=Paper=
{{Paper
|id=Vol-2142/paper14
|storemode=property
|title=Preserving safety, privacy and mobility of persons living with Dementia by recognising uncharacteristic out-door movement using Recurrent Neural Networks with low computing capacity
|pdfUrl=https://ceur-ws.org/Vol-2142/paper14.pdf
|volume=Vol-2142
|authors=Steve Williams,J Mark Ware,Berndt Müller
|dblpUrl=https://dblp.org/rec/conf/ijcai/WilliamsWM18
}}
==Preserving safety, privacy and mobility of persons living with Dementia by recognising uncharacteristic out-door movement using Recurrent Neural Networks with low computing capacity==
Preserving safety, privacy and mobility of persons living with Dementia by recognising uncharacteristic out-door movement using Recurrent Neural Networks with low computing capacity Steve Williams , J Mark Ware , Berndt Müller 1 1 1 1 Faculty of Computing, Engineering and Science, University of South Wales, UK {steve.williams1,mark.ware,bertie.muller}@southwales.ac.uk A large proportion of the population has become used to sharing private infor- mation on the internet with their friends. This information can leak throughout their social network and the extent that personal information propagates depends on the privacy policy of large corporations. In an era of artificial intelligence, data mining, and cloud computing, is it necessary to share personal information with unidentifiable people? Our research shows that deep learning is possible using relatively low capacity computing. The research demonstrates promising results in recognition of human geospatial activity, in prediction of movement, and assessment of contextual risk when applied to spatio-temporal positioning of human subjects. A private surveillance system is thought particularly suitable in the care of those who may, to some, be considered vulnerable. Keywords: privacy, deep learning, assisted-living, mobile computing, ethics, mHeath, wearable health, dementia, safer walking, GPS, LSTM, RNN 1 Background Advancements in mobile devices that can be worn and carried, their interconnectiv- ity, and the improvement of artificially intelligent tools provide a significant oppor- tunity to assist in the care of the aged. In line with a human right to private life, meth- ods have been examined to keep information private unless there is a moral argument, such as risk to that person, that justifies a breach in privacy. In this scenario, safety is paramount and in the interests of beneficence and non-maleficence an ethical policy in terms of design is employed which defines that personal information is precious; it should therefore not be shared on the internet. Dementia is a debilitating condition that is growing with the aging society. Contin- uance with life in the community is encouraged, since social interaction and physical activity stimulates a healthy mental state in the person living with symptoms (PwS) and family carer. (The dyad: Persons living with Dementia (PlwD)). We seek bespoke Ar- tificially Intelligent solutions for PlwD who wish to preserve independence of the PwS. Initial system infrastructure and findings are published in [1], the suitability of a mobile computer technology in tracking PwS and ethical aspects are previously discussed in [2]. The work described here contributes to the ethical debate regarding at which point information gathered when monitoring a PwS should be shared by introducing a tech- nological solution that keeps data private until a threshold of risk to health is reached. To this end, a monitoring system is designed that requires the PwS to carry a mobile phone and wear a fitness tracker. It is understood that some may not be comfortable with this. While it is anticipated that the mobile technology component will ultimately be integrated in a single wearable device, these requirements restrict usefulness to PwS who are already comfortable with or habitually carry such devices. 2 The problem The objective is to provide a cost-effective ‘electronic safety net’ that provides peace of mind to the carer while preserving independence of the PwS. Delayed residential care can reduce impact economically [3], but more importantly this can sustain the fun- damentals of a family unit. 2.1 Dementia Dementia is caused by a several diseases of the brain. There is a wide spectrum of symptoms, some of which may manifest in a propensity to walk independently at inap- propriate times [4]. Literature indicates that this can lead to premature mortality [4, 5, 6]. Actions to mitigate this risk can lead to increased dependence, to curtailment of social activities, and reduction in quality of life (QoL) [7]. Elopement episodes are a major reason for nursing home admission [8]; one study in Finland reports that this may be delayed, using assistive technology, by an average of eight months [9]. 2.2 Privacy On-line data privacy divides opinion: many elect to share very varied information about their lives publicly on the internet, but this is not always a conscious decision – ‘small print’ tends to get lost to many users as they install yet another application on their phone. Consent in this way is referred to as informed – the potential for data prop- agation may be mentioned in supplied information, but few consider this thoroughly. Leaks of private information have recently been in the headlines; data secured on the cloud is assumed to be safe, but human intervention and inadequate security measures both allow breaches. Advocates of privacy treat their own information very differently and do not share their information with people or organisations – certainly not a com- puter system. In the case of care for persons who may be considered vulnerable it seems ethically correct that a data protectionist policy should be the default. 3 A human rights-based approach The World Health Organisation advocates a human rights-based approach for PlwD [10]. In our study almost two years of data was collected, including GPS, nearby Wi- Fi nodes, activity recognition, even indoor movement and logs of heart rate, steps, and sleep patterns. This monitoring undoubtedly invades the right to private life; the track- ing was described by the subject as a big-brother bad dream; on reflection the level of “invasion” depends on who can see the data. 3.1 Cost effective hardware platform To reduce costs and to improve potential accessibility in the long term, the equipment used in a working prototype is a standard Android smart-phone and a home-based hub which uses a Quad-Core 1.2Ghz CPU with only 1Gb RAM. Networking between the two in ‘monitoring’ mode is via onboard Bluetooth and Wi-Fi only while at home. 3.2 Unconventional Deep Learning Deep learning (DL) discovers intricate structure in large datasets, multiple processing layers learn representations of data [11]. Sequential and parallel information is pro- cessed in a cyclical (recurrent) fashion by modifying internal weightings of input sig- nals to produce an expected output signal [12, 13]. The hardware platform described may seem restrictive for a DL task in an age where we have got used to resources being server based and ubiquity being the norm. Convention says that DL requires large computing capacity that is not available for the present use case. The goal is that human mobility patterns are learnt, and that perceived risk is assessed against a normality that is ‘safe’. A measure of risk is then used to determine the level of protection required on personal data. Location data for one user is relatively small compared to conventional DL problems; to protect privacy, propagation of this information is restricted to a secure home network. No interaction with the wearable or phone is required of the PwS. 3.3 Deep Learning using Recurrent Neural Networks (RNN) Long Short-Term Memory (LSTM) networks [14] are a type of RNN suitable for learning and predicting sequential patterns and trends in timelines. Using the on-board accelerometers, they are deployed in human activity recognition (HAR). X-Y-Z accel- erometer readings are interpreted over a defined time-period and then compared to those taken in a laboratory to determine probability that a categorised activity is taking place [15]. It has been possible for us to assimilate this using GPS sensor data; a dataset suitable for learning using an LSTM neural network was developed, and the resultant tensor was deployed to the Android platform to provide probability of being on a learnt trajectory or otherwise. The concept that surveillance need not be invasive is introduced. There is a host of literature relating to HAR [16], there are indoor monitoring studies with AI, e.g. [17], and study of wandering trajectories, e.g. [18]. None describe categorisation of where a person normally goes followed by discrete monitoring that keeps information private until anomalies are found. Data: GPS data is collected from one subject using a standard HTC-10 smart-phone used just for that purpose. Considerable data preparation is required using the minute- by-minute location co-ordinates. The raw data of one trajectory can be visualised in a histogram as seen in Fig. 1, peaks signifying stops en-route. Total data is compart- mentalised based on total movement to date (tm). This is then divided by increment (i) after 2α, for example 1% of tm, is added in both dimensions to allow for noise on the extremities of tm. In Fig. 2. i = 20. Fig. 1. Spatio-temporal raw data, time at Fig. 2. Boundaries of the extent of total move- a place is represented as peaks with ment for 3 months, i = 20. movement represented as single points. Map data: © Google. Destinations or latent time at a point can be recognised using centroids of clusters for each trajectory. Once destinations are recognised, it is preferred – for reasons of computational time later – that daily data is reduced for example from 1440 points to only the proportion that represents movement. Categorisation. Points within each segment (or compartment) are assessed for each trajectory and each segment’s points are compared using a kd-tree based nearest-neigh- bour algorithm [19]. The degree of similarity is assessed giving a percentage, a thresh- old gives a similarity decision. There is difficulty in some trajectories where, for exam- ple, topographical, atmospheric or networking issues used in test data collection leads to sparse and noisy data. Sparse data was dealt with using 1d-univariate interpolation [20]; this is particularly important in the early days of training where there are few trajectories to compare. Noisy data is essentially ignored at this time by adding a tol- erance to the similarity decision just described which is explained in more detail below (Fig. 7.). The result of the comparison algorithm is a segment chain (string) for trajec- tories with 1 or 0 signifying a match in each square. Fig. 3. A successful match of two segment chains. Fig. 4. Interpolation used to deal with 29 segments, i=10 sparse data causing accuracy issues Map data: © Google Categorisation by comparison of trajectory segment chains by only comparing matched segments significantly reduces the computational capacity required in terms of processing and memory. If a match is found, interpolated point data is added to a master repository with which future comparisons are made. An encoded polyline [21] reduces database size requirements and gives an advantage that trajectories may be stored as an entity. In time the necessity for interpolation is reduced as the repository trajectory density increases. As seen in Fig. 4. interpolation may cause significant deviation from the route that is travelled, cutting corners and roundabouts, but this level of granulation is considered satisfactory at this point – matching segments rely on a nearest neighbour tolerance (nnT) and merging with subsequent trajectories eventually creates a dense category master. Fig. 5. a) Increased tolerance leads to a better match b) Interpolated points are merged to create a dense category master nnT set at 0.005, in decimal degrees which equates to just over 500m is used in the experiments. This tolerance can be linked to tm in further work as the extent of move- ment defines the granularity required within the movement space. The resultant cate- gories develop into a densely populated polyline seen in Fig. 5b. All movement within a data collection period are matched with destinations recognised in the initial cluster analysis. In addition to our own, the comparison algorithm was tested using seven users’ data from the Geolife (GL) data-set [22]. This contains better quality GPS trajectories and includes higher variance in modes of travel. With nnT applied to nearest neighbour algorithm it is observed that small deviations from a route are not a significant problem. As can be seen in Fig. 6., four separate tracks converge on a destination and in the extent of this day’s movement all points are within one segment. Noise, detours and differing distances included in two tracks taking Route 1 and Route 2 in Fig. 7., both arrive at the same place E1 and C2. nnT allows for the eventu- ality of C1 and D1 not matching Route 2. Adding both to the master increases the pos- sibility that subsequent trajectories match by widening the data-set. Fig. 6. Walking via different routes to a bus- Fig. 7. Widening the category master by al- stop Map data: © GoogleMaps lowing a nearest neighbour tolerance Bearing. Some GL users’ data highlighted the difficulty of recognising direction of travel in that only one-way trajectories are recorded. Experimentation with inclusion of direction of travel gave complex results, consequently movement is treated as omni- directional; the category master is essentially an amalgamation of history on that route. Time factor. This is an important consideration in the study scenario, but the likelihood of a person travelling a recognised trajectory at exactly the same time is low so predic- tion of this is not required. There are detours from a route, the method of travel may change, there may be traffic. These factors all have a significant impact on spatio-tem- poral data. Following extensive experimentation, it is concluded that data-point true timestamps cause confusion. Instead, each category master is indexed sequentially. Predictability. Major studies in human mobility patterns find that there is a high de- gree of temporal and spatial regularity [23]. In the data-sets investigated, this study concurs. Three regularly visited destinations in our data are selected for demonstration; these are travel to University (south), to visit family (west) and to a supermarket (east) seen in Fig. 8. Fig. 8. Three categories overlaid, interpolated; 3 x 10k records Pre-processing. Category masters are exported and the number of records per category is equalised by interpolating (increased or reduced) to 10,000 records each. Noise is amplified where outliers are interpolated. These outliers will be removed in later ver- sions of the system. The data is stacked and normalised. Train:test split is 80:20. Machine Learning. Inspiration for this is credited to work using Convolutional Neural Network and LSTM RNN in mobile phone HAR applications. The solution selected for our application is Tensorflow ‘BasicLSTMCell’ stacked with ‘MultiRNNCell’ with 64 hidden units. The neural network is expected to learn geo-spatial data to predict categorisation (of the trajectory) when it is given further blocks. Experimentation found that the number of time steps set at 10, in blocks of 10 gave acceptable results over 500 epochs in less than 1.5 hours. Fig. 9. LSTM training session over 1.4 hours. 90-97% accuracy Training was carried out using matched trajectories in the GL dataset with similarly acceptable results. Fig. 10. LSTM training session for 7 users (in 9 tests) using Geolife data-set Deployment. Using our data-set the resultant tensor is imported to an Android appli- cation that sequentially passes arrays of 10 steps of a new trajectory in a timed fashion to a Tensorflow classifier. The probability of the array being Category 1, 2 or 3 gives results for the three trained classes. These predictions are logged on the phone. Mobile Results. Category 1: Correctly predicted with 98-99% certainty unless trajectories overlap. Category 2: Correctly predicted with 55-86% certainty. Category 3: Correctly predicted with 77- 90% certainty. a) b) c) Fig. 11. Android category prediction results: The vertical scale on these graphs range from 0 to 1 where 1=100% certainty. a) Category 1 (dotted line) b) Category 2 (dashed line) c) Category 3 (solid line) The tensor gives reliable prediction of a route being tested in all cases. These are very satisfactory results. Overlap between two categories returning a 50:50 result in the Category 1 test is perfectly acceptable as the routes do overlap. 3.4 Inferring an unknown location In this study the definition of an abnormal location is an important requirement, so an additional category is added specifically for this. A convex hull polygon is formed for each segment in the geo-spatial area of movement, this is built as an output from the classification routine on the hub. If the current location is within a polygon the Tensor- flow Classifier result is used in prediction of where the subject is going. If not, then risk is accumulated as follows: If the subject moves to a new space, the contextual risk of that action is assessed using time and known weather conditions. If this is computed as simply walking in a new area on a sunny afternoon for a short time, this may be appraised as low risk and no information should be shared. In Fig.12 a) movement along the test trajectory is outside known areas (shaded grey), distance and known temperature for the area is monitored (left graph above map). Risk is visualised (right graph): as distance from home (start point) reduces, the system perceives this as returning, and risk is reduced. In Fig.12 b) a detour outside a known path instigates appraisal and logs this as a new place. Risk is reset when probability of normal movement is sensed as seen in Fig. 12 c). In a real-life scenario, retraining will take place when the user returns home. If uncharacteristic movement at a low risk level has been sensed this path is added to the category master. However, if a risk threshold has been breached it is likely that this event is not added as this would require intervention from the carer. a) b) c) Fig. 12. a) Graphed representation of accumulating risk reducing with distance. b) Risk increasing when taking a detour from the trained path. c) Correct categorisation of trajectory with 99% accuracy – accumulated risk is reset. The predisposition of the PlwD is assessed using a fitness tracker that monitors sleep disturbances and heart rate. Changes in trends in this data will be used to adjust the sensitivity of the described system in calculating the real-time contextual risk. 4 Ethics The ethical debate regarding the point at which location data is shared and with whom is an interesting area to which our findings may contribute. If time, place or weather is appraised as high risk or ‘inappropriate’; a prior moral framework that rates safety and risk vs. privacy can justify that recent movement and current location may be shared. This sharing can take the form of an SMS alert, or an alert via the internet with a map to a trusted carer. In all other cases the PwS may continue independently. Several questions arise: • When applied to vulnerable persons who may decide this point and who de- fines what is ‘inappropriate’? • Is normality really ‘safe’? • In production would an AI-based algorithm be trusted? Until now, surveillance of those who may be considered vulnerable lacks legislative control. There are barriers to the use of assistive technology and a DIY approach is being adopted by users [24]. Technological solutions fail to offer a considered techno- logical approach to resolve well-known privacy issues. A private monitoring system that uses AI to determine out-of-the-ordinary movement is novel and since it respects privacy, this surveillance is not intrusive. Development and implementation of such a system is likely to provide PlwD with an electronic safety net that may be used to im- prove QoL by increasing independent living of the PwS, by providing peace of mind to the carer, and in the ideal case may be used to delay moving to a care home. 5 Conclusion The research presented in this paper shows promising results both in recognition of human geo-spatial activity and in prediction of movement along normally travelled routes. A cost effective working prototype has been produced to demonstrate that deep- learning techniques can be applied to spatio-temporal data after programmatically cat- egorising normally travelled trajectories. It has been found that when only part of a trajectory has been travelled, likely destinations may be inferred. The application is designed to restrict personal information propagation to a home network. The limita- tions on computing capacity do not detract from the quality of results. The World Health Organisation recognises that surveillance is intrusive, that the hu- man rights of PwS are denied and that abuse is present. Locking doors to stop a person eloping violates their human right to liberty, but surveillance is contrary to their human right to private life. Risk, when deviations from known places are sensed, is assessed automatically on a smart-phone in the context of time and weather conditions. Human rights (of private life and liberty) of the person with symptoms will be respected until the point at which it is judged that a prior moral argument of safety and risk supersedes the importance of privacy. If this happens, alerts containing location and recent move- ments are shared with an assigned carer, thus facilitating swift recovery. The potential of the AI system described here is considerable; it is likely that many that value the importance of privacy highly will welcome a surveillance system that monitors but does not divulge detail. Predictions of likely trajectory of movement using real-time location data is novel, as is the concept of private surveillance as described. Availability of an internet connection or at least cellular coverage to deliver alerts is a requirement for an implementation of this concept. Ongoing work includes the processing of GPS data from recruited volunteers. The assessment of complex and intertwined trajectories and comparison of different scales of movement for one user will be carried out. A bespoke application will be deployed for testing in the field by the volunteers. Findings will contribute to further dissemina- tion after consultation with health professionals and PlwD. Acknowledgements Knowledge Economy Skills Scholarships (KESS) is a pan-Wales higher level skills initiative led by Bangor University on behalf of the HE sectors in Wales. It is part funded by the Welsh Government's European Social Fund (ESF) convergence programme for West Wales and the Valleys and is supported by an industrial partner: SymlConnect Limited. References [1] Williams, S., Müller, B. (2017). Agents and Dementia - Smart Risk Assessment, 14th European Conference on Multi-Agent Systems, EUMAS 2016 pp. 277-284 ISBN 978-3-319-59294-7). Valencia, Spain: Springer. [2] Williams, S., Ware, J. M. (2015). Is the use of 'mobile computer technology' appropriate for locating people with dementia? GIS Research UK (GISRUK) 2015 Proceedings pp. 659-664. Leeds: Figshare. doi:10.6084/m9.figshare.1491375 [3] Curtis, L., Burns, A. (2015). Unit Costs of Health and Social Care 2015. Canterbury, UK: Personal Social Services Research Unit. Retrieved August 22nd, 2016, from Personal Social Service Research Unit: http://www.pssru.ac.uk/project-pages/unit-costs/2015/index.php [4] Silverstein, N. F. et al. (2006). Dementia and Wandering Behavior: Concern for the Lost Elder. New York: Springer Publishing Company ISBN 0-8261-0272-7. [5] McShane R. et al. (1998). Getting Lost in Dementia: A Longitudinal Study of a Behavioral Symptom. International Psychogeriatrics Volume 10 / Issue 03, pp. 253-260. Retrieved from http://www.ncbi.nlm.nih.gov/pubmed/9785146 [6] Ali, N. et al. (2016). Risk assessment of wandering behavior in mild dementia. Int J Geriatr Psychiatry(31), 367–374. doi:https://doi.org/10.1002/gps.4336 [7] Martyr, A. et al. Living Well with Dementia: A systematic review. Alzheimer's & Dementia: The Journal of the Alzheimer's Association, 13(7), pp. 1567-1568 . doi:10.1016/j.jalz.2017.07.725 [8] Cipriani, G., Lucetti, C., Nuti, A. and Danti, S. (2014). Wandering and dementia. Psychogeriatrics, 14, 135–142. doi:doi:10.1111/psyg.12044 [9] Riikonen, M., Mäkelä, K. and Perälä, S. (2010). Safety and monitoring technologies for the homes of people with dementia. Gerontechnology, 9(1), pp. 32-45. doi:http://dx.doi.org/10.4017/gt.2010.09.01.003.00 [10] World Health Organisation. (2015). Ensuring a human rights-based approach for people living with dementia. Retrieved Mar 2018, from The need for a human-rights based approach: http:// www.who.int/mental_health/neurology/dementia/dementia_thematicbrief_human_rights.pdf [11] LeCun, Y., Bengio, Y. and Hinton, G. (2015). Deep learning. Nature (521), 436–444. doi:10.1038/nature14539 [12] Schmidhuber, J. (2014). Deep Learning in Neural Networks: An Overview. CoRR Neural Networks, pp 85-117. doi:10.1016/j.neunet.2014.09.003 [13] Brownlee, J. (2016). How to Implement the Backpropagation Algorithm From Scratch In Python. Retrieved Mar 2018, from Machine Learning Mastery: https://machinelearningmas- tery.com/implement-backpropagation-algorithm-scratch-python/ [14] Hochreiter, S. and Schmidhuber, J. (1997). Long Short-Term Memory. Neural Computation, 9(8), 1735-1780. doi:10.1162/neco.1997.9.8.1735 [15] Kwapisz, J. R., Weiss, G. M., Moore, S. A. (2010). Activity Recognition using Cell Phone Accelerometers. ACM SIGKDD Explorations Newsletter, 12(2), 74-82. doi:10.1145/1964897.1964918 [16] Ramamurthy, S. R., Roy, N. (2018). Recent trends in machine learning for human activity recognition—A survey. Data mining and Knowledge Discovery, 1-19. doi:10.1002/widm.1254 [17] Arifoglu, D., and Bouchachia, A. (2017). Activity Recognition and Abnormal Behaviour Detection with Recurrent Neural Networks. 14th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2017). 110, pp. 86-93. Procedia Computer Science. doi: 10.1016/j.procs.2017.06.121 [18] E. Batista, F. Borras, F. Casino and A. Solanas. (2015). A study on the detection of wandering patterns in human trajectories. 6th International Conference on Information, Intelligence, Systems and Applications (IISA) (pp. 1-6). Corfu, Greece: IEEE. doi:10.1109/IISA.2015.7387995 [19] Maneewongvatana, S. and Mount, D. M. (1999). Analysis of approximate nearest neighbor searching with clustered point sets. CoRR. doi:arXiv:cs/9901013v1 [20] SciPy.Org. (2017, Oct 25). Interpolation (scipy.interpolate). Retrieved March 17, 2018, from https://docs.scipy.org/doc/scipy/reference/interpolate.html [21] Google. (2018, April 13). Encoded Polyline Algorithm Format. Retrieved Mar 17, 2018, from Google https://developers.google.com/maps/documentation/utilities/polylinealgorithm?csw=1 [22] Zheng et al. (2011). Geolife GPS trajectories 1.1. In Geolife GPS trajectory dataset - User Guide. Retrieved from https://www.microsoft.com/en-us/download/details.aspx?id=52367 [23] González, M. C., Hidalgo, C. A. and Barabási, A. (2008, June). Understanding individual human mobility patterns. Nature (453), pp. 779–782. doi:doi:10.1038/nature06958 [24] Gibson et al. (2015). The everyday use of assistive technology by people with dementia and their family carers: a qualitative study. BMC Geriatrics, 15, 89. doi:10.1186/s12877-015-0091-3