SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

FAST ACTIVITY DETECTION INDEXING FOR TEMPORAL STOCHASTIC
AUTOMATON-BASED ACTIVITY MODELS
ABSTRACT:
In this paper, we address the problem of efficiently detecting occurrences of high-level activities
from such interleaved data streams. A solution to this important problem would greatly benefit a
broad range of applications, including fraud detection, video surveillance, and cyber security.
There has been extensive work in the last few years on modeling activities using probabilistic
models. In this paper, we propose a temporal probabilistic graph so that the elapsed time between
observations also plays a role in defining whether a sequence of observations constitutes an
activity.
We first propose a data structure called “temporal multiactivity graph” to store multiple activities
that need to be concurrently monitored. We then define an index called Temporal Multiactivity
Graph Index Creation (tMAGIC) that, based on this data structure, examines and links
observations as they occur. We define algorithms for insertion and bulk insertion into the
tMAGIC index and show that this can be efficiently accomplished.
We define algorithms to solve two problems: the “evidence” problem that tries to find all
occurrences of an activity (with probability over a threshold) within a given sequence of
observations, and the “identification” problem that tries to find the activity that best matches a
sequence of observations. We introduce complexity reducing restrictions and pruning strategies
to make the problem-which is intrinsically exponential-linear to the number of observations. Our
experiments confirm that tMAGI- has time and space complexity linear to the size of the input,
and can efficiently retrieve instances of the monitored activities.

More Related Content

What's hot

Satwik mishra resume
Satwik mishra resumeSatwik mishra resume
Satwik mishra resumeSatwik Mishra
 
Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Neeta Pande
 
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...Dataconomy Media
 
How to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsHow to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsGene Leybzon
 
Solving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelSolving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelVeselin Pizurica
 
Big image analytics for (Re-) insurer
 Big image analytics for (Re-) insurer Big image analytics for (Re-) insurer
Big image analytics for (Re-) insurerFlavio Trolese
 

What's hot (8)

Satwik mishra resume
Satwik mishra resumeSatwik mishra resume
Satwik mishra resume
 
Shikha Soni
Shikha SoniShikha Soni
Shikha Soni
 
Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1
 
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
 
How to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsHow to extract valueable information from real time data feeds
How to extract valueable information from real time data feeds
 
Solving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelSolving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph model
 
Big image analytics for (Re-) insurer
 Big image analytics for (Re-) insurer Big image analytics for (Re-) insurer
Big image analytics for (Re-) insurer
 
Satwik resume
Satwik resumeSatwik resume
Satwik resume
 

Viewers also liked

Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryEcwayt
 
Exponential and power law distribution of contact duration in urban vehicular...
Exponential and power law distribution of contact duration in urban vehicular...Exponential and power law distribution of contact duration in urban vehicular...
Exponential and power law distribution of contact duration in urban vehicular...Ecwayt
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Ecwayt
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwayt
 
Fiscal access system using rfid
Fiscal access system using rfidFiscal access system using rfid
Fiscal access system using rfidEcwayt
 
Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Ecwayt
 
Gesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personGesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personEcwayt
 
Gps based fleet management system
Gps based fleet management systemGps based fleet management system
Gps based fleet management systemEcwayt
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identificationEcwayt
 
Trading Stocks With Social Networks Data
Trading Stocks With Social Networks DataTrading Stocks With Social Networks Data
Trading Stocks With Social Networks DataUX Fabric Ltd
 
Save Our Planet
Save Our PlanetSave Our Planet
Save Our PlanetLeeJiinAn
 
Energy meter digitization and automatic utility transfer to electricity board...
Energy meter digitization and automatic utility transfer to electricity board...Energy meter digitization and automatic utility transfer to electricity board...
Energy meter digitization and automatic utility transfer to electricity board...Ecwayt
 

Viewers also liked (14)

Fast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video deliveryFast channel zapping with destination oriented multicast for ip video delivery
Fast channel zapping with destination oriented multicast for ip video delivery
 
Exponential and power law distribution of contact duration in urban vehicular...
Exponential and power law distribution of contact duration in urban vehicular...Exponential and power law distribution of contact duration in urban vehicular...
Exponential and power law distribution of contact duration in urban vehicular...
 
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...Exploiting ubiquitous data collection for mobile users in wireless sensor net...
Exploiting ubiquitous data collection for mobile users in wireless sensor net...
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Fiscal access system using rfid
Fiscal access system using rfidFiscal access system using rfid
Fiscal access system using rfid
 
Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...Estimating information from image colors an application to digital cameras an...
Estimating information from image colors an application to digital cameras an...
 
Gesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled personGesture based wheel chair for physically disabled person
Gesture based wheel chair for physically disabled person
 
Gps based fleet management system
Gps based fleet management systemGps based fleet management system
Gps based fleet management system
 
Embedded based electricity theft identification
Embedded based electricity theft identificationEmbedded based electricity theft identification
Embedded based electricity theft identification
 
Trading Stocks With Social Networks Data
Trading Stocks With Social Networks DataTrading Stocks With Social Networks Data
Trading Stocks With Social Networks Data
 
Save Our Planet
Save Our PlanetSave Our Planet
Save Our Planet
 
Energy meter digitization and automatic utility transfer to electricity board...
Energy meter digitization and automatic utility transfer to electricity board...Energy meter digitization and automatic utility transfer to electricity board...
Energy meter digitization and automatic utility transfer to electricity board...
 
Página 23
Página 23Página 23
Página 23
 
Cert[1]
Cert[1]Cert[1]
Cert[1]
 

Similar to Fast activity detection indexing for temporal stochastic automaton based activity models

Java fast activity detection indexing for temporal stochastic automaton-base...
Java  fast activity detection indexing for temporal stochastic automaton-base...Java  fast activity detection indexing for temporal stochastic automaton-base...
Java fast activity detection indexing for temporal stochastic automaton-base...ecwayerode
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementVenkat Projects
 
Java event tracking for real-time unaware sensitivity analysis
Java  event tracking for real-time unaware sensitivity analysisJava  event tracking for real-time unaware sensitivity analysis
Java event tracking for real-time unaware sensitivity analysisecwayerode
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecway
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecway
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches Venkat Projects
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEcwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwayt
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEcwayt
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET Journal
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4sophiabelthome
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 

Similar to Fast activity detection indexing for temporal stochastic automaton based activity models (20)

Java fast activity detection indexing for temporal stochastic automaton-base...
Java  fast activity detection indexing for temporal stochastic automaton-base...Java  fast activity detection indexing for temporal stochastic automaton-base...
Java fast activity detection indexing for temporal stochastic automaton-base...
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
Java event tracking for real-time unaware sensitivity analysis
Java  event tracking for real-time unaware sensitivity analysisJava  event tracking for real-time unaware sensitivity analysis
Java event tracking for real-time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

More from Ecwayt

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensorsEcwayt
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksEcwayt
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Ecwayt
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Ecwayt
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphsEcwayt
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligenceEcwayt
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink pointsEcwayt
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networksEcwayt
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...Ecwayt
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...Ecwayt
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...Ecwayt
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titlesEcwayt
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed controlEcwayt
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Ecwayt
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Ecwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoringEcwayt
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psEcwayt
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless cameraEcwayt
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alertEcwayt
 

More from Ecwayt (20)

Covering points of interest with mobile sensors
Covering points of interest with mobile sensorsCovering points of interest with mobile sensors
Covering points of interest with mobile sensors
 
Coloring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networksColoring based inter-wban scheduling for mobile wireless body area networks
Coloring based inter-wban scheduling for mobile wireless body area networks
 
Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...Code modulation based encryption & decryption technique for secure communicat...
Code modulation based encryption & decryption technique for secure communicat...
 
Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...Clustering sentence level text using a novel fuzzy relational clustering algo...
Clustering sentence level text using a novel fuzzy relational clustering algo...
 
Clustering large probabilistic graphs
Clustering large probabilistic graphsClustering large probabilistic graphs
Clustering large probabilistic graphs
 
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim  t-drive enhancing driving directions with taxi drivers’ intelligenceCloudsim  t-drive enhancing driving directions with taxi drivers’ intelligence
Cloudsim t-drive enhancing driving directions with taxi drivers’ intelligence
 
Cloudsim ranking on data manifold with sink points
Cloudsim  ranking on data manifold with sink pointsCloudsim  ranking on data manifold with sink points
Cloudsim ranking on data manifold with sink points
 
Cloudsim quality-differentiated video multicast in multirate wireless networks
Cloudsim  quality-differentiated video multicast in multirate wireless networksCloudsim  quality-differentiated video multicast in multirate wireless networks
Cloudsim quality-differentiated video multicast in multirate wireless networks
 
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
Cloudsim  power allocation for statistical qo s provisioning in opportunistic...Cloudsim  power allocation for statistical qo s provisioning in opportunistic...
Cloudsim power allocation for statistical qo s provisioning in opportunistic...
 
Cloudsim distributed web systems performance forecasting using turning bands...
Cloudsim  distributed web systems performance forecasting using turning bands...Cloudsim  distributed web systems performance forecasting using turning bands...
Cloudsim distributed web systems performance forecasting using turning bands...
 
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
Cloudsim  distributed processing of probabilistic top-k queries in wireless s...Cloudsim  distributed processing of probabilistic top-k queries in wireless s...
Cloudsim distributed processing of probabilistic top-k queries in wireless s...
 
Civil 2013 titles
Civil 2013 titlesCivil 2013 titles
Civil 2013 titles
 
Chopper based dc motor speed control
Chopper based dc motor speed controlChopper based dc motor speed control
Chopper based dc motor speed control
 
Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...Channel assignment for throughput optimization in multichannel multiradio wir...
Channel assignment for throughput optimization in multichannel multiradio wir...
 
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...Channel allocation and routing in hybrid multichannel multiradio wireless mes...
Channel allocation and routing in hybrid multichannel multiradio wireless mes...
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Casual stereoscopic photo authoring
Casual stereoscopic photo authoringCasual stereoscopic photo authoring
Casual stereoscopic photo authoring
 
Capacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a psCapacity of hybrid wireless mesh networks with random a ps
Capacity of hybrid wireless mesh networks with random a ps
 
Bomb detection robot with wireless camera
Bomb detection robot with wireless cameraBomb detection robot with wireless camera
Bomb detection robot with wireless camera
 
Bed side patients monitoring system with emergency alert
Bed side patients monitoring system with  emergency alertBed side patients monitoring system with  emergency alert
Bed side patients monitoring system with emergency alert
 

Fast activity detection indexing for temporal stochastic automaton based activity models

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com FAST ACTIVITY DETECTION INDEXING FOR TEMPORAL STOCHASTIC AUTOMATON-BASED ACTIVITY MODELS ABSTRACT: In this paper, we address the problem of efficiently detecting occurrences of high-level activities from such interleaved data streams. A solution to this important problem would greatly benefit a broad range of applications, including fraud detection, video surveillance, and cyber security. There has been extensive work in the last few years on modeling activities using probabilistic models. In this paper, we propose a temporal probabilistic graph so that the elapsed time between observations also plays a role in defining whether a sequence of observations constitutes an activity. We first propose a data structure called “temporal multiactivity graph” to store multiple activities that need to be concurrently monitored. We then define an index called Temporal Multiactivity Graph Index Creation (tMAGIC) that, based on this data structure, examines and links observations as they occur. We define algorithms for insertion and bulk insertion into the tMAGIC index and show that this can be efficiently accomplished. We define algorithms to solve two problems: the “evidence” problem that tries to find all occurrences of an activity (with probability over a threshold) within a given sequence of observations, and the “identification” problem that tries to find the activity that best matches a sequence of observations. We introduce complexity reducing restrictions and pruning strategies to make the problem-which is intrinsically exponential-linear to the number of observations. Our experiments confirm that tMAGI- has time and space complexity linear to the size of the input, and can efficiently retrieve instances of the monitored activities.