# Distributed abnormal activity detection in smart environments.

1. IntroductionUser activity detection is one of the key applications in smart environments. As detecting users' normal activities is interesting and important, it has attracted attention of a lot of researchers. Activity recognition is based on learning and analyzing the patterns of activities extracted from occupants' regular activities. The abnormal activity detection also has great significance in building pervasive and smart environments applications. Due to the importance of using it to monitor signature or suspicious activities, the abnormal activity detection can be applied to various application domains ranging from the smart home for healthcare to the intelligent building for security, as mentioned later in details.

Medical professionals believe that one of the best ways to detect an emerging medical condition before it becomes critical is to look for the changes in the activities of daily living (ADLs), that is, to detect the abnormal activities in daily life. For example, in elderly care assisted living, a healthy old person in home has a regular routine, with almost regular activity trajectories patterns. But once he or she feels physical discomfort or physical state declining, the abnormality of the activity trajectory or the routine (e.g., more or fewer trips to the bathroom) will be detected. Moreover, whether the activity is normal can be more efficiently reflected by the combination of trajectory and duration. For instance, in the elderly care, a person staying at a location for a longer duration than usual might indicate the onset of illness and need to alert a family member or formal care provider.

Intelligent building, especially in high-security areas, such as military region, warehouse, and office building, will enhance security and provide proactive service by allowing the environment to detect abnormal activities [1]. When coming into a strange place, due to being unfamiliar with the location of room, furniture, or lamp switches, the stranger will spend longer time than the familiar to find the right way, and the trajectory is messier. Hence, it is feasible to identify such suspicious activities and send an alarm for immediate attention.

For the data collection equipment, there are two kinds of approaches to detect abnormal activity: video-based and sensor-based.

Video-based approaches mainly adopt image processing technologies. However, these approaches have the following serious limitations:

(i) costing much but only covering a small area [2];

(ii) violation of user privacy;

(iii) only identifying the type of activity with short duration and small scope.

Sensor-based smart environment, which is an emerging research field, can well overcome the above mentioned shortcomings [3,4]. Studies in the literature have gotten some achievements, but they occasionally adopt centralized data processing and only process simple trajectory data. So many of them have the following disadvantages:

(i) focusing on sequence information of activity and ignoring the importance of temporal information;

(ii) using centralized approach, consuming large bandwidth, and long response time;

(iii) disregarding the activity variation.

Our motivation in this paper is to solve two main challenges. (1) In activity detection, what kind of activities that should be defined as abnormal is subjective. Therefore, it is necessary to find a series of quantitative metrics for different applications (e.g., healthcare, security etc.) to effectively define abnormal activity. (2) The large bandwidth and long response time of the centralized approach are inadequate for real-time detection.

So in this paper we design a new approach DetectingAct to deal with them. (1) A more accurate distinguishing feature, which introduces other relevant information in addition to sequence such as temporal information, is discovered to detect abnormality. (2) A distributed mechanism is proposed, including (i) storing these compressed patterns in each related sensor with the distributed storage mechanism (duration-dependent frequent pattern mining algorithm) and (ii) deciding whether the present activity is normal is based on the distributed detection mechanism (distributed abnormal activity detection algorithm). The main contributions of this paper are as follows. (i)

(i) Considering the variation of activity, duration is introduced into our model, which reveals not only the trajectory abnormality, but also the duration abnormality caused by unpredictable interference.

(ii) DetectingAct, a novel distributed abnormal activity detection algorithm, is proposed to store the learned parameters using mining-training into each sensor and to detect abnormal activity real-timely based on sensor node's limited resource.

(iii) Simulation and real data based experiments are conducted to verify that our approach can efficiently detect abnormal activity in smart environments.

The rest of the paper is organized as follows: in Section 2, related works in the literature are thoroughly overviewed. The activity model is presented in Section 3. DetectingAct is presented in Section 4, followed by a series of simulations and experimental studies in Section 5. Finally, conclusion is made in Section 6.

2. Related Work

Lots of efforts have been made in the literature for detecting abnormal activity. According to the equipment used in various approaches, they can be typically grouped into two types: video-based and sensor-based.

Video-based approaches mainly use 2D cameras to collect data and adopt image processing technologies to analyze the data. In these approaches, users wear no sensors. These techniques are well proven and mature. Zhong et al. [5] proposed an unsupervised approach for unusual activity detection in a large video set using simple features. Stauffer and Grimson [6] presented a real-time approximate method for learning patterns of activity. The experiments show that this method is stable and robust, and this system is successfully implemented in indoor environments and in some outdoor environments. Recently, 3D cameras have been introduced in video-based approaches. Liu [7] proposes an activity recognition using 2D and 3D depth cameras. However, video-based approaches intrude on privacy issues and video equipment also costs too much. Sensor-based activity detection has attracted much attention and most of the works have focused on centralized data processing. Tapia et al. [3] proposed a system for recognizing activities in the home environment. The experiments prove that activities can be recognized using a lot of small and simple state-change sensors. Wren and Tapia [1] presented a model that uses simple motion sensors to recognize activities. In abnormal activity detection research, Yin et al. [8] proposed a two-step approach for abnormal activity detection based on attached sensors. The authors have first built a one-class support vector machine (SVM) to filter out most normal activities, and then they derive abnormal activity models through kernel nonlinear regression (KNLR).

However, according to [9, 10], due to the network lag of centralized methods possibly resulting in detecting errors, they cannot meet the real-time demand. Hence, other researches have used distributed methods [11] trying to alleviate the drawbacks in centralized methods. Hasan et al. [2] presented a distributed probabilistic model for activity recognition of daily life and experiments show that with enough labeled data, this model recognizes the activities successfully. Amft et al. [12] proposed a distributed model for online recognition of user activities. The authors have used a two-layer model based on the concept that activity sequences are composed of activity events, and activity events are composed of atomic activities. But [2,12] define activity merely by the trigger sequence of sensors. Lee and Mao [13] present an anomaly detection mechanism based on correlation graphs of sensor network for identifying abnormal home events. Most of the mechanism merely works well in specified abnormal event detection because of only trajectory being taken into account, while the duration was ignored.

As far as we know, there is no similar research on the abnormal activity detection by feature-based statistics and unsupervised method which is significantly different from the traditionally used method (detecting the abnormality by recognizing the activity first). Hence, in this paper we have proposed the overall research on the distributed abnormal activity detection system, including definition of activity model, detection mechanism, detection algorithm, and verification method.

3. Activity Model and Activity Variation

In this section, we describe the details of our proposed activity model and the concept of activity variation. Figure 1 depicts the structure and sensor layout of a realistic smart home test bed, where an old man lives alone for the help of health and security monitoring.

3.1. Activity Model. Now we define the terminologies used in this work. Let M = {[s.sub.1], [s.sub.2], [S.sub.j],..., [s.sub.N]} be the set of all the motion sensor nodes, which are installed across the smart environment space. N is the number of sensor nodes. The location of node [s.sub.j] is used to represent the user's position when his movement is detected by [s.sub.j]. We know that nearly all people walk with a nonuniform velocity. So the periods of these sensors being activated during the activity are varied and are much longer than the specified sampling time segment. Thus in our model, the activity is made up of basic activities which are composed of atomic activities.

An atomic activity [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] represents the trigger of one sensor node [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] in the smart environment, where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is the triggered time of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] in ith sampling period and 0 < i < [N.sub.s] where Ns is the number of sampling period when a person passes by [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

A basic activity [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] indicates that basic activity is composed of a number ([MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]) of consecutive atomic activities that have the same sensor ID [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], which simply means [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], where duration time [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII].

An Activity [A.sub.m] consists of a unique sequence of basic activities; thus, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is the length of the trajectory.

The trajectory set [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], which represents the trajectory, and the duration set [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], which represents the staying time at the corresponding sensors, can be extracted from [A.sub.m].

In this paper, sensors have been divided into FUNCTIONAL sensors and REGULAR sensors according to the deployment location for data segment. In order to mine more valuable knowledge from sensors triggering history data, a complete trajectory set [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] should satisfy [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] are FUNCTIONAL sensors which have a similar purpose with bNode and eNode in [14] (valid trajectory must begin with bNode (signed-come) and end with eNode (signed-leave)). Taking [A.sub.3] in Figure 1 as an illustrating

example, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] = and [s.sub.21] are both FUNCTIONAL sensor; thus, [??] is a complete trajectory set. The purpose of our work is to detect whether an activity is normal or not, so the normal activity should be defined first.

Definition 1. When the frequency of an activity [A.sub.m] appearing in the collected data, which we defined as [f.sub.m], exceeds a specific threshold, the activity [A.sub.m] is considered as normal activity.

In trajectory-based activity recognition, the temporal relationship is merely the foundation of sequence determination [12], and this could lead to errors of activity recognition. Taking activity [A.sub.1] and activity [A.sub.3] as an example, the activity [A.sub.1] in dashed lines has the same trajectory with the activity [A.sub.3] in curves, but there is a significant difference in the duration of [s.sup.18]. In trajectory-based recognition, [A.sub.1] and [A.sub.3] will be considered equal, but they are possibly different activities because of the difference in duration. Hence, duration-dependent activity model is needed.

Fuzzy Logic [15] is adopted to measure the duration time [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. In contrary to traditional logic, fuzzy logic substitutes the truth value that ranges between completely true and completely false for binary value. Fuzzy inference system (FIs) [16] consists of

(i) Membership Function. We choose trapezoidal function as membership function to reduce the computational complexity [17]. The relevant parameters are set according to the classification of duration.

(ii) Rule Base. The duration [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] is divided into three levels: short, medium, and long; thus, the goal of FIS is to calculate probabilities of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] being short [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], middle [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], and long [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. As a result, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] can be redefined as [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. In this paper, the rule base is that short duration ranges from 0 to [[??].sub.2], medium duration ranges from [[??].sub.1] to [[??].sub.4], and long duration starts from [[??].sub.3], where [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (as shown in Figure 2). Each [s.sub.i] stores [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and d-[rule.sup.i] is set according to the location and monitoring area of [s.sub.i].

(iii) Defuzzifier. The mean of maximum method is the most suitable for our approach.

Take activity [A.sub.1] from Figure 1 as an example and we set [[??].sub.1] = 10, [[??].sub.2] = 15, [[??].sub.3] = 30, [[??].sub.4] = 40. After introducing the fuzzy logic, term (s10,20) can be represented as (s20, (0,1,0)).

3.2. Activity Variation

Activity Variation. It is a common sense that the same pattern of activities may not be repeated exactly the same. So some small differences between these same activities are shown in spatiotemporal information of data set. According to the definition of activity model, the activity variation which contains trajectory variation and duration variation is introduced to measure these tiny differences.

(i) Trajectory Variation. Take [A.sub.1] and [A.sub.2] in Figure 1 as an example that [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], but [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; actually, they represent the same activity. This shows that some tiny differences are in trajectories which represent the same activity. Hence, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] cannot be defined by only one specified trajectory data set and the trajectory variation, which is measured by T-deviation, is introduced to describe these tiny differences in trajectories. Then, the variation between two trajectories, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], is computed using

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (1)

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] represents the count of item [s.sub.i] that [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] expresses the difference in length between [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] sequence ([MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]) calculates the difference in sequence between [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], and the details are shown in Algorithm 1.

(ii) Duration Variation. As mentioned above, [A.sub.1] and [A.sub.3] in Figure 1 are not the same activity due to the significant difference of duration in s18. Although another [A.sub.x] = {([s.sub.18], 11), ([s.sub.19], 15), ([s.sub.10], 25), ([s.sub.21], 13)} is not exactly the same with [A.sub.1], the difference between the duration of them is slim. In fact [A.sub.1] and [A.sub.x] are the same activity, so some tiny difference of duration between the two same activities is reasonable. Thus, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] cannot be defined by only one specified duration data set, and the duration variation, which is measured by D_deviation, is introduced to describe these tiny differences in durations. Then, the variation between two activities' durations, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], is calculated using Algorithm 2 where q is the duration threshold.

Based on (1) and Algorithm 2, A_unsimilarity in (2) is introduced to measure activity variation. The variation threshold y is defined to measure the similarity, and if A_similarity [less than or equal to] [gamma], [A.sub.n] is considered similar to [A.sub.m]. Consider

ALGORITHM 1: Sequence(). Input: [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]: trajectory set Output: S-count: the difference in sequence between [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (1) extract the subset [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] in which the items correspond to the items in [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (2) G_count = 0; (3) for i [left arrow] 1 to size of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] do (4) if [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] [i] then (5) G_Count + 1; (6) end if (7) end for (8) return G_count; ALGORITHM 2: d_deviation; Input: [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] Output: D_deviation: the difference in duration between [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. (1) extract the subset sub-DA Q DA and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] in which the items correspond to the items in [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (2) D_deviation = 0; (3) for i [left arrow] 1 to size of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] do (4) get [P.sub.S_n], [P.sub.M_n], [P.sub.L-n] from [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [P.sub.S_m], [P.sub.M_m], [P.sub.L_m] from [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (5) if [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] then (6) D_deviation + 1; (7) end if (8) end for (9) return D_deviation;

[MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (2)

Definition 2. Abnormal activity is defined as the one which has a great deviation in the data against normal activities. According to the proposed (2), abnormal activity can be calculated as follows: for an activity [A.sub.m], if there is not any known normal activity patterns [A.sub.m] which makes their A_unsimilarity [less than or equal to] [gamma], [A.sub.m] could be judged as abnormal activity.

If hash function is employed [18], then the time complexity of (2) can be o(n) and the limitations of space prevent us from covering hash function in this paper.

4. DetectingAct

The process of DetectingAct is as follows. Firstly, it extracts the normal activity patterns from the original data and introduces compression algorithms to reduce the number of mined patterns of activity. Secondly, it stores the mined patterns in each node according to the storage mechanism. Thirdly, it detects the abnormal activity using the distributed detecting algorithm.

4.1. Frequent Pattern Mining, Compression, and Storage. In order to detect the abnormal activity, it is necessary to mine normal activity patterns from the sensor data. Currently, most of the learning algorithms for sensor data are supervised which requires large amounts of labeled data, so the unsupervised learning algorithm can save labor and accelerate the learning speed [19]. Based on the Definition 1, it is feasible to use frequent pattern mining technique [19] to mine normal activity patterns. By the frequent pattern mining technique [19], if the frequency of an itemset, which is an activity in this paper, exceeds the minimum support threshold A, it is a normal activity. Each path from root node to leaf node represents a pattern [A.sub.i], and the minimum support count in the path is the frequency [f.sub.i] of the pattern.

FP-Tree. Frequent-pattern Tree, or FP-Tree in short, is an extended prefix-tree structure storing crucial, quantitative information about frequent patterns [17]. According to the definition of activity model, the FP-Tree for trajectory-based mining cannot meet the requirement in this paper; thus, duration-dependent FP-Tree is proposed. Taking [A.sub.1] and [A.sub.3] in Figure 1 as an example, due to the same sequences of triggered sensors, trajectory-based FP-Tree cannot distinguish the difference between [A.sub.1] and [A.sub.3]. However, in our duration-dependent FP-Tree, if we set [eta] < 1, [A.sub.1] and [A.sub.3] can be detected as different activities. Figure 3 shows the difference between these two FP-Tree patterns.

Before introducing the mining algorithm duration-dependent frequent pattern mining algorithm (DFPMA), related variables are defined in Table 1. The mining algorithm is shown in Algorithm 3.

Here we explain the insert_tree function in Line 3 and Line 5. The function insert_tree(([s.sub.i], [d.sub.i]), ([s.sub.j], [d.sub.j])) is to insert the node ([s.sub.i], [d.sub.i]) into fp-tree as the child node of ([s.sub.j], [d.sub.j]), and insert_tree([s.sub.i], [d.sub.i]) is to insert the node ([s.sub.i], [d.sub.i]) into fp-tree as the child node of root node. If there exists the node ([s.sub.k], [d.sub.k]), which is the child node of ([s.sub.j], [d.sub.j]), or the root node that [absolute value of [d.sub.k] - [d.sub.i]] [less than or equal to] [eta] (calculation method is explained in Algorithm 2) and [s.sub.k] = [s.sub.i], then the support count of ([s.sub.k], [d.sub.k]) is incremented by 1. If not, the node ([s.sub.i], [d.sub.i]) will be inserted into fp-tree as the new child node of root node or ([s.sub.j], [d.sub.j]).

Considering the limited storage of sensors, it is necessary to compress mined frequent patterns. Thus, normal patterns compression algorithm (NPCA) is introduced. It is shown in Algorithm 4 and related parameters are defined in Table 2.

In order to detect abnormality distributedly, normal activity patterns need to be stored in each sensor. Distributed knowledge storage mechanism (DKSM) is introduced to store the knowledge distributedly. DKSM consists of sensor ID [s.sub.i], sensor type [type.sub.i], and an activity table D-activity-table. The D-activity-table of sensor 16 in Figure 1 is shown in Table 3.

Field previous sensor stores the sensor IDs before triggering [s.sub.16] in normal patterns. Previous duration probability stores the probability of duration corresponding with previous sensor and own duration probability stores the probability of duration corresponding with s16. According to the proposed storage mechanism, mined activity patterns are stored in each relevant room sensor separately.

4.2. Distributed Abnormal Activity Detection. Communication protocol and detection algorithm are necessary to detect the activity. This paper designs the abnormal activity detection protocol (AADP) to transmit the activity data among the sensors.

ALGORITHM 3: DFPMA. Input: [s.sub.i], [d.sub.i], [s.sub.j], [d.sub.j], [type.sub.j], [type.sub.j] Output: o_n_act_patterns, [f.sub.p]-tree (1) while there exists items after ([s.sub.i], [d.sub.i]) do (2) if [type.sub.j] = REGULAR then insert-tree (([s.sub.i], [d.sub.i]), ([s.sub.j], [d.sub.j])); (4) else if [type.sub.i] = REGULAR then (5) insert_tree([s.sub.j], [d.sub.j]); (6) insert_tree(([s.sub.i], [d.sub.i]), ([s.sub.j], [d.sub.j])); (7) else (8) insert_tree([s.sub.j], [d.sub.j]); (9) insert_tree(([s.sub.i], [d.sub.i]), ([s.sub.j], [d.sub.j])); (10) end if ([s.sub.j], [d.sub.j]) = ([s.sub.i], [d.sub.i]); assigns the next item in database to ([s.sub.i], [d.sub.i]); (11) end while (12) if ([s.sub.i], [d.sub.i]) is the last item of dataset then (13) for each activity [A.sub.p] in fp-tree do (14) if [f.sub.p] [greater than or equal to] [lambda] then (15) add [A.sub.p] into o_n_act_patterns; (16) end if (17) end for (18) end if (19) return o_n_act_patterns and [f.sub.p]-tree;

4.2.1. Abnormal Activity Detection Protocol. Figure 4 illustrates how AADP works. State-change message is designed for AADP to record the present activity and it is composed of the previous triggered sensor set [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and corresponding duration probability [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]. Assuming that one user follows the activity [A.sub.1] in Figure 1 and when the sensor 19 is triggered, it first executes the detection algorithm, which takes advantage of the knowledge in the sensor and the data in state-change message, to decide whether the current activity is normal (Step 1 in Figure 4). Then, sensor 19 updates the state-change message and broadcasts it to the neighboring sensors (Step 2 in Figure 4). When the next sensor, sensor 10, is triggered, it can restructure the present activity through the state-change message received from sensor 19 and compare it with D_activity_table. Finally, the activity will be labeled by each sensor it passes, and if any sensor marks it abnormal, then the activity will be considered abnormal.

4.2.2. Distributed Abnormal Activity Detection Algorithm. According to Definition 2, distributed abnormal activity detection algorithm (DAADA) is proposed and the related parameters are defined in Table 4. The detection algorithm is shown in Algorithm 5, and the time complexity of the algorithms is o(n2).

5. Experiments

To prove the feasibility and to estimate the accuracy of DetectingAct, the simulation experiment and the real experiment are conducted.

5.1. Simulation Experiment. As a simulation example with ground truth, we adopt smart environment simulator tool [14] to simulate the motion sensor-based smart environment and manually set the knowledge instead of real environment training.

(i) Sensor. We set up a total of 35 sensors in the simulation environment which is shown in Figure 5.

(ii) Trajectory. 10 normal trajectories whose average length is 12 and that reflect the typical situation when user lives in the simulation environment are designed.

(iii) Duration. According to sensor [s.sub.i]'s location and basic features, 3 kinds of d_rule are designed to be applied to corresponding sensors: (1) {2s, 4s, 6s, 8s} for the sensor used for detecting passing by such as sensor in hallway; (2) {1m, 3m, 9m, 11m} for the sensor in the area where people may stay a few minutes such as washroom; and (3) [0.5h, 2h, 7h, 8h} for the sensor in the area where people will stay a longer time such as sensor in bed or sofa. Meanwhile, their corresponding d_activity_[table.sup.i] and the duration of staying d_[s.sup.i] (simulating some activities which without moving such as reading) are set in suitable values by manual.

After these settings, the simulation detection system corresponds to a real system which has completed the operation of the DFPMA, the NPCA, and the DKSM.

Detecting. Tr_[prb.sup.i] = {p_[r.sup.i], p_[1.sup.i], p_[u.sup.i], p_[d.sup.i]}, the transition probabilities of each sensor, is set to compute the possibility of which neighbor node will be triggered next. Taking the system in Figure 5 as an illustrating example, if any user will trigger [s.sub.28], he must trigger one of {[s.sub.27], [s.sub.23], [s.sub.26], [s.sub.24]} according to transition [s.sub.28] [right arrow] [s.sub.27], [s.sub.28] [right arrow] [s.sub.23], [s.sub.28] [right arrow] [s.sub.26], [s.sub.28] [right arrow] [s.sub.24]. If we set Tr_[prb.sup.i] = [0.3, 0.2, 0.4, 0.1}, then he is most likely to choose the trajectory [s.sub.28] [right arrow] [s.sub.26] but it is also possible to do the other three trajectories. We let the user randomly select trajectory from the 10 designed trajectories, and without strictly following the original design, in other words, depending on Tr-[prb.sup.i], user can change the given route. So after repeating for 85 times, 85 trajectories are generated and only 3 of them are exactly the same as the designed, the rest are more or less different. By our algorithm, 64 abnormal trajectories are detected, and trajectory-based method [20] labels 81 abnormalities, but in fact only 63 real abnormalities are generated (as we motioned above different trajectories may represent the same activity). The result is shown in Table 5 and Figure 6(a).

ALGORITHM 4: NPCA. Input: o_n_act_patterns, y, t_act_patterns Output: c_n-act"patterns: the compressed original normal_act_patterns (1) sort t-act-patterns in descending sequence of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] represents the count of activities in [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (2) while size of t_act_patterns [not equal to] 0 do (3) get the first activity pattern [A.sub.i] in t_act_patterns; (4) for each activity pattern [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] do (5) delete [A.sub.j] in o_n_act-patterns and t_act-patterns; (6) for each activity pattern [A.sub.m] in t_act_patterns do (7) delete [A.sub.j] in [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (8) end for (9) end for (10) delete [A.sub.i] in t-act-patterns, (11) sort t-act-patterns in descending sequence of [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII], (12) end while; c_n-act-patterns = ojr-act-patterns, (13) return C-n-act-patterns, ALGORITHM 5: DAADA. Input: [s.sub.c], [d.sub.c], D_activity_table, [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] (1) Min = 1; (2) add [s.sub.c] into [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (3) add [d.sub.c] into [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (4) restructure [A.sub.p] with [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] and [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII]; (5) for i [left arrow] 1 to size of D-activity-table do (6) if un-similarity([A.sub.i], [A.sub.p]) < Min then (7) Min = un-similarity([A.sub.c], [A.sub.p]); (8) end if (9) end for (10) if Min > [gamma] then (11) label [A.sub.p] abnormal; (12) end if

Taking duration into consideration, there are two important indexes in the simulation experiment. First, the average-speed is denoted by [u.sup.i], where i is the identification of SensorID (in theory the average-speed is a concept corresponding with every connected node-pair, but in the simulator tool we should set various speeds in each sensor to control the average-speed). Second, the variance-speed is denoted by [[sigma].sup.i] indicating the variance of [u.sup.i]. In detecting, the user also randomly selects trajectory from the 10 designed and strictly follows it. Meanwhile, when he is passing by [s.sub.i], the [u.sup.i] is randomly chosen from 0.5 m/s to 1.4 m/s, [[sigma].sup.i] is randomly chosen from 0.13 m/s to 0.37 m/s, and the d-[s.sup.i] is modified manually. After repeating for 45 times, 45 trajectories are generated with ununiform durations. In fact, 32 abnormalities are generated. And 31 abnormal trajectories are detected by our algorithm; however, trajectory-based method [20] completely failed. The result is shown in Table 5 and Figure 6(b) Simulation experiment is designed to test the accuracy, real-time property, and stability of DetectingAct.

Accuracy. Experimental results under variation threshold [gamma] = 0.24 are as shown in Table 5. It illustrates the different capacity between DetectingAct and trajectory-based method [20] in discovering abnormality. Then, the statistical comparison chart of the two test results is given in Figures 6(a) and 6(b). The accuracy rate and precision of distributed detection have reached 96.2% and 94.3%; both are superior to the algorithm based on trajectory.

Real-Time Property. The parameter average detection distance (ADD) is designed to measure the real-time property, and ADD is calculated as follows:

ADD = [n.summation over (i=1)] [D.sub.leni]/[absolute value of ([A.sub.i])] (3)

[absolute value of [A.sub.i]] is the length of [A.sub.i] and [D.sub.leni] is the number of triggered sensors when making decision. Experimental results are as follows: the ADD of DetectingAct is 78.2% which is better than the centralized detection algorithm.

Stability. The increasing amount of data and artificially raising of variation threshold lead to the increasing of false rate ((FP+ FN)/ALL); in order to study the stability of DetectingAct, we take the variation threshold value as a variable, collecting a number of detected results within two-day test data. The results are as follows.

Figure 7 shows the following. (1) Under the same data environment, the larger y is, the higher the compression ratio and the false rate are. However, with appropriate thresholds selection, with appropriate thresholds selection is able to achieve a good balance between the compression ratio and the false rate. (2) The false rate is increasing as the amount of data increases, but the growth is limited and the false rate is acceptable. Thus, DetectingAct also keeps strong stability.

5.2. Real Experiment. In this section, a real experiment is conducted to prove the feasibility and to estimate the accuracy of DetectingAct.

5.2.1. The Feasibility of DetectingAct. The algorithm that each sensor will execute is DAADA (Algorithm 5). As the time complexity of the main statement in Line 7 of Algorithm 5 is o(n), the time complexity of the DAADA is o([n.sup.2]). The sensor nodes chosen for real experiment are TelosW due to its three advantages which are as follows.

(i) Using MSP430 with a considerable computing capacity as MCU (microcontroller), TelosW can meet the computational demands of DetectingAct.

(ii) Having the wake-on sensing capability, TelosW can construct a completely event-driven wake-on sensor network that remarkably reduces energy consumption.

(iii) Being equipped with an onboard energy meter TelosW can precisely measure in situ energy consumption making it possible to practically analyze energy-efficient protocols.

TelosW has the flash storage of 1 MB, which means that if the average length of stored pattern is 10, then 1024 * 1024(BYTE)/((2 + 4 + 4 + 4)(BYTE) * 10) = 7489 patterns can be stored in each sensor. So the storage of patterns is feasible. The sampling frequency is set sampled once every 0.1 seconds, and the continuous two or more triggers can be considered as the real triggers of nodes, which is to avoid generating dirty data because of signal interference. After using the TinyOS to execute the performance test on TelosW nodes, the experimental results are shown in Table 6.

5.2.2. Experimental Setup and Results. The test bed for validating our algorithms is a workplace located on the Chongqing University campus. The experiment allows participants to find the specified room within the workplace. A total of 12 student volunteers are invited to participate and divided into two groups. Members of group 1 are familiar with the environment, while members of group 2 are not. About 41 sensors evenly are arranged in the rooms and hallways of the building which is shown in Figure 8. The deployed sensor node is TelosW and the sample position of sensor node is represented in Figure 9. Two experiments are conducted to validate the effectivity of DetectingAct, and six tasks, which need participants to start from specific rooms and find other specific rooms in the workplace, are designed. For example, task 522-523 represents that the participant should start from NO.522 room and find NO.523 room. Furthermore, the specified room is randomly appointed in order to ensure the fairness of the results. In the first experiment, each participant in group 2 is invited to accomplish the assigned tasks. In the second experiment, participants of group 1 are asked to repeat the same tasks under a different experimental condition.

Training. Before the beginning of the experiment, the detection system is set up by using a real-world trajectory dataset which is generated by three weeks of normal daily life in the test bed of group 1. Based on the collected data and proposed DFPMA, 762 activity patterns are extracted. After that, the related knowledge is distributedly stored into each sensor node by utilizing NPCA and DKSM, and the details are shown in Table 7.

Familiarity and Unfamiliarity. In the first experiment, each participant must finish the six tasks alone without prompting or interference. Their trajectories with durations are tracked to implement the real-time abnormal activity detection by utilizing DAADA as shown in Algorithm 5. From Table 8, we can see that, in practice, the numbers of sensors that participants triggered in the same task mostly have significant difference; in other words, the unfamiliar participant (stranger) makes an uncommon trajectory which is different from the regular pattern; therefore, it can decide whether the activity is normal. Taking task 516-500 as an example, Figure 10(a) illustrates the detection process in details. The participant's trajectory is detected in real-time to match the approximate normal patterns. According to the first four triggered sensors, the present trajectory indicates a great possibility of pattern 2 stored in sensors. However, from 12.5 seconds it deflects from the previous possibility of pattern 2 and mismatches any normal patterns. So this activity is labeled as abnormal at the 5th sensor.

Normal versus Interfered Experimental Condition. In the second experiment, participants of group 1 are required to simulate abnormal situation. The real abnormal phenomena, such as illness and tumble, are difficult to simulate. Therefore, some disturbances, such as giving a call to a random participant during the task or arranging some publicity announcement column in the corridor, are added into the task to distract the participant's attention for simulating the approximate abnormal phenomenon. Due to employing distributed method instead of centralized computing which collects data and detects abnormality only after accomplishing the whole activity, our algorithm real-timely detects abnormality without waiting for the completion of activities, so that the performance of real-time is greatly enhanced by DetectingAct. Therefore, the interferences are randomly generated without too former or too later to avoid deliberate effect on the efficiency of detection. The result is shown in Table 9, which illuminates that the same tasks have the same number of triggered sensors whether the experimental condition is normal or interfered, but the durations are obviously different when the participant is interfered. Depending on the difference, the activities can be efficiently decided whether it is normal or abnormal by using DetectingAct. Taking task 523-507 as an example, Figure 10(b) shows the participant started from NO.523 room with transition [s.sub.32] [right arrow] [s.sub.30] [right arrow] [s.sub.27] [right arrow] [s.sub.41] [right arrow] [s.sub.19] [right arrow] [s.sub.18] [right arrow] [s.sub.15] [right arrow] [s.sub.14] [right arrow] [s.sub.11] [right arrow] [s.sub.20] [right arrow] [s.sub.17] [right arrow] [s.sub.16] [right arrow] [s.sub.13] [right arrow] [s.sub.12] [right arrow] [s.sub.10]. According to the consecutive sequence of trigged sensor and interfere, the present trajectory closely matched one of the normal patterns (pattern 2). However, when the participant is interfered after the 11th sensor, the trajectory keeps to be the same as before, but the duration significantly changed; then, this activity is labeled abnormal at the 12th sensor. Task504B-521 shows similar result.

From Figures 11(a) and 11(b), it can be seen that, in practice, experimental results demonstrate the effectiveness and suitability of our approach.

6. Conclusion

Based on the spatiotemporal information of data, this paper defines activity model and proposes DetectingAct which takes full advantage of computing and storage resources in each sensor node to detect abnormal activity. According to the definition of activity, we introduce the mining algorithm, the compression algorithm, and the storage mechanism to mine, compress, and store normal activity patterns. To detect abnormality distributedly, we apply the protocol AADP and the algorithm DAADA. The real experiment and the simulation experiments prove the feasibility and performance of DetectingAct.

http://dx.doi.org/10.1155/2014/283197

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

The works is supported by the National Natural Science Foundation of China under Grant No. 61004112 and the Fundamental Research Funds for the Central Universities No. CDJZR12180006.

References

[1] C. R. Wren and E. M. Tapia, "Toward scalable activity recognition for sensor networks," in Location- and Context-Awareness, vol. 3987 of Lecture Notes in Computer Science, pp. 168-185, Springer, Berlin, Germany, 2006.

[2] M. K. Hasan, H. A. Rubaiyeat, Y. K. Lee, and S. Lee, "Mapping of activity recognition as a distributed inference problem in sensor network," in Proceedings of the International Conference on Artificial Intelligence (ICAI '08) and Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA '08), H. R. Arabnia and Y. Mun, Eds., pp. 280-285, CSREA Press, Las Vegas, Nev, USA, July 2008.

[3] E. M. Tapia, S. S. Intille, and K. Larson, "Activity recognition in the home using simple and ubiquitous sensors," in Pervasive Computing, vol. 3001 of Lecture Notes in Computer Science, pp. 158-175, Springer, Berlin, Germany, 2004.

[4] A. M. J. Sarkar, K. Hasan, Y.-K. Lee, S. Lee, and S. M. S. Zabir, "Distributed activity recognition using key sensors," in Proceedings of the 11th International Conference on Advanced Communication Technology (ICACT '09), pp. 2245-2250, February 2009.

[5] H. Zhong, J. Shi, and M. Visontai, "Detecting unusual activity in video," in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR '04), pp. II-819-II-826, July 2004.

[6] C. Stauffer and W. E. L. Grimson, "Learning patterns of activity using real-time tracking," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 747-757, 2000.

[7] Z. Liu, "Human activity recognition with 2D and 3D cameras," in Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, L. Alvarez, M. Mejail, L. Gomez, and J. Jacobo, Eds., vol. 7441 of Lecture Notes in Computer Science, p. 37, Springer, Berlin, Germany, 2012.

[8] J. Yin, Q. Yang, and J. J. Pan, "Sensor-based abnormal human-activity detection," IEEE Transactions on Knowledge and Data Engineering, vol. 20, no. 8, pp. 1082-1090, 2008.

[9] F. Sivrikaya and B. Yener, "Time synchronization in sensor networks: a survey," IEEE Network, vol. 18, no. 4, pp. 45-50, 2004.

[10] Y. R. Faizulkhakov, "Time synchronization methods for wireless sensor networks: a survey," Programming and Computer Software, vol. 33, no. 4, pp. 214-226, 2007

[11] M. Marin-Perianu, C. Lombriser, O. Amft, P. J. M. Havinga, and G. Trister, "Distributedactivity recognition with fuzzy-enabled wireless sensornetworks," in Distributed Computing in Sensor Systems, vol. 5067 of Lecture Notes in Computer Science, pp. 296-313, Springer, Berlin, Germany, 2008.

[12] O. Amft, C. Lombriser, T. Stiefmeier, and G. Trister, "Recognition of user activity sequences using distributed event detection," in Smart Sensing and Context, G. Kortuem, J. Finney, R. Lea, and V. Sundramoorthy, Eds., vol. 4793 of Lecture Notes in Computer Science, pp. 126-141, Springer, Berlin, Germany, 2007.

[13] H.-M. Lee and C.-H. Mao, "Finding abnormal events in home sensor network environment using correlation graph," in Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC '09), pp. 1852-1856, San Antonio, Tex, USA, October 2009.

[14] C. Wang, D. De, and W. Z. Song, "Trajectory mining from anonymous binary motion sensors in smart environment," Knowledge-Based Systems, vol. 37, pp. 346-356, 2013.

[15] M. Ros, M. Delgado, A. Vila, H. Hagras, and A. Bilgin, "A fuzzy logic approach for learning daily human activities in an ambient intelligent environment," in Proceedings of the IEEE International Conference onFuzzy Systems (FUZZ-IEEE '12), pp. 1-8, June 2012.

[16] A. Provotar, A. Lapko, and A. Provotar, "Fuzzy inference systems and their applications," Cybernetics and Systems Analysis, vol. 49, no. 4, pp. 517-525, 2013.

[17] T Marchant, "A measurement-theoretic axiomatization of trapezoidal membership functions," IEEE Transactions on Fuzzy Systems, vol. 15, no. 2, pp. 238-242, 2007

[18] W. Xiahui, L. Jiandong, Z. Chen, and W. Yequan, "Hash function construction and analysis for wireless sensor network," in Proceedings of the 2nd International Conference on Computer Science and Network Technology (ICCSNT '12), pp. 921-924, Changchun, China, December 2012.

[19] J. Han, M. Kamber, and J. Pei, Data Mining: Concepts and Techniques, Morgan Kaufmann, San Francisco, Calif, USA, 3rd edition, 2011.

[20] B. Chikhaoui, S. Wang, and H. Pigot, "A frequent pattern mining approach for ADLS recognition in smart environments," in Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA '11), pp. 248-255, March 2011.

Chengliang Wang, (1,2) Qian Zheng, (1) Yayun Peng, (1) Debraj De, (3) and Wen-Zhan Song (3)

(1) College of Computer Science, Chongqing University, Chongqing 400044, China

(2) School of Industrial and Systems Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA

(3) Department of Computer Science, Georgia State University, Atlanta, GA 30303, USA

Correspondence should be addressed to Chengliang Wang; wangcl55@gmail.com

Received 11 March 2014; Accepted 27 March 2014; Published 5 May 2014

Academic Editor: Jason J. Jung

TABLE 1: Definitions of variables related to Algorithm 3. Variable Definition [eta] Duration threshold o_n_act_patterns It is used to store the original mined patterns [s.sub.i], [type.sub.i], [s.sub.i] is the current triggered sensor [d.sub.i] and [d.sub.i] is the corresponding duration probability. [type.sub.I] is the type of [s.sub.i] (FUNCTIONAL sensor or REGULAR sensor) [s.sub.j], [type.sub.j], [s.sub.j] is the last triggered sensor, [d.sub.j] [d.sub.j] is the corresponding duration probability, and [type.sub.j] is the corresponding type TABLE 2: Definitions of variables related to Algorithm 4. Variable Definition [gamma] Variation threshold [MATHEMATICAL EXPRESSION Stores the activities that are NOT REPRODUCIBLE IN ASCII] similar to [A.sub.i] t_act_patterns It is equal to [MATHEMATICAL EXPRESSION NOT REPRODUCIBLE IN ASCII] o_n_act_patterns and R is the number of activities that are stored in o-n_act-patterns c_n_act_patterns It is used to store the compressed patterns from the original TABLE 3: The D-activity-table of [s.sub.16]. Previous sensor Previous duration Own duration ([T.sub.j]) probability ([D.sub.j]) probability ([D.sub.o]) [S.sub.20] (1,0,0) (0.8,0.2,0) [S.sub.18], (1,0,0), (0,1,0), (0,1,0) (1,0,0) [S.sub.13], [S.sub.12] TABLE 4: Definitions of variables related to Algorithm 5. Variable Definition [s.sub.c], [s.sub.c] is the current sensor, [d.sub.c] [d.sub.c],[A.sub.c] is the duration probability of [s.sub.c], and [A.sub.c] is the current activity [MATHEMATICAL They are all extracted from the latest EXPRESSION NOT state-change message REPRODUCIBLE IN ASCII] TABLE 5: Ground truth versus discovered abnormalities. Correlation parameter Detection algorithm DetectingAct Trajectory-based Sample size 82 82 Trajectory abnormality 63 63 Discovered trajector 64 81 Abnormality Sample size 45 45 Duration abnormality 32 32 Discovered duration 31 Fail abnormality TABLE 6: Performance test. Pattern number Average execution time 5 76.6 ms 10 79.3 ms 15 85.2 ms 20 92.8 ms TABLE 7: The number of patterns stored in sensor. Sensor ID Pattern Sensor Pattern number ID Number [s.sub.1] 3 [s.sub.22] 13 [s.sub.2] 5 [s.sub.23] 15 [s.sub.3] 7 [s.sub.24] 17 [s.sub.4] 6 [s.sub.25] 11 [s.sub.5] 9 [s.sub.26] 12 [s.sub.6] 13 [s.sub.27] 14 [s.sub.7] 17 [s.sub.28] 8 [s.sub.8] 13 [s.sub.29] 11 [s.sub.9] 12 [s.sub.30] 4 [s.sub.10] 15 [s.sub.31] 15 [s.sub.11] 16 [s.sub.32] 6 [s.sub.12] 11 [s.sub.33] 13 [s.sub.13] 17 [s.sub.34] 11 [s.sub.14] 14 [s.sub.35] 10 [s.sub.15] 14 [s.sub.36] 9 [s.sub.16] 10 [s.sub.37] 6 [s.sub.17] 9 [s.sub.38] 7 [s.sub.18] 8 [s.sub.39] 4 [s.sub.19] 10 [s.sub.40] 5 [s.sub.20] 11 [s.sub.41] 6 [s.sub.21] 14 TABLE 8: The number of sensors triggered by familiar versus stranger. Task Familiar Stranger ADD 522-523 10 12 75% 523-507 13 15 80% 504B-521 10 11 81.8% 526-504B 4 5 60% 516-500 6 8 75% 516-532 7 9 66.7% Average ADD 73.1% TABLE 9: Duration and number of sensors triggered in normal versus interfered (Normal versus Interfered). Task Sensor Duration (s) Interference ADD number location 522-523 10 | 10 51.34 | 72.1 6 60% 523-507 13 | 13 82.43 | 92.78 9 69.2% 504B-521 10 | 10 56.94 | 69.08 8 80% 526-504B 4 | 4 13.21 | 21.92 3 75% 516-500 6 | 6 16.89 | 25.12 5 83.4% 516-532 7 | 7 23.14 | 34.31 4 57.5% Average ADD 70.8% FIGURE 6: The result of contrast test in simulation experiment. (a) Trajectory abnormal detection TP TN FP FN DetectingAct 20 62 1 2 Trajectory-based 3 62 1 19 (b) Duration abnormal detection TP TN FP FN DetectingAct 13 31 1 0 Trajectory-based 3 Fail 32 0 Note: Table made from bar graph. FIGURE 7:The result of contrast test with different [gamma]. 1 2 3 4 5 [gamma] = 0.24 0 0.03 0.04 0.06 0.04 [gamma] = 0.3 0 0.03 0.05 0.06 0.05 [gamma] = 0.4 0 0.05 0.07 0.1 0.1 Note: Table made from bar graph.

Printer friendly Cite/link Email Feedback | |

Title Annotation: | Research Article |
---|---|

Author: | Wang, Chengliang; Zheng, Qian; Peng, Yayun; De, Debraj; Song, Wen-Zhan |

Publication: | International Journal of Distributed Sensor Networks |

Article Type: | Case study |

Date: | Jan 1, 2014 |

Words: | 8269 |

Previous Article: | Phoneprotector: protecting user privacy on the android-based mobile platform. |

Next Article: | Voltage-aware time synchronization for wireless sensor networks. |

Topics: |