• Login
    View Item 
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • View Item
    •   DORA Home
    • Faculty of Computing, Engineering and Media
    • School of Computer Science and Informatics
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Comparison of Fusion Methods Based on DST and DBN in Human Activity Recognition

    Thumbnail
    Date
    2011-03-10
    Author
    Tolstikov, A.;
    Hong, X.;
    Biswas, J.;
    Nugent, Chris;
    Chen, Liming;
    Parente, G.
    Metadata
    Show attachments and full item record
    Abstract
    Ambient assistive living environments require sophisticated information fusion and reasoning techniques to accurately identify activities of a person under care. In this paper, we explain, compare and discuss the application of two powerful fusion methods, namely dynamic Bayesian networks (DBN) and Dempster-Shafer theory (DST), for human activity recognition. Both methods are described, the implementation of activity recognition based on these methods is explained, and model acquisition and composition are suggested. We also provide functional comparison of both methods as well as performance comparison based on the publicly available activity dataset. Our findings show that in performance and applicability, both DST and DBN are very similar; however, significant differences exist in the ways the models are obtained. DST being top-down and knowledge-based, differs significantly in qualitative terms, when compared with DBN, which is data-driven. These qualitative differences between DST and DBN should therefore dictate the selection of the appropriate model to use, given a particular activity recognition application.
    Description
    Citation : Tolstikov, A., Hong, X., Biswas, J. Nugent, C., Chen, L., Parente, G. (2011) Comparison of Fusion Methods Based on DST and DBN in Human Activity Recognition. Journal of Control Theory and Applications, 9(1), pp.18.
    URI
    http://hdl.handle.net/2086/15373
    DOI
    https://doi.org/10.1007/s11768-011-0260-7
    ISSN : 1672-6340
    Research Group : CIIRG
    Research Institute : Cyber Technology Institute (CTI)
    Peer Reviewed : Yes
    Collections
    • School of Computer Science and Informatics [2968]

    Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
    DMU LIbrary
     

     

    Browse

    All of DORACommunities & CollectionsAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission DateThis CollectionAuthorsTitlesSubjects/KeywordsResearch InstituteBy Publication DateBy Submission Date

    My Account

    Login

    Submission Guide | Reporting Guide | Reporting Tool | DMU Open Access Libguide | Take Down Policy | Connect with DORA
    DMU LIbrary