Share Email Print

Proceedings Paper

Deducing behaviors from primitive movement attributes
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The research reported here anticipates the future of smart buildings by developing algorithms that categorize the movements of individuals based on such characteristics as motion vectors, velocity vectors, head orientation vectors and predetermined positions. The intended applications include detecting intrusions, helping lost visitors, and changing the artwork on virtual posters to reflect an individual's presumed interests. The vectors we capture represent trajectories in a multi-dimensional space. To make sense out of these, we first segment a trajectory into sub-trajectories, typically based on time. To describe each sub-trajectory, we use primitive patterns of body movement and additional information, e.g., average speed during this interval, head movement and place or object nearby. That is, for each sub-trajectory, we use a tuple of the following form: (interval_ID, body_movement, avg_speed, head_movement, places_passed). Since trajectories may have many outliers introduced by sensor failures or uneven human movement, we have developed a neural network-based pattern extraction subsystem that can handle intervals with noisy data. The choice of these attributes and our current classification of behaviors do not imply that these are the only or best ways to categorize behaviors. However, we do not see that as the focus of the research reported here. Rather, our goal is to show that the use of primitive attributes (low level), neural networks to identify categories of recognizable simple behaviors (middle level) and a regular expression-based means of describing intent (high level) is sufficient to provide a means to convert observable low-level attributes into the recognition of potential intents.

Paper Details

Date Published: 28 March 2005
PDF: 10 pages
Proc. SPIE 5812, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (28 March 2005); doi: 10.1117/12.604149
Show Author Affiliations
Danzhou Liu, Univ. of Central Florida (United States)
Charles E. Hughes, Univ. of Central Florida (United States)

Published in SPIE Proceedings Vol. 5812:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005
Belur V. Dasarathy, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?