You are on page 1of 9

636 IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO.

3, JUNE 2017

Survey on Prediction Algorithms in Smart Homes


Shaoen Wu, Senior Member, IEEE, Jacob B. Rendall, Matthew J. Smith, Shangyu Zhu, Junhong Xu,
Honggang Wang, Senior Member, IEEE, Qing Yang, Graduate Student Member, IEEE, and Pinle Qin

Abstract—The world has entered into a “smart” era. One area is an intelligent control, or an interface that allows for manage-
becoming smart is the place where we live—homes. Smart homes ment of the system. The final component is home automation,
are expected to be equipped with numerous sensors to con- where any product contained in the home is connected in some
tinually monitor, sense, and actuate the space. The data from
these sensors can be used to provide various types of services by way to a service or system from an outside source [2]. In this
automating common tasks while causing minimal disruption to type of smart home, the main point of emphasis is the use
daily life. In order to provide these services, a system must have of remote access to activate or control a part of the smart
sufficient intelligence to predict future events based on its obser- home. However, what about having a smart home that can
vations. This paper first examines the requirements for smart act on its own? This is the direction that researchers have
home predictions. It then comprehensively reviews prediction
algorithms and variations that have been proposed and inves- been leaning toward, so there must be some way to allow the
tigated in smart environments, such as smart homes. It is these smart home to think for itself in order to complete certain
prediction algorithms that provide the intelligence required by a tasks.
smart home. Comparisons are also made upon these prediction When smart homes were first introduced, the idea was to
algorithms on their features and models. have a system in place for a resident to interact with the
Index Terms—Intelligent systems, Internet of Things, system through an interface to change some aspect according
prediction methods, smart homes. to their own preference. Though this is still a key component
for a smart home, progress continues to be made to make
I. I NTRODUCTION the system more automated. This has led to researchers trying
to implement an artificial intelligence into the environment to
PREDICTION algorithm uses information from past
A experiences to anticipate future events. These algorithms
can be used in situations where data from a specific sample
make decisions based on previously gathered information or
prior inputs from the resident [3]. With artificial intelligence
in play, this should allow a smart home to act on its own.
space can be collected over a period. This makes prediction
This all seems ideal, but there still needs to be a way for the
algorithms ideal for use within smart environments. The term
smart home to make suitable decisions. To do so, prediction
smart environment can be used to refer to homes, office build-
algorithms have been introduced in many smart home systems
ings, power grids, etc. In this paper, the home context should
to analyze information and make a choice that is appropriate
be assumed unless stated otherwise.
for situation at hand.
A smart home can be defined in many ways. One defini-
One example of a smart home that has been developed
tion is dwelling that contains sensors and device controllers in
to act more or less independently is the managing an adap-
order to enhance one or more aspects of inhabitants’ lives [1].
tive versatile home (MavHome) [1], [4]. The researchers at
However, this definition does not fully encompass what a smart
the University of Texas at Arlington created this smart home
home is or how it operates. Another potential way to describe
project to have the home act as a “rational agent,” meaning
a smart home is that it consists of three main components.
that the MavHome wants to make the resident as comfort-
One component is an internal network, which is a way of
able as possible while operating at maximally efficiency. The
communication such as wires or cables. Another component
MavHome architecture is similar to many other smart homes in
Manuscript received October 6, 2016; revised December 6, 2016; accepted that it employs four layers: decision, information, communica-
January 31, 2017. Date of publication February 13, 2017; date of current tion, and physical layers. The decision layer uses knowledge
version June 15, 2017. This work was supported by the National Science given to it from the information layer to select what action
Foundation under Grant 1408165.
S. Wu is adjunct with the School of Computer and Software, Nanjing needs to take place. The information layer gathers and stores
University of Information Science and Technology, Nanjing 210044 China, all data pertinent to any decision making process. The com-
and also with the Department of Computer Science, Ball State University, munication layer enables the flow of information or request
Muncie, IN 47306 USA (e-mail: swu@bsu.edu).
J. B. Rendall, M. J. Smith, S. Zhu, and J. Xu are with the Department of between any two parts of the system. Lastly, the physical
Computer Science, Ball State University, Muncie, IN 47306 USA. layer is all the hardware that is included within the smart
H. Wang is with the Department of Electrical and Computer Engineering, home environment. MavHome uses this structure, along with
University of Massachusetts Dartmouth, Dartmouth, MA 02747 USA (e-mail:
hwang1@umassd.edu). prediction algorithms, to enable the smart home to be a more
Q. Yang is with the Department of Computer Science, Montana State automated space. Some other work on this interest can be
University, Bozeman, MT 59717 USA (e-mail: qing.yang@montana.edu). found in [5]–[14].
P. Qin is with the School of Computer Science and Control Engineering,
North University of China, Taiyuan 030051, China (e-mail: qpl@nuc.edu.cn). This paper is a survey on several different prediction algo-
Digital Object Identifier 10.1109/JIOT.2017.2668061 rithms that have been or are being used at smart homes. It will
2327-4662 c 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
WU et al.: SURVEY ON PREDICTION ALGORITHMS IN SMART HOMES 637

discuss the different areas within the home environment that states; and 3) the observational model which gives the rela-
use prediction algorithms. It will also compare the merits and tion between two states [20]. A variation of HMM is known
flaws of the algorithms presented and possible adaptations to as the task-based Markov model (TMM). In TMM, actions
enhance the overall quality of the prediction algorithms used or observations form a cluster of data that can be treated as
in smart homes. hidden [21]. So, the prediction analysis is still done in a sim-
This paper is organized as follows. We first introduce the ilar fashion in TMM as in HMM, but with a different way of
background of prediction algorithms, including system models gathering initial states.
and data in Section II. Then, Section III extensively reviews Similar to Markov models, BN are also used to represent
the literature prediction algorithms, compares them upon their the probability of an event occurring based on previous obser-
features and models. Next, Section IV discusses the enhance- vations. In fact, HMM is a model that is contained within
ments and variants of the prediction algorithms. Finally, this the dynamic BN class, where the BN contains a time con-
paper is concluded by Section V. straint [17]. Therefore, there must be some way to differentiate
the BN structure from the original Markov model. Note that
a BN is defined as a graphical model that demonstrates the
II. BACKGROUND
joint distribution for any given set of random variables. So
A. System Models in any BN, the system can be expressed as a directed acyclic
In order to better understand how prediction algorithms graph to demonstrate how different processes are connected
function, one must first understand the context in which they and where dependencies exist [22]. It can be seen here how,
are used. The idea of predicting how a person will interact with if certain data has been collected to describe a sequence of
an environment is a hard concept to grasp directly. This is why events, a BN can be used (similar to Markov models) to find
certain statistical models are typically used within prediction out what is the next likely event that will occur.
algorithms to better show how different tasks may predict Though both HMM and BN are useful in modeling a system
future events within a system. A major benefit to modeling with missing information, there are potential problems in either
the system is that based any all data collected by sensors, it is model that can cause an error in the prediction of future events.
not likely that this will provide the exhaustive set of activity For example, in HMM, there is no hierarchical structure and
sequences that can possibly occur within the smart home [15]. has trouble to process through a large amount of data [16].
Similarly, probabilistic models tend to be even better than pure This just means that HMM cannot determine what process or
statistical models since they allow for some randomness, time state is most important or what process must come first with-
complexity, and dependency on other variables, and are there- out being given the information explicitly. As noted before,
fore, more fitting to how human behavior within a home can a BN is a more general way of predicting human behavior
and should be modeled [16]. The main purpose of using mod- than a Markov model, but a BN still has its own pitfalls. A
els is to more accurately predict possible outcomes based on major dilemma in using a BN is that it is rigid and has trouble
previous events occurring, and the most commonly referred to adapting the “exact probabilistic inference” [16]. This refers
models used by prediction algorithms within smart homes are to the inability of BN to determine what type of distribution
the Markov model and Bayesian networks (BNs). is being used in the system. So when a prediction algorithm
The Markov model has been a well-established model for uses either of these types of models, there is a potential for
many years. The model says that at any given point in time of error, though the error should be minimal as long as the model
a system, the state at which the system is just depends upon meets its required specifications.
the direct previous state and independent of all other states
beforehand [17]. This has led many to describe a Markov B. System Data
model as a way to determine what is the “most probable event 1) Activities of Daily Living: Prediction algorithms work on
sequence” for any given system [18]. This basically means historical data to calculate potential future events. Each user’s
the state of the system is recorded and then a sequence of actions within a smart home environment provide the data
states is developed over a certain time interval. From this, a for the prediction algorithm to operate to its full capability. In
probability can be estimated of what is most likely to occur general, these actions conducted by a user fall into the category
next. This type of general Markov model leads to many dif- known as activities of daily living (ADLs).
ferent submodels that are also useful in prediction analysis. An ADL can be one of many different activities, though
The most referenced Markov model in smart home prediction gathering the information from these actions is typically per-
algorithms is the hidden Markov model (HMM) [19]. This spe- formed by using a sensor network. The sensors that are used
cialized model is used to model human behavior and maintains can be either wearable that go directly on a person, also
the Markov property. However, HMM works on observations known as wireless body sensor area network, or nonwear-
where the states of the system is unknown or hidden [17]. The able that remain stationary in the environment. These sensors
idea behind this is that even if a system is missing a piece can collect the information that could include a user’s loca-
of data at any given time, it can use previous knowledge to tion, movements, or activities [23]. The use of ADLs at a
make an educated decision on how to continue processing. smart home has its own challenges. One potential flaw is that
HMM could also be considered to consist of three param- though ADLs represent a sequence of events, some activities
eters: 1) the initial probability of the beginning state; 2) the can occur in different orders or together with a set of other
transition matrix that shows the probability to change between activities [24]. This means that any ADL, though beneficial
638 IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE 2017

to use in predicting inhabitant activities, could lead to com- user [30]. Also, information must be communicated to the
plexity since they are not necessarily identical for the same user by a device that is close enough for the user to notice it.
activity. Another possible problem is the issue of intersubject Roy et al. [30] analyzed daily routines of inhabitants to
variability, which refers to the situation that both inhabitant reveal that patterns exist in daily routines. They also realize
and noninhabitant activities can happen and affect how the that routines likely change over time; however, this change
ADL is recorded, resulting in a potential error [25]. can be classified as infrequent and random. Additionally,
When a sensor gathers information on an ADL, not only Roy et al. [30] noted that a smart home usually contains
does it get data related to the activity but will also record multiple paths between two locations, but they observe
the timestamps of events occurring within the activity. So, that inhabitants usually exhibit a most likely path. With
although any given ADL occurs as a sequence of events, the these observations, they assume inhabitant location to be a
use of the duration of each step along with the sequence will piece-wise stationary, ergodic, and stochastic process. Based
allow for better activity prediction [26]. Since there are times on this assumption, the previously discussed LeZi update
when sensors can malfunction or inhabitants can adjust their algorithm is reasonable to be used for a prediction algorithm
routine, the use of duration can help better compare an activity for this domain.
history. All of the ADLs can then be used by a prediction
algorithm to allow the smart home to both help the user and III. A LGORITHMS
make the house more comfortable. This also can help reduce
The architecture of smart homes is often represented as a
the cost of certain activities by being better prepared. One
layered model. A four-layered model is proposed by [31]. The
example of this would be to reduce energy consumption. An
top layer of this model is the “decision layer,” which bears the
experiment done by Zhuang and Liang [27] demonstrated how
responsibility of determining actions for the smart home to
the use of ADLs can benefit the smart home in its energy use.
perform by using the data from other layers. The other layers
Overall, an ADL is a resource that, when used, allows
generate data for the decision layer through communication
prediction algorithms to be extremely accurate in foreseeing
with physical hardware and storing the information obtained.
when and where future activities could occur within a smart
In order to select actions, the decision layer implements
environment.
one or more prediction algorithms, which will infer inhabitant
2) Location: The ability to predict the current location or
actions to occur next with a large probability. Using the result
the next location of inhabitants in a smart environment is
of the prediction algorithms, the decision layer can choose to
important to the functionality of the system as a whole. It is
take one or more actions. One possible choice is to automate
generally not desirable to manipulate a portion of the environ-
the predicted action. Another possibility is to deliver notifi-
ment based on a prediction if the inhabitants are not currently
cations or reminders if the predicted action is not performed
interested in that part of the environment.
within a specified time threshold. This section reviews some
One example of location prediction is performed by
well-know prediction algorithms used in the literature of smart
Petzold et al. [28] in the context of an office building. Two
environments.
major applications of next location prediction within an office
are proposed. First, a device could be placed outside each
office in the building to display the predicted location of a A. Active LeZi
person when he is away from his office. This would enable Although Active LeZi has been a widely accepted compres-
any visitors to decide if they should go to the predicted loca- sion algorithm, it is used in prediction the context of smart
tion or return at a later time. The second application is call homes. One application of Active LeZi is in the MavHome
forwarding. It could prevent a missed call by forwarding the project at the University of Texas at Arlington [32].
call to the predicted location when a person is away from Active LeZi is an improvement on the LZ78 algorithm [34]
his or her desk. Petzold et al. [28] have investigated Neural as proposed by Ziv and Lempel [33]. By parsing an input
networks, BNs, Markov, and state predictors for creating a string into one symbol at one time, LZ78 calculates the prob-
system with the described functionality. In addition to location, abilities for the next symbol at each context in the data. LZ78
a prediction of length of stay is necessary for these applica- will generate probabilities for the contexts that it sees from the
tions. Petzold et al. [28] claimed that this could be easily beginning of the data through the current symbol. The algo-
predicted with the same techniques that they have already rithm parses the input string into substrings “w1 , w2 , . . . , wn ”
investigated. In this scenario, it is also important to under- such that for any j > 0, the prefix (consists of all characters
stand when no prediction is better than an incorrect prediction. of wj except the last character) of wj is equal to some wi . As
Too many incorrect predictions could annoy users no longer of this prefix property, the substrings can be stored in a trie
interested in the predictions [28]. structure. Since LZ78 was designed as a compression algo-
Weiser [29] investigated the location prediction in a smart rithm, it has both an encoder and a decoder. For the purpose
home environment. He envisions a smart environment with a of prediction, only the encoder is required because there is no
high concentration of computing and communication capabil- need to produce the original data string from the trie struc-
ities and seamlessly integrated with its human users. In order ture which approximates a Markov model. An example of the
to provide information to the user, the system must be aware results of LZ78 parsing can be found in [35].
of the user’s location. The information needed by the user LZ78 cannot be used in practice for two main rea-
is strongly related to the current or future location of the sons. First, data that crosses phrase boundaries is lost.
WU et al.: SURVEY ON PREDICTION ALGORITHMS IN SMART HOMES 639

This limits the usefulness of LZ78 for prediction because B. Flocking


potential patterns often occur across phrase boundaries. Flocking is a term that is most commonly associated
Second, previous work has shown that LZ78 does converge with animal species, more specifically birds. Flocking mainly
to optimal predictability, however, the convergence does not consists of making groups of objects that share similar char-
occur quickly enough. LeZi update [36] was proposed, but acteristics, and it has been used in the computer science to
did not completely solve the issues presented by LZ78. describe an algorithm that acts on a set of objects to group
It marginally improves the slow convergence problem, but them according to their features [38]. To implement a flock,
it does not address the loss of information across phrase computer scientists have developed certain rules to govern
boundaries. what constitutes a flock or not. Reynolds came up with three
In order to overcome these limitations, specific rules that describe the behaviors of a flock, which he
Gopalratnam and Cook [35] introduced the Active LeZi refers to as a boid [39]. His first rule is collision avoidance,
to be used in smart environments. Active LeZi improves on or the chance to evade nearby obstacles or other members of
LZ78 and LeZi update by including a window that varies in a flock. The second rule is flock centering, or the need for
length as the algorithm runs. The window holds previously all flock mates to remain close together. The final rule is the
observed symbols. The length of the window is determined velocity of any flock member should be the same or close to
by the longest phrase observed in traditional LZ78 parsing. the others around it. In other words, the whole flock must be
The window makes it possible to gather information for moving toward the same direction [39]. In simpler terms, these
all possible context and approximate an order-k Markov rules are alignment, separation, and cohesion. These rules have
model where k is the length of the longest LZ78 string been used and adapted to software, especially in robotics and
observed so far. As discovered, the Active LeZi trie contains artificial intelligence for the ability to model not only the archi-
more nodes than the LZ78 trie and thus produces a more tecture of the environment, but the adaptability for a “flock”
complete Markov model. The amount of information stored (or actions) to enhance the system.
will grow with the length of the maximum LZ78 string, Within a smart home, flocking algorithms are useful tools
saying that algorithm performance will improve as the in analyzing the ADLs of an occupant, especially when said
experience grows. Active LeZi converges faster than LZ78 occupant may be suffering from a cognitive disability like
because it gathers more data. The trie output of Active LeZi dementia. Any given set of ADLs can act as a cluster, and
can be then used with prediction by partial match (PPM) then a flocking algorithm can be used to parse through copi-
predictors. PPM predictors take the different order Markov ous amounts of information quickly and effectively. It should
models into consideration and weight them accordingly. be noted that there are some other clustering algorithms that
They build a probability distribution for the next symbol can work, such as the K-mean. However, K-mean clustering is
at a given context. Then, they predict the symbol with the not ideal for the smart home since it requires human validation
highest probability. Gopalratnam and Cook [35] performed and a given initial number of clusters to evaluate. Therefore,
experiments on Active LeZi using two data sets. One data set K-mean is not effective when trying to allow a smart home
was synthetically generated without noise. The other data set to run independently of human involvement with the system.
was typical scenarios from a smart home with noise. As the This is partly what led to the idea of using a flocking algo-
number of training instances increased, the performance on rithm as a clustering approach to the smart home since it does
the noiseless data converged to 100% accuracy. For the noisy not require any initial number of clusters and will partition
data, accuracy converged to 86%. objects itself based upon previous knowledge gathered. Also,
Fang and Ruan [37] proposed an enhancement to Active a flocking algorithm can adapt easily to the environment by
LeZi termed time-varyingLeZi (TALZ). The enhancement is either adding new cluster points or combining new data with
based on the observation that human activity tends to occur its appropriate partition [40].
on a periodic basis. For example, a person may wake up at In a study conducted by Lapalu et al. [40], they attempted to
7:00 A . M . each morning, go to work at 8:00 A . M ., and return validate the use of a flocking algorithm within the smart home
for dinner at 6:00 P. M. These three actions are repeated on environment with some extra rules. As stated earlier, the basis
a daily basis. Additionally, distinct behaviors could appear for any flocking algorithm is the set of three rules established
similar but occur at different times. For example, going to by Reynolds. After following these rules, they find that the
work and walking the dog could both involve turning off the attempt to cluster objects could result in just one single cluster.
lights and locking the door but occur at different times of the So, they adapt the flocking algorithm by adding two new rules:
day. In order to improve Active LeZi, TALZ creates subtrees 1) similarity and 2) dissimilarity. Similarity will bring similar
from the null context based on the time of day. TALZ sub- objects together. Likewise, dissimilarity will attempt to keep
divides a day into 24 one-hour intervals, but this could be all dissimilar objects away from one another. In following all
easily modified for any desired size of interval. Active LeZi five of these rules, the study demonstrates that the adapted
parsing is used, but the output is placed into a subtree based flocking algorithm will develop a good clustering since it will
on the hour of the day that the event occurred. The output break apart large clusters into smaller, more similar clusters
is essentially that each subtree has a parent node correspond- [24]. This allows the algorithm to more easily identify ADLs
ing to the hour of the day, and all of the hour nodes share that are alike and get relevant information that the system can
the null context as a parent. Thus, the output is actually a use to adapt to make the home environment more suited to
single tree. the occupants need.
640 IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE 2017

C. SPEED as opposed to an initial stochastic process [43]. This leads to


In order to predict how inhabitants interact with a smart the idea of Nash equilibrium, which is viewed within a smart
home, the algorithm called sequence prediction via enhanced home as a balance between all preferences from users of the
episode discovery (SPEED) was used. The main purpose of system, where no person leaves [44]. Expanding upon this,
the SPEED algorithm is to learn from the periodic tendencies the Nash Q-learning takes the basic Q-learning method into a
of the user of a smart home and attempt to make appropriate multiagent system with the assumption that all choices lead to
decisions based upon the data it has gathered. SPEED develops a Nash equilibrium [43]. It is from this Nash Q-learning idea
a finite-order Markov model to describe the usr activities and that the Nash H-learning technique was developed.
exploits the PPM algorithm to make predictions [41]. Namely, The Nash H-learning framework (H stands for entropy) is
SPEED takes a sequence of events or occurrences from an mainly used to predict the location of multiple occupants of
inhabitant’s interaction with the smart home to predict future a smart home. Note that entropy, in this context, is referring
events within the environment. to location uncertainty of any number of residents within the
The SPEED algorithm employs decision trees to form a data smart home. To predict the location, it looks at the correla-
structure where it is able to view previously learned infor- tion between all people’s movements. This leads to the Nash
mation in order to make an appropriate decision. At certain H-learning algorithm to attempt to conserve energy by con-
points throughout the cycle, SPEED will discard any imme- tinuing to use the data extracted from the environment to a
diately unnecessary information in order to make a decision lower entropy. The lower the entropy, the more accurate the
tree that contains at most k levels, which in turn represents a Nash H-learning algorithm is in predicting the correct location.
kth order Markov model [41]. It should be noted that in using Overall, this algorithm attempts to provide maximum com-
PPM to help make decisions, a weighted branch system is put fort for the smart home users while also keeping the energy
in place which can even predict event sequences which have consumption to a minimum [44]. So the Nash H-learning tech-
never been present in the system [42]. The SPEED algorithm nique just expands on the previous known learning processes
is continuously calculating the weighted probability distribu- to predict locations of multiple users, which then helps the
tion after each successive decrease in the overall length of any smart home to better manage its own resources.
given sequence in the decision tree [41]. This is fairly exhaus-
tive and is expected to make a more accurate prediction of
E. Apriori Algorithm
future events.
Now, although the SPEED algorithm is able to form The Apriori algorithm is a classic data mining algo-
sequences of events to help predict what is to occur, one rithm for mining association rules. As described by
problem is that it does not take into account the time of events. Schweizer and Wache [45], it traditionally runs on a set of
So, further study was performed to include time into SPEED, database transactions in order to detect recurring patterns. The
and the modified SPEED (m-SPEED) algorithm was therefore output of the Apriori Algorithm are association rules of the
developed. The motivation was to make the algorithm more form “{X} → {Y}” where “X” and “Y” are subsets of the set
accurate, since, in many home environments, most tasks or of all items from the input transactions. A rule where X and
jobs are done in the same time period. Also, m-SPEED tried Y are both the null set is not a valid output. The rule is inter-
to get rid of all false episodes that showed up in the original preted as follows: the occurrence of the items in X implies the
SPEED algorithm [42]. occurrence of the items in Y.
Running the traditional Apriori algorithm is a two-step pro-
cess. First, the raw data is processed into subsets termed as
D. Nash H-Learning itemsets and “frequent” itemsets are identified. Second, the
Many learning algorithms can be useful in addressing how collection of frequent itemsets is pruned. The output, which
a smart home will learn and adapt to the changes that occur is a set of association rules, is created from the remaining
within its environment. If the system is able to learn habits frequent itemsets after the pruning is completed.
of an occupant more effectively, then the more productive In the first step of the Apriori algorithm, itemsets are gen-
a smart home can function. One such learning algorithm erated starting with a size of 1 item and increasing until no
that has been looked at as a potential solution to predict larger subsets can be found. Each itemset’s support is cal-
certain behaviors within a smart home is a method known culated, and the itemset is considered frequent if the support
as Nash H-learning. In order to understand how the Nash meets a predetermined support threshold. An itemset’s support
H-learning algorithm or framework functions, a small amount is defined as the percentage of the total input transaction that
of background information must be given first. contains the given itemset. In the second step of the algorithm,
Nash H-learning was developed from an algorithm called association rules are created using the frequent itemsets as
Q-learning, which uses a Markov process in order to come determined in the first step of the algorithm. Rules must meet
to a decision that is best utilized within a stationary envi- a predetermined confidence threshold in order to be included in
ronment. Although the Markov process is well-established as the algorithm output. Confidence is defined as the percentage
being useful within a smart home context, Q-learning itself of transactions containing X that also contain Y.
has its flaws. The most important downfall of Q-learning is The Apriori algorithm was proposed before smart home
that it does not function properly on multiagent systems since environments were heavily researched. As a result, smart home
the environment is constantly changing due to outside objects researchers have determined that its traditional implementation
WU et al.: SURVEY ON PREDICTION ALGORITHMS IN SMART HOMES 641

TABLE I
S UMMARY OF P REDICTION A LGORITHMS LeZi generates a trie structure to hold the information. In a
similar fashion, the SPEED algorithm also uses a tree struc-
ture that contains the information to predict future events. The
other algorithms, however, do not share this same structure.
In the flocking algorithm, all the data is stored in individual
clusters that share common characteristics. On the other hand,
the Apriori algorithm operates on transactions stored within a
database. An optimization of the Apriori algorithm loads the
database transactions into a matrix structure in the memory
is not suitable for smart homes and proposed improvements. to avoid the time required for disk access. As for the Nash
One of these proposals is made by Zhang and Qi [46] who H-learning algorithm, it is also unique in how it retains infor-
observed that this algorithm takes too long to run in order to mation. Instead of centralizing all the data into a single source,
be practical for a smart environment. In order to overcome this this algorithm keeps all the preferences and information on the
problem, they propose optimizations. First, Zhang and Qi [46] individual users themselves before going through to find what
observed that the standard implementation of the Apriori algo- is most likely to occur.
rithm requires multiple scans of the database in order to 2) Model: One major commonality among any prediction
obtain the required information. To address this, they pro- algorithms is whether any of them relies on a Markov model
pose scanning the database once and storing the pertinent data or BN to function. Of the algorithms discussed in this paper,
in memory. Then the algorithm can run on data in memory both the SPEED and Active LeZi algorithms are based on
instead of taking the extra time to access a database. A Markov models and use a PPM approach to generate predic-
second improvement is proposed based on the idea that a tions. However, they determine the size and order of these
frequent itemset cannot be obtained by adding an additional models in a slightly different manner. For Active LeZi, the
item to a nonfrequent itemset. This reduces the number of order of the Markov model is determined by the length of
iterations that the support must be calculated for an itemset. the longest LZ78 string observed. However, for SPEED, the
Zhang and Qi [46] included experimental data that shows the order is determined by the number of levels in the deci-
execution time for their enhanced Apriori algorithm is only sion tree. Also, note that the Nash H-learning relies on a
a fraction of the execution time of the standard Apriori algo- Markov model since the Q-learning technique is adapted from
rithm. Their results also show that as the size of the problem a Markov model and Nash H-learning is itself an adaptation of
grows, execution time grows less quickly for their enhanced Q-learning. The other two mentioned algorithms operate with-
algorithm than the standard algorithm. out a Markov model or BN and rather work on rules. In order
Rashidi and Cook [47] discovered another problem with to determine its results, the Apriori algorithm evaluates the
the Apriori algorithm within a smart environment. The algo- candidate rules that it generates two metrics, namely support
rithm was originally designed to discover frequent itemsets, and confidence which are defined above. The flocking algo-
but a smart home environment also requires the ability to rithm uses three rules in order group similar objects together:
discover periodic itemsets. In order to address this problem, 1) alignment; 2) separation; and 3) cohesion.
Rashidi and Cook [47] designed a variant of the Apriori 3) Data Type: Just as the algorithms structures differ at
algorithm that is called frequent and periodic activity miner times, so does the information that they are gathering. They
(FPAM). It defines one hour and one day granules of time all retrieve data in order to predict future events, but they most
in order to recognize periodic activities. After FPAM deter- definitely do not all get the same data. For the Nash H-learning
mines its candidate itemsets, it classifies them as periodic or algorithm, it is mainly concerned with getting the location of
frequent. It is possible for an itemset to be both periodic and all users, and then uses this to try and conserve energy. Going
frequent; however, FPAM will report it as frequent only. a slightly different route, the flocking algorithm instead tries to
get all information pertaining to each users’ daily activities (or
ADLs). This can allow the smart environment to adapt to fit
F. Summary of Algorithms the users’ needs. The SPEED algorithm instead takes data in
All prediction algorithms that are used within a smart home terms of sequences of events. From this, it attempts to predict
environment have a common goal, which is to allow the system potential events that will occur in the future. However, the
to make an educated prediction based on previous information SPEED algorithm does not take time into consideration when
in order to make the users life easier and more comfort- doing this. Yet, note that the Apriori algorithm is often used in
able. Even though this is the main role for every prediction looking at temporal relations. Now, the Active LeZi algorithm
algorithm, they differ in their approaches to storing, interpret- does not focus on only one area to gather data from. Instead,
ing, and mining data for the system. The following sums up it can be used to get information on location and time that
these five algorithms presented above in both similarity and certain activities occur. As can be observed, although there is
difference in many aspects, which is highlighted in Table I. some overlap, these five algorithms gather data that pertains
1) Information Presentation: The most widely cited to various aspects of the environment.
prediction algorithm used in a smart home is the Active LeZi. 4) Genealogy: It seems common for a prediction algorithm
This algorithm, as previously stated, is an adaptation of the to be a modification or improvement of an existing algo-
LZ78 compression algorithm. As it parses the data, the Active rithm. For example, Active LeZi is an improvement to LeZi
642 IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE 2017

Update which is an improvement to LZ78. Extensions exist B. Temporal Relations


for Active LeZi and SPEED in order to take time into con- One potential flaw in smart home prediction is the modeling
sideration. Along a similar line of thought, both the flocking of an activity occurrence as a single point in time. In actuality,
and Nash H-learning algorithms are also adapted slightly from an activity spans an interval of time with a starting point and
previously known works. Flocking is a clustering algorithm, an ending point. For example, an activity may start when the
though it does not require knowing the number of clusters up living room light is turned on. As the activity progresses, the
front, unlike other known clustering algorithms. Also, Nash H- TV is powered on and later powered off. The living room light
learning, as pointed out earlier, is adapted from the Q-learning is powered off which ends the activity [50].
technique to work on multiagent systems or environments. The Jakkula and Cook [51] proposed a framework for smart
Apriori algorithm has shortcomings that prevent it from being homes based on temporal logic. They base their framework
used in its native form in a smart home environment; however, on the 13 temporal relations included in Allen’s temporal
it becomes practical with certain optimizations. logic: 1) before; 2) after; 3) meets; 4) meet-by; 5) overlaps;
6) overlapped-by; 7) starts; 8) started-by; 9) finishes;
10) finished-by; 11) during; 12) contains; and 13) equals. This
IV. A LGORITHM E NHANCEMENTS provides additional insight into the timing of events than a
stream of symbols which represent individual events which
Some ideas and concepts have been introduced, which,
can enhance prediction algorithms. With this information, an
however, cannot stand alone as complete prediction algo-
algorithm is able to create predictions with temporal con-
rithms. They are designed to be used in conjunction with a
straints resulting in better detection of anomalies. For example,
prediction algorithm. While these enhancements do not fall
if event A usually overlaps event B, event B occurring after
into the category of prediction algorithms, they aim to increase
event A would be considered an anomaly. Also, temporal rela-
performance when paired with a prediction algorithm. This
tions allow for the calculation of the probability of event
section reviews these enhancements.
X based on the occurrence of events temporally related to
X [51]. In the knowledge discovery and pattern recognition
of smart homes, this approach faces some challenges as noted
A. Episode Discovery by Jakkula and Cook [52]. One challenge is the ambiguity
Episode discovery is a data-mining algorithm that of Allen’s relations that it is possible to have two events that
searches for behavioral patterns in a string of data [48]. can be correctly described by more than one temporal relation.
Heierman and Cook [49] have proposed a framework for smart Allen did not define a method of choosing a single “best” rela-
homes based on this algorithm. The collected raw data does not tion for a given set of events. In order to address the ambiguity
indicate where periods of device interaction, or episodes, begin problem, Jakkula and Cook [52] defined boundary conditions
and end. The framework searches for the beginning and end of involving the start and end times of the related events for
episodes while balancing episode length with frequency and each of the thirteen temporal relation. Their proposed algo-
regularity. This approach discovers significant episodes that rithm relies on these boundary definitions in order to identify
occur on a recurring basis such as a daily wake-up routine or the relationship of two events.
weekly lawn watering. Another problem is about the highly detailed time data,
The episode discovery algorithm begins by partitioning the which is common in smart environments. In order to solve
input stream of events into maximal episodes. An episode this problem, Jakkula and Cook [42] used an application of
window is used to enforce the rule that all events in a maxi- the Apriori algorithm to identify associations between events.
mal episode must occur within a specified time period. From The Apriori algorithm mines the data for sets of events that
the maximal episodes, itemsets are created. These itemsets happen together frequently. It returns sets of events that meet
include the maximal episodes themselves as well as subsets a minimum support threshold. In many cases, the returned fre-
of the maximal episodes. Next, the itemset space is pruned. quent sets of events will have multiple temporal relations. In
After pruning, the remaining itemsets are considered signifi- this case, the relation that occurs at the highest number of
cant episode candidates. A significance value is computed for times is chosen.
each candidate, and significant episodes are chosen using a In another work, Jakkula and Cook [42] proposed an algo-
greedy approach with a minimum compression threshold. rithm for prediction enhanced by temporal rules which oper-
This method improves prediction algorithms by filtering ates on the output of the Active LeZi predictor. In experiments
the input stream before it is provided to the prediction algo- with small datasets, the prediction accuracy with temporal
rithm as training data. Heierman and Cook [49] identified rules is marginally better than that without temporal rules.
two algorithms that expect to perform slowly in smart home It is expected that with larger datasets, the accuracy of the
environments due to the noisy training data: incremental prob- enhanced prediction will see a large improvement.
abilistic action modeling (IPAM) and back-propagation neural Many prediction algorithms actually fall into machine
network (BPNN). Episode discovery was evaluated in a case learning and many new learning algorithms have been
study upon these two prediction algorithms. IPAM improved proposed [53], [53]–[57], which can be used to enhance the
from 41.0% accuracy to 73.6% accuracy with the addition of prediction as well. More recent prediction algorithms have
episode discovery in the case study. Similarly, the accuracy of been proposed and they are mostly based on those reviewed
BPNN improved from 63.6% to 85.6%. above [58]–[62].
WU et al.: SURVEY ON PREDICTION ALGORITHMS IN SMART HOMES 643

V. C ONCLUSION [20] H. Si, Y. Kawahara, H. Morikawa, and T. Aoyama, “A stochastic


approach for creating context-aware services based on context histo-
The prediction algorithms play key role in providing the ries in smart home,” in Cognitive Sci. Res. Paper, Univ. Sussex, Sussex,
intelligence for a smart home by mining the sensed environ- U.K., 2005, pp. 37–42.
mental and human activity data. This paper comprehensively [21] S. P. Rao and D. J. Cook, “Predicting inhabitant action using action and
task models with application to smart homes,” Int. J. Artif. Intell. Tools,
reviews prediction algorithms proposed for smart environ- vol. 13, no. 1, pp. 81–99, 2004.
ments in literature. This paper first presents the system models [22] E. Nazerfard and D. J. Cook, “Bayesian networks structure learning
and data that are generally used in prediction algorithms for for activity prediction in smart homes,” in Proc. 8th Int. Conf. Intell.
Environ. (IE), Guanajuato, Mexico, 2012, pp. 50–56.
smart homes. The prediction algorithms are then discussed in [23] C. Debes et al., “Monitoring activities of daily living in smart homes:
details on their features, strengths and weakness. They are also Understanding human behavior,” IEEE Signal Process. Mag., vol. 33,
compared and summarized on the models and data types used no. 2, pp. 81–94, Mar. 2016.
[24] L. Chen, C. D. Nugent, and H. Wang, “A knowledge-driven approach
in prediction. Some enhancements to these algorithms are also to activity recognition in smart homes,” IEEE Trans. Knowl. Data Eng.,
reviewed. vol. 24, no. 6, pp. 961–974, Jun. 2012.
[25] M. Adipradhana, I. G. B. B. Nugraha, and S. H. Supangkat, “Intervention
of non-inhabitant activities detection in smart home environment,” in
R EFERENCES Proc. Int. Conf. ICT Smart Soc. (ICISS), Jakarta, Indonesia, 2013,
pp. 1–5.
[1] D. J. Cook et al., “MavHome: An agent-based smart home,” in Proc. [26] S. Zhang, S. McClean, B. Scotney, P. Chaurasia, and C. Nugent, “Using
PerCom, vol. 3. Fort Worth, TX, USA, 2003, pp. 521–524. duration to learn activities of daily living in a smart home environment,”
[2] M. R. Alam, M. B. I. Reaz, and M. A. M. Ali, “A review of smart in Proc. 4th Int. Conf. Pervasive Comput. Technol. Healthcare, Munich,
homes—Past, present, and future,” IEEE Trans. Syst., Man, Cybern. C, Germany, 2010, pp. 1–8.
Appl. Rev., vol. 42, no. 6, pp. 1190–1203, Nov. 2012. [27] P. Zhuang and H. Liang, “Energy storage management in smart homes
[3] M. B. I. Reaz, “Artificial intelligence techniques for advanced smart based on resident activity of daily life recognition,” in Proc. IEEE Int.
home implementation,” Acta Tech. Corviniensis Bull. Eng., vol. 6, no. 2, Conf. Smart Grid Commun. (SmartGridComm), Miami, FL, USA, 2015,
p. 51, 2013. pp. 641–646.
[4] S. K. Das, D. J. Cook, A. Battacharya, E. O. Heierman, and [28] J. Petzold, F. Bagci, W. Trumler, and T. Ungerer, “Next location
T.-Y. Lin, “The role of prediction algorithms in the MavHome smart prediction within a smart office building,” in Cognitive Sci. Res. Paper,
home architecture,” IEEE Wireless Commun., vol. 9, no. 6, pp. 77–84, Univ. Sussex, Sussex, U.K., 2005, pp. 69–72.
Dec. 2002. [29] M. Weiser, “The computer for the 21st century,” Sci. Amer., vol. 265,
[5] E. M. Tapia, S. S. Intille, and K. Larson, “Activity recognition in the no. 3, pp. 94–104, 1991.
home using simple and ubiquitous sensors,” in Proc. Int. Conf. Pervasive [30] A. Roy et al., “Location aware resource management in smart homes,”
Comput., Vienna, Austria, 2004, pp. 158–175. in Proc. 1st IEEE Int. Conf. Pervasive Comput. Commun. (PerCom),
[6] D. J. Cook and S. K. Das, “How smart are our environments? An updated Fort Worth, TX, USA, 2003, pp. 481–488.
look at the state of the art,” Pervasive Mobile Comput., vol. 3, no. 2, [31] A. Dixit and A. Naik, “Use of prediction algorithms in smart homes,”
pp. 53–73, 2007. Int. J. Mach. Learn. Comput., vol. 4, no. 2, pp. 157–162, 2014.
[7] A. Roy, S. K. Das, and K. Basu, “A predictive framework for location- [32] D. J. Cook, M. Huber, K. Gopalratnam, and M. Youngblood, “Learning
aware resource management in smart homes,” IEEE Trans. Mobile to control a smart home environment,” in Proc. Innov. Appl. Artif. Intell.,
Comput., vol. 6, no. 11, pp. 1270–1283, Nov. 2007. Acapulco, Mexico, 2003.
[8] S. K. Das and D. J. Cook, “Health monitoring in an agent-based smart [33] J. Ziv and A. Lempel, “Compression of individual sequences via
home by activity prediction,” in Proc. Int. Conf. Smart Homes Health variable-rate coding,” IEEE Trans. Inf. Theory, vol. IT-24, no. 5,
Telematics, vol. 14. Singapore, 2004, pp. 3–14. pp. 530–536, Sep. 1978.
[9] A. Lotfi, C. Langensiepen, S. M. Mahmoud, and M. J. Akhlaghinia, [34] C. Zeeh. (2003). The Lempel Ziv Algorithm. Accessed on
“Smart homes for the elderly dementia sufferers: Identification and Nov. 3, 2003. [Online]. Available: http://w3studi.informatik.uni-
prediction of abnormal behaviour,” J. Ambient Intell. Humanized stuttgart.de/∼zeehca/Seminar/LempelZivReport.pdf
Comput., vol. 3, no. 3, pp. 205–218, 2012. [35] K. Gopalratnam and D. J. Cook, “Active LeZi: An incremental parsing
[10] P. C. Roy et al., “A possibilistic approach for activity recognition in algorithm for sequential prediction,” Int. J. Artif. Intell. Tools, vol. 13,
smart homes for cognitive assistance to Alzheimer’s patients,” in Proc. no. 4, pp. 917–929, 2004.
Activity Recognit. Pervasive Intell. Environ., 2011, pp. 33–58. [36] A. Bhattacharya and S. K. Das, “LeZi-update: An information-theoretic
[11] R. Li, B. Lu, and K. D. McDonald-Maier, “Cognitive assisted liv- approach to track mobile users in PCS networks,” in Proc. 5th Annu.
ing ambient system: A survey,” Digit. Commun. Netw., vol. 1, no. 4, ACM/IEEE Int. Conf. Mobile Comput. Netw., Seattle, WA, USA, 1999,
pp. 229–252, 2015. pp. 1–12.
[12] S. Wang and G. Zhou, “A review on radio based activity recognition,” [37] H. Fang and J. Ruan, “An improved position prediction algorithm based
Digit. Commun. Netw., vol. 1, no. 1, pp. 20–29, 2015. on active LeZi in smart home,” in Proc. Int. Conf. Comput. Sci. Amp
[13] L. Yang, Y. Ren, and W. Zhang, “3D depth image analysis for indoor Service Syst. (CSSS), Nanjing, China, 2012, pp. 1733–1736.
fall detection of elderly people,” Digit. Commun. Netw., vol. 2, no. 1, [38] A. Shukla, G. Ojha, S. Acharya, and S. Jain, “A customized flocking
pp. 24–34, 2016. algorithm for swarms of sensors tracking a swarm of targets,” arXiv
[14] E. J. Rechy-Ramirez and H. Hu, “Bio-signal based control in assistive preprint arXiv:1311.6981, 2013.
robots: A survey,” Digit. Commun. Netw., vol. 1, no. 2, pp. 85–101, [39] C. Moeslinger, T. Schmickl, and K. Crailsheim, “A minimalist flocking
2015. algorithm for swarm robots,” in Proc. Eur. Conf. Artif. Life, Budapest,
[15] R. Aipperspach, E. Cohen, and J. Canny, “Modeling human behavior Hungary, 2009, pp. 375–382.
from simple sensors in the home,” in Proc. Int. Conf. Pervasive Comput., [40] J. Lapalu, K. Bouchard, A. Bouzouane, B. Bouchard, and S. Giroux,
Dublin, Ireland, 2006, pp. 337–348. “Unsupervised mining of activities for smart home prediction,” Proc.
[16] S. Mahmoud, A. Lotfi, and C. Langensiepen, “Behavioural pattern iden- Comput. Sci., vol. 19, pp. 503–510, Jun. 2013.
tification and prediction in intelligent environments,” Appl. Soft Comput., [41] M. R. Alam, M. B. I. Reaz, and M. A. M. Ali, “SPEED: An inhabitant
vol. 13, no. 4, pp. 1813–1822, 2013. activity prediction algorithm for smart homes,” IEEE Trans. Syst., Man,
[17] Z. Ghahramani, “An introduction to hidden Markov models and Cybern. A, Syst., Humans, vol. 42, no. 4, pp. 985–990, Jul. 2012.
Bayesian networks,” Int. J. Pattern Recognit. Artif. Intell., vol. 15, no. 1, [42] V. R. Jakkula and D. J. Cook, “Using temporal relations in smart envi-
pp. 9–42, 2001. ronment data for activity prediction,” in Proc. 24th Int. Conf. Mach.
[18] J. E. Cook and A. L. Wolf, “Discovering models of software processes Learn., Corvallis, OR, USA, 2007, pp. 20–24.
from event-based data,” ACM Trans. Softw. Eng. Methodol., vol. 7, no. 3, [43] J. Hu and M. P. Wellman, “Nash Q-learning for general-sum stochastic
pp. 215–249, 1998. games,” J. Mach. Learn. Res., vol. 4, pp. 1039–1069, Nov. 2003.
[19] L. R. Rabiner, “A tutorial on hidden Markov models and selected appli- [44] N. Roy, A. Roy, and S. K. Das, “Context-aware resource management
cations in speech recognition,” Proc. IEEE, vol. 77, no. 2, pp. 257–286, in multi-inhabitant smart homes: A Nash H-learning based approach,”
Feb. 1989. in Proc. PerCom, Pisa, Italy, 2006, pp. 148–158.
644 IEEE INTERNET OF THINGS JOURNAL, VOL. 4, NO. 3, JUNE 2017

[45] D. Schweizer and H. Wache, “Learning frequent and periodic usage Jacob B. Rendall, photograph and biography not available at the time of
patterns in smart homes,” Ph.D. dissertation, School Bus., Univ. Appl. publication.
Sci. Arts Northwestern Switzerland (FHNW), Muttenz, Switzerland,
Feb. 2014.
[46] Y. Zhang and T. Qi, “Research on mining association behavior of smart
home users based on apriori algorithm,” in Proc. Int. Conf. Mater. Eng.
Inf. Technol. Appl., 2015, pp. 817–821.
[47] P. Rashidi and D. J. Cook, “Keeping the resident in the loop: Adapting Matthew J. Smith received the B.S. degree (summa cum laude) in computer
the smart home to the user,” IEEE Trans. Syst., Man, Cybern. A, Syst., science from Trine University, Angola, IN, USA, in 2014. He is currently
Humans, vol. 39, no. 5, pp. 949–959, Sep. 2009. pursuing the M.S. degree in software engineering at Ball State University,
[48] A. Achar, S. Laxman, and P. S. Sastry, “A unified view of the apriori- Muncie, IN, USA.
based algorithms for frequent episode discovery,” Knowl. Inf. Syst.,
vol. 31, no. 2, pp. 223–250, 2012.
[49] E. O. Heierman and D. J. Cook, “Improving home automation by dis-
covering regularly occurring device usage patterns,” in Proc. 3rd IEEE
Int. Conf. Data Min. (ICDM), Melbourne, FL, USA, 2003, pp. 537–540.
Shangyu Zhu, photograph and biography not available at the time of
[50] M. R. Alam, M. B. I. Reaz, M. A. M. Ali, and S. A. Samad, “Temporal
publication.
modeling of human activity in smart homes,” Informacije MIDEM,
vol. 41, no. 2, pp. 118–121, 2011.
[51] V. R. Jakkula and D. J. Cook, “Enhancing smart home algorithms using
temporal relations,” Technol. Aging, vol. 21, pp. 3–10, Jan. 2008.
[52] V. Jakkula and D. J. Cook, “Learning temporal relations in smart home
data,” in Proc. 2nd Int. Conf. Technol. Aging Canada, vol. 33. 2007.
[53] B. Gu et al., “Incremental learning for ν-support vector regression,” Junhong Xu, photograph and biography not available at the time of
Neural Netw., vol. 67, pp. 140–150, Jul. 2015. publication.
[54] B. Gu, X. Sun, and V. S. Sheng, “Structural minimax probability
machine,” IEEE Trans. Neural Netw. Learn. Syst., to be published.
[55] B. Gu and V. S. Sheng, “A robust regularization path algorithm for ν-
support vector classification,” IEEE Trans. Neural Netw. Learn. Syst., to
be published.
[56] Z. Pan, Y. Zhang, and S. Kwong, “Efficient motion and disparity esti- Honggang Wang (S’05–A’08–M’10–SM’13)
mation optimization for low complexity multiview video coding,” IEEE received the Ph.D. degree in computer engineering
Trans. Broadcast., vol. 61, no. 2, pp. 166–176, Jun. 2015. from the University of Nebraska–Lincoln, Lincoln,
[57] Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient NE, USA, in 2009.
multi-keyword fuzzy search over encrypted outsourced data with accu- He is currently an Associate Professor with
racy improvement,” IEEE Trans. Inf. Forens. Security, vol. 11, no. 12, the Department of Electrical and Computer
pp. 2706–2716, Dec. 2016. Engineering, University of Massachusetts at
[58] M. Marufuzzaman, M. B. I. Reaz, M. A. M. Ali, and L. F. Rahman, Dartmouth, Dartmouth, MA, USA. He has authored
“A time series based sequence prediction algorithm to detect activi- or co-authored over 100 papers. His current
ties of daily living in smart home,” Methods Inf. Med., vol. 54, no. 3, research interests include wireless health, body area
pp. 262–270, 2015. networks, cyber and multimedia security, mobile
[59] M. T. Moutacalli, A. Bouzouane, and B. Bouchard, “Sensors activation multimedia and cloud, wireless networks and cyber-physical systems, and
time predictions in smart home,” in Proc. 8th ACM Int. Conf. Pervasive big data in mHealth.
Technol. Related to Assistive Environ., 2015, Art. no. 37. Prof. Wang serves as the Chair/Co-Chair for several leading international
[60] S. Choi, E. Kim, and S. Oh, “Human behavior prediction for smart conferences and on the Editorial Board for several leading journals. He is an
homes using deep learning,” in Proc. IEEE RO-MAN, Gyeongju, Associate Editor-in-Chief for the IEEE I NTERNET OF T HINGS J OURNAL.
South Korea, 2013, pp. 173–179.
[61] S. T. M. Bourobou and Y. Yoo, “User activity recognition in smart homes
using pattern clustering applied to temporal ANN algorithm,” Sensors,
vol. 15, no. 5, pp. 11953–11971, 2015.
[62] J. Huang, Y. Meng, X. Gong, Y. Liu, and Q. Duan, “A novel deployment Qing Yang (GS’10) received the Ph.D. degree in
scheme for green Internet of Things,” IEEE Internet Things J., vol. 1, computer science from Auburn University, Auburn,
no. 2, pp. 196–205, Apr. 2014. AL, USA, in 2011.
He is a RightNow Technologies Assistant
Professor with the Gianforte School of Computing,
Montana State University, Bozeman, MT, USA. He
has authored or co-authored over 50 papers in pres-
tigious journals and conferences such as the IEEE
T RANSACTIONS ON D EPENDABLE AND S ECURE
C OMPUTING, IEEE INFOCOM, and IEEE CNS.
Shaoen Wu (M’14–SM’16) received the Ph.D. His current research interests include online social
degree in computer science from Auburn University, networks, trust assessment, vehicular networks, and the Internet of Things.
Auburn, AL, USA, in 2008.
He is currently an Assistant Professor of
Computer Science with Ball State University,
Muncie, IN, USA. He was an Assistant Professor
with the School of Computing, University of
Southern Mississippi, Hattiesburg, MS, USA, a Pinle Qin received the Ph.D. degree in electrical and
Research Scientist with ADTRAN Inc., Huntsville, computer engineering from the Dalian University of
AL, USA, and a Senior Software Engineer with Bell Technology, Dalian, China, in 2008.
Laboratories, Qingdao, China. His current research He is currently an Associate Professor with
interests include wireless and mobile networking, cyber security, cyber- the School of Computer Science and Control
physical systems, and cloud computing. Engineering, North University of China, Taiyuan,
Prof. Wu was a recipient of the Best Paper Award of IEEE ISCC 2008 China. His current research interests include com-
and ANSS 2011. He has served on the chairs and the committees of various puter vision, intelligent control, big data, and
conferences such as the IEEE INFOCOM, ICC, and Globecom, and as an machine learning.
Editor for several journals.

You might also like