Next Article in Journal
Detecting Effects of Low Levels of FCCP on Stem Cell Micromotion and Wound-Healing Migration by Time-Series Capacitance Measurement
Next Article in Special Issue
Device-Free Human Activity Recognition with Low-Resolution Infrared Array Sensor Using Long Short-Term Memory Neural Network
Previous Article in Journal
The Effects of Inter-Set Recovery Time on Explosive Power, Electromyography Activity, and Tissue Oxygenation during Plyometric Training
Previous Article in Special Issue
An Efficient Anomaly Recognition Framework Using an Attention Residual LSTM in Surveillance Videos
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths

1
Factory Data Development Team, SK Telecom, Seoul 04539, Korea
2
Department of Computer Science, Yonsei University, Seoul 03722, Korea
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(9), 3016; https://doi.org/10.3390/s21093016
Submission received: 21 March 2021 / Revised: 22 April 2021 / Accepted: 23 April 2021 / Published: 25 April 2021
(This article belongs to the Special Issue AI-Enabled Advanced Sensing for Human Action and Activity Recognition)

Abstract

:
As the number of single-person households grows worldwide, the need to monitor their safety is gradually increasing. Among several approaches developed previously, analyzing the daily lifelog data generated unwittingly, such as electricity consumption or communication usage, has been discussed. However, data analysis methods in the domain are currently based on anomaly detection. This presents accuracy issues and the challenge of securing service reliability. We propose a new analysis method that finds activities such as operation or movement from electricity consumption and communication usage data. This is evidence of safety. As a result, we demonstrate better performance through comparative verification. Ultimately, this study aims to contribute to a more reliable implementation of a service that enables monitoring of lonely deaths.

1. Introduction

The death of single-person households has become an increasingly important social problem in many countries. Thus, attempts have been made to provide information communication technology (ICT) based services to alleviate this problem. Most of these services monitor the condition of single persons in real-time through the internet of things (IoT) sensors or smartphone apps [1,2,3,4,5,6,7,8,9,10,11,12,13,14]. Furthermore, the methods of capturing abnormal states are mainstream. Although these methods are real-time-based and widely distributed, they have some limitations. Single-persons who are taken care of by IoT devices feel uncomfortable and find them difficult to operate [15]. This may lead to the discontinuation of the service. Moreover, the total device introduction cost has a large gap with the affordability that the government as a service provider can pay willingly.
For this reason, the use of utility data, such as electricity, water, and gas, has been gaining significant attention [16,17,18,19,20,21,22,23,24,25,26,27,28,29]. This method provides an advantage in that the required data can be easily collected without causing discomfort to single-person households. Usually, it is well prepared to be provided with an open application programming interface (API) by utility companies. This helps the service development cost to be relatively low. In addition, communication data represent another important data source. Activities such as making a call, sending a message, operating smartphone apps, and outing can be found in the data.
However, these data are usually provided one day later. As a result, real-time data analysis is difficult, which is a disadvantage. Considering cost–benefit trade-offs, finding lonely deaths on a daily basis rather than real-time detection is more practical. The latter approach is almost impossible to implement for this purpose. Therefore, solution development using utility and communication data is much more beneficial and promising.
Among all the utility data, the development of solutions using electricity consumption data is preferred. This is probably because of the better readiness compared to other utility data. However, there persist issues with the accuracy of the analysis results. For example, a typical problem is the occurrence of false alarms. In terms of delivering meaningful warnings to a caring agent, it can be useful. However, it needs to be eliminated because it becomes cumbersome for the person in charge.
Electricity consumption and communication history data are all personal information, so privacy is an important issue for this research. Even if it is used for good purposes, such as monitoring lonely deaths, which is an application field of this paper, artificial intelligence (AI) technology should not infringe privacy contrary to its intention. Therefore, the collection of personal information should be minimized, and de-identification should be properly used in the data preprocessing process. By thoroughly complying with the detailed guidelines of the personal information protection act, the possibility of problems can be eliminated.
In this study, we first review existing analysis methods and examine these issues. A new analysis method that infers home appliance activation of single-person households from electricity consumption data is presented to improve the accuracy. This can provide explicit evidence of safety. The process of finding additional activities through communication data analysis is also explained. Furthermore, an experiment using real input and output data from the ongoing service was carried out. Consequently, the proposed analysis method was proven to make more reliable predictions of lonely deaths.
In summary, our contributions are as follows:
  • We propose a new analysis method that recognizes single-person household activities from electricity consumption data. This is mainly different from existing methods using anomaly detection.
  • We propose an additional method to identify activities from communication usage data. It includes explicit operations related to communication services and implicit movements recognized by the analysis of location information.
  • We conduct a performance evaluation of the existing and the proposed methods using real data, compare the result metrics, and prove that our approach shows better performance. This can be referenced in the literature to build more reliable and low-cost monitoring of lonely deaths.

2. Related Work

2.1. Using IoT Devices

Many services have been provided to monitor single-person households using IoT devices. IoT devices here include video cameras, wearable devices, special-purpose sensors, and smart plugs. The device-based service provision method is summarized as follows:
  • Activity detection-based: It intuitively grasps the safety of the person from the data captured by the IoT device [1,2,4,11,12]. Providing an app for a smartphone, as in [13,14], belongs to the method of using an IoT device based on activity detection;
  • Anomaly detection-based: Abnormal conditions are analyzed by collecting physical health information (heart rate, electrocardiogram, etc.) [3,5,10].
Some cases use both activity detection and anomaly detection. They first collect activity-related data and then analyze the abnormal state as the next step [6,7,8,9].

2.2. Using Utility or Communication Data

There has also been much research on how to use data provided by utility or communication companies. How the data are generated can be seen in Figure 1. Electricity consumption is measured by the meter device, one of the components of the advanced metering infrastructure (AMI). The power line communication (PLC) method is mainly used between the modem installed in the home and the data concentration unit (DCU) outside the home, and in Korea, the introduction rate of such AMI systems currently reaches 43%. Communication usage data are generated in the core network.
The data analysis method was categorized as follows:
  • Activity detection-based: It identifies human activities using utility consumption data [16,17,18,19]. Communication usage data processed from call detail records (CDRs) are used to find call patterns and location movements [20,21];
  • Anomaly detection-based: It checks whether an abnormality exceeding a specific threshold has occurred. Various techniques such as Bayesian networks, support vector machines, nearest neighbors, clustering, hidden Markov models (HMMs), and neural networks have been applied to detect such anomalies [22,23,24,25,26,27,28,29].

2.3. Summary

The data and analysis methods used in the related work can be summarized in Table 1. They are useful for implementing lonely-death monitoring services. However, these methods have both advantages and disadvantages.
As mentioned, despite the advantage of high context awareness, the IoT device utilization method has a problem in terms of introduction cost. Smartphone apps do not cost too much, but there is a disadvantage in that it is inconvenient for single-person households.
Therefore, using utility or communication data has advantages over the method of using IoT devices. The existing approach has mainly adopted anomaly detection-based methods, as shown in Figure 2. This method involves learning from past data, predicting total consumption for the present day, and checking whether the observed consumption is significantly different from the predicted amount. If the difference is too high, it is regarded as an anomaly.
The prediction of total consumption is highly accurate only when dealing with issues of electricity demand across large buildings, cities, and countries. They are composed of many individual consumption points, such as houses, offices, and factories. Because the size of the observation group is large, an error that belongs to different patterns is acceptable within the margin of error. However, the situation is quite different when it is applied to a single household. Predicting electricity consumption, especially for single-person households, may not be successful. This is because it is difficult to infer a person’s lifestyle.
The activity detection-based method using electricity consumption data in the previous work adopted power disaggregation technology, also known as non-intrusive load monitoring (NILM) [30]. However, NILM usually requires 1 s sampled data, and is still limitedly applied to commercialization [31], so it is not feasible to provide a cost-effective lonely-death monitoring service.
Based on prior work, our approach focuses on activity detection using electricity consumption and communication usage data. There have been studies in this direction, but they are not suitable for practical implementation. Therefore, we propose a new pragmatic analytical method.

3. Activity Detection

This section introduces the details of our activity-detection method. Our key idea is to use the characteristics of electricity consumption that occur only in single-person households. Communication usage was also assessed. In addition, a method for recognizing movement through location information is proposed.

3.1. Analysis of Electricity Consumption Data

The reasoning output of the existing anomaly detection-based analysis method is either “abnormal” or not. As explained, the result in the form of “abnormal” might not be accurate for a few reasons. In contrast, in the proposed new analysis method, the results “normal” or not are presented. If clear evidence of normality is found, it is more appropriate to say “normal” rather than “abnormal”.
For this purpose, the base load must be identified. The base load refers to a load generated by constant electricity consumption sources, such as a refrigerator. By extracting the base load from the total electricity consumption, we can identify appliance activation by a single person as clear evidence for safety. The method is shown in Figure 3. This leads to enhanced accuracy in the domain.

3.1.1. Overview

The total electricity consumption (CT) measured at home can be defined as the sum of the consumption by appliances (CA) that people use and the consumption by the base load (CB). The base load is always included in the total electricity consumption, as specified in Equation (1).
CT = CA + CB
It is not possible to know how many and what kinds of appliances constitute the base load, it becomes a factor that makes accurate prediction difficult. Thus, without proper processing of the base load, no analysis model can achieve reliable accuracy.
While monitoring the electricity consumption of single-person households, we discover one important fact that differs from the other average households: if a single person goes out, only the base load (CB) occurs in the house. By considering the electricity consumption during the time of going out, the base load can be determined. Hereafter, the base load is used to obtain the activation of the appliance (CA) that a single person explicitly makes, and Equation (1) can be rewritten as follows:
CA = CT − CB
In other words, the activation of an appliance at a certain time can be defined by Equation (2). Because the total electricity consumption (CT) is measured and provided as raw data for a service, if the base load is obtained by the above logic, the activation of an appliance can be captured.
When CA is close to 0, it means that there is only a base load and no activation. However, if the value of CA is greater than a certain bound, it is assumed that there is an activation. The bound is a tuning parameter that can affect service performance. We focus on the activation of an appliance because it is made by the direct operation of a single-person household, presenting clear evidence of safety.
One interesting aspect of this process is that the base load is not always the same. This is because the composition of the base load can be changed by adding or removing appliances. Moreover, they can show seasonal trends. Therefore, we need to develop a model that trains the base load and predicts it. In our study, the base load was not a simple observation or an average, but it was the predicted result obtained by the analysis model.

3.1.2. Analysis Model

A service maintains each single-person household’s hourly (average) location information. This information can be collected from smartphone apps or location-based services. The latter method is used in this study. As the home address is pre-registered to a service, it is translated into location information in terms of latitude and longitude and compared with the hourly location to obtain the distance. When the distance is greater than a threshold, it is regarded as an outing. As the location information is cell-based, a maximum error of 1 km is used as the threshold in this case.
We now have an hourly outing vector through previous processing. This vector is referenced to obtain the corresponding base load. The total steps required to acquire the base load are shown in Figure 4.
After iterating the previous step in ascending time order for a certain period (for a month in this study), an aggregated result is collected. Because it is unusual to go out all the time, there are missing values in the time sequence data. The resultant data on a 24 h graph are displayed in Figure 5. The amount of learning data obtained as a result varies depending on each single-person household.
Next, outliers (outside 20% of statistics) are eliminated as part of the pre-processing. The results are shown in Figure 6.
After the base load data for training are prepared, it is possible to develop an analysis model for each single-person household to predict the upcoming base load. The model is re-trained once per month. The training data have missing values, as mentioned. The long short-term memory (LSTM) algorithm is known to be effective in this situation [32] and is hence used to build the analysis model. A detailed summary of the model information that includes some tuned parameters is listed in Table 2. For example, within relatively small epochs, the mean squared error shows up to be 0.0041.
Training data are reshaped into arrays of 36 h data streams. The reason for using a 36 h unit instead of a 24 h unit is to preserve the continuity of time in the input data and prevent incorrect prediction at around 00:00. This is a way to make the analysis model understand that every 00:00 is linked to 23:00 on the previous day. The output from the analysis is also the 36 h unit, but the 24 h unit (00:00–23:00) is the one used daily.
An example of the predicted base load of a single-person household is shown in Figure 7. It is found that the graph is not just the average or median of that shown in Figure 6; rather, it is a result obtained by reflecting trends in ascending time order. This has the advantage of being able to reflect seasonal changes.

3.1.3. Activity Detection

According to Equation (2), the actual activation of an appliance as evidence for safety can be determined by subtracting the predicted base load from the total electricity consumption.
The six occurrences (at 4, 6, 7, 8, 12, and 13) surrounded by dotted rectangles reveal clear differences (over 30% of the base load) from the base load in Figure 8. It is concluded that a single-person household is “normal,” if at least one of the positive cases appears during a day.

3.2. Analysis of Communication Usage Data

Communication usage data as a life log can be used to check the safety of single-person households. For this, we need to obtain data from a telecommunication company, and consent of the user to provide personal information is required. In general, such data are extracted from CDRs for billing and the information we use is called sending and receiving, text sending, data usage, and location information. Here, text receiving is excluded because it is always accepted regardless of the user’s status.
We analyze the communication data in two ways. First, we simply check whether usage exists or not. Second, we investigate the movement over a very short distance or indoors using location information.

3.2.1. Overview

Checking communication data is straightforward. If a communication history exists, it is regarded as the user’s activity. Whether the user is out is determined by calculating the distance between the home and positioned location.
Next, further examination of the user’s movement is examined. User movement can be divided into three cases, as shown in Figure 9. In the case of A, it is a movement outside the maximum positioning error, which means an obvious outing. Case B usually involves moving a short distance. In the case of C, it represents indoor movement, but it is difficult to recognize because it is movement over a relatively small distance. Therefore, separate indoor positioning technology is required.
Our goal is to find a way to detect the movement in cases B and C without adopting an additional solution. However, if a specific user’s position during the day appears outside the home as only one position on the map, similar to case B, it should not be interpreted as a short distance movement because it may be due to a positioning error.
In contrast, if more than two positions appear within the maximum positioning error, it can be regarded as a short-distance movement. Figure 10 explains the reasons for this. It shows the base stations that have the highest signal strength at six locations in the sample house. The information is measured by an Android application called LTE Discovery. If we use cell ID-based positioning that only uses the strongest signal base station, it is “086” in the north and “258” in the south. In this case, even if single-person households have been at home all day but stayed in the north and south for a certain amount of time, two different positions are shown on the map.
A similar result occurs in other positioning methods, such as triangular or primary cell (pCELL), using the signal strength with the base station. Figure 11 shows an example in which the cell list of the strongest signal strength is changed from (1, 2, 3) to (1, 3, 4) according to the user’s movement from left to right within a certain small area. The positioning result was also changed from P0 to P1 using the triangular positioning method. Similarly, if there is a change in the signal strength of the neighboring base station caused by a small distance movement, positioning results appear at more than two points on the map. Therefore, the short-distance movement of cases B and C can be identified by investigating the distinct number of location clusters on the map.

3.2.2. Analysis Model

The analysis model checks the following conditions to confirm user activity. The first four conditions are collected as raw data, and the last field is calculated using location information, as explained earlier (outing vector in Figure 4). The amount of data usage per hour, 143 KB, is determined by the statistical average survey of single low-income households
As explained, in order to determine the movement within the maximum positioning error range, it is necessary to investigate whether two or more positions appear on the map. For this, k-means clustering using the elbow method [33] was used. It helps to find the optimal number of clusters that reduces the sum of squared errors (SSE) the most. Thus, the above example represents the result as two, as shown in Figure 12.

3.2.3. Activity Detection

The activity detection method is performed using communication usage data by executing the following tasks in order:
  • First, we check the conditions shown in Table 3;
  • Then, we investigate the number of location clusters. If more than two positions appear, we infer that there is a movement within the maximum positioning error.
Figure 13 shows the results of finding the indoor movement of the sample users. Two different positions as a result of cell ID-based positioning appeared on the map. It was confirmed that users stayed at home all day. Thus, this case represents indoor movement.

3.3. Combined Analysis

The two analysis methods described above are not selectively performed, but are integrated into one system. Combining analysis methods such as this increases the probability of finding an activity. In addition, finding multiple pieces of evidence is advantageous because the results can be more reliable. The detailed execution sequence is shown in Figure 14.

4. Experiments

To verify the effectiveness of the new analysis method, we compared the existing anomaly detection-based method with the proposed activity detection-based analysis method. For this, we used actual data from real single-person households.
The existing single-person care service that analyzes electricity consumption data only was jointly provided by SK Telecom and Korea Electric Power Corporation (KEPCO). The prediction was made by an autoencoder as one of the deep learning models that periodically learned total electricity consumption data, the only input feature, for approximately a month. The training data had no missing values. It generated a negative prediction when an anomaly was detected. The results obtained by the current service are the baseline for comparison.

4.1. Dataset

For the selection of the 88 single-person households that have both electricity consumption and communication usage data, the experiment was conducted for a period of 30 days (16 June 2020–15 July 2020). There was no lonely death during that period. We use a proprietary dataset because public data for benchmarking in this area are not yet available. The experiment was conducted with the data of the user who consented to the provision of personal information.
Unnecessary sensitive information such as social security numbers (SSN) was not collected. This is because there is no problem in implementing the end-to-end service without collecting excessive personal information.
In addition, our service complies with Korea’s personal information protection act similar to general data protection regulation (GDPR). According to the regulation, data that have passed 3 months are strictly deleted.

4.2. Evaluation

The estimated result from the new analysis method belongs to one of the following cases in Table 4. Over 50% (51.76 = 24.27 + 24.32 + 2.06 + 1.11) result was confirmed by multiple evidences. This is the key to achieving higher reliability.
Each analysis method in the proposed system confirmed actual positive cases with the proportions shown in Figure 15. This represents the degree of impact on the results. For example, 96% of actual positive cases were verified only by the analysis of electricity consumption. Therefore, the analysis of electricity consumption data should be primary and the analysis of communication usage data should be supplementary to the system.
We also examined the analysis results by creating the confusion matrix presented in Table 5. This matrix derives performance metrics, such as accuracy, precision, recall, and f1-score, as defined in Equations (3)–(6).
Accuracy = (TP + TN)/(TP + FP + TN + FN)
Precision = TP/(TP + FP)
Recall = TP/(TP + FN)
F1 Score = 2 × Precision × Recall/(Precision + Recall)
False alarm refers to FN or FP. In general, FP is much more serious. In order to improve the performance of the analysis model, false alarms should be reduced. For this, it is necessary to increase the data to be analyzed or to improve the analysis model algorithm.

4.3. Results

The comparison results of the existing and new analysis methods are listed in Table 6. New 1 uses only activity detection-based analysis from electricity consumption data. In addition, New 2 additionally performs an analysis of communication usage data. In our dataset, there is no actual negative case. Therefore, FP and TN in the confusion matrix are 0. Thus, the precision is always 1. In addition, the accuracy and recall were identical. Therefore, only recall and f1-score are listed in Table 6. The performance metrics of recall and f1-score obtained via the proposed analysis method improved by 8.9% and 4.2%, respectively. Our analysis model only with New 1 showed better performance than the anomaly detection-based existing model by 6.7% in the recall metric. The improvement results are also presented as graphs in Figure 16 and Figure 17.

4.4. Discussion

We know the actual positive cases, so TP and FN in the confusion matrix are the most obvious values. Therefore, among all the performance metrics, recall, which is composed of only TP and FN, is a more reliable performance metric. When interpreting the results, recall is considered the most important metric for our purposes. A recall performance close to 1 indicates that unnecessary work is significantly reduced. The possibility of false alarms is 10% in the existing systems. The ratio is sometimes burdensome to the service provider, so improvement is expected.
On 7 July 2020, the existing system suffered from an inaccuracy problem. However, our approach showed stable performance even on the same day.
Our work proved that adding more data to the analysis can improve the performance, rather than using a single source of data. It helped to find more evidence for predicting positive results and could reduce false alarms. Analysis of communication usage data showed an additional 2% improvement in performance.
Therefore, it can be concluded that the proposed method has advantages over the existing anomaly detection-based method. It is more accurate, reliable, and feasible to add more data sources to be analyzed.
The class imbalance issue should be considered, but our dataset has no actual negative cases. Therefore, other performance metrics, such as the FP rate explained in [34], are not given. This is the limitation caused by the dataset used.

5. Conclusions

The results of existing analysis methods adopted for our single-person care service are sometimes inaccurate. Hence, it is necessary to develop a new analysis method. This was the motivation for our study. Consequently, unlike existing analysis methods, the proposed analysis method identifies normal activities of single persons.
First, the difference between the total electricity consumption and base load was observed. A large difference clearly indicated that home appliances were activated. Therefore, it was reasonable to accept it as evidence that a single-person household was safe. For this, it was necessary to build an LSTM-based analysis model to predict the base load. A detailed explanation for identifying, learning, and predicting the base load is provided in this paper. Base load often causes inaccuracy in the existing analysis methods, but it is the key to finding more convincing evidence in the proposed analysis method. This activity detection-based analysis showed better performance than the existing anomaly detection-based model.
Moreover, the analysis of communication usage data was also performed using our approach. Only a few single-person households did not use communication in a day, and the data are useful for verification. Explicit activity from communication data was checked. For implicit activity, we additionally introduced an analysis model by investigating location information using k-means clustering to recognize short distance or indoor movement.
The experimental results show that the overall performance of the proposed analysis model is more accurate for all the performance metrics. In particular, the recall metric showed 98% performance.
Based on these results, we plan to replace the existing analysis model in the near future. Furthermore, it is hoped that the proposed technology can be applied to other services such as electronic anklets and self-isolation monitoring. Because these services are also aimed at monitoring special single-person households, the proposed analysis method can be useful for implementation.

Author Contributions

Conceptualization, G.K.; Formal analysis, G.K. and S.P.; Funding acquisition, S.P.; Investigation, G.K. and S.P.; Software, G.K.; Supervision, S.P.; Validation, S.P.; Writing—original draft, G.K.; Writing—review and editing, G.K. and S.P. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (IITP-2017-0-00477, (SW starlab) Research and development of the high performance in-memory distributed DBMS based on flash memory storage in an IoT environment).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Eldib, M.; Deboeverie, F.; Philips, W.; Aghajana, H. Behavior analysis for elderly care using a network of low-resolution visual sensors. Electron. Imaging 2016, 25, 041003. [Google Scholar] [CrossRef] [Green Version]
  2. He, Z.; Lu, D.; Yang, Y.; Gao, M. An Elderly Care System Based on Multiple Information Fusion. Health Eng. 2018, 2018, 4098237. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  3. Al-khafajiy, M.; Baker, T.; Chalmers, C.; Asim, M.; Kolivand, H.; Fahim, M.; Waraich, A. Remote health monitoring of elderly through wearable sensors. Multimed. Tools Appl. 2019, 78, 24681–24706. [Google Scholar] [CrossRef] [Green Version]
  4. Pinto, S.; Cabral, J.; Gomes, T. We-Care: An IoT-based Health Care System for Elderly People. In Proceedings of the IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada, 22–25 March 2017. [Google Scholar]
  5. Dias, D.; Cunha, J.P.S. Wearable Health Devices? Vital Sign Monitoring, Systems and Technologies. Sensors 2018, 18, 2414. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  6. Selvakanmani, S. Android Based Health Monitoring System for Elderly People. Trend Res. Dev. 2018, 2, 4. [Google Scholar]
  7. Eisa, S.; Moreira, A. A Behaviour Monitoring System (BMS) for Ambient Assisted Living. Sensors 2017, 17, 1946. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  8. Almeida, A.; Mulero, R.; Rametta, P.; Urošević, V.; Andrić, M.; Patrono, L. A critical analysis of an IoT—Aware AAL system for elderly monitoring. Future Gener. Comput. Syst. 2019, 97, 598–619. [Google Scholar] [CrossRef]
  9. Aran, O.; Sanchez-Cortes, D.; Do, M.; Gatica-Perez, D. Anomaly detection in elderly daily behavior in ambient sensing environments. In Proceedings of the International Workshop on Human Behavior Understanding, 22 September 2016; pp. 51–67. [Google Scholar]
  10. Grewal, A.; Kaur, M.; Park, J.H. A Unified Framework for Behaviour Monitoring and Abnormality Detection for Smart Home. Wirel. Commun. Mob. Comput. 2019, 2019, 1734615. [Google Scholar] [CrossRef]
  11. Patrono, L.; Primiceri, P.; Rametta, P.; Sergi, I.; Visconti, P. An Innovative Approach for Monitoring Elderly Behavior by Detecting Home Appliance’s Usage. In Proceedings of the 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), Split, Croatia, 21–23 September 2017. [Google Scholar]
  12. Vafeiadis, A.; Vafeiadis, T.; Zikos, S.; Krinidis, S.; Votis, K.; Giakoumis, D.; Ioannidis, D.; Tzovaras, D.; Chen, L.; Hamzaoui, R. Energy-based decision engine for household human activity recognition. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom) Workshops, Athens, Greece, 19–23 March 2018. [Google Scholar]
  13. Chettya, G.; Whiteb, M.; Akthera, F. Smart Phone Based Data Mining for Human Activity Recognition. In Proceedings of the International Conference on Information and Communication Technologies (ICICT), Kochi, India, 3–5 December 2014; pp. 1181–1187. [Google Scholar]
  14. Choujaa, D.; Dulay, N. Activity Recognition from Mobile Phone Data: State of the Art, Prospects and Open Problems. Imp. Coll. Lond. 2009, 5, 32. [Google Scholar]
  15. Woo, S. Benefits and Challenges of Long Term Self-Tracking to Prevent Lonely Deaths and Detect Signs of Life. In Proceedings of the a Short Workshop on Next Steps Towards Long Term Self Tracking at ACM SIG CHI2018, Montreal, QC, Canada, 21 April 2018. [Google Scholar]
  16. Alcalá, J.; Parson, O.; Rogers, A. Detecting Anomalies in Activities of Daily Living of Elderly Residents via Energy Disaggregation and Cox Processes. In Proceedings of the 2nd ACM International Conference on Embedded Systems for Energy-Efficient Built Environments, Seoul, Korea, 4–5 November 2015; pp. 225–234. [Google Scholar]
  17. Ishizu, K.; Mizumoto, T.; Yamaguchi, H.; Higashino, T. Home Activity Recognition Using Aggregated Electricity Consumption Data. In Proceedings of the IEEE International Conference on Smart Computing (SMARTCOMP), Bologna, Italy, 14–17 September 2020. [Google Scholar]
  18. Ishizu, K.; Mizumoto, T.; Yamaguchi, H.; Higashino, T. Home Activity Pattern Estimation Using Aggregated Electricity Consumption Data. Sens. Mater. 2021, 33, 69–88. [Google Scholar]
  19. Stankovic, L.; Stankovic, V.; Liao, J.; Wilson, C. Measuring the energy intensity of domestic activities from smart meter data. Appl. Energy 2016, 183, 1565–1580. [Google Scholar] [CrossRef] [Green Version]
  20. Zhou, C.; Xu, Z.; Huang, B. Activity Recognition from Call Detail Record: Relation Between Mobile Behavior Pattern and Social Attribute using Hierarchical Conditional Random Fields. In Proceedings of the IEEE/ACM International Conference on Green Computing and Communications & Int’l Conference on Cyber, Physical and Social Computing, Hangzhou, China, 18–20 December 2010. [Google Scholar]
  21. Eagle, N.; Pentland, A. Reality mining: Sensing complex social systems. Pers. Ubiquitous Comput. 2005, 10, 255–268. [Google Scholar] [CrossRef]
  22. Nordahl, C.; Persson, M.; Grahn, H. Detection of Residents’ Abnormal Behaviour by Analysing Energy Consumption of Individual Households. In Proceedings of the IEEE International Conference on Data Mining Workshops (ICDMW), New Orleans, LA, USA, 18–21 November 2017. [Google Scholar]
  23. Hori, M.; Harada, T.; Taniguchi, R. Anomaly Detection for an Elderly Person Watching System using Multiple Power Consumption Models. In Proceedings of the 6th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Porto, Portugal, 24–26 February 2017; pp. 669–675. [Google Scholar]
  24. Gonzalez-Vidal, A.; Cuenca-Jara, J.; Skarmeta, A.F. IoT for Water Management: Towards Intelligent Anomaly Detection. In Proceedings of the IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019. [Google Scholar]
  25. Gao, B.; Liu, X.; Zhu, Z. A Bottom-Up Model for Household Load Profile Based on the Consumption Behavior of Residents. Energies 2018, 11, 2112. [Google Scholar] [CrossRef] [Green Version]
  26. Nadai, M.D.; Someren, M. Short-term anomaly detection in gas consumption through ARIMA and Artificial Neural Network forecast. In Proceedings of the IEEE Workshop on Environmental, Energy, and Structural Monitoring Systems (EESMS), Trento, Italy, 9–10 July 2015. [Google Scholar]
  27. Wang, Y.; Chen, Q.; Hong, T.; Kang, C. Review of Smart Meter Data Analytics: Applications, Methodologies, and Challenges. IEEE Trans. Smart Grid 2018, 10, 3125–3148. [Google Scholar] [CrossRef] [Green Version]
  28. Feng, L.; Xu, S.; Zhang, L.; Wu, J.; Zhang, J.; Chu, C.; Wangand, Z.; Shi, H. Anomaly detection for electricity consumption in cloud computing: Framework, methods, applications, and challenges. Eurasip J. Wirel. Commun. Netw. 2020, 2020, 194. [Google Scholar] [CrossRef]
  29. Chahla, C.; Snoussi, H.; Merghem, L.; Esseghir, M. A Novel Approach for Anomaly Detection in Power Consumption Data. In Proceedings of the 8th International Conference on Pattern Recognition Applications and Methods (ICPRAM), Prague, Czech Republic, 19–21 February 2019; pp. 483–490. [Google Scholar]
  30. Hart, G.W. Nonintrusive appliance load monitoring. Proc. IEEE 1992, 80, 1870–1891. [Google Scholar] [CrossRef]
  31. Kim, G.; Park, S. A Study on Data Requirements for Power Disaggregation. In Proceedings of the 3rd International Conference on Power and Energy Applications (ICPEA), Busan, Korea, 9–11 October 2020. [Google Scholar]
  32. Verma, H.; Kumar, S. An accurate missing data prediction method using LSTM based deep learning for health care. In Proceedings of the 20th International Conference on Distributed Computing and Networking (ICDCN), Bangalore, India, 4–7 January 2019; pp. 371–376. [Google Scholar]
  33. Joshi, K.D.; Nalwade, P.S. Modified K-Means for Better Initial Cluster Centres. Int. J. Comput. Sci. Mob. Comput. 2013, 2, 219–223. [Google Scholar]
  34. Guo, X.; Yin, Y.; Dong, C.; Yang, G.; Zhou, G. On the Class Imbalance Problem. In Proceedings of the 4th International Conference on Natural Computation, Jinan, China, 18–20 October 2008. [Google Scholar]
Figure 1. Data generation process in power and communication systems.
Figure 1. Data generation process in power and communication systems.
Sensors 21 03016 g001
Figure 2. Anomaly detection-based analysis method using machine learning.
Figure 2. Anomaly detection-based analysis method using machine learning.
Sensors 21 03016 g002
Figure 3. Proposed activity detection-based analysis method.
Figure 3. Proposed activity detection-based analysis method.
Sensors 21 03016 g003
Figure 4. Method of finding base load.
Figure 4. Method of finding base load.
Sensors 21 03016 g004
Figure 5. Sample user’s base load by time (raw data).
Figure 5. Sample user’s base load by time (raw data).
Sensors 21 03016 g005
Figure 6. Sample user’s base load by time (pre-processed).
Figure 6. Sample user’s base load by time (pre-processed).
Sensors 21 03016 g006
Figure 7. Sample user’s base load by time (predicted).
Figure 7. Sample user’s base load by time (predicted).
Sensors 21 03016 g007
Figure 8. Finding actual positive cases.
Figure 8. Finding actual positive cases.
Sensors 21 03016 g008
Figure 9. Three cases of user’s movement in our domain.
Figure 9. Three cases of user’s movement in our domain.
Sensors 21 03016 g009
Figure 10. Physical cell IDs (PCI) of neighboring base stations with the strongest signal (measured at author’s house).
Figure 10. Physical cell IDs (PCI) of neighboring base stations with the strongest signal (measured at author’s house).
Sensors 21 03016 g010
Figure 11. Example movement within a certain bound and the change of positioning result.
Figure 11. Example movement within a certain bound and the change of positioning result.
Sensors 21 03016 g011
Figure 12. Finding optimal number of clusters using k-means clustering with elbow method.
Figure 12. Finding optimal number of clusters using k-means clustering with elbow method.
Sensors 21 03016 g012
Figure 13. Sample cases of representing two location clusters while staying at home.
Figure 13. Sample cases of representing two location clusters while staying at home.
Sensors 21 03016 g013
Figure 14. Flow chart of combined analysis.
Figure 14. Flow chart of combined analysis.
Sensors 21 03016 g014
Figure 15. Confirmation ratio of each analysis method.
Figure 15. Confirmation ratio of each analysis method.
Sensors 21 03016 g015
Figure 16. Performance comparison in recall metric.
Figure 16. Performance comparison in recall metric.
Sensors 21 03016 g016
Figure 17. Performance comparison in f1-score metric.
Figure 17. Performance comparison in f1-score metric.
Sensors 21 03016 g017
Table 1. Comparison of methods for implementing care services.
Table 1. Comparison of methods for implementing care services.
MethodIoT DeviceUtility or Communication Data
Activity detection[1,2,4,11,12,13,14], [6,7,8,9] *[16,17,18,19,20,21]
Anomaly detection[3,5,10], [6,7,8,9] *[22,23,24,25,26,27,28,29]
* Studies that used both analysis methods.
Table 2. Base load prediction model.
Table 2. Base load prediction model.
ParameterValue
AlgorithmLSTM
Layer3
Epoch20
Batch Size1
Learning Rate0.001
Train Data Size0–720 (=24 × 30)
Input Shape(36, 1)
Average Train Time *16 s
Elapsed Prediction Time *<1 s
Mean Squared Error0.0041
OptimizerAdam
* Quad core laptop (1.7 GHz CPU and 8 GB memory) is used to train and predict.
Table 3. Verifying conditions of communication data.
Table 3. Verifying conditions of communication data.
ConditionBaseline
No. of Inbound Calls>0
No. of Outbound Calls>0
No. of Messages Sent>0
Data Usages Per Hour>143 KB
No. of Outing>0
Table 4. Cases of evaluated results by proposed method.
Table 4. Cases of evaluated results by proposed method.
① *② **③ ***Proportion (%)
foundfoundfound24.27
foundfound-24.32
found-found2.06
found--45.37
-foundfound1.11
-found-0.04
--found0.15
---2.10
* Electricity consumption data analysis, ** Communication usage data analysis (history), *** Communication usage data analysis (movement within a short distance or indoors).
Table 5. Confusion matrix and performance metrics.
Table 5. Confusion matrix and performance metrics.
CasesPredicted
PostiveNegative
ActualPostiveTrue Positives (TP)False Negatives (FN)
NegativeFalse Positives (FP)True Negatives (TN)
Table 6. Performance evaluation results.
Table 6. Performance evaluation results.
DateExistingNew 1New 2 (Combined)
RecallF1-ScoreRecallF1-ScoreRecallF1-Score
16 June 20200.940.970.930.960.940.97
17 June 20200.860.930.930.960.940.97
18 June 20200.920.960.930.960.990.99
19 June 20200.890.940.920.960.970.98
20 June 20200.900.950.950.980.990.99
21 June 20200.850.920.920.960.950.98
22 June 20200.910.950.970.980.980.99
23 June 20200.890.940.950.980.980.99
24 June 20200.900.950.950.980.980.99
25 June 20200.930.960.980.990.990.99
26 June 20200.910.950.990.991.001.00
27 June 20200.890.940.970.980.980.99
28 June 20200.920.960.990.991.001.00
29 June 20200.950.970.960.980.990.99
30 June 20200.930.960.950.970.980.99
1 July 20200.900.950.910.950.940.97
2 July 20200.930.960.940.970.980.99
3 July 20200.860.930.960.980.960.98
4 July 20200.880.930.900.950.950.97
5 July 20200.910.950.960.980.960.98
6 July 20200.940.970.980.990.990.99
7 July 20200.740.850.960.980.990.99
8 July 20200.950.970.960.980.970.99
9 July 20200.980.990.990.990.990.99
10 July 20200.950.971.001.001.001.00
11 July 20200.880.930.960.980.980.99
12 July 20200.930.960.960.980.970.99
13 July 20200.940.970.960.980.990.99
14 July 20200.880.940.960.980.970.99
15 July 20200.880.940.970.980.980.99
Average0.900.950.960.980.980.99
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Kim, G.; Park, S. Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths. Sensors 2021, 21, 3016. https://doi.org/10.3390/s21093016

AMA Style

Kim G, Park S. Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths. Sensors. 2021; 21(9):3016. https://doi.org/10.3390/s21093016

Chicago/Turabian Style

Kim, Gyubaek, and Sanghyun Park. 2021. "Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths" Sensors 21, no. 9: 3016. https://doi.org/10.3390/s21093016

APA Style

Kim, G., & Park, S. (2021). Activity Detection from Electricity Consumption and Communication Usage Data for Monitoring Lonely Deaths. Sensors, 21(9), 3016. https://doi.org/10.3390/s21093016

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop