Biometrics was used as an automated and fast acceptable technology for human identification and it may be behavioral or physiological traits. Any biometric system based on identification or verification modes for human identity. The electrocardiogram (ECG) is considered as one of the physiological biometrics which impossible to mimic or stole. ECG feature extraction methods were performed using fiducial or non-fiducial approaches. This research presents an authentication ECG biometric system using non-fiducial features obtained by Discrete Wavelet Decomposition and the Euclidean Distance technique was used to implement the identity verification. From the obtained results, the proposed system accuracy is 96.66% also, using the verification system is preferred for a large number of individuals as it takes less time to get the decision.
AN ELECTRICAL IMPEDANCE TOMOGRAPHY SYSTEM FOR THYROID GLAND WITH A TINY ELECT...ijbesjournal
Electrical impedance Tomography (EIT) is a non-invasive imaging technique based on measuring of the
electrical conductivity and capacitance of abnormal and normal human tissues. The present work aims to
develop an EIT imaging system for imaging thyroid gland. Patients with thyroid nodules were eligible for
the study. The study was conducted on two groups of participants: control group consists of 20 normal
female cases and experimental consists of 20 goiter female patients. The thyroid nodule location, size, and
type measured by ultrasound. Thyroid gland conductivity and permittivity were recorded using EIT. The
impedance measurement is done through the applying of two probes: one probe to the neck region
(scanning probe) and the rest region (reference probe) with electrolytic gel for each probe, then the system
software proceeds to reconstruct the image and calculate the electrical impedance of the thyroid gland on
a personal computer which acts as an output display and storage for case information. The thyroid
scanning probe has 64 electrodes embedded on a small space (30 mm diameter and 50 mm height) inside
of the probe. Multifrequency impedance measurements are typically made by applying an electric current
to a target mass by using of the scanning probe and measuring the developed voltage. The present EIT
system provides real- time visualization of the spatial distribution of the electrical properties of the thyroid
tissue. Images obtained from the bioimpedance (BI) were compared to images obtained from the
ultrasound imaging, results showed great similarity between the two diagnostic images. Tumor tissue has
higher resistance and capacitance value than that of normal thyroid gland.
Utilizing ECG Waveform Features as New Biometric Authentication Method IJECEIAES
In this study, we are proposing a practical way for human identification based on a new biometric method. The new method is built on the use of the electrocardiogram (ECG) signal waveform features, which are produced from the process of acquiring electrical activities of the heart by using electrodes placed on the body. This process is launched over a period of time by using a recording device to read and store the ECG signal. On the contrary of other biometrics method like voice, fingerprint and iris scan, ECG signal cannot be copied or manipulated. The first operation for our system is to record a portion of 30 seconds out of whole ECG signal of a certain user in order to register it as user template in the system. Then the system will take 7 to 9 seconds in authenticating the template using template matching techniques. 44 subjects‟ raw ECG data were downloaded from Physionet website repository. We used a template matching technique for the authentication process and Linear SVM algorithm for the classification task. The accuracy rate was 97.2% for the authentication process and 98.6% for the classification task; with false acceptance rate 1.21%.
Analysis of Human Electrocardiogram for Biometric Recognition Using Analytic ...CSCJournals
The electrocardiograph (ECG) contains cardiac features unique to each individual. By analyzing ECG, it should therefore be possible not only to detect the rate and consistency of heartbeats but to also extract other signal features in order to identify ECG records belonging to individual subjects. In this paper, a new approach for automatic analysis of single lead ECG for human recognition is proposed and evaluated. Eighteen temporal, amplitude, width and autoregressive (AR) model parameters are extracted from each ECG beat and classified in order to identify each individual. Proposed system uses pre-processing stage to decrease the effects of noise and other unwanted artifacts usually present in raw ECG data. Following pre-processing steps, ECG stream is partitioned into separate windows where each window includes single beat of ECG signal. Window estimation is based on the localization of the R peaks in the ECG stream that detected by Filter bank method for QRS complex detection. ECG features – temporal, amplitude and AR coefficients are then extracted and used as an input to K-nn and SVM classification algorithms in order to identify the individual subjects and beats. Signal pre-processing techniques, applied feature extraction methods and some intermediate and final classification results are presented in this paper.
METHODS FOR IMPROVING THE CLASSIFICATION ACCURACY OF BIOMEDICAL SIGNALS BASED...IAEME Publication
Biomedical signals are long records of electrical activity within the human body, and they faithfully represent the state of health of a person. Of the many biomedical signals, focus of this work is on Electro-encephalogram (EEG), Electro-cardiogram (ECG) and Electro-myogram (EMG). It is tiresome for physicians to visually examine the long records of biomedical signals to arrive at conclusions. Automated classification of these signals can largely assist the physicians in their diagnostic process. Classifying a biomedical signal is the process of attaching the signal to a disease state or healthy state. Classification Accuracy (CA) depends on the features extracted from the signal and the classification process involved. Certain critical information on the health of a person is usually hidden in the spectral content of the signal. In this paper, effort is made for the improvement in CA when spectral features are included in the classification process.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
Now-a-days, many diseases are reducing the life time of the human. One of the major diseases is cardiovascular disease (CVD). It has become very common perhaps because of increasingly busy lifestyles.The rapid development of mobile communication technologies offers innumerable opportunities for the development of software and hardware applications for remote monitoring of cardiac disease. Compressed ECG is used for fast and efficient. Before performing the diagnosis, the compressed ECG must be decompressed for conventional ECG diagnosis algorithm. This decompression introduces unnecessary delay. In this paper, we introduce advanced data mining technique to detect cardiac abnormalities from the
compressed ECG using real time classification of CVD.When the patient affect cardiac disease, at the time hospital server can automatically inform to patient via email/SMS based on the real time CVD classification. Our proposed system initially uses the data mining technique, such as Genetic algorithm for attribute selection and Expectation Maximization based clustering. In this technique are used to identify the
disease from compressed ECG with the help of telecardiology diagnosis system
AN ELECTRICAL IMPEDANCE TOMOGRAPHY SYSTEM FOR THYROID GLAND WITH A TINY ELECT...ijbesjournal
Electrical impedance Tomography (EIT) is a non-invasive imaging technique based on measuring of the
electrical conductivity and capacitance of abnormal and normal human tissues. The present work aims to
develop an EIT imaging system for imaging thyroid gland. Patients with thyroid nodules were eligible for
the study. The study was conducted on two groups of participants: control group consists of 20 normal
female cases and experimental consists of 20 goiter female patients. The thyroid nodule location, size, and
type measured by ultrasound. Thyroid gland conductivity and permittivity were recorded using EIT. The
impedance measurement is done through the applying of two probes: one probe to the neck region
(scanning probe) and the rest region (reference probe) with electrolytic gel for each probe, then the system
software proceeds to reconstruct the image and calculate the electrical impedance of the thyroid gland on
a personal computer which acts as an output display and storage for case information. The thyroid
scanning probe has 64 electrodes embedded on a small space (30 mm diameter and 50 mm height) inside
of the probe. Multifrequency impedance measurements are typically made by applying an electric current
to a target mass by using of the scanning probe and measuring the developed voltage. The present EIT
system provides real- time visualization of the spatial distribution of the electrical properties of the thyroid
tissue. Images obtained from the bioimpedance (BI) were compared to images obtained from the
ultrasound imaging, results showed great similarity between the two diagnostic images. Tumor tissue has
higher resistance and capacitance value than that of normal thyroid gland.
Utilizing ECG Waveform Features as New Biometric Authentication Method IJECEIAES
In this study, we are proposing a practical way for human identification based on a new biometric method. The new method is built on the use of the electrocardiogram (ECG) signal waveform features, which are produced from the process of acquiring electrical activities of the heart by using electrodes placed on the body. This process is launched over a period of time by using a recording device to read and store the ECG signal. On the contrary of other biometrics method like voice, fingerprint and iris scan, ECG signal cannot be copied or manipulated. The first operation for our system is to record a portion of 30 seconds out of whole ECG signal of a certain user in order to register it as user template in the system. Then the system will take 7 to 9 seconds in authenticating the template using template matching techniques. 44 subjects‟ raw ECG data were downloaded from Physionet website repository. We used a template matching technique for the authentication process and Linear SVM algorithm for the classification task. The accuracy rate was 97.2% for the authentication process and 98.6% for the classification task; with false acceptance rate 1.21%.
Analysis of Human Electrocardiogram for Biometric Recognition Using Analytic ...CSCJournals
The electrocardiograph (ECG) contains cardiac features unique to each individual. By analyzing ECG, it should therefore be possible not only to detect the rate and consistency of heartbeats but to also extract other signal features in order to identify ECG records belonging to individual subjects. In this paper, a new approach for automatic analysis of single lead ECG for human recognition is proposed and evaluated. Eighteen temporal, amplitude, width and autoregressive (AR) model parameters are extracted from each ECG beat and classified in order to identify each individual. Proposed system uses pre-processing stage to decrease the effects of noise and other unwanted artifacts usually present in raw ECG data. Following pre-processing steps, ECG stream is partitioned into separate windows where each window includes single beat of ECG signal. Window estimation is based on the localization of the R peaks in the ECG stream that detected by Filter bank method for QRS complex detection. ECG features – temporal, amplitude and AR coefficients are then extracted and used as an input to K-nn and SVM classification algorithms in order to identify the individual subjects and beats. Signal pre-processing techniques, applied feature extraction methods and some intermediate and final classification results are presented in this paper.
METHODS FOR IMPROVING THE CLASSIFICATION ACCURACY OF BIOMEDICAL SIGNALS BASED...IAEME Publication
Biomedical signals are long records of electrical activity within the human body, and they faithfully represent the state of health of a person. Of the many biomedical signals, focus of this work is on Electro-encephalogram (EEG), Electro-cardiogram (ECG) and Electro-myogram (EMG). It is tiresome for physicians to visually examine the long records of biomedical signals to arrive at conclusions. Automated classification of these signals can largely assist the physicians in their diagnostic process. Classifying a biomedical signal is the process of attaching the signal to a disease state or healthy state. Classification Accuracy (CA) depends on the features extracted from the signal and the classification process involved. Certain critical information on the health of a person is usually hidden in the spectral content of the signal. In this paper, effort is made for the improvement in CA when spectral features are included in the classification process.
Health Care Monitoring for the CVD Detection using Soft Computing Techniquesijfcstjournal
Now-a-days, many diseases are reducing the life time of the human. One of the major diseases is cardiovascular disease (CVD). It has become very common perhaps because of increasingly busy lifestyles.The rapid development of mobile communication technologies offers innumerable opportunities for the development of software and hardware applications for remote monitoring of cardiac disease. Compressed ECG is used for fast and efficient. Before performing the diagnosis, the compressed ECG must be decompressed for conventional ECG diagnosis algorithm. This decompression introduces unnecessary delay. In this paper, we introduce advanced data mining technique to detect cardiac abnormalities from the
compressed ECG using real time classification of CVD.When the patient affect cardiac disease, at the time hospital server can automatically inform to patient via email/SMS based on the real time CVD classification. Our proposed system initially uses the data mining technique, such as Genetic algorithm for attribute selection and Expectation Maximization based clustering. In this technique are used to identify the
disease from compressed ECG with the help of telecardiology diagnosis system
Wireless Body Area Networks for Healthcare: A Surveyijasuc
Wireless body area networks (WBANs) are emerging as important networks, applicable in various
fields. This paper surveys the WBANs that are designed for applications in healthcare. We present a
comprehensive survey consisting of stand-alone sections focusing on important aspects of WBANs. We
examine the following: monitoring and sensing, power efficient protocols, system architectures, routing
and security. We conclude by discussing some open research issues, their potential solutions and future
trends.
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
In this research work, a new technique was proposed for the diagnosis of left ventricular hypertrophy (LVH) from the ECG signal. The advanced imaging techniques can be used to diagnose left ventricular hypertrophy, but it leads to time-consuming and more expensive. This proposed technique overcomes thesef issues and may serve as an efficient tool to diagnose the LVH disease. The LVH causes changes in the patterns of ECG signal which includes R wave, QRS and T wave. This proposed approach identifies the changes in the pattern and extracts the temporal, spatial and statistical features of the ECG signal using windowed filtering technique. These features were applied to the conventional classifier and also to the neural network classifier with the modified weights using a genetic algorithm. The weights were modified by combining the crossover operators such as crossover arithmetic and crossover two-point operator. The results were compared with the various classifiers and the performance of the neural network with the modified weights using a genetic algorithm is outperformed. The accuracy of the weights modified feedforward neural network is 97.5%.
Embedded system for upper-limb exoskeleton based on electromyography controlTELKOMNIKA JOURNAL
A major problem in an exoskeleton based on electromyography (EMG) control with pattern recognition-based is the need for more time to train and to calibrate the system in order able to adapt for different subjects and variable. Unfortunately, the implementation of the joint prediction on an embedded system for the exoskeleton based on the EMG control with non-pattern recognition-based is very rare. Therefore, this study presents an implementation of elbow-joint angle prediction on an embedded system to control an upper limb exoskeleton based on the EMG signal. The architecture of the system consisted of a bio-amplifier, an embedded ARMSTM32F429 microcontroller, and an exoskeleton unit driven by a servo motor. The elbow joint angle was predicted based on the EMG signal that is generated from biceps. The predicted angle was obtained by extracting the EMG signal using a zero-crossing feature and filtering the EMG feature using a Butterworth low pass filter. This study found that the range of root mean square error and correlation coefficients are 8°-16° and 0.94-0.99, respectively which suggest that the predicted angle is close to the desired angle and there is a high relationship between the predicted angle and the desired angle.
A comparative study of wavelet families for electromyography signal classific...journalBEEI
Automatic detection of neuromuscular disorders performed using electromyography (EMG) has become an interesting domain for many researchers. In this paper, we present an approach to evaluate and classify the non-stationary EMG signals based on discrete wavelet transform (DWT). Most often researches did not consider the effect of DWT factors on the performance of EMG signals classification. This problem is still an interesting unsolved challenge. However, the selection of appropriate mother wavelet and related level decomposition is an essential issue that should be addressed in DWT-based EMG signals classification. The proposed method consists of decomposing a raw EMG signal into different sub-bands. Several statistical features were extracted from each sub-band and six wavelet families were investigated. The feature vector was used as inputs to support vector machine (SVM) classifier for the diagnosis of neuromuscular disorders. The obtained results achieve satisfactory performances with optimal DWT factors using 10-fold cross-validation. From the classification performances, it was found that sym14 is the most suitable mother wavelet at the 8th optimal wavelet level of decomposition. These simulation results demonstrated that the proposed method is very reliable for reducing cost computational time of automated neuromuscular disorders system and removing the redundancy information.
Medical system based on thermal optical system and neural networkIJECEIAES
Military personnel in the training or operational phases always need constant medical examination, but the presence of efficient medical care is difficult to implement in real-time for such cases. A wireless system for thermal tracking of soldiers was proposed, as well as tracking their vital signs in real time. Thermal cameras are used with an optical system designed to increase the accuracy of the thermal images captured as the change in the electrocardiogram, heart rate, and temperature measurements are measured using a specially designed circuit. The results from both the thermal system and the biometric system are combined and sent to a computer for analysis using a model prepared with neural network technology. The proposed system was tested, and a database was created for 127 males and 110 females during training and rest times. The neural network model achieved a response time of 85 seconds until the release of the final analysis, and the accuracy of the proposed tracking system is 96%. The main contribution of this paper is the design of an integrated portable system for rapid, in-field, real-time military medical diagnostics.
Transmission of arm based real time ecg for monitoring remotely located patienteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Wireless Body Area Networks for Healthcare: A Surveyijasuc
Wireless body area networks (WBANs) are emerging as important networks, applicable in various
fields. This paper surveys the WBANs that are designed for applications in healthcare. We present a
comprehensive survey consisting of stand-alone sections focusing on important aspects of WBANs. We
examine the following: monitoring and sensing, power efficient protocols, system architectures, routing
and security. We conclude by discussing some open research issues, their potential solutions and future
trends.
Training feedforward neural network using genetic algorithm to diagnose left ...TELKOMNIKA JOURNAL
In this research work, a new technique was proposed for the diagnosis of left ventricular hypertrophy (LVH) from the ECG signal. The advanced imaging techniques can be used to diagnose left ventricular hypertrophy, but it leads to time-consuming and more expensive. This proposed technique overcomes thesef issues and may serve as an efficient tool to diagnose the LVH disease. The LVH causes changes in the patterns of ECG signal which includes R wave, QRS and T wave. This proposed approach identifies the changes in the pattern and extracts the temporal, spatial and statistical features of the ECG signal using windowed filtering technique. These features were applied to the conventional classifier and also to the neural network classifier with the modified weights using a genetic algorithm. The weights were modified by combining the crossover operators such as crossover arithmetic and crossover two-point operator. The results were compared with the various classifiers and the performance of the neural network with the modified weights using a genetic algorithm is outperformed. The accuracy of the weights modified feedforward neural network is 97.5%.
Embedded system for upper-limb exoskeleton based on electromyography controlTELKOMNIKA JOURNAL
A major problem in an exoskeleton based on electromyography (EMG) control with pattern recognition-based is the need for more time to train and to calibrate the system in order able to adapt for different subjects and variable. Unfortunately, the implementation of the joint prediction on an embedded system for the exoskeleton based on the EMG control with non-pattern recognition-based is very rare. Therefore, this study presents an implementation of elbow-joint angle prediction on an embedded system to control an upper limb exoskeleton based on the EMG signal. The architecture of the system consisted of a bio-amplifier, an embedded ARMSTM32F429 microcontroller, and an exoskeleton unit driven by a servo motor. The elbow joint angle was predicted based on the EMG signal that is generated from biceps. The predicted angle was obtained by extracting the EMG signal using a zero-crossing feature and filtering the EMG feature using a Butterworth low pass filter. This study found that the range of root mean square error and correlation coefficients are 8°-16° and 0.94-0.99, respectively which suggest that the predicted angle is close to the desired angle and there is a high relationship between the predicted angle and the desired angle.
A comparative study of wavelet families for electromyography signal classific...journalBEEI
Automatic detection of neuromuscular disorders performed using electromyography (EMG) has become an interesting domain for many researchers. In this paper, we present an approach to evaluate and classify the non-stationary EMG signals based on discrete wavelet transform (DWT). Most often researches did not consider the effect of DWT factors on the performance of EMG signals classification. This problem is still an interesting unsolved challenge. However, the selection of appropriate mother wavelet and related level decomposition is an essential issue that should be addressed in DWT-based EMG signals classification. The proposed method consists of decomposing a raw EMG signal into different sub-bands. Several statistical features were extracted from each sub-band and six wavelet families were investigated. The feature vector was used as inputs to support vector machine (SVM) classifier for the diagnosis of neuromuscular disorders. The obtained results achieve satisfactory performances with optimal DWT factors using 10-fold cross-validation. From the classification performances, it was found that sym14 is the most suitable mother wavelet at the 8th optimal wavelet level of decomposition. These simulation results demonstrated that the proposed method is very reliable for reducing cost computational time of automated neuromuscular disorders system and removing the redundancy information.
Medical system based on thermal optical system and neural networkIJECEIAES
Military personnel in the training or operational phases always need constant medical examination, but the presence of efficient medical care is difficult to implement in real-time for such cases. A wireless system for thermal tracking of soldiers was proposed, as well as tracking their vital signs in real time. Thermal cameras are used with an optical system designed to increase the accuracy of the thermal images captured as the change in the electrocardiogram, heart rate, and temperature measurements are measured using a specially designed circuit. The results from both the thermal system and the biometric system are combined and sent to a computer for analysis using a model prepared with neural network technology. The proposed system was tested, and a database was created for 127 males and 110 females during training and rest times. The neural network model achieved a response time of 85 seconds until the release of the final analysis, and the accuracy of the proposed tracking system is 96%. The main contribution of this paper is the design of an integrated portable system for rapid, in-field, real-time military medical diagnostics.
Transmission of arm based real time ecg for monitoring remotely located patienteSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Less computational approach to detect QRS complexes in ECG rhythmsCSITiaesprime
Electrocardiogram (ECG) signals are normally affected by artifacts that require manual assessment or use of other reference signals. Currently, Cardiographs are used to achieve basic necessary heart rate monitoring in real conditions. This work aims to study and identify main ECG features, QRS complexes, as one of the steps of a comprehensive ECG signal analysis. The proposed algorithm suggested an automatic recognition of QRS complexes in ECG rhythm. This method is designed based on several filter structure composes low pass, difference and summation filters. The filtered signal is fed to an adaptive threshold function to detect QRS complexes. The algorithm was validated and results were checked with experimental data based on sensitivity test.
Swarm algorithm based adaptive filter design to remove power line interferenc...eSAT Journals
Abstract
ECG signal is having wide importance in the biomedical field, but for proper diagnosis of ECG always a noise free ECG signal is needed. Many researchers have already developed filters for getting appropriate desirable ECG signal and till today many researchers are still developing different filters using different algorithms in order to get clearer ECG signal for proper diagnosis. Noises and Interferences get added in the ECG by different ways, at the time of ECG Acquisition or at the time of ECG signal recording.
In this paper newly adapted algorithm is used for the filtering of ECG signal that is a Swarm algorithm which is used for the Error signal optimization from the original corrupted ECG signal. This algorithm is implemented with Adaptive filter to removes Power Line Interference noise having Frequency component of 50 Hz. The ECG signal considered may be retrieved from ECG acquisition system or from MIT-BIH database.
Keywords: Adaptive Filter, SWARM Algorithm, MIT-BIH Database, Matlab, ECG Signal and Power line Noise Signal etc.
An Automated ECG Signal Diagnosing Methodology using Random Forest Classifica...ijtsrd
In this project, we put forward a new automated quality aware ECG beat classification method for effectual diagnosis of ECG arrhythmias under unsubstantiated health concern environments. The suggested method contains three foremost junctures i ECG signal quality assessment ECG SQA based whether it is “acceptable†or “unacceptable†based on our preceding adapted complete ensemble empirical mode decomposition CEEMD and temporal features, ii reconstruction of ECG signal and R peak detection iii the ECG beat classification as well as the ECG beat extraction, beat alignment and Random forest RF based beat classification. The accuracy and robustness of the anticipated method is evaluated by means of different normal and abnormal ECG signals taken from the standard MIT BIH arrhythmia database. The suggested ECG beat extraction approach can recover the categorization accuracy by protecting the QRS complex portion and background noises is suppressed under an acceptable level of noise . The quality aware ECG beat classification techniques attains higher kappa values for the classification accuracies which can be reliable as evaluated to the heartbeat classification methods without the ECG quality assessment process. Akshara Jayanthan M B | Prof. K. Kalai Selvi "An Automated ECG Signal Diagnosing Methodology using Random Forest Classification with Quality Aware Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30750.pdf Paper Url :https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/30750/an-automated-ecg-signal-diagnosing-methodology-using-random-forest-classification-with-quality-aware-techniques/akshara-jayanthan-m-b
Classification of cardiac vascular disease from ecg signals for enhancing mod...hiij
“Why to be in frustration we will do new creation f
or salvation”. Based on these words we grapes your
attention towards saving a life of a heart patient
with the use of ECG in Public Health Care Center by
transmitting ECG signals to nearby hospital server.
In this paper we analyze the abnormalities found i
n the
ECG signals by identifying the Normal, Bradycardia
Arrhythmia, Tachycardia Arrhythmia and Ischemia
signal using the method of Neuro Fuzzy Classifier.
Daubechies Wavelet Transforms is used for feature
extraction and Adaptive Neuro Fuzzy Inference Syste
m (ANFIS) is used for classification. The compressi
on
algorithm is performed by using Huffman coding.
Electrocardiograph signal recognition using wavelet transform based on optim...IJECEIAES
Due to the growing number of cardiac patients, an automatic detection that detects various heart abnormalities has been developed to relieve and share physicians’ workload. Many of the depolarization of ventricles complex waves (QRS) detection algorithms with multiple properties have recently been presented; nevertheless, real-time implementations in low-cost systems remain a challenge due to limited hardware resources. The proposed algorithm finds a solution for the delay in processing by minimizing the input vector’s dimension and, as a result, the classifier’s complexity. In this paper, the wavelet transform is employed for feature extraction. The optimized neural network is used for classification with 8-classes for the electrocardiogram (ECG) signal this data is taken from two ECG signals (ST-T and MIT-BIH database). The wavelet transform coefficients are used for the artificial neural network’s training process and optimized by using the invasive weed optimization (IWO) algorithm. The suggested system has a sensitivity of over 70%, a specificity of over 94%, a positive predictive of over 65%, a negative predictive of more than 93%, and a classification accuracy of more than 80%. The performance of the classifier improves when the number of neurons in the hidden layer is increased.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals
Feature extraction of electrocardiogram signal using machine learning classif...IJECEIAES
In the various field of life person identification is an essential and important task. This helps for the investigation of criminal activities and used in various type of forensic applications like surveillance. For biometric recognition iris, face, voice and fingerprint have a limited fabrication and from there the exact decision regarding liveliness of the subject can be drawn. The aim of the approach is to construct a biometric recognition system based on ECG which processes the raw ECG signal. The entire process is supported by different filters for noise elimination and ECG characteristics waves gone through time domain analysis. Based on the analysis an efficient feature extraction model is developed where several best P-QRS-T signal parts are taken and the positions of the fragmented signals are normalized depends on the priorities of their positions. The calculation of domain features done 72 times. It checks the data sets (train and test) and from feature vector matching to each of the individual signal, separately. The performance and utility of the system are analyzed and feature vectors are examined by different classification algorithms of machine learning. The leading algorithms like K-nearest neighbor, artificial neural network and support vector machine are used to classify different features of ECG, and it is tested using standard cardiac database i.e. the MIT-BIH ECG -ID database.
1-dimensional convolutional neural networks for predicting sudden cardiacIAESIJAI
Sudden cardiac arrest (SCA) is a serious heart problem that occurs without symptoms or warning. SCA causes high mortality. Therefore, it is important to estimate the incidence of SCA. Current methods for predicting ventricular fibrillation (VF) episodes require monitoring patients over time, resulting in no complications. New technologies, especially machine learning, are gaining popularity due to the benefits they provide. However, most existing systems rely on manual processes, which can lead to inefficiencies in disseminating patient information. On the other hand, existing deep learning methods rely on large data sets that are not publicly available. In this study, we propose a deep learning method based on one-dimensional convolutional neural networks to learn to use discrete fourier transform (DFT) features in raw electrocardiogram (ECG) signals. The results showed that our method was able to accurately predict the onset of SCA with an accuracy of 96% approximately 90 minutes before it occurred. Predictions can save many lives. That is, optimized deep learning models can outperform manual models in analyzing long-term signals.
Similar to Personal identity verification based ECG biometric using non-fiducial features (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...ssuser7dcef0
Power plants release a large amount of water vapor into the
atmosphere through the stack. The flue gas can be a potential
source for obtaining much needed cooling water for a power
plant. If a power plant could recover and reuse a portion of this
moisture, it could reduce its total cooling water intake
requirement. One of the most practical way to recover water
from flue gas is to use a condensing heat exchanger. The power
plant could also recover latent heat due to condensation as well
as sensible heat due to lowering the flue gas exit temperature.
Additionally, harmful acids released from the stack can be
reduced in a condensing heat exchanger by acid condensation. reduced in a condensing heat exchanger by acid condensation.
Condensation of vapors in flue gas is a complicated
phenomenon since heat and mass transfer of water vapor and
various acids simultaneously occur in the presence of noncondensable
gases such as nitrogen and oxygen. Design of a
condenser depends on the knowledge and understanding of the
heat and mass transfer processes. A computer program for
numerical simulations of water (H2O) and sulfuric acid (H2SO4)
condensation in a flue gas condensing heat exchanger was
developed using MATLAB. Governing equations based on
mass and energy balances for the system were derived to
predict variables such as flue gas exit temperature, cooling
water outlet temperature, mole fraction and condensation rates
of water and sulfuric acid vapors. The equations were solved
using an iterative solution technique with calculations of heat
and mass transfer coefficients and physical properties.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3008
Figure 1. One heartbeat cycle Figure 2. ECG fiducial features [10]
Figure 3. ECG biometric approaches
Figure 4. Enrollment process
In an identification system, it starts with the signal acquisition from individual and the same steps
used before in the enrollment stage repeated exactly in preprocessing and feature extraction process then
comparing between the obtained features with that stores in the database to get the individual identity.
it doesn't need identity claimed and considered as one to many matching because it searches on all
the database and gets who the user's identity or non-identified as shown in Figure 5. In the verification
system, the same as in the enrollment process in ECG signal preprocessing and feature extraction techniques
is exactly repeated. The verification system needs identity claimed and considered as one to one matching
then getting the decision yes if the features are matching and no for not matching so its result is performed
quickly and accurate as shown in Figure 6.
Most of the biometric systems used identification schemes with fiducial and non-fiducial features,
while most of verification biometric systems used fiducial features [11-13]. In [2], the Multimodal Biometric
Authentication system is proposed using a combination of ECG and Fingerprint together. Fiducial features
were extracted from ECG signals after preprocessing also converting the extracted fingerprint to
the transformed domain using DWT then extract only two features. The decision was getting from the final
score which calculated from matching ECG and fingerprint traits. A lot of parameters were calculated for
the system efficiency moreover, the number of subjects is not clear.
3. Int J Elec & Comp Eng ISSN: 2088-8708
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3009
Figure 5. Identification biometric system
Figure 6. Verification biometric system
The authors in [14], Proposed an Authentication Biometric system which based on the fiducial
features directly after preprocessing, they used 73 subjects in their experiment. The Euclidean distance was
used for matching. Then they extended their unimodal framework based on ECG trait only to be
a multimodal biometric system based on ECG and Face or ECG and fingerprint using score fusion technique.
A verification biometric system was proposed in [15], they used only 15 subjects, RR intervals were detected
from ECG signals then applying DCT to get the required features. The obtained accuracy is 97.78% after
using the correlation to get the decision.
In [16], ECG Biometric Verification system was proposed by using PCA, they used 8 subjects only
in their experiment. They used fiducial features using PCA and DWT for non-fiducial features.
The authors in [17], they get the signal features using the Hjorth Descriptor and Sample Entropy (SampEn).
Support Vector Machine (SVM) classifier was used for authentication. The obtained accuracy is 93.8% from
Hjorth Descriptor Compared to SampEn. In [18], ECG based biometric system was designed. ECG dataset of
55 users was created during four months to study the ECG-based biometrics stability. He studied
the performance of ECG as a biometric trait in short and long terms and found that more needing studies
towards improving the long-term ECG biometric systems performance.
The authors in [19] proposed ECG biometric algorithm using 184 subjects from different datasets.
They obtained 98.33% accuracy using a random forest classifier and 96.31% accuracy using the wavelet
distance measure algorithm while the two classifiers together give accuracy 99.52%. In [20], a non-fiducial
ECG biometric verification system was proposed using kernel methods for 52 subjects with Discrete Wavelet
Transform (DWT) for denoising. They studied the performance of using Support Vector Machine (SVM)
and the Linear Discriminant Analysis (LDA). A two-lead ECG signals biometric verification was proposed
in [21], autocorrelation feature extraction method was used in conjunction with different techniques for
reduction with different window lengths from short and long-term recordings. The results show that
the recognition rates affected by the recording and the window lengths. The objective of this research is to
apply a verification biometric system using non-fiducial features with Euclidean distance matching
methodology.
2. RESEARCH METHOD
The proposed biometric authentication system consists of three main steps pre-processing,
feature extraction and reduction using DWT, and matching process, as shown in Figure 7.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3010
Figure 7. Block diagram of the proposed system
2.1. Datasets description
In this research, 90 subjects are used from two datasets. The first dataset is ECG-ID Database while
the second is the MIT-BIH Arrhythmia Database [22]. The number of test subjects used in the proposed
system is 72 subjects includes 11 unauthorized subjects.
2.2. Pre-processing
The first dataset has filtered signals so it used directly while the Butterworth filter was applied on
signals from the second dataset. The Pan and Tompkins algorithm was applied for R peak detection [23].
The cycle length was fixed at 200 samples because features vectors must have an equal length for all
subjects. A normalization process into the range from 0 to 1 is applied to the amplitude of all points for
each R-R cycle.
2.3. Feature extraction
Discrete Wavelet Decomposition was applied as a feature extraction method in each R-R cycle by
using Daubechies wavelets (db8) with five-level decomposition as shown in Figure 8. Selecting
the Daubechies family in this work depending on its shape and energy spectrum which close to the ECG
signal while selecting db8 from previous work which gets good results than others. The total coefficients
number after decomposition is 272 as shown in Figure 8. Figure 9. Shows the selected R-R interval and
Figure 10 shows that the wavelet coefficients after 100 are approximately closed to zero so those coefficients
are neglected (d1 and d2) and the other coefficients (104) were taken in our experiment.
Figure 8. The 5-level discrete wavelet decomposition using Daubechies wavelets 'db8'
5. Int J Elec & Comp Eng ISSN: 2088-8708
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3011
Figure 9. The selected R-R interval Figure 10. Wavelet coefficients of the selected
R-R interval
2.4. Authentication strategy
The Euclidean distance algorithm is used for verification decisions. Euclidean distance calculations
are performed exactly as follows:
Let P (i) is the stored pattern feature matrix of size:𝑚 × 𝑑:
𝑃(𝑖)
= [
𝑓1,1 ⋯ 𝑓1,𝑑
⋮ ⋱ ⋮
𝑓 𝑚,1 ⋯ 𝑓 𝑚,𝑑
] (1)
If N is the number of subjects so there where N stored pattern matrices P (i). P'(i) is the sample features
matrix defined as:
𝑃′(𝑖)
= [
𝑓′1,1 ⋯ 𝑓′1,𝑑
⋮ ⋱ ⋮
𝑓′ 𝑚,1 ⋯ 𝑓′ 𝑚,𝑑
] (2)
The distance between the attributes of a sample and features matrix of an individual i is statistically
computed using:
𝑑(𝑖)
= [
|𝑓1,1 − 𝑓′1,1| ⋯ |𝑓1,𝑑 − 𝑓′1,𝑑|
⋮ ⋱ ⋮
|𝑓 𝑚,1 − 𝑓′ 𝑚,1| ⋯ |𝑓 𝑚,𝑑 − 𝑓′ 𝑚,𝑑|
] (3)
The distance score for an individual is calculated from the sum of Euclidean distances between feature
attributes as:
𝑠 𝑑
𝑖
= ∑ |𝑓𝑘,𝑑− 𝑓′
𝑘,𝑑
|𝑚
𝑘=1 (4)
The mean of distance score for an individual (i) should be calculated due to the variations in ECG data set
signals as follows:
𝑠 𝑖
=
1
𝑑
∑ 𝑠𝑗
𝑖𝑚
𝑗=1 (5)
Small distance score value indicates good matching while large distance score value indicates poor
matching [14]. To get an accurate decision a threshold is calculated from the distances of the database and
the sample feature matrix for each tested individual.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 3007 - 3013
3012
3. EXPERIMENT AND RESULTS
90 subjects are used in the enrolment process to create the system database. Daubechies wavelet
'db8' as a feature extraction method is used. The Euclidean distance algorithm is used as a matching
algorithm. The performance of the proposed ECG verification system is estimated by calculating some
metrics as the accuracy or verification rate.
v𝑒𝑟𝑖𝑓𝑖𝑐𝑎𝑡𝑖𝑜𝑛 𝑟𝑎𝑡𝑒(%) =
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡𝑙𝑦 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑐
𝑇𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑒𝑠𝑡 𝑠𝑎𝑚𝑝𝑙𝑒𝑠 𝑁𝑡
(6)
Besides, some metrics are used such as recall, precision, and F-score to evaluate the proposed
system performance (6).
Sensitivity (%) =
TP
TP + FN
× 100 (7)
Specificity(%) =
TN
FP + TN
× 100 (8)
𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 (%) =
𝑇𝑃
𝑇𝑃+𝐹𝑝
∗ 100 (9)
𝐹 − 𝑠𝑐𝑜𝑟𝑒 =
2∗𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦∗𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
(𝑆𝑒𝑛𝑠𝑖𝑡𝑖𝑣𝑖𝑡𝑦+𝑃𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛)
(10)
Where, TP denotes the number of true positive samples, TN denotes the number of true negative samples,
FP denotes the number of false-positive samples and FN denotes the number of false-negative
samples [24, 25]. The number of test subjects used in the proposed system is 72 subjects includes
11 unauthorized subjects. The following Table 1 summarizes the performance of the system.
Table 1. The Performance of the proposed system
Parameters Percent (%)
Verification Rate 94.44
Sensitivity 95.08
Specificity 90.9
Precision 98.3
F- Score 96.66
4. CONCLUSION
Some biometric traits could be imitated but the ECG signal is considered as a real-time trait that
indicates that the person is alive and present by himself. A verification biometric system based ECG signal is
proposed in this research. Daubechies wavelet 'db8' as a feature extraction method is used and the Euclidean
distance algorithm for verification decision. 90 subjects are used to build the system database, 72 subjects for
testing our verification biometric system. The system performance is evaluated by calculating some metrics.
The obtained f- Score is 96.66 %. The proposed system is more suitable for a large number of subjects which
gives its decision in a very short time with good accuracy due to using the verification approach based on
non-fiducial features.
REFERENCES
[1] Zeeshan Hassan, Syed Omer Gilani and Mohsin Jamil, “Review of Fiducial and Non-Fiducial Techniques of
Feature Extraction in ECG based Biometric Systems,” Indian Journal of Science and Technology, vol. 9, no. 21,
Jun. 2016. DOI: 10.17485/ijst/2016/v9i21/94841
[2] Manjunathswamy B. E., Appaji M Abhishek, Thriveni J, Venugopal K R, and L. M. Patnaik, “Multimodal
Biometric Authentication using ECG and Fingerprint,” International Journal of Computer Applications
(0975-8887), vol. 111, no. 13, Feb. 2015
[3] Ian McAteer, Ahmed Ibrahim, Guanglou Zheng, Wencheng Yang and Craig Valli, “Integration of Biometrics and
Steganography: A Comprehensive Review,” Technologies, vol. 7, no. 34, 2019. DOI:10.3390/technologies7020034
[4] VPS G4, “Principles of ECG,” Vascular Positioning System G4, Vascular Positioning Technology Education,
[Online]. Available: http://www.arrowvascular.com/vpseducation/pre-trial/principles-of-ecg.html.
7. Int J Elec & Comp Eng ISSN: 2088-8708
Personal identity verification based ECG biometric using non-fiducial features (Marwa A. Elshahed)
3013
[5] Ahmed Younes Shdefat, Moon-Il Joo, Sung-Hoon Choi, Hee-Cheol Kim, “Utilizing ECG Waveform Features as
New Biometric Authentication Method,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 8, no. 2, pp. 658~665, Apr. 2018. DOI: 10.11591/ijece.v8i2.pp658-665.
[6] Vanessa Novaes Barros, “The heart cycle: review,” MOJ Women’s Health, vol. 8, no. 1, 2019.
[7] Woo-Hyuk Jung 1 and Sang-Goog Lee, “ECG Identification Based on Non-Fiducial Feature Extraction Using
Window Removal Method,” MDPI journal, vol. 7, no. 11, Nov. 2017. DOI: 10.3390/app7111205.
[8] Mohamad O. Diab, Alaa Seif, Mohamad El-Abed and Maher Sabbah, “Individual Identification Using ECG
Signals,” Journal of Computer and Communications, vol. 8, pp. 74-80, 2018. DOI: 10.4236/jcc.2018.61008.
[9] Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Jia Li, “A Novel Electrocardiogram Biometric Identification
Method Based on Temporal-Frequency Autoencoding,” Electronics, 2019. DOI: 10.3390/electronics8060667.
[10] Ţarălungă Dragoș Daniel and Mihaela Neagu, “Cancelling Harmonic Power Line Interference in Biopotentials,”
book chapter, Intech Open, 2018. DOI: 10.5772/intechopen.74579.
[11] Pankaj Sareen, “Biometrics-Introduction, Characteristics, Basic technique, its Types and Various Performance
Measures,” International Journal of Emerging Research in Management & Technology, vol. 3, no. 4, 2014.
[12] Sushma Jaiswal, Sarita Singh Bhadauria and Rakesh Singh Jadon, “Biometric: Case Study,” Journal of Global
Research in Computer Science, vol. 2, no. 10, Oct. 2011.
[13] Ahmed M. Hamad, Rasha Salah Elhadary, Ahmed Omar Elkhateeb, “Multimodal Biometric Identification Using
Fingerprint, Face and Iris Recognition,” International Journal of Information Science and Intelligent System, 2014.
[14] Yogendra Narain Singh, S. K. Singh, “Evaluation of Electrocardiogram for Biometric Authentication,” Journal of
Information Security, vol. 3, no. pp. 39-48, 2012.
[15] Ahmed F. Hussein, Abbas K. AlZubaidi, Ali Al-Bayaty and Qais A. Habash, “An IoT Real-Time Biometric
Authentication System Based on ECG Fiducial Extracted Features Using Discrete Cosine Transform,”
arXiv: 1708.08189, 2017.
[16] Jameel Kadhim Abed and Nahrain N. Abd, “ECG Biometric Verification by using PCA,” International Journal of
Engineering Trends and Technology (IJETT), vol. 65, no. 1, Nov. 2018.
[17] Sugondo Hadiyoso, Suci Aulia and Achmad Rizal, “One-Lead Electrocardiogram for Biometric Authentication
using Time Series Analysis and Support Vector Machine,” (IJACSA) International Journal of Advanced Computer
Science and Applications, vol. 10, no. 2, 2019.
[18] Nikita Samarin, “A Key to Your Heart: Biometric Authentication Based on ECG Signals,” Project Report
Computer Science School of Informatics University of Edinburgh, 2018.
[19] Robin Tan and Marek Perkowski, “Toward Improving Electrocardiogram (ECG) Biometric Verification using
Mobile Sensors: A Two-Stage Classifier Approach,” Sensors, vol. 17, no. 2 2017. DOI: 10.3390/s 17020410.
[20] M Hejazi, SAR Al-Haddad, YP Singh, SJ Hashim and AFA Aziz, “ECG biometric authentication based on non-
fiducial approach using kernel methods,” Digital Signal Processing, vol. 52, pp. 72-86, May 2016.
[21] M Hejazi, SAR Al-Haddad, SJ Hashim, AFA Aziz and YP Singh, “Feature level fusion for biometric verification
with two-lead ECG signals,” IEEE 12th International Colloquium on Signal Processing & Its Applications(CSPA),
pp. 54-59, 2016.
[22] “PhysioBank ATM,” PhysioNet, [Online] Available: https://archive.physionet.org/cgi-bin/atm/ATM
[23] Jiapu Pan and Willis j. Tompkins, “A Real-Time Qrs Detection Algorithm,” IEEE Transactions on Biomedical
Engineering, vol. 32, no. 3, Mar. 1985.
[24] Renuka Joshi, “Accuracy, Precision, Recall & F1 Score: Interpretation of Performance Measures,” 2016. [Online].
Available: https://blog.exsilio.com/all/accuracy-precision-recall-f1-score-interpretation-of-performance-measures/
[Accessed 5/8/2019].
[25] Afzal Godil, Roger Bostelman, Will Shackleford, Tsai Hong and Michael Shneier, “Performance Metrics for
Evaluating Object and Human Detection and Tracking Systems,” National Institute of Standards and Technology,
Jul. 2014.