Abstract

The kNN machine learning method is widely used as a classifier in Human Activity Recognition (HAR) systems. Although the kNN algorithm works similarly both online and in offline mode, the use of all training instances is much more critical online than offline due to time and memory restrictions in the online mode. Some methods propose decreasing the high computational costs of kNN by focusing, e.g., on approximate kNN solutions such as the ones relying on Locality-Sensitive Hashing (LSH). However, embedded kNN implementations also need to address the target device’s memory constraints, especially as the use of online classification needs to cope with those constraints to be practical. This paper discusses online approaches to reduce the number of training instances stored in the kNN search space. To address practical implementations of HAR systems using kNN, this paper presents simple, energy/computationally efficient, and real-time feasible schemes to maintain at runtime a maximum number of training instances stored by kNN. The proposed schemes include policies for substituting the training instances, maintaining the search space to a maximum size. Experiments in the context of HAR datasets show the efficiency of our best schemes.

Highlights

  • Human Activity Recognition (HAR) aims to automatically recognize activities performed by humans through the analyses of sensing data [1]

  • We present the results achieved from the experiments we conducted for the different kNN prototypes

  • Comparison between the kNN Methods without Online Learning. This experiment aims at analyzing the impact of limiting the number of training instances that can be stored by each kNN prototype on its classification accuracy

Read more

Summary

Introduction

Human Activity Recognition (HAR) aims to automatically recognize activities performed by humans through the analyses of sensing data [1]. HAR has been widely used in many applications (e.g., [2,3,4], and [1]), which include health, elderly care and well-being [5], tracking [6,7], and mobile security [8] Most of the these approaches have been developed using Machine Learning methods, including Decision Trees (see, e.g., [9,10,11]), Naive Bayes (see e.g., [12,13,14]), SVM [15], kNN [16], and deep learning techniques (see, e.g., [17,18,19,20,21]).

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.