1,762 research outputs found

    Ensemble approach on enhanced compressed noise EEG data signal in wireless body area sensor network

    Get PDF
    The Wireless Body Area Sensor Network (WBASN) is used for communication among sensor nodes operating on or inside the human body in order to monitor vital body parameters and movements. One of the important applications of WBASN is patients’ healthcare monitoring of chronic diseases such as epileptic seizure. Normally, epileptic seizure data of the electroencephalograph (EEG) is captured and compressed in order to reduce its transmission time. However, at the same time, this contaminates the overall data and lowers classification accuracy. The current work also did not take into consideration that large size of collected EEG data. Consequently, EEG data is a bandwidth intensive. Hence, the main goal of this work is to design a unified compression and classification framework for delivery of EEG data in order to address its large size issue. EEG data is compressed in order to reduce its transmission time. However, at the same time, noise at the receiver side contaminates the overall data and lowers classification accuracy. Another goal is to reconstruct the compressed data and then recognize it. Therefore, a Noise Signal Combination (NSC) technique is proposed for the compression of the transmitted EEG data and enhancement of its classification accuracy at the receiving side in the presence of noise and incomplete data. The proposed framework combines compressive sensing and discrete cosine transform (DCT) in order to reduce the size of transmission data. Moreover, Gaussian noise model of the transmission channel is practically implemented to the framework. At the receiving side, the proposed NSC is designed based on weighted voting using four classification techniques. The accuracy of these techniques namely Artificial Neural Network, Naïve Bayes, k-Nearest Neighbour, and Support Victor Machine classifiers is fed to the proposed NSC. The experimental results showed that the proposed technique exceeds the conventional techniques by achieving the highest accuracy for noiseless and noisy data. Furthermore, the framework performs a significant role in reducing the size of data and classifying both noisy and noiseless data. The key contributions are the unified framework and proposed NSC, which improved accuracy of the noiseless and noisy EGG large data. The results have demonstrated the effectiveness of the proposed framework and provided several credible benefits including simplicity, and accuracy enhancement. Finally, the research improves clinical information about patients who not only suffer from epilepsy, but also neurological disorders, mental or physiological problems

    RF Fingerprinting Unmanned Aerial Vehicles

    Get PDF
    As unmanned aerial vehicles (UAVs) continue to become more readily available, their use in civil, military, and commercial applications is growing significantly. From aerial surveillance to search-and-rescue to package delivery the use cases of UAVs are accelerating. This accelerating popularity gives rise to numerous attack possibilities for example impersonation attacks in drone-based delivery, in a UAV swarm, etc. In order to ensure drone security, in this project we propose an authentication system based on RF fingerprinting. Specifically, we extract and use the device-specific hardware impairments embedded in the transmitted RF signal to separate the identity of each UAV. To achieve this goal, AlexNet with the data augmentation technique was employed

    Epileptic seizure detection and prediction based on EEG signal

    Get PDF
    Epilepsy is a kind of chronic brain disfunction, manifesting as recurrent seizures which is caused by sudden and excessive discharge of neurons. Electroencephalogram (EEG) recordings is regarded as the golden standard for clinical diagnosis of epilepsy disease. The diagnosis of epilepsy disease by professional doctors clinically is time-consuming. With the help artificial intelligence algorithms, the task of automatic epileptic seizure detection and prediction is called a research hotspot. The thesis mainly contributes to propose a solution to overfitting problem of EEG signal in deep learning and a method of multiple channels fusion for EEG features. The result of proposed method achieves outstanding performance in seizure detection task and seizure prediction task. In seizure detection task, this paper mainly explores the effect of the deep learning in small data size. This thesis designs a hybrid model of CNN and SVM for epilepsy detection compared with end-to-end classification by deep learning. Another technique for overfitting is new EEG signal generation based on decomposition and recombination of EEG in time-frequency domain. It achieved a classification accuracy of 98.8%, a specificity of 98.9% and a sensitivity of 98.4% on the classic Bonn EEG data. In seizure prediction task, this paper proposes a feature fusion method for multi-channel EEG signals. We extract a three-order tensor feature in temporal, spectral and spatial domain. UMLDA is a tensor-to-vector projection method, which ensures minimal redundancy between feature dimensions. An excellent experimental result was finally obtained, including an average accuracy of 95%, 94% F1-measure and 90% Kappa index

    Hyperspectral Unmixing Overview: Geometrical, Statistical, and Sparse Regression-Based Approaches

    Get PDF
    Imaging spectrometers measure electromagnetic energy scattered in their instantaneous field view in hundreds or thousands of spectral channels with higher spectral resolution than multispectral cameras. Imaging spectrometers are therefore often referred to as hyperspectral cameras (HSCs). Higher spectral resolution enables material identification via spectroscopic analysis, which facilitates countless applications that require identifying materials in scenarios unsuitable for classical spectroscopic analysis. Due to low spatial resolution of HSCs, microscopic material mixing, and multiple scattering, spectra measured by HSCs are mixtures of spectra of materials in a scene. Thus, accurate estimation requires unmixing. Pixels are assumed to be mixtures of a few materials, called endmembers. Unmixing involves estimating all or some of: the number of endmembers, their spectral signatures, and their abundances at each pixel. Unmixing is a challenging, ill-posed inverse problem because of model inaccuracies, observation noise, environmental conditions, endmember variability, and data set size. Researchers have devised and investigated many models searching for robust, stable, tractable, and accurate unmixing algorithms. This paper presents an overview of unmixing methods from the time of Keshava and Mustard's unmixing tutorial [1] to the present. Mixing models are first discussed. Signal-subspace, geometrical, statistical, sparsity-based, and spatial-contextual unmixing algorithms are described. Mathematical problems and potential solutions are described. Algorithm characteristics are illustrated experimentally.Comment: This work has been accepted for publication in IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensin

    Technology, Science and Culture

    Get PDF
    From the success of the first and second volume of this series, we are enthusiastic to continue our discussions on research topics related to the fields of Food Science, Intelligent Systems, Molecular Biomedicine, Water Science, and Creation and Theories of Culture. Our aims are to discuss the newest topics, theories, and research methods in each of the mentioned fields, to promote debates among top researchers and graduate students and to generate collaborative works among them

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas

    Signal Processing Using Non-invasive Physiological Sensors

    Get PDF
    Non-invasive biomedical sensors for monitoring physiological parameters from the human body for potential future therapies and healthcare solutions. Today, a critical factor in providing a cost-effective healthcare system is improving patients' quality of life and mobility, which can be achieved by developing non-invasive sensor systems, which can then be deployed in point of care, used at home or integrated into wearable devices for long-term data collection. Another factor that plays an integral part in a cost-effective healthcare system is the signal processing of the data recorded with non-invasive biomedical sensors. In this book, we aimed to attract researchers who are interested in the application of signal processing methods to different biomedical signals, such as an electroencephalogram (EEG), electromyogram (EMG), functional near-infrared spectroscopy (fNIRS), electrocardiogram (ECG), galvanic skin response, pulse oximetry, photoplethysmogram (PPG), etc. We encouraged new signal processing methods or the use of existing signal processing methods for its novel application in physiological signals to help healthcare providers make better decisions

    Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    Get PDF
    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information

    Data-driven methods for analyzing ballistocardiograms in longitudinal cardiovascular monitoring

    Get PDF
    Cardiovascular disease (CVD) is the leading cause of death in the US; about 48% of American adults have one or more types of CVD. The importance of continuous monitoring of the older population, for early detection of changes in health conditions, has been shown in the literature, as the key to a successful clinical intervention. We have been investigating environmentally-embedded in-home networks of non-invasive sensing modalities. This dissertation concentrates on the signal processing techniques required for the robust extraction of morphological features from the ballistocardiographs (BCG), and machine learning approaches to utilize these features in non-invasive monitoring of cardiovascular conditions. At first, enhancements in the time domain detection of the cardiac cycle are addressed due to its importance in the estimation of heart rate variability (HRV) and sleep stages. The proposed enhancements in the energy-based algorithm for BCG beat detection have shown at least 50% improvement in the root mean square error (RMSE) of the beat to beat heart rate estimations compared to the reference estimations from the electrocardiogram (ECG) R to R intervals. These results are still subject to some errors, primarily due to the contamination of noise and motion artifacts caused by floor vibration, unconstrained subject movements, or even the respiratory activities. Aging, diseases, breathing, and sleep disorders can also affect the quality of estimation as they slightly modify the morphology of the BCG waveform.Includes bibliographical reference

    Symmetry-Adapted Machine Learning for Information Security

    Get PDF
    Symmetry-adapted machine learning has shown encouraging ability to mitigate the security risks in information and communication technology (ICT) systems. It is a subset of artificial intelligence (AI) that relies on the principles of processing future events by learning past events or historical data. The autonomous nature of symmetry-adapted machine learning supports effective data processing and analysis for security detection in ICT systems without the interference of human authorities. Many industries are developing machine-learning-adapted solutions to support security for smart hardware, distributed computing, and the cloud. In our Special Issue book, we focus on the deployment of symmetry-adapted machine learning for information security in various application areas. This security approach can support effective methods to handle the dynamic nature of security attacks by extraction and analysis of data to identify hidden patterns of data. The main topics of this Issue include malware classification, an intrusion detection system, image watermarking, color image watermarking, battlefield target aggregation behavior recognition model, IP camera, Internet of Things (IoT) security, service function chain, indoor positioning system, and crypto-analysis
    corecore