<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Analysing Movement and Behavioural Patterns of Laboratory Mice in a Semi Natural Environment based on Data collected via RFID-Technology</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mareike Kritzler</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lars Lewejohann</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonio Krüger</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Behavioural Biology, University of Münster</institution>
          ,
          <addr-line>Badstraße 9/13, 48149 Münster, Germay</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute for Geoinformatics, University of Münster</institution>
          ,
          <addr-line>Robert-Koch Str.26-28, 48149 Münster</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>17</fpage>
      <lpage>28</lpage>
      <abstract>
        <p>In this paper we present a continuous 24 hour data collection and a semi automated data analysis of laboratory mice in a spacious indoor environment. The data is collected via an RFID tracking solution, a scale and an optical tracking system. The visualisation and the premilary analysis of the data provide information about behavioural and movement patterns of laboratory mice under semi-naturalistic conditions.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>
        In biomedical research mice play a dominant role as an animal model for deciphering
gene functions in vivo. Especially in the investigation of hereditary human diseases
numerous gene targeted mice were created. A detailed behavioural characterization of
these mice aims to find differences between the genetically manipulated (transgenic;
TG) mice and their wild-type conspecifics. Most commonly mice are tested in
standardized but highly artificial situations that allow to analyze defined behavioural
domains in detail but sometimes fail to bring about a thorough, externally valid
behavioural phenotype [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Here we report on a semi-naturalistic setup where TG
mice who carry a genetic predisposition to develop Alzheimer's disease like
symptoms are constantly monitored 24h-7d by means of RFID technology.
Aim of this project is to support the direct behavioural observations of the mice that is
carried out by humans. The population under surveillance consists of up to 40 TG and
wild-type mice that are living in a semi natural environment (SNE). The SNE is
realized as a large indoor cage measuring 1.75 x 1.75 x 2.1 m (L x W x H) comprising
several floors which are connected by Plexiglas tubes. Mice are individually marked
with RFID-chips and positional data is obtained continuously from various antennas
placed in the SNE. The automated tracking solution is established to collect
behavioural and movement data of the mice 24h-7d. A GIS module is developed to
analyze the gathered data. The project focuses on the automated detection of potential
differences in behavioural and movement patterns of the TG and wildtype mice.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2 Related work</title>
      <p>
        To obtain behavioural information from different sensors is even used by testing of
humans. The combination of different sensors to collect data and subsequently obtain
behavioural information was applied in various species including cows [4; 5] and
even humans. For humans one well described testing environment was an everyday
office and it was demonstrated that simple sensors support models which are able to
estimate human interruptibility [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Furthermore in a museum environment
information about visitors were collected. In use are defined visiting styles to assign
the museum visitors to different classes [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Also machine learning techniques have
been applied also to detect and classify common motion patterns, to support users
with dementia in their daily routines [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
      </p>
    </sec>
    <sec id="sec-3">
      <title>3 Scenario setup</title>
      <p>For the collection of behavioural and movement data the SNE had to be structured in
a way that only defined passages were accessible. A schematic view of the cage
design and RFID based tracking solution is shown in figure 1.
60 cm
80 cm
40 cm
1,75 m x1,75 m
2 m x1,75 m</p>
      <sec id="sec-3-1">
        <title>Cage design</title>
        <p>In the setup following information about the mice is of interest: changing floors,
movement on the floors, the direction of movement, the home range of individuals,
drinking and emigration behaviour.</p>
        <p>The design of the SNE has to warrant that movement on and between different floors
can be detected. Therefore several constraints for the freedom of movement must be
realized. The SNE comprises five floors, two on the ground and three in different
levels above the ground. These floors are connected by Plexiglas tubes and / or rope.
Outside the SNE an emigration cage is provided that can be accessed from the ground
floor (i.e. to give shelter to low-ranking animals within the group hierarchy) via a tube
and crossing a water basin (see figure 1).</p>
      </sec>
      <sec id="sec-3-2">
        <title>Data collection via RFID</title>
        <p>The RFID antennas are placed on points where the mice must cross. On every
Plexiglas tube two antennas at both ends are attached. This allows to detect when a
mouse changes floors, in which direction and at what speed mice cross the tubes.
Each floor contains an antenna beneath the drinking bottle to get data about the
drinking behaviour and to establish a warning system when a mouse does not drink.
Furthermore on every floor is a tube supplied with two antennas which enables to
collect data about the movement on the floors. Two antennas are used to identify mice
using a scale. In the SNE are at least 29 antennas integrated in the SNE (see table 1).</p>
      </sec>
      <sec id="sec-3-3">
        <title>Data collection via Jerry TS</title>
        <p>To collect data of the mice we use the RFID technology. The RFID-System (Trovan
Electronic Identification Systems) consists of reader (LID 665 Miniature OEM
Board), ring antennas (air-core coil antenna for LID 665) and animal glass
transponders (ID 100). All mice wear a passive integrated transponder (PIT) that is
injected subcutaneously between the scapulas. The transponder ID is read while a
mouse traverse the electromagnetic field which is established by the ring antennas,
e.g. when passing through tubes or visiting drinking places. The minimum distance
between two antennas is 20 cm. The ID of the transponders is read within a distance
of 0.5 cm. The readers are able to read several transponders at the same time at a
maximum rate of 26 Hertz.</p>
        <p>
          We wrote a Java based software component (JerryTS) to configure the RFID reader
and to store the read data in a database. If the transponder ID is read (a mouse gets
into the electromagnetic field of a ring antenna), a data set is created which consist of
date, time, milliseconds, antenna ID and transponder ID. This data is stored online in
a relational data base [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>Data collection via scale</title>
        <p>The described setting was extended by a scale (Kern &amp; Sohn GmbH: Typ 440-33N)
that continuously allows to measure the weight of individual animals. The scale was
protected against dirt and damage by a plastic body (see figure 2). The transponder ID
is read by the RFID antennas placed at the sides of the scale by entering or leaving the
scale. The modified scale was integrated in the SNE on the left ground area.</p>
      </sec>
      <sec id="sec-3-5">
        <title>Data collection via optical tracking</title>
        <p>Optical camera tracking was considered for tracking a single mouse to get continuous
positional data compared to point data derived from the antennas. The camera
(Logitech Quickcam Pro 5000) was placed above the highest floor in the SNE (see
figure 3). This level can be accessed by just one tube thus a mouse that enters this
level is recognized by the antenna. Additionally the antennas on the level allow to
reassure the identity of optically tracked mouse in those cases when more than one
subject is on the level.
For the post processing of the data a second software component (TOM) was written
in the programming language C#. TOM is an ArcGIS extension and allows a
visualization and analysis of the collected data. The attribute data for a mouse can be
queried and viewed in a table.</p>
        <p>
          The visualization module of TOM shows the position of the mice in the SNE at a
certain point of time. To start the visualization of the movement a time interval has to
be chosen. In this interval the mice move from antenna to antenna. It is possible to
select different display speeds and different play back rates. The spatial component is
displayed in three dimensions, the temporal component is realized by the clock in the
GUI [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Through the proposed solution in milliseconds an accurate representation of
the data is possible: if during one second, a signal of the same mouse is registered at
two antennas—when antennas are directly connected through a tube—a linear
movement is displayed.
        </p>
        <p>24.02.2006
16:38:34
405 ms
In figure 4 the movement in time is shown. The advantage of this representation of
the data is the movement of the mice can be observed for 24 hours. Especially the
movement in the night phase – mice are nocturnal animals – can be observed. By
observing the mice different patterns can be figured out. For example: Mice that
trigger antennas only on a defined level can be considered as territorial. By analysing
the movement patterns of all the individuals on that level dominance hierarchies
might be obtained. This can be realized by analysing interaction patterns when two
animals enter the tubes from different ends causing the subordinate to leave the tube
backwards while the dominant one triggers both antennas. Additionally dominant
mice are expected to trigger more antennas by patrolling their territory.
Besides the optical detection of patterns automated analysis of the data is
prototypically implemented. On the one hand statistics can be calculated for the
analysis per day, one the other hand statistics are available for the analysis per level
(see table 2).</p>
        <p>Information about analysis per day and the number of antenna contacts per level
are queried as SQL statements out of the database. Below the idea and functionality of
the algorithm which calculates the duration of stay of one mouse per level is outlined
(see listing 1):
The method “contactToOtherMiceOnLevel”, which returns an array with Boolean
values has two parameters: the selected mouse and the date for which the information
is queried (line 1). In line 2 to 5 necessary attributes are declared and initialized: the
array that will be returned as a result is initialized with the Boolean value ‘false’ for
each level (line 2). The clustered data for one day (contacted antennas und
timestamps) of the other unselected mice are stored in an array
“miceWithoutSelected” (line 3). The number of the antenna where the selected mouse
has the first contact on a particular date and the time of this contact are recognized
(line 4 and 5). First the changes of levels for the selected mouse must be detected
(lines 6-9). Therefore the antennas were associated with the corresponding levels
before. Now the list “antennaTimeArray” (antenna and time data) of the selected
mouse is scanned until an antenna is found that is not derived from the same level as
“antennaStart“ (line 8). If a change of level is found, we know the current level (line
9) and the time interval when the mouse was on this level (line 10). In line 13 it is
verified whether an antenna entry of an unselected mouse for this time interval exists:
• If an antenna entry of an unselected mouse exists, all entries in the list
“miceWithoutSelected” are checked if the antennas are from the same level as
antennaStart (line 14):
o If the antennas are from the same level, the corresponding Boolean
attribute for the level is set to true (line 15). This means the selected mouse
had contact with another mouse on this date on this level.
o If the antennas are not from the same level, then the loop starts again:
antennaStart gets the first antenna of the next level as new value and the
next change of level will be detected (go to line 6).
• If no antenna entry of an unselected mouse within the time interval exists in line 13,
the loop starts again, the start antenna gets the first antenna of the next level as new
value and the next change of level will be detected (go to line 6).</p>
        <p>The algorithm ends when the list “antennaTimeArray” is completely traversed and all
possible level changes are detected.</p>
        <p>// returns an array with Boolean values, which shows
whether a mouse had contact to other mice per level
1 contactToOtherMiceOnLevel bool[] (String mice,
String currentDate){
2 bool[] levelsMeet=</p>
        <p>
          {false,false,false,false,false,false};
3 String[] miceWithoutSelected; //array with all
unselected mice
4 String antennaStart; //number of start
antenna
5 Date timeStart //time of contact
with antennaStart
6 for(i = 1; i &lt; antennaTimeArray; i++){
7 String antenna = antennaTimeArray[i][0];
8 if(antennaStart and antenna not on the
same level){
9
10
11
12
13
14
15
findLevelWhereMouseIs();
DateTime time =
antennaTimeArray[i-1][
          <xref ref-type="bibr" rid="ref1">1</xref>
          ];
        </p>
        <p>//last time on level
if(two mice on one level){
getTimeFromDB&amp;AntennasForUnselectedMice;
if(unselectedMiceOnLevelWithMice){
set levelsMeet
corresponding of true;
timeStart = time;
antennaStart = antenna;</p>
      </sec>
      <sec id="sec-3-6">
        <title>Analysis of weight data</title>
        <p>The analysis of weight data has to be scaled to the age of the animals in order to
compare weight development of two or more individuals. Therefore the weights are
ordered by the age of individuals (see figure 5).</p>
        <p>evaluation period
recording time
age
Additionally movement patterns within the scale can be differentiated by means of the
high frequency the scale sends data. The behaviour (see figure 6) of the mice can be
summarized as follows:
1. A mouse moves fast by constant speed through the scale.
2. A mouse moves on the scale, remains there for a while and leaves the scale.
3. A mouse moves to the access of the scale and enters it step by step:
o The mouse enters the scale completely.
o The mouse returns and leaves the scale without entered it
completely.
behaviour 1
behaviour 2
behaviour 3</p>
      </sec>
      <sec id="sec-3-7">
        <title>Analysis of camera data</title>
        <p>With the help of RFID data it is possible to identify each single mouse on the
observed level. The positional data and the movement of the mice on the floor can be
visualised as shown in figure 7.
We hold a huge amount of data and domain specific knowledge in this project. So we
plan for our future work the use of data-mining methods for further analysis.
With these methods an automated classification of the mice between wildtype and TG
should be derived. The bases for the decision are the different sensor sources in the
SNE which provide data about behaviour and movement. To identify a mouse and to
obtain behaviour partly a combination of the sensors is necessary (e.g. the RFID data
is necessary to know which mice are filmed). We differentiate between simple
behaviour and complex behaviour. Whereas complex behavior is combined of the
simple behaviour of a mouse and might be related to behaviour of other mice (e.g. to
obtain information about dominance behaviour the interaction of two or more mice
must be observed). The analysis of the detected behaviour can then guide with a
certain likelihood to the decision whether it is a wildtype or TG genotype (see figure
8). Most time will be spend on finding and defining a lot of simple and complex
behaviours and movement patterns which guide us to the features. The qualitative
premium features must be selected to build a reliable classificatory.</p>
        <p>We consider for example the use of unsupervised and supervised classification to
group the mice into TG and wildtype animals. For the unsupervised classification the
cluster analysis will be used to group objects because of similarity. For a supervised
classification we consider to use naive Bayes classification, Bayses network or a
decision tree which represents successive hierarchical decisions.</p>
        <sec id="sec-3-7-1">
          <title>Sensors</title>
        </sec>
        <sec id="sec-3-7-2">
          <title>Scale</title>
        </sec>
        <sec id="sec-3-7-3">
          <title>RFID</title>
        </sec>
        <sec id="sec-3-7-4">
          <title>Camera : :</title>
        </sec>
        <sec id="sec-3-7-5">
          <title>Domain knowledge Features</title>
          <p>simple behaviour
weight
∆ weight
:
:
dominace
:
:
complex behaviour
target
transgen (binary)</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>6 Conclusion</title>
      <p>In this paper a system for collection and analysis of behavioural and movement data
of laboratory mice is presented. The data were collected continuously with an indoor
RFID tracking solution for laboratory mice, a scale and an optical tracking system in a
SNE. Twenty-four hour per day, seven days a week observation is possible without
disturbing the animals. Social interaction and the outward appearance are not
influenced by this technology. The data stored in a relational database is analysed by
an extended GIS framework. The movement of mice is visualized in a model of the
SNE. Furthermore analysis functions, which offer information about the behaviour
and movement of the mice per day and per level are implemented. We present initial
analysis functions, which show that the collected data can support a continuous
observation of the mice in a SNE.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Forgarty</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hudson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            ,
            <surname>Atkeson</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            ,
            <surname>Avrahami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Forlizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            ,
            <surname>Kiesler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Lee</surname>
          </string-name>
          , J.,
          <string-name>
            <given-names>C.</given-names>
            ,
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.</surname>
          </string-name>
          :
          <source>Predictiong Human Interruptibility. ACM Transactions on Computer-Human Interaction</source>
          , Vol.
          <volume>12</volume>
          , No.
          <volume>1</volume>
          (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Kritzler</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewejohann</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krüger</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raubal</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sachser</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          :
          <article-title>An RFID-based Tracking System for Laboratory Mice in a Semi Natural Environment</article-title>
          . In Strang T,
          <string-name>
            <surname>Cahill</surname>
            <given-names>V</given-names>
          </string-name>
          , and Quigley A (eds),
          <source>Pervasive 2006 Workshop Proceedings</source>
          . Dublin, Ireland (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Kritzler</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raubal</surname>
            ,
            <given-names>M</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krüger</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A GIS framework for spatio-temporal analysis and visualization of laboratory mice tracking data. Transactions in GIS</article-title>
          . In press.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Neisen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Validation of a local positioning monitoring system (LPM) in relation to dairy cow behaviour. Second Annual Symposium of PhD-Program for Sustainable Agriculture ASPSA (</article-title>
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Neisen</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wechsler</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gygax</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Automatic recording of social behaviour in dairy cows</article-title>
          .
          <source>Proceedings of the 40th International Congress of the ISAE</source>
          <year>2006</year>
          ,
          <volume>105</volume>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Patterson</surname>
            ,
            <given-names>D.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liao</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gajos</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Collier</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Livic</surname>
          </string-name>
          , N.:
          <article-title>Opportunity Knocks: a System to Provide Cognitive Assistance with Transportation Services</article-title>
          .
          <source>International Conference on Ubiquitous Computing (UbiComp)</source>
          , Springer (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Würbel</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2000</year>
          )
          <article-title>:Behaviour and the standardization fallacy</article-title>
          .
          <source>Nat Genet</source>
          <volume>26</volume>
          ,
          <fpage>263</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Zancanaro</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuflik</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boger</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goren-Bar</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goldwasser</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Analyzing museums visitors' behaviour pattern</article-title>
          .
          <source>In Proceedings User Modeling</source>
          . Springer (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>