{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T23:35:18Z","timestamp":1648942518978},"reference-count":39,"publisher":"Pleiades Publishing Ltd","issue":"8","license":[{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,12,1]],"date-time":"2020-12-01T00:00:00Z","timestamp":1606780800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Program Comput Soft"],"published-print":{"date-parts":[[2020,12]]},"DOI":"10.1134\/s0361768820080204","type":"journal-article","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T12:03:01Z","timestamp":1608638581000},"page":"626-635","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Machine Learning Based Activity Learning for Behavioral Contexts in Internet of Things (IoT)"],"prefix":"10.1134","volume":"46","author":[{"given":"Muhammad","family":"Safyan","sequence":"first","affiliation":[]},{"given":"Sohail","family":"Sarwar","sequence":"additional","affiliation":[]},{"given":"Zia Ul","family":"Qayyum","sequence":"additional","affiliation":[]},{"given":"Muddasar","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Shancang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Kashif","sequence":"additional","affiliation":[]}],"member":"137","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"3554_CR1","doi-asserted-by":"crossref","unstructured":"Choudhury, T., Consolvo, S., Harrison, B., Hightower, J., LaMarca, A., LeGrand, L., and Klasnja, P., The mobile sensing platform: an embedded activity recognition system, IEEE Pervasive Comput., 2008, vol. 7, no. 2.","DOI":"10.1109\/MPRV.2008.39"},{"key":"3554_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MPRV.2004.7","volume":"3","author":"M. Philipose","year":"2004","unstructured":"Philipose, M., Fishkin, K. P., Perkowitz, M., Patterson, D.J., Fox, D., Kautz, H., and Hahnel, D., Inferring activities from interactions with objects, IEEE Pervasive Comput., 2004, vol. 3, no. 4, pp. 50\u201357.","journal-title":"IEEE Pervasive Comput."},{"key":"3554_CR3","doi-asserted-by":"crossref","unstructured":"Muhammad Safyan, Zia Ul-Qayyum, Sohail Sarwar, Muddesar Iqbal, and Mehtab Ahmed, Context-aware personalized activity modeling in concurrent environment, Proc. 10th Int. Conf. on Internet of Things (iThings-17), Exeter, 2017, pp. 977\u2013982.","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.150"},{"key":"3554_CR4","doi-asserted-by":"publisher","first-page":"6982","DOI":"10.1016\/j.eswa.2012.01.050","volume":"39","author":"A. Fern\u00e1ndez-Caballero","year":"2012","unstructured":"Fern\u00e1ndez-Caballero, A., Human activity monitoring by local and global finite state machines, Expert Syst. Appl., 2012, vol. 39, no. 8, pp. 6982\u20136993.","journal-title":"Expert Syst. Appl."},{"key":"3554_CR5","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.future.2017.09.061","volume":"92","author":"N. Chervyakov","year":"2019","unstructured":"Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-L\u00f3pez, V., and Cort\u00e9s-Mendoza, J.M., AR-RRNS: configurable reliable distributed data storage systems for Internet of Things to ensure security, Future Gener. Comput. Syst., 2019, vol. 92, pp.\u00a01080\u20131092.","journal-title":"Future Gener. Comput. Syst."},{"key":"3554_CR6","first-page":"92","volume":"44","author":"L. Chen","year":"2014","unstructured":"Chen, L., Nugent, C., and Okeyo, G., An ontology-based hybrid approach to activity modeling for smart homes, IEEE Trans. Humanmachine Syst., 2014, vol. 44, no. 1, pp. 92\u2013105.","journal-title":"IEEE Trans. Humanmachine Syst."},{"key":"3554_CR7","doi-asserted-by":"publisher","first-page":"976","DOI":"10.1016\/j.imavis.2009.11.014","volume":"28","author":"R. Poppe","year":"2010","unstructured":"Poppe, R., A survey on vision-based human action recognition, Image Vision Comput., 2010, vol. 28, no. 6, pp.\u00a0976\u2013990.","journal-title":"Image Vision Comput."},{"key":"3554_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1016\/j.cviu.2010.10.002","volume":"115","author":"D. Weinland","year":"2011","unstructured":"Weinland, D., Ronfard, R., and Boyer, E., A survey of vision-based methods for action representation, segmentation and recognition, Comput. Vision Image Understand., 2011, vol. 115, no. 2, pp. 224\u2013241.","journal-title":"Comput. Vision Image Understand."},{"key":"3554_CR9","doi-asserted-by":"publisher","first-page":"3115","DOI":"10.1016\/j.eswa.2014.11.063","volume":"42","author":"G. Azkune","year":"2015","unstructured":"Azkune, G., Almeida, A., L\u00f3pez-de-Ipi\u00f1a, D., and Chen, L., Extending knowledge-driven activity models through data-driven learning techniques, Expert Syst. Appl., 2015, vol. 42, no. 6, pp. 3115\u20133128.","journal-title":"Expert Syst. Appl."},{"key":"3554_CR10","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.pmcj.2014.02.003","volume":"19","author":"J. Ye","year":"2015","unstructured":"Ye, J., Stevenson, G., and Dobson, S., KCAR: a knowledge-driven approach for concurrent activity recognition, Pervasive Mobile Comput., 2015, vol. 19, pp.\u00a047\u201370.","journal-title":"Pervasive Mobile Comput."},{"key":"3554_CR11","doi-asserted-by":"crossref","unstructured":"Riboni, D., Sztyler, T., Civitarese, G., and Stuckenschmidt, H., Unsupervised recognition of interleaved activities of daily living through ontological and probabilistic reasoning, Proc. ACM Int. Joint Conf. on Pervasive and Ubiquitous Computing, Heidelberg, Sept. 2016, pp. 1\u201312.","DOI":"10.1145\/2971648.2971691"},{"key":"3554_CR12","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.future.2014.02.014","volume":"39","author":"G. Okeyo","year":"2014","unstructured":"Okeyo, G., Chen, L., and Wang, H., Combining ontological and temporal formalisms for composite activity modelling and recognition in smart homes, Future Gener. Comput. Syst., 2014, vol. 39, pp. 29\u201343.","journal-title":"Future Gener. Comput. Syst."},{"key":"3554_CR13","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TKDE.2011.51","volume":"24","author":"L. Chen","year":"2012","unstructured":"Chen, L., Nugent, C.D., and Wang, H., A knowledge-driven approach to activity recognition in smart homes, IEEE Trans. Knowl. Data Eng., 2012, vol. 24, no. 6, pp.\u00a0961\u2013974.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3554_CR14","doi-asserted-by":"publisher","first-page":"3115","DOI":"10.1016\/j.eswa.2014.11.063","volume":"42","author":"G. Azkune","year":"2015","unstructured":"Azkune, G., Almeida, A., L\u00f3pez-de-Ipi\u00f1a, D., and Chen, L., Extending knowledge-driven activity models through data-driven learning techniques, Expert Syst. Appl., 2015, vol. 42, no. 6, pp. 3115\u20133128.","journal-title":"Expert Syst. Appl."},{"key":"3554_CR15","doi-asserted-by":"publisher","first-page":"961","DOI":"10.1109\/TKDE.2011.51","volume":"24","author":"L. Chen","year":"2011","unstructured":"Chen, L., Nugent, C.D., and Wang, H., A knowledge-driven approach to activity recognition in smart homes, IEEE Trans. Knowl. Data Eng., 2011, vol. 24, no. 6, pp.\u00a0961\u2013974.","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"3554_CR16","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1016587515822","volume":"7","author":"H.W. Gellersen","year":"2002","unstructured":"Gellersen, H.W., Schmidt, A., and Beigl, M., Multi-sensor context-awareness in mobile devices and smart artifacts, Mobile Networks Appl., 2002, vol. 7, no. 5, pp.\u00a0341\u2013351.","journal-title":"Mobile Networks Appl."},{"key":"3554_CR17","doi-asserted-by":"crossref","unstructured":"Buettner, M., Prasad, R., Philipose, M., and Wetherall, D., Recognizing daily activities with RFID-based sensors, Proc. 11th ACM Int. Conf. on Ubiquitous Computing, Orlando, Sept. 2009, pp. 51\u201360.","DOI":"10.1145\/1620545.1620553"},{"key":"3554_CR18","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1023\/A:1016587515822","volume":"7","author":"H.W. Gellersen","year":"2002","unstructured":"Gellersen, H.W., Schmidt, A., and Beigl, M., Multi-sensor context-awareness in mobile devices and smart artifacts, Mobile Networks Appl., 2002, vol. 7, no. 5, pp.\u00a0341\u2013351.","journal-title":"Mobile Networks Appl."},{"key":"3554_CR19","unstructured":"Ravi, N., Dandekar, N., Mysore, P., and Littman, M.L., Activity recognition from accelerometer data, Proc. 20th Nat. Conf. on Artificial Intelligence and 17th Innovative Applications of Artificial Intelligence Conf., Pittsburgh, July 9\u201313, 2005, vol. 5, pp. 1541\u20131546."},{"key":"3554_CR20","series-title":"Activity recognition from accelerometer data on a mobile phone","volume-title":"Proc. Int. Work-Conf. on Artificial Neural Networks","author":"T. Brezmes","year":"2009","unstructured":"Brezmes, T., Gorricho, J.L., and Cotrina, J., Activity recognition from accelerometer data on a mobile phone, in Proc. Int. Work-Conf. on Artificial Neural Networks, Berlin, Heidelberg: Springer, 2009, pp. 796\u2013799."},{"key":"3554_CR21","series-title":"Unsupervised learning","volume-title":"The MIT Encyclopedia of the Cognitive Sciences","author":"P. Dayan","year":"2008","unstructured":"Dayan, P., Unsupervised learning, in The MIT Encyclopedia of the Cognitive Sciences, Keil, F., Ed., Wilson, 2008, pp. 1\u20137."},{"key":"3554_CR22","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1108\/17440080911006199","volume":"5","author":"L. Chen","year":"2017","unstructured":"Chen, L. and Nugent, C., Ontology based activity recognition in intelligent pervasive environments, Int. J. Web Inf. Syst., 2017, vol. 5, no. 4, pp. 410\u2013430.","journal-title":"Int. J. Web Inf. Syst."},{"key":"3554_CR23","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1177\/0278364907073775","volume":"26","author":"L. Liao","year":"2007","unstructured":"Liao, L., Fox, D., and Kautz, H., Extracting places and activities from gps traces using hierarchical conditional random fields, Int. J. Rob. Res., 2007, vol. 26, no. 1, pp.\u00a0119\u2013134.","journal-title":"Int. J. Rob. Res."},{"key":"3554_CR24","doi-asserted-by":"crossref","unstructured":"Tapia, E.M., Choudhury, T., and Philipose, M., Building reliable activity models using hierarchical shrinkage and mined ontology, Proc. Int. Conf. on Pervasive Computing, Dublin, May 2006, pp. 17\u201332.","DOI":"10.1007\/11748625_2"},{"key":"3554_CR25","doi-asserted-by":"publisher","first-page":"506","DOI":"10.2197\/ipsjdc.3.506","volume":"3","author":"N. Yamada","year":"2007","unstructured":"Yamada, N., Sakamoto, K., Kunito, G., Isoda, Y., Yamazaki, K., and Tanaka, S., Applying ontology and probabilistic model to human activity recognition from surrounding things, IPSJ Digital Cour., 2007, vol. 3, pp.\u00a0506\u2013517.","journal-title":"IPSJ Digital Cour."},{"key":"3554_CR26","doi-asserted-by":"publisher","first-page":"2073","DOI":"10.1007\/s11042-018-6318-5","volume":"78","author":"Muhammad Safyan","year":"2019","unstructured":"Muhammad Safyan, Zia Ul-Qayyum, Sohail Sarwar, Muddesar Iqbal, and Mehtab Ahmed, Ontology-driven semantic unified modeling for concurrent activity recognition (OSCAR), Int. J. Multimedia Tools Appl., 2019, vol. 78, pp. 2073\u20132104.","journal-title":"Int. J. Multimedia Tools Appl."},{"key":"3554_CR27","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/S0921-8890(02)00372-X","volume":"42","author":"T. Fong","year":"2003","unstructured":"Fong, T., Nourbakhsh, I., and Dautenhahn, K., A survey of socially interactive robots, J. Rob. Auton. Syst., 2003, vol. 42, no. 2, pp. 143\u2013166.","journal-title":"J. Rob. Auton. Syst."},{"key":"3554_CR28","unstructured":"Latfi, F., Lefebvre, B., and Deschen, C., Ontology-based management of the tele-health smart home, Proc. OWLED: Workshop on OWL: Experiences and Directions, Innsbruck, 2017, pp. 3\u201316."},{"key":"3554_CR29","unstructured":"Klein, M., Schmidt, A., and Lauer, R., Ontology-centered design of an ambient middleware for assisted living: the case of soprano, Proc. 30th Annu. German Conf. on Artificial Intelligence KI-2007, Osnabr\u00fcck, 2007."},{"key":"3554_CR30","doi-asserted-by":"publisher","unstructured":"Chen, L., Nugent, C., Mulvenna, M., Finlay, D., and Hong, X., Semantic smart homes: towards knowledge rich assisted living environments, Intell. Patient Manag., \n Stud. Comput. Intellig., 2009, vol. 189, no. 1. https:\/\/doi.org\/10.1007\/978-3-642-00179-6_17","DOI":"10.1007\/978-3-642-00179-6_17"},{"key":"3554_CR31","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1134\/S0361768819030058","volume":"45","author":"I.V. Mashechkin","year":"2019","unstructured":"Mashechkin, I.V., Petrovskiy, M.I., Tsarev, D.V., et al., Machine learning methods for detecting and monitoring extremist information on the Internet, Program. Comput. Software, 2019, vol. 45, no. 2, pp. 99\u2013115. https:\/\/doi.org\/10.1134\/S0361768819030058","journal-title":"Program. Comput. Software"},{"key":"3554_CR32","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1134\/S0361768819080152","volume":"45","author":"Sohail Sarwar","year":"2019","unstructured":"Sohail Sarwar, Qayyum, Z.U., Safyan, M., Iqbal, M., and Mahmood, Y., Graphs resemblance based software birthmarks through data mining for piracy control, Program. Comput. Software, 2019, vol. 45, no. 2, pp. 581\u2013589.","journal-title":"Program. Comput. Software"},{"key":"3554_CR33","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1016\/j.future.2017.09.061","volume":"92","author":"N. Chervyakov","year":"2019","unstructured":"Chervyakov, N., Babenko, M., Tchernykh, A., Kucherov, N., Miranda-L\u00f3pez, V., and Cort\u00e9s-Mendoza, J.M., AR-RRNS: configurable reliable distributed data storage systems for Internet of Things to ensure security, Future Gener. Comput. Syst., 2019, vol. 92, no. 1, pp. 1080\u20131092.","journal-title":"Future Gener. Comput. Syst."},{"key":"3554_CR34","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1134\/S0361768819080115","volume":"45","author":"M. Babenko","year":"2019","unstructured":"Babenko, M. and Tchernykh, A., Positional characteristics for efficient number comparison over the homomorphic encryption, Program. Comput. Software, 2019, vol. 45, no. 2, pp. 532\u2013543.","journal-title":"Program. Comput. Software"},{"key":"3554_CR35","unstructured":"Augusto, J.C. and Nugent, C.D., The use of temporal reasoning and management of complex events in smart homes, Proc. 16th European Conf. on Artificial Intelligence, Valencia, 2004, pp. 778\u2013782."},{"key":"3554_CR36","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Hern\u00e1ndez, L.E., Tchernykh, A., Miranda-L\u00f3pez, V., and Babenko, M., Multi-objective configuration of a secured distributed cloud data storage, Proc. Latin American High Performance Computing Conf., Turrialba, 2019, pp. 78\u201393.","DOI":"10.1007\/978-3-030-41005-6_6"},{"key":"3554_CR37","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1134\/S0361768819080115","volume":"45","author":"M. Abenko","year":"2019","unstructured":"Abenko, M., Tchernykh, A., Chervyakov, N., et al., Positional characteristics for efficient number comparison over the homomorphic encryption, Program. Comput. Software, 2019, vol. 45, no. 1, pp. 532\u2013543.","journal-title":"Program. Comput. Software"},{"key":"3554_CR38","unstructured":"Tasos, D. and Tchernykh, A., Lightweight computation to robust cloud infrastructure for future technologies, Proc. 15th EAI Int. Conf. Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom2019, London, 2019."},{"key":"3554_CR39","doi-asserted-by":"publisher","first-page":"100581","DOI":"10.1016\/j.jocs.2016.11.011","volume":"36","author":"A. Tchernykh","year":"2019","unstructured":"Tchernykh, A., Schwiegelsohn, U., Talbi, E.G., and Babenko, M., Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability, J. Comput. Sci., 2019, vol. 36, p. 100581.","journal-title":"J. Comput. Sci."}],"container-title":["Programming and Computer Software"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768820080204.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1134\/S0361768820080204\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1134\/S0361768820080204.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T12:05:23Z","timestamp":1608638723000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1134\/S0361768820080204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12]]},"references-count":39,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["3554"],"URL":"https:\/\/doi.org\/10.1134\/s0361768820080204","relation":{},"ISSN":["0361-7688","1608-3261"],"issn-type":[{"value":"0361-7688","type":"print"},{"value":"1608-3261","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,12]]},"assertion":[{"value":"9 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}