Beruflich Dokumente
Kultur Dokumente
Pari Delir Haghighi, Arkady Zaslavsky, Shonali Krishnaswamy, Mohamed Medhat Gaber
Center for Distributed Systems and Software Engineering
Monash University, Australia
{pari.delirhaghighi, arkady.zaslavsky, shonali.krishnaswamy,, mohamed.gaber}@infotech.monash.edu.au
2. Related Work
2
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
SAAP layer is built on the top of the data stream weight represents the importance of its assigned
mining algorithms running on mobile devices and condition relative to other conditions in defining a
provides them with situation-aware adaptation. The situation. An example of a FSI rule is as follows:
next section discusses the FSI technique. if Room-Temperature is hot and Heart-Rate is
fast and ( Age is middle-aged or old) then situation
4. Fuzzy Situation Inference (FSI) is heat stroke
The next subsection discusses situation reasoning.
FSI is a situation modeling and reasoning approach
that integrates fuzzy logic into the Context Spaces (CS) 4.3. Situation Reasoning
model [4]. FSI uses the benefits of the CS model for
supporting pervasive computing environments while To reason about a situation, rules need to be
incorporating fuzzy logic to deal with uncertainty evaluated to produce a single output that determines
associated with vague and real-world situations. the membership degree of the consequent [19]. The
conditions joined with the OR operator are evaluated
4.1. The Context Spaces model using the maximum function. However, to evaluate the
conditions joined with the AND operator, FSI provides
four reasoning techniques as shown in Table 1.
The Context Spaces model (hereafter CS)
represents contextual information as geometrical
Table 1. Reasoning techniques
objects in multidimensional space called situations [4].
The concept of a situation space is characterized by a Heuristic: weights and contribution level
set of regions. Each region is a set of acceptable CS n
reasoning. Fuzzy logic uses multi-value logic and has Confidence = ¦ w i . Pr( a it ∈ Ai )
i =1
the benefit of dealing with this level of uncertainty by
assigning membership degrees to values. where ai ∈ CAS ∪ CAA
FSI n
3
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
These techniques integrate fuzzy logic into the CS than the reliability of reading. Using this option, the
reasoning methods to provide another aspect of probability value is calculated in the following format:
uncertainty (i.e. uncertainty of situations and delta
changes of context) in the computation of confidence 1) Pr(e j ≤ a it − min( Ai j )) − Pr( e j ≤ a it − max( Ai j )).
value for the occurrence of a situation.
The situation reasoning techniques of CS are based
on four heuristics that are introduced to manage where a it denotes the sensed value of the context
uncertainty in pervasive computing environments.
attribute, e j represents the sensor reading error (i.e.
These heuristics are as follows: i) relative weights of
context attributes and confidence level of values; ii) a it - a it ) and min( Ai j ) and max( Ai j ) represent
sensors inaccuracy; iii) symmetric and asymmetric
minimum and maximum values of the region.
context attributes; iv) and partial and complete
The second reasoning method of CS deals with
containment of symmetric context attributes. Table 1
uncertainty factoring in inaccuracies of sensors
depicts reasoning methods of CS, their FSI equivalent
however this equation does not reflect delta changes of
that are combined with fuzzy logic and their
values in the equation and is not adequate to reason
underlying heuristics and theoretical concepts.
about vague situations. The FSI equivalent technique
The next subsections discuss each heuristic and
not only incorporates the contribution level associated
reasoning technique in more detail.
with sensors inaccuracy but includes the membership
of the values as another factor affecting the
4.3.1. Weights and contribution level. The first
contribution level. In the FSI model, we first calculate
reasoning technique of CS is based on the weights of
the correct value based on the reliability or error rate
context attributes and the level of confidence of
and then pass it to the membership function. The
attributes values. Weights are assigned to context
function f calculates the correct value of the context
attributes and represent relative importance of each
context attribute for inferring a situation. Level of based on the inaccuracy value ei . If ei is a reliability
confidence is assigned to each element and reflects rate, the sensed value is multiplied by it and if it is an
how that element relates to the modeled situation. In error rate (i.e. ±) it is added to the sensed value.
this heuristic, the contribution function that computes
the contribution level is proposed at a conceptual level 4.3.3. Symmetric and asymmetric context
and its implementation is later introduced in the second attributes. The third reasoning technique of CS
reasoning technique based on sensors inaccuracy. introduces the concepts of symmetric context attribute
In FSI, the concept of weights is associated with
linguistic variables (i.e. context attributes). The
CAS and asymmetric context attribute CAA . A
concept of contribution level is similar to the symmetric context attribute increases the confidence in
membership degree of elements in a fuzzy set but they inferring a situation if its value is within the
are implemented using membership functions. The corresponding region and decreases the confidence if it
result of wi μ ( x i ) represents a weighted membership is outside that region (e.g. reasoning about the
hypertension situation based on blood pressure). An
degree of xi and n represents the number of conditions asymmetric context attribute increases the confidence
in a rule (1in). in inferring a situation if its value is within the
corresponding region but would not decrease the
4.3.2. Sensors inaccuracy. To provide automatic confidence if it is outside that region (e.g. reasoning
computation of the contribution level at run-time, the about the heat stroke situation based on age).
second reasoning method of CS uses the impact of Whenever an asymmetric attribute is not contained
sensor inaccuracies and unreliability as a determining within its region, the redistribution method assigns 0 to
factor to compute the contribution level. This method the weight of the attribute and recalculates the relative
computes the probability of a context attribute correct weights for the remaining attributes as follows.
value a it being contained in the region Ai . To n
compute the probability value based on the reliability 2) w i = wi / ¦ wi
of a sensor, the reliability of reading (e.g. 95%) is used i =1
to represent the probability value (i.e. =0.95).
The second option to compute the probability value The concept of symmetric and asymmetric
is to integrate the sensors inaccuracy of reading rather attributes and its corresponding reasoning technique is
applied into FSI (as shown in Table 1). However, since
4
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
values that linguistic variables take are not numeric resources in real time. Lightweight data stream mining
(i.e. these values are called terms that represent fuzzy techniques such LWC, LWCLass, RA-Cluster, ERA-
sets), the concept of symmetric and asymmetric Cluster, and DRA-Cluster [2-3, 20-22] are adaptive to
concepts are applied to the values of fuzzy sets availability of resources via adjusting the algorithm
associated with linguistic variables. parameters. These parameters control output, input
and/or the process of the algorithm. In these
4.3.4. Partial and complete containment. The fourth algorithms, the adaptation process is done through
heuristic deals with the fact that the value of an Algorithm Granularity (AG) approach.
important context attribute should affect the result of AG has three different variations of AOG
the situation inference more than the other attributes (Algorithm Output Granularity), AIG (Algorithm Input
(i.e. less important ones) and when several attributes Granularity) and APG (Algorithm Processing
are significant for the evaluation of a situation we may Granularity) [21-22]. AOG controls the algorithm
want to ensure that all of them are contained in their output rate based on the availability of memory via
regions. This heuristic has been integrated into the changing the data stream mining algorithm parameters
fourth reasoning technique that aims to address the to encourage or discourage the creation of new output
trade-off between complete containment of all structures. Similarly AIG and APG [22] control the
symmetric context attributes (i.e. when all values of input rate and consumption of processing power
symmetric attributes are contained in their according to the battery level and CPU usage
corresponding regions) and their individual respectively.
contribution using the third reasoning technique. This We have inspired by the concepts of AG and
heuristic does not apply to asymmetric attributes developed three different adaptation strategies. These
because they do not decrease the confidence for the strategies include resource-aware, situation-aware and
occurrence of a situation. hybrid strategies as shown in Figure 2.
To address the trade-off between complete and
partial containment, the fourth reasoning technique
presents each aspect of containment with a dimension
using utility weights (i.e q1 and q 2 ) and combines
them towards inferring the occurrence of a situation.
The utility weights of two dimensions determine which
aspect of containment is more important (i.e. complete
or partial).
The concept of partial and complete containment
and its reasoning technique are applied to FSI. Similar
to the third reasoning method, FSI maps values of
symmetric context attributes into the values of fuzzy
sets corresponding to symmetric linguistic variables.
Results of situation reasoning using the techniques
discussed earlier suggests the degree of confidence in
the occurrence of a situation. In FSI, if the output of a
rule evaluation for the hypertension situation yields a
degree of 0.885, we can suggest that the level of Figure 2. Adaptation of data stream mining
confidence in the occurrence of hypertension is
0.885. This value can be compared to a confidence AE constantly monitors occurring situations that
threshold İ between 0 and 1 (i.e. predefined by the are inferred by FSI and availability of resources
applications designers) to determine whether a reported by RM.
situation is occurring. Each pre-defined situation needs to be assigned a
The next section discusses the component of the criticality value (i.e. a value between 0 and 1) that
AE (Adaptation Engine). indicates their importance. For both situations (S) and
computational resources (R), there are two thresholds
5. Adaptation Engine (AE) (i.e. lower and upper bounds), a value between 0 and 1,
which indicate safe, medium and critical levels. The
The AE (Adaptation Engine) is responsible for higher the value is, the higher the situation importance
gradual tuning of data stream processing parameters and resource usage is. Based on these levels of
according to the occurring situation/s and available criticality for situations and resources, there can be
nine possible variations (cases) of adaptation at run
5
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
time. Controller that is a subcomponent of AE makes stream, available memory, and time constraints to fill
decisions on which strategy needs to be performed the memory with generated knowledge (data mining
according to these thresholds. These nine cases are output).
presented in Table 2. We have allocated the adaptation The last stage in AOG approach is the knowledge
strategies according to these nine cases. When integration phase. This stage represents the merging of
resources are critical it means that the mobile device generated results when the memory is full. This
can not continue the mining operations and the integration allows the continuity of the mining process
adaptation strategies that we provide are not adequate on resource-constrained devices.
to address the issue. Therefore other strategies such as The next subsection discusses situation-aware
migration of the data or the process need to be adaptation strategy based on the results of the FSI.
performed which are out of the scope of this project.
5.2. Situation-aware Adaptation Strategy
Table 2. Adaptation Cases
Cases Adaptation strategy Situation-aware adaptation in AE is performed
when resources are available and at safe level.
1- if R at safe level and S Situation-aware strategy
Situation-aware adaptation occurs based on occurring
at safe level
2- if R at safe level and S Situation-aware strategy
situations inferred by FSI. These results are multiple
at medium level situations with different level of confidence. To
3- if R at safe level and S Situation-aware strategy provide a fine-grained adaptation and reflecting the
at critical level level of confidence of each situation in the adaptation
4- if R at medium level Resource-aware strategy phase, we compute weighted average of the data
and S at safe level mining parameter value based on confidence values of
5- if R at medium level Hybrid strategy situations and the pre-set value of the parameter for
and S at medium level each situation. The pre-set values of parameters are
6- if R at medium level Hybrid strategy automatically calculated based on the importance
and S at critical level values of the situations that will be discussed further in
7- if R at critical level and Other strategies e.g.
S at safe level migration
the evaluation section. The situation-aware adaptation
8- if R at critical level and enables reflecting all the results of situation inference
S at medium level in the adaptation of parameter values and is
9- if R at critical level and represented as follows:
S at critical level
n n
Resource-aware adaptation strategy occurs when where p j represents the set value of a parameter
the situation is at safe level but resource availability is for a pre-defined situation Si , μi denotes the
at medium level. This is because normal situations do
membership degree of situation Si where 1in and n
not require frequent monitoring and the results of
resource-aware adaptation do not contradict the represents the number of pre-defined situations, and
requirements of normal situations. Resource-awareness p j represents aggregated value of the parameter.
is inspired by the AG approach. One of the AOG-based Situation-aware adaptation itself results in cost-
clustering algorithms is called LightWeight Clustering efficiency because when a situation has a lower
(LWC) [29]. LWC considers a threshold distance importance value, the computed set value for the
measure for clustering of data. Increasing this threshold will be a higher value. This decreases the
threshold discourages forming of new clusters and in output of the LWC algorithm and reduces the memory
turn reduces resource consumption. consumption.
AOG is a three-stage, resource-aware distance- The next subsection describes hybrid adaptation
based mining data streams approach. The process of strategy.
mining data streams using AOG starts with a mining
phase. In this step, a value of threshold distance 5.3. Hybrid Adaptation Strategy
measure is determined. This threshold has the ability to
control the output rate of the running mining algorithm. When resources are at medium level and situations
The second stage in AOG-mining approach is the are at medium or critical level (i.e. cases 5 and 6 in
adaptation phase. In this phase, the threshold value is Table 2), the controller applies the hybrid adaptation
adjusted to cope with the data rate of the incoming
6
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
strategy. When the adaptation cases 5 or 6 occurs, fluctuations. The health monitoring application
resource-aware and situation-aware adaptation performs situation reasoning and situation-aware
strategies each compute different values according to adaptation in real-time on the mobile device using the
resource availability and occurring situations LWC algorithm. Status bars on the mobile phone
respectively. Therefore there is a trade-off between the displays the level of certainty and confidence in the
results of these two strategies. Hybrid adaptation occurrence of each situation.
strategy addresses this issue by computing the average The evaluation of FSI and adaptation engine is
value of parameter based on the results of the two presented in the next section.
strategies and criticality values of the situation and
resource as follows: 7. Evaluation
4) p I = ( p R .criticalit y R ) + ( p S .criticalit y S )
For evaluation of SAAP, we have performed two
criticalit y R + criticalit y S evaluations. First evaluation is a comparative
evaluation of FSI, CS and Dempster-Shafer and second
Having discussed the theoretical framework of our evaluation focuses on the adaptation of threshold
work, the following section presents the parameter of LWC according to occurring situations.
implementation and evaluations we have performed.
7.1. Evaluation of FSI
6. Implementation To evaluate the FSI model, we have compared the
FSI situation reasoning technique to the CS and
We have implemented a prototype of health Dempster-Shafer (hereafter DS) reasoning approaches.
monitoring application based on FSI in J2ME and The purpose of this evaluation is first to validate the
deployed it on a Nokia N95 (shown in Figure 3). The FSI model against a well-known reasoning technique
prototype reasons about situations of normal, pre- such as DS and a context model developed for
hypotension, hypotension, pre-hypertension and pervasive computing environments such as CS. The
hypertension. This application can be used by second objective of the evaluation is to highlight the
patients who suffer from blood pressure fluctuations. A benefits of the FSI to deal with uncertain situations.
trapezoidal membership function is used to compute In this evaluation, we have considered situations of
membership degree of context values. Contextual hypotension, normal and hypertension. These
information used includes systolic and diastolic blood situations are defined using context attributes of
pressure (SBP and DBP) and heart rate (HR). systolic blood pressure (SBP) and diastolic blood
pressure (DBP) with the scale of 40-170 and 20-150
mm Hg and heart rate (HR) with the range of 20-150
bpm.
Table 3 depicts modeling of the three situations in
the CS model including the weights of attributes and
their corresponding regions of values. Assigned
weights are 0.4 for SBP and DBP and 0.2 for HR.
7
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
Table 4. Situation definitions in FSI The dataset used for the evaluation consists of 131
Situation Linguistic Variable Terms context states and their scales contribute to the
represented 1=SBP low, normal, high occurrence of each pre-defined situation as well as the
below via FSI 2=DBP low, normal, high uncertain situations that occurs when situations evolve.
rules 3=HR slow, normal, fast Figure 4 presents the results of the evaluation of
Rule1: if SBP is low and DBP is low and HR is low then CS, DS and FSI for situation reasoning about
situation is hypotension hypotension, normal and hypertension.
Rule2: if SBP is normal and DBP is normal and HR is
normal then situation is normal
Rule3: if SBP is high and DBP is high and HR is high then 1.2
situation is hypertension 1
0.8
To apply the DS algorithm for reasoning about situations, FS_Hypo
0.6 CS_Hypo
we use the Dempster’s rule of combination. The normalized
DS_Hypo
version of the combination rule is as follows. 0.4
0.2
5) m( R ) =
¦P∩Q= R mi ( P).m j (Q) 0
1 − ¦P ∩Q =φ mi ( P).m j (Q)
1 11 21 31 41 51 61 71 81 91 101 111 121 131
1.2
Event N L H U 0
SBPLow (40-85) 0 0.7 0 0.3 1 11 21 31 41 51 61 71 81 91 101 111 121 131
SBPMed(86-135) 0.7 0 0 0.3
SBPHigh(136- 0 0 0.7 0.3 Figure 4. Results of the evaluation
180)
DBPLow(20-60) 0 0.7 0 0.3 Figure 4 shows three approaches of CS, DS and FSI
DBPMed(61-110) 0.7 0 0 0.3 have a relatively similar trend according to context
DBPHigh(110- 0 0 0.7 0.3
changes. When the data corresponds to a pre-defined
130)
HRSlow(20-45) 0.2 0.4 0 0.4 situation the results of three approaches almost
HRMed(46-85) 0.4 0.2 0.2 0.2 overlap. However, when changes of data indicate the
HRFast(86-130) 0.2 0 0.4 0.4 occurrence of an unknown and uncertain situation,
differences of reasoning results between CS, DS and
Mass values are assigned in a way that they reflect FSI are more apparent.
to what degree each event indicates a situation. Since Compared to FSI, the results of situation reasoning
we have based our situations on three context by the CS and DS methods show sudden rises and falls
attributes, we define three mass functions with sharp edges when situations change which do not
corresponding. Then we apply DS combination over all match the real-life situations. This is because the DS
propositions and evidence. and CS approaches do not deal with delta changes of
8
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
the values and are not able to reflect the gradual number of the output (clusters) that is required for
evolution of one situation to another situation. When closer monitoring of more critical situations.
the value of context attributes decreases or increases,
its membership degree also increases and decreases 1.2
accordingly and gradually. This enables FSI to provide
L e v e l o f C o n fi d e n c e o f S itu a tio n
more accurate situation reasoning results in terms of 1
9
Proceedings of the 42nd Hawaii International Conference on System Sciences - 2009
with The Eighth Pacific-Asia Conference on Knowledge Systems, In Pervasive Health Conference and Workshops,
Discovery and Data Mining, Sydney, Australia, 2004. 2006.
[13] H. Mei, I. Widya, A. Halteren and B. Erfianto, A
[2] M.M. Gaber, S. Krishnaswamy, and A. Zaslavsky, Flexible Vital Sign Representation Framework for Mobile
Resource-Aware Mining of Data Streams, Journal of Healthcare, 2007.
Universal Computer Science. 11(8), 2005, pp.14401453. [14] G. Brettlecker, H. Schuldt, and R. Schatz,
Hyperdatabases for Peer-to-Peer Data Stream Processing,
[3] M.M. Gaber, A. Zaslavsky and S. Krishnaswamy, A In Proceedings of the IEEE International Conference on Web
Cost-Efficient Model for Ubiquitous Data Stream Mining, Services (ICWS'04). San Diego, California, 2004..
Proceedings of the Tenth International Conference on
Information Processing and Management of Uncertainty in [15] C. Chen, H. Agrawal, M. Cochinwala and D.
Knowledge-Based Systems, Perugia Italy, 2004. Rosenbluth, Stream query processing for healthcare bio-
sensor applications, In Proceedings of the 20th International
[4] A. Padovitz, S. Loke, and A. Zaslavsky, Towards a Conference on Data Engineering (ICDE'04). Boston, MA,
Theory of Context Spaces, In Proceedings of the 2nd IEEE USA: IEEE Computer Society, 2004.
Annual Conference on Pervasive Computing and
Communications, Workshop on Context Modeling and [16] A. Padovitz, A. Zaslavsky and S. Loke, A Unifying
Reasoning ( CoMoRea ), Orlando, Florida: IEEE Computer Model for Representing and Reasoning About Context under
Society, 2004. Uncertainty, 11th International Conference on Information
Processing and Management of Uncertainty in Knowledge-
[5] D. Konstantas, V. Jones, and R. Bults, MobiHealth- Based Systems (IPMU), Paris, France), 2006.
Innovative 2.5/3G Mobile Services and Applications for
Healthcare, 2007 [17] Jang, J.R., Sun, C. and Mizutani E., Neuro-Fuzzy and
Soft Computing: A Computational Approach to Learning and
[6] P. Rubel, J. Fayn, G. Nollo, D. Assanelli, B. Li, L. Machine Intelligence. Prentice-Hall: Upper Saddle River, NJ,
Restier, S. Adami, S. Arod, H. Atoui, M. Ohlsson, L Simon- 1997.
Chautemps, D. Te´lisson, C. Malossi, G. Ziliani, A. Galassi,
L. Edenbrandt, and P. Chevalier, Toward Personal eHealth [18] Bruce, G. Buchanan B.G. and Shortliffe, E.D., Rule-
in Cardiology: Results from the EPI-MEDICS Telemedicine based expert systems : the MYCIN experiments of the
Project, Journal of Electrocardiology 2005, 38: pp. 100-106. Stanford Heuristic Programming Project. Reading, Mass:
Addison-Wesley, 1984.
[7] K. Laerhoven, L. Benny, J. Ng J., S. Thiemjarus, R. King,
S. Kwan, H. Gellersen, M. Sloman, O. Wells, P. Needham, [19] Zimmermann, H., Fuzzy Set Theory - and Its
N. Peters, A. Darzi, C. Toumazou, G. Yang, "Medical Applications. Kluwer Academic Publishers, Norwell,
healthcare monitoring with wearable and implantable Massachusetts, 1996.
sensors", UbiHealth 2004: The 2nd International Workshop
on Ubiquitous Computing for Pervasive Healthcare [20] M.M. Gaber, S. Krishnaswamy, and A. Zaslavsky, On-
Applicationsm, 2004. board Mining of Data Streams in Sensor Networks, A Book
Chapter in Advanced Methods of Knowledge Discovery
[8] P. Leijidekkers, and V. Gay, Personal Heart Monitoring from Complex Data, (Eds.) S. Badhyopadhyay, U. Maulik, L.
and Rehabilitation System using Smart Phones, In Holder and D. Cook, Springer Verlag.
Proceedings of the International Conference on Mobile
Business (ICMB'05), 2005. [21] M.M. Gaber, S. Krishnaswamy, and A. Zaslavsky,
Adaptive Mining Techniques for Data Streams Using
[9] P. Vajirkar, S. Singh, Y. Lee, Context-Aware Data Algorithm Output Granularity, The Australasian Data
Mining Framework for Wireless Medical Application, Mining Workshop (AusDM 2003), Held in conjunction with
Lecture Notes in Computer Science (LNCS), Volume 2736, the 2003 Congress on Evolutionary Computation (CEC
Springer-Verlag. ISBN 3-540-40806-1, 2003, pp. 381 391. 2003), Canberra, Australia, Springer Verlag, Lecture Notes
in Computer Science (LNCS), 2003.
[10] B. Jansen, and R. Deklerek, Context-Aware Inactivity
Recognition for Visual Fall Detection, In Pervasive Health [22] N. Phung, M.M. Gaber and U. Roehm, Resource-aware
Conference and Workshops, 2006. Distributed Online Data Mining for Wireless Sensor
Networks, Proceedings of the International Workshop on
[11] Kim, H., and Jo, H. A Context-Aware Traveler Knowledge Discovery from Ubiquitous Data Streams
Healthcare Service (THS) System, In Pervasive Health (IWKDUDS07), in conjunction with ECML and PKDD
Conference and Workshops. November-December 2006. 2007, Warsaw, Poland, 2007.
10