SlideShare a Scribd company logo
1 of 1
Download to read offline
ECWAY TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111
VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com

FAST ACTIVITY DETECTION INDEXING FOR TEMPORAL STOCHASTIC
AUTOMATON-BASED ACTIVITY MODELS
ABSTRACT:
In this paper, we address the problem of efficiently detecting occurrences of high-level activities
from such interleaved data streams. A solution to this important problem would greatly benefit a
broad range of applications, including fraud detection, video surveillance, and cyber security.
There has been extensive work in the last few years on modeling activities using probabilistic
models. In this paper, we propose a temporal probabilistic graph so that the elapsed time between
observations also plays a role in defining whether a sequence of observations constitutes an
activity.
We first propose a data structure called “temporal multiactivity graph” to store multiple activities
that need to be concurrently monitored. We then define an index called Temporal Multiactivity
Graph Index Creation (tMAGIC) that, based on this data structure, examines and links
observations as they occur. We define algorithms for insertion and bulk insertion into the
tMAGIC index and show that this can be efficiently accomplished.
We define algorithms to solve two problems: the “evidence” problem that tries to find all
occurrences of an activity (with probability over a threshold) within a given sequence of
observations, and the “identification” problem that tries to find the activity that best matches a
sequence of observations. We introduce complexity reducing restrictions and pruning strategies
to make the problem-which is intrinsically exponential-linear to the number of observations. Our
experiments confirm that tMAGI- has time and space complexity linear to the size of the input,
and can efficiently retrieve instances of the monitored activities.

More Related Content

What's hot

Satwik mishra resume
Satwik mishra resumeSatwik mishra resume
Satwik mishra resumeSatwik Mishra
 
Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Neeta Pande
 
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...Dataconomy Media
 
How to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsHow to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsGene Leybzon
 
Solving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelSolving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelVeselin Pizurica
 
Big image analytics for (Re-) insurer
 Big image analytics for (Re-) insurer Big image analytics for (Re-) insurer
Big image analytics for (Re-) insurerFlavio Trolese
 

What's hot (8)

Satwik mishra resume
Satwik mishra resumeSatwik mishra resume
Satwik mishra resume
 
Shikha Soni
Shikha SoniShikha Soni
Shikha Soni
 
Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1Graph based Semi Supervised Learning V1
Graph based Semi Supervised Learning V1
 
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
DN18 | Applied Machine Learning in Cybersecurity: Detect malicious DGA Domain...
 
How to extract valueable information from real time data feeds
How to extract valueable information from real time data feedsHow to extract valueable information from real time data feeds
How to extract valueable information from real time data feeds
 
Solving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph modelSolving the weak spots of serverless with directed acyclic graph model
Solving the weak spots of serverless with directed acyclic graph model
 
Big image analytics for (Re-) insurer
 Big image analytics for (Re-) insurer Big image analytics for (Re-) insurer
Big image analytics for (Re-) insurer
 
Satwik resume
Satwik resumeSatwik resume
Satwik resume
 

Viewers also liked

Viewers also liked (13)

Página 21
Página 21Página 21
Página 21
 
Página 17
Página 17Página 17
Página 17
 
Trabajo grupal
Trabajo grupalTrabajo grupal
Trabajo grupal
 
Constancia de quórum sol naciente
Constancia de quórum sol nacienteConstancia de quórum sol naciente
Constancia de quórum sol naciente
 
Glosario
GlosarioGlosario
Glosario
 
Página 16
Página 16Página 16
Página 16
 
Dotnet simple hybrid and incremental postpruning techniques for rule induction
Dotnet  simple hybrid and incremental postpruning techniques for rule inductionDotnet  simple hybrid and incremental postpruning techniques for rule induction
Dotnet simple hybrid and incremental postpruning techniques for rule induction
 
Raja Prakash R M
Raja Prakash R MRaja Prakash R M
Raja Prakash R M
 
Neucon mailer-geico-r1
Neucon mailer-geico-r1Neucon mailer-geico-r1
Neucon mailer-geico-r1
 
Página 18
Página 18Página 18
Página 18
 
Guia de aprendizaje word
Guia de aprendizaje wordGuia de aprendizaje word
Guia de aprendizaje word
 
Comfylight
ComfylightComfylight
Comfylight
 
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...Dotnet  receiver-driven adaptive enhancement layer switching algorithm for sc...
Dotnet receiver-driven adaptive enhancement layer switching algorithm for sc...
 

Similar to Dotnet fast activity detection indexing for temporal stochastic automaton-based activity models

Java fast activity detection indexing for temporal stochastic automaton-base...
Java  fast activity detection indexing for temporal stochastic automaton-base...Java  fast activity detection indexing for temporal stochastic automaton-base...
Java fast activity detection indexing for temporal stochastic automaton-base...ecwayerode
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementVenkat Projects
 
Java event tracking for real-time unaware sensitivity analysis
Java  event tracking for real-time unaware sensitivity analysisJava  event tracking for real-time unaware sensitivity analysis
Java event tracking for real-time unaware sensitivity analysisecwayerode
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecway
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecway
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches Venkat Projects
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...ijfcstjournal
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEcwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwaytech
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysisEcwayt
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEcwayt
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisecwayprojects
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET Journal
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4sophiabelthome
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...IJNSA Journal
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...IRJET Journal
 

Similar to Dotnet fast activity detection indexing for temporal stochastic automaton-based activity models (20)

Java fast activity detection indexing for temporal stochastic automaton-base...
Java  fast activity detection indexing for temporal stochastic automaton-base...Java  fast activity detection indexing for temporal stochastic automaton-base...
Java fast activity detection indexing for temporal stochastic automaton-base...
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
Java event tracking for real-time unaware sensitivity analysis
Java  event tracking for real-time unaware sensitivity analysisJava  event tracking for real-time unaware sensitivity analysis
Java event tracking for real-time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches modeling and predicting cyber hacking breaches
modeling and predicting cyber hacking breaches
 
Ijetcas14 467
Ijetcas14 467Ijetcas14 467
Ijetcas14 467
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...Verification of the protection services in antivirus systems by using nusmv m...
Verification of the protection services in antivirus systems by using nusmv m...
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Dotnet event tracking for real-time unaware sensitivity analysis
Dotnet  event tracking for real-time unaware sensitivity analysisDotnet  event tracking for real-time unaware sensitivity analysis
Dotnet event tracking for real-time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
Event tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysisEvent tracking for real time unaware sensitivity analysis
Event tracking for real time unaware sensitivity analysis
 
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...IRJET- 	  Comparative Analysis between Critical Path Method and Monte Carlo S...
IRJET- Comparative Analysis between Critical Path Method and Monte Carlo S...
 
International journal of engineering issues vol 2015 - no 2 - paper4
International journal of engineering issues   vol 2015 - no 2 - paper4International journal of engineering issues   vol 2015 - no 2 - paper4
International journal of engineering issues vol 2015 - no 2 - paper4
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHM...
 
IRJET- Surveillance of Object Motion Detection and Caution System using B...
IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...IRJET-  	  Surveillance of Object Motion Detection and Caution System using B...
IRJET- Surveillance of Object Motion Detection and Caution System using B...
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 

Dotnet fast activity detection indexing for temporal stochastic automaton-based activity models

  • 1. ECWAY TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE CELL: +91 98949 17187, +91 875487 2111 / 3111 / 4111 / 5111 / 6111 VISIT: www.ecwayprojects.com MAIL TO: ecwaytechnologies@gmail.com FAST ACTIVITY DETECTION INDEXING FOR TEMPORAL STOCHASTIC AUTOMATON-BASED ACTIVITY MODELS ABSTRACT: In this paper, we address the problem of efficiently detecting occurrences of high-level activities from such interleaved data streams. A solution to this important problem would greatly benefit a broad range of applications, including fraud detection, video surveillance, and cyber security. There has been extensive work in the last few years on modeling activities using probabilistic models. In this paper, we propose a temporal probabilistic graph so that the elapsed time between observations also plays a role in defining whether a sequence of observations constitutes an activity. We first propose a data structure called “temporal multiactivity graph” to store multiple activities that need to be concurrently monitored. We then define an index called Temporal Multiactivity Graph Index Creation (tMAGIC) that, based on this data structure, examines and links observations as they occur. We define algorithms for insertion and bulk insertion into the tMAGIC index and show that this can be efficiently accomplished. We define algorithms to solve two problems: the “evidence” problem that tries to find all occurrences of an activity (with probability over a threshold) within a given sequence of observations, and the “identification” problem that tries to find the activity that best matches a sequence of observations. We introduce complexity reducing restrictions and pruning strategies to make the problem-which is intrinsically exponential-linear to the number of observations. Our experiments confirm that tMAGI- has time and space complexity linear to the size of the input, and can efficiently retrieve instances of the monitored activities.