S.A Bashir
Clustering and nearest neighbour based classification approach for mobile activity recognition.
Bashir, S.A; Doolan, D.C.; Petrovski, A.
Authors
D.C. Doolan
A. Petrovski
Abstract
We present a hybridized algorithm based on clustering and nearest neighbour classifier for mobile activity recognition. The algorithm transforms a training dataset into a more compact and reduced representative set that lessens the computational cost on mobile devices. This is achieved by applying clustering on the original dataset with the concept of percentage data retention to direct the operation. After clustering, we extract three reduced and transformed representation of the original dataset to serve as the reference data for nearest neighbour classification. These reduced representative sets can be used for classifying new instances using the nearest neighbour algorithm step on the mobile phone. Experimental evaluation of our proposed approach using real mobile activity recognition dataset shows improved result over the basic KNN algorithm that uses all the training dataset.
Citation
BASHIR, S.A., DOOLAN, D.C. and PETROVSKI, A. 2016. Clustering and nearest neighbour based classification approach for mobile activity recognition. Journal of mobile multimedia [online], 12(1-2), pages 100-124. Available from: http://www.rintonpress.com/xjmm12/jmm-12-12/110-124.pdf
Journal Article Type | Article |
---|---|
Acceptance Date | Apr 3, 2016 |
Online Publication Date | Apr 3, 2016 |
Publication Date | Apr 8, 2016 |
Deposit Date | Oct 4, 2016 |
Publicly Available Date | Oct 4, 2016 |
Journal | Journal of mobile multimedia |
Print ISSN | 1550-4646 |
Publisher | River Publishers |
Peer Reviewed | Peer Reviewed |
Volume | 12 |
Issue | 1-2 |
Pages | 100-124 |
Keywords | Activity recognition; KNN; Smartphones; Clustering |
Public URL | http://hdl.handle.net/10059/1856 |
Publisher URL | http://www.rintonpress.com/xjmm12/jmm-12-12/110-124.pdf |
Files
BASHIR 2016 Clustering and nearest neighbour based
(950 Kb)
PDF
Publisher Licence URL
https://creativecommons.org/licenses/by-nc-nd/4.0/
You might also like
AI-based intrusion detection systems for in-vehicle networks: a survey.
(2023)
Journal Article
Android source code vulnerability detection: a systematic literature review.
(2023)
Journal Article
Topology for preserving feature correlation in tabular synthetic data.
(2022)
Conference Proceeding
Framework for detecting APTs based on steps analysis and correlation.
(2022)
Book Chapter
Keep the moving vehicle secure: context-aware intrusion detection system for in-vehicle CAN bus security.
(2022)
Conference Proceeding