Context-Aware Smart Door Lock with Activity Recognition Using Hierarchical Hidden Markov Model
Corresponding Author(s) : Aji Gautama Putrada
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control,
Vol. 5, No. 1, February 2020
Abstract
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Covington, Michael J., et al. "A context-aware security architecture for emerging applications." 18th Annual Computer Security Applications Conference, 2002. Proceedings.. IEEE, 2002. https://doi.org/10.1109/CSAC.2002.1176296
- Hayashi, Eiji, et al. "CASA: context-aware scalable authentication." Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, 2013. https://doi.org/10.1145/2501604.2501607
- Li, Qiang, Qi Han, and Limin Sun. "Context-aware handoff on smartphones." 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems. IEEE, 2013. https://doi.org/10.1109/MASS.2013.32
- Ashibani, Yosef, Dylan Kauling, and Qusay H. Mahmoud. "A context-aware authentication framework for smart homes." 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2017. https://doi.org/10.1109/CCECE.2017.7946657
- Arora, Anish, et al. "Exscal: Elements of an extreme scale wireless sensor network." 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'05). IEEE, 2005. https://doi.org/10.1109/RTCSA.2005.47
- J. Saxe, “Garbage In , Garbage Out : How Purportedly Great Ml Models Can Be Screwed Up By Bad Data,” 2017.
- Hidehiko Takara. "TK-3-4 IEC TC76 Standardization Trend on Safety of Optical Communication Systems (TK-3. International Standardization and Business Strategy, Meeting Committee Planning)." Proceedings of IEICE General Conference 2015.2 (2015).
- D. Tang, Y. Yoshihara, T. Obo, T. Takeda, J. Botzheim, and N. Kubota, “Evolution strategy for anomaly detection in daily life monitoring of elderly people,” 2016 55th Annu. Conf. Soc. Instrum. Control Eng. Japan, SICE 2016, pp. 1376–1381, 2016. https://doi.org/10.1109/SICE.2016.7749272
- T. V Duong, H. H. Bui, D. Q. Phung, and S. Venkatesh, “Activity Recognition And Abnormality Detection With The Switching Hidden Semi-Markov Model Computer Vision And Pattern Recognition, 2005. Cvpr 2005,” IEEE Comput. Soc. Conf., vol. 1, no. Cvpr, pp. 20–25, 2005. https://doi.org/10.1109/CVPR.2005.61
- Z. Zhang, X. Gao, J. Biswas, and K. W. Jian, “Moving targets detection and localization in passive infrared sensor networks,” FUSION 2007 - 2007 10th Int. Conf. Inf. Fusion, 2007. https://doi.org/10.1109/ICIF.2007.4408178
- A. Kassem, S. El Murr, G. Jamous, E. Saad, and M. Geagea, “A smart lock system using Wi-Fi security,” 2016 3rd Int. Conf. Adv. Comput. Tools Eng. Appl. ACTEA 2016, pp. 222–225, 2016. https://doi.org/10.1109/ACTEA.2016.7560143
- N. Hashim, N. F. A. M. Azmi, F. Idris, and N. Rahim, “Smartphone activated door lock using wifi,” vol. 11, no. 5, pp. 3309–3312, 2016.
- Patel, Arpit, and Tushar A. Champaneria. "Fuzzy logic based algorithm for Context Awareness in IoT for Smart home environment." 2016 IEEE Region 10 Conference (TENCON). IEEE, 2016. https://doi.org/10.1109/TENCON.2016.7848168
- P. Chahuara, F. Portet, and M. Vacher, “Context-aware decision making under uncertainty for voice-based control of smart home,” Expert Syst. Appl., vol. 75, pp. 63–79, 2017. https://doi.org/10.1016/j.eswa.2017.01.014
- A. Alkhresheh, K. Elgazzar, and H. S. Hassanein, “Context-aware Automatic Access Policy Specification for IoT Environments,” 2018 14th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2018, pp. 793–799, 2018. https://doi.org/10.1109/IWCMC.2018.8450323
- D. Han, H. Kim, and J. Jang, “Blockchain based smart door lock system,” Int. Conf. Inf. Commun. Technol. Converg. ICT Converg. Technol. Lead. Fourth Ind. Revolution, ICTC 2017, vol. 2017-Decem, pp. 1165–1167, 2017. https://doi.org/10.1109/ICTC.2017.8190886
- S.-J. Song and H. Nam, “Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface,” Curr. Opt. Photonics, vol. 1, no. 2, pp. 90–94, 2017. https://doi.org/10.3807/COPP.2017.1.2.090
- A. Ibro and A. R. Wong, “Face Recognition Door Lock,” no. April, 2019.
- Alemdar, Hande. Human Activity Recognition With Wireless Sensor Networks Using Machine Learning. Diss. Bogaziçi University, 2015.
- Asghari, Parviz, Elnaz Soelimani, and Ehsan Nazerfard. "Online Human Activity Recognition Employing Hierarchical Hidden Markov Models." arXiv preprint arXiv:1903.04820 (2019).
- M. H. Aghdam, “Context-aware recommender systems using hierarchical hidden Markov model,” Physica A, 2018. https://doi.org/10.1016/j.physa.2018.11.037
- M. Sharma and M. Singh, “Predictive Analysis of RFID Supply Chain Path Using Long Short Term Memory ( LSTM ): Recurrent Neural Networks,” no. July, pp. 66–77, 2018. https://doi.org/10.5815/ijwmt.2018.04.05
- Prasetyo, Muhammad Eko Budi. "The basic theory of the hidden markov model." Institut of Technology Bandung (2010).
- Irfani, Angela, Ratih Amelia, and Dyah Saptanti. "Viterbi Algorithm in Hidden Markov Models Method in Speech Recognition Technology." Computational Science and Engineering Laboratory. Department of Informatics Engineering, Institut of Technology Bandung (2006).
- R. Ghafoor et al., “A performance comparison of machine learning classification approaches for robust activity of daily living recognition,” Artif. Intell. Rev., vol. 52, no. 1, pp. 357–379, 2019. https://doi.org/10.1007/s10462-018-9623-5
References
Covington, Michael J., et al. "A context-aware security architecture for emerging applications." 18th Annual Computer Security Applications Conference, 2002. Proceedings.. IEEE, 2002. https://doi.org/10.1109/CSAC.2002.1176296
Hayashi, Eiji, et al. "CASA: context-aware scalable authentication." Proceedings of the Ninth Symposium on Usable Privacy and Security. ACM, 2013. https://doi.org/10.1145/2501604.2501607
Li, Qiang, Qi Han, and Limin Sun. "Context-aware handoff on smartphones." 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems. IEEE, 2013. https://doi.org/10.1109/MASS.2013.32
Ashibani, Yosef, Dylan Kauling, and Qusay H. Mahmoud. "A context-aware authentication framework for smart homes." 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE). IEEE, 2017. https://doi.org/10.1109/CCECE.2017.7946657
Arora, Anish, et al. "Exscal: Elements of an extreme scale wireless sensor network." 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'05). IEEE, 2005. https://doi.org/10.1109/RTCSA.2005.47
J. Saxe, “Garbage In , Garbage Out : How Purportedly Great Ml Models Can Be Screwed Up By Bad Data,” 2017.
Hidehiko Takara. "TK-3-4 IEC TC76 Standardization Trend on Safety of Optical Communication Systems (TK-3. International Standardization and Business Strategy, Meeting Committee Planning)." Proceedings of IEICE General Conference 2015.2 (2015).
D. Tang, Y. Yoshihara, T. Obo, T. Takeda, J. Botzheim, and N. Kubota, “Evolution strategy for anomaly detection in daily life monitoring of elderly people,” 2016 55th Annu. Conf. Soc. Instrum. Control Eng. Japan, SICE 2016, pp. 1376–1381, 2016. https://doi.org/10.1109/SICE.2016.7749272
T. V Duong, H. H. Bui, D. Q. Phung, and S. Venkatesh, “Activity Recognition And Abnormality Detection With The Switching Hidden Semi-Markov Model Computer Vision And Pattern Recognition, 2005. Cvpr 2005,” IEEE Comput. Soc. Conf., vol. 1, no. Cvpr, pp. 20–25, 2005. https://doi.org/10.1109/CVPR.2005.61
Z. Zhang, X. Gao, J. Biswas, and K. W. Jian, “Moving targets detection and localization in passive infrared sensor networks,” FUSION 2007 - 2007 10th Int. Conf. Inf. Fusion, 2007. https://doi.org/10.1109/ICIF.2007.4408178
A. Kassem, S. El Murr, G. Jamous, E. Saad, and M. Geagea, “A smart lock system using Wi-Fi security,” 2016 3rd Int. Conf. Adv. Comput. Tools Eng. Appl. ACTEA 2016, pp. 222–225, 2016. https://doi.org/10.1109/ACTEA.2016.7560143
N. Hashim, N. F. A. M. Azmi, F. Idris, and N. Rahim, “Smartphone activated door lock using wifi,” vol. 11, no. 5, pp. 3309–3312, 2016.
Patel, Arpit, and Tushar A. Champaneria. "Fuzzy logic based algorithm for Context Awareness in IoT for Smart home environment." 2016 IEEE Region 10 Conference (TENCON). IEEE, 2016. https://doi.org/10.1109/TENCON.2016.7848168
P. Chahuara, F. Portet, and M. Vacher, “Context-aware decision making under uncertainty for voice-based control of smart home,” Expert Syst. Appl., vol. 75, pp. 63–79, 2017. https://doi.org/10.1016/j.eswa.2017.01.014
A. Alkhresheh, K. Elgazzar, and H. S. Hassanein, “Context-aware Automatic Access Policy Specification for IoT Environments,” 2018 14th Int. Wirel. Commun. Mob. Comput. Conf. IWCMC 2018, pp. 793–799, 2018. https://doi.org/10.1109/IWCMC.2018.8450323
D. Han, H. Kim, and J. Jang, “Blockchain based smart door lock system,” Int. Conf. Inf. Commun. Technol. Converg. ICT Converg. Technol. Lead. Fourth Ind. Revolution, ICTC 2017, vol. 2017-Decem, pp. 1165–1167, 2017. https://doi.org/10.1109/ICTC.2017.8190886
S.-J. Song and H. Nam, “Visible Light Identification System for Smart Door Lock Application with Small Area Outdoor Interface,” Curr. Opt. Photonics, vol. 1, no. 2, pp. 90–94, 2017. https://doi.org/10.3807/COPP.2017.1.2.090
A. Ibro and A. R. Wong, “Face Recognition Door Lock,” no. April, 2019.
Alemdar, Hande. Human Activity Recognition With Wireless Sensor Networks Using Machine Learning. Diss. Bogaziçi University, 2015.
Asghari, Parviz, Elnaz Soelimani, and Ehsan Nazerfard. "Online Human Activity Recognition Employing Hierarchical Hidden Markov Models." arXiv preprint arXiv:1903.04820 (2019).
M. H. Aghdam, “Context-aware recommender systems using hierarchical hidden Markov model,” Physica A, 2018. https://doi.org/10.1016/j.physa.2018.11.037
M. Sharma and M. Singh, “Predictive Analysis of RFID Supply Chain Path Using Long Short Term Memory ( LSTM ): Recurrent Neural Networks,” no. July, pp. 66–77, 2018. https://doi.org/10.5815/ijwmt.2018.04.05
Prasetyo, Muhammad Eko Budi. "The basic theory of the hidden markov model." Institut of Technology Bandung (2010).
Irfani, Angela, Ratih Amelia, and Dyah Saptanti. "Viterbi Algorithm in Hidden Markov Models Method in Speech Recognition Technology." Computational Science and Engineering Laboratory. Department of Informatics Engineering, Institut of Technology Bandung (2006).
R. Ghafoor et al., “A performance comparison of machine learning classification approaches for robust activity of daily living recognition,” Artif. Intell. Rev., vol. 52, no. 1, pp. 357–379, 2019. https://doi.org/10.1007/s10462-018-9623-5