You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

25 December 2020

Classifier-Based Data Transmission Reduction in Wearable Sensor Network for Human Activity Monitoring

,
and
1
Institute of Computer Science, University of Silesia, Będzińska 39, 41-200 Sosnowiec, Poland
2
Department of Computer Science and Automatics, University of Bielsko-Biała, Willowa 2, 43-309 Bielsko-Biała, Poland
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
This article belongs to the Section Sensor Networks

Abstract

The recent development of wireless wearable sensor networks offers a spectrum of new applications in fields of healthcare, medicine, activity monitoring, sport, safety, human-machine interfacing, and beyond. Successful use of this technology depends on lifetime of the battery-powered sensor nodes. This paper presents a new method for extending the lifetime of the wearable sensor networks by avoiding unnecessary data transmissions. The introduced method is based on embedded classifiers that allow sensor nodes to decide if current sensor readings have to be transmitted to cluster head or not. In order to train the classifiers, a procedure was elaborated, which takes into account the impact of data selection on accuracy of a recognition system. This approach was implemented in a prototype of wearable sensor network for human activity monitoring. Real-world experiments were conducted to evaluate the new method in terms of network lifetime, energy consumption, and accuracy of human activity recognition. Results of the experimental evaluation have confirmed that, the proposed method enables significant prolongation of the network lifetime, while preserving high accuracy of the activity recognition. The experiments have also revealed advantages of the method in comparison with state-of-the-art algorithms for data transmission reduction.

1. Introduction

Wireless wearable sensor networks are usually composed of several sensor nodes attached to human body or embedded in clothing [,,]. The sensor nodes can monitor parameters of the body as well as its environment. Communication between the wearable sensor nodes is based on wireless data connections. So far, many applications of the wearable sensor networks have been considered in the literature. These potential applications include healthcare, localization, activity monitoring, sport, fitness, augmented reality, safety, rescue, emergency management, and many others.
Successful use of the wearable sensor networks depends on lifetime of the batterypowered sensor nodes. In order to ensure long network lifetime, the limited energy resources of sensor nodes have to be efficiently utilized. The most energy expensive operation of wireless sensor nodes is data transmission. In contrast, data processing consumes significantly less energy. Reduction of data transmission can lead to considerable energy savings and increased network lifetime [,,]. Thus, effective methods are needed to avoid any unnecessary data transmissions in the wearable sensor networks. The existing data reduction methods are mainly focused on wireless sensor networks that collects sensor readings, execute simple prepossessing tasks, and send the data to a sink or a base station. In contrast, the sensor network considered in this paper is composed of wearable devices that perform more complex tasks related to human activity recognition by using embedded machine learning algorithms.
This paper introduces a method for reducing data transmissions in wearable sensor networks, where a cluster head node collects data from different sensors to recognize human activity in real-time. In this method, the sensor nodes are equipped with binary classifiers that allow them to decide if current sensor readings have to be transmitted to cluster head or not. According to the proposed approach, the data classifiers for sensor nodes are trained with use of machine learning algorithm. An algorithm was elaborated to prepare a training data set, which consists of data readings from sensors and assigned labels. Each label indicates if a given data reading is necessary to correctly recognize the activity of monitored person or not. These labels are determined during tests of a recognition algorithm, which is used by the cluster head node to categorize human activities.
The proposed method was implemented in a prototype of wearable sensor network for activities recognition of persons working in a computer laboratory. The prototype was designed to recognize the human activities, such as sitting, walking, or standing. Moreover, in case of sitting person, it was also recognized where the person is sitting and if the monitor is switched on. During experiments, energy consumption of sensor nodes was measured and lifetime of the wearable sensor network prototype was analysed. Results of the experimental evaluation have enabled detailed comparison of the network lifetime for the proposed approach, and for state-of-the-art transmission reduction methods. Also, the impact of data transmission reduction on accuracy of activity recognition was analysed for the compared methods in real-world experiments.
The paper is organized as follows. Section 2 reviews related works and discusses contribution of this paper. Section 3 presents the proposed approach to reducing data transmission in wearable sensor networks. Experiments and their results are described in Section 4. Finally, conclusions are given in Section 5.

3. Proposed Method

3.1. Overview of the Method

The objective of the considered wireless sensor network is to recognize human activities a t in successive time steps (t). In this network, the wearable sensor nodes attached to a person establish a cluster, where one of the nodes acts as cluster head, i.e., receives data from the other nodes and uses them to recognize the user’s activity. The recognized human activity is periodically reported by the cluster head to a sink node.
The method presented in this section allows us to reduce the number of data transmissions from sensor nodes to cluster head. According to this method, the sensor nodes use classifiers to decide if sensor data are necessary for activity recognition and have to be transmitted, or not. The decision made by sensor node i with use of binary classifier C can be described with the following formula:
d i , t = C ( S i , t , M i ) ,
where d i , t = 1 means that the data collected at time step t by sensor node i have to be transmitted to cluster head and d i , t = 0 denotes that the data transmission can be skipped. This decision is made by the classification algorithm C, based on data set S i , t and model M i . The models M i are trained using a machine learning algorithm, according to the procedure which is presented in Section 3.3. The set S i , t consists of preprocessed sensor readings collected by sensor node i at time step t. Construction of the classification algorithm C depends on the machine learning algorithm used for training the model M i . For instance, if the model is trained with use of the random forest algorithm then it has the form of a collection of decision trees, and algorithm C has to calculate the decision based on those decision trees. The operations performed by sensor node are summarized in Algorithm 1.
It should be noted that the method described in this section can be implemented for various sets of sensors, with use of different machine learning algorithms. Here, for seek of generality, the term “machine learning algorithm” is used, which can refer to neural network, decision tree, random forest, support vector machine, etc. Similarly, the data set mentioned here can be composed of different sensor readings. Thus, size of the processed and transmitted data is not determined. Implementation details of the proposed method, for a prototype of wearable sensor network, are discussed in Section 4.
Algorithm 1 Operation of sensor node i
 Input:
classification model M i
1:
for each time step t do
2:
    collect data S i , t from own sensors
3:
    classify collected data-determine d i , t = C ( S i , t , M i )
4:
    if d i , t = 1 then
5:
        send S i , t to cluster head
6:
    end if
7:
end for
As shown in Algorithm 2, the cluster head (node i * ) collects its own sensor readings and waits for data transmitted from the other nodes in its cluster. The available data are then used to recognize current activity of the monitored person. Since the proposed method assumes that only selected data are sent to the cluster head node, an activity recognition algorithm R is needed, which can deal with incomplete data sets. In general, the activity recognition task, performed by cluster head, is expressed as follows:
a ^ t = R ( S t , M ) ,
where M is an activity recognition model trained with use of a machine learning algorithm and S t denotes a set of data transmitted to the cluster head from sensor nodes a time step t:
S t = { S i , t : d i , t = 1 } .
The problem of reducing data transmission at time step t is defined as follows:
minimize card ( S t ) subject to a ^ t = a t ,
where a t is the actual human activity, and card( · ) denotes cardinality of the set. Note that card( S t ) corresponds to the number of sensor nodes that have to send data at time step t.
Algorithm 2 Operation of cluster head (node i * )
 Input:
recognition model M
1:
for each time step t do
2:
    collect data S i * , t from own sensors
3:
    wait for data S t transmitted from sensor nodes
4:
    recognize activity a ^ t = R ( S i * , t S t , M )
5:
    send a ^ t to sink
6:
end for
The classification models M i , should allow sensor nodes to made decisions d i , t that determine solution of minimization problem (4). This objective is achieved by appropriate training of the classification models. Application of this proposed method involves the following steps:
  • Collect training data.
  • Divide the training data into two samples.
  • Train recognition model M using the first data sample.
  • Prepare data for training classification models M i based on the second data sample.
  • Train classification models M i .
A training data set, collected at the first step, has to include preprocessed sensor readings from all sensor nodes (S) and information about activities of the monitored persons (A) for a representative period. Activities are recognized by a human observer. The sensor readings are prepossessed to eliminate noise, aggregate the raw data and reduce their size. Subsequently, the training data set ( S , A ) is divided into samples ( S , A ) and ( S , A ). Finally, the training procedures (steps 3–5) are performed as discussed in the following subsections.
The outline of the proposed method is illustrated by block diagrams in Figure 1 and Figure 2. Figure 1 depicts the training of recognition and classification models. Usage of the trained models during operation of sensor network is presented in Figure 2. It should be noted that left part of Figure 2 corresponds to Algorithm 1, and the right part relate to Algorithm 2.
Figure 1. Block diagram of the proposed method: training stage.
Figure 2. Block diagram of the proposed method: network operation stage.

3.2. Activity Recognition Model

A model M for activity recognition is created using machine learning algorithms. As it was already mentioned above in this section, the human activity has to be recognized based on incomplete data sets. In order to deal with the missing (not transmitted) data, an ensemble learning method was used in this study.
To be specific, the considered recognition model M is an ensemble of sub-models. Each sub-model is trained to recognize human activity based on data from different subset of the sensor nodes. For instance, let us consider a network composed of cluster head and one sensor node. In this case two sub-models are used. The first sub-model, which takes into account data from both nodes, will recognize the activity when data from the sensor node are transmitted. In opposite situation, the second sub-model will recognize the activity on the basis of data only from the cluster head.
Hereinafter, the symbol S M ( Z ) stands for the sub-model, which is designed to recognize the human activity based on data delivered from sensor nodes belonging to subset Z. A separate sub-model S M ( Z ) is trained for each non empty subset of nodes Z, such that Z I , where I = { 1 n } denotes a set of indices used for identification of sensor nodes, and n is the total number of sensor nodes. The sub-models training is based on data sample ( S , A ), which includes examples of sensor readings ( S i , t , i I , t T ) and labels indicating relevant human activities ( a t , t T ) for time period T. The examples used for training of sub-model S M ( Z ) are obtained from ( S , A ) by selecting the sensor readings for the nodes that belong to Z. These examples are defined as tuples ( S t , a t ) , where S t = { S i , t : i Z } and t T .
The number of all possible sub-models equals to 2 n 1 . Thus, this number increases fast with the number of sensor nodes (n). However, the considered wearable sensor networks for human activity monitoring consist of only few sensor nodes [] and in this case the above model ensemble can be easily implemented (e.g., for  n = 3 the number of all sub-models equals 7). In order to recognize human activity, during operation of the sensor network, the cluster head selects appropriate sub-model S M ( Z ) , where Z corresponds to the set of senor nodes that currently deliver data readings. It should be noted that the cluster head node always has the access to its own sensor readings. Thus, if  i * is the identifier of cluster head then the ensemble model needs to include sub-models S M ( Z ) , where i * Z . This observation allows us to reduce the number of sub-models that have to be stored by the sensor node i * , as the sub-models S M ( Z ) , where i * Z can be omitted. Thus, the number of necessary sub-models is reduced to 2 n 1 , i.e., for n = 3 we need 4 sub-models.

3.3. Models for Sensor Data Classification

The classification models M i are used to decide if the data collected by sensor node i at time step t have to be transmitted or not. In order to train the classification models M i it is necessary to collect examples of optimal decisions d i , t . These decisions are determined by solving the minimization problem (4) for the sample data set ( S , A ), as presented in Algorithm 3.
The input of Algorithm 3 includes preprocessed data readings from all sensor nodes ( S i , t ) and labels representing actual human activities observed during collection of the sensor readings ( a t ). Moreover, Algorithm 3 requires the activity recognition model M, which has to be initially trained on a separate data set, as discussed in Section 3.2. For each time instance (t) in the sample data set, the algorithm finds the smallest subset of sensor nodes (Z) that includes the cluster head node i * and enables correct recognition of activity  a t .
When analysing the pseudo-code of Algorithm 3, it should be noted that this algorithm starts the search with Z = i * , when k = 0 and X = . It means that at the first step it is checked whether the data collected solely by cluster head are sufficient for recognizing the human activity. If not, then the algorithm tries to made the recognition based on data from cluster head and one additional sensor node ( k = 1 ). The additional sensor node is selected randomly and all possible pairs of nodes are verified. During subsequent iterations, the number of utilized nodes is increased, until the human activity is correctly recognized or all nodes in the cluster are taken into account.
The resulting subset of sensor nodes is identified by binary variables d i , t , i = 1 n , where n corresponds to the total number of sensor nodes and meaning of the d i , t values was explained above for Equation (1).
As discussed in Section 3.1, separate classification model M i is needed for each sensor node ( i i * ) to make decisions about necessity of data transmissions (see Algorithm 1). The training of models M i is performed with use of sensor readings from the sample data set ( S ) and decisions D determined by Algorithm 3. Formally, the set of data used to train model M i for i-th sensor node is represented as a set of tuples ( S i , t , d i , t ) , where t = 1 , m .
Algorithm 3 Data preparation for training of models M i
 Input:
S = { S i , t : i = 1 n , t = 1 m } , A = { a t : t = 1 m } , M, i *
 Output:
D = { d i , t : i = 1 n , t = 1 m }
1:
for t = 1 m do
2:
     f o u n d = false
3:
     k = 0
4:
    repeat
5:
         X = set of all k-element subsets of { { 1 , 2 , , n } { i * } }
6:
        repeat
7:
            Z = random element from X
8:
            X = X Z
9:
            Z = Z { i * }
10:
            S t = { S i , t : i Z }
11:
           if R ( S t , M ) = a t then
12:
                f o u n d = true
13:
           end if
14:
        until f o u n d or X =
15:
         k = k + 1
16:
    until f o u n d or k = n 1
17:
    for i = 1 n do
18:
        if f o u n d and i Z then
19:
            d i , t = 0
20:
        else
21:
            d i , t = 1
22:
        end if
23:
    end for
24:
end for
Algorithm 3 searches for the smallest subset of sensor nodes that enables correct recognition of the human activity. This search is repeated for each time step covered in the sample data set. Dominant operation in this algorithm is the test of activity recognition for a selected subset of nodes (line 11). Each considered subset of sensor nodes has to include the cluster head node, thus the total number of possible subsets equals 2 n 1 1 . In the optimistic case, data collected by the cluster head are sufficient for correct recognition, and only one test is performed. The pessimistic case is that the test is executed for all possible subsets. On average, ( 2 n 1 1 ) / 2 tests are required. It means that the average time complexity of the algorithm is O ( m ( 2 n 2 0.5 ) ) . It should be kept in mind that this algorithm is used at the training stage, and its execution time does not impact the operation of sensor network.

4. Experiments

The objective of the conducted experiments was to verify effectiveness of the proposed method, when implemented in the wearable sensor network for human activity monitoring. The activity recognition was considered as a typical application of the wearable sensors. During experiments, the energy consumption of sensor nodes was measured to enable evaluation of the network lifetime. In parallel, the accuracy of activity recognition was investigated. The results obtained for the proposed method were compared with those of the state-of-the-art data prediction methods that use neural networks [] and naive algorithm [].

4.1. Experimental Testbed

The prototype of wearable sensor network used for the experiments was built of four sensor nodes. Each node contains an ARM microcontroller (STM32F103C8T6) and communication module based on ZigBee technology (xBee S2C). Three of them are additionally equipped with the accelerometer (MPU-9250) and the light sensor (ALS-PT19). These sensor nodes are used as the wearable devices attached to a person, as shown in Figure 3. The fourth node acts as the sink and collects the information about recognized activities of the monitored person.
Figure 3. Placement of sensor nodes.
Selection of the sensors for the experimental prototype was based on literature review. The accelerometers were used to enable recognition of human activities, such as sitting and walking. This type of accelerometer application is popular in the literature [,,]. Additionally, the light sensors were included in the wearable nodes to enable coarse localization of the person and detection of active computer monitors. Results reported in previous works have confirmed that the light sensors can be useful for indoor localization [,].
In order to measure energy consumption, the LTC4150 Coulomb counter was connected to each sensor node. The Coulomb counter enables estimation of residual battery energy in wireless devices. Its operation is based on differential measurement over a shunt, i.e., a small resistance connected in series. The Coulomb counter measures voltage drop across the resistor and evaluates current flow in the circuit using Ohm’s law. The smallest amount of energy, which can be measured equals 26 µAh. This energy results from the parameters of the internal resistor and the maximum energy consumption of the sensor node. The LTC4150 module provides a signal on an output each time the energy of 0.1707 mAh is consumed by the sensor node. These signals were counted during experiments by microcontroller of the sink node to determine the energy consumption over a long period of time.
It was assumed that all sensor nodes have the same battery capacity of 700 mAh. A balance between energy consumption of individual sensor nodes was achieved by implementing the cluster head rotation algorithm presented in []. Death of sensor node was detected each time the sensor node has consumed the predetermined amount of energy. The network lifetime can be determined with the different assumptions described in the previous section. The network lifetime was determined in this study as the time from the start of sensor network operation to the discharge of one of sensor nodes. This is due to the significant drop in recognition accuracy after any of the wearable nodes is discharged.
The prototype of single wireless sensor node with connected Coulomb counter is presented in Figure 4. Block diagram of the testbed used in experiments with wireless wearable sensor network was shown on Figure 5. At the training stage, all data readings of accelerometers and light sensors were preprocessed by the sensor nodes (as explained later in this section), collected by the sink, and transferred to a workstation. In this way the sample data set was gathered for training the classification and recognition models. The models were trained on the workstation with use of Waikato Environment for Knowledge Analysis (WEKA package) and Konstanz Information Miner (KNIME) software []. The KNIME allows us to use both KNIME machine learning implementations and the WEKA repository that gives over 100 various methods and their variants. It proved to be useful in data exploration and finding machine learning solutions in previous works. For a small number of sensor nodes, the experiments could be conducted in a reasonable time using KNIME. For larger networks, Python or MATLAB would be more useful. The KNIME workflow containing the data set is available at http://biometrics.us.edu.pl/request/database/activity. Based on initial experiments, the random forest algorithm was selected. This algorithm, together with the trained models, was deployed on the sensor nodes.
Figure 4. Sensor node.
Figure 5. Block diagram of the experimental testbed.
The developed prototype of wearable sensor network was used to recognize human activity in a computer laboratory. A layout of the computer laboratory is shown in Figure 6. Only artificial light was available in the laboratory during experiments. The set of recognized human activities includes 19 cases: walking in the laboratory, standing by the rack server, sitting by table 1, 2, or 3, sitting by computer 1–7, and working on computer 1–7. The difference between the cases of sitting by a computer and working on a computer is that the working person uses keyboard, and the monitor is switched on.
Figure 6. Computer laboratory.
The prototype of wearable sensor network collects sensor readings from accelerometers and light sensors in time steps of one second. At each time step, after registering new data, the sensor nodes calculate mean, standard deviation, 10-th percentile, and 90-th percentile, based on the last collected 15 sensor readings. The number of 15 sensor readings used for these calculations was selected empirically. When more readings are taken into account then the noise is better eliminated. However, at the same time, some short-term changes of activity can be not detected. Thus, we have chosen the smallest number of readings that allows us to achieve accurate recognition of the human activities.
The calculations of mean, standard deviation, and percentiles are performed for the measured light intensity and magnitude of acceleration. Based on collected data, the activity recognition is performed by cluster head, and the result is reported to the sink every second.

4.2. Results and Discussion

Initial experiments were conducted to compare the accuracy of human activity recognition for various machine learning algorithms (classifiers). The compared algorithms include: probabilistic neural network (PNN), support vector machines (SVM), k-nearest neighbours algorithm (k-NN), random tree (RT), and random forest (RF). During these tests the data reduction was not executed, i.e., all collected sensor readings were taken into account. The initial tests were carried out using implementations of the machine learning algorithms that are available in the WEKA package. Results of this comparison (Figure 7) clearly demonstrate that the data collected by the proposed wearable sensor network enables recognizing the human activities with a high accuracy. Parameters of the compared machine learning algorithms were selected empirically based on our preliminary experiments.
Figure 7. Accuracy of human activity recognition for compared machine learning algorithms.
During experiments 60% of the data were used for training and 40% for testing. The test was executed 10 times for different divisions of the data into train and test sets. The error bars presented in Figure 7 correspond to maximum and minimum results of these tests, while columns depicts the average value.
The PNN was trained using the constructive training algorithm, based on dynamic decay adjustment []. When using this algorithm, the PNN is dynamically constructed during training and the number of required hidden neurons is automatically adjusted. The PNN is built of neurons with a Gaussian activation function and models the probability distribution of each considered class through a combination of these Gaussians. The training algorithm adjusts each Gaussian function by taking into account two parameters ( Θ + and Θ ) to avoid conflicts between different classes. The parameter settings used in this study are Θ + = 0.4 and Θ = 0.2 .
The training of SVM aims at constructing hyperplanes defined in a multidimensional space that separate training data points belonging to different classes. To this end a training algorithm is used, which solves an optimization problem []. The iterative training procedure finds optimal hyperplanes with maximum distance to the nearest training data point of any class. The experiments were performed using C-SVC version of the SVM classifier [] with radial basis function kernel.
The k-NN classifier [] evaluates distances between a test data point and all training data points in a multidimensional feature space. Based on the calculated distances, the nearest k training data points are selected. The classification result is determined as the class, which is most common among the k selected training data points. This algorithm was used during experiments with parameter k = 3 , and the Euclidean distance was considered.
The RT algorithm [] builds a decision tree using a random procedure. Each node of the tree is split using the best split among a subset of randomly chosen attributes. The tree constructed by the RT algorithm considers K random attributes at each node. In this study the parameter K = 5 was used.
The highest accuracy was achieved for the RF algorithm. Thus, this algorithm was selected for further experiments. The RF algorithm [] creates a set of decision trees from randomly selected parts of training data and features. Each of the multiple decision trees classifies data independently and votes for the selected class. Finally, the votes from all decision trees are aggregated to decide the output class. The classification algorithm picks the class having the majority of votes from decision trees.
The number of trees for RF algorithm was set to 10. As illustrated in Figure 8, for more than 10 trees, the increase of recognition accuracy is not significant (below 0.006%), while the larger number of trees involves longer computational time and increased consumption of memory resources. The doted lines in Figure 8 correspond to the maximum and minimum result of 10 tests, while the solid line represents the average value. An additional advantage of the random forest algorithm is its suitability for implementation in the prototypes of sensor nodes. It should be noted that several approaches to implementation of the random forest classifier for embedded devices are available in the literature [,,]. In this study the random forest algorithm was used for activity recognition as well as for data classification to decide which data have to be transmitted.
Figure 8. Accuracy of human activity recognition for different number of trees.
A high accuracy of human activity recognition was achieved using the sensor network with three wearable nodes. Figure 9 compares this result with the accuracy obtained in case when the input data for activity recognition algorithm are collected from one sensor node only. It should be noted that the experiments were performed by using the random forest algorithm for activity recognition. The Labels A, B, and C in Figure 9 identify the sensor nodes. ABC denotes the sensor network of three nodes. Sensor node A was placed on the person’s chest, node B on the waist, and node C on the leg. Based on the chart in Figure 9, it can be observed that the accuracy obtained for separate sensor nodes are significantly lower than for the sensor network. This observation confirms that the use of network with three sensor nodes is justified. The meaning of error bars in Figure 9 and Figure 10 is the same as discussed above for Figure 7.
Figure 9. Comparison of activity recognition accuracy for sensor network and separate sensor nodes.
Figure 10. Comparison of accuracy (a), transmission number (b), and network lifetime (c).
The main experiments were carried out in a time period of three weeks. Figure 10 compares the recognition accuracy, number of transmissions and network lifetime for the three methods of transmission reduction. The chart in (Figure 10a) shows the recognition accuracy, which was achieved when the network lifetime was equal for the compared methods (equal to 101 h and 50 min). It should be noted that the method based on neural prediction did not reach this value of network lifetime, thus it was not considered in the chart. The recognition accuracy for the proposed approach is significantly higher than for the naive prediction method. It should be noted that the columns in Figure 10 represent average results, while error bars correspond to minimal and maximal values of the determined parameters for 10 runs of the experiment.
The results shown in (Figure 10b,c) relates to the situation when the accuracy of activity recognition is at the same level (average of 0.95%) for the three compared methods. Number of data transmissions from sensor nodes to cluster head per hour is analysed in Figure 10b) and network lifetime in Figure 10c). Note that the maximum number of data transmissions from two sensor nodes to cluster head during one hour equals 7200. It can be observed that the proposed method is more effective in reducing data transmission and extending network lifetime than the state-of-the-art methods.
Dependency between recognition accuracy and network lifetime for the compared methods is analysed in Figure 11. The numbers presented near data points in this chart describe threshold values for the state-of-the-art methods. By using the state-of-the-art methods with higher threshold value, the lifetime of sensor network can be extended. However, the recognition accuracy is significantly decreased when extending the lifetime. In contrast, the proposed method enables a significant network lifetime extension and maintains the high recognition accuracy of human activities. The decrease of accuracy and reduction of data transmissions are analysed in Figure 12. In these results it can be observed that the proposed approach decreases the recognition accuracy by only 1.8%, while reduces 75% of data transmissions. The compared algorithms achieve a significantly worse trade-off between the accuracy and data reduction. The reason behind the superior effectiveness of the proposed approach is that the selection of transmitted data is well fitted to the needs of the recognition algorithm. This fitting is achieved by appropriate training of the classifiers that control the selection of transmitted data.
Figure 11. Accuracy of activity recognition vs. lifetime of sensor network.
Figure 12. Reduction of transmissions vs. accuracy decrease of activity recognition.
It should be noted that only one data point is presented for the proposed method in Figure 11 and Figure 12 because this method does not use a threshold parameter. The compared prediction-based methods assume that some error of the collected data is acceptable. This acceptable error level is expressed by the threshold parameter. In contrast, the main objective of the proposed method is to maintain the high recognition accuracy when reducing the data transmission. Thus, a parameter (threshold) that would allow us to intentionally decrease the accuracy is not introduced.
When comparing the naive and neural prediction methods, it can be observed that the first one provides better results. The reason is that the naive algorithm more accurately predicts the chaotic time series of sensor readings. The chaotic character of the sensor readings collected by wearable devices during walk is illustrated by the example of light sensor data in Figure 13.
Figure 13. Readings of light sensors collected during walk (mean value for time window).
Prediction results for the data readings of light sensor are presented by the scatter plots in Figure 14 and Figure 15. These results clearly show that the naive prediction (Figure 14) is more accurate than the neural network (Figure 15) as the data points in scatter plot for naive prediction are more closely concentrated along the diagonal line.
Figure 14. Prediction of light sensor readings by naive algorithm.
Figure 15. Prediction of light sensor readings by neural algorithm.

5. Conclusions and Future Work

The experimental results presented in this paper confirm that lifetime of the activity recognition system with wearable sensor network can be significantly extended by using the embedded classifiers that detect useful sensor readings. The introduced approach allows us to effectively eliminate the data transmission that are not necessary for performing the given recognition task. This reduction of data transmission preserves high recognition accuracy. In this study, the presented method was applied for human activity recognition, however it can be easily adapted for different applications of wearable sensor networks that involve the use of recognition algorithms for other purposes. It is also suitable for application in Internet-of-Things environment. Comparison with state-of-the-art solutions have shown that the proposed method achieves better trade-off between the accuracy and transmission reduction. 75% of data transmissions from sensor nodes were eliminated, while the accuracy level of 95% was kept.
The model ensemble used in this study for activity recognition is suitable for the wearable sensor network, in which a few nodes are used to monitor the person. Future works will be devoted to other types of the sensor network, where a larger number of sensor nodes is connected in one cluster, and different ensemble learning methods will be used. For instance, a separate recognition sub-model can be trained based on data from each sensor node. In this case, after receiving data from sensor nodes, the recognition is performed independently using many sub-models in parallel. Subsequently, a common decision is made in a voting procedure, by taking into account the recognition results obtained from individual sub-models. This method requires only n sub-models to be trained, where n corresponds to the number of sensor nodes. Another possibility is to consider group of sensor nodes to simplify the model.
An interesting topic for further research is also the investigation of multi-layered transmission reduction with integration of the proposed method and dedicated MAC layer or network layer protocols.

Author Contributions

Conceptualization, M.L. and B.P.; Data curation, M.L. and B.P.; Formal analysis, M.L. and B.P.; Funding acquisition, M.L. and B.P.; Investigation, M.L. and B.P.; Methodology, M.L., B.P. and M.B.; Project administration, B.P. and M.B.; Resources, M.L. and B.P.; Software, M.L. and B.P.; Supervision, B.P. and M.B.; Validation, M.L., B.P. and M.B.; Visualization, M.L. and B.P.; Writing—original draft, M.L., B.P. and M.B.; Writing—review & editing, M.L., B.P. and M.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Publicly available dataset was analyzed in this study. This data can be found here: http://biometrics.us.edu.pl/request/database/activity.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

ATime series containing information about observed human activities
A Part of time series A used to train the recognition model M
A Part of time series A used to train the classification models M i
a t Actual human activity at time step t
a ^ t Human activity determined at time step t by recognition algorithm
CClassification algorithm (binary classifier)
d i , t Binary decision related to data transmission from sensor node i at time step t
DTime series of of binary decisions
iIdentifier of sensor node
ISet of identifiers of sensor nodes
i * Identifier of cluster head
MRecognition model used by cluster head to recognize human activities
M i Classification model used by sensor node i for selecting the data that have to be transmitted
mNumber of time steps
nTotal number of sensor nodes
RActivity recognition algorithm
SMultivariate time series of preprocessed sensor readings from n sensor nodes
S Part of time series S used to train the recognition model M
S Part of time series S used to train the classification models M i
S t Set of data transmitted to cluster head from sensor nodes at time step t
S i , t Set of preprocessed sensor readings collected by sensor node i at time step t
S M ( Z ) Sub-model for recognition of human activity based on data from sensor nodes belonging to subset Z
tTime step
TTime period (ordered set of time steps)

References

  1. Giannini, P.; Bassani, G.; Avizzano, C.A.; Filippeschi, A. Wearable Sensor Network for Biomechanical Overload Assessment in Manual Material Handling. Sensors 2020, 20, 3877. [Google Scholar] [CrossRef]
  2. Xu, Z.; Zhao, J.; Yu, Y.; Zeng, H. Improved 1D-CNNs for behavior recognition using wearable sensor network. Comput. Commun. 2020, 151, 165–171. [Google Scholar] [CrossRef]
  3. Ghasemzadeh, H.; Amini, N.; Saeedi, R.; Sarrafzadeh, M. Power-aware computing in wearable sensor networks: An optimal feature selection. IEEE Trans. Mob. Comput. 2014, 14, 800–812. [Google Scholar] [CrossRef]
  4. Jarwan, A.; Sabbah, A.; Ibnkahla, M. Data transmission reduction schemes in WSNs for efficient IoT systems. IEEE J. Sel. Areas Commun. 2019, 37, 1307–1324. [Google Scholar] [CrossRef]
  5. Płaczek, B.; Bernaś, M. Uncertainty-based information extraction in wireless sensor networks for control applications. Ad Hoc Netw. 2014, 14, 106–117. [Google Scholar] [CrossRef]
  6. Lewandowski, M.; Bernas, M.; Loska, P.; Szymała, P.; Płaczek, B. Extending Lifetime of Wireless Sensor Network in Application to Road Traffic Monitoring. In International Conference on Computer Networks; Springer: Cham, Switzerland, 2019; pp. 112–126. [Google Scholar]
  7. Liu, X.; Yu, J.; Li, F.; Lv, W.; Wang, Y.; Cheng, X. Data Aggregation in Wireless Sensor Networks: From the Perspective of Security. IEEE Internet Things J. 2020, 7, 6495–6513. [Google Scholar] [CrossRef]
  8. Dehkordi, S.A.; Farajzadeh, K.; Rezazadeh, J.; Farahbakhsh, R.; Sandrasegaran, K.; Dehkordi, M.A. A survey on data aggregation techniques in IoT sensor networks. Wirel. Netw. 2020, 26, 1243–1263. [Google Scholar] [CrossRef]
  9. Feng, C.; Li, Z.; Jiang, S.; Jing, W. Delay-constrained data aggregation scheduling in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2017, 13. [Google Scholar] [CrossRef]
  10. Ghasemzadeh, H.; Jafari, R. Data aggregation in body sensor networks: A power optimization technique for collaborative signal processing. In Proceedings of the 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Boston, MA, USA, 21–25 June 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–9. [Google Scholar]
  11. Shen, B.; Fu, J.S. A method of data aggregation for wearable sensor systems. Sensors 2016, 16, 954. [Google Scholar] [CrossRef]
  12. Raj, A.S.; Chinnadurai, M. Energy efficient routing algorithm in wireless body area networks for smart wearable patches. Comput. Commun. 2020, 153, 85–94. [Google Scholar]
  13. Lin, J.W.; Liao, S.W.; Leu, F.Y. Sensor data compression using bounded error piecewise linear approximation with resolution reduction. Energies 2019, 12, 2523. [Google Scholar] [CrossRef]
  14. Pacharaney, U.S.; Gupta, R.K. Clustering and compressive data gathering in wireless sensor network. Wirel. Pers. Commun. 2019, 109, 1311–1331. [Google Scholar] [CrossRef]
  15. Liu, J.; Chen, F.; Wang, D. Data compression based on stacked RBM-AE model for wireless sensor networks. Sensors 2018, 18, 4273. [Google Scholar] [CrossRef] [PubMed]
  16. Wu, C.H.; Tseng, Y.C. Data compression by temporal and spatial correlations in a body-area sensor network: A case study in pilates motion recognition. IEEE Trans. Mob. Comput. 2010, 10, 1459–1472. [Google Scholar] [CrossRef]
  17. Yu, L.; Xiong, D.; Guo, L.; Wang, J. A compressed sensing-based wearable sensor network for quantitative assessment of stroke patients. Sensors 2016, 16, 202. [Google Scholar] [CrossRef]
  18. Natarajan, V.; Vyas, A. Power efficient compressive sensing for continuous monitoring of ECG and PPG in a wearable system. In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 336–341. [Google Scholar]
  19. Huang, H.; Hu, S.; Sun, Y. Energy-efficient ECG compression in wearable body sensor network by leveraging empirical mode decomposition. In Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics (BHI), Las Vegas, NV, USA, 4–7 March 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 149–152. [Google Scholar]
  20. Lou, P.; Shi, L.; Zhang, X.; Xiao, Z.; Yan, J. A Data-Driven Adaptive Sampling Method Based on Edge Computing. Sensors 2020, 20, 2174. [Google Scholar] [CrossRef]
  21. Cai, W.; Zhang, M. Spatiotemporal correlation–based adaptive sampling algorithm for clustered wireless sensor networks. Int. J. Distrib. Sens. Netw. 2018, 14. [Google Scholar] [CrossRef]
  22. Nguyen, L.; Ulapane, N.; Miro, J.V. Adaptive sampling for spatial prediction in environmental monitoring using wireless sensor networks: A review. In Proceedings of the 2018 13th IEEE Conference on Industrial Electronics and Applications (ICIEA), Wuhan, China, 31 May–2 June 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 346–351. [Google Scholar]
  23. Miskowicz, M. Send-on-delta concept: An event-based data reporting strategy. Sensors 2006, 6, 49–63. [Google Scholar] [CrossRef]
  24. Diaz-Cacho, M.; Delgado, E.; Barreiro, A.; Falcón, P. Basic send-on-delta sampling for signal tracking-error reduction. Sensors 2017, 17, 312. [Google Scholar] [CrossRef]
  25. Mesin, L. A neural algorithm for the non-uniform and adaptive sampling of biomedical data. Comput. Biol. Med. 2016, 71, 223–230. [Google Scholar] [CrossRef]
  26. Rezaie, H.; Ghassemian, M. An adaptive algorithm to improve energy efficiency in wearable activity recognition systems. IEEE Sens. J. 2017, 17, 5315–5323. [Google Scholar] [CrossRef]
  27. Augustyniak, P. Adaptive Sampling of the Electrocardiogram Based on Generalized Perceptual Features. Sensors 2020, 20, 373. [Google Scholar] [CrossRef] [PubMed]
  28. Shu, T.; Chen, J.; Bhargava, V.K.; de Silva, C.W. An energy-efficient dual prediction scheme using LMS filter and LSTM in wireless sensor networks for environment monitoring. IEEE Internet Things J. 2019, 6, 6736–6747. [Google Scholar] [CrossRef]
  29. Ganjewar, P.; Barani, S.; Wagh, S.J. A hierarchical fractional LMS prediction method for data reduction in a wireless sensor network. Ad Hoc Netw. 2019, 87, 113–127. [Google Scholar] [CrossRef]
  30. Dias, G.M.; Bellalta, B.; Oechsner, S. A survey about prediction-based data reduction in wireless sensor networks. Acm Comput. Surv. 2016, 49, 1–35. [Google Scholar] [CrossRef]
  31. Suh, Y.S. Send-on-delta sensor data transmission with a linear predictor. Sensors 2007, 7, 537–547. [Google Scholar] [CrossRef]
  32. Feng, X.; Zhenzhen, X.; Lin, Y.; Weifeng, S.; Mingchu, L. Prediction-based data transmission for energy conservation in wireless body sensors. In Proceedings of the 2010 The 5th Annual ICST Wireless Internet Conference (WICON), Singapore, 1–3 March 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–9. [Google Scholar]
  33. Mishra, A.; Chakraborty, S.; Li, H.; Agrawal, D.P. Error minimization and energy conservation by predicting data in wireless body sensor networks using artificial neural network and analysis of error. In Proceedings of the 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, 10–13 January 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 165–170. [Google Scholar]
  34. Mejia, J.; Ochoa-Zezzatti, A.; Cruz-Mejía, O.; Mederos, B. Prediction of time series using wavelet Gaussian process for wireless sensor networks. Wirel. Netw. 2020, 26, 5751–5758. [Google Scholar] [CrossRef]
  35. Putra, I.P.E.S.; Brusey, J.; Gaura, E.; Vesilo, R. An event-triggered machine learning approach for accelerometer-based fall detection. Sensors 2018, 18, 20. [Google Scholar] [CrossRef]
  36. Pérez-Torres, R.; Torres-Huitzil, C.; Galeana-Zapién, H. A Cognitive-Inspired Event-Based Control for Power-Aware Human Mobility Analysis in IoT Devices. Sensors 2019, 19, 832. [Google Scholar] [CrossRef]
  37. Socas, R.; Dormido, S.; Dormido, R.; Fabregas, E. Event-based control strategy for mobile robots in wireless environments. Sensors 2015, 15, 30076–30092. [Google Scholar] [CrossRef]
  38. Ullah, F.; Abdullah, A.H.; Kaiwartya, O.; Kumar, S.; Arshad, M.M. Medium Access Control (MAC) for Wireless Body Area Network (WBAN): Superframe structure, multiple access technique, taxonomy, and challenges. Hum. Centric Comput. Inf. Sci. 2017, 7, 34. [Google Scholar] [CrossRef]
  39. Aderohunmu, F.A.; Paci, G.; Brunelli, D.; Deng, J.D.; Benini, L.; Purvis, M. An application-specific forecasting algorithm for extending wsn lifetime. In Proceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems, Cambridge, MA, USA, 20–23 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 374–381. [Google Scholar]
  40. Ignatov, A. Real-time human activity recognition from accelerometer data using Convolutional Neural Networks. Appl. Soft Comput. 2018, 62, 915–922. [Google Scholar] [CrossRef]
  41. Murad, A.; Pyun, J.Y. Deep recurrent neural networks for human activity recognition. Sensors 2017, 17, 2556. [Google Scholar] [CrossRef] [PubMed]
  42. Zubair, M.; Song, K.; Yoon, C. Human activity recognition using wearable accelerometer sensors. In Proceedings of the 2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), Seoul, Korea, 26–28 October 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–5. [Google Scholar]
  43. Zhao, Z.; Wang, J.; Zhao, X.; Peng, C.; Guo, Q.; Wu, B. NaviLight: Indoor localization and navigation under arbitrary lights. In Proceedings of the IEEE INFOCOM 2017-IEEE Conference on Computer Communications, Atlanta, GA, USA, 1–4 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 1–9. [Google Scholar]
  44. Ravi, N.; Iftode, L. FiatLux: Fingerprinting rooms using light intensity. In Proceedings of the 5th International Conference on Pervasive Computing, Toronto, ON, Canada, 13–16 May 2007. [Google Scholar]
  45. Lewandowski, M.; Płaczek, B. An Event-Aware Cluster-Head Rotation Algorithm for Extending Lifetime of Wireless Sensor Network with Smart Nodes. Sensors 2019, 19, 4060. [Google Scholar] [CrossRef]
  46. Berthold, M.R.; Cebron, N.; Dill, F.; Gabriel, T.R.; Kötter, T.; Meinl, T.; Ohl, P.; Thiel, K.; Wiswedel, B. KNIME-the Konstanz information miner: Version 2.0 and beyond. ACM Sigkdd Explor. Newsl. 2009, 11, 26–31. [Google Scholar] [CrossRef]
  47. Berthold, M.R.; Diamond, J. Constructive training of probabilistic neural networks. Neurocomputing 1998, 19, 167–183. [Google Scholar] [CrossRef]
  48. Fan, R.E.; Chen, P.H.; Lin, C.J. Working set selection using second order information for training support vector machines. J. Mach. Learn. Res. 2005, 6, 1889–1918. [Google Scholar]
  49. Chang, C.C.; Lin, C.J. LIBSVM: A library for support vector machines. ACM Trans. Intell. Syst. Technol. 2011, 2, 1–27. [Google Scholar] [CrossRef]
  50. Aha, D.W.; Kibler, D.; Albert, M.K. Instance-based learning algorithms. Mach. Learn. 1991, 6, 37–66. [Google Scholar] [CrossRef]
  51. Kiranmai, S.A.; Laxmi, A.J. Data mining for classification of power quality problems using WEKA and the effect of attributes on classification accuracy. Prot. Control. Mod. Power Syst. 2018, 3, 29. [Google Scholar] [CrossRef]
  52. Breiman, L. Random forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef]
  53. Mishina, Y.; Murata, R.; Yamauchi, Y.; Yamashita, T.; Fujiyoshi, H. Boosted random forest. IEICE Trans. Inf. Syst. 2015, 98, 1630–1636. [Google Scholar] [CrossRef]
  54. Buschjager, S.; Chen, K.H.; Chen, J.J.; Morik, K. Realization of Random Forest for Real-Time Evaluation through Tree Framing. In Proceedings of the 2018 IEEE International Conference on Data Mining (ICDM), Singapore, 17–20 November 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 19–28. [Google Scholar]
  55. Küppers, F.; Albers, J.; Haselhoff, A. Random Forest on an Embedded Device for Real-time Machine State Classification. In Proceedings of the 2019 27th European Signal Processing Conference (EUSIPCO), A Coruña, Spain, 2–6 September 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–5. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.