{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T23:31:49Z","timestamp":1772148709656,"version":"3.50.1"},"reference-count":56,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T00:00:00Z","timestamp":1576454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Trans. Soc. Comput."],"published-print":{"date-parts":[[2019,12,31]]},"abstract":"<jats:p>Social isolation has been identified as a major risk in elderly people living alone because of their association with cognitive decline, depression, and other mental health-related issues. Ambient Assisted Living (AAL) is identified as a key technology to facilitate independent living and maintain social connnectedness between elderly, their families, and caregivers. AAL combines Internet of Things, Smart Homes, and machine learning to produce a smart solution that encourages independent, safe, and socially active life for elderly people within their own home. In this article, we propose, develop, implement, and validate a novel Internet-of-Things-based solution that uses passive (i.e., non-obstructive methods) sensing for real-time monitoring of elderly in their homes. The significance of the proposed solution is in the use of machine learning and statistical models to automatically build a personalised model by learning the normal behavioural pattern for the person from deployed sensors in the house. It then uses this model to detect significant changes in the behavioural pattern, should they occur, that could be a consequence of possible health deterioration. We evaluate the performance of the proposed solution via real-world in-home trials installed in six elderly people\u2019s home for a period from 1.5 to 4 months. A discussion and analysis of the in-home trial outcomes and feedback from elderly who participated in the trials conclude the article.<\/jats:p>","DOI":"10.1145\/3363563","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T13:12:30Z","timestamp":1576501950000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["An Internet-of-Things Solution to Assist Independent Living and Social Connectedness in Elderly"],"prefix":"10.1145","volume":"2","author":[{"given":"Abdur Rahim Mohammad","family":"Forkan","sequence":"first","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Philip","family":"Branch","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Prem Prakash","family":"Jayaraman","sequence":"additional","affiliation":[{"name":"School of Software and Electrical Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"given":"Andre","family":"Ferretto","sequence":"additional","affiliation":[{"name":"SP Tech Solutions, Hawthorn, VIC, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Adam Aboode. 2018. Anomaly Detection in Time Series Data Based on Holt-Winters Method. Retrieved from http:\/\/www.diva-portal.org\/smash\/get\/diva2:1198551\/FULLTEXT02.pdf.  Adam Aboode. 2018. Anomaly Detection in Time Series Data Based on Holt-Winters Method. Retrieved from http:\/\/www.diva-portal.org\/smash\/get\/diva2:1198551\/FULLTEXT02.pdf."},{"key":"e_1_2_1_2_1","volume-title":"Mynatt","author":"Abowd Gregory D.","year":"2004","unstructured":"Gregory D. Abowd and Elizabeth D . Mynatt . 2004 . Designing for the human experience in smart environments. Smart Environ.: Technol. Protocols Appl . (2004), 151--174. DOI:https:\/\/doi.org\/10.1002\/047168659X.ch7 10.1002\/047168659X.ch7 Gregory D. Abowd and Elizabeth D. Mynatt. 2004. Designing for the human experience in smart environments. Smart Environ.: Technol. Protocols Appl. (2004), 151--174. DOI:https:\/\/doi.org\/10.1002\/047168659X.ch7"},{"key":"e_1_2_1_3_1","volume-title":"Data Mining","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2015. Outlier analysis . In Data Mining . Springer , 237--263. Charu C. Aggarwal. 2015. Outlier analysis. In Data Mining. Springer, 237--263."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2015.7410340"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.03.019"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.121"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JTEHM.2016.2579638"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Uabua Bakar Hemant Ghayvat S. F. Hasanm and S. C. Mukhopadhyay. 2016. Activity and anomaly detection in smart home: A survey. In Next Generation Sensors and Systems. Springer 191--220.  Uabua Bakar Hemant Ghayvat S. F. Hasanm and S. C. Mukhopadhyay. 2016. Activity and anomaly detection in smart home: A survey. In Next Generation Sensors and Systems. Springer 191--220.","DOI":"10.1007\/978-3-319-21671-3_9"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1067860.1067867"},{"key":"e_1_2_1_10_1","unstructured":"Jason Brownlee. 2017. Encoder-Decoder Long Short-term Memory Networks. Retrieved from https:\/\/machinelearningmastery.com\/encoder-decoder-long-short-term-memory-networks\/.  Jason Brownlee. 2017. Encoder-Decoder Long Short-term Memory Networks. Retrieved from https:\/\/machinelearningmastery.com\/encoder-decoder-long-short-term-memory-networks\/."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cmpb.2008.02.001"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2003.1192783"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1160085"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2015.7134015"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2252338"},{"key":"e_1_2_1_16_1","first-page":"33","article-title":"Technologies for an aging society: A systematic review of \u201csmart home\u201d applications","volume":"3","author":"Demiris George","year":"2008","unstructured":"George Demiris , Brian K. Hensel 2008 . Technologies for an aging society: A systematic review of \u201csmart home\u201d applications . Yearb. Med. Inform. 3 (2008), 33 -- 40 . George Demiris, Brian K. Hensel et al. 2008. Technologies for an aging society: A systematic review of \u201csmart home\u201d applications. Yearb. Med. Inform. 3 (2008), 33--40.","journal-title":"Yearb. Med. Inform."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2004.838488"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12966-015-0314-1"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/2592315.2592679"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.507"},{"key":"e_1_2_1_21_1","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom\u201916)","author":"Mohammad Forkan Abdur Rahim","year":"2016","unstructured":"Abdur Rahim Mohammad Forkan and Ibrahim Khalil . 2016 . A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring . In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom\u201916) . IEEE, 1--9. Abdur Rahim Mohammad Forkan and Ibrahim Khalil. 2016. A probabilistic model for early prediction of abnormal clinical events using vital sign correlations in home-based monitoring. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom\u201916). IEEE, 1--9."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.07.007"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2582924"},{"key":"e_1_2_1_25_1","volume-title":"Solitude and Privacy: A Study of Social Isolation, Its Causes and Therapy","author":"Halmos Paul","unstructured":"Paul Halmos . 2013. Solitude and Privacy: A Study of Social Isolation, Its Causes and Therapy . Routledge . Paul Halmos. 2013. Solitude and Privacy: A Study of Social Isolation, Its Causes and Therapy. Routledge."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cvi.2015.0215"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.107"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.57"},{"key":"e_1_2_1_29_1","first-page":"70","article-title":"Anomaly detection using temporal data mining in a smart home environment. Methods Info","volume":"47","author":"Jakkula Vikramaditya","year":"2008","unstructured":"Vikramaditya Jakkula , Diane J. Cook 2008 . Anomaly detection using temporal data mining in a smart home environment. Methods Info . Med. 47 , 1 (2008), 70 -- 75 . Vikramaditya Jakkula, Diane J. Cook et al. 2008. Anomaly detection using temporal data mining in a smart home environment. Methods Info. Med. 47, 1 (2008), 70--75.","journal-title":"Med."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the IEEE 17Th International Conference on Industrial Engineering and Engineering Management. IEEE, 410--414","author":"Kang Wonjoon","year":"2010","unstructured":"Wonjoon Kang , Dongkyoo Shin , and Dongil Shin . 2010 . Detecting and predicting of abnormal behavior using hierarchical markov model in smart home network . In Proceedings of the IEEE 17Th International Conference on Industrial Engineering and Engineering Management. IEEE, 410--414 . Wonjoon Kang, Dongkyoo Shin, and Dongil Shin. 2010. Detecting and predicting of abnormal behavior using hierarchical markov model in smart home network. In Proceedings of the IEEE 17Th International Conference on Industrial Engineering and Engineering Management. IEEE, 410--414."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.031"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.42.2.232"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1556-6676.2000.tb01932.x"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2484839"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2247-2"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-010-0043-x"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.24138\/jcomss.v13i2.374"},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of the 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN\u201915)","author":"Malhotra Pankaj","year":"2015","unstructured":"Pankaj Malhotra , Lovekesh Vig , Gautam Shroff , and Puneet Agarwal . 2015 . Long short-term memory networks for anomaly detection in time series . In Proceedings of the 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN\u201915) . Presses universitaires de Louvain, 89. Pankaj Malhotra, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal. 2015. Long short-term memory networks for anomaly detection in time series. In Proceedings of the 23rd European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning (ESANN\u201915). Presses universitaires de Louvain, 89."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ELEKTRO.2012.6225617"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2025137"},{"key":"e_1_2_1_41_1","volume-title":"Proc. PRESENCE 2003, Online Proceedings.","author":"Rettie Ruth","year":"2003","unstructured":"Ruth Rettie . 2003 . Connectedness, awareness and social presence . In Proc. PRESENCE 2003, Online Proceedings. Ruth Rettie. 2003. Connectedness, awareness and social presence. In Proc. PRESENCE 2003, Online Proceedings."},{"key":"e_1_2_1_42_1","volume-title":"Proceedings of the 15th Annual Conference of the International Speech Communication Association.","author":"Sak Ha\u015fim","year":"2014","unstructured":"Ha\u015fim Sak , Andrew Senior , and Fran\u00e7oise Beaufays . 2014 . Long short-term memory recurrent neural network architectures for large scale acoustic modeling . In Proceedings of the 15th Annual Conference of the International Speech Communication Association. Ha\u015fim Sak, Andrew Senior, and Fran\u00e7oise Beaufays. 2014. Long short-term memory recurrent neural network architectures for large scale acoustic modeling. In Proceedings of the 15th Annual Conference of the International Speech Communication Association."},{"key":"e_1_2_1_43_1","volume-title":"An introduction to hidden Markov models. Curr. Protocols Bioinform. 18, 1","author":"Schuster-B\u00f6ckler Benjamin","year":"2007","unstructured":"Benjamin Schuster-B\u00f6ckler and Alex Bateman . 2007. An introduction to hidden Markov models. Curr. Protocols Bioinform. 18, 1 ( 2007 ), A-- 3A. Benjamin Schuster-B\u00f6ckler and Alex Bateman. 2007. An introduction to hidden Markov models. Curr. Protocols Bioinform. 18, 1 (2007), A--3A."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2011.2113352"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2016.7501687"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2009.08.001"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2014.16"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2013.08.004"},{"key":"e_1_2_1_49_1","first-page":"219","article-title":"Online human action recognition based on incremental learning of weighted covariance descriptors. Info","volume":"467","author":"Tang Chang","year":"2018","unstructured":"Chang Tang , Wanqing Li , Pichao Wang , and Lizhe Wang . 2018 . Online human action recognition based on incremental learning of weighted covariance descriptors. Info . Sci. 467 (2018), 219 -- 237 . Chang Tang, Wanqing Li, Pichao Wang, and Lizhe Wang. 2018. Online human action recognition based on incremental learning of weighted covariance descriptors. Info. Sci. 467 (2018), 219--237.","journal-title":"Sci."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24646-6_10"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 1--5.","author":"Tikunov Denis","year":"2007","unstructured":"Denis Tikunov and Toshikazu Nishimura . 2007 . Traffic prediction for mobile network using Holt-Winter\u2019s exponential smoothing . In Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 1--5. Denis Tikunov and Toshikazu Nishimura. 2007. Traffic prediction for mobile network using Holt-Winter\u2019s exponential smoothing. In Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 1--5."},{"key":"e_1_2_1_52_1","volume-title":"Recurrence quantification analysis. Theory and Best Practices","author":"Webber Charles L.","unstructured":"Charles L. Webber Jr . and Norbert Marwan . 2015. Recurrence quantification analysis. Theory and Best Practices , Springer . Charles L. Webber Jr. and Norbert Marwan. 2015. Recurrence quantification analysis. Theory and Best Practices, Springer."},{"key":"e_1_2_1_53_1","first-page":"26","article-title":"Recurrence quantification analysis of nonlinear dynamical systems","volume":"94","author":"Webber Charles L.","year":"2005","unstructured":"Charles L. Webber Jr . and Joseph P. Zbilut . 2005 . Recurrence quantification analysis of nonlinear dynamical systems . Tutor. Contemp. Nonlin. Methods Behav. Sci. 94 (2005), 26 -- 94 . Charles L. Webber Jr. and Joseph P. Zbilut. 2005. Recurrence quantification analysis of nonlinear dynamical systems. Tutor. Contemp. Nonlin. Methods Behav. Sci. 94 (2005), 26--94.","journal-title":"Tutor. Contemp. Nonlin. Methods Behav. Sci."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HSI.2010.5514585"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2010.20"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMBC.2014.6943965"}],"container-title":["ACM Transactions on Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3363563","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3363563","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:25Z","timestamp":1750203865000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3363563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,16]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12,31]]}},"alternative-id":["10.1145\/3363563"],"URL":"https:\/\/doi.org\/10.1145\/3363563","relation":{},"ISSN":["2469-7818","2469-7826"],"issn-type":[{"value":"2469-7818","type":"print"},{"value":"2469-7826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,16]]},"assertion":[{"value":"2019-02-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-12-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}