›› 2011, Vol. 26 ›› Issue (2): 239-246.doi: 10.1007/s11390-011-1126-7

• Artificial Intelligence • Previous Articles     Next Articles

Activity Recognition Based on RFID Object Usage for Smart Mobile Devices

Jaeyoung Yang1, Joonwhan Lee2, and Joongmin Choi3   

  1. 1. Human-Computer Interaction Institute, Carnegie Mellon University, Pittsburgh, U.S.A.;
    2. Neowiz Internet Inc., Seoul, Korea;
    3. Department of Computer Science and Engineering, Hanyang University, Ansan, Gyeonggi-Do, 426-791, Korea
  • Received:2010-07-12 Revised:2011-01-31 Online:2011-03-05 Published:2011-03-05
  • About author:Jaeyoung Yang received his B.S., M.S., and Ph.D. degrees in computer science and engineering from Hanyang University, Korea, in 1998, 2000, and 2003 respectively. He is a postdoctoral researcher in Human-Computer Interaction Institute, Carnegie Mellon University, USA. He is also a researcher of Web Intelligent Consortium Korea Center. His research interests include intelligent agents, machine learning, context-awareness, ubiquitous computing, and text mining.
    Joonwhan Lee is the director of Service Develop Division of Neowiz Internet Inc., Seoul, Korea. He received his B.F.A. degree from Seoul National University, Korea, in 1995 and M.Des. degree from Carnegie Mellon University, USA in 2000. And then he received his Ph.D. degree in human-computer interaction from the School of Computer Science in the Carnegie Mellon University in 2008. His research interest focuses on human-computer interaction, interaction design, situationally appropriate user interaction, user interface of pervasive computing, adaptive user interface, and visualization.
    Joongmin Choi is a professor in the Department of Computer Science and Engineering, Hanyang University, Ansan, Korea. He is the director of Intelligent Systems Research Lab. He is also the director of Web Intelligent Consortium (WIC) Korea Center. He received his B.S. and M.S. degrees in computer engineering from Seoul National University, Korea, in 1984 and 1986, respectively, and the Ph.D. degree in computer science from the State University of New York at Buffalo, USA in 1993. His research interest focuses on Web intelligence, which is a somewhat broad concept covering the areas of Web information extraction, Web data mining, semantic Web and ontologies, and other intelligent techniques for manipulating Web information. His other interest areas include intelligent agents, artificial intelligence, and contextaware personalization.
  • Supported by:

    This work was supported by the Korea Research Foundation under Grant No. KRF-2008-357-D00221.

Activity recognition is a core aspect of ubiquitous computing applications. In order to deploy activity recognition systems in the real world, we need simple sensing systems with lightweight computational modules to accurately analyze sensed data. In this paper, we propose a simple method to recognize human activities using simple object information involved in activities. We apply activity theory for representing complex human activities and propose a penalized naive Bayes classifier for performing activity recognition. Our results show that our method reduces computation up to an order of magnitude in both learning and inference without penalizing accuracy, when compared to hidden Markov models and conditional random fields.

[1] Abe M, Morinishi Y, Maeda A, Aoki M, Inagaki J. A life log collector integrated with a remote-controller for enabling user centric services. IEEE Trans. Consumer Electronics, 2009, 55(2): 295-302.

[2] Baek S, Choi E, Huh J, Park K. Sensor information management mechanism for context-aware service in ubiquitous home. IEEE Trans. Consumer Electronics, 2007, 53(4): 1393-1400.

[3] Kim J, Jeong D, Baik D. Ontology-based semantic recommendation system in home network environment. IEEE Trans. Consumer Electronics, 2009, 55(3): 1178-1184.

[4] Lee H, Lim S, Kim J. UMONS: Ubiquitous monitoring system in smart space. IEEE Trans. Consumer Electronics, 2009, 55(3): 1056-1064.

[5] Patterson D J, Fox D, Kautz H A. Inferring high-level behavior from low-level sensors. In Proc. the 5th Int. Conf. Ubiquitous Computing, Seattle, USA, Oct. 12-15, 2003, pp.73-89.

[6] Tapia E M, Intilli S S, Larson K. Activity recognition in the home using simple and ubiquitous sensors. In Proc. Pervasive Computing, Vienna, Austria, April 18-23, 2004, pp.158-175.

[7] Duong T V, Bui H H, Phung D Q, Venkatesh S. Activity recognition abnormality detection with the switching hidden semi-Markov model. In Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition, San Diego, USA, Jun. 20-26, 2005, pp.838-845.

[8] Lao W, Han J, de With P H N. Automative video-based human motion analysis for consumer surveillance system. IEEE Trans. Consumer Electronics, 2009, 55(2): 591-598.

[9] Lester J, Choudhury T, Kern N, Borriello G, Hannaford B. A hybrid discriminative/generative approach for modeling human activities. In Proc. Int. Joint Conf. Artificial Intelligence, Edinberg, UK, Jul. 30-Aug. 5, 2005, pp.766-772.

[10] Kasteren T V, Noulas A, Englebienne G, Krose B. Accurate activity recognition in a home setting. In Proc. the 10th Int. Conf. Ubiquitous Computing, Tokyo, Japan, Sept. 11-14, 2008, pp.1-8.

[11] Patterson D J, Fox D, Kautz H A, Philipose M. Fine-grained activity recognition by aggregating abstract object usage. In Proc. the 9th IEEE Int. Symp. Wearable Computer, Osaka, Japan, Oct. 18-21, 2005, pp.44-51.

[12] Lio L, Fox D, Kautz H. Extracting places and activities from GPS traces using hierarchical conditional random fields. Int. J. Robotics Research, 2007, 26(1): 119-134.

[13] Landwehr N, Gutmann B, Thon I, Philipose M, Raedt L D. Relational transformation-based tagging for human activity recognition. In Proc. the 6th Int. Workshop on MultiRelational Data Mining, Warsaw, Poland, Sept. 17, 2007, pp.81-92.

[14] Fogarty J, Au C, Hudson S E. Sensing from the basement: A feasibility study of unobtrusive and low-cost home activity recognition. In Proc. the 19th ACM Symp. User Interface Software and Technology, Montreux, Switzerland, Oct. 15-18, 2006, pp.91-100.

[15] Modayil J, Bai T, Kautz H. Improving the recognition of interleaved activities. In Proc. the 10th Int. Conf. Ubiquitous Computing, Seoul, Korea, Sept. 21-24, 2008, pp.40-43.

[16] Nardi B A. Context and Consciousness: Activity Theory and Human-Computer Interaction. MIT Press, 1996.

[17] Rabiner L R. A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE, 1989, 77(2): 257-286.

[18] Mitchell T. Machine Learning. McGraw Hill, 1997.

[19] Sutton C, McCallum A. Introduction to Statistical Relational Learning. MIT Press, 2006, pp.93-128.

[20] Wu J, Osuntogun A, Choudhury T, Philipose M, Rehg J M. A scalable approach to activity recognition based on object use. In Proc. the 11th IEEE Int. Conf. Computer Vision, Rio de Janeiro, Brazil, Oct. 14-20, 2007, pp.1-8.
No related articles found!
Full text



[1] Shen Li;. Testability Analysis at Switch Level for CMOS Circuits[J]. , 1990, 5(2): 197 -202 .
[2] Han Jianchao; Shi Zhongzhi;. Formalizing Default Reasoning[J]. , 1990, 5(4): 374 -378 .
[3] Huang Zhiyi; Hu Shouren;. Detection of And-Parallelism in Logic Programs[J]. , 1990, 5(4): 379 -387 .
[4] Su Bogong; Wang Jian; Xia Jinshi;. TST——An Algorithm for Global Microcode Compaction with Timing Constraints[J]. , 1991, 6(1): 97 -107 .
[5] Sui Yuefei;. The Polynomially Exponential Time Restrained Analytical Hierarchy[J]. , 1991, 6(3): 282 -284 .
[6] Ma Xiaohu; Pan Zhigeng; Zhang Fuyan;. The Automatic Generation of Chinese Outline Font Based on Stroke Extraction[J]. , 1995, 10(1): 42 -52 .
[7] Li Hongzhou; Li Guanying;. Nonuniform Lowness and Strong Nonuniform Lowness[J]. , 1995, 10(3): 253 -258 .
[8] Gao Qingshi; Liu Zhiyong;. K-Dimensional Optimal Parallel Algorithm for the Solution of a General Class of Recurrence Equations[J]. , 1995, 10(5): 417 -424 .
[9] Min Youli; Min Yinghua;. A Fault-Tolerant and Heuristic Routing Algorithm for Faulty Hypercubes[J]. , 1995, 10(6): 536 -544 .
[10] Zong Chengqing; Chen Zhaoxiong; Huang Heyan;. Parsing with Dynamic Rule Selection[J]. , 1997, 12(1): 90 -96 .

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved