<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JA</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Aging</journal-id>
      <journal-title>JMIR Aging</journal-title>
      <issn pub-type="epub">2561-7605</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v5i2e28260</article-id>
      <article-id pub-id-type="pmid">35404260</article-id>
      <article-id pub-id-type="doi">10.2196/28260</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Detecting Anomalies in Daily Activity Routines of Older Persons in Single Resident Smart Homes: Proof-of-Concept Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Wang</surname>
            <given-names>Jing</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Karunanithi</surname>
            <given-names>Mohan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>van Kasteren</surname>
            <given-names>Yasmin</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Shahid</surname>
            <given-names>Zahraa Khais</given-names>
          </name>
          <degrees>MSc</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Division of Computer Science</institution>
            <institution>Department of Computer Science, Electrical and Space Engineering</institution>
            <institution>Luleå University of Technology</institution>
            <addr-line>Forskargatan 1</addr-line>
            <addr-line>Skellefteå, 931 77</addr-line>
            <country>Sweden</country>
            <phone>46 704741624</phone>
            <email>zahraa.shahid@ltu.se</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5704-4667</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Saguna</surname>
            <given-names>Saguna</given-names>
          </name>
          <degrees>BIS (Hons), MIT, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8561-7963</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Åhlund</surname>
            <given-names>Christer</given-names>
          </name>
          <degrees>MSc, LicEng, PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-8681-9572</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Division of Computer Science</institution>
        <institution>Department of Computer Science, Electrical and Space Engineering</institution>
        <institution>Luleå University of Technology</institution>
        <addr-line>Skellefteå</addr-line>
        <country>Sweden</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Information Technology Department</institution>
        <institution>Skellefteå Municipality</institution>
        <addr-line>Skellefteå</addr-line>
        <country>Sweden</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Zahraa Khais Shahid <email>zahraa.shahid@ltu.se</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Apr-Jun</season>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>11</day>
        <month>4</month>
        <year>2022</year>
      </pub-date>
      <volume>5</volume>
      <issue>2</issue>
      <elocation-id>e28260</elocation-id>
      <history>
        <date date-type="received">
          <day>26</day>
          <month>2</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>20</day>
          <month>4</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>30</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>27</day>
          <month>12</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Zahraa Khais Shahid, Saguna Saguna, Christer Åhlund. Originally published in JMIR Aging (https://aging.jmir.org), 11.04.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Aging, is properly cited. The complete bibliographic information, a link to the original publication on https://aging.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://aging.jmir.org/2022/2/e28260" xlink:type="simple"/>
      <related-article related-article-type="correction-forward" xlink:title="This is a corrected version. See correction statement in:" xlink:href="https://aging.jmir.org/2024/1/e58394" vol="7" page="58394"> </related-article>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>One of the main challenges of health monitoring systems is the support of older persons in living independently in their homes and with relatives. Smart homes equipped with internet of things devices can allow older persons to live longer in their homes. Previous surveys used to identify sensor-based data sets in human activity recognition systems have been limited by the use of public data set characteristics, data collected in a controlled environment, and a limited number of older participants.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The objective of our study is to build a model that can learn the daily routines of older persons, detect deviations in daily living behavior, and notify these anomalies in near real-time to relatives.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>We extracted features from large-scale sensor data by calculating the time duration and frequency of visits. Anomalies were detected using a parametric statistical approach, unusually short or long durations being detected by estimating the mean (μ) and standard deviation (σ) over hourly time windows (80 to 355 days) for different apartments. The confidence level is at least 75% of the tested values within two (σ) from the mean. An anomaly was triggered where the actual duration was outside the limits of 2 standard deviations (μ−2σ, μ+2σ), activity nonoccurrence, or absence of activity.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The patterns detected from sensor data matched the routines self-reported by users. Our system observed approximately 1000 meals and bathroom activities and notifications sent to 9 apartments between July and August 2020. A service evaluation of received notifications showed a positive user experience, an average score of 4 being received on a 1 to 5 Likert-like scale. One was poor, two fair, three good, four very good, and five excellent. Our approach considered more than 75% of the observed meal activities were normal. This figure, in reality, was 93%, normal observed meal activities of all participants falling within 2 standard deviations of the mean.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>In this research, we developed, implemented, and evaluated a real-time monitoring system of older participants in an uncontrolled environment, with off-the-shelf sensors and internet of things devices being used in the homes of older persons. We also developed an SMS-based notification service and conducted user evaluations. This service acts as an extension of the health/social care services operated by the municipality of Skellefteå provided to older persons and relatives.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>Activities of daily living</kwd>
        <kwd>smart homes</kwd>
        <kwd>elderly care</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>IoT devices</kwd>
        <kwd>smart device</kwd>
        <kwd>elderly</kwd>
        <kwd>sensors</kwd>
        <kwd>digital sensors</kwd>
        <kwd>Internet of things</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Emerging technologies have, in recent years, given rise to the internet of things (IoT). IoT is a combination of smart devices, sensors, and actuators used to connect and interact through the internet and to collect, share and analyze data. Kevin Ashton first coined the term IoT in 1999 to promote radio frequency identification technology [<xref ref-type="bibr" rid="ref1">1</xref>]. IoT usability and its real-time monitoring capabilities have paved the way for a new range of applications. IoT applications in environments such as smart homes [<xref ref-type="bibr" rid="ref2">2</xref>], for example, have the potential to support and assist older persons and help them live independently in their homes [<xref ref-type="bibr" rid="ref3">3</xref>]. These systems can also help indicate the ability of older adults to perform basic daily routines such as cooking and bathing [<xref ref-type="bibr" rid="ref4">4</xref>].</p>
      <p>The need for assistive technologies is driven by the older population, with Sweden's older population, for example, expected to increase by 45% and 87% by 2050 for the age groups of 65-79 years and ≥80 years, respectively [<xref ref-type="bibr" rid="ref5">5</xref>]. Smart homes fitted with IoT devices can allow older persons to live independently in their homes and allow the “elderly to age in place for twice as long” [<xref ref-type="bibr" rid="ref6">6</xref>]. Affordable and low-maintenance IoT-based monitoring systems can also provide significant benefits in challenging times, such as the recent global COVID pandemic, particularly for older persons who were the most vulnerable group in the COVID-19 pandemic. A significant proportion of COVID-19 related deaths (48.9%) were among care home residents (the Swedish Public Health Agency [<xref ref-type="bibr" rid="ref7">7</xref>]). Activities of daily living (ADL) in ambient assisted living applications can therefore play an even greater role in a pandemic through protecting older persons and reducing the pressure on health care providers.</p>
      <p>Human activity recognition (HAR) is one of the most important research topics within ADL applications for smart homes. This is at least partially due to the level of support it can provide to older persons and to health care providers. HAR is a challenging and well-researched topic. Advanced IoT devices and low-cost sensors can, however, make activity data collection less expensive [<xref ref-type="bibr" rid="ref8">8</xref>]. HAR activities can be classified by their granularity and atomic events [<xref ref-type="bibr" rid="ref9">9</xref>] (eg, open a door). HAR can also help infer high-level activities such as kitchen or breakfast activities through considering contextual environment information [<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref15">15</xref>], which only requires a limited number of sensors. The detection of abnormal behaviors by ADL applications is very relevant in health care monitoring systems, particularly in health care systems of older persons where abnormal behavior detection can be of crucial importance [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
      <p>Our research objectives are focused on building a model to identify and learn behavioral patterns and, through this, allow the detection of anomalies in the behavior of older persons using ADL applications and IoT data. This also allows family members to be notified in near real-time. The contributions of our paper are as follows:</p>
      <list list-type="bullet">
        <list-item>
          <p>We propose, develop, and evaluate an iVO data analytics architecture for anomaly detection to detect normal and abnormal patterns in the daily activities of older persons.</p>
        </list-item>
        <list-item>
          <p>We build a statistical real-time anomaly detection method that includes online data processing. </p>
        </list-item>
        <list-item>
          <p>We ran our trial in a real-life environment for approximately 64 days for nine different participants, median age 89 years, living in single-resident apartments. We collected data for analysis for approximately 2 years for each household to model the behavior.</p>
        </list-item>
        <list-item>
          <p>We developed an SMS-based notification service to interact with the relatives of older participants, and we conducted user evaluations. Notifications of normal daily activities and anomalies were sent via SMS to relatives as positive and negative notifications via our developed real-time online system.</p>
        </list-item>
      </list>
      <p>The “Internet of Things (IoT) within health and care” (iVO) project [<xref ref-type="bibr" rid="ref17">17</xref>] started in 2018 and was founded with a focus on older persons living independently in smart home environments. Participant apartments were at three locations in Sweden, in the municipalities of Skellefteå, Kiruna, and Uppsala. Pilot study participants were from Skellefteå municipality, 12 apartments being included, and around 1000 activities being observed over 2 months in the summer of 2020. In the following sections, we present the implementation of this study, the results, discussion, and conclusions.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>This section describes our research method. This includes the experimental setup, iVO architecture for anomaly detection service, the identification of participant routines and needs (based on interviews), and types of installed sensors.</p>
      <sec>
        <title>Experimental Setup</title>
        <p>The experimental study reported in this paper, however, includes 12 participants with a median age of 89 years. Three participants were later excluded due to unexpected life events. We used a statistical method to classify participant behavior into normal and abnormal (anomalies). This was based on whether the amount of time spent on an activity in each room was low or high in duration. The experimental setup worked according to routines collected during the interviews. The main focus was the meal activities.</p>
      </sec>
      <sec>
        <title>iVO Architecture for Anomaly Detection Service</title>
        <p>The iVO architecture is a layered architecture with horizontal connectivity of different sensors and service providers. iVO architecture is built using FIWARE [<xref ref-type="bibr" rid="ref18">18</xref>], connecting off-the-shelf sensors and IoT devices via an IoT platform. The platform is called societal development through secure IoT and open data (SSiO) [<xref ref-type="bibr" rid="ref19">19</xref>]. The SSiO platform was designed and implemented for different IoT applications and services within a smart city, a detailed description of the iVO architecture being given in Saguna et al [<xref ref-type="bibr" rid="ref20">20</xref>]. The installed sensors are connected via gateways to a service provider (an iVO project partner) to push the sensor data into the SSiO platform, as shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>a. The iVO analytics component is shown in <xref rid="figure1" ref-type="fig">Figure 1</xref>b.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>(a) iVO architecture with SSiO platform, (b) iVO analytics. iVO: internet of things within health and care; SSiO: societal development through secure IoT and open data.</p>
          </caption>
          <graphic xlink:href="aging_v5i2e28260_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Participant’ Routines and Needs Identification Based on Interviews</title>
        <p>The project’s first pilot study for the selected age group has been described by Saguna et al [<xref ref-type="bibr" rid="ref20">20</xref>]. We identified targeted activities through the interview process. The interviews also provided information on the needs of participants and their relatives and activities of interest. The interviews were conducted with the participants along with their relatives who answered questions on the activities they would like the model to recognize, their general opinion of home monitoring, their expectations of implementation, and details about their daily routines. All interviews were documented and recorded by researchers. All participants gave their written consent to use their data.</p>
        <p>Most of the participants and their relatives expressed their interest in monitoring meal activities in the kitchen. A matrix of the activities of each participant was constructed based on the environmental setups in each household, on the number of sensors, available kitchen appliances, and the interview responses. The interviewees expressed an interest in receiving both negative and positive notifications. Negative notifications notify that anomalies have been detected in behavioral patterns and positive notifications notify that the activity behavior is normal. This is shown in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>End- users' preference for activity recognition.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="310"/>
            <col width="360"/>
            <col width="130"/>
            <thead>
              <tr valign="top">
                <td>Apartment ID and Age<sup>a</sup></td>
                <td>Activities<sup>b</sup></td>
                <td>Number of sensors<sup>c</sup></td>
                <td>Notifications</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>1; 96</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 6:00-9:00</p>
                    </list-item>
                    <list-item>
                      <p>Lunch: 11:00-13:00</p>
                    </list-item>
                    <list-item>
                      <p>Bathroom: 22:00-5:00</p>
                    </list-item>
                    <list-item>
                      <p>Bathroom: 00:00-23:59</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 9</p>
                    </list-item>
                    <list-item>
                      <p>Water boiler, kitchen &amp; bathroom motion sensor</p>
                    </list-item>
                  </list>
                </td>
                <td>N/P<sup>d</sup></td>
              </tr>
              <tr valign="top">
                <td>2; 91</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 7:00-9:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 11</p>
                    </list-item>
                    <list-item>
                      <p>Kitchen motion sensor, micro</p>
                    </list-item>
                  </list>
                </td>
                <td>N<sup>e</sup></td>
              </tr>
              <tr valign="top">
                <td>3; 94</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 7:00-10:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 8</p>
                    </list-item>
                    <list-item>
                      <p>Coffee machine, kitchen motion sensor</p>
                    </list-item>
                  </list>
                </td>
                <td>N</td>
              </tr>
              <tr valign="top">
                <td>4; 99</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 6:00-7:00</p>
                    </list-item>
                    <list-item>
                      <p>Lunch: 11:00-13:00</p>
                    </list-item>
                    <list-item>
                      <p>Dinner: 16:00-18:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 9</p>
                    </list-item>
                    <list-item>
                      <p>Coffee machine, micro, kitchen motion sensor</p>
                    </list-item>
                  </list>
                </td>
                <td>N</td>
              </tr>
              <tr valign="top">
                <td>5; 89</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 5:00-8:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 9</p>
                    </list-item>
                    <list-item>
                      <p>Coffee machine, kitchen motion sensor</p>
                    </list-item>
                  </list>
                </td>
                <td>N</td>
              </tr>
              <tr valign="top">
                <td>6; 83</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Breakfast: 7:00-10:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 10</p>
                    </list-item>
                    <list-item>
                      <p>Water boiler, kitchen motion sensor</p>
                    </list-item>
                  </list>
                </td>
                <td>N/P</td>
              </tr>
              <tr valign="top">
                <td>7; 94</td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Bathroom: 4:00-6:00</p>
                    </list-item>
                  </list>
                </td>
                <td>
                  <list list-type="bullet">
                    <list-item>
                      <p>Total: 11</p>
                    </list-item>
                    <list-item>
                      <p>Bathroom motion sensor, water meter</p>
                    </list-item>
                  </list>
                </td>
                <td>N/P</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table1fn2">
              <p><sup>a</sup>Apartment ID and age are defined for each participant in this study; each apartment has a single resident.</p>
            </fn>
            <fn id="table1fn3">
              <p><sup>b</sup>Meals activities in the kitchen and visitation to the bathroom: from the interview data, we identified the most common routines among all participants, including a start time and end time of each activity.</p>
            </fn>
            <fn id="table1fn5">
              <p><sup>c</sup>Number of sensors: the total number of installed sensors at each apartment and the type of sensors used to monitor each corresponded activity in this study implementation.</p>
            </fn>
            <fn id="table1fn6">
              <p><sup>d</sup>N/P: negative and positive notifications. The type of notifications that the relatives are interested in receiving on each individual’s activities. Negative and positive notifications represent abnormal and normal behavior in performing the activity, respectively.</p>
            </fn>
            <fn id="table1fn1">
              <p><sup>e</sup>N: negative notifications.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Ethics Approval</title>
        <p>The ethical principles raised by and applied to the project were considered in collaboration with the department of homecare at Skellefteå municipality and were approved by the regional ethical committee. The participants gave their consent for the use of their data and the installation of in-home sensors. The project was, overall, in compliance with the European Union’s General Data Protection Regulation guidelines [<xref ref-type="bibr" rid="ref21">21</xref>]. The data collection and processing included in this study were approved by the Regional Ethical Board in Umea, Sweden (diary no. 2018-189/31).</p>
      </sec>
      <sec>
        <title>Sensors, Data Sets, and Data Preprocessing Module</title>
        <p>iVO smart homes use a wide range of off-the-shelf IoT devices and sensors, these systems also being referred to as dense-sensing network technologies [<xref ref-type="bibr" rid="ref22">22</xref>]. This study, however, only looked at motion sensors, wall plugs, and smart water meters. The sensor installation and floor plan of an older person’s home are shown in <xref rid="figure2" ref-type="fig">Figure 2</xref>. All nine apartments have a similar floor plan. Data cleaning is an essential part of the first phase of the study implementation. It is unavoidable that sensors will fail, sensor readings will be lost, and sensor data sets are duplicated, leading to vagueness and imprecision, false positives, and false alarms [<xref ref-type="bibr" rid="ref23">23</xref>]. This is of even greater importance in older person care health monitoring systems [<xref ref-type="bibr" rid="ref24">24</xref>]. A reliable monitoring system, therefore, needs to be built before the feature engineering phase is begun. Data cleaning applies, in particular, to motion sensors, redundant data being removed, and missing reading values being identified. Outliers due to visitors or home care visits were excluded.</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>The generic layout of a participant apartment and sensor placements [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
          </caption>
          <graphic xlink:href="aging_v5i2e28260_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Data Processing Module</title>
        <p>In this module, we calculated daily duration and visit frequencies for all rooms to extract patterns from and analyze user behaviors. Daily durations are further processed into hourly-based durations. Our analysis used historical data sets from the 2-year data sets. Scalability and re-usability are, however, notable challenges to building individualized activity models [<xref ref-type="bibr" rid="ref25">25</xref>]. Features engineering is the first step in this module, the time duration feature being the length of time the person spent moving or not moving in the room until transiting to another room/location. The frequency of visits is the number of times the person transits to another room and returns. We used a fixed time window, which is specified by the start and end times of the routines described in the interviews. These time windows, described in <xref ref-type="table" rid="table1">Table 1</xref>, are used to classify data into normal and abnormal activities.</p>
      </sec>
      <sec>
        <title>Proposed Anomaly Detection Module</title>
        <p>Hawkins has defined an outlier as “an observation that deviates so much from other observations as to arouse suspicions that it was generated by a different mechanism” [<xref ref-type="bibr" rid="ref26">26</xref>]. Detecting anomalies in data has been studied in the statistics community since the 19th century [<xref ref-type="bibr" rid="ref27">27</xref>]. There are different approaches to detecting anomalies, including the mining-based approach, the logic-based (rule-based) approach, the ontology-based approach [<xref ref-type="bibr" rid="ref28">28</xref>], and the statistical-based approach [<xref ref-type="bibr" rid="ref16">16</xref>]. A statistical parametric model can be a simple approach to anomaly detection problems, assuming that the data is normally distributed, fits certain distributions, and that the value of these parameters is unknown. These must be estimated from the given data. Selecting the correct statistical tool for anomaly detection, however, requires the validation of a normality assumption [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
        <p>Normally distributed data can often be tested using histograms. A histogram may not, however, reveal the shape of the distribution. The selection of the normality test tool was based on a comparative study of different normality tests. This study showed that the Shapiro-Wilk test was the most suitable tool for data sets of sample sizes of between 50 and 2000 [<xref ref-type="bibr" rid="ref30">30</xref>], the null hypothesis in this test being that the sample is a normal distribution. This hypothesis is rejected if P values are less than .05 (95% CI). Results of the tests can be found in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Shapiro-Wilk normality test.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="30"/>
            <col width="470"/>
            <col width="0"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td colspan="3">Apartment and activities<sup>a</sup></td>
                <td>Shapiro-Wilk normality test (test statistics <italic>W</italic> and P values)<sup>b</sup></td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td colspan="3">
                  <bold>1</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Breakfast: 6:00-9:00</td>
                <td colspan="2"><italic>W</italic>=.981, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Lunch:11:00-13:00</td>
                <td colspan="2"><italic>W</italic>=.972, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>2</td>
                <td>Breakfast: 7:00-9:00</td>
                <td colspan="2"><italic>W</italic>=.954, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>3</td>
                <td>Breakfast: 7:00-10</td>
                <td colspan="2"><italic>W</italic>=0.926, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>4</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Breakfast: 6:00-7:00</td>
                <td colspan="2"><italic>W</italic>=.979, P=.047 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Lunch:11:00-13:00</td>
                <td colspan="2"><italic>W</italic>=.949, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dinner:16:00-18:00</td>
                <td colspan="2"><italic>W</italic>=.962, P=.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>5</td>
                <td>Breakfast: 5:00-8:00</td>
                <td colspan="2"><italic>W</italic>=.967, P=.003 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>6</td>
                <td>Breakfast: 7:00-10:00</td>
                <td colspan="2"><italic>W</italic>=.958, P=.009 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td colspan="3">
                  <bold>8</bold>
                </td>
                <td>
                  <break/>
                </td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Breakfast: 7:00-10:00</td>
                <td colspan="2"><italic>W</italic> =.943, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Lunch: 10:00-13:00</td>
                <td colspan="2"><italic>W</italic>=.967, P=.005 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>
                  <break/>
                </td>
                <td>Dinner: 17:00-20:00</td>
                <td colspan="2"><italic>W</italic>=.729, <italic>P&lt;</italic>.001 (reject H0)</td>
              </tr>
              <tr valign="top">
                <td>9</td>
                <td>Breakfast: 08:00-10:00</td>
                <td colspan="2"><italic>W</italic>=.982, P=.05 (fail to reject H0)</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table2fn1">
              <p><sup>a</sup>Meals activities in the kitchen and visitation to the bathroom: from the interview data, we identified the most common routines among all participants, including a start time and end time of each activity.</p>
            </fn>
            <fn id="table2fn2">
              <p><sup>b</sup>If the P value of the Shapiro test is smaller than .05 (the threshold), then the data significantly deviates from a normal distribution.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
        <p>The normality test results show that 12 out of 13 (92%) tested meal activities in our study do not show a normal distribution. We, therefore, selected Chebyshev’s inequality theorem, a nonparametric statistical method, to detect anomalies [<xref ref-type="bibr" rid="ref31">31</xref>] in user daily activities based on time duration. Chebyshev’s inequality constructs the upper and lower interval for the percentage of the data that falls outside of k standard deviations from the mean. It holds no assumptions about the distribution of the data and can be used in situations where at least 75% of the data is within 2 standard deviations of the mean. This can be more than 75% in some cases.</p>
        <p>The inequality in Equation (1) calculates an upper bound ¼ for the probability of random values exceeding (k) 2 standard deviations from the mean. We, therefore, define an outlier as a data point of a time duration in minutes or hours that exceeds the expected duration by 2 standard deviations [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>
          <disp-formula>P(|X-μ| ≥ kσ) ≤ 1/k<sup>2</sup><bold>(1)</bold></disp-formula>
        </p>
        <p>X is the random variable, μ is the mean, and σ is the standard deviation.</p>
        <p>A value for p, the significance level of the intervals, is 0.25. This determines which data are potential outliers. To find k using Equation (2):</p>
        <p>
          <disp-formula>k = 1/√p <bold>(2)</bold></disp-formula>
        </p>
        <p>The significance level is 0.25 with a confidence level of 75% and a k value of 2. Equation (3) can be used to determine the probability that a randomly selected value is in the interval, around 75% of observations falling within 2 standard deviations of the mean.</p>
        <p>
          <disp-formula>μ ± kσ <bold>(3)</bold></disp-formula>
        </p>
        <p>Durations that lie between the lower and upper thresholds are considered to be normal. Data from wall plug sensors was also processed and added to the notifications as additional context. We, however, restricted the model to the duration feature, wall plug sensors, and visit frequencies not being used in the anomaly detection classification process. Our observations showed duration to be the most important feature, duration showing how long a participant remained in a room to perform an activity.</p>
        <p>Types of anomalies with example situations:</p>
        <list list-type="bullet">
          <list-item>
            <p>Unusually long/short activity: duration in a room in a specific timeframe is unusually long/short, indicating a fall/unconsciousness or health issues [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref16">16</xref>].</p>
          </list-item>
          <list-item>
            <p>Not present: when a user is expected to be in a room in a specific timeframe but is not [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Notification Service Module</title>
        <p>Our implementation delivers positive or negative notifications to relatives and caregivers. Positive notifications represent normal days, and negative notifications represent anomalous days. The notifications were sent via SMS [<xref ref-type="bibr" rid="ref15">15</xref>]. Negative notifications are sent when activities deviate from the observed normal behavior, which is based on analyzed historical data. Positive notifications are sent when the user’s behavior is normal and when the relative expresses an interest in receiving such notifications. The design of the notification service process in <xref rid="figure3" ref-type="fig">Figure 3</xref> starts by reading a configuration file, which automates a schedule and starts the service process.</p>
        <p>We contacted the relatives before running the system to inform them of the activities they would be notified about. They were shown a notification format and the information that would be included. They were optimistic about the possibilities that the system could provide, the system providing comfort through being able to remotely check in on their parents daily. A consensus was reached with participant relatives on the content of the notification and the type of communication to be used (ie, SMS).</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>The process for notification service implementation. DB: database; No: Apartment number; SSiO: societal development through secure IoT and open data.</p>
          </caption>
          <graphic xlink:href="aging_v5i2e28260_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>The notification structure included the number of minutes spent on the meal activity, across how many visits, whether they used any appliances, and the normal duration of the activity for that participant based on their identified patterns. An example of the structure and information for one positive notification sent for apartment 1 is shown below:</p>
        <disp-quote>
          <p>50.4 minutes of activity in the kitchen between 07.00 and 10:04, during 8 visits. The kettle has been used. Our analysis shows that 9-70 minutes is the normal time duration in the kitchen. If that message is not correct and deviates from the actual event, we are grateful for feedback with a description of the deviation.</p>
          <attrib>LTU iVO Message ID: 1, 2020-07-21</attrib>
        </disp-quote>
        <p>The relatives were given the option to reply to every notification. This response included feedback when there was anomalous behavior.</p>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Duration and visit frequency are essential in the analysis of user daily behavior. <xref rid="figure4" ref-type="fig">Figure 4</xref>a shows time durations in minutes in different rooms of the apartment, frequencies of visits being shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>b. The participant in apartment 1 spent more time in the kitchen than in the other rooms, except for 2 days in the trial month. This indicates that the participant is active during the morning due to eating breakfast. The number of transitions from and to the bedroom in <xref rid="figure4" ref-type="fig">Figure 4</xref>b shows that the participant is active, the participant remaining in the bedroom for only short periods of time. Such behavior conforms with a typical morning.</p>
      <fig id="figure4" position="float">
        <label>Figure 4</label>
        <caption>
          <p>(a) Data for the duration in all rooms between 06.00 and 10.00 in apartment 1 (August 2020), (b) Data for the number of visits to all rooms between 06.00 and 10.00 in apartment 1 (August 2020).</p>
        </caption>
        <graphic xlink:href="aging_v5i2e28260_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>Visits to the bathroom also show consistency, multiple visits for short periods of less than 10 minutes. The duration in the bathroom for four days on the 5th, 12th, 19th, and 26th of August 2020 was, however, 20-25 minutes. These days were cross-checked with this participant’s profile and showed that home care visited the participant to help them with bathing. The participant spent less time in the bedroom and more time in the kitchen on most weekend days (1, 2, 8, 9, 15, 16, 22, 23, 29, 30) in August. The kitchen was the most used room in the apartment, especially in the morning, as opposed to in the lounge and bedroom. User behavior can easily be interpreted from durations and transitions between the rooms.</p>
      <p>The value of the inequality is used when we only know probability distribution estimates, mean and standard deviation. These approximations are derived from the historical data sets of extracted features of time duration in the kitchen, as the example in <xref rid="figure4" ref-type="fig">Figure 4</xref>a shows.</p>
      <p><xref rid="figure5" ref-type="fig">Figures 5</xref>a and 5b show the distribution of time durations of two-meal activities for 351 days in 2019 and 2020. It can be seen that the participant spent between 1-2 hours in the kitchen in the morning on 250 of the 351days (<xref rid="figure5" ref-type="fig">Figure 5</xref>a). There are only a few days in the year when the participant spent less than half an hour and more than two hours in the kitchen during a year, these being on the extreme right and left sides of the distribution.</p>
      <fig id="figure5" position="float">
        <label>Figure 5</label>
        <caption>
          <p>Probability distribution with mean (SD) for 351 days in the kitchen between (a) 6:00 and 9:00 and (b) 11:00 and 13:00 in apartment 1.</p>
        </caption>
        <graphic xlink:href="aging_v5i2e28260_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p><xref rid="figure6" ref-type="fig">Figures 6</xref>a, <xref rid="figure6" ref-type="fig">Figures 6</xref>b, and <xref ref-type="supplementary-material" rid="app1">Multimedia Appendices 1</xref>, <xref ref-type="supplementary-material" rid="app2">2</xref>, and <xref ref-type="supplementary-material" rid="app3">3</xref> show the activity of a participant in the kitchen in the morning and mid-day. <xref rid="figure6" ref-type="fig">Figure 6</xref>a shows the time spent in minutes in the kitchen between 6:00 and 9:00 in July and August 2020. The red lines represent the calculated minimum and maximum thresholds and are based on the mean and standard deviation information given in <xref rid="figure5" ref-type="fig">Figure 5</xref>, which was calculated from the 2019 and half of 2020 data (355 days). This provides valuable information on probability.</p>
      <fig id="figure6" position="float">
        <label>Figure 6</label>
        <caption>
          <p>(a) Data of durations in kitchen between 06:00 and 09:00 in apartment 1, (b) Data of duration in kitchen between 11:00 and 13:00 in apartment 1, (red lines represent lower/upper bounds) for July and August 2020.</p>
        </caption>
        <graphic xlink:href="aging_v5i2e28260_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <p>About 80% of the duration lies within the range of 29 to 145 minutes. The kitchen was not used by the participant in the breakfast activity time range on August 6 and September 3, this being anomalous. The time duration for lunch activity between 11 and 13 (<xref rid="figure6" ref-type="fig">Figure 6</xref>b) shows either very short or long stays. It is noticeable that the level of activity is low in the kitchen, which could be due to lunch only being prepared in the kitchen but eaten in another room.</p>
      <p><xref ref-type="table" rid="table3">Table 3</xref> summarizes the estimates of each average mealtime duration as calculated from the historical data (80 to 355 days) for eight apartments. The values are depicted in <xref rid="figure5" ref-type="fig">Figure 5</xref> and <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>. The number of trial days of each observed mealtime and the average duration in the notification trial between July and August 2020 is also depicted.</p>
      <table-wrap position="float" id="table3">
        <label>Table 3</label>
        <caption>
          <p>Average duration in the kitchen as observed from total historical days is consistent with average duration in the kitchen as observed from total trial days.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="100"/>
          <col width="170"/>
          <col width="170"/>
          <col width="180"/>
          <col width="190"/>
          <col width="190"/>
          <thead>
            <tr valign="top">
              <td colspan="2">Household and mealtime from <break/>interviews<sup>a</sup></td>
              <td>Total historical days<sup>b</sup></td>
              <td>Average Duration for historical days<sup>c</sup></td>
              <td>Number of trial days<sup>d</sup></td>
              <td>Average Duration for trial days<sup>e</sup></td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td colspan="2">
                <bold>Apartment 1</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>6:00-9:00</td>
              <td>351</td>
              <td>87</td>
              <td>69</td>
              <td>82</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>11:00-13:00</td>
              <td>355</td>
              <td>52</td>
              <td>66</td>
              <td>39</td>
            </tr>
            <tr valign="top">
              <td>Apartment 2</td>
              <td>7:00-9:00</td>
              <td>364</td>
              <td>34</td>
              <td>51</td>
              <td>32</td>
            </tr>
            <tr valign="top">
              <td>Apartment 3</td>
              <td>7:00-10:00</td>
              <td>144</td>
              <td>40</td>
              <td>60</td>
              <td>42</td>
            </tr>
            <tr valign="top">
              <td colspan="2">
                <bold>Apartment 4</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>6:00-7:00</td>
              <td>126</td>
              <td>24</td>
              <td>56</td>
              <td>23</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>11:00-13:00</td>
              <td>140</td>
              <td>47</td>
              <td>42</td>
              <td>63</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>16:00-18:00</td>
              <td>137</td>
              <td>44</td>
              <td>46</td>
              <td>38</td>
            </tr>
            <tr valign="top">
              <td>Apartment 5</td>
              <td>5:00-8:00</td>
              <td>128</td>
              <td>29</td>
              <td>46</td>
              <td>30</td>
            </tr>
            <tr valign="top">
              <td>Apartment 6</td>
              <td>7:00-10:00</td>
              <td>81</td>
              <td>41</td>
              <td>52</td>
              <td>41</td>
            </tr>
            <tr valign="top">
              <td colspan="2">
                <bold>Apartment 8</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>7:00-10:00</td>
              <td>115</td>
              <td>40</td>
              <td>62</td>
              <td>41</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>10:00-13:00</td>
              <td>119</td>
              <td>41</td>
              <td>64</td>
              <td>44</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>17:00-20:00</td>
              <td>115</td>
              <td>17</td>
              <td>57</td>
              <td>23</td>
            </tr>
            <tr valign="top">
              <td>Apartment 9</td>
              <td>8:00-10:00</td>
              <td>145</td>
              <td>55</td>
              <td>45</td>
              <td>73</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table3fn1">
            <p><sup>a</sup>Meals routines in the kitchen collected from the interview data, including a start time and end time for each.</p>
          </fn>
          <fn id="table3fn2">
            <p><sup>b</sup>Number of past days defines regular activity patterns defined from the records in 2019 and the first half of 2020 data.</p>
          </fn>
          <fn id="table3fn3">
            <p><sup>c</sup>Average duration associated with each meal during 2019 and the first half of 2020 data.</p>
          </fn>
          <fn id="table3fn4">
            <p><sup>d</sup>Number of observed days during the trial July-August 2020 for each meal activity.</p>
          </fn>
          <fn id="table3fn5">
            <p><sup>e</sup>Observations of average duration associated with each meal during the trial July-August 2020.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <p>For example, participant 1 follows a pattern of performing the breakfast activity between 6:00 and 9:00. This shows that she was consistent in her habits. The regular pattern derived from the historical data showed a duration of 87 minutes, while observations from the notification gave a duration of 82 minutes. Most of the participants are consistent in their habits, following a pattern in daily meal activities. The activities also occurred within the self-reported timings.</p>
      <p>We observed approximately 1000 meals in nine apartments between July and August 2020. We also observed bathroom activity. <xref ref-type="table" rid="table4">Table 4</xref> shows the number of positive and negative notifications for normal and anomalous behavior sent to each household’s relative. The notifications are based on the end-users wishes defined in <xref ref-type="table" rid="table1">Table 1</xref>.</p>
      <table-wrap position="float" id="table4">
        <label>Table 4</label>
        <caption>
          <p>Types of notifications sent for eight apartments for each mealtime during July-August 2020.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="230"/>
          <col width="200"/>
          <col width="190"/>
          <col width="190"/>
          <col width="190"/>
          <thead>
            <tr valign="top">
              <td>Apartment ID, type of notification<sup>a</sup>, and total number of observed mealtime activities<sup>b</sup></td>
              <td>Mealtime from interviews<sup>c</sup></td>
              <td>Number of observed activities for each mealtime<sup>d</sup></td>
              <td>No. of normal activity/positive notifications<sup>e</sup></td>
              <td>No. of anomalies/negative notifications<sup>f</sup><break/>  <break/>  </td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>
                <bold>1: N/P<sup>g</sup> (n=135)</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>6:00-9:00</td>
              <td>69</td>
              <td>56</td>
              <td>13</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>11:00-13:00</td>
              <td>66</td>
              <td>63</td>
              <td>3</td>
            </tr>
            <tr valign="top">
              <td>2: N<sup>h</sup></td>
              <td>7:00-9:00</td>
              <td>51</td>
              <td>49</td>
              <td>2</td>
            </tr>
            <tr valign="top">
              <td>3: N</td>
              <td>7:00-10:00</td>
              <td>60</td>
              <td>58</td>
              <td>2</td>
            </tr>
            <tr valign="top">
              <td>
                <bold>4: N (n=144)</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>6:00-7:00</td>
              <td>56</td>
              <td>56</td>
              <td>0</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>11:00-13:00</td>
              <td>42</td>
              <td>40</td>
              <td>2</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>16:00-18:00</td>
              <td>46</td>
              <td>46</td>
              <td>0</td>
            </tr>
            <tr valign="top">
              <td>5: N</td>
              <td>5:00-8:00</td>
              <td>46</td>
              <td>46</td>
              <td>0</td>
            </tr>
            <tr valign="top">
              <td>6: N/P</td>
              <td>7:00-10:00</td>
              <td>52</td>
              <td>51</td>
              <td>1</td>
            </tr>
            <tr valign="top">
              <td>
                <bold>8: N/P (n=183)</bold>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
              <td>
                <break/>
              </td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>7:00-10:00</td>
              <td>62</td>
              <td>51</td>
              <td>11</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>10:00-13:00</td>
              <td>64</td>
              <td>60</td>
              <td>4</td>
            </tr>
            <tr valign="top">
              <td>
                <break/>
              </td>
              <td>17:00-20:00</td>
              <td>57</td>
              <td>52</td>
              <td>5</td>
            </tr>
            <tr valign="top">
              <td>9: N</td>
              <td>8:00-10:00</td>
              <td>45</td>
              <td>40</td>
              <td>5</td>
            </tr>
            <tr valign="top">
              <td>Total</td>
              <td>
                <break/>
              </td>
              <td>716</td>
              <td>668</td>
              <td>48</td>
            </tr>
          </tbody>
        </table>
        <table-wrap-foot>
          <fn id="table4fn1">
            <p><sup>a</sup>The type of meals notifications, negative and/or positive, for each apartment received based upon their requests</p>
          </fn>
          <fn id="table4fn2">
            <p><sup>b</sup>The total number of observations of each apartment’s meals activities.</p>
          </fn>
          <fn id="table4fn3">
            <p><sup>c</sup>Meal routine activities in the kitchen collected from the interview data, including a start time and end time for each.</p>
          </fn>
          <fn id="table4fn4">
            <p><sup>d</sup>Number of observed activities per apartment per meal activity, breakfast/lunch/dinner during the trial July-August 2020.</p>
          </fn>
          <fn id="table4fn5">
            <p><sup>e</sup>The number of normal activity of users during the trial (July-August 2020) and that match the regular activity patterns defined from the 2019 and first half of 2020 data.</p>
          </fn>
          <fn id="table4fn6">
            <p><sup>f</sup>The number of anomalous activity of users during the trial (July-August 2020) and that deviated from regular activity patterns defined from the 2019 and first half of 2020 data.</p>
          </fn>
          <fn id="table4fn7">
            <p><sup>g</sup>N/P: negative and positive notifications.</p>
          </fn>
          <fn id="table4fn8">
            <p><sup>h</sup>N: negative notifications.</p>
          </fn>
        </table-wrap-foot>
      </table-wrap>
      <p>For example, about 80% (56) of our observations of breakfast activity for participant 1 fall between –2 and +2 standard deviations of the mean. Fifty-six (80%) days were normal, and 13 of the 69 observed days (19%) were abnormal. Normal activity falls between the 29 and 145 minutes minimum and maximum threshold, respectively. The majority of meal notifications (119/135, 88%) were sent to participant 1 in the notification trial to confirm her expected morning and lunch meal behavior.</p>
      <p>The regular patterns derived from the historical records and the observations in the trial show that the participant’s behavior closely matches the routines they self-reported in the interviews. The participant regularly follows their breakfast and lunch activity routines, including timing. These routines are therefore reliable enough to be used for alerts.</p>
      <p>A total of 716 meal activities were observed for the 8 apartments, 668 (93%) being normal and 48 (7%) being abnormal. The participants are within the same age group. It can therefore be noted that approximately 93% of the total 716 meal activity observations for all apartments corresponded to the expected behavior.</p>
      <p>Our system sent out 421 notifications to 8 apartments. Some of the apartments expressed an interest in receiving positive and negative notifications. Three hundred seventy-three (88%) positive notifications were sent, corresponding to normal behavior during breakfast, lunch, and dinner; 48 (7%) negative notifications were sent, corresponding to anomalous behavior. More than 75% (537/715) of observed meal activities for all apartments fell within 2 standard deviations of the mean and so correspond to normal behavior. The results closely match the participant routines reported in the interviews.</p>
      <p>Feedback on the effectiveness of and user satisfaction with the system was collected. This can provide information on the actual well-being of older persons and can also help relatives to understand that monitoring systems can improve current interventions but cannot substitute the existing health care system. The feedback results from 5 apartments out of 9 are shown in <xref ref-type="table" rid="table5">Table 5</xref>. The table summarizes the non-mandatory weekly questions sent to end-users on their satisfaction with the notifications received, end-users scaling our service on a scale of 1-5. The results show a positive user experience. We received an average of 4 on a 1-5 Likert-like scale, one being poor, two fair, three good, four very good, and five excellent. The relative of the apartment 6 participant, for example, responded to the notification: “No activity in the kitchen between 05:00 and 07:59.” The feedback was: “I was in contact with my mother at 08.03, and she was in the kitchen..” Another example of feedback was from a relative of the apartment 4 participant, who responded to a change in dinner pattern. Notification: “No activity in the kitchen between 16:00 and 17:59.” Feedback: “Late dinner!” This informed our system of the pattern change and validated our anomaly recognition method. Relatives were also asked to provide weekly feedback via SMS on our system’s overall performance. Weekly notification: “Hello, How have you experienced our iVO. LTU notifications in the last week on a scale of 1-5 (5 is best)? Thank you for taking part!” The participant in apartment 6, for example, in the second week of feedback expressed his satisfaction with the accuracy of notifications. “At the same time, every day, we get a positive notification, which I think is good.” The overall experience was positive, the relatives finding it helpful to know when to contact the participants, based on their normal/abnormal activity routines. The notifications also allowed them to be informed that “all is well” with older participants, which is the overall focus of the iVO project.</p>
      <table-wrap position="float" id="table5">
        <label>Table 5</label>
        <caption>
          <p>Summary of weekly feedback from relatives of each apartment (ID) on a scale of 1-5 where 1 is poor, and 5 is excellent.</p>
        </caption>
        <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
          <col width="160"/>
          <col width="160"/>
          <col width="170"/>
          <col width="170"/>
          <col width="170"/>
          <col width="170"/>
          <thead>
            <tr valign="top">
              <td>Date</td>
              <td>H2</td>
              <td>H4</td>
              <td>H5</td>
              <td>H6</td>
              <td>H9</td>
            </tr>
          </thead>
          <tbody>
            <tr valign="top">
              <td>2020-07-08</td>
              <td>5</td>
              <td>5</td>
              <td>3</td>
              <td>No-reply</td>
              <td>No-reply</td>
            </tr>
            <tr valign="top">
              <td>2020-07-17</td>
              <td>5</td>
              <td>5</td>
              <td>No-reply</td>
              <td>No-reply</td>
              <td>No-reply</td>
            </tr>
            <tr valign="top">
              <td>2020-07-27</td>
              <td>5</td>
              <td>5</td>
              <td>3-4</td>
              <td>4</td>
              <td>No-reply</td>
            </tr>
            <tr valign="top">
              <td>2020-08-04</td>
              <td>4</td>
              <td>5</td>
              <td>No-reply</td>
              <td>4</td>
              <td>No-reply</td>
            </tr>
            <tr valign="top">
              <td>2020-08-12</td>
              <td>4</td>
              <td>5</td>
              <td>3-4</td>
              <td>4</td>
              <td>4</td>
            </tr>
            <tr valign="top">
              <td>2020-08-18</td>
              <td>5</td>
              <td>5</td>
              <td>3-4</td>
              <td>No-reply</td>
              <td>No-reply</td>
            </tr>
          </tbody>
        </table>
      </table-wrap>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Our study demonstrates, through nine cases, how a data-driven approach and longitudinal data from interviews can convert large amounts of sensor data into knowledge. Our approach can detect anomalies in ADLs and utilize notifications to alert relatives of these anomalies. An important aspect of this approach is that it can facilitate the interpretation of data from real-world smart homes and use this in real-time monitoring systems to identify activities that deviate from the normal patterns of older persons. This enhances our understanding of personalized setups and different individual daily routine preferences. The results support the use of data from off-the-shelf sensors and IoT devices (installed in real homes) and the improvement of health care services by feedback to caregivers in near real time. This further enables older persons to live independently in their homes for longer.</p>
      </sec>
      <sec>
        <title>Comparison With Prior Work</title>
        <p>We used, in our research, statistical methods to detect anomalies, an approach that has been used in other studies [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. The statistical methods we used to detect anomalous behavior in ADLs are in line with previous studies. We, however, in the interests of accurate interpretation, tested the assumptions of data normality. Konios et al [<xref ref-type="bibr" rid="ref32">32</xref>] recruited 30 volunteers aged 30 to 45 years to conduct a study of the recognition of low-level activities such as steps in preparing and drinking tea/coffee. They used the mean ±1.5 standard deviations as the threshold for classifying normal and anomalous events. Another similar study [<xref ref-type="bibr" rid="ref16">16</xref>] used low-level activities from the annotated CASAS public data set [<xref ref-type="bibr" rid="ref33">33</xref>]. The mean and ±1 standard deviation were used to classify activities as normal and abnormal behavior. The mean ±2 standard deviations were, however, used in [<xref ref-type="bibr" rid="ref13">13</xref>] to detect anomalous behavior at the 95% CI, thresholds being calculated using 2 months of history data of students’ working activity. Our method uses Chebyshev’s inequality, thresholds being based on intervals in which only 75% of the data is within 2 standard deviations, 95% being within 2 standard deviations in a normally distributed data set.</p>
        <p>Our results are distinct in that they were collected in an uncontrolled environment and used real-world data of older participants in their homes. Konios et al [<xref ref-type="bibr" rid="ref32">32</xref>], in contrast, used a lab setting; Jakkula et al [<xref ref-type="bibr" rid="ref13">13</xref>] used synthetic data and one day of real data from a lab environment to validate their approach. The work in Paudel et al[<xref ref-type="bibr" rid="ref16">16</xref>] was implemented using annotated public data sets.</p>
        <p>Our overall approach builds on earlier work [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref34">34</xref>], all being real-world implementations. The data collection process, sensor setup, the method used for pattern identification, and the behavior of older persons, however, differ. Beunk et al [<xref ref-type="bibr" rid="ref12">12</xref>] aimed to visualize sensor information, duration, and start time from log data, notifications being sent to caregivers, participants, and relatives using real-world monitored activities of 5 participants aged ≥ 65 years. Kasteren et al [<xref ref-type="bibr" rid="ref14">14</xref>] used 180 days of real-world data obtained from power usage, motion sensors, and interviews to carry out a behavioral analysis of the 3 participants. The distribution of daily activities aggregated over multiple days was visualized using radar plots. Interviews and motion sensors were used to identify residents' sleep and daily movements. Another longitudinal study [<xref ref-type="bibr" rid="ref34">34</xref>] evaluated the usage of unobtrusive technologies in detecting a change in activities and cognitive decline by statistically analyzing 200 days of data on the daytime and nighttime activities of 233 senior participants with a mean age of 83 years.</p>
        <p>Our study proposes a solution that detects anomalies in different types of activities in real-time. Our approach is validated by comparing longitudinal data collected from interviews with observed patterns collected from historical data (80-355 days of sensor data). This was processed to classify activities into normal and anomalous behavior and so allow notifications to be generated.</p>
        <sec>
          <title>The Strengths of the Used Approach</title>
          <p>Routines are defined as being designed behavioral patterns that are used to orchestrate activities. The clock, time duration, contexts, and order are also used in this [<xref ref-type="bibr" rid="ref35">35</xref>]. Data collected from participants on routines helps validate the analysis of sensor data and so contributes to the minimization of false positives [<xref ref-type="bibr" rid="ref14">14</xref>]. This also helps more reliable and personalized notifications to be delivered, which helps ensure that the needs of older persons are addressed. Adherence to regular daily routines by older persons contributes to a reduction of stress, increases feelings of safety [<xref ref-type="bibr" rid="ref36">36</xref>], and improves sleep quality [<xref ref-type="bibr" rid="ref37">37</xref>]. Our proposed approach to ADL analysis used routine data (data collected from the interviews) of older participants to identify anomalies in ADLs. This approach is similar to that used by other studies [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]. Our approach, however, differs from [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref32">32</xref>], which used annotated activity data. Our study relies on sensor labels and routines defined in the interviews.</p>
          <p>HAR activities are, as in Saguna et al [<xref ref-type="bibr" rid="ref10">10</xref>], classified as low-level activities such as walking and high-level activities such as making coffee. It is important, as mentioned in Hussain et al [<xref ref-type="bibr" rid="ref38">38</xref>], to use historical sensor data to analyze individual high-level activity behavior patterns (ie, ADLs). Obtaining the required historical data from real-world environments is, however, challenging, especially for older adults. Activity recognition with a focus on health care could also be defined as behavior recognition, this relying on historical data captured from sensors to infer ADLs as high-level activities. This type of high-level activity recognition could reduce human resource costs, allowing the detection of anomalies from the normal behavior of older persons and caregivers to be informed of this.</p>
          <p>Some studies [<xref ref-type="bibr" rid="ref15">15</xref>] collected data from a controlled environment and for nonolder participants [<xref ref-type="bibr" rid="ref13">13</xref>]. The findings from these are, however, difficult to generalize to the ADL applications of older persons. Most of the research work within HAR [<xref ref-type="bibr" rid="ref39">39</xref>] also relies on annotated public data sets generated in controlled environments or lab settings [<xref ref-type="bibr" rid="ref40">40</xref>]. Solutions based on controlled environments may not be suitable for real-world deployments. We, however, collected historical data from motion and wall plug sensors for time periods ranging from 3 months to one year and for nine real homes.</p>
          <p>Activity data can be tracked and collected from multiple sensor technologies, wearable devices often being used in activity monitoring systems to capture the data of older persons [<xref ref-type="bibr" rid="ref22">22</xref>] and to infer low-level activities such as walking or falling [<xref ref-type="bibr" rid="ref8">8</xref>]. Wearable devices, however, lack practicality, especially for older users [<xref ref-type="bibr" rid="ref38">38</xref>]. Hernandez et al [<xref ref-type="bibr" rid="ref40">40</xref>] also investigated previous HAR work between 2014 and 2019 and showed that data is primarily collected from mobile and wearable devices rather than dense-sensing networks.</p>
          <p>The deployment of dense-sensing networks in anomaly detection systems is highly recommended in the health care systems of older persons. This is due to their practicality and to their robustness to changes in the environment [<xref ref-type="bibr" rid="ref22">22</xref>]. These networks can also gather more general information, which can be used to recognize ADLs (ie, high-level activities such as leaving home or sleeping) [<xref ref-type="bibr" rid="ref8">8</xref>]. In this trial, we used the data from four motion sensors in each apartment to analyze the behavior of users, this being a similar approach to that used in Beunk et al and Kasteren et al [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref14">14</xref>].</p>
          <p>The strength of our approach lies in the handling of noise arising from off-the-shelf sensors, which are prone to malfunctioning [<xref ref-type="bibr" rid="ref41">41</xref>]. This noise is handled by building mechanisms that eliminate erroneous readings or noise from the preprocessing of sensor data. This ensures better accuracy than previous approaches [<xref ref-type="bibr" rid="ref42">42</xref>] and reduces false alerts [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
          <p>Detecting anomalies in activity patterns using time series sensor data without annotations is challenging. We, however, analyzed the behavior of older persons by developing algorithms that can build temporal features such as duration in and the number of visits to each room. Determining changes in these activities using duration time is, therefore, an important development in the analysis of behavioral patterns [<xref ref-type="bibr" rid="ref35">35</xref>]. Anomalies can therefore be detected using these temporal features. There is a need for near real-time technology in support of older persons in their activities. Examples of this include reminders to take medicine and interaction to provide immediate support in ongoing activities such as preparing a meal [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]. The data processing in real-time ADL analysis is challenging [<xref ref-type="bibr" rid="ref39">39</xref>]. Our approach, however, uses near real-time analysis in the collection, monitoring, preprocessing, and processing of sensor data for each apartment.</p>
        </sec>
        <sec>
          <title>Effectiveness of the Developed iVO System</title>
          <p>The estimated probability distribution of each activity and for each apartment is given in <xref rid="figure5" ref-type="fig">Figure 5</xref> and <xref ref-type="supplementary-material" rid="app4">Multimedia Appendix 4</xref>. The activity patterns are reflected in the mean time duration for each activity, which is drawn from historical data and is given in <xref ref-type="table" rid="table3">Table 3</xref>. There is a close correspondence between the historical patterns and the test data set patterns for morning activities (notification trial July-August 2020) for all eight participants. The historical data set shows that they use on average 44 to 47 minutes on breakfast/lunch, the trial data showing that they use 45 to 50 minutes. There are, however, some variations, such as the dinner activity of 2 apartments (4 and 8) and the lunch activity of 3 apartments (1, 4, and 9). The average duration for each participant based on the historical data and the notification trial shows routine consistency. The strength of our approach is the ability to identify the regularity in the timing and duration of the different ADLs and to from this identify deviations from this. The importance of the timing, duration, and regularity of activity routines is highlighted in Chung et al [<xref ref-type="bibr" rid="ref44">44</xref>], and changes in routines, furthermore, potentially signaling cognitive decline or a health issue. Our approach showed that most participants followed a routine in their activities in the trial period.</p>
          <p>The most suitable method for constructing thresholds must be selected, the correct handling of changes or irregularities in routines and a reduction in false alerts being dependent on correct selection [<xref ref-type="bibr" rid="ref14">14</xref>]. These methods need to be reliable if our anomaly notifications are to be effective. We, therefore, set up notification alerts for three types of anomalies: (1) not present, (2) maximum time spent exceeded, and (3) minimum time spent not reached. Our approach used the historical data used to determine statistical thresholds for anomalies (2) and (3), assumptions including data normality, homogeneity of variances, and linearity. These assumptions are important in the selection of a suitable method, their violation leading to result misinterpretation [<xref ref-type="bibr" rid="ref29">29</xref>]. Previous work has used statistical methods [<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. We, however, perform the normality test (<xref ref-type="table" rid="table2">Table 2</xref>), which allows us to determine an appropriate statistical method—Chebyshev’s theorem for classifying normal and anomalous behavior. Identifying changes using this method allowed us to consider confidence levels of 75% to be normal. This was, however, 93% for all participants and all activities.</p>
          <p>The number of activities monitored, identified, and notifications generated in the trial period also reflect the effectiveness of our system. Our system observed 716 meal activities in the trial period in 8 apartments, 668 (93%) being normal and 48 (7%) being anomalies. Our system generated 421 notifications, 373 (88%) positive notifications that correspond to normal behavior during breakfast, lunch, and dinner, and 48 (7%) negative corresponding to anomalies.</p>
        </sec>
      </sec>
      <sec>
        <title>Implications</title>
        <p>Our findings show that our system can benefit relatives and can be used by formal health care providers in Skellefteå municipality. Relatives and caregivers received timely notifications of older participants’ activities. The system was also able to distinguish between normal and anomalous behavior, which can be used to detect long-term changes in routines and which can signal the early stages of cognitive decline. We believe that this type of system can have a direct impact on the enabling of older persons to live independently for longer. Feedback collected on our system (<xref ref-type="table" rid="table5">Table 5</xref>) was mainly positive and reflects a high level of user satisfaction with the iVO service. Some participants showed an interest in continuing the service after the trial period ended.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Our approach is limited to the use of duration to identify anomalies. The root cause of the anomalies can, however, only be known via feedback from relatives. A direct method for establishing the root causes of anomalies would help us to understand anomalies better. This approach would, however, make our system too intrusive, interrupt the day-to-day lives of participants, and have an impact on their normal routines. Our preference is that relatives communicate with participants about anomalous behavior and that feedback to our system is then provided by relatives. The use of Chebyshev’s inequality is another limitation. Thresholds are based on loose intervals with only 75% within 2 standard deviations. This can be compared with a normally distributed data set where 95% is within 2 standard deviations. These loose intervals mean the thresholds are wider apart and can therefore lead to fewer anomalies.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>We developed an SMS-based notification service based on information provided in interviews on the needs of participants and their relatives, on the activities they were interested in, and on data from the off-the-shelf sensors and IoT devices installed in homes. We also conducted user evaluations. This service acts as an extension of the municipality health/social care services and helps older persons to live in their homes independently. We proposed, developed, and implemented an anomaly detection framework for the recognition of anomalous daily activities of older persons living in single resident smart homes, using the real-life uncontrolled setting of 9 older participants. This paper proposed a probabilistic approach to the temporal analysis of ADL of nine older participants in a real-world environment. The method introduces a way of indicating whether the probability of a performed activity is considered to be normal or anomalous behavior using duration.</p>
        <p>Our system observed approximately 1000 meals and bathroom activities. Notifications were also sent to 9 apartments between July and August 2020. Four hundred twenty-one notifications (59%) out of the observed meals activities (716) were sent to 8 apartments on each meal activity, with our approach considering more than 75% (537) of observed meal activities to be normal. This figure was, however, in reality, 93% of meal activities, these falling within 2 standard deviations of the mean and so corresponding to their normal behavior. The behavior patterns derived from the historical processed sensor data closely match the routines participants reported in the interviews. We received positive user experience feedback on the service from 5 out of 9 participants’ relatives (55%) and an average of 4 points on a 1-5 satisfaction scale. The results ultimately support the use of IoT devices in homes as an extension of health/social care services, which can, in turn, increase the opportunity to age in the home independently.</p>
      </sec>
      <sec>
        <title>Future Work</title>
        <p>We will, in the next phase of this project, use advanced data analytics methods to further investigate the data. We would include other types of anomaly classes in this, such as transitions or visits of unusually short durations, which can indicate unrest and the detection of an unusual presence. Other types of context sensors and features also need to be considered in the analysis. Contextual information such as weather conditions and holidays could, for example, improve results and reduce false positives in detected routines [<xref ref-type="bibr" rid="ref45">45</xref>]. Future research can furthermore test algorithms that monitor real-time ADLs using data for that specific week, which will allow for weekly variations in routines. Data based on a monthly moving window would also allow for seasonal variations in routines. We are working towards using reinforcement learning as a multi-armed bandit problem (MAB). We plan to conduct follow-up interviews for the study as part of a workshop to communicate our results and understand further needs. Direct feedback from older persons is another important aspect. This would, however, increase the cognitive load upon them. There was no appropriate communication channel for feedback on the alerts or activity updates sent to relatives by older persons, which was not implemented due to the increased burden of daily feedback on older persons. This type of feedback was mainly gathered via the relatives, who communicated with their older relatives about an anomalous notification. This will be addressed further in our future research.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Observations of participants in apartments 2-9 for different meal activities in the kitchen during the trial, July and August 2020. The redlines represent the lower and upper bounds.</p>
        <media xlink:href="aging_v5i2e28260_app1.png" xlink:title="PNG File , 2528 KB"/>
      </supplementary-material>
      <supplementary-material id="app2">
        <label>Multimedia Appendix 2</label>
        <p>Observations of participant's visits frequency and water boiler usage during breakfast in the kitchen in apartment 1 during the trial, July and August 2020.</p>
        <media xlink:href="aging_v5i2e28260_app2.png" xlink:title="PNG File , 231 KB"/>
      </supplementary-material>
      <supplementary-material id="app3">
        <label>Multimedia Appendix 3</label>
        <p>Observations of participant's visits frequency and water boiler usage during lunch in the kitchen in apartment 1 during the trial, July and August 2020.</p>
        <media xlink:href="aging_v5i2e28260_app3.png" xlink:title="PNG File , 245 KB"/>
      </supplementary-material>
      <supplementary-material id="app4">
        <label>Multimedia Appendix 4</label>
        <p>Probability distribution (PDFs) of the duration of each meal activity of each participant, apartment 2-9, during 2019 and the first half of 2020. The total number of days varies from 80 to 355 days of different apartments, including the mean (mu) and standard deviation (std) duration values of mealtimes.</p>
        <media xlink:href="aging_v5i2e28260_app4.png" xlink:title="PNG File , 410 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ADL</term>
          <def>
            <p>activity daily living</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">HAR</term>
          <def>
            <p>human activity recognition</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">IoT</term>
          <def>
            <p>internet of things</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">iVO</term>
          <def>
            <p>internet of things within health and care</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">SSiO</term>
          <def>
            <p>societal development through secure IoT and open data</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lueth</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Why the Internet of Things is called Internet of Things: Definition, history, disambiguation</article-title>
          <source>IOT ANALYTICS</source>
          <year>2014</year>
          <access-date>2021-05-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://iot-analytics.com/internet-of-things-definition/">https://iot-analytics.com/internet-of-things-definition/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tabatabaee Malazi</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Davari</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Combining emerging patterns with random forest for complex activity recognition in smart homes</article-title>
          <source>Appl Intell</source>
          <year>2017</year>
          <month>7</month>
          <day>5</day>
          <volume>48</volume>
          <issue>2</issue>
          <fpage>315</fpage>
          <lpage>330</lpage>
          <pub-id pub-id-type="doi">10.1007/s10489-017-0976-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Singla</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Schmitter-Edgecombe</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Recognizing independent and joint activities among multiple residents in smart environments</article-title>
          <source>J Ambient Intell Human Comput</source>
          <year>2009</year>
          <month>12</month>
          <day>1</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>57</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1007/s12652-009-0007-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rashidi</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Mihailidis</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A Survey on Ambient-Assisted Living Tools for Older Adults</article-title>
          <source>IEEE J. Biomed. Health Inform</source>
          <year>2013</year>
          <month>05</month>
          <volume>17</volume>
          <issue>3</issue>
          <fpage>579</fpage>
          <lpage>590</lpage>
          <pub-id pub-id-type="doi">10.1109/jbhi.2012.2234129</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Statistics</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Demographic</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>The future population of Sweden 2006-2050</article-title>
          <source>Statistics Sweden</source>
          <year>2008</year>
          <access-date>2021-06-10</access-date>
          <publisher-name>Statistics Sweden, Demographic Reports</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scb.se/en/finding-statistics/search/?Query=The+future+population+of+Sweden+2006%E2%80%932050&amp;Tab=older">https://www.scb.se/en/finding-statistics/search/?Query=The+future+population+of+Sweden+2006%E2%80%932050&amp;Tab=older</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rantz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lane</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Phillips</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Despins</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Galambos</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Alexander</surname>
              <given-names>GL</given-names>
            </name>
            <name name-style="western">
              <surname>Koopman</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hicks</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Skubic</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>SJ</given-names>
            </name>
          </person-group>
          <article-title>Enhanced registered nurse care coordination with sensor technology: Impact on length of stay and cost in aging in place housing</article-title>
          <source>Nurs Outlook</source>
          <year>2015</year>
          <volume>63</volume>
          <issue>6</issue>
          <fpage>650</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.outlook.2015.08.004"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.outlook.2015.08.004</pub-id>
          <pub-id pub-id-type="medline">26463735</pub-id>
          <pub-id pub-id-type="pii">S0029-6554(15)00267-5</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Savage</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Coronavirus: What's going wrong in Sweden's care homes?</article-title>
          <source>BBC News</source>
          <access-date>2021-06-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.bbc.com/news/world-europe-52704836">https://www.bbc.com/news/world-europe-52704836</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Krishnan</surname>
              <given-names>NC</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Activity recognition on streaming sensor data</article-title>
          <source>Pervasive and Mobile Computing</source>
          <year>2014</year>
          <month>02</month>
          <volume>10</volume>
          <fpage>138</fpage>
          <lpage>154</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2012.07.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Intille</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Activity Recognition from User-Annotated Acceleration Data</article-title>
          <source>in Pervasive Computing</source>
          <year>2004</year>
          <volume>1</volume>
          <fpage>1</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-540-24646-6_1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saguna</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zaslavsky</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chakraborty</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Complex activity recognition using context-driven activity theory and activity signatures</article-title>
          <source>ACM Trans. Comput.-Hum. Interact</source>
          <year>2013</year>
          <month>12</month>
          <volume>20</volume>
          <issue>6</issue>
          <fpage>1</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1145/2490832</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Aran</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Anomaly Detection in Elderly Daily Behavior in Ambient Sensing Environments</article-title>
          <source>HBU</source>
          <year>2016</year>
          <conf-name>Proceedings of the 7th Int. Workshop on Human Behavior Understanding, ACM Multimedia</conf-name>
          <conf-date>2016-09-19</conf-date>
          <conf-loc>Amsterdam, Netherlands</conf-loc>
          <fpage>51</fpage>
          <lpage>67</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1007/978-3-319-46843-3_4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/978-3-319-46843-3_4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beunk</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Sieverink</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Kulyk</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Visualize my data! : translating smart home sensor data into relevant feedback for elderly, informal caregivers and formal caregivers</article-title>
          <source>Center for eHealth and Wellbeing Research, University of Twente, Enschede, The Netherlands</source>
          <year>2015</year>
          <fpage>1</fpage>
          <lpage>29</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://essay.utwente.nl/68156/">http://essay.utwente.nl/68156/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jakkula</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Anomaly Detection Using Temporal Data Mining in a Smart Home Environment</article-title>
          <source>Methods Inf Med</source>
          <year>2018</year>
          <month>01</month>
          <day>19</day>
          <volume>47</volume>
          <issue>01</issue>
          <fpage>70</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.3414/me9103</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Kasteren</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Bradford</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>Q</given-names>
            </name>
            <name name-style="western">
              <surname>Karunanithi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ding</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Understanding Smart Home Sensor Data for Ageing in Place Through Everyday Household Routines: A Mixed Method Case Study</article-title>
          <source>JMIR Mhealth Uhealth</source>
          <year>2017</year>
          <month>06</month>
          <day>13</day>
          <volume>5</volume>
          <issue>6</issue>
          <fpage>e52</fpage>
          <pub-id pub-id-type="doi">10.2196/mhealth.5773</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Novak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jakab</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lain</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Anomaly Detection in User Daily Patterns in Smart-Home Environment</article-title>
          <source>Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Health Informatics (JSHI)</source>
          <year>2013</year>
          <volume>3</volume>
          <issue>6</issue>
          <fpage>1</fpage>
          <lpage>10</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paudel</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Eberle</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Holder</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Anomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach</article-title>
          <source>Int'l Conf. Data Science (ICDATA'18)</source>
          <year>2018</year>
          <conf-name>Int'l Conf. Data Science (ICDATA'18)</conf-name>
          <conf-date>July 2018</conf-date>
          <conf-loc>Las Vegas, NV, USA - United States</conf-loc>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>iVO</collab>
          </person-group>
          <article-title>Internet of Things (IoT) within health and care of elderly</article-title>
          <source>2020</source>
          <access-date>2021-05-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://skelleftea.se/digitalisering/digitalisering-i-skelleftea-kommun/arkiv/iot/2020-12-31-ett-forsta-steg-mot-stor-samhallsnytta">https://skelleftea.se/digitalisering/digitalisering-i-skelleftea-kommun/arkiv/iot/2020-12-31-ett-forsta-steg-mot-stor-samhallsnytta</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="web">
          <article-title>The Open Source platform for our smart digital future</article-title>
          <source>FIWARE</source>
          <year>2014</year>
          <access-date>2021-05-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.fiware.org/">https://www.fiware.org/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="web">
          <article-title>Societal development through Secure IoT and Open Data (SSiO) project</article-title>
          <source>SSiO</source>
          <year>2016</year>
          <access-date>2021-05-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://en.ssio.se/">https://en.ssio.se/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saguna</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Ahlund</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Larsson</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Experiences and Challenges of Providing IoT-Based Care for Elderly in Real-Life Smart Home Environments</article-title>
          <source>Springer International Publishing</source>
          <year>2020</year>
          <publisher-loc>Switzerland</publisher-loc>
          <publisher-name>Springer, Cham</publisher-name>
          <fpage>255</fpage>
          <lpage>271</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-030-43795-4_11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Voigt</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Bussche</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>The EU General Data Protection Regulation (GDPR): A Practical Guide</source>
          <year>2017</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Springer Publishing Company, Incorporated</publisher-name>
          <pub-id pub-id-type="doi">10.1007/978-3-319-57959-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Deep</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Karmakar</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Hamey</surname>
              <given-names>LGC</given-names>
            </name>
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>A Survey on Anomalous Behavior Detection for Elderly Care Using Dense-Sensing Networks</article-title>
          <source>IEEE Commun. Surv. Tutorials</source>
          <year>2020</year>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>352</fpage>
          <lpage>370</lpage>
          <pub-id pub-id-type="doi">10.1109/comst.2019.2948204</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hong</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Nugent</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mulvenna</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>McClean</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Scotney</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Devlin</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Evidential fusion of sensor data for activity recognition in smart homes</article-title>
          <source>Pervasive and Mobile Computing</source>
          <year>2009</year>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>236</fpage>
          <lpage>252</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2008.05.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gillani Fahad</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rajarajan</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Activity recognition in smart homes with self verification of assignments</article-title>
          <source>Neurocomputing</source>
          <year>2015</year>
          <volume>149</volume>
          <fpage>1286</fpage>
          <lpage>1298</lpage>
          <pub-id pub-id-type="doi">10.1016/j.neucom.2014.08.069</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <collab>Liming Chen</collab>
            <name name-style="western">
              <surname>Hoey</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Nugent</surname>
              <given-names>CD</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
            <collab>Zhiwen Yu</collab>
          </person-group>
          <article-title>Sensor-Based Activity Recognition</article-title>
          <source>IEEE Trans Syst Man Cybern C</source>
          <year>2012</year>
          <volume>42</volume>
          <issue>6</issue>
          <fpage>790</fpage>
          <lpage>808</lpage>
          <pub-id pub-id-type="doi">10.1109/tsmcc.2012.2198883</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hawkins</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Identification of Outliers</article-title>
          <source>in Monographs on Applied Probability and Statistics</source>
          <year>1980</year>
          <publisher-loc>Switzerland</publisher-loc>
          <publisher-name>Springer Nature</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Edgeworth</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>On discordant observations</article-title>
          <source>The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science</source>
          <year>2009</year>
          <month>04</month>
          <day>29</day>
          <volume>23</volume>
          <issue>143</issue>
          <fpage>364</fpage>
          <lpage>375</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/14786448708628471"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/14786448708628471</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Magnanimo</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>A Bayesian approach for task recognition and future human activity prediction</article-title>
          <year>2014</year>
          <conf-name>The 23rd IEEE International Symposium on Robot and Human Interactive Communication</conf-name>
          <conf-date>2014</conf-date>
          <conf-loc>Edinburgh, Scotland</conf-loc>
          <fpage>726</fpage>
          <lpage>731</lpage>
          <pub-id pub-id-type="doi">10.1109/roman.2014.6926339</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Statisticssolutions</collab>
          </person-group>
          <article-title>Testing of Assumptions</article-title>
          <source>2020</source>
          <access-date>2021-09-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statisticssolutions.com/free-resources/directory-of-statistical-analyses/testing-of-assumptions/">https://www.statisticssolutions.com/free-resources/directory-of-statistical-analyses/testing-of-assumptions/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Razali</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wah</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Power comparisons of Shapiro-Wilk , Kolmogorov-Smirnov , Lilliefors and Anderson-Darling tests</article-title>
          <source>journal of Statistical Modeling and Analytics</source>
          <year>2011</year>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>21</fpage>
          <lpage>33</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Amidan</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Ferryman</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Cooley</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Data outlier detection using the Chebyshev theorem</article-title>
          <source>IEEE Aerospace Conference</source>
          <year>2005</year>
          <fpage>3814</fpage>
          <lpage>3819</lpage>
          <pub-id pub-id-type="doi">10.1109/aero.2005.1559688</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Konios</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Probabilistic Analysis of Temporal and Sequential Aspects of Activities of Daily Living for Abnormal Behaviour Detection</article-title>
          <source>IEEE SmartWorld, Ubiquitous Intelligence &amp; Computing, Advanced &amp; Trusted Computing, Scalable Computing &amp; Communications, Cloud &amp; Big Data Computing, Internet of People and Smart City Innovation</source>
          <year>2019</year>
          <fpage>723</fpage>
          <lpage>730</lpage>
          <pub-id pub-id-type="doi">10.1109/smartworld/scalcom/u50871.2021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="web">
          <article-title>Welcome to CASAS</article-title>
          <source>CASAS</source>
          <year>2013</year>
          <access-date>2021-05-10</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://casas.wsu.edu/">http://casas.wsu.edu/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kaye</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Maxwell</surname>
              <given-names>SA</given-names>
            </name>
            <name name-style="western">
              <surname>Mattek</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Hayes</surname>
              <given-names>TL</given-names>
            </name>
            <name name-style="western">
              <surname>Dodge</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Pavel</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jimison</surname>
              <given-names>HB</given-names>
            </name>
            <name name-style="western">
              <surname>Wild</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Boise</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Zitzelberger</surname>
              <given-names>TA</given-names>
            </name>
          </person-group>
          <article-title>Intelligent Systems For Assessing Aging Changes: home-based, unobtrusive, and continuous assessment of aging</article-title>
          <source>J Gerontol B Psychol Sci Soc Sci</source>
          <year>2011</year>
          <month>07</month>
          <day>08</day>
          <volume>66 Suppl 1</volume>
          <issue>Supplement 1</issue>
          <fpage>i180</fpage>
          <lpage>90</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/21743050"/>
          </comment>
          <pub-id pub-id-type="doi">10.1093/geronb/gbq095</pub-id>
          <pub-id pub-id-type="medline">21743050</pub-id>
          <pub-id pub-id-type="pii">gbq095</pub-id>
          <pub-id pub-id-type="pmcid">PMC3132763</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zisberg</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Schepp</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zysberg</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A concept analysis of routine: relevance to nursing</article-title>
          <source>J Adv Nurs</source>
          <year>2007</year>
          <volume>57</volume>
          <issue>4</issue>
          <fpage>442</fpage>
          <lpage>453</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1365-2648.2007.04103.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Parvin</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Chessa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Manca</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Paterno'</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Real-Time Anomaly Detection in Elderly Behavior with the Support of Task Models</article-title>
          <year>2018</year>
          <month>06</month>
          <day>19</day>
          <conf-name>Proc. ACM Hum.-Comput. Interact</conf-name>
          <conf-date>June 2018</conf-date>
          <conf-loc>NewYork, US</conf-loc>
          <fpage>1</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1145/3229097</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zisberg</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Gur-Yaish</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Shochat</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Contribution of routine to sleep quality in community elderly</article-title>
          <source>Sleep</source>
          <year>2010</year>
          <fpage>509</fpage>
          <lpage>514</lpage>
          <pub-id pub-id-type="doi">10.1093/sleep/33.4.509</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hussain</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Sheng</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>A review and categorization of techniques on device-free human activity recognition</article-title>
          <source>Journal of Network and Computer Applications</source>
          <year>2020</year>
          <volume>167</volume>
          <fpage>102</fpage>
          <lpage>738</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jnca.2020.102738</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De-La-Hoz-Franco</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Ariza-Colpas</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Quero</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Espinilla</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Sensor-Based Datasets for Human Activity Recognition – A Systematic Review of Literature</article-title>
          <source>IEEE Access</source>
          <year>2018</year>
          <volume>6</volume>
          <fpage>59192</fpage>
          <lpage>59210</lpage>
          <pub-id pub-id-type="doi">10.1109/access.2018.2873502</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hernandez</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Lundström</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Favela</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>McChesney</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Arnrich</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Literature Review on Transfer Learning for Human Activity Recognition Using Mobile and Wearable Devices with Environmental Technology</article-title>
          <source>SN COMPUT. SCI</source>
          <year>2020</year>
          <month>02</month>
          <day>07</day>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>1</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1007/s42979-020-0070-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gaddam</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wilkin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Angelova</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gaddam</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Detecting Sensor Faults, Anomalies and Outliers in the Internet of Things: A Survey on the Challenges and Solutions</article-title>
          <source>Electronics</source>
          <year>2020</year>
          <month>03</month>
          <day>20</day>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>511</fpage>
          <lpage>511</lpage>
          <pub-id pub-id-type="doi">10.3390/electronics9030511</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laptev</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Amizadeh</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Flint</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Generic and Scalable Framework for Automated Time-series Anomaly Detection</article-title>
          <year>2015</year>
          <conf-name>Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</conf-name>
          <conf-date>2015</conf-date>
          <conf-loc>Sydney NSW Australia</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2783258.2788611</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Minor</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Forecasting occurrences of activities</article-title>
          <source>Pervasive and Mobile Computing</source>
          <year>2017</year>
          <month>07</month>
          <volume>38</volume>
          <fpage>77</fpage>
          <lpage>91</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2016.09.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chung</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Ozkaynak</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Demiris</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Examining daily activity routines of older adults using workflow</article-title>
          <source>Journal of Biomedical Informatics</source>
          <year>2017</year>
          <month>07</month>
          <volume>71</volume>
          <fpage>82</fpage>
          <lpage>90</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jbi.2017.05.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Berrocal</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Garcia-Alonso</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Murillo</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Canal</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Rich contextual information for monitoring the elderly in an early stage of cognitive impairment</article-title>
          <source>Pervasive and Mobile Computing</source>
          <year>2017</year>
          <volume>34</volume>
          <fpage>106</fpage>
          <lpage>125</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pmcj.2016.05.001</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
