IEEE Computational Intelligence Magazine - May 2021 - 52
beacons (home, office). This provided details of interactions
using the strength of the signal as described next.
Beacons: Gimbals. Beacons are low energy devices that
transmit and receive Bluetooth signals to and from other
devices. We used four Gimbal beacons per participant in our
study. Two beacons were the static Gimbal Series 21, with
one placed at the participant's home and the other placed at
the participant's workplace. The other two Series 10 beacons
are small, coin-size, mobile beacons that participants carried,
one in their key-chain or wallet, and one in their backpacks
or purses. Beacon signals were detected by the phone
through our PhoneAgent app which uses the Gimbal API
library to detect proximity. When a PhoneAgent enabled
smartphone approaches a beacon, the phone will detect a
Bluetooth signal and will record the signal strength which is
inversely proportional to the distance between the phone
and the beacon. The beacons provided information about the
location of an individual relative to their home, work, or to
other participants. This allowed us to derive features that
describe the mobility of individuals and other daily locationbased routines while hiding actual physical locations. These
features were stored by the PhoneAgent into a local server
and on Gimbal servers.
Social Media. During the recruiting process, we requested
read access to the participant's accounts on Facebook and
LinkedIn. As with all of the other data sources, we anonymized
their data but, in the case of social media, we also modified the
data so as to avoid storing raw information that may affect privacy. After data collection from social media, we applied feature
extraction techniques and stored only the anonymized features.
For the present analysis, we considered 5,075 raw features computed from participants Facebook data; most of these were
n-grams (words/phases) of posts. However, a feature selection
step was applied to select only the relevant features, as detailed
in Section V-C. These raw features corresponded to a variety of
TABLE IV Low-level sensor-derived features.
SOURCE
SUB-MODALITY
#
Wearable
Higher Order Network-Heart Rate
5*
Higher Order Network-Stress
5*
Heart Rate
28
Phone App
Beacon
Social Media
Other Physical
26
Physical Activity
19
Context
8
User State
47
Phone Usage
56
Regularity
580
Work Activities
16
Other
7
Home Activities
5
200*
*=POST PCA.
52
IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | MAY 2021
categories-1) psycholinguistic attributes [138] (that captured
language usage across keywords related to affect, cognitive attributes, perception, interpersonal focus, temporal references, biological concerns, and social and personal concerns), 2) open
vocabulary n-grams (the 5,000 most frequent uni-, bi-, and trigrams used by the participants), 3) sentiment in posts, and
4) social capital (e.g., by measuring check-ins to places, posting/
sharing updates, uploading media, changing relationship status,
and hanging out with friends).
B. Predictors
We used a total of 927 candidate features (filtered out later
with dimensionality reduction and feature selection techniques,
as detailed below) based on the sensor data from the PhoneAgent, Garmin wearable, Gimbal beacons, and social media.
We extracted additional information from two wearable generated time-series per participant: heart rate and stress measurements. We used these time series as separate components to
extract features that facilitate discriminatory prediction based
on signatures extracted using a higher order network (HON)
approach with one HON per time series. We also used the
heart rate to build an additional component for the ensemble
using a special representation for the time series. Table IV
details the number of features used per data source. For features
collected as time series we computed the daily mean, median,
mode, minimum, and maximum.
Examples of features collected from Garmin (through the
Connect API) include sleep staging (duration in light, deep, and
REM sleep) and bed time, daily step counts, daily floors
climbed, physical activity (duration of light, medium, heavy
activity), calories burned, and stress level (in range 0-100).
Examples of features collected by the PhoneAgent include
phone usage (number of screen locks and unlocks, duration of
locks and unlocks, etc.) and daily aggregations of physical activity such as mobility features (e.g., places visited, distance traveled, duration of sedentary state, driving and biking time). The
PhoneAgent also collected fine-grained data from the wearable,
e.g., heart rate, sleep, stress and steps. We computed time series
features at a daily level (which we call epoch-0) but also in
epochs within the day: early morning (12AM-9AM), day
(9AM-6PM) and evening (6PM-12AM). We used the epochs to
identify differences of behavior for the times that are associated
with sleep, work, and nightly activities.
Examples of features collected through the beacons
include various measurements of closeness of the static and
mobile beacons. These features in their raw form do not provide direct insights about the participants' activities, but in
combination with the type of beacon and the duration of the
interactions we can capture information such as the time
spent at work (total duration a participant spends at work
from the first to the last sighting of the work-beacon), the
time spent at desk (percentage of the time a participant
spends at their desk), and the number of breaks taken away
from the desk that exceed 5, 15 and 30 minutes (captured by
gaps in beacon sightings).
IEEE Computational Intelligence Magazine - May 2021
Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - May 2021
Contents
IEEE Computational Intelligence Magazine - May 2021 - Cover1
IEEE Computational Intelligence Magazine - May 2021 - Cover2
IEEE Computational Intelligence Magazine - May 2021 - Contents
IEEE Computational Intelligence Magazine - May 2021 - 2
IEEE Computational Intelligence Magazine - May 2021 - 3
IEEE Computational Intelligence Magazine - May 2021 - 4
IEEE Computational Intelligence Magazine - May 2021 - 5
IEEE Computational Intelligence Magazine - May 2021 - 6
IEEE Computational Intelligence Magazine - May 2021 - 7
IEEE Computational Intelligence Magazine - May 2021 - 8
IEEE Computational Intelligence Magazine - May 2021 - 9
IEEE Computational Intelligence Magazine - May 2021 - 10
IEEE Computational Intelligence Magazine - May 2021 - 11
IEEE Computational Intelligence Magazine - May 2021 - 12
IEEE Computational Intelligence Magazine - May 2021 - 13
IEEE Computational Intelligence Magazine - May 2021 - 14
IEEE Computational Intelligence Magazine - May 2021 - 15
IEEE Computational Intelligence Magazine - May 2021 - 16
IEEE Computational Intelligence Magazine - May 2021 - 17
IEEE Computational Intelligence Magazine - May 2021 - 18
IEEE Computational Intelligence Magazine - May 2021 - 19
IEEE Computational Intelligence Magazine - May 2021 - 20
IEEE Computational Intelligence Magazine - May 2021 - 21
IEEE Computational Intelligence Magazine - May 2021 - 22
IEEE Computational Intelligence Magazine - May 2021 - 23
IEEE Computational Intelligence Magazine - May 2021 - 24
IEEE Computational Intelligence Magazine - May 2021 - 25
IEEE Computational Intelligence Magazine - May 2021 - 26
IEEE Computational Intelligence Magazine - May 2021 - 27
IEEE Computational Intelligence Magazine - May 2021 - 28
IEEE Computational Intelligence Magazine - May 2021 - 29
IEEE Computational Intelligence Magazine - May 2021 - 30
IEEE Computational Intelligence Magazine - May 2021 - 31
IEEE Computational Intelligence Magazine - May 2021 - 32
IEEE Computational Intelligence Magazine - May 2021 - 33
IEEE Computational Intelligence Magazine - May 2021 - 34
IEEE Computational Intelligence Magazine - May 2021 - 35
IEEE Computational Intelligence Magazine - May 2021 - 36
IEEE Computational Intelligence Magazine - May 2021 - 37
IEEE Computational Intelligence Magazine - May 2021 - 38
IEEE Computational Intelligence Magazine - May 2021 - 39
IEEE Computational Intelligence Magazine - May 2021 - 40
IEEE Computational Intelligence Magazine - May 2021 - 41
IEEE Computational Intelligence Magazine - May 2021 - 42
IEEE Computational Intelligence Magazine - May 2021 - 43
IEEE Computational Intelligence Magazine - May 2021 - 44
IEEE Computational Intelligence Magazine - May 2021 - 45
IEEE Computational Intelligence Magazine - May 2021 - 46
IEEE Computational Intelligence Magazine - May 2021 - 47
IEEE Computational Intelligence Magazine - May 2021 - 48
IEEE Computational Intelligence Magazine - May 2021 - 49
IEEE Computational Intelligence Magazine - May 2021 - 50
IEEE Computational Intelligence Magazine - May 2021 - 51
IEEE Computational Intelligence Magazine - May 2021 - 52
IEEE Computational Intelligence Magazine - May 2021 - 53
IEEE Computational Intelligence Magazine - May 2021 - 54
IEEE Computational Intelligence Magazine - May 2021 - 55
IEEE Computational Intelligence Magazine - May 2021 - 56
IEEE Computational Intelligence Magazine - May 2021 - 57
IEEE Computational Intelligence Magazine - May 2021 - 58
IEEE Computational Intelligence Magazine - May 2021 - 59
IEEE Computational Intelligence Magazine - May 2021 - 60
IEEE Computational Intelligence Magazine - May 2021 - 61
IEEE Computational Intelligence Magazine - May 2021 - 62
IEEE Computational Intelligence Magazine - May 2021 - 63
IEEE Computational Intelligence Magazine - May 2021 - 64
IEEE Computational Intelligence Magazine - May 2021 - 65
IEEE Computational Intelligence Magazine - May 2021 - 66
IEEE Computational Intelligence Magazine - May 2021 - 67
IEEE Computational Intelligence Magazine - May 2021 - 68
IEEE Computational Intelligence Magazine - May 2021 - 69
IEEE Computational Intelligence Magazine - May 2021 - 70
IEEE Computational Intelligence Magazine - May 2021 - 71
IEEE Computational Intelligence Magazine - May 2021 - 72
IEEE Computational Intelligence Magazine - May 2021 - 73
IEEE Computational Intelligence Magazine - May 2021 - 74
IEEE Computational Intelligence Magazine - May 2021 - 75
IEEE Computational Intelligence Magazine - May 2021 - 76
IEEE Computational Intelligence Magazine - May 2021 - 77
IEEE Computational Intelligence Magazine - May 2021 - 78
IEEE Computational Intelligence Magazine - May 2021 - 79
IEEE Computational Intelligence Magazine - May 2021 - 80
IEEE Computational Intelligence Magazine - May 2021 - 81
IEEE Computational Intelligence Magazine - May 2021 - 82
IEEE Computational Intelligence Magazine - May 2021 - 83
IEEE Computational Intelligence Magazine - May 2021 - 84
IEEE Computational Intelligence Magazine - May 2021 - 85
IEEE Computational Intelligence Magazine - May 2021 - 86
IEEE Computational Intelligence Magazine - May 2021 - 87
IEEE Computational Intelligence Magazine - May 2021 - 88
IEEE Computational Intelligence Magazine - May 2021 - 89
IEEE Computational Intelligence Magazine - May 2021 - 90
IEEE Computational Intelligence Magazine - May 2021 - 91
IEEE Computational Intelligence Magazine - May 2021 - 92
IEEE Computational Intelligence Magazine - May 2021 - 93
IEEE Computational Intelligence Magazine - May 2021 - 94
IEEE Computational Intelligence Magazine - May 2021 - 95
IEEE Computational Intelligence Magazine - May 2021 - 96
IEEE Computational Intelligence Magazine - May 2021 - 97
IEEE Computational Intelligence Magazine - May 2021 - 98
IEEE Computational Intelligence Magazine - May 2021 - 99
IEEE Computational Intelligence Magazine - May 2021 - 100
IEEE Computational Intelligence Magazine - May 2021 - Cover3
IEEE Computational Intelligence Magazine - May 2021 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com