Skip to main content
Log in

Internet of Things based activity surveillance of defence personnel

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Developments in Internet of Things (IoT) Technology have been effectively utilized in different industrial sectors for monitoring, surveillance, and remote decision-making. The ability to acquire in-depth information about ubiquitous events has proliferated numerous opportunities for using this technology in sensitive domains like national defence security. In this paper, a comprehensive IoT-based framework is presented for analyzing national integrity of defence personnel with consideration to his/her daily activities. As reported by investigating agencies of many countries, routinely engagements of defence personnel are one of the premier reasons for vulnerability to national defence through intentional and unintentional information outflow of defence secrets. The work presented in this research is focused on monitoring various activities of defence personnel to determine his/her integral behavior in daily life. Specifically, Integrity Index Value is defined for every defence personnel based on different social engagements, and activities for detecting the vulnerability to national security. In addition to this, a probabilistic decision tree based automated decision making is presented to aid defence officials in analyzing various activities of a defence personnel for his/her integrity assessment. In order to validate the proposed framework, three challenging data sets have been considered for experimental evaluation. The computed results are compared with the state-of-the-art techniques for overall assessment. Results show that the proposed model achieves better performance in monitoring and analyzing activities of defence personnel for effective decision making.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  • Aggarwal CC, Zhai C (2012) Mining text data. Springer

  • Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of Things: a survey on enabling technologies, protocols and applications. IEEE Commun Surveys Tutor 17:2347–2376. doi:10.1109/COMST.2015.2444095

    Article  Google Scholar 

  • Antoni A, Marjanovi M, Pripui K, Arko IP (2016) A mobile crowd sensing ecosystem enabled by CUPUS: cloud-based publish/subscribe middleware for the Internet of Things. Futur Gener Comput Syst 56:607–622. doi:10.1016/j.future.2015.08.005

    Article  Google Scholar 

  • Baba AI, Lu H, Pedersen TB, Xie X (2013) A graph model for false negative handling in indoor RFID tracking data. In: 21st ACM International Conference on Advances in Geographic Information Systems. ACM. doi:10.1145/2525314.2525461

  • Bjelopera JP, Randol MA (2011) The federal bureau of investigation and terrorism investigations. Congressional Research Service, Library of Congress. https://fas.org/sgp/crs/terror/R41780.pdf. Accessed 10 Jan 2016

  • Bosch X (2012) Beyond 9/11: health consequences of the terror attacks outside the USA. Intern Emerg Med 7:159–161. doi:10.1007/s11739-011-0748-7

    Article  Google Scholar 

  • Chen T, Lehr J, Lavrova O, Martinez-Ramonz M (2016) Distribution-level peak load prediction based on Bayesian additive regression trees. In Power and Energy Society General Meeting (PESGM), IEEE. doi:10.1109/PESGM.2016.7741565

    Book  Google Scholar 

  • Chen Z, Xia F, Huang T, Bu F, Wang H (2013) A localization method for the Internet of Things. J Supercomput 63:657–674. doi:10.1007/s11227-011-0693-2

    Article  Google Scholar 

  • Chiremsel Z, Said RN, Chiremsel R (2016) Probabilistic fault diagnosis of safety instrumented systems based on fault tree analysis and Bayesian network. J Fail Anal Prevent 16:747–760. doi:10.1007/s11668-016-0140-z

    Article  Google Scholar 

  • Darwish M, Almouahed S, de Lamotte F (2017) The integration of expert-defined importance factors to enrich Bayesian fault tree analysis. Reliab Eng Syst Saf 162:81–90. doi:10.1016/j.ress.2017.01.007

    Article  Google Scholar 

  • De Martino B, Kumaran D, Seymour B, Dolan RJ (2006) Frames, biases, and rational decision-making in the human brain. Science 313:684–687. doi:10.1126/science.1128356

    Article  Google Scholar 

  • Dean J, Ghemawat S (2008) MapReduce: simplified data processing on large clusters. Commun ACM 51:107–113. doi:10.1145/1327452.1327492

    Article  Google Scholar 

  • Ding G, Guo Y, Zhou J, Gao Y (2016) Large-scale cross-modality search via collective matrix factorization hashing. IEEE Trans Image Process 25:5427–5440. doi:10.1109/TIP.2016.2607421

    Article  MathSciNet  Google Scholar 

  • Fang S, Xu L, Pei H, Liu Y, Liu Z, Zhu Y, Zhang H (2014) An integrated approach to snowmelt flood forecasting in water resource management. IEEE Trans Ind Inf 10:548–558. doi:10.1109/TII.2013.2257807

  • Feng DG, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22:71–83

    Article  Google Scholar 

  • Flouvat F, Nguyen Van Soc JF, Desmier E, Selmaoui-Folcher N (2015) Domain-driven co-location mining. Geoinformatica 19:147–183. doi:10.1007/s10707-014-0209-3

    Article  Google Scholar 

  • Ganz F, Barnaghi P, Carrez F (2013) Information abstraction for heterogeneous real world internet data. IEEE Sens J 13:3793–3805. doi:10.1109/JSEN.2013.2271562

    Article  Google Scholar 

  • Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of Things (IoT): a vision, architectural elements, and future directions. Futur Gener Comput Syst 29:1645–1660. doi:10.1016/j.future.2013.01.010

    Article  Google Scholar 

  • Harte N, Gillen E (2015) TCD-TIMIT: an audio-visual corpus of continuous speech. IEEE Trans Multimed 17:603–615. doi:10.1109/TMM.2015.2407694

    Article  Google Scholar 

  • Harwood B, Drummond T (2016) FANNG: fast approximate nearest neighbour graphs. IEEE Conf Comput Vis Patt Recognit (CVPR). doi:10.1109/CVPR.2016.616

  • Hirsch M, Carli P, Nizard R, Riou B, Baroudjian B, Baubet T, Fontaine JP (2015) The medical response to multisite terrorist attacks in Paris. Lancet 386:2535–2538. doi:10.1016/S0140-6736(15)01063-6

    Article  Google Scholar 

  • Holmes G, Donkin A, Witten IH (1994) Weka: a machine learning workbench. IEEE, In Intelligent Information Systems. doi:10.1109/ANZIIS.1994.396988

  • Hsieh CK, Tangmunarunkit H, Alquaddoomi F, Jenkins J, Kang J, Ketcham C, Estrin D (2013) Lifestreams: a modular sense-making toolset for identifying important patterns from everyday life. In: Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems. ACM. doi:10.1145/2517351.2517368

  • Keller JM, Gray MR, Givens JA (1985) A fuzzy k-nearest neighbor algorithm. IEEE Trans Syst Man Cybern 4:580–585

    Article  Google Scholar 

  • Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens J 13:3846–3853. doi:10.1109/JSEN.2013.2263379

    Article  Google Scholar 

  • Kontschieder P, Fiterau M, Criminisi A, Rota Bulo S (2015) Deep neural decision forests. IEEE Int Conf Comput Vis (ICVR). doi:10.1109/ICCV.2015.172

  • Kronstadt KA (2008) Terrorist attacks in Mumbai, India, and implications for US interests. Library of Congress Washington DC Congressional Research Service. http://www.dtic.mil/get-tr-doc/pdf?AD=ADA492902. Accessed 2 Jan 2016

  • Kumar S, Udupa R (2011) Learning hash functions for cross-view similarity search. Int Joint Conf Artif Intel. doi:10.5591/978-1-57735-516-8/IJCAI11-230

  • Le Bas C, Sahuguede S, Julien-Vergonjanne A (2017) Theoretical and experimental approach for the design of an optical wireless physical activity monitoring system. Int J Wirel Inf Netw. doi:10.1007/s10776-017-0337-4

    Article  Google Scholar 

  • Lee J, Fan Y, Sisson SA (2015) Bayesian threshold selection for extremal models using measures of surprise. Comput Stat Data Anal 85:84–99. doi:10.1016/j.csda.2014.12.004

    Article  MathSciNet  Google Scholar 

  • Lee L, Romano R, Stein G (2000) Monitoring activities from multiple video streams: establishing a common coordinate frame. IEEE Trans Patt Anal Mach Intell 22:758–767. doi:10.1109/34.868678

    Article  Google Scholar 

  • Li J, Stones RJ, Wang G, Liu X, Li Z, Xu M (2017) Hard drive failure prediction using Decision Trees. Reliab Eng Syst Saf 164:55–65. doi:10.1016/j.ress.2017.03.004

    Article  Google Scholar 

  • Li S, Da Xu L, Wang X (2013) Compressed sensing signal and data acquisition in wireless sensor networks and internet of things. IEEE Trans Ind Inf 9:2177–2186. doi:10.1109/TII.2012.2189222

    Article  Google Scholar 

  • Liang M, Hu X (2015) Recurrent convolutional neural network for object recognition. IEEE Conf Comput Vis Patt Recognit (CVPR). doi:10.1109/CVPR.2015.7298958

  • Lin J, Keogh E, Wei L, Lonardi S (2007) Experiencing sax: a novel symbolic representation of time series. Data Min Knowl Disc 15:107–144. doi:10.1007/s10618-007-0064-z

    Article  MathSciNet  Google Scholar 

  • Lin Z, Ding G, Han J, Wang J (2016) Cross-view retrieval via probability-based semantics-preserving hashing. IEEE Trans Cybern. doi:10.1109/TCYB.2016.2608906

    Article  Google Scholar 

  • Liu Y, Xu L, Li M (2016) The parallelization of back propagation neural network in MapReduce and spark. Int J Parallel Program. doi:10.1007/s10766-016-0401-1

    Article  Google Scholar 

  • Lu G, Yan Y, Sebe N, Kambhamettu C (2014) Knowing where i am: exploiting multi-task learning for multi-view indoor image-based localization. BMVC. doi:10.5244/C.28.125

  • Manikonda L, Mangalampalli A, Pudi V (2010) UACI: Uncertain associative classifier for object class identification in images. Image Vis Comput N Z (IVCNZ). doi:10.1109/IVCNZ.2010.6148859

  • Maurer U, Smailagic A, Siewiorek DP, Deisher M (2006) International Workshop on Wearable and Implantable Body Sensor Networks. In: IEEE, Activity recognition and monitoring using multiple sensors on different body positions. doi:10.1109/BSN.2006.6

  • Mavroforakis ME, Theodoridis S (2005) IEEE, Support Vector Machine (SVM) classification through geometry

  • Meucci F, Pierucci L, Prasad N (2011) Identity theft detection based on neural network non-linearity identification in OFDM system. In: 2011 IEEE International Conference on Communications (ICC). IEEE

  • Najafi B, Aminian K, Paraschiv-Ionescu A, Loew F, Bula CJ, Robert P (2003) Ambulatory system for human motion analysis using a kinematic sensor: monitoring of daily physical activity in the elderly. IEEE Trans Biomed Eng 50:711–723. doi:10.1109/TBME.2003.812189

    Article  Google Scholar 

  • Narula S, Jain A (2015) Cloud computing security: Amazon web service. Adv Comput Commun Technol (ACCT) IEEE. doi:10.1109/ACCT.2015.20

  • ONS Database. https://www.ons.gov.uk/. Accessed 17 March 2017

  • Panahi N, Shayesteh MG, Mihandoost S, Varghahan BZ (2011) Recognition of different datasets using PCA, LDA, and various classifiers. In: Application of Information and Communication Technologies (AICT). IEEE. doi:10.1109/ICAICT.2011.6110912

  • Payal A, Rai CS, Reddy BVR (2014) Artificial neural networks for developing localization framework in wireless sensor networks. In: Data Mining and Intelligent Computing (ICDMIC),IEEE. doi:10.1109/ICDMIC.2014.6954228

  • Qian F, Yin L, He Q, He J (2009) Mining spatio-temporal co-location patterns with weighted sliding window. IEEE Int Conf Intell Comput Intell Syst 3:181–185. doi:10.1109/ICICISYS.2009.5358192

    Article  Google Scholar 

  • Rokach L, Maimon O (2014) Data mining with decision trees: theory and applications. World scientific

  • Schmid H (2013) Probabilistic part-ospeech tagging using decision trees. In: New methods in language processing. Routledge

  • Song J, Yang Y, Yang Y, Huang Z, Shen HT (2013) Inter-media hashing for large-scale retrieval from heterogeneous data sources. Int Conf Manag Data. doi:10.1145/2463676.2465274

  • Sparapani RA, Logan BR, McCulloch RE, Laud PW (2016) Nonparametric survival analysis using bayesian additive regression trees (bart). Stat Med. doi:10.1002/sim.6893

    Article  MathSciNet  Google Scholar 

  • St J, Oniga S, Buchman A (2015) Real time human activity monitoring. Ann Math Inf 44:187–196. http://ami.ektf.hu/uploads/papers/finalpdf/AMI44 from187to196.pdf. Accessed 10 Jan 2016

  • Sundaram VM, Paneer P (2012) Discovering co-location patterns from spatial domain using a delaunay approach. Proc Eng 38:2832–2845. doi:10.1016/j.proeng.2012.06.332

    Article  Google Scholar 

  • Tong S, Chang E (2001) Support vector machine active learning for image retrieval. Ninth ACM Int Conf Multimed. doi:10.1145/500141.500159

  • Vale L, Brito M, Henriques J, Carvalho P, Pena A, Santiago F (2010) LifeStream: real-time bio-signal remote monitoring system. In: 4th International Conference In Bioinformatics and Biomedical Engineering (ICBBE). IEEE. doi:10.1109/ICBBE.2010.5514665

  • Wang L, Tao J, Ranjan R, Marten H, Streit A, Chen J, Chen D (2013) G-Hadoop: MapReduce across distributed data centers for data-intensive computing. Futur Gener Compu Syst 29:739–750. doi:10.1016/j.future.2012.09.001

    Article  Google Scholar 

  • Xia Y, Liu C, Li Y, Liu N (2017) A boosted decision tree approach using Bayesian hyper-parameter optimization for credit scoring. Expert Syst Appl 78:225–241. doi:10.1016/j.eswa.2017.02.017

    Article  Google Scholar 

  • Xu L, He W, Li S (2014) Internet of Things in industries: a survey. IEEE Trans Ind Inf 10:2233–2243. doi:10.1109/TII.2014.2300753

    Article  Google Scholar 

  • Xu Y, Agyemang B, Wu S, Liu M (2017) Procedure graph model for automatic RFID data processing service management. IEEE Internet Things J. doi:10.1109/JIOT.2017.2661326

    Article  Google Scholar 

  • Yang CC, Hsu YL (2010) A review of accelerometry-based wearable motion detectors for physical activity monitoring. Sensors 10:7772–7788. doi:10.3390/s100807772

    Article  Google Scholar 

  • Zhang GA, Gu JY, Bao ZH, Xu C, Zhang SB (2014) Joint routing and channel assignment algorithms in cognitive wireless mesh networks. Trans Emerg Telecommun Technol 25:294–307. doi:10.1002/ett.2560

    Article  Google Scholar 

  • Zhao S, Yao H, Sun X (2013) Video classification and recommendation based on affective analysis of viewers. Neurocomputing 119:101–110. doi:10.1016/j.neucom.2012.04.042

    Article  Google Scholar 

  • Zhao S, Yao H, Gao Y, Ji R, Ding G (2016) Continuous probability distribution prediction of image emotions via multi-task shared sparse regression. IEEE Trans Multimed. doi:10.1109/TMM.2016.2617741

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Munish Bhatia.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bhatia, M., Sood, S.K. Internet of Things based activity surveillance of defence personnel. J Ambient Intell Human Comput 9, 2061–2076 (2018). https://doi.org/10.1007/s12652-017-0507-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0507-3

Keywords

Navigation