Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Discovery and diagnosis of behavioral transitions in patient event streams

Published: 10 April 2012 Publication History

Abstract

Users with cognitive impairments use assistive technology (AT) as part of a clinical treatment plan. As the AT interface is manipulated, data stream mining techniques are used to monitor user goals. In this context, real-time data mining aids clinicians in tracking user behaviors as they attempt to achieve their goals. Quality metrics over stream-mined models identify potential changes in user goal attainment, as the user learns his or her personalized emailing system. When the quality of some data-mined models varies significantly from nearby models—as defined by quality metrics—the user's behavior is then flagged as a significant behavioral change. The specific changes in user behavior are then characterized by differencing the data-mined decision tree models. This article describes how model quality monitoring and decision tree differencing can aid in recognition and diagnoses of behavioral changes in a case study of cognitive rehabilitation via emailing. The technique may be more widely applicable to other real-time data-intensive analysis problems.

References

[1]
Aggarwal, C., Han, J., Wang, J., and Yu, P. 2004. On demand classification of data streams. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 503--508.
[2]
Aggarwal, C. C., Han, J., Wang, J., and Yu, P. S. 2003. A framework for clustering evolving data streams. Proc. VLDB. 81--92.
[3]
Agrawal, R. and Psaila, G. 1995. Active data mining. In Proceedings of the International Conference on Data Engineering (ICDE'95).
[4]
Ajzen, I. 1991. The theory of planned behavior. Org. Behav. Hum. Deci. Process. 50, 179--211.
[5]
Alliance, F. C. 2001. Incidence and prevalence of the major causes of brain impairment. Family Caregiver Alliance. http://caregiver.org/caregiver/jsp/content_node.jsp?nodeid=438.
[6]
Anderson-Lehman, R., Watson, H., Wixom, B., and Hoffer, J. 2004. Continental Airlines flies high with real-time business intelligence. MIS Quart. Exec. 3, 163--176.
[7]
Avison, D. E. and Wood-Harper, A. T. 1990. Multiview: An Exploration in Information Systems Development. Blackwell Scientific Publications.
[8]
Azvine, B., Cui, Z., and Nauck, D. 2005. Towards real-time business intelligence. BT Technol. J. 23, 214--225.
[9]
Beetz, M., Buss, M., and Wollherr, D. 2007. Cognitive technical systems—What is the role of artificial intelligence? In Proceedings of the Annual German Conference on Advances in Artificial Intelligence, 19--42.
[10]
Bille, P. 2005. A survey on tree edit distance and related problems. Theoretical Comput. Sci. 337, 217--239.
[11]
Bouchard, B., Giroux, S., and Bouzouane, A. 2007. A keyhole plan recognition model for Alzheimer's patients: First results. Appl. Artif. Intell. 21, 623--658.
[12]
Carberry, S. 2001. Techniques for plan recognition. User Model. User-Adapt. Interact. 11, 31--48.
[13]
Chakrabarti, S., Sarawagi, S., and Dom, B. 1998. Mining surprising patterns using temporal description length. In Proceedings of the 24th International Conference on Very Large Databases. 606--617.
[14]
Chen, H. 2005. Medical Informatics: Knowledge Management and Data Mining in Biomedicine. Springer-Verlag, Berlin, Germany.
[15]
Chen, H., Fuller, S., Friedman, C., and Hersh, W. 2005. Knowledge management, data mining, and text mining in medical informatics. Med. Informatics, 3--33.
[16]
Chung, L. and Subramanian, N. 2004. Adaptable architecture generation for embedded systems. J. Syst. Softw. 71, 271--295.
[17]
de Joode, E., Van Heugten, C., Verhey, F., and Van Boxtel, M. 2010. Efficacy and usability of assistive technology for patients with cognitive deficits: A systematic review. Clinical Rehab. 24, 701.
[18]
Delgado, N., Gates, A. Q., and Roach, S. 2004. A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Trans. Softw. Eng. 30, 859--872.
[19]
Domingos, P. and Hulten, G. 2000. Mining high-speed data streams. In Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 71--80.
[20]
Fenstermacher, K. D. and Ginsburg, M. 2002. A lightweight framework for cross-application user monitoring. Comput. 35, 51--59.
[21]
Ferrer-Troyano, F., Aguilar-Ruiz, J., and Riquelme, J. 2004. Discovering decision rules from numerical data streams. In Proceedings of the ACM Symposium on Applied Computing. 649--653.
[22]
Fickas, S. and Feather, M. S. 1995. Requirements monitoring in dynamic environments. In Proceedings of the 2nd IEEE International Symposium on Requirements Engineering.
[23]
Fickas, S. and Helm, R. 1992. Knowledge representation and reasoning in the design of composite systems. IEEE Trans. Softw. Eng. 18, 470--482.
[24]
Fickas, S., Robinson, W., and Sohlberg, M. 2005. The role of deferred requirements: A case study. In Proceedings of the International Conference on Requirements Engineering (RE'05).
[25]
Gaber, M., Zaslavsky, A., and Krishnaswamy, S. 2005. Mining data streams: A review. SIGMOD Rec. 34, 18--26.
[26]
Galin, D. 2004. Software Quality Assurance: From Theory to Implementation. Addison Wesley.
[27]
Gama, J. 2010. Knowledge Discovery from Data Streams. Chapman & Hall/CRC, Boca Raton, FL.
[28]
Gama, J., Ganguly, A., Omitaomu, O., Vatsavai, R., and Gaber, M. 2009. Knowledge discovery from data streams. Intell. Data Anal. 13, 403--404.
[29]
Ganti, V., Gehrke, J., and Ramakrishnan, R. 2002. Mining data streams under block evolution. ACM SIGKDD Explor. Newsl. 3, 1--10.
[30]
Ganti, V., Gehrke, J., Ramakrishnan, R., and Loh, W. Y. 2002. A framework for measuring differences in data characteristics. J. Comput. Syst. Sciences 64, 542--578.
[31]
Hevner, A. R., March, S. T., Park, J., and Ram, S. 2004. Design science in information systems research. MIS Quart. 28, 75--105.
[32]
Hulten, G., Spencer, L., and Domingos, P. 2001. Mining time-changing data streams. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 97--106.
[33]
Jain, G., Cook, D. J., and Jakkula, V. 2006. Monitoring health by detecting drifts and outliers for a smart environment inhabitant. In Proceedings of the 4th International Conference on Smart Homes and Health Telematics.
[34]
Kargupta, H., Bhargava, R., Liu, K., Powers, M., Blair, P., Bushra, S., Dull, J., Sarkar, K., Klein, M., and Vasa, M. 2004. VEDAS: A mobile and distributed data stream mining system for real-time vehicle monitoring. In Proceedings of the SIAM International Data Mining Conference.
[35]
Kifer, D., Ben-David, S., and Gehrke, J. 2004. Detecting change in data streams. Proc. VLDB, 180--191.
[36]
Lamsweerde, A. V. 2008. Requirements Engineering: From System Goals to UML Models to Software Specifications.
[37]
Last, M. 2002. Online classification of nonstationary data streams. Intell. Data Anal. 6, 129--147.
[38]
Lopresti, E., Mihailidis, A., and Kirsch, N. 2004. Assistive technology for cognitive rehabilitation: State of the art. Neuropsychol. Rehab. 14, 5--39.
[39]
Ludwig, H., Dan, A., and Kearney, R. 2004. Crona: An architecture and library for creation and monitoring of WS-agreents. In Proceedings of the 2nd International Conference on Service Oriented Computing. 65--74.
[40]
Masseglia, F., Poncelet, P., and Teisseire, M. 2008. Successes and New Directions in Data Mining. Information Science Publishing.
[41]
McColl, M., Carlson, P., Johnston, J., Minnes, P., Shue, K., Davies, D., and Karlovitz, T. 1998. The definition of community integration: Perspectives of people with brain injuries. Brain Injury 12, 15--30.
[42]
OPA, Office of Public Affairs, U.S. Department of Health and Human Services. 2002. Administration of Developmental Disabilities (ADD). Fact Sheet. http://acf.hhs.gov/opa/fact_sheets/add_factsheet.html. (Accessed 2002.)
[43]
Phua, C., Smith-Miles, K., Lee, V., and Gayler, R. 2007. Adaptive spike detection for resilient data stream mining. In Proceedings of the 6th Australasian Conference on Data Mining and Analytics. 181--188.
[44]
Pollack, M. 2009. Intelligent assistive technology: The present and the future. User Model. 5--6.
[45]
Robinson, W. N. 2002. Monitoring software requirements using instrumented code. In Proceedings of the 35th Annual IEEE Hawaii International Conference on Systems Sciences.
[46]
Robinson, W. N. 2006. A requirements monitoring framework for enterprise systems. Require. Eng. J. 11, 17--41.
[47]
Robinson, W. N. 2010. A roadmap for comprehensive requirements monitoring. IEEE Comput. 43, 64--72.
[48]
Robinson, W. N. and Akhlaghi, A. 2010. Monitoring behavioral transitions in cognitive rehabilitation with multi-model, multi-window stream mining. In Proceedings of the IEEE Hawaii International Conference on Software Systems.
[49]
Robinson, W. N., Akhlaghi, A., Deng, T., and Syed, A. 2011. Automated differential diagnosis of behavioral transitions in stream mining with decision trees. In Proceedings of the IEEE Hawaii International Conference on Software Systems.
[50]
Robinson, W. N., Akhlaghi, A., and Syed, A. 2011. A framework for mining behaviors in clinical data streams. In IEEE Draft.
[51]
Robinson, W. N. and Fickas, S. 2009. Talking designs: A case of feedback for design evolution in assistive technology. In Design Requirements Engineering: A Ten-Year Perspective, K. Lyytinen, P. Loucopoulos, J. Mylopoulos, and W. Robinson, Eds., Springer-Verlag, 215--237.
[52]
Robinson, W. N., Syed, A. R., Akhlaghi, A., and Deng, T. 2012. Pattern discovery of user interface sequencing by rehabilitation clients with cognitive impairments. In Proceedings of the IEEE Hawaii International Conference on Software Systems.
[53]
Schmidt, C. F., Sridharan, N., and Goodson, J. L. 1978. The plan recognition problem: An intersection of psychology and artificial intelligence. Artif. Intell. 11, 45--83.
[54]
Shahar, Y. 1997. A framework for knowledge-based temporal abstraction. Artif. Intell. 90, 79--133.
[55]
Silberschatz, A. and Tuzhilin, A. 1996. What makes patterns interesting in knowledge discovery systems. IEEE Trans. Knowl. Data Eng. 8, 970--974.
[56]
Sohlberg, M., Ehlhardt, L., Fickas, S., and Sutcliffe, A. 2003. A pilot study exploring electronic (or email) mail in users with acquired cognitive-linguistic impairments. Brain Injury 17, 609--629.
[57]
Sohlberg, M. K. M., Turkstra, L. S., and Wilson, B. A. 2011. Optimizing Cognitive Rehabilitation: Effective Instructional Methods. The Guilford Press.
[58]
Sohlberg, M. M., Ehlhardt, L., Fickas, S., and Todis, B. 2002. CORE: Comprehensive overview of requisite email skills. Tech rep. Department of Computer and Information Science, University of Oregon, Eugene, OR.
[59]
Sohlberg, M. M., Ehlhardt, L. A., Fickas, S., and Sutcliffe, A. 2003. A pilot study exploring electronic mail in users with acquired cognitive-linguistic impairments. Brain Injury 17, 609--629.
[60]
Sohlberg, M. M., Fickas, S., Ehlhardt, L., and Todis, B. 2005. Case study report: The longitudinal effects of Accessible email for four participants with severe cognitive impairments. J. Aphasiology.
[61]
Sohlberg, M. M., Fickas, S., Ehlhardt, L., and Todis, B. 2005. The longitudinal effects of accessible email for individuals with severe cognitive impairments. Aphasiology 19, 651--681.
[62]
Sohlberg, M. M. and Mateer, C. A. 1989. Introduction to Cognitive Rehabilitation. Guilford Press.
[63]
Sohlberg, M. M. and Mateer, C. A. 2001. Cognitive Rehabilitation: An Integrated Neuropsychological Approach. Guilford Publication, New York.
[64]
Spanoudakis, G., Kloukinas, C., Tsigritis, T., Androutsopoulos, K., Ballas, C., and Presenza, D. 2006. Review of the state of the art in security and dependability monitoring and recovery. SERENITY EU Research Project 0257587.
[65]
Spokoiny, A. and Shahar, Y. 2008. Incremental application of knowledge to continuously arriving time-oriented data. J. Intell. Inform. Syst. 31, 1--33.
[66]
Sutcliffe, A., Fickas, S., and Sohlberg, M. K. M. 2006. PC-RE: A method for personal and contextual requirements engineering with some experience. Require. Eng. 11, 157--173.
[67]
Sutcliffe, A., Fickas, S., and Sohlberg, M. M. 2005. Personal and contextual requirements engineering. Proceedings of the 13th IEEE International Conference on Requirements Engineering. 19--30.
[68]
Sutcliffe, A., Fickas, S., Sohlberg, M. M., and Ehlhardt, L. A. 2003. Investigating the usability of assistive user interfaces. Interact. Comput. 15, 577--602.
[69]
Todis, B., Sohlberg, M. M., Hood, D., and Fickas, S. 2005. Making electronic mail accessible: Perspectives of people with acquired cognitive impairments, caregivers and professionals. Brain Injury 19, 389--402.
[70]
Van der Aalst, W. M. P., Van Dongen, B. F., Herbst, J., Maruster, L., Schimm, G., and Weijters, A. 2003. Workflow mining: A survey of issues and approaches. Data Knowl. Eng. 47, 237--267.
[71]
Van Lamsweerde, A. 2003. From system goals to software architecture. In Formal Methods for Software Architectures, M. Bernards and P. Inverardi, Eds., Lecture Notes in Computer Science, vol. 2804, 25--43.
[72]
Van Lamsweerde, A. 2004. Elaborating security requirements by construction of intentional anti-models. In Proceedings of the 26th International Conference on Software Engineering (ICSE'04). 148--157.
[73]
Van Lamsweerde, A., Darimont, R., and Massonet, P. 1995. Goal-directed elaboration of requirements for a meeting scheduler: Problems and lessons learnt. In Proceedings of the 2nd International IEEE Symposium on Requirements Engineering, 194--203.
[74]
Virone, G., Alwan, M., Dalal, S., Kell, S. W., Turner, B., Stankovic, J. A., and Felder, R. 2008. Behavioral patterns of older adults in assisted living. IEEE Trans. Info. Technol. Biomed. 12, 387--398.
[75]
Wang, Y., Yu, Y., and Mylopoulos, J. 2007. An automated approach for monitoring and diagnosing requirements. In Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering. 293--302.
[76]
Watson, H., Wixom, B., Hoffer, J., Anderson-Lehman, R., and Reynolds, A. 2006. Real-time business intelligence: Best practices at Continental Airlines. Info. Syst. Manag. 23, 7--18.
[77]
Wilson, B. A., Emslie, H. C., Quirk, K., and Evans, J. J. 2001. Reducing everyday memory and planning problems by means of a paging system: A randomized control crossover study. J. Neurol. Neurosur. Psych. 70, 477--482.
[78]
Wright, P., Rogers, N., Hall, C., Wilson, B., Evans, J., Emslie, H., and Bartram, C. 2001. Comparison of pocket-computer memory aids for people with brain injury. Brain Injury 15, 787--800.
[79]
Wu, X., Kumar, V., Ross Quinlan, J., Ghosh, J., Yang, Q., Motoda, H., Mclachlan, G., Ng, A., Liu, B., and Yu, P. 2008. Top 10 algorithms in data mining. Knowl. Info. Syst. 14, 1--37.
[80]
Zeng, Y., Chiang, R., and Yen, D. 2003. Enterprise integration with advanced information technologies: ERP and data warehousing. Inform. Manag. Comput. Secur. 11, 115--122.
[81]
Zhang, J., Cheng, B., and Goldsby, H. 2007. AMOEBA-RT: Runtime verification of adaptive software. In Proceedings of the Workshop on [email protected] at the ACM/IEEE 10th International Conference on Model Driven Engineering Languages & Systems.

Cited By

View all
  • (2021)Changes in emergent software development routinesInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2020.10230658:COnline publication date: 1-Jun-2021
  • (2020)Guiding Assistive-Technology Adaptations Through Intelligent Stream Mining of Patient DataTheory and Practice of Business Intelligence in Healthcare10.4018/978-1-7998-2310-0.ch011(216-255)Online publication date: 2020
  • (2020)Monitoring behaviours with model divergence: emailing studies of users with cognitive impairmentsHealth Systems10.1080/20476965.2019.1710582(1-19)Online publication date: 21-Jan-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems  Volume 3, Issue 1
April 2012
119 pages
ISSN:2158-656X
EISSN:2158-6578
DOI:10.1145/2151163
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2012
Accepted: 01 January 2012
Revised: 01 December 2011
Received: 01 June 2011
Published in TMIS Volume 3, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Patient monitoring
  2. behavioral rehabilitation
  3. clinical treatment plans
  4. decision trees
  5. real-time data mining
  6. stream mining

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)3
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Changes in emergent software development routinesInternational Journal of Information Management: The Journal for Information Professionals10.1016/j.ijinfomgt.2020.10230658:COnline publication date: 1-Jun-2021
  • (2020)Guiding Assistive-Technology Adaptations Through Intelligent Stream Mining of Patient DataTheory and Practice of Business Intelligence in Healthcare10.4018/978-1-7998-2310-0.ch011(216-255)Online publication date: 2020
  • (2020)Monitoring behaviours with model divergence: emailing studies of users with cognitive impairmentsHealth Systems10.1080/20476965.2019.1710582(1-19)Online publication date: 21-Jan-2020
  • (2019)Crowdsourcing-based semantic relation recognition for natural language questions over RDF dataEnterprise Information Systems10.1080/17517575.2019.159738513:7-8(935-958)Online publication date: 30-Mar-2019
  • (2019)On utilizing weak estimators to achieve the online classification of data streamsEngineering Applications of Artificial Intelligence10.1016/j.engappai.2019.08.01586(11-31)Online publication date: Nov-2019
  • (2017)Crowdsourcing Model Research for the Identification of Post-Earthquake Rescue ObjectsJournal of Earthquake Engineering10.1080/13632469.2017.1342304(1-19)Online publication date: 30-Aug-2017
  • (2016)Developer Behavior and Sentiment from Data Mining Open Source RepositoriesProceedings of the 2016 49th Hawaii International Conference on System Sciences (HICSS)10.1109/HICSS.2016.465(3729-3738)Online publication date: 5-Jan-2016
  • (2015)Data Mining Behavioral Transitions in Open Source RepositoriesProceedings of the 2015 48th Hawaii International Conference on System Sciences10.1109/HICSS.2015.622(5280-5289)Online publication date: 5-Jan-2015
  • (2015)Improving business process intelligence by observing object state transitionsData & Knowledge Engineering10.1016/j.datak.2015.07.00898:C(144-164)Online publication date: 1-Jul-2015
  • (2013)A Systematic Review of Business and Information Technology AlignmentACM Transactions on Management Information Systems10.1145/2445560.24455644:1(1-30)Online publication date: 1-Apr-2013
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media