scispace - formally typeset
Search or ask a question
Author

Daniel H. Wilson

Bio: Daniel H. Wilson is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Activity recognition & Eukaryotic Large Ribosomal Subunit. The author has an hindex of 7, co-authored 7 publications receiving 562 citations.

Papers
More filters
Book ChapterDOI
08 May 2005
TL;DR: The simultaneous tracking and activity recognition (STAR) problem is introduced, which exploits the synergy between location and activity to provide the information necessary for automatic health monitoring.
Abstract: In this paper we introduce the simultaneous tracking and activity recognition (STAR) problem, which exploits the synergy between location and activity to provide the information necessary for automatic health monitoring. Automatic health monitoring can potentially help the elderly population live safely and independently in their own homes by providing key information to caregivers. Our goal is to perform accurate tracking and activity recognition for multiple people in a home environment. We use a “bottom-up” approach that primarily uses information gathered by many minimally invasive sensors commonly found in home security systems. We describe a Rao-Blackwellised particle filter for room-level tracking, rudimentary activity recognition (i.e., whether or not an occupant is moving), and data association. We evaluate our approach with experiments in a simulated environment and in a real instrumented home.

348 citations

Patent
24 Mar 2004
TL;DR: In this paper, the authors present a computer controlled method for use with a communication system, where each one of the plurality of communications is from one of a plurality of communication sources.
Abstract: One embodiment of the invention is a computer controlled method for use with a communication system. The method includes a step of receiving a plurality of communications, where each one of the plurality of communications is from one of a plurality of communication sources; includes a step of mixing (that is responsive to a plurality of floor controls) the plurality of communications for a plurality of outputs associated with plurality of communication sources; and includes a step of analyzing, for a plurality of users associated with the plurality of communication sources, one or more conversational characteristics of two or more of the plurality of users. The method also includes a step of automatically adjusting the plurality of floor controls responsive to the step of analyzing. Other embodiments include systems and devices that use the method as well as program products that cause a computer to execute the method.

86 citations

01 Jan 2005
TL;DR: This thesis conducts a two-phased formative study to examine the work practices of professionals who currently perform in-home monitoring for elderly clients, and introduces the simultaneous tracking and activity recognition (STAR) problem, whose solution provides vital information for automatic in- home health monitoring.
Abstract: As people grow older, they depend more heavily upon outside support for health assessment and medical care. The current healthcare infrastructure in America is widely considered to be inadequate to meet the needs of an increasingly older population. One solution, called aging in place, is to ensure that the elderly can live safely and independently in their own homes for as long as possible. Automatic health monitoring is a technological approach which helps people age in place by continuously providing key information to caregivers. In this thesis, we explore automatic health monitoring on several levels. First, we conduct a two-phased formative study to examine the work practices of professionals who currently perform in-home monitoring for elderly clients. With these findings in mind, we introduce the simultaneous tracking and activity recognition (STAR) problem, whose solution provides vital information for automatic in-home health monitoring. We describe and evaluate a particle filter approach that uses data from simple sensors commonly found in home security systems to provide room-level tracking and activity recognition. Next, we introduce the "context-aware recognition survey," a novel data collection method that helps users label anonymous episodes of activity for use as training examples in a supervised learner. Finally, we introduce the k-Edits Viterbi algorithm, which works within a Bayesian framework to automatically rate routine activities and detect irregular patterns of behavior. This thesis contributes to the field of automatic health monitoring through a combination of intensive background study, efficient approaches for location and activity inference, a novel unsupervised data collection technique, and a practical activity rating application.

51 citations

Proceedings ArticleDOI
02 Apr 2005
TL;DR: An unsupervised technique in which contextual information gathered by ubiquitous sensors is used to help users label a multitude of anonymous activity episodes, and a user study is reported on how well subjects were able to recognize their own activities, the activities of others, and counterfeits that did not correspond to any activity.
Abstract: Identifying what people do in the home can both inform ubiquitous computing application design decisions and provide training data to the machine learning algorithms used in their implementation. This paper describes an unsupervised technique in which contextual information gathered by ubiquitous sensors is used to help users label a multitude of anonymous activity episodes. This context-aware recognition survey is a game-like computer program in which users attempt to correctly guess which activity is happening after seeing a series of symbolic images that represent sensor values generated during the activity. We report a user study of the system, focusing on how well subjects were able to recognize their own activities, the activities of others, and counterfeits that did not correspond to any activity.

34 citations

Journal ArticleDOI
TL;DR: Analysis of the effects of depleting proteins required for C2 cleavage is performed and these proteins are revealed to be required for remodeling of several neighborhoods, including two major functional centers of the 60S subunit, suggesting that these remodeling events form a checkpoint leading to C2 Cleavage.
Abstract: Ribosome biogenesis involves numerous preribosomal RNA (pre-rRNA) processing events to remove internal and external transcribed spacer sequences, ultimately yielding three mature rRNAs. Removal of the internal transcribed spacer 2 spacer RNA is the final step in large subunit pre-rRNA processing and begins with endonucleolytic cleavage at the C2 site of 27SB pre-rRNA. C2 cleavage requires the hierarchical recruitment of 11 ribosomal proteins and 14 ribosome assembly factors. However, the function of these proteins in C2 cleavage remained unclear. In this study, we have performed a detailed analysis of the effects of depleting proteins required for C2 cleavage and interpreted these results using cryo-electron microscopy structures of assembling 60S subunits. This work revealed that these proteins are required for remodeling of several neighborhoods, including two major functional centers of the 60S subunit, suggesting that these remodeling events form a checkpoint leading to C2 cleavage. Interestingly, when C2 cleavage is directly blocked by depleting or inactivating the C2 endonuclease, assembly progresses through all other subsequent steps.

29 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper surveys context awareness from an IoT perspective and addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT.
Abstract: As we are moving towards the Internet of Things (IoT), the number of sensors deployed around the world is growing at a rapid pace. Market research has shown a significant growth of sensor deployments over the past decade and has predicted a significant increment of the growth rate in the future. These sensors continuously generate enormous amounts of data. However, in order to add value to raw sensor data we need to understand it. Collection, modelling, reasoning, and distribution of context in relation to sensor data plays critical role in this challenge. Context-aware computing has proven to be successful in understanding sensor data. In this paper, we survey context awareness from an IoT perspective. We present the necessary background by introducing the IoT paradigm and context-aware fundamentals at the beginning. Then we provide an in-depth analysis of context life cycle. We evaluate a subset of projects (50) which represent the majority of research and commercial solutions proposed in the field of context-aware computing conducted over the last decade (2001-2011) based on our own taxonomy. Finally, based on our evaluation, we highlight the lessons to be learnt from the past and some possible directions for future research. The survey addresses a broad range of techniques, methods, models, functionalities, systems, applications, and middleware solutions related to context awareness and IoT. Our goal is not only to analyse, compare and consolidate past research work but also to appreciate their findings and discuss their applicability towards the IoT.

2,542 citations

Journal ArticleDOI
TL;DR: The emergence of `ambient-assisted living’ (AAL) tools for older adults based on ambient intelligence paradigm is summarized and the state-of-the-art AAL technologies, tools, and techniques are summarized.
Abstract: In recent years, we have witnessed a rapid surge in assisted living technologies due to a rapidly aging society. The aging population, the increasing cost of formal health care, the caregiver burden, and the importance that the individuals place on living independently, all motivate development of innovative-assisted living technologies for safe and independent aging. In this survey, we will summarize the emergence of `ambient-assisted living” (AAL) tools for older adults based on ambient intelligence paradigm. We will summarize the state-of-the-art AAL technologies, tools, and techniques, and we will look at current and future challenges.

1,000 citations

Journal ArticleDOI
01 Nov 2012
TL;DR: A comprehensive survey to examine the development and current status of various aspects of sensor-based activity recognition, making a primary distinction in this paper between data-driven and knowledge-driven approaches.
Abstract: Research on sensor-based activity recognition has, recently, made significant progress and is attracting growing attention in a number of disciplines and application domains. However, there is a lack of high-level overview on this topic that can inform related communities of the research state of the art. In this paper, we present a comprehensive survey to examine the development and current status of various aspects of sensor-based activity recognition. We first discuss the general rationale and distinctions of vision-based and sensor-based activity recognition. Then, we review the major approaches and methods associated with sensor-based activity monitoring, modeling, and recognition from which strengths and weaknesses of those approaches are highlighted. We make a primary distinction in this paper between data-driven and knowledge-driven approaches, and use this distinction to structure our survey. We also discuss some promising directions for future research.

944 citations

Proceedings ArticleDOI
21 Sep 2008
TL;DR: This paper presents an easy to install sensor network and an accurate but inexpensive annotation method and shows how the hidden Markov model and conditional random fields perform in recognizing activities.
Abstract: A sensor system capable of automatically recognizing activities would allow many potential ubiquitous applications. In this paper, we present an easy to install sensor network and an accurate but inexpensive annotation method. A recorded dataset consisting of 28 days of sensor data and its annotation is described and made available to the community. Through a number of experiments we show how the hidden Markov model and conditional random fields perform in recognizing activities. We achieve a timeslice accuracy of 95.6% and a class accuracy of 79.4%.

873 citations

Journal ArticleDOI
John Krumm1
01 Aug 2009
TL;DR: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information, which includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data.
Abstract: This is a literature survey of computational location privacy, meaning computation-based privacy mechanisms that treat location data as geometric information. This definition includes privacy-preserving algorithms like anonymity and obfuscation as well as privacy-breaking algorithms that exploit the geometric nature of the data. The survey omits non-computational techniques like manually inspecting geotagged photos, and it omits techniques like encryption or access control that treat location data as general symbols. The paper reviews studies of peoples' attitudes about location privacy, computational threats on leaked location data, and computational countermeasures for mitigating these threats.

732 citations