SlideShare a Scribd company logo
1 of 11
Download to read offline
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
DOI : 10.5121/ijist.2018.8501 1
METHODS OF COMMAND RECOGNITION USING
SINGLE-CHANNEL EEGS
Wei-Ho Tsai, Cin-Hao Ma, and Varinya Phanichraksaphong
Department of Electronic Engineering, National Taipei University of Technology,
Taiwan, ROC
ABSTRACT
This work proposes to recognize a user's commands by analysing his/her brainwaves captured with single
channel electroencephalogram (EEG). Whenever a user intends to issue one of the pre-defined
commands, the proposed system prompts him/her all the candidate commands in turn. Then, the user is
asked to be concentrated as possible as he/she can, when the desired command is shown. It is assumed
that the concentration will present a certain pattern of “Yes” in the captured EEG, as opposed to a
certain pattern of “No” when the user is relaxed. Accordingly, the task is to determine that the captured
EEG is “Yes” or not. This work compares three recognition methods, respectively, based on Gaussian
mixture models, hidden Markov models and recurrent neural network, and conducts experiments using
2400 test EEG samples recorded from 10 subjects.
KEYWORDS
Brainwave, Electroencephalogram, Hidden Markov Model, Recognition, Recurrent Neural Network
1. INTRODUCTION
Nowadays computers have so much involved with our daily lives. This development is not only
mainly caused by the rapid improvements in computing efficiency, but also by the successful
designs of human-computer interfaces. At first, computers using a keyboard as the interface to
key-in instructions were mostly used in laboratories or factories. Later on, computers using a
mouse as the operating interface spread to offices and houses. Now, tablet computers and smart
phones that use a touch screen as the operating interface make computers omnipresent. As
people tend to rely on computers more and more, it obviously becomes increasingly important
to develop more user-friendly human-computer interfaces. The demand of user friendliness has
also been a key to the development of various care technologies, such as elderly care, disabled
care, and children care, which involves people not familiar with or unable to use computers
[16].
However, the mainstream human-computer interfaces are mostly operated with hands. In cases
when hands are occupied or not available, it becomes not very convenient for people to use
these interfaces. Therefore, interfaces operated by voices, eye motions, lip motions, etc. have
been the focus of R&D. Yet, respective constraints in using these human-computer interfaces
remain. For instance, in situations when people are unable or inconvenient for them to utter a
voice, voice-operated interfaces will not be used.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
2
For computer-operating instructions originate from the brain, this research tries to measure and
analyse brain intentions, further decipher the user’s instructions to the computer, and finally
create a brain-control interface. Nevertheless, there is no denying the severe challenges in
developing a brain-control interface. Besides, equipment used to measure the brain’s intentions
may not be user-friendly or convenient to use. The purpose of this research is only to offer a
feasibility evaluation on developing such an interface, and continual improvements based on the
results in this research are expected.
Specifically, this study investigates how we can recognize a user's commands by analysing
his/her brainwaves characterized with electroencephalogram (EEG). Whenever a user intends to
issue one of the pre-defined commands, the proposed system prompts him/her all the candidate
commands in turn. Then, the user is asked to be concentrated as possible as he/she can, when
the desired command is shown. We assume that the concentration will present a certain pattern
of “Yes” in the captured EEG, as opposed to a pattern of “No” when the user is relaxed.
Accordingly, the task is to determine that the captured EEG is “Yes” or not.
In fact, there have been several studies discussing such kind of binary EEG classification
problems. In the works [1-4], they investigate what the differences of the EEG signals are when
human attempts to discriminate between target and non-target images. In the works [5,6], they
propose using EEG to control the direction of an electric wheelchair. The studies [7,8]
investigate how to extract EEG features for mental fatigue classification. The work [9] proposes
a computer interface to combine gaze tracking with brainwave signals in an integrated head-
mounted device. Nevertheless, all of the above-mentioned studies use 32, 64, or more EEG
channels in building their systems, which involve inconvenient and uncomfortable head-
recording nets as well as expensive equipment, therefore unsuitable for real human-machine-
interfaced applications. Recognizing this problem, this study, extending from our previous work
[10], proposes using a simple, portable, and cheap instrument that extracts a single-channel
EEG from the user’s frontal lobe. The underlying beta waves of EEG are then distilled and used
as the feature to determine the user’s command. We compare three recognition methods,
respectively, based on Gaussian mixture models, hidden Markov models and recurrent neural
network.
The rest of this paper is organized as follows. Sec. 2 describes the concept of brainwave and
EEG. Sec. 3 presents the methodology of the proposed EEG-based command recognition
system. In Sec. 4, our experiment results are discussed. Then, Sec. 5 presents our conclusions
and the direction of future work.
2. BRAINWAVE AND ELECTROENCEPHALOGRAPHY
Brainwaves can generally be divided into five categories. 1) Delta wave, with frequency ranging
from 0.5 to 4 Hz, appears mainly during deep and dreamless sleep and represents a completely
unconscious state. 2) Theta wave, with frequency ranging from 4 to 8 Hz, appears mainly during
light sleep or extreme relaxation and represents a subconscious state. 3) Alpha wave, with
frequency ranging from 8 to 13 Hz, appears mainly during just awakening naturally from sleep
or relaxed and represents a state of between consciousness and sub-consciousness. 4) Beta
wave, with frequency ranging from 13 to 28 Hz, appears during wide awakening, especially in
thinking and studying and represents a completely conscious state. 5) Gamma wave, with
frequency ranging from 28 to 50 Hz, may appear during the formation of ideas, language and
memory processing, and various types of learning.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
3
A method for recording the electrical activity of the human brain from the surface of the head is
called Electroencephalogram (EEG). Through the use of EEG, research has found the
relationship between the areas of cerebral cortex and the functions for controlling every part of a
human body. For example, frontal lobe is related to planning, reasoning, movement, emotions,
and parts of speech. Parietal lobe is related to recognition, orientation, and perception of stimuli.
Occipital lobe is related to visual processing. Temporal lobe is related to perception and
recognition of auditory stimuli.
To ensure EEG studies could be compared to each other, the International Federation of
Societies for Electroencephalography and Clinical Neurophysiology developed an
internationally recognized method, called the 10–20 system of electrode placement [11], which
standardizes the location of scalp electrodes at specific intervals along the head in the context of
an EEG experiment. As shown in Figure 1, each electrode site is given a letter to identify the
lobe, along with a number to identify the hemispheric location. Specifically, "F" stands for
Frontal lobe, "T" stands for Temporal lobe, "C" stands for Central lobe, "P" stands for Parietal
lobe, and "O" stands for Occipital lobe.
Nowadays, a number of EEG equipment follows the 10-20 system of electrode placement.
However, most of them involve inconvenient and uncomfortable head-recording nets as well as
heavy cost; hence, they are unsuitable for real human-machine-interfaced applications. To deal
with this problem, we seek to develop our brain-control interface by using a simple, portable,
and cheap instrument.
Figure 1. The 10–20 system of electrode placement (redrawn from [11]).
3. METHODOLOGY
The proposed framework for EEG-based command recognition is shown in Figure 2. Whenever
a user intends to issue one of the pre-defined commands, the proposed system prompts him/her
all the candidate commands in turn. Then, the user is asked to be concentrated as possible as
he/she can, when the desired command is shown. It is assumed that the concentration will
present a certain pattern of “Yes” in the captured EEG, as opposed to a certain pattern of “No”
when the user is relaxed.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
4
Filtering
Recognition
EEG
Feature
Yes or No
Figure. 2. The proposed command recognition system.
3.1. EEG Measurement
We use Mindband produced by NeuroSky Inc. to extract single-channel EEGs from a user’s
frontal lobe (Fp1 or Fp2). MindBand is a headband device that senses electrical activity via a
dry-electrode. As mentioned earlier, frontal lobe is related to planning, reasoning, movement,
emotions, and parts of speech; hence, EEGs extracted from frontal lobe should be able to reflect
a user's command. In addition, considering beta wave is related to thinking and active
concentration, we propose using beta wave extracted from the frontal lobe for command
recognition.
The electrode of Mindband headband device is placed on the forehead to capture the
brainwave appearing in the area of frontal lobe. The captured signals are then transmitted to a
computer via Bluetooth. Because brainwaves captured from the surface of the head are tiny,
MindBand performs amplification and filtering. After that, signals are quantized with 12-bit
resolution. In addition, the power spectral density of the signal is then computed for every 0.125
sec with frequency resolution of 0.25Hz. Figure 3 shows an example of the captured beta wave
represented by the power spectral density of the EEG. We can see from Figure 3 that beta wave
in lower frequencies is somewhat different from that in higher frequencies. Hence, in general,
beta wave can be further divided into two bands, 13-20Hz and 21-28Hz, respectively, denoted
by β1 and β2 hereafter.
3.2. Strategy of the Command Recognition
The recognition modular operates in two phases, training and testing. The training phase begins
with EEG data collection, which acquires a large amount of EEG data labelled with "Yes" or
"No". As our preliminary investigation found that the EEG pattern is diverse across different
people significantly, we focus only on developing a user-dependent system, i.e., the system is
trained using the pre-recorded EEG data of an individual user, and works exclusively for the
user.
In the EEG training data acquisition, subjects are asked to stare the screen from which
commands are prompted at random. Before that, each subject needs to choose a command in
mind. If the prompted command is what the subject chose, then he/she should be concentrated
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
5
as possible as he/she can, in order to show his/her intention. On the contrary, if the prompted
command is not what the subject chose, then he/she should keep relaxed. The EEG recordings
are then labelled with "Yes" or "No" for every 0.5 second.
10
15
20
25
30
0
2
4
6
0
5
10
15
20
Frequency (Hz)Time (s)
Power
Figure. 3. An example of the captured beta wave represented by the power spectral density of the EEG.
As mentioned earlier, beta wave is related to thinking and active concentration. Hence, an
intuitive approach for determining a user’s command is based on the average power of the beta
wave, similar to some work [12,13] using the NeuroSky's EEG device. However, our
experiments found that because brainwave patterns change with time, using the average power
of the beta wave for command recognition is far from stable. To deal with this problem, we
propose using Gaussian mixture models, hidden Markov models or recurrent neural network to
capture the dynamic information of the EEG signals.
2.3. Command Recognition Based on Gaussian Mixture Models (GMMs)
Gaussian Mixture Models (GMMs) are known to provide good approximations of arbitrarily
shaped densities of a spectrum over a long span of time [14]. The parameters of a GMM,
composed of means, covariances, and mixture weights, can be estimated using k-means
initialization and Expectation-Maximization (EM) [15]. We create two GMMs, Y and N,
where the former stands for "Yes" EEG pattern, and the letter stands for "No" EEG pattern.
Let O = {O1, O2,..., OT} be the T-length betawave feature represented by the power spectral
density of the testing EEG. The system computes the two probabilities Pr(O|Y) and Pr(O|N),
e.g.,
= =
=
T
t
K
k
kk
t
k
Ow
1 1
)(
Y
)(
Y
)(
YY ),;()|Pr( CμO N , (1)
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
6
( ) ( ) ,exp
||
1
),;( )(
Y
1)(
Y
)(
Y)(
Y
)(
Y
)(
Y





 −

−−=
− k
t
kk
tkN
kk
t OOO μCμ
C
Cμ

N (2)
where K is the number of mixture Gaussian components; )(
Y
)(
Y
)(
Y and,, kkk
w Cμ are the k-th mixture
weight, mean, and covariance of model Y, respectively; and prime () denotes the vector
transpose. Then, a prompted command is determined as either "Yes" or "No" based on
,
No
Yes
)λ|Pr(ln)λ|Pr(ln NY 

− OO (3)
where  is a pre-set threshold. When considering low beta (β1) and high beta (β2) EEGs as two
separate features, we can create four GMMs and modify Eq. (3) by
    ,
No
Yes
)λ|Pr(ln-)λ|Pr(ln)1()λ|Pr(ln-)λ|Pr(ln 2211 N,Y,N,Y, 

−+ OOOO aa
(4)
where subscripts β1 and β2 denote the GMMs trained using β1 and β2 features, respectively, and
a is a weighting factor.
2.4. Command Recognition Based on Hidden Markov Models (HMMs)
An HMM consisting of N states is completely characterized by the parameters,  = {A, B, },
where A = [aij]NN is the probability transition matrix, representing the probability of occurring a
transition from state i to state j; B = [bj(Ot)]N1 is the output probability matrix, representing the
probability of observing feature Ot at time t given that the model is in state j;  = [i]N1 is the
initial state probability vector, representing the probability that state i is the initial state. HMM
here functions as a random generator of the EEG signals. Basically, we create two HMMs, Y
and N, where the former stands for "Yes", and the letter stands for "No". However, to consider
low beta (β1) and high beta (β2) EEGs as two separate features, we can create four HMMs in
analogy to the procedure of the GMM-based command recognition in Sec. 3.3. During
recognition, Eq. (4) is also applied to determine the prompted command as either "Yes" or "No".
2.5. Command Recognition Based on Recurrent Neural Network
The structure of our RNN is shown in Figure. 4. It consists of three layers of neurons, namely,
input layer, which receives the beta wave feature stream, hidden layer, which models the
dynamic structure and output layer, which provides the hypothesis of the user's command
recognized.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
7
Given a stream of K-dimension beta wave feature vectors x[n] = [ x1[n], x2[n], xK[n] ], which is
the power spectral density of the EEG, the activation function of hidden neuron j at frame time n
is defined as
,]1[][exp1][
1
11
−
== 

















−+−+= 
J
i
iij
K
k
kkjj nhrnxwnh  (5)
where J is the number of neurons in the hidden layer, wkj is the feed-forward connection strength
from input neuron k to hidden neuron j, rij is the recurrent connection strength from the delayed
hidden neuron i to hidden neuron j, and  is a tunable parameter. The activation function of the
output neuron at time n is defined as
,][exp1][
1
1
−
= 























−+= 
J
j
jj nhWny   (6)
where Wj is the feed-forward connection strength from hidden neuron j to output neuron ,
and = 1 or 2. The strengths wkj, rij, and Wj , can be estimated using a back-propagation
learning algorithm based on gradient descent minimization such that y1[n] > y2[n] in an average
sense over time n, when x[n] belongs to “Yes”, and y1[n] < y2[n] when x[n] belongs to “No”.
1
2
k
K
1
J
1
2
1
J
Delay
Input Layer Hidden Layer
Output Layer
2
j
2
i
Wjl , l =1 or 2
wkj
rij
Beta Wave
Feature Vectors Yes/NoDecision
Figure. 4. Structure of our RNN.
In the testing phase, the RNN takes as input the beta wave feature vectors, and produces as
output the decision on "Yes" or "No" using
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
8
,
No
Yes
][][
1
2
1
1 


 ==
−
L
n
L
n
nyny (7)
Furthermore, we create two RNNs, one taking care of the high beta wav EEG and the other
taking care of the low beta EEG. The two RNNs are then combined using a weighting strategy.
Specifically, a test EEG signal is hypothesized as either "Yes" or "No" using
,
No
Yes
][][)1(][][
1
2
2
1
2
1
1
1
2
1
1
1 







−−+





−  ====
L
n
L
n
L
n
L
n
nynybnynyb
(8)
where ][and][ 21
nyny  , = 1 and 2, are the outputs of the β1-trained RNN and β2-trained
RNN, respectively,  is a pre-defined threshold, and b is a weighting factor.
4. EXPERIMENTS
4.1 Databases
Our EEG data was collected from ten male subjects. Each subject was invited to undergo the
EEG measurements on 6 discontinuous days, in which the data collected on the former three
days were used for training, and the data collected on the latter three days were used for testing.
In the testing set, we segmented the EEG recordings into 2400 test samples. Each sample is
associated with a ground-truth of "Yes" or "No" when a subject saw a set of ten commands
prompted on the screen. Thus, there are 240 "Yes" test samples and 2160 "No" test samples.
4.2 Experiment Results
Table 1 shows the results of the GMM-based command recognition, i.e., using Eq. (4), in which
the accuracy is defined as
100%.
SamplesTesting#
SamplesrecognizedCorrectly#

Note that a = 1.0 in Eq. (4) represents using β1-trained GMMs solely, and a = 0.0 represents
using β2-trained GMMs solely. It can be seen from Table 1 that the best performance (in
boldface letter) of the β2-trained GMMs is slightly better than that of the β1-trained GMMs.
When combining β1-trained and β2-trained GMMs, i.e., a = 0.35, the performance can be further
improved.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
9
Table 1. Accuracy (%) of the GMM-based command recognition, i.e., using Eq. (4).
No. of Mixtures
β1-trained GMMs
(a = 1.0)
β2-trained GMMs
(a = 0.0) a = 0.35
8 59.0 59.9 -
16 60.2 60.8 -
32 62.9 63.4 64.6
64 61.9 61.2 -
Table 2 shows the results of the HMM-based command recognition. Compared to
Table 1, we can see that HMM-based recognizer is better than GMM-based recognizer in this
case. When combining β1-trained and β2-trained HMMs, i.e., a = 0.4, the best recognition
accuracy is 78.8%. On the other hand, Table 3 shows the results of the RNN-based command
recognition, i.e., using Eq. (8). We can see from Tables 2 and 3 that RNN-based recognizer is
slightly better than HMM-based recognizer, which achieves the best accuracy of 79.2%.
Table 2. Accuracy (%) of the HMM-based command recognition.
No. of States
β1-trained HMMs
(a = 1.0)
β2-trained HMMs
(a = 0.0) a = 0.4
2 70.4 68.8 -
3 73.3 73.8 -
4 73.3 74.6 78.8
5 72.9 74.2 -
Table 3. Accuracy (%) of the RNN-based command recognition, i.e., using Eq. (8).
No. of Neurons in the Hidden
Layer
β1-trained RNN
(b = 1.0)
β2-trained RNN
(b = 0.0) b = 0.6
10 72.9 72.5 -
11 72.1 72.9 -
12 72.5 73.3 -
13 74.2 74.6 -
14 73.8 74.2 -
15 73.8 75.4 79.2
16 73.3 75.0 -
17 72.9 73.8 -
18 72.9 74.2 -
19 72.5 72.9 -
20 71.3 71.7 -
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
10
5. CONCLUSIONS
This study has investigated the problem of recognizing users' commands by analysing their
EEGs. In contrast to the existing studies, which rely on expensive equipment, the proposed
system is rather advantageous to develop mobile-based applications, because we use a simple,
portable, and cheap instrument to acquire single-channel EEGs.
Although the recognition accuracy obtained with our system leaves much room to improve, we
believe that such a pilot investigation has laid a good foundation for the future development of a
brain-control interface using single-channel EEGs. To be more feasible, we have to further
improve the recognition accuracy. Considering that the beta wave features acquired from Mind-
band may not be sufficient to determine a user's command, we will study other features
extracted from EEG in the future. Furthermore, we will extend the current recognition system
from a user-dependent mode to a user-independent mode, so that the system can be built
without using EEG training data from each user.
ACKNOWLEDGEMENTS
This work was supported in part by the National Science Council under Grants NSC101-2221-
E-027-128-MY2 and MOST106-2221-E-027-125-MY2.
REFERENCES
[1] L. C. Parra, C. Alvino, A. Tang, B. Pearlmutter, N. Young, A. Osman, and P. Sajda, “Linear
spatial integration for single-trial detection in encephalography,” Neuroimage, vol. 17, pp. 223-
230, 2002.
[2] L. C. Parra, C. D. Spence, A. D. Gerson, and P. Sajda, “Recipes for the Linear Analysis of EEG,”
Neuroimage, vol. 28, no. 2, pp. 342-353, 2005.
[3] M. G. Philiastides and P. Sajda, “Temporal characterization of the neural correlates of perceptual
decision making in the human brain,” Cerebral Cortex, vol. 16, pp. 509-518, 2006.
[4] M. G. Philiastides, R. Ratcliff, and P. Sajda, “Neural representation of task difficulty and decision
making during perceptual categorization: a timing diagram,” Journal of Neuroscience, vol. 26, pp.
8965-8975, 2006.
[5] K. Tanaka, K. Matsunaga, and H. O. Wang, "Electroencephalogram-based control of an electric
wheelchair," IEEE Transactions on Robotics, vol. 21, no. 4, pp. 762-766, August 2005.
[6] B. Rebsamen, C. L. Teo, Q. Zeng, and H. Marcelo, E. Burdet, C. Guan, H. Zhang, and C. Laugier,
"Controlling a wheelchair indoors using thought," IEEE Intelligent Systems, vol. 22, no. 2, pp. 18-
24, 2007.
[7] K. Q. Shen, C. J. Ong, X. P. Li, Z. Hui, and P. V. Einar, "A feature selection method for multilevel
mental fatigue EEG classification," IEEE Transactions on Biomedical Engineering, vol. 54, no. 7,
pp. 1231-1237, July 2007.
[8] C. Zhao, C. Zheng, M. Zhao1, J. Liu, and Y. Tu, "Automatic classification of driving mental
fatigue with EEG by wavelet packet energy and KPCA-SVM," International Journal of Innovative
Computing, Information and Control, vol. 7, no. 3, pp. 1157-1168, 2011.
[9] J. W. Bang, E. C. Lee, and K. R. Park, "New computer interface combining gaze tracking and
brainwave measurements," IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1646-
1651, November 2011.
[10] W. H. Tsai and W. B. Jheng, "Command Recognition Based on Single-Channel
Electroencephalography," Journal of Information Science and Engineering, vol. 32, no. 1, pp. 229-
241, 2016.
International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018
11
[11] F. Sharbrough, G. E. Chatrian, R. P. Lesser, H. Luders, M. Nuwer, and T. W. Picton "American
electroencephalographic society guidelines for standard electrode position nomenclature," Journal
of Clinical Neurophysiology, vol. 8, pp. 200-202, 1991.
[12] Y. Yasui, "A brainwave signal measurement and data processing technique for daily life
applications," Journal of Physiological Anthropology, vol. 28, no. 3, pp. 145-150, 2009.
[13] G. Rebolledo-Mendez, S. Freitas, J. R. Rojano-Caceres, A. R. Garcia-Gaona1, "An empirical
examination of the relation between attention and motivation in computer-based education: a
modelling approach," in Proceedings of the Twenty-Third International Florida Artificial
Intelligence Research Society Conference, 2010.
[14] L. R. Rabiner. “A tutorial on Hidden Markov Models and selected applications in speech
recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989.
[15] A. Dempster, N. Laird, and D. Rubin, “Maximum likelihood from incomplete data via the EM
algorithm,” J. R. Statist. Soc., vol. 39, pp. 1–38, 1977.
[16] A. M. Ouksel, "Big data: Some research challenges in future information systems," International
Journal on Information Systems and Technologies (IJIST), vol. 1, no. 1, 2013.
Authors
Wei-Ho Tsai received his M.S. and Ph.D. degrees in Communication Engineering
from National Chiao-Tung University, Hsinchu, Taiwan, in 1997 and 2001,
respectively. He is currently a Professor in the Department of Electronic Engineering
& Graduate Institute of Computer and Communication Engineering, National Taipei
University of Technology, Taiwan. His research interests include spoken language
processing and music information retrieval. Dr. Tsai is a life member of ACLCLP and
a member of IEEE.
Cin-Hao Ma received the B.S. degree in electronic engineering from National Taipei
University of Technology, Taipei, Taiwan, in 2012. He is pursuing the Ph.D. degree
in computer and communication engineering at National Taipei University of
Technology currently. His research interests include signal processing and
multimedia applications
Varinya Phanichraksaphong received her B.S. degrees in Electronic Engineering
from King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand. She
is currently pursuing her M.S. degrees in the Department of Electrical Engineering
and Computer Science (EECS) National Taipei University of Technology, Taipei,
Taiwan. Her research interests include musical instruments sound analysis and
computer music processing

More Related Content

What's hot

Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface basedMohammed Saeed
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Wbi real time synthesiser
Wbi real time synthesiserWbi real time synthesiser
Wbi real time synthesiserPriyanka Yadav
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Wavelet Based Feature Extraction Scheme Of Eeg Waveform
Wavelet Based Feature Extraction Scheme Of Eeg WaveformWavelet Based Feature Extraction Scheme Of Eeg Waveform
Wavelet Based Feature Extraction Scheme Of Eeg Waveformshan pri
 
Analysis of eeg for motor imagery
Analysis of eeg for motor imageryAnalysis of eeg for motor imagery
Analysis of eeg for motor imageryijbesjournal
 
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)Jacob Stotler
 
Brain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headsetBrain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headsetTELKOMNIKA JOURNAL
 
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA MergerPerformance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA MergerCSCJournals
 
Brain Computer Interface for User Recognition And Smart Home Control
Brain Computer Interface for User Recognition And Smart Home ControlBrain Computer Interface for User Recognition And Smart Home Control
Brain Computer Interface for User Recognition And Smart Home ControlIJTET Journal
 
15 Trends In Neurotechnologies That Will Change The World
15 Trends In Neurotechnologies That Will Change The World15 Trends In Neurotechnologies That Will Change The World
15 Trends In Neurotechnologies That Will Change The WorldNikita Lukianets
 
Let’s master the digital toolkit to harness lifelong neuroplasticity
Let’s master the digital toolkit to harness lifelong neuroplasticityLet’s master the digital toolkit to harness lifelong neuroplasticity
Let’s master the digital toolkit to harness lifelong neuroplasticitySharpBrains
 
Denoising of EEG Signals for Analysis of Brain Disorders: A Review
Denoising of EEG Signals for Analysis of Brain Disorders: A ReviewDenoising of EEG Signals for Analysis of Brain Disorders: A Review
Denoising of EEG Signals for Analysis of Brain Disorders: A ReviewIRJET Journal
 

What's hot (18)

Brain computer interface based
Brain computer interface basedBrain computer interface based
Brain computer interface based
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A0510107
A0510107A0510107
A0510107
 
Wbi real time synthesiser
Wbi real time synthesiserWbi real time synthesiser
Wbi real time synthesiser
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Wavelet Based Feature Extraction Scheme Of Eeg Waveform
Wavelet Based Feature Extraction Scheme Of Eeg WaveformWavelet Based Feature Extraction Scheme Of Eeg Waveform
Wavelet Based Feature Extraction Scheme Of Eeg Waveform
 
Hs2014 bci mi
Hs2014 bci miHs2014 bci mi
Hs2014 bci mi
 
F1102024349
F1102024349F1102024349
F1102024349
 
Analysis of eeg for motor imagery
Analysis of eeg for motor imageryAnalysis of eeg for motor imagery
Analysis of eeg for motor imagery
 
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)
Teaching Techniques: Neurotechnologies the way of the future (Stotler, 2019)
 
Brain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headsetBrain computer interface based smart keyboard using neurosky mindwave headset
Brain computer interface based smart keyboard using neurosky mindwave headset
 
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA MergerPerformance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger
Performance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger
 
Brain finger printing
Brain finger printingBrain finger printing
Brain finger printing
 
Brain Computer Interface for User Recognition And Smart Home Control
Brain Computer Interface for User Recognition And Smart Home ControlBrain Computer Interface for User Recognition And Smart Home Control
Brain Computer Interface for User Recognition And Smart Home Control
 
15 Trends In Neurotechnologies That Will Change The World
15 Trends In Neurotechnologies That Will Change The World15 Trends In Neurotechnologies That Will Change The World
15 Trends In Neurotechnologies That Will Change The World
 
Let’s master the digital toolkit to harness lifelong neuroplasticity
Let’s master the digital toolkit to harness lifelong neuroplasticityLet’s master the digital toolkit to harness lifelong neuroplasticity
Let’s master the digital toolkit to harness lifelong neuroplasticity
 
Denoising of EEG Signals for Analysis of Brain Disorders: A Review
Denoising of EEG Signals for Analysis of Brain Disorders: A ReviewDenoising of EEG Signals for Analysis of Brain Disorders: A Review
Denoising of EEG Signals for Analysis of Brain Disorders: A Review
 
Lj2519711975
Lj2519711975Lj2519711975
Lj2519711975
 

Similar to METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS

METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSijistjournal
 
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSijistjournal
 
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSijistjournal
 
Analysis of EEG data Using ICA and Algorithm Development for Energy Comparison
Analysis of EEG data Using ICA and Algorithm Development for Energy ComparisonAnalysis of EEG data Using ICA and Algorithm Development for Energy Comparison
Analysis of EEG data Using ICA and Algorithm Development for Energy Comparisonijsrd.com
 
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...hiij
 
Study and analysis of motion artifacts for ambulatory electroencephalography
Study and analysis of motion artifacts for ambulatory  electroencephalographyStudy and analysis of motion artifacts for ambulatory  electroencephalography
Study and analysis of motion artifacts for ambulatory electroencephalographyIJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel ChairModelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel ChairIJTET Journal
 
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIER
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIEREEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIER
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIERhiij
 
Prediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGPrediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGIRJET Journal
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interfacerahulnale175
 
EEG Signal Classification using Deep Neural Network
EEG Signal Classification using Deep Neural NetworkEEG Signal Classification using Deep Neural Network
EEG Signal Classification using Deep Neural NetworkIRJET Journal
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger PrintingGarima Singh
 
System Architecture for Brain-Computer Interface based on Machine Learning an...
System Architecture for Brain-Computer Interface based on Machine Learning an...System Architecture for Brain-Computer Interface based on Machine Learning an...
System Architecture for Brain-Computer Interface based on Machine Learning an...ShahanawajAhamad1
 
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...IRJET Journal
 
Review:Wavelet transform based electroencephalogram methods
Review:Wavelet transform based electroencephalogram methodsReview:Wavelet transform based electroencephalogram methods
Review:Wavelet transform based electroencephalogram methodsijtsrd
 
K-NN Classification of Brain Dominance
K-NN Classification of Brain Dominance  K-NN Classification of Brain Dominance
K-NN Classification of Brain Dominance IJECEIAES
 
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...IRJET Journal
 

Similar to METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS (20)

METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
 
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
 
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGSMETHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS
 
Analysis of EEG data Using ICA and Algorithm Development for Energy Comparison
Analysis of EEG data Using ICA and Algorithm Development for Energy ComparisonAnalysis of EEG data Using ICA and Algorithm Development for Energy Comparison
Analysis of EEG data Using ICA and Algorithm Development for Energy Comparison
 
Ab044195198
Ab044195198Ab044195198
Ab044195198
 
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
MHEALTH APPLICATIONS DEVELOPED BY THE MINISTRY OF HEALTH FOR PUBLIC USERS INK...
 
Study and analysis of motion artifacts for ambulatory electroencephalography
Study and analysis of motion artifacts for ambulatory  electroencephalographyStudy and analysis of motion artifacts for ambulatory  electroencephalography
Study and analysis of motion artifacts for ambulatory electroencephalography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel ChairModelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
Modelling and Analysis of EEG Signals Based on Real Time Control for Wheel Chair
 
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIER
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIEREEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIER
EEG SIGNAL CLASSIFICATION USING LDA AND MLP CLASSIFIER
 
Prediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEGPrediction Model for Emotion Recognition Using EEG
Prediction Model for Emotion Recognition Using EEG
 
Brain computer interface
Brain computer interfaceBrain computer interface
Brain computer interface
 
EEG Signal Classification using Deep Neural Network
EEG Signal Classification using Deep Neural NetworkEEG Signal Classification using Deep Neural Network
EEG Signal Classification using Deep Neural Network
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 
Lj2519711975
Lj2519711975Lj2519711975
Lj2519711975
 
System Architecture for Brain-Computer Interface based on Machine Learning an...
System Architecture for Brain-Computer Interface based on Machine Learning an...System Architecture for Brain-Computer Interface based on Machine Learning an...
System Architecture for Brain-Computer Interface based on Machine Learning an...
 
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...
IRJET- An Efficient Approach for Removal of Ocular Artifacts in EEG-Brain Com...
 
Review:Wavelet transform based electroencephalogram methods
Review:Wavelet transform based electroencephalogram methodsReview:Wavelet transform based electroencephalogram methods
Review:Wavelet transform based electroencephalogram methods
 
K-NN Classification of Brain Dominance
K-NN Classification of Brain Dominance  K-NN Classification of Brain Dominance
K-NN Classification of Brain Dominance
 
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...
IRJET- Deep Neural Network for the Automated Detection and Diagnosis of Seizu...
 

More from ijistjournal

A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDYijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...ijistjournal
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...ijistjournal
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSijistjournal
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...ijistjournal
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMijistjournal
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...ijistjournal
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...ijistjournal
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)ijistjournal
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...ijistjournal
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithmijistjournal
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...ijistjournal
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...ijistjournal
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKijistjournal
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...ijistjournal
 

More from ijistjournal (20)

A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDYDECEPTION AND RACISM IN THE TUSKEGEE  SYPHILIS STUDY
DECEPTION AND RACISM IN THE TUSKEGEE SYPHILIS STUDY
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...Call for Papers - International Journal of Information Sciences and Technique...
Call for Papers - International Journal of Information Sciences and Technique...
 
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...Online Paper Submission - 4th International Conference on NLP & Data Mining (...
Online Paper Submission - 4th International Conference on NLP & Data Mining (...
 
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWSTOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
TOWARDS AUTOMATIC DETECTION OF SENTIMENTS IN CUSTOMER REVIEWS
 
Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...Research Articles Submission - International Journal of Information Sciences ...
Research Articles Submission - International Journal of Information Sciences ...
 
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHMANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
ANALYSIS OF IMAGE WATERMARKING USING LEAST SIGNIFICANT BIT ALGORITHM
 
Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...Call for Research Articles - 6th International Conference on Machine Learning...
Call for Research Articles - 6th International Conference on Machine Learning...
 
Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...Online Paper Submission - International Journal of Information Sciences and T...
Online Paper Submission - International Journal of Information Sciences and T...
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...Call for Research Articles - 5th International conference on Advanced Natural...
Call for Research Articles - 5th International conference on Advanced Natural...
 
International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)International Journal of Information Sciences and Techniques (IJIST)
International Journal of Information Sciences and Techniques (IJIST)
 
Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...Research Article Submission - International Journal of Information Sciences a...
Research Article Submission - International Journal of Information Sciences a...
 
Design and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression AlgorithmDesign and Implementation of LZW Data Compression Algorithm
Design and Implementation of LZW Data Compression Algorithm
 
Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...Online Paper Submission - 5th International Conference on Soft Computing, Art...
Online Paper Submission - 5th International Conference on Soft Computing, Art...
 
Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...Submit Your Research Articles - International Journal of Information Sciences...
Submit Your Research Articles - International Journal of Information Sciences...
 
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTKPUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
PUNJABI SPEECH SYNTHESIS SYSTEM USING HTK
 
Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...Call for Papers - 13th International Conference on Cloud Computing: Services ...
Call for Papers - 13th International Conference on Cloud Computing: Services ...
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS

  • 1. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 DOI : 10.5121/ijist.2018.8501 1 METHODS OF COMMAND RECOGNITION USING SINGLE-CHANNEL EEGS Wei-Ho Tsai, Cin-Hao Ma, and Varinya Phanichraksaphong Department of Electronic Engineering, National Taipei University of Technology, Taiwan, ROC ABSTRACT This work proposes to recognize a user's commands by analysing his/her brainwaves captured with single channel electroencephalogram (EEG). Whenever a user intends to issue one of the pre-defined commands, the proposed system prompts him/her all the candidate commands in turn. Then, the user is asked to be concentrated as possible as he/she can, when the desired command is shown. It is assumed that the concentration will present a certain pattern of “Yes” in the captured EEG, as opposed to a certain pattern of “No” when the user is relaxed. Accordingly, the task is to determine that the captured EEG is “Yes” or not. This work compares three recognition methods, respectively, based on Gaussian mixture models, hidden Markov models and recurrent neural network, and conducts experiments using 2400 test EEG samples recorded from 10 subjects. KEYWORDS Brainwave, Electroencephalogram, Hidden Markov Model, Recognition, Recurrent Neural Network 1. INTRODUCTION Nowadays computers have so much involved with our daily lives. This development is not only mainly caused by the rapid improvements in computing efficiency, but also by the successful designs of human-computer interfaces. At first, computers using a keyboard as the interface to key-in instructions were mostly used in laboratories or factories. Later on, computers using a mouse as the operating interface spread to offices and houses. Now, tablet computers and smart phones that use a touch screen as the operating interface make computers omnipresent. As people tend to rely on computers more and more, it obviously becomes increasingly important to develop more user-friendly human-computer interfaces. The demand of user friendliness has also been a key to the development of various care technologies, such as elderly care, disabled care, and children care, which involves people not familiar with or unable to use computers [16]. However, the mainstream human-computer interfaces are mostly operated with hands. In cases when hands are occupied or not available, it becomes not very convenient for people to use these interfaces. Therefore, interfaces operated by voices, eye motions, lip motions, etc. have been the focus of R&D. Yet, respective constraints in using these human-computer interfaces remain. For instance, in situations when people are unable or inconvenient for them to utter a voice, voice-operated interfaces will not be used.
  • 2. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 2 For computer-operating instructions originate from the brain, this research tries to measure and analyse brain intentions, further decipher the user’s instructions to the computer, and finally create a brain-control interface. Nevertheless, there is no denying the severe challenges in developing a brain-control interface. Besides, equipment used to measure the brain’s intentions may not be user-friendly or convenient to use. The purpose of this research is only to offer a feasibility evaluation on developing such an interface, and continual improvements based on the results in this research are expected. Specifically, this study investigates how we can recognize a user's commands by analysing his/her brainwaves characterized with electroencephalogram (EEG). Whenever a user intends to issue one of the pre-defined commands, the proposed system prompts him/her all the candidate commands in turn. Then, the user is asked to be concentrated as possible as he/she can, when the desired command is shown. We assume that the concentration will present a certain pattern of “Yes” in the captured EEG, as opposed to a pattern of “No” when the user is relaxed. Accordingly, the task is to determine that the captured EEG is “Yes” or not. In fact, there have been several studies discussing such kind of binary EEG classification problems. In the works [1-4], they investigate what the differences of the EEG signals are when human attempts to discriminate between target and non-target images. In the works [5,6], they propose using EEG to control the direction of an electric wheelchair. The studies [7,8] investigate how to extract EEG features for mental fatigue classification. The work [9] proposes a computer interface to combine gaze tracking with brainwave signals in an integrated head- mounted device. Nevertheless, all of the above-mentioned studies use 32, 64, or more EEG channels in building their systems, which involve inconvenient and uncomfortable head- recording nets as well as expensive equipment, therefore unsuitable for real human-machine- interfaced applications. Recognizing this problem, this study, extending from our previous work [10], proposes using a simple, portable, and cheap instrument that extracts a single-channel EEG from the user’s frontal lobe. The underlying beta waves of EEG are then distilled and used as the feature to determine the user’s command. We compare three recognition methods, respectively, based on Gaussian mixture models, hidden Markov models and recurrent neural network. The rest of this paper is organized as follows. Sec. 2 describes the concept of brainwave and EEG. Sec. 3 presents the methodology of the proposed EEG-based command recognition system. In Sec. 4, our experiment results are discussed. Then, Sec. 5 presents our conclusions and the direction of future work. 2. BRAINWAVE AND ELECTROENCEPHALOGRAPHY Brainwaves can generally be divided into five categories. 1) Delta wave, with frequency ranging from 0.5 to 4 Hz, appears mainly during deep and dreamless sleep and represents a completely unconscious state. 2) Theta wave, with frequency ranging from 4 to 8 Hz, appears mainly during light sleep or extreme relaxation and represents a subconscious state. 3) Alpha wave, with frequency ranging from 8 to 13 Hz, appears mainly during just awakening naturally from sleep or relaxed and represents a state of between consciousness and sub-consciousness. 4) Beta wave, with frequency ranging from 13 to 28 Hz, appears during wide awakening, especially in thinking and studying and represents a completely conscious state. 5) Gamma wave, with frequency ranging from 28 to 50 Hz, may appear during the formation of ideas, language and memory processing, and various types of learning.
  • 3. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 3 A method for recording the electrical activity of the human brain from the surface of the head is called Electroencephalogram (EEG). Through the use of EEG, research has found the relationship between the areas of cerebral cortex and the functions for controlling every part of a human body. For example, frontal lobe is related to planning, reasoning, movement, emotions, and parts of speech. Parietal lobe is related to recognition, orientation, and perception of stimuli. Occipital lobe is related to visual processing. Temporal lobe is related to perception and recognition of auditory stimuli. To ensure EEG studies could be compared to each other, the International Federation of Societies for Electroencephalography and Clinical Neurophysiology developed an internationally recognized method, called the 10–20 system of electrode placement [11], which standardizes the location of scalp electrodes at specific intervals along the head in the context of an EEG experiment. As shown in Figure 1, each electrode site is given a letter to identify the lobe, along with a number to identify the hemispheric location. Specifically, "F" stands for Frontal lobe, "T" stands for Temporal lobe, "C" stands for Central lobe, "P" stands for Parietal lobe, and "O" stands for Occipital lobe. Nowadays, a number of EEG equipment follows the 10-20 system of electrode placement. However, most of them involve inconvenient and uncomfortable head-recording nets as well as heavy cost; hence, they are unsuitable for real human-machine-interfaced applications. To deal with this problem, we seek to develop our brain-control interface by using a simple, portable, and cheap instrument. Figure 1. The 10–20 system of electrode placement (redrawn from [11]). 3. METHODOLOGY The proposed framework for EEG-based command recognition is shown in Figure 2. Whenever a user intends to issue one of the pre-defined commands, the proposed system prompts him/her all the candidate commands in turn. Then, the user is asked to be concentrated as possible as he/she can, when the desired command is shown. It is assumed that the concentration will present a certain pattern of “Yes” in the captured EEG, as opposed to a certain pattern of “No” when the user is relaxed.
  • 4. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 4 Filtering Recognition EEG Feature Yes or No Figure. 2. The proposed command recognition system. 3.1. EEG Measurement We use Mindband produced by NeuroSky Inc. to extract single-channel EEGs from a user’s frontal lobe (Fp1 or Fp2). MindBand is a headband device that senses electrical activity via a dry-electrode. As mentioned earlier, frontal lobe is related to planning, reasoning, movement, emotions, and parts of speech; hence, EEGs extracted from frontal lobe should be able to reflect a user's command. In addition, considering beta wave is related to thinking and active concentration, we propose using beta wave extracted from the frontal lobe for command recognition. The electrode of Mindband headband device is placed on the forehead to capture the brainwave appearing in the area of frontal lobe. The captured signals are then transmitted to a computer via Bluetooth. Because brainwaves captured from the surface of the head are tiny, MindBand performs amplification and filtering. After that, signals are quantized with 12-bit resolution. In addition, the power spectral density of the signal is then computed for every 0.125 sec with frequency resolution of 0.25Hz. Figure 3 shows an example of the captured beta wave represented by the power spectral density of the EEG. We can see from Figure 3 that beta wave in lower frequencies is somewhat different from that in higher frequencies. Hence, in general, beta wave can be further divided into two bands, 13-20Hz and 21-28Hz, respectively, denoted by β1 and β2 hereafter. 3.2. Strategy of the Command Recognition The recognition modular operates in two phases, training and testing. The training phase begins with EEG data collection, which acquires a large amount of EEG data labelled with "Yes" or "No". As our preliminary investigation found that the EEG pattern is diverse across different people significantly, we focus only on developing a user-dependent system, i.e., the system is trained using the pre-recorded EEG data of an individual user, and works exclusively for the user. In the EEG training data acquisition, subjects are asked to stare the screen from which commands are prompted at random. Before that, each subject needs to choose a command in mind. If the prompted command is what the subject chose, then he/she should be concentrated
  • 5. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 5 as possible as he/she can, in order to show his/her intention. On the contrary, if the prompted command is not what the subject chose, then he/she should keep relaxed. The EEG recordings are then labelled with "Yes" or "No" for every 0.5 second. 10 15 20 25 30 0 2 4 6 0 5 10 15 20 Frequency (Hz)Time (s) Power Figure. 3. An example of the captured beta wave represented by the power spectral density of the EEG. As mentioned earlier, beta wave is related to thinking and active concentration. Hence, an intuitive approach for determining a user’s command is based on the average power of the beta wave, similar to some work [12,13] using the NeuroSky's EEG device. However, our experiments found that because brainwave patterns change with time, using the average power of the beta wave for command recognition is far from stable. To deal with this problem, we propose using Gaussian mixture models, hidden Markov models or recurrent neural network to capture the dynamic information of the EEG signals. 2.3. Command Recognition Based on Gaussian Mixture Models (GMMs) Gaussian Mixture Models (GMMs) are known to provide good approximations of arbitrarily shaped densities of a spectrum over a long span of time [14]. The parameters of a GMM, composed of means, covariances, and mixture weights, can be estimated using k-means initialization and Expectation-Maximization (EM) [15]. We create two GMMs, Y and N, where the former stands for "Yes" EEG pattern, and the letter stands for "No" EEG pattern. Let O = {O1, O2,..., OT} be the T-length betawave feature represented by the power spectral density of the testing EEG. The system computes the two probabilities Pr(O|Y) and Pr(O|N), e.g., = = = T t K k kk t k Ow 1 1 )( Y )( Y )( YY ),;()|Pr( CμO N , (1)
  • 6. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 6 ( ) ( ) ,exp || 1 ),;( )( Y 1)( Y )( Y)( Y )( Y )( Y       −  −−= − k t kk tkN kk t OOO μCμ C Cμ  N (2) where K is the number of mixture Gaussian components; )( Y )( Y )( Y and,, kkk w Cμ are the k-th mixture weight, mean, and covariance of model Y, respectively; and prime () denotes the vector transpose. Then, a prompted command is determined as either "Yes" or "No" based on , No Yes )λ|Pr(ln)λ|Pr(ln NY   − OO (3) where  is a pre-set threshold. When considering low beta (β1) and high beta (β2) EEGs as two separate features, we can create four GMMs and modify Eq. (3) by     , No Yes )λ|Pr(ln-)λ|Pr(ln)1()λ|Pr(ln-)λ|Pr(ln 2211 N,Y,N,Y,   −+ OOOO aa (4) where subscripts β1 and β2 denote the GMMs trained using β1 and β2 features, respectively, and a is a weighting factor. 2.4. Command Recognition Based on Hidden Markov Models (HMMs) An HMM consisting of N states is completely characterized by the parameters,  = {A, B, }, where A = [aij]NN is the probability transition matrix, representing the probability of occurring a transition from state i to state j; B = [bj(Ot)]N1 is the output probability matrix, representing the probability of observing feature Ot at time t given that the model is in state j;  = [i]N1 is the initial state probability vector, representing the probability that state i is the initial state. HMM here functions as a random generator of the EEG signals. Basically, we create two HMMs, Y and N, where the former stands for "Yes", and the letter stands for "No". However, to consider low beta (β1) and high beta (β2) EEGs as two separate features, we can create four HMMs in analogy to the procedure of the GMM-based command recognition in Sec. 3.3. During recognition, Eq. (4) is also applied to determine the prompted command as either "Yes" or "No". 2.5. Command Recognition Based on Recurrent Neural Network The structure of our RNN is shown in Figure. 4. It consists of three layers of neurons, namely, input layer, which receives the beta wave feature stream, hidden layer, which models the dynamic structure and output layer, which provides the hypothesis of the user's command recognized.
  • 7. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 7 Given a stream of K-dimension beta wave feature vectors x[n] = [ x1[n], x2[n], xK[n] ], which is the power spectral density of the EEG, the activation function of hidden neuron j at frame time n is defined as ,]1[][exp1][ 1 11 − ==                   −+−+=  J i iij K k kkjj nhrnxwnh  (5) where J is the number of neurons in the hidden layer, wkj is the feed-forward connection strength from input neuron k to hidden neuron j, rij is the recurrent connection strength from the delayed hidden neuron i to hidden neuron j, and  is a tunable parameter. The activation function of the output neuron at time n is defined as ,][exp1][ 1 1 − =                         −+=  J j jj nhWny   (6) where Wj is the feed-forward connection strength from hidden neuron j to output neuron , and = 1 or 2. The strengths wkj, rij, and Wj , can be estimated using a back-propagation learning algorithm based on gradient descent minimization such that y1[n] > y2[n] in an average sense over time n, when x[n] belongs to “Yes”, and y1[n] < y2[n] when x[n] belongs to “No”. 1 2 k K 1 J 1 2 1 J Delay Input Layer Hidden Layer Output Layer 2 j 2 i Wjl , l =1 or 2 wkj rij Beta Wave Feature Vectors Yes/NoDecision Figure. 4. Structure of our RNN. In the testing phase, the RNN takes as input the beta wave feature vectors, and produces as output the decision on "Yes" or "No" using
  • 8. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 8 , No Yes ][][ 1 2 1 1     == − L n L n nyny (7) Furthermore, we create two RNNs, one taking care of the high beta wav EEG and the other taking care of the low beta EEG. The two RNNs are then combined using a weighting strategy. Specifically, a test EEG signal is hypothesized as either "Yes" or "No" using , No Yes ][][)1(][][ 1 2 2 1 2 1 1 1 2 1 1 1         −−+      −  ==== L n L n L n L n nynybnynyb (8) where ][and][ 21 nyny  , = 1 and 2, are the outputs of the β1-trained RNN and β2-trained RNN, respectively,  is a pre-defined threshold, and b is a weighting factor. 4. EXPERIMENTS 4.1 Databases Our EEG data was collected from ten male subjects. Each subject was invited to undergo the EEG measurements on 6 discontinuous days, in which the data collected on the former three days were used for training, and the data collected on the latter three days were used for testing. In the testing set, we segmented the EEG recordings into 2400 test samples. Each sample is associated with a ground-truth of "Yes" or "No" when a subject saw a set of ten commands prompted on the screen. Thus, there are 240 "Yes" test samples and 2160 "No" test samples. 4.2 Experiment Results Table 1 shows the results of the GMM-based command recognition, i.e., using Eq. (4), in which the accuracy is defined as 100%. SamplesTesting# SamplesrecognizedCorrectly#  Note that a = 1.0 in Eq. (4) represents using β1-trained GMMs solely, and a = 0.0 represents using β2-trained GMMs solely. It can be seen from Table 1 that the best performance (in boldface letter) of the β2-trained GMMs is slightly better than that of the β1-trained GMMs. When combining β1-trained and β2-trained GMMs, i.e., a = 0.35, the performance can be further improved.
  • 9. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 9 Table 1. Accuracy (%) of the GMM-based command recognition, i.e., using Eq. (4). No. of Mixtures β1-trained GMMs (a = 1.0) β2-trained GMMs (a = 0.0) a = 0.35 8 59.0 59.9 - 16 60.2 60.8 - 32 62.9 63.4 64.6 64 61.9 61.2 - Table 2 shows the results of the HMM-based command recognition. Compared to Table 1, we can see that HMM-based recognizer is better than GMM-based recognizer in this case. When combining β1-trained and β2-trained HMMs, i.e., a = 0.4, the best recognition accuracy is 78.8%. On the other hand, Table 3 shows the results of the RNN-based command recognition, i.e., using Eq. (8). We can see from Tables 2 and 3 that RNN-based recognizer is slightly better than HMM-based recognizer, which achieves the best accuracy of 79.2%. Table 2. Accuracy (%) of the HMM-based command recognition. No. of States β1-trained HMMs (a = 1.0) β2-trained HMMs (a = 0.0) a = 0.4 2 70.4 68.8 - 3 73.3 73.8 - 4 73.3 74.6 78.8 5 72.9 74.2 - Table 3. Accuracy (%) of the RNN-based command recognition, i.e., using Eq. (8). No. of Neurons in the Hidden Layer β1-trained RNN (b = 1.0) β2-trained RNN (b = 0.0) b = 0.6 10 72.9 72.5 - 11 72.1 72.9 - 12 72.5 73.3 - 13 74.2 74.6 - 14 73.8 74.2 - 15 73.8 75.4 79.2 16 73.3 75.0 - 17 72.9 73.8 - 18 72.9 74.2 - 19 72.5 72.9 - 20 71.3 71.7 -
  • 10. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 10 5. CONCLUSIONS This study has investigated the problem of recognizing users' commands by analysing their EEGs. In contrast to the existing studies, which rely on expensive equipment, the proposed system is rather advantageous to develop mobile-based applications, because we use a simple, portable, and cheap instrument to acquire single-channel EEGs. Although the recognition accuracy obtained with our system leaves much room to improve, we believe that such a pilot investigation has laid a good foundation for the future development of a brain-control interface using single-channel EEGs. To be more feasible, we have to further improve the recognition accuracy. Considering that the beta wave features acquired from Mind- band may not be sufficient to determine a user's command, we will study other features extracted from EEG in the future. Furthermore, we will extend the current recognition system from a user-dependent mode to a user-independent mode, so that the system can be built without using EEG training data from each user. ACKNOWLEDGEMENTS This work was supported in part by the National Science Council under Grants NSC101-2221- E-027-128-MY2 and MOST106-2221-E-027-125-MY2. REFERENCES [1] L. C. Parra, C. Alvino, A. Tang, B. Pearlmutter, N. Young, A. Osman, and P. Sajda, “Linear spatial integration for single-trial detection in encephalography,” Neuroimage, vol. 17, pp. 223- 230, 2002. [2] L. C. Parra, C. D. Spence, A. D. Gerson, and P. Sajda, “Recipes for the Linear Analysis of EEG,” Neuroimage, vol. 28, no. 2, pp. 342-353, 2005. [3] M. G. Philiastides and P. Sajda, “Temporal characterization of the neural correlates of perceptual decision making in the human brain,” Cerebral Cortex, vol. 16, pp. 509-518, 2006. [4] M. G. Philiastides, R. Ratcliff, and P. Sajda, “Neural representation of task difficulty and decision making during perceptual categorization: a timing diagram,” Journal of Neuroscience, vol. 26, pp. 8965-8975, 2006. [5] K. Tanaka, K. Matsunaga, and H. O. Wang, "Electroencephalogram-based control of an electric wheelchair," IEEE Transactions on Robotics, vol. 21, no. 4, pp. 762-766, August 2005. [6] B. Rebsamen, C. L. Teo, Q. Zeng, and H. Marcelo, E. Burdet, C. Guan, H. Zhang, and C. Laugier, "Controlling a wheelchair indoors using thought," IEEE Intelligent Systems, vol. 22, no. 2, pp. 18- 24, 2007. [7] K. Q. Shen, C. J. Ong, X. P. Li, Z. Hui, and P. V. Einar, "A feature selection method for multilevel mental fatigue EEG classification," IEEE Transactions on Biomedical Engineering, vol. 54, no. 7, pp. 1231-1237, July 2007. [8] C. Zhao, C. Zheng, M. Zhao1, J. Liu, and Y. Tu, "Automatic classification of driving mental fatigue with EEG by wavelet packet energy and KPCA-SVM," International Journal of Innovative Computing, Information and Control, vol. 7, no. 3, pp. 1157-1168, 2011. [9] J. W. Bang, E. C. Lee, and K. R. Park, "New computer interface combining gaze tracking and brainwave measurements," IEEE Transactions on Consumer Electronics, vol. 57, no. 4, pp. 1646- 1651, November 2011. [10] W. H. Tsai and W. B. Jheng, "Command Recognition Based on Single-Channel Electroencephalography," Journal of Information Science and Engineering, vol. 32, no. 1, pp. 229- 241, 2016.
  • 11. International Journal of Information Sciences and Techniques (IJIST) Vol.8, No.1/2/3/4/5, September 2018 11 [11] F. Sharbrough, G. E. Chatrian, R. P. Lesser, H. Luders, M. Nuwer, and T. W. Picton "American electroencephalographic society guidelines for standard electrode position nomenclature," Journal of Clinical Neurophysiology, vol. 8, pp. 200-202, 1991. [12] Y. Yasui, "A brainwave signal measurement and data processing technique for daily life applications," Journal of Physiological Anthropology, vol. 28, no. 3, pp. 145-150, 2009. [13] G. Rebolledo-Mendez, S. Freitas, J. R. Rojano-Caceres, A. R. Garcia-Gaona1, "An empirical examination of the relation between attention and motivation in computer-based education: a modelling approach," in Proceedings of the Twenty-Third International Florida Artificial Intelligence Research Society Conference, 2010. [14] L. R. Rabiner. “A tutorial on Hidden Markov Models and selected applications in speech recognition,” Proceedings of the IEEE, vol. 77, no. 2, pp. 257–286, 1989. [15] A. Dempster, N. Laird, and D. Rubin, “Maximum likelihood from incomplete data via the EM algorithm,” J. R. Statist. Soc., vol. 39, pp. 1–38, 1977. [16] A. M. Ouksel, "Big data: Some research challenges in future information systems," International Journal on Information Systems and Technologies (IJIST), vol. 1, no. 1, 2013. Authors Wei-Ho Tsai received his M.S. and Ph.D. degrees in Communication Engineering from National Chiao-Tung University, Hsinchu, Taiwan, in 1997 and 2001, respectively. He is currently a Professor in the Department of Electronic Engineering & Graduate Institute of Computer and Communication Engineering, National Taipei University of Technology, Taiwan. His research interests include spoken language processing and music information retrieval. Dr. Tsai is a life member of ACLCLP and a member of IEEE. Cin-Hao Ma received the B.S. degree in electronic engineering from National Taipei University of Technology, Taipei, Taiwan, in 2012. He is pursuing the Ph.D. degree in computer and communication engineering at National Taipei University of Technology currently. His research interests include signal processing and multimedia applications Varinya Phanichraksaphong received her B.S. degrees in Electronic Engineering from King Mongkut's Institute of Technology Ladkrabang, Bangkok, Thailand. She is currently pursuing her M.S. degrees in the Department of Electrical Engineering and Computer Science (EECS) National Taipei University of Technology, Taipei, Taiwan. Her research interests include musical instruments sound analysis and computer music processing