Game Theory Solutions in Sensor-Based Human Activity Recognition: A Review

سال انتشار: 1402
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 119

فایل این مقاله در 32 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JADM-11-2_009

تاریخ نمایه سازی: 27 تیر 1402

چکیده مقاله:

This paper provides a comprehensive review of the potential of game theory as a solution for sensor-based human activity recognition (HAR) challenges. Game theory is a mathematical framework that models interactions between multiple entities in various fields, including economics, political science, and computer science. In recent years, game theory has been increasingly applied to machine learning challenges, including HAR, as a potential solution to improve recognition performance and efficiency of recognition algorithms. The review covers the shared challenges between HAR and machine learning, compares previous work on traditional approaches to HAR, and discusses the potential advantages of using game theory. It discusses different game theory approaches, including non-cooperative and cooperative games, and provides insights into how they can improve the HAR systems. The authors propose new game theory-based approaches and evaluate their effectiveness compared to traditional approaches. Overall, this review paper contributes to expanding the scope of research in HAR by introducing game-theoretic concepts and solutions to the field and provides valuable insights for researchers interested in applying game-theoretic approaches to HAR.

نویسندگان

Behrooz Shahrokhzadeh

Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran.

Mohammad Hossein Shayesteh

Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran.

Behrooz Masoumi

Department of Computer and Information Technology Engineering, Qazvin Branch, Islamic Azad University, Qazvin, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • T. Subetha and S. Chitrakala, “A survey on human activity ...
  • E. Cippitelli, S. Gasparrini, E. Gambi, and S. Spinsante, “A ...
  • Y. Gu, F. Ren, and J. Li, “PAWS: Passive Human ...
  • D. Sun, J. Zhang, S. Zhang, X. Li, and H. ...
  • M. Fujiwara, Y. Kashimoto, M. Fujimoto, H. Suwa, Y. Arakawa, ...
  • B. Sefen, S. Baumbach, A. Dengel, and S. Abdennadher, “Human ...
  • K. Chen, D. Zhang, L. Yao, B. Guo, Z. Yu, ...
  • J. Ujwala Rekha, K. Shahu Chatrapati, and A. Vinaya Babu, ...
  • J. Hamilton, “Game theory: Analysis of conflict, by Myerson, R. ...
  • S. M. Darwish, H. Saheb, and A. Eltholth, “A new ...
  • S. Cohen, G. Dror, and E. Ruppin, “Feature selection via ...
  • J. C. Quiroz, A. Banerjee, S. M. Dascalu, and S. ...
  • B. A. Almogahed and I. A. Kakadiaris, “NEATER: filtering of ...
  • T. Hazra and K. Anjaria, “Applications of game theory in ...
  • D. Guan, T. Ma, W. Yuan, Y. K. Lee, and ...
  • J. Donahue et al., “Long-Term Recurrent Convolutional Networks for Visual ...
  • M. H. Siddiqi, M. Alruwaili, A. Ali, S. Alanazi, and ...
  • F. Serpush, M. B. Menhaj, B. Masoumi, and B. Karasfi, ...
  • G. Ogbuabor and R. La, “Human activity recognition for healthcare ...
  • Y. Wang, S. Cang, and H. Yu, “A survey on ...
  • H. Li, A. Shrestha, H. Heidari, J. Le Kernec, and ...
  • J. Gomez-Romero, M. A. Serrano, M. A. Patricio, J. Garcia, ...
  • A. Jarraya, A. Bouzeghoub, and A. Borgi, “Online conflict resolution ...
  • Y. Kashimoto, M. Fujiwara, M. Fujimoto, H. Suwa, Y. Arakawa, ...
  • W. S. Lima, E. Souto, T. Rocha, R. W. Pazzi, ...
  • C. Shen, T. Yu, S. Yuan, Y. Li, and X. ...
  • Y. L. Hsu, S. C. Yang, H. C. Chang, and ...
  • A. Almeida and A. Alves, “Activity recognition for movement-based interaction ...
  • A. Fujii, D. Kajiwara, and K. Murao, “Cooking Activity Recognition ...
  • J. Monteiro, R. Granada, R. C. Barros, and F. Meneguzzi, ...
  • N. Fuengfusin and H. Tamukoh, “Multi-sampling Classifiers for the Cooking ...
  • A. Mousavi, A. Sheikh, M. Zadeh, M. Akbari, and A. ...
  • W. S. Lima, E. Souto, K. El-Khatib, R. Jalali, and ...
  • J. Wang, Y. Chen, S. Hao, X. Peng, and L. ...
  • F. Demrozi, G. Pravadelli, A. Bihorac, and P. Rashidi, “Human ...
  • H. F. Nweke, Y. W. Teh, M. A. Al-garadi, and ...
  • B. A. Bhuiyan, “An Overview of Game Theory and Some ...
  • G. Bacci, S. Lasaulce, W. Saad, and L. Sanguinetti, “Game ...
  • N. Nisan, T. Roughgarden, É. Tardos, and V. V. Vazirani, ...
  • B. Shahrokhzadeh and M. Dehghan, “A Distributed Game-Theoretic Approach for ...
  • S. Soro and W. Heinzelman, “A survey of visual sensor ...
  • B. Shahrokhzadeh, M. Dehghan, and M. Shahrokhzadeh, “Improving Energy-Efficient Target ...
  • T. Roughgarden, Twenty lectures on algorithmic game theory. ۲۰۱۶ ...
  • A. Nowé, P. Vrancx, and Y. M. De Hauwere, “Game ...
  • M. K. Sohrabi and H. Azgomi, “A Survey on the ...
  • A. Das Antar, M. Ahmed, and M. A. R. Ahad, ...
  • Y. Chen and C. Shen, “Performance Analysis of Smartphone-Sensor Behavior ...
  • W. Jiang and Z. Yin, “Human activity recognition using wearable ...
  • Y. Chen, K. Zhong, J. Zhang, Q. Sun, and X. ...
  • Y. Guan and T. Plotz, “Ensembles of deep LSTM learners ...
  • C. A. Ronao and S. B. Cho, “Deep convolutional neural ...
  • R. Grzeszick, J. M. Lenk, F. M. Rueda, G. A. ...
  • S. Münzner, P. Schmidt, A. Reiss, M. Hanselmann, R. Stiefelhagen, ...
  • H. Guo, L. Chen, L. Peng, and G. Chen, “Wearable ...
  • H. Qian, S. J. Pan, B. Da, and C. Miao, ...
  • A. Yazidi, H. L. Hammer, K. Samouylov, and E. E. ...
  • L. M. Bruce and D. Reynolds, “Game theory based data ...
  • N. A. Capela, E. D. Lemaire, and N. Baddour, “Feature ...
  • C. C. F. Chu and D. P. K. Chan, “Feature ...
  • Z. Wang, D. Wu, J. Chen, A. Ghoneim, and M. ...
  • A. R. Mohamed, G. E. Dahl, and G. Hinton, “Acoustic ...
  • M. A. Alsheikh, A. Selim, D. Niyato, L. Doyle, S. ...
  • K. Chen, L. Yao, D. Zhang, X. Wang, X. Chang, ...
  • H. M. S. Hossain, M. A. Al Haiz Khan, and ...
  • H. M. Sajjad Hossain and N. Roy, “Active deep learning ...
  • J. Wang, Y. Chen, Y. Gu, Y. Xiao, and H. ...
  • J. Yang, J. Fan, Z. Weiz, G. Li, T. Liu, ...
  • S. Behpour, K. M. Kitani, and B. D. Ziebart, “ADA: ...
  • K. T. Nguyen, F. Portet, and C. Garbay, “Dealing with ...
  • P. Siirtola, H. Koskimäki, and J. Röning, “Personalizing human activity ...
  • R. Saeedi, S. Norgaard, and A. H. Gebremedhin, “A closed-loop ...
  • H. Nair, C. Tan, M. Zeng, O. J. Mengshoel, and ...
  • Y. Yang, C. Hou, Y. Lang, D. Guan, D. Huang, ...
  • A. Mathur et al., “Using Deep Data Augmentation Training to ...
  • J. Wang, V. W. Zheng, Y. Chen, and M. Huang, ...
  • W. Jiang et al., “Towards environment independent device free human ...
  • B. Wang et al., “A minimax game for instance based ...
  • L. Peng, L. Chen, Z. Ye, and Y. Zhang, “AROMA: ...
  • X. Li et al., “Concurrent Activity Recognition with Multimodal CNN-LSTM ...
  • A. Benmansour, A. Bouchachia, and M. Feham, “Multioccupant activity recognition ...
  • S. Rossi, R. Capasso, G. Acampora, and M. Staffa, “A ...
  • Y. H. Jung and A. Tewari, “Online boosting algorithms for ...
  • P. Urbani, “Combining Deep Learning and Game Theory for Music ...
  • A. Erdem and M. Pelillo, “Graph Transduction as a Noncooperative ...
  • A. Akbari, J. Wu, R. Grimsley, and R. Jafari, “Hierarchical ...
  • I. M. Pires, N. Pombo, N. M. Garcia, and F. ...
  • S. Han, H. Mao, and W. J. Dally, “Deep compression: ...
  • X. Wang, Y. Sun, R. Zhang, and J. Qi, “KDGAN: ...
  • Y. Iwasawa, I. E. Yairi, K. Nakayama, and Y. Matsuo, ...
  • M. Malekzadeh, A. Cavallaro, R. G. Clegg, and H. Haddadi, ...
  • M. Malekzadeh, R. G. Clegg, A. Cavallaro, and H. Haddadi, ...
  • N. Phan, Y. Wang, X. Wu, D. D.-T. C. A. ...
  • Y. Huang, “Game Theory Based Privacy Protection for Context-Aware Services,” ...
  • Y. Tang, J. Xu, K. Matsumoto, and C. Ono, “Sequence-To-Sequence ...
  • Y. H. Shen, K. X. He, and W. Q. Zhang, ...
  • K. Chen et al., “Interpretable Parallel Recurrent Neural Networks with ...
  • X. Zhang et al., “Multi-modality sensor data classification with selective ...
  • K. Chen, L. Yao, D. Zhang, B. Guo, and Z. ...
  • J. He, Q. Zhang, L. Wang, and L. Pei, “Weakly ...
  • K. Ethayarajh and D. Jurafsky, “Attention Flows are Shapley Value ...
  • WangYanwen and ZhengYuanqing, “Modeling RFID Signal Reflection for Contact-free Activity ...
  • J. H. Choi and J. S. Lee, “Confidence-based Deep Multimodal ...
  • J. B. Yang, M. N. Nguyen, P. P. San, X. ...
  • S. S. Khan and B. Taati, “Detecting unseen falls from ...
  • S. Woo, J. Byun, S. Kim, H. M. Nguyen, J. ...
  • S. A. Rokni, M. Nourollahi, and H. Ghasemzadeh, “Personalized Human ...
  • W. Z. Wang, Y. W. Guo, B. Y. Huang, G. ...
  • نمایش کامل مراجع