+ All Categories
Home > Documents > A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human...

A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human...

Date post: 25-Mar-2018
Category:
Upload: ngodan
View: 215 times
Download: 1 times
Share this document with a friend
41
Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 1 1 A Privacy Preserving Data Mining Methodology for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {[email protected], [email protected], } Tuesday, August 6 th , 2013 Introduction
Transcript
Page 1: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 11

A Privacy Preserving Data Mining Methodology for Dynamically Predicting

Emerging Human Threats

DETC2013-13155

Gautam Manohar & Conrad S. Tucker {[email protected],

[email protected], }

Tuesday, August 6th, 2013

Introduction

Page 2: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 2

Presentation Overview

• Research Motivation and Background• Methodology

– The Knowledge Discovery process– Data Acquisition and Storage– Data Mining Predictive Model

Construction– Result Interpretation and Output

• Application Case Study• Results and Discussion• Conclusion and Path Forward

Presentation Overview

Page 3: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 3

RESEARCH MOTIVATION

Research Motivation

Page 4: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 4

Motivation

Research Motivation

Page 5: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 5

• Tracking video

Tracking sample

Capturing Emergence

Page 6: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 6

• Existing systems are passive and more useful for post-incident analysis.

• Privacy issues with most existing systems become a hindrance in public use (I.e. the need to preserve Personally Identifiable Information (PII))

Research Motivation

Motivation and Background

Page 7: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 7

BODY LANGUAGE

“"The most important thing in communication is to hearwhat isn't being said." Peter F. Drucker

Why Individual Body Movement Data?

Literature Review

Page 8: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 8

RESEARCH METHODOLOGY

Research Methodology

Page 9: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 9

Proposed Methodology

Research Methodology

Page 10: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 10

• Data acquisition hardware setup consists of a sensor system with:– an RGB video camera, and – an infrared depth sensor

• Output from sensors is used to create a virtual skeleton of the subject with 20 nodes as shown

• Each nodes collects data pertaining to:– 3D Spatial Coordinates

(X,Y,Z)– Timestamp– Velocities of each node

Step 1: Data Acquisition

Research Methodology

High Fidelity Data, Privacy Preserving

Page 11: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 11

Large Scale Data Base

Research Methodology

Page 12: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 12

Proposed Methodology

Research Methodology

Page 13: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 13

• The data is stored in a structured Relational Database with fields for the following measures:– Timestamp– Euclidean Coordinates– Velocities of each node– Boolean “Threat Class” defining whether the data

collected during training was for a threat action or not.

Step 2: Data Transfer and Storage

Research Methodology

Page 14: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 14

• The data is stored in a structured Relational Database with fields for the following measures:

Step 2: Data Transfer and Storage

Research Methodology

Page 15: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 15

Proposed Methodology

Research Methodology

Page 16: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 16

Step3: Data Mining/Knowledge Discovery

16www.engr.psu.edu/datalab/Research Methodology

Page 17: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 17

Knowledge Discovery in Data Bases

17

Supervised Learning Unsupervised Learning

Research Methodology

Page 18: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 18

Supervised VS Unsupervised Learning

Supervised• y=F(x): true function• D: labeled training set• D: {xi,F(xi)}• Learn:

G(x): model trained to predict labels D

• Goal: E[(F(x)-G(x))2] ≈ 0

• Well defined criteria: Accuracy, RMSE, ...

Unsupervised• Generator: true model• D: unlabeled data sample• D: {xi}• Learn

Underlying data structure• Goal:

Find natural patterns• Well defined criteria:

varies

18Research Methodology

Page 19: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 19

Time t 1

Time t n

Model(t 1) Model(t n)

Time t n+1

Model(t n+1)

Capturing Threat Emergence

Research Methodology

Page 20: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 20

Data Mining Decision Tree InductionGiven a time stamped Data Set (t),

Feature 1 Feature 2 … Feature N Class

A1,1 A2,1 AN,1 Cj,1

. . . .

. . . .

. . . .

A1,M A2,M AN,M Cj,M

2( ) ( | ) log ( | )j jj

Entropy T p C T p C T= −∑

1( ) ( ) ( )

ki

X ii

TGAIN X Entropy T Entropy TT=

= −

21

( )Gain ratio(X)| | | |log| | | |

ki i

i

Gain XT TT T=

=− ⋅∑

Research Methodology

Tucker C., H.M. Kim,"Trend Mining for Predictive Product Design", Transactions of ASME: Journal of Mechanical Design, Vol. 133, No. 11, 2011.

Page 21: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 21

0.000

0.200

0.400

0.600

0.800

1.000

1.200

0 1 2 3 4 5 6 7 8 9 10 11 12

Gai

n R

atio

Time

Feature Gain Ratio Plot Over Time

Hard DriveTalkTimeCameraInterfaceConnectivity2 G Processor

X_Elbow Joint

Y_Hip_Joint

X_Shoulder

X_Accel_Arm

Y_Accel_Hip

Z_Arm_Joint

Features Time Series Gain Ratio Predictt1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t13_predict

X_Elbow Joint 0.245 0.225 0.308 0.349 0.376 0.436 0.468 0.532 0.618 0.702 0.765 0.879 0.919

Y_Hip_Joint 0.827 0.948 0.642 0.485 0.704 0.924 0.780 0.596 0.737 0.906 0.782 0.472 0.789X_Shoulder 0.493 0.403 0.112 0.578 0.578 0.951 0.061 1.000 0.363 0.046 0.084 0.578 0.541X_Accel_Arm 0.907 1.000 0.987 0.982 0.976 0.963 0.943 0.929 0.917 0.906 0.892 0.888 0.877

Y_Accel_Hip 0.054 0.051 0.070 0.113 0.176 0.275 0.329 0.366 0.503 0.633 0.610 0.759 0.842Z_Arm_Joint 0.918 0.879 0.849 0.803 0.759 0.737 0.671 0.630 0.615 0.524 0.358 0.329 0.270

21Research Methodology

Page 22: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 22

0.000

0.200

0.400

0.600

0.800

1.000

1.200

0 1 2 3 4 5 6 7 8 9 10 11 12

Gai

n R

atio

Time

Feature Gain Ratio Plot Over Time

Hard DriveTalkTimeCameraInterfaceConnectivity2 G Processor

22

Features Time Series Gain Ratio Predictt1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t13_predict

X_Elbow Joint 0.245 0.225 0.308 0.349 0.376 0.436 0.468 0.532 0.618 0.702 0.765 0.879 0.919

Y_Hip_Joint 0.827 0.948 0.642 0.485 0.704 0.924 0.780 0.596 0.737 0.906 0.782 0.472 0.789X_Shoulder 0.493 0.403 0.112 0.578 0.578 0.951 0.061 1.000 0.363 0.046 0.084 0.578 0.541X_Accel_Arm 0.907 1.000 0.987 0.982 0.976 0.963 0.943 0.929 0.917 0.906 0.892 0.888 0.877

Y_Accel_Hip 0.054 0.051 0.070 0.113 0.176 0.275 0.329 0.366 0.503 0.633 0.610 0.759 0.842Z_Arm_Joint 0.918 0.879 0.849 0.803 0.759 0.737 0.671 0.630 0.615 0.524 0.358 0.329 0.270

X_Elbow Joint

Y_Hip_Joint

X_Shoulder

X_Accel_Arm

Y_Accel_Hip

Z_Arm_Joint

Research Methodology

Page 23: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 23

n- time stamped data sets

i=i+1

No

Predict IM(Feature (i))

IM(Feature (i), Data Set (t))

Data set (t)=nYes

i=i+1

Split Data Sets 1,…,n based on Max Predicted IM (Feature(1),…Feature (k))

For Each Subset, P (Class ≠1)

No

End TREE, Classify Irrelevant Features

Yes

23

Page 24: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 24

n- time stamped data sets

i=i+1

No

Predict IM(Feature (i))

IM(Feature (i), Data Set (t))

Data set (t)=nYes

i=i+1

Split Data Sets 1,…,n based on Max Predicted IM (Feature(1),…Feature (k))

For Each Subset, P (Class ≠1)

No

End TREE, Classify Irrelevant Features

Yes

24

Page 25: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 25

Holt-Winters Forecasting

( ) t t t s kty k L kT I − += + +

The (k) step-ahead forecasting model is defined as:

Where:

The smoothing parameters α,γ δ, are in the range {0,1}

1 1( ) (1 )( )t t t s t tL y I L Tα α− − −= − + − +Level Lt (the level component):

1 1( ) (1 )t t t tT L L Tγ γ− −= − + −Trend Tt (the slope component):

( ) (1 )t t t t sI y L Iδ δ −= − + −Season It (the seasonal component):

2525Research Methodology

Page 26: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 26

Features Time Series Gain Ratio Predictt1 t2 t3 t4 t5 t6 t7 t8 t9 t10 t11 t12 t13_predict

X_Elbow Joint 0.245 0.225 0.308 0.349 0.376 0.436 0.468 0.532 0.618 0.702 0.765 0.879 0.919

Y_Hip_Joint 0.827 0.948 0.642 0.485 0.704 0.924 0.780 0.596 0.737 0.906 0.782 0.472 0.789X_Shoulder 0.493 0.403 0.112 0.578 0.578 0.951 0.061 1.000 0.363 0.046 0.084 0.578 0.541X_Accel_Arm 0.907 1.000 0.987 0.982 0.976 0.963 0.943 0.929 0.917 0.906 0.892 0.888 0.877

Y_Accel_Hip 0.054 0.051 0.070 0.113 0.176 0.275 0.329 0.366 0.503 0.633 0.610 0.759 0.842Z_Arm_Joint 0.918 0.879 0.849 0.803 0.759 0.737 0.671 0.630 0.615 0.524 0.358 0.329 0.270

0.000

0.200

0.400

0.600

0.800

1.000

1.200

0 1 2 3 4 5 6 7 8 9 10 11 12

Gai

n R

atio

Time

Feature Gain Ratio Plot Over Time

Hard DriveTalkTimeCameraInterfaceConnectivity2 G Processor

X_Elbow Joint

Y_Hip_Joint

X_Shoulder

X_Accel_Arm

Y_Accel_Hip

Z_Arm_Joint

Research Methodology

Page 27: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 27

n- time stamped data sets

i=i+1

No

Predict IM(Feature (i))

IM(Feature (i), Data Set (t))

Data set (t)=nYes

i=i+1

Split Data Sets 1,…,n based on Max Predicted IM (Feature(1),…Feature (k))

For Each Subset, P (Class ≠1)

No

End TREE, Classify Irrelevant Features

Yes

27

Page 28: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 28

Time t 1

Time t n

Split Data Sets (1,..,n) based on k mutually exclusive Feature values of Feature Ai

Split Data Sets (t1,…,tn) : Max IM

Ai,1

Ai,k

2828Research Methodology

Page 29: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 29

n- time stamped data sets

i=i+1

No

Predict IM(Feature (i))

IM(Feature (i), Data Set (t))

Data set (t)=nYes

i=i+1

Split Data Sets 1,…,n based on Max Predicted IM (Feature(1),…Feature (k))

For Each Subset, P (Class ≠1)

No

End TREE, Classify Irrelevant Features

Yes

29

Page 30: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 30

n- time stamped data sets

i=i+1

No

Predict IM(Feature (i))

IM(Feature (i), Data Set (t))

Data set (t)=nYes

i=i+1

Split Data Sets 1,…,n based on Max Predicted IM (Feature(1),…Feature (k))

For Each Subset, P (Class ≠1)

No

End TREE, Classify Irrelevant Features

Yes

30

Page 31: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 31

Data Mining Predictive Model

Results

Time t 1

Time t n

Threat

Page 32: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 32

Proposed Methodology

Research Methodology

Page 33: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 33

• Early Warning System (EWS) is a graphical user interface (GUI) that display the “percentage probability of threat/violent action being committed”.

Step 4: Decision Support

Research Methodology

Page 34: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 34

APPLICATION CASE STUDY

Case Study

Page 35: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 35

Possible Threat Scenario

Case Study

BBC UK (2008)

Page 36: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 36

• Voluntary participants from the University community were invited to enact the threat and non-threat actions

• Recreated in an indoor space, similar to a high profile speech

• The data collected is then used to train the predictive models

• The study was approved by the IRB and the ORP at the Pennsylvania State University, University Park campus, under the title “A Dynamic Pattern Recognition Framework for Mining and Predicting Emerging Threats” and is filed as IRB # 40258.

• Study: 24 Subjects spanning 2 months

CASE STUDY: TEST DATA

Case Study

Page 37: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 37

THREAT PREDICTION RESULTS

High level threat predictionLow level threat prediction

Results

Page 38: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 38

RESULTS

Class FALSE TRUEFALSE 31943 765

TRUE 1024 5123

Confusion matrix for REPTree:

Accuracy Precision RecallF-

MeasurePRC Area

ROC Area

95.3% 96.9% 97.7% 97.3% 99.1% 96.9%

Accuracy measures for REPTree:

Confusion matrix for Naive Bayes:

Accuracy Precision RecallF-

MeasurePRC Area

ROC Area

82.7% 87.3% 93.1% 90.1% 90.9% 71.8%

Accuracy measures for Naïve Bayes:

Results

Class FALSE TRUE

FALSE 30435 2273

TRUE 4429 1718

Accuracy of Ensemble Methods: 86.8%

Page 39: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 39

CONCLUSION AND FUTURE WORK

Conclusion and Future Work

Page 40: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 40

Conclusion and Future Work

• The most common surveillance systems today are reactive in nature and are not capable of actively predicting the emergence of a threat by analyzing past data collected.

• Privacy preserving data mining methodology

• This methodology takes the first step towards addressing these issues while providing promising results

• Expand the definition of “threat”Conclusion and Future Work

Page 41: A Privacy Preserving Data Mining Methodology for ... for Dynamically Predicting Emerging Human Threats DETC2013-13155 Gautam Manohar & Conrad S. Tucker {gautam.atulya@gmail.com,

Manohar, Tucker 2013 http://www.engr.psu.edu/datalab/ 41

Contributors:• Dr. Conrad S. Tucker, D.A.T.A. Lab members, Research Participants from PSU.

References:

References

1. Quinlan, J. R. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.2. Joshi, Karuna Pande. "Analysis of data mining algorithms." University of Minnesota.

Retrieved July 25 (1997): 2005.3. J. Han, M. Kamber, J. Pei, Data Mining: Concepts and Techniques, Third edition, 2011.4. Data-Driven Decision Tree Classification for Product Portfolio Design Optimization,

Conrad S. Tucker and Harrison M. Kim, J. Comput. Inf. Sci. Eng. 9, 041004 (2009), DOI:10.1115/1.3243634.

5. J. L. Raheja, A. Chaudhary, K. Singal, Tracking of fingertips and centers of palm using KINECT, International Conference on Computational Intelligence, Modeling & Simulation, 2011, 248-252.

6. Ya-Li Hou and Grantham K.H. Pang, Human detection in crowded scenes, IEEE international conference on image processing, 2010, 721-724.

ACKNOWLEDGEMENTS AND REFERENCES


Recommended