Breaking the Kubernetes Kill Chain: Host Path Mount
Where and How Activity Recognition Works
1.
2. WHERE WE NEED ACTIVITY RECOGNITION?
To provide contextually-relevant
information
Personal security
Assisting disabled and physically impaired
Lifestyle apps
3. WHAT CAN BE RECOGNIZED?
Group
Activities
Ambulation
Walking, running, sitting, standing
still, lying, climbing stairs,
descending stairs, riding escalator,
riding elevator.
Transportation
Riding a bus, cycling, and driving.
Phone usage
Text messaging, making a call.
Daily activities
Eating, drinking, working at the PC,
watching TV, reading, brushing
teeth, stretching, scrubbing,
vacuuming
Exercise/fitness
Rowing, lifting weights, spinning,
Nordic walking, doing push ups.
Military
Crawling, kneeling, situation
assessment, and opening a door.
Upper body
Chewing, speaking, swallowing,
sighing, moving the head.
4. HOW COMPUTERS CAN RECOGNIZE WHAT
HUMANS ARE DOING?
Activity
Recognition
Sensorbased
Single-user
Multi-user
Visionbased
Optical
Flow
WiFi-based
Kalman
filtering
Markov
Models
5. USING ACCELEROMETER WEARABLE SENSOR
Posture and Movement Classifier
Learning (supervised and semi-supervised)
Hidden-Markov model
Neural networks
Prediction models
http://eecs.wsu.edu/~cook/pubs/kdd10p3.pdfBayesNetbelongs to the family of probabilistic graphical modelsSequential Minimal Optimization (SMO, solving quadratic programming problem)LogistBost supervised learning algorithm