[1] |
HOSEINI S A , GLUHAKA , TAFAZOLLI R . A survey on smart-phone-based systems for opportunistic user context recognition[J]. ACM Computing Surveys(CSUR), 2013,45(3): 1-27.
|
[2] |
BULLING A , BLANKE U , SCHIELE B . A tutorial on human activity recognition using body-worn inertial sensors[J]. ACM Computing Surveys(CSUR), 2014,46(3): 57-76.
|
[3] |
CHIANG J H , YANG P C , TU H . Pattern analysis in daily physica activity data for personal health management[J]. Pervasive and Mobile Computing, 2014,13(4): 13-25.
|
[4] |
ZHOU B , LI Q , MAO Q , et al. Activity sequence-based indoor pede-strian localization using smartphones[J]. IEEE Transactions on Hu-man-Machine Systems, 2015,45(5): 562-574.
|
[5] |
MARTíN H , BERNARDOS A M , IGLESIAS J , et al. Activity log-ging using lightweight classification techniques in mobile devices[J]. Personal and Ubiquitous Computing, 2013,17(4): 675-695.
|
[6] |
SUAREZ I , JAHN A , ANDERSON C , et al. Improved activity recog-nition by using enriched acceleration data[C]// The 2015 ACM Interna-tional Joint Conference on Pervasive and Ubiquitous Computing. ACM, C2015: 1011-1015.
|
[7] |
REISS A , HENDEBY G , STRICKER D . A novel confidence-based multiclass boosting algorithm for mobile physical acti ity monitor-ing[J]. Personal and Ubiquitous Computing, 2015,19(1): 105-121.
|
[8] |
YOUNES R , MARTIN T L , JONES M . Activity classification at a higher level:what to do after the classifier does its best[C]// The 2015 ACM Inter-national Symposium on Wearable Computers. ACM, C2015: 83-86.
|
[9] |
CHEN Y Q , ZHAO Z T , WANG S Q , et al. Extreme learning ma-chine-based device displacement free activity recognition model[J]. Soft Computing, 2012,16(9): 1617-1625.
|
[10] |
DENG W Y , ZHENG Q H , WANG Z M . Cross-person activity recog-nition using reduced kernel extreme learning machine[J]. Neural Networks, 2014,53(1): 1-7.
|
[14] |
赵中堂 . 自适应行为识别中的迁移学习方法研究[D]. 北京:中国科学院大学, 2013. ZHAO Z T . Transfer learning methods for adaptive activity recogni-tion[D]. Beijing:University of Chinese Academy of Sciences, 2013.
|
[11] |
QUINLAN J R . Induction of decision trees[J]. Machine Learning, 1986,1(1): 81-106.
|
[12] |
COVER T M , HART P E . Nearest neighbor pattern classification[J]. IEEE Transactions on Information Theory, 1967,13(1): 21-27.
|
[13] |
CORTES C , VAPNIK V . Support-vector networks[J]. Machine Learn-ing, 1995,20(3): 273-297.
|
[15] |
FREDERICK J . Statistical methods for speech recognition[M]. The United States: MIT Press, 1997.
|
[16] |
杨晓峰, 孙明明, 胡雪蕾 , 等. 基于改进隐马尔可夫模型的网络攻击检测方法[J]. 通信学报, 2010,31(3): 95-101. YANG X F , SUN M M , HU X L , et al. Improved HMM model based method for detecting cyber attacks[J]. Journal on Comm nications, 2010,31(3): 95-101.
|
[17] |
黄飞跃, 徐光祐 . 视角无关的动作识别[J]. 软件学报, 2008,19(7): 1623-1634. HUANG F Y , XU G Y . Viewpoint independent action recognition[J]. Journal of Software, 2008,19(7): 1623-1634.
|
[18] |
AGGARWAL J K , RYOO M S . Human activity analysis:a rev w[J]. ACM Computing Surveys(CSUR), 2011,43(3): 1-43.
|
[19] |
KASTEREN T , NOULAS A , ENGLEBIENNE G , et al. Accurate activity recognition in a home setting[C]// The 10th International Con-ference on Ubiquitous Computing. Seoul, C2008: 1-9.
|
[20] |
SHEHROZ S K , MICHELLE E K , JESSE H , et al. owards the detec-tion of unusual temporal events during activities using HMMs[C]// The 14th International Conference on Ubiquitous Computing. Seattle, C2012: 1075-1084.
|
[21] |
FORKAN A R M , KHALIL I , TARI Z , et al. A context-aware ap-proach for long-term behavioural change detection and abnormality prediction in ambient assisted living[J]. Pattern Reco nition, 2015,48(3): 628-641.
|
[22] |
ZHONG M , WEN J , HU P , et al. Advancing Android activit gni-tion service with Markov smoother[C]// 2015 IEEE International Con-ference on Pervasive Computing and Communication Workshops(PerCom Workshops). IEEE, C2015: 38-43.
|