Activity Recognition for Smart Building Application Using Complex Event Processing Approach

Rabiah Adawiyah Shahad (1), Mohamad Hanif Md Saad (2), Aini Hussain (3)
(1) Universiti Kebangsaan Malaysia
(2)
(3)
Fulltext View | Download
How to cite (IJASEIT) :
Shahad, Rabiah Adawiyah, et al. “Activity Recognition for Smart Building Application Using Complex Event Processing Approach”. International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 2, Mar. 2018, pp. 315-22, doi:10.18517/ijaseit.8.2.2575.
Activity recognition has become one of the most interesting and challenging subjects in performing surveillance or monitoring of smart building system. Although there are several systems already available in the market, limitations and several unresolved issues remain, especially when it involves complex engineering applications. As such, activity recognition is purposely incorporated in the smart system to detect simple and complex events that happen in the building. In all existing event detections, the complex event processing (CEP) approach has been used for the detection of complex events. The CEP is capable of abstracting meaningful events from various and heterogeneous data sources, filtering and processing both simple and complex events, as well as, producing fast mitigation action based on specific scenarios. The work reported in this paper intends to explain in detail on the development of activity recognition application using CAISERâ„¢ and NESPER© platform as well as the complex event detection that uses the CEP approach. In assessing the system performance, Matthew Coefficient Correlation (MCC) has been used as the main performance parameter.  Results obtained showed that the Temporal Constraint Template Match Detector (TCD) is more accurate, stable and better in complex event detection compared to NESPER© detector.

C. Solutions, “The Evolution Of Smart Buildings,” t.pt., 2017. [Online]. Available: http://controlyourbuilding.com/the-evolution-of-smart-buildings. [Accessed: 02-Feb-2017].

J. Towler, “Evolution of Smart Building and Their Place in the Internet of Everything,” in 14th International Conference for Enhanced Building Operations, 2014, no. September.

I. Strictest, C. Confidence, P. One, I. Strictest, and C. Confidence, “Smart Building enable Smart City,” p. 22, 2016.

S. Wendzel, J. Tonejc, J. Kaur, and A. Kobekova, “Cyber Security of Smart Buildings,” Secur. Priv. CyberPhysical Syst. Found. Appl. Chapter 16, Ed. H. Song, G. Fink, S. Jeschke, G. Rosner, Wiley, Press, pp. 1-28, 2016.

S. Ibrahim, “A comprehensive review on intelligent surveillance systems,” vol. 1, pp. 7-14, 2016.

M. Sufyian, M. Azmi, and N. Sulaiman, “Accelerator-Based Human Activity Recognition Using Voting Technique with NBTree and MLP Classifiers,” vol. 7, no. 1, pp. 146-152, 2017.

R. Gad, M. Kappes, J. Boubeta-Puig, and I. Medina-Bulo, “Employing the CEP paradigm for network analysis and surveillance,” in Proceedings of the Ninth Advanced International Conference on Telecommunications, 2013, pp. 204-210.

D. Luckham, The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems, 1st ed. Addison-Wesley Professional, 2002.

K. Wongsuphasawat, C. Plaisant, M. Taieb-Maimon, and B. Shneiderman, “Querying event sequences by exact match or similarity search: Design and empirical evaluation,” Interact. Comput., vol. 24, no. 2, pp. 55-68, 2012.

A. M. Gil-lafuente, “Decision-making techniques with similarity measures and OWA operators,” vol. 36, no. January 2012, pp. 81-102, 2013.

P. Moen, Attribute, Event Sequence and Event Type Similarity Notions for Data Mining. 2000.

H. Obweger, “Similarity Searching in Complex Business Events and Sequences thereof,” Citeseer, no. 0, pp. 1-117, 2009.

Y. Mei and S. Madden, “ZStream : A Cost-based Query Processor for Adaptively Detecting Composite Events Categories and Subject Descriptors,” Proc. 35th SIGMOD Int. Conf. Manag. data, vol. pages, pp. 193-206, 2009.

R. Agrawal, K. Lin, H. S. Sawhney, and K. Shim, “Fast similarity search in the presence of noise, scaling, and translation in time-series databases,” Proc. 21st Int. Conf. Very Large Databases, pp. 490-501, 1995.

S. Guler, W. H. Liang, and I. A. Pushee, “A video event detection and mining framework,” in Computer Vision and Pattern Recognition Workshop, 2003. CVPRW’03. Conference on, 2003, vol. 4, p. 42.

K. S. Pooja, K. T. Chandrashekar, M. Thungamani, G. B. C. N, A. W. Is, and A. S. Home, “Complex Event Processing In Smart Homes,” no. 3, pp. 544-550, 2015.

O. Saleh, “Complex Event Processing in Wireless Sensor Networks,” Wiat 2010, pp. 211-214, 2010.

M. Ficco and L. Romano, “A Generic Intrusion Detection and Diagnoser System Based on Complex Event Processing,” 2011 First Int. Conf. Data Compression, Commun. Process., pp. 275-284, 2011.

D. Romero, G. Hermosillo, A. Taherkordi, R. Nzekwa, R. Rouvoy, and F. Eliassen, “RESTful integration of heterogeneous devices in pervasive environments,” in IFIP International Conference on Distributed Applications and Interoperable Systems, 2010, pp. 1-14.

R. A. Shahad, G. B. Leow, M. H. M. Saad, and A. Hussain, “Complex Event Detection in an Intelligent Surveillance System using CAISER Platform,” 2016 Int. Conf. Adv. Electr. Electron. Syst. Eng., 2016.

G. E. Churcher and J. Foley, “Applying and extending sensor web enablement to a telecare sensor network architecture,” in Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE, 2009, p. 6.

M. H. M. Saad, “Pemprosesan Peristiwa Kompleks Untuk Aplikasi Sistem Kejuruteraan Pintar,” Universiti Kebangsaan Malaysia, 2017.

EsperTech, “NEsper for .NET,” EsperTech Inc. [Online]. Available: http://www.espertech.com/esper/about_nesper_dotnet.php. [Accessed: 01-Jan-2017].

F. Ramli, S. Azman, and M. Noah, “Building an Event Ontology for Historical Domain to Support Semantic Document Retrieval,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 6, no. 6, pp. 1154-1160, 2016.

Authors who publish with this journal agree to the following terms:

    1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
    2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
    3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).