Develop a human activity recognition iot application

Assignment Help Software Engineering
Reference no: EM132366962

Assignment: SDLC for human activity recognition project

 Human activity recognition

This project aims to develop a human activity recognition IoT application to  evaluate students’ knowledge in SDLC. This is an individual assignment. The project tasks shall be carried out individually.

Overview

The recognition of human activities has become a task of high interest for medical, military, and security applications. For instance, patients with diabetes, obesity, or heart disease are often required to follow a well-defined exercise routine as part of their treatments [5]. Therefore, recognizing activities such as walking, running, or cycling becomes quite useful to provide feedback to the caregiver about the patient’s behavior. Likewise, patients with dementia and other mental pathologies could be monitored to detect abnormal activities and thereby prevent undesirable consequences [6].

In such IoT applications, proper software engineering and data engineering are especially important to manage the software development life cycle and help make data useful for machine learning models. Many software engineers are primarily interested in aggregating raw data and making it into useful, ordered and structured data formats. A typical flowchart of sensor-based human activity recognition as shown in Figure 1.

79_Fig 1.jpg

This assignment involves the following subtasks:

1. Use Agile to manage this IoT application development (e.g., develop backlog, create sprint, and monitor the sprint progress). The backlog
and each sprint along with each week’s sprint progress burndown chart shall be recorded in the final submission document.

2. Based on the given workshop materials, create python code to load data and extract corresponding features from the given dataset.

3. Test and evaluate the two given machine learning models (KNN and SVM) and application in general and record the test results and
evaluation summary in the final submission document.

4. Refactor the source code according to the design pattern lecture and make the code easier to understand and extensible. The code shall
be managed by GitHub and will be reviewed for this along with GitHub version control history.

The sourcing data is from a public dataset (Dalia dataset [1], which contains 6 sensors’ data for 19 activities), refining that data and cleaning them up, and extracting significant features through statistical analysis for use in artificial intelligence and machine learning systems.

An example code is provided for reference. You may need to learn the use of Python libraries Numpy [2] and Pandas [3]. Machine learning modules using Scikit-learn [4] are given though having some understanding of them is recommended (we will only cover the basics of it to avoid course overlapping).

Reference no: EM132366962

Questions Cloud

Cybersecurity attack on the water utility SCADA system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Describe characteristics of a futures-oriented approach : In concluding the course, revisit the notions of assessment literacies and intelligent accountability and discuss at least two characteristics of a futures.
Analyze the effect of an irrevocable trust on the gift tax : Analyze the effect of an irrevocable trust on the gift tax and future estate taxes. Suggest other significant alternatives that the client could use both to.
Understand computer architecture and networking : A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills,
Develop a human activity recognition iot application : Software Engineering - COMP255-Macquarie University-Australia- Develop a human activity recognition IoT application to evaluate students’ knowledge in SDLC.
Describe ramifications for the researcher and researched : Are there benefits and ramifications for the "researcher" and "researched" coming from different cultural background while completing qualitative research?
What are some of security risks and issues with IoT devices : Describe what IoT is; what are some of the security risks and issues with IoT devices; what steps can be taken to mitigate these risks?
Topic - The effects HCAHPS have on reimbursement and nursing : Alternative Medicine Healthcare Assignment - Research topic - The effects HCAHPS have on reimbursement and nursing
Develop a specific part of your lesson plan : Starting in week 1, you will work on creating a lesson plan. Each week you will: Develop a specific part of your lesson plan. Review the comments on your own.

Reviews

len2366962

9/6/2019 3:20:37 AM

Suggested headings (max. 10 pages; 10pt-12pt font size in single linespacing)- Student details: name and SID- Project title (you are free to give a cool name as the project can be used for many purposes)- Introduction: description of the project. - SCRUM Sprint and Design: give description of each key component and system architecture (can follow the given diagram but can’t be exactly same). Give description of the backlog, each sprint created and weekly sprint progress chart (burndown chart). - Implementation: description of technologies and techniques used with respect to each of system components/functionalities described in the Design. - Evaluation: description of experiments and discussion of results - Discussion: Challenges, limitations and open issues. - Version Control: give screen shop of the GitHub version control log - Summary/conclusion: summary and/or concluding remarks - References including Bitbucket project repository/wiki

len2366962

9/6/2019 3:19:59 AM

Testing: After training a model, you should evaluate and test the application. Classification accuracy is a simple metric to measure the performance of a trained model. In addition, confusion matrix could clearly show the performance of our model on the recognition of each activity (Testing of Machine learning models and confusion matrix will be covered in week 4 lecture notes) . The two evaluation metrics are also GIVEN in the example code. 4. Code refactoring and Version Control: The given example code reflects the state of the art engineering for IoT. Please refactor the code to make the code easily to read/understand (e.g., comments) and extensible (those techniques for design pattern and software refactoring taught in the unit). The changes shall be reflected in the GitHub version control.

len2366962

9/6/2019 3:19:48 AM

. Data loading and preprocessing: In this stage, based on the workshop materials provided, you need to firstly visualize the sensor data to get some idea of the underlying human activity pattern. Based on the given codes, apply the signal filtering and visualize the cleaned data. 2. Feature engineering for sensor data: In this stage, you need to extract features from the cleaned sensor data. In the example code, min, max, and mean values of three accelerometers in the wrist sensor are extracted as features of each human activity. In this assignment, you need to focus on feature engineering (try to extract more features from more sensors based on the Week 3 lecture note, and research how different features influence the performance of human activity recognition based IoT application). Then, you could use the GIVEN code to construct training datasets. In this stage, you could train different GIVEN machine learning models based on training feature set. The code of recognition models is GIVEN, where KNN and SVM classifier are used to learn human activity recognition

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd