent occurring patterns by comparing a number of occurrences of said pattern to a threshold;
    means for storing said identified frequent occurring patterns; and
    means for reporting said alert of said detected anomalous behavior of said user to a care giver.
  10. The apparatus according to claim 9, wherein said threshold is selected based on a statistically meaningful number of occurrences of patterns.
  11. The apparatus according to claim 8, wherein said duration further comprises:
    means for calculating said duration of each of the identified frequent patterns by subtracting a time-stamp of a first item of each of the identified frequent patterns from a time-stamp of a last item of each of the identified frequent patterns; and
    means for storing said calculated durations of each of said identified frequent patterns.
  12. The apparatus according to claim 8, wherein said detecting further comprises:
    means for determining if the new occurrence of the known pattern is an anomaly by comparing a duration of said new occurrence against typical durations for said known pattern of said user's life routine; and
    means for calculating an anomaly score.
  13. The apparatus according to claim 12, wherein said anomaly score is a Boolean value.
  14. The apparatus according to claim 12, wherein said anomaly score is a p-value obtained from a statistical hypothesis test.
EP15306726.9A 2015-10-29 2015-10-29 Method and device for detecting anomalous behavior of a user Withdrawn EP3163546A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP15306726.9A EP3163546A1 (en) 2015-10-29 2015-10-29 Method and device for detecting anomalous behavior of a user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP15306726.9A EP3163546A1 (en) 2015-10-29 2015-10-29 Method and device for detecting anomalous behavior of a user

Publications (1)

Publication Number Publication Date
EP3163546A1 true EP3163546A1 (en) 2017-05-03

Family

ID=54366167

Family Applications (1)

Application Number Title Priority Date Filing Date
EP15306726.9A Withdrawn EP3163546A1 (en) 2015-10-29 2015-10-29 Method and device for detecting anomalous behavior of a user

Country Status (1)

Country Link
EP (1) EP3163546A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3457635A1 (en) * 2017-09-18 2019-03-20 Thomson Licensing Method and device for identifying a user in an environment
CN111459797A (en) * 2020-02-27 2020-07-28 上海交通大学 Method, system and medium for detecting abnormity of developer behaviors in open source community

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001216585A (en) * 2000-02-03 2001-08-10 Sekisui Chem Co Ltd Abnormal behavior judging system
US20030059081A1 (en) * 2001-09-27 2003-03-27 Koninklijke Philips Electronics N.V. Method and apparatus for modeling behavior using a probability distrubution function
US20100063774A1 (en) * 2008-09-11 2010-03-11 Washington State University Systems and methods for adaptive smart environment automation
US20110295583A1 (en) * 2010-05-27 2011-12-01 Infrared Integrated Systems Limited Monitoring changes in behavior of a human subject
WO2015127491A1 (en) * 2014-02-25 2015-09-03 Monash University Monitoring system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001216585A (en) * 2000-02-03 2001-08-10 Sekisui Chem Co Ltd Abnormal behavior judging system
US20030059081A1 (en) * 2001-09-27 2003-03-27 Koninklijke Philips Electronics N.V. Method and apparatus for modeling behavior using a probability distrubution function
US20100063774A1 (en) * 2008-09-11 2010-03-11 Washington State University Systems and methods for adaptive smart environment automation
US20110295583A1 (en) * 2010-05-27 2011-12-01 Infrared Integrated Systems Limited Monitoring changes in behavior of a human subject
WO2015127491A1 (en) * 2014-02-25 2015-09-03 Monash University Monitoring system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3457635A1 (en) * 2017-09-18 2019-03-20 Thomson Licensing Method and device for identifying a user in an environment
CN111459797A (en) * 2020-02-27 2020-07-28 上海交通大学 Method, system and medium for detecting abnormity of developer behaviors in open source community
CN111459797B (en) * 2020-02-27 2023-04-28 上海交通大学 Abnormality detection method, system and medium for developer behavior in open source community

Similar Documents

Publication Publication Date Title
US20200074840A1 (en) Monitoring activity of an individual
US10311694B2 (en) System and method for adaptive indirect monitoring of subject for well-being in unattended setting
EP3163545A1 (en) Abnormal activity detection for elderly and handicapped individuals
US7589637B2 (en) Monitoring activity of an individual
Monekosso et al. Behavior analysis for assisted living
US10827951B2 (en) Fall detection using sensors in a smart monitoring safety system
US20080228039A1 (en) Semi-passive method and system for monitoring and determining the status of an unattended person
Aghajan et al. Distributed vision-based accident management for assisted living
EP2184724A1 (en) A system for tracking a presence of persons in a building, a method and a computer program product
US11224358B2 (en) Smart monitoring safety and quality of life system using sensors
US7009497B2 (en) Method of distinguishing the presence of a single versus multiple persons
Forkan et al. An Internet-of-Things solution to assist independent living and social connectedness in elderly
US20210366611A1 (en) Smart monitoring safety system using sensors
Moshtaghi et al. Statistical models for unobtrusively detecting abnormal periods of inactivity in older adults
WO2013023067A2 (en) Monitoring and tracking system, method, article and device
Forkan et al. Halleyassist: A personalised internet of things technology to assist the elderly in daily living
Dasios et al. Wireless sensor network deployment for remote elderly care monitoring
EP3163546A1 (en) Method and device for detecting anomalous behavior of a user
Jakkula et al. Enhancing anomaly detection using temporal pattern discovery
Peeters Design criteria for an automatic safety-alarm system for elderly
Vavilov et al. Healthcare application of Smart Home user's behavior prediction
Floeck et al. An ambient approach to emergency detection based on location tracking
Akbarzadeh et al. Smart aging system
EP4143690A1 (en) Sensor anomaly detection
EP3832618A1 (en) Monitoring system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20171104