{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T17:14:15Z","timestamp":1740158055579,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T00:00:00Z","timestamp":1629676800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s12652-021-03433-0","type":"journal-article","created":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T18:03:18Z","timestamp":1629741798000},"page":"3041-3056","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Web-based objects detection to discover key objects in human activities"],"prefix":"10.1007","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8089-1784","authenticated-orcid":false,"given":"Charles","family":"Cousyn","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K\u00e9vin","family":"Bouchard","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S\u00e9bastien","family":"Gaboury","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,8,23]]},"reference":[{"issue":"3","key":"3433_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1922649.1922653","volume":"43","author":"J Aggarwal","year":"2011","unstructured":"Aggarwal J, Ryoo M (2011) Human activity analysis. ACM Comput Surv 43(3):1\u201343","journal-title":"ACM Comput Surv"},{"key":"3433_CR2","doi-asserted-by":"publisher","unstructured":"Alemdar H, Durmaz Incel O, Ertan H, Ersoy C (2013) ARAS human activity datasets in multiple homes with multiple residents. In: Proceedings of the ICTs for improving patients rehabilitation research techniques, IEEE, pp 232\u2013235, https:\/\/doi.org\/10.4108\/icst.pervasivehealth.2013.252120","DOI":"10.4108\/icst.pervasivehealth.2013.252120"},{"key":"3433_CR3","doi-asserted-by":"publisher","unstructured":"Ann OC, Theng LB (2014) Human activity recognition: a review. In: Proceedings\u20144th IEEE International Conference on control system, computing and engineering, ICCSCE 2014, pp 389\u2013393, https:\/\/doi.org\/10.1109\/ICCSCE.2014.7072750","DOI":"10.1109\/ICCSCE.2014.7072750"},{"key":"3433_CR4","doi-asserted-by":"publisher","unstructured":"Cao J, Guo F, Lai X, Zhou Q, Dai J (2020) A Tree-structure convolutional neural network for temporal features exaction on sensor-based multi-resident activity recognition. In: Communications in computer and information science, vol 1265 CCIS. Springer Singapore, pp 513\u2013525, https:\/\/doi.org\/10.1007\/978-981-15-7670-6_43","DOI":"10.1007\/978-981-15-7670-6_43"},{"key":"3433_CR5","doi-asserted-by":"publisher","unstructured":"Colledanchise M, \u00d6gren P (2014) How behavior trees modularize robustness and safety in hybrid systems. In: 2014 IEEE\/RSJ International Conference on intelligent robots and systems, pp 1482\u20131488, https:\/\/doi.org\/10.1109\/IROS.2014.6942752","DOI":"10.1109\/IROS.2014.6942752"},{"key":"3433_CR6","unstructured":"Contributors to Wikimedia projects (2020) Riemann sum. https:\/\/en.wikipedia.org\/w\/index.php?title=Riemann_sum&oldid=969091575. Accessed 1 July 2020"},{"issue":"7","key":"3433_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MC.2012.328","volume":"46","author":"DJ Cook","year":"2013","unstructured":"Cook DJ, Crandall AS, Thomas BL, Krishnan NC (2013) CASAS: a smart home in a box. Computer 46(7):62\u201369. https:\/\/doi.org\/10.1109\/MC.2012.328","journal-title":"Computer"},{"key":"3433_CR8","doi-asserted-by":"publisher","unstructured":"Deng J, Dong W, Socher R, Li LJ, Kai Li, Li F-F (2009) ImageNet: a large-scale hierarchical image database. In: 2009 IEEE Conference on computer vision and pattern recognition, Ieee, IEEE, pp 248\u2013255, https:\/\/doi.org\/10.1109\/CVPR.2009.5206848, https:\/\/ieeexplore.ieee.org\/document\/5206848\/","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"3433_CR9","unstructured":"DomuSafe (2019) aront. https:\/\/sites.unica.it\/domusafe\/aront. Accessed 18 Jan 2020"},{"key":"3433_CR10","unstructured":"Ducatel K, Bogdanowicz M, Scapolo F, Leijten J, Burgelman JC (2003) Ambient intelligence: from vision to reality. Tech. rep, IST Advisory Group Draft Report, European Commission"},{"key":"3433_CR11","unstructured":"DuckDuckGo (2021) DuckDuckGo Traffic. https:\/\/duckduckgo.com\/traffic. Accessed 1 Jan 2021"},{"key":"3433_CR12","unstructured":"Etimberg, Benmccann, Tannerlinsley, Simonbrunel (2020) Chart.js. https:\/\/github.com\/chartjs\/Chart.js. Accessed  1 July 2020"},{"key":"3433_CR13","unstructured":"Fishkin R (2019) Less than half of google searches now result in a click. https:\/\/sparktoro.com\/blog\/less-than-half-of-google-searches-now-result-in-a-click. Accessed 15 Nov 2019"},{"issue":"11","key":"3433_CR14","doi-asserted-by":"publisher","first-page":"2562","DOI":"10.3390\/s17112562","volume":"17","author":"Y Francillette","year":"2017","unstructured":"Francillette Y, Boucher E, Bouzouane A, Gaboury S (2017) The virtual environment for rapid prototyping of the intelligent environment. Sensors 17(11):2562","journal-title":"Sensors"},{"key":"3433_CR15","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/s11257-020-09266-4","volume":"15","author":"Y Francillette","year":"2020","unstructured":"Francillette Y, Boucher E, Bier N, Lussier M, Bouchard K, Belchior P, Gaboury S (2020) Modeling the behavior of persons with mild cognitive impairment or Alzheimer's for intelligent environment simulation. User Model User-Adapt Interact 15:10. https:\/\/doi.org\/10.1007\/s11257-020-09266-4 (0123456789)","journal-title":"User Model User-Adapt Interact"},{"key":"3433_CR16","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.patcog.2018.01.025","volume":"78","author":"C Hu","year":"2018","unstructured":"Hu C, Chen Y, Hu L, Peng X (2018) A novel random forests based class incremental learning method for activity recognition. Pattern Recognit 78:277\u2013290","journal-title":"Pattern Recognit"},{"key":"3433_CR17","unstructured":"Hui J (2019) Real-time object detection with YOLO, YOLOv2 and now YOLOv3. Medium https:\/\/medium.com\/@jonathan_hui\/real-time-object-detection-with-yolo-yolov2-28b1b93e2088. Accessed 15 Jan 2019"},{"key":"3433_CR18","doi-asserted-by":"publisher","unstructured":"Ihianle IK, Naeem U, Tawil AR, Azam MA (2016) Recognizing activities of daily living from patterns and extraction of web knowledge. In: Proceedings of the 2016 ACM International Joint Conference on pervasive and ubiquitous computing adjunct\u2014UbiComp \u201916, ACM, pp 1255\u20131262, https:\/\/doi.org\/10.1145\/2968219.2968440, http:\/\/dl.acm.org\/citation.cfm?doid=2968219.2968440. Accessed 1 Jan 2019","DOI":"10.1145\/2968219.2968440"},{"key":"3433_CR19","doi-asserted-by":"crossref","unstructured":"J\u00e4rvelin K, Kek\u00e4l\u00e4inen J (2017) IR evaluation methods for retrieving highly relevant documents. In: ACM SIGIR Forum, ACM New York, NY, USA, vol 51, pp 243\u2013250","DOI":"10.1145\/3130348.3130374"},{"issue":"3","key":"3433_CR20","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1109\/SURV.2012.110112.00192","volume":"15","author":"\u00d3D Lara","year":"2013","unstructured":"Lara \u00d3D, Labrador MA (2013) A survey on human activity recognition using wearable sensors. IEEE Commun Surv Tutor 15(3):1192\u20131209. https:\/\/doi.org\/10.1109\/SURV.2012.110112.00192","journal-title":"IEEE Commun Surv Tutor"},{"key":"3433_CR21","doi-asserted-by":"crossref","unstructured":"Liu C, Zoph B, Neumann M, Shlens J, Hua W, Li LJ, Fei-Fei L, Yuille A, Huang J, Murphy K (2017) Progressive neural architecture search. arXiv: 1712.00559","DOI":"10.1007\/978-3-030-01246-5_2"},{"issue":"22","key":"3433_CR22","doi-asserted-by":"publisher","first-page":"24203","DOI":"10.1007\/s11042-016-4197-1","volume":"76","author":"L Lu","year":"2017","unstructured":"Lu L, Qing-ling C, Yi-Ju Z (2017) Activity recognition in smart homes. Multimed Tools Appl 76(22):24203\u201324220","journal-title":"Multimed Tools Appl"},{"key":"3433_CR23","doi-asserted-by":"publisher","unstructured":"Manning CD, Raghavan P, Schutze H (2008) Chap 8: evaluation in information retrieval. In: Introduction to information retrieval. Cambridge University Press, Cambridge, pp 151\u2013175, https:\/\/doi.org\/10.1017\/CBO9780511809071, http:\/\/ebooks.cambridge.org\/ref\/id\/CBO9780511809071. Accessed 1 Jan 2019","DOI":"10.1017\/CBO9780511809071"},{"key":"3433_CR24","unstructured":"Ng A (2020) Non-max suppression\u2014object detection. https:\/\/www.coursera.org\/lecture\/convolutional-neural-networks\/non-max-suppression-dvrjH. Accessed 26 July 2020"},{"issue":"1","key":"3433_CR25","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.pmcj.2009.10.004","volume":"6","author":"P Palmes","year":"2010","unstructured":"Palmes P, Pung HK, Gu T, Xue W, Chen S (2010) Object relevance weight pattern mining for activity recognition and segmentation. Pervasive and Mob Comput 6(1):43\u201357. https:\/\/doi.org\/10.1016\/j.pmcj.2009.10.004","journal-title":"Pervasive and Mob Comput"},{"key":"3433_CR26","doi-asserted-by":"publisher","unstructured":"Perkowitz M, Philipose M, Fishkin K, Patterson DJ (2004) Mining models of human activities from the web. In: Proceedings of the 13th Conference on World Wide Web\u2014WWW \u201904, ACM, p 573, https:\/\/doi.org\/10.1145\/988672.988750, http:\/\/portal.acm.org\/citation.cfm?doid=988672.988750. Accessed 1 Feb 2019","DOI":"10.1145\/988672.988750"},{"key":"3433_CR27","doi-asserted-by":"publisher","unstructured":"Redmon J, Farhadi A (2017) YOLO9000: better, faster, stronger. In: 2017 IEEE Conference on computer vision and pattern recognition (CVPR), IEEE, pp 6517\u20136525, https:\/\/doi.org\/10.1109\/CVPR.2017.690, http:\/\/ieeexplore.ieee.org\/document\/8100173\/","DOI":"10.1109\/CVPR.2017.690"},{"key":"3433_CR28","unstructured":"Redmon J, Farhadi A (2018) YOLOv3: an incremental improvement. CoRR http:\/\/arxiv.org\/abs\/1804.02767"},{"key":"3433_CR29","doi-asserted-by":"publisher","unstructured":"Riboni D, Murtas M (2017) Web mining & computer vision: new partners for object-based activity recognition. In: Proceedings\u20142017 IEEE 26th International Conference on enabling technologies: infrastructure for collaborative enterprises, WETICE 2017, pp 158\u2013163, https:\/\/doi.org\/10.1109\/WETICE.2017.38, https:\/\/ieeexplore.ieee.org\/document\/8003808\/. Accessed 1 Nov 2018","DOI":"10.1109\/WETICE.2017.38"},{"key":"3433_CR30","doi-asserted-by":"publisher","unstructured":"Riboni D, Murtas M (2019) Sensor-based activity recognition: One picture is worth a thousand words. Future Gener Comput Syst, https:\/\/doi.org\/10.1016\/j.future.2019.07.020, https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X19303863. Accessed 1 Jan 2020","DOI":"10.1016\/j.future.2019.07.020"},{"key":"3433_CR31","volume-title":"Artificial intelligence: a modern approach","author":"S Russell","year":"2009","unstructured":"Russell S, Norvig P (2009) Artificial intelligence: a modern approach, 3rd edn. Prentice Hall Press","edition":"3"},{"key":"3433_CR32","doi-asserted-by":"publisher","unstructured":"Sandler M, Howard A, Zhu M, Zhmoginov A, Chen LC (2018) MobileNetV2: inverted residuals and linear bottlenecks. In: Proceedings of the IEEE Computer Society Conference on computer vision and pattern recognition, pp 4510\u20134520, https:\/\/doi.org\/10.1109\/CVPR.2018.00474","DOI":"10.1109\/CVPR.2018.00474"},{"issue":"4","key":"3433_CR33","doi-asserted-by":"publisher","first-page":"155014771877254","DOI":"10.1177\/1550147718772541","volume":"14","author":"Y Sung-Hyun","year":"2018","unstructured":"Sung-Hyun Y, Thapa K, Kabir MH, Hee-Chan L (2018) Log-Viterbi algorithm applied on second-order hidden Markov model for human activity recognition. Int J Distrib Sens Netw 14(4):155014771877254. https:\/\/doi.org\/10.1177\/1550147718772541","journal-title":"Int J Distrib Sens Netw"},{"key":"3433_CR34","doi-asserted-by":"publisher","first-page":"4278","DOI":"10.5555\/3298023.3298188","volume-title":"Proceedings of the thirty-first AAAI conference on artificial intelligence","author":"C Szegedy","year":"2017","unstructured":"Szegedy C, Ioffe S, Vanhoucke V, Alemi AA (2017) Inception-v4, inception-resnet and the impact of residual connections on learning. In: Proceedings of the thirty-first AAAI conference on artificial intelligence, San Francisco, California, USA. AAAI Press, pp 4278\u20134284. https:\/\/doi.org\/10.5555\/3298023.3298188"},{"key":"3433_CR35","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/11748625_2","volume-title":"Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"EM Tapia","year":"2006","unstructured":"Tapia EM, Choudhury T, Philipose M (2006) Building reliable activity models using hierarchical shrinkage and mined ontology. In: Fishkin KP, Schiele B, Nixon P, Quigley A (eds) Lecture notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol 3968 LNCS. Springer Berlin Heidelberg, Berlin, pp 17\u201332. https:\/\/doi.org\/10.1007\/11748625_2"},{"key":"3433_CR36","unstructured":"Tsang SH (2019) Review: YOLOv2 & YOLO9000 You Only Look Once (Object Detection). Medium https:\/\/towardsdatascience.com\/review-yolov2-yolo9000-you-only-look-once-object-detection-7883d2b02a65. Accessed 1 Apr 2019"},{"key":"3433_CR37","unstructured":"United Nations Department of Economic and Social Affairs | Popular Division (2017) World Population Ageing 2017. Tech. Rep. ST\/ESA\/SER.A\/408, United Nations"},{"key":"3433_CR38","unstructured":"Wimo PA, Guerchet DM, Ali MGC, Wu DYT, Prina DM, Alzheimer\u2019s Disease International (2015) World Alzheimer Report 2015. Tech. rep., Alzheimer\u2019s Disease International"},{"key":"3433_CR39","doi-asserted-by":"publisher","unstructured":"Wyatt D, Philipose M, Choudhury T (2005) Unsupervised activity recognition using automatically mined common sense. In: Proceedings of the 20th National Conference on artificial intelligence, vol\u00a020, pp 21\u201327, https:\/\/doi.org\/10.1093\/bmb\/ldx041","DOI":"10.1093\/bmb\/ldx041"},{"issue":"6","key":"3433_CR40","doi-asserted-by":"publisher","first-page":"6955","DOI":"10.1145\/956750.956785","volume":"77","author":"Q Xiao","year":"2018","unstructured":"Xiao Q, Song R (2018) Action recognition based on hierarchical dynamic Bayesian network. Multimed Tools Appl 77(6):6955\u20136968. https:\/\/doi.org\/10.1145\/956750.956785","journal-title":"Multimed Tools Appl"},{"key":"3433_CR41","doi-asserted-by":"publisher","unstructured":"Yi L, Liu B, Li X (2003) Eliminating noisy information in Web pages for data mining. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining pp 296\u2013305, https:\/\/doi.org\/10.1145\/956750.956785","DOI":"10.1145\/956750.956785"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03433-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03433-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03433-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T12:43:41Z","timestamp":1680007421000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03433-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,23]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3433"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03433-0","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2021,8,23]]},"assertion":[{"value":"2 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}