5 research outputs found

    Study of non-invasive cognitive tasks and feature extraction techniques for brain-computer interface (BCI) applications

    Get PDF
    A brain-computer interface (BCI) provides an important alternative for disabled people that enables the non-muscular communication pathway among individual thoughts and different assistive appliances. A BCI technology essentially consists of data acquisition, pre-processing, feature extraction, classification and device command. Indeed, despite the valuable and promising achievements already obtained in every component of BCI, the BCI field is still a relatively young research field and there is still much to do in order to make BCI become a mature technology. To mitigate the impediments concerning BCI, the study of cognitive task together with the EEG feature and classification framework have been investigated. There are four distinct experiments have been conducted to determine the optimum solution to those specific issues. In the first experiment, three cognitive tasks namely quick math solving, relaxed and playing games have been investigated. The features have been extracted using power spectral density (PSD), logenergy entropy, and spectral centroid and the extracted feature has been classified through the support vector machine (SVM), K-nearest neighbor (K-NN), and linear discriminant analysis (LDA). In this experiment, the best classification accuracy for single channel and five channel datasets were 86% and 91.66% respectively that have been obtained by the PSD-SVM approach. The wink based facial expressions namely left wink, right wink and no wink have been studied through fast Fourier transform (FFT) and sample range feature and then the extracted features have been classified using SVM, K-NN, and LDA. The best accuracy (98.6%) has been achieved by the sample range-SVM based approach. The eye blinking based facial expression has been investigated following the same methodology as the study of wink based facial expression. Moreover, the peak detection approach has also been employed to compute the number of blinks. The optimum accuracy of 99% has been achieved using the peak detection approach. Additionally, twoclass motor imagery hand movement has been classified using SVM, K-NN, and LDA where the feature has been extracted through PSD, spectral centroid and continuous wavelet transform (CWT). The optimum 74.7% accuracy has been achieved by the PSDSVM approach. Finally, two device command prototypes have been designed to translate the classifier output. One prototype can translate four types of cognitive tasks in terms of 5 watts four different colored bulbs, whereas, another prototype may able to control DC motor utilizing cognitive tasks. This study has delineated the implementation of every BCI component to facilitate the application of brainwave assisted assistive appliances. Finally, this thesis comes to the end by drawing the future direction regarding the current issues of BCI technology and these directions may significantly enhance usability for the implementation of commercial applications not only for the disabled but also for a significant number of healthy users

    EEG Biometrics During Sleep and Wakefulness: Performance Optimization and Security Implications

    Get PDF
    L’internet des objets et les mĂ©gadonnĂ©es ont un grand choix de domaines d’application. Dans les soins de santĂ© ils ont le potentiel de dĂ©clencher les diagnostics Ă  distance et le suivi en temps rĂ©el. Les capteurs pour la santĂ© et la tĂ©lĂ©mĂ©decine promettent de fournir un moyen Ă©conomique et efficace pour dĂ©centraliser des hĂŽpitaux en soulageant leur charge. Dans ce type de systĂšme, la prĂ©sence physique n’est pas contrĂŽlĂ©e et peut engendrer des fraudes d’identitĂ©. Par consĂ©quent, l'identitĂ© du patient doit ĂȘtre confirmĂ©e avant que n'importe quelle dĂ©cision mĂ©dicale ou financiĂšre soit prise basĂ©e sur les donnĂ©es surveillĂ©es. Des mĂ©thodes d’identification/authentification traditionnelles, telles que des mots de passe, peuvent ĂȘtre donnĂ©es Ă  quelqu’un d’autre. Et la biomĂ©trie basĂ©e sur trait, telle que des empreintes digitales, peut ne pas couvrir le traitement entier et mĂšnera Ă  l’utilisation non autorisĂ©e post identification/authentification. Un corps naissant de recherche propose l’utilisation d’EEG puisqu’il prĂ©sente des modĂšles uniques difficiles Ă  Ă©muler et utiles pour distinguer des sujets. NĂ©anmoins, certains inconvĂ©nients doivent ĂȘtre surmontĂ©s pour rendre possible son adoption dans la vraie vie : 1) nombre d'Ă©lectrodes, 2) identification/authentification continue pendant les diffĂ©rentes tĂąches cognitives et 3) la durĂ©e d’entraĂźnement et de test. Pour adresser ces points faibles et leurs solutions possibles ; une perspective d'apprentissage machine a Ă©tĂ© employĂ©e. PremiĂšrement, une base de donnĂ©es brute de 38 sujets aux Ă©tapes d'Ă©veil (AWA) et de sommeil (Rem, S1, S2, SWS) a Ă©tĂ© employĂ©e. En effet, l'enregistrement se fait sur chaque sujet Ă  l’aide de 19 Ă©lectrodes EEG du cuir chevelu et ensuite des techniques de traitement de signal ont Ă©tĂ© appliquĂ©es pour enlever le bruit et faire l’extraction de 20 attribut dans le domaine frĂ©quentiel. Deux ensembles de donnĂ©es supplĂ©mentaires ont Ă©tĂ© crĂ©Ă©s : SX (tous les stades de sommeil) et ALL (vigilance + tous les stades de sommeil), faisant 7 le nombre d’ensembles de donnĂ©es qui ont Ă©tĂ© analysĂ©s dans cette thĂšse. En outre, afin de tester les capacitĂ©s d'identification et d'authentification tous ces ensembles de donnĂ©es ont Ă©tĂ© divises en les ensembles des LĂ©gitimes et des Intrus. Pour dĂ©terminer quels sujets devaient appartenir Ă  l’ensemble des LĂ©gitimes, un ratio de validation croisĂ©e de 90-10% a Ă©tĂ© Ă©valuĂ© avec diffĂ©rentes combinaisons en nombre de sujets. A la fin, un Ă©quilibre entre le nombre de sujets et la performance des algorithmes a Ă©tĂ© trouvĂ© avec 21 sujets avec plus de 44 epochs dans chaque Ă©tape. Le reste (16 sujets) appartient Ă  l’ensemble des Intrus.De plus, un ensemble Hold-out (4 epochs enlevĂ©es au hasard de chaque sujet dans l’ensemble des LĂ©gitimes) a Ă©tĂ© crĂ©Ă© pour Ă©valuer des rĂ©sultats dans les donnĂ©es qui n'ont Ă©tĂ© jamais employĂ©es pendant l’entraĂźnement.----------ABSTRACT : Internet of Things and Big Data have a variety of application domains. In healthcare they have the potential to give rise to remote health diagnostics and real-time monitoring. Health sensors and telemedicine applications promise to provide and economic and efficient way to ease patients load in hospitals. The lack of physical presence introduces security risks of identity fraud in this type of system. Therefore, patient's identity needs to be confirmed before any medical or financial decision is made based on the monitored data. Traditional identification/authentication methods, such as passwords, can be given to someone else. And trait-based biometrics, such as fingerprints, may not cover the entire treatment and will lead to unauthorized post-identification/authentication use. An emerging body of research proposes the use of EEG as it exhibits unique patterns difficult to emulate and useful to distinguish subjects. However certain drawbacks need to be overcome to make possible the adoption of EEG biometrics in real-life scenarios: 1) number of electrodes, 2) continuous identification/authentication during different brain stimulus and 3) enrollment and identification/authentication duration. To address these shortcomings and their possible solutions; a machine learning perspective has been applied. Firstly, a full night raw database of 38 subjects in wakefulness (AWA) and sleep stages (Rem, S1, S2, SWS) was used. The recording consists of 19 scalp EEG electrodes. Signal pre-processing techniques were applied to remove noise and extract 20 features in the frequency domain. Two additional datasets were created: SX (all sleep stages) and ALL (wakefulness + all sleep stages), making 7 the number of datasets that were analysed in this thesis. Furthermore, in order to test identification/authentication capabilities all these datasets were split in Legitimates and Intruders sets. To determine which subjects were going to belong to the Legitimates set, a 90-10% cross validation ratio was evaluated with different combinations in number of subjects. At the end, a balance between the number of subjects and algorithm performance was found with 21 subjects with over 44 epochs in each stage. The rest (16 subjects) belongs to the Intruders set. Also, a Hold out set (4 randomly removed epochs from each subject in the Legitimate set) was produced to evaluate results in data that has never been used during training

    EEG feature selection and the use of Lyapunov exponents for EEG-based biometrics

    No full text
    In recent years, there has been a growing increase in the use of electroencephalographic (EEG) signals for biometric systems. In investigating the use of EEG-based biometrics in a smart-device environment, this study focused on the development of a specific feature selection method, and on the feasibility of nonlinear dynamic characteristics of EEG signals for identifying individuals. We recorded sixteen EEG channel signals from seven subjects during two minutes in resting state with eyes closed, for a minimum of five times over several days. Power spectral density and the maximum Lyapunov exponents were calculated for the individual EEG characteristics. A specific criteria index (CI) that consisted of three types of variances was developed to quantify the level of EEG features, and to select adequate feature candidates with not only a low intra-subject variability but also high inter-subject discrimination. Statistical t-tests and a preliminary classification test using a linear support vector machine (SVM) classifier quantified the performance of feature selection, giving an accuracy rate of 94.9% for identifying each individual. In addition, they also revealed that the maximum Lyapunov exponents are one of the most feasible features for an EEG-biometric system, with an accuracy rate of 85.5% when using only maximum Lyapunov exponents from two EEG channels (T4, F4)

    25th Annual Computational Neuroscience Meeting: CNS-2016

    Get PDF
    Abstracts of the 25th Annual Computational Neuroscience Meeting: CNS-2016 Seogwipo City, Jeju-do, South Korea. 2–7 July 201

    25th annual computational neuroscience meeting: CNS-2016

    Get PDF
    The same neuron may play different functional roles in the neural circuits to which it belongs. For example, neurons in the Tritonia pedal ganglia may participate in variable phases of the swim motor rhythms [1]. While such neuronal functional variability is likely to play a major role the delivery of the functionality of neural systems, it is difficult to study it in most nervous systems. We work on the pyloric rhythm network of the crustacean stomatogastric ganglion (STG) [2]. Typically network models of the STG treat neurons of the same functional type as a single model neuron (e.g. PD neurons), assuming the same conductance parameters for these neurons and implying their synchronous firing [3, 4]. However, simultaneous recording of PD neurons shows differences between the timings of spikes of these neurons. This may indicate functional variability of these neurons. Here we modelled separately the two PD neurons of the STG in a multi-neuron model of the pyloric network. Our neuron models comply with known correlations between conductance parameters of ionic currents. Our results reproduce the experimental finding of increasing spike time distance between spikes originating from the two model PD neurons during their synchronised burst phase. The PD neuron with the larger calcium conductance generates its spikes before the other PD neuron. Larger potassium conductance values in the follower neuron imply longer delays between spikes, see Fig. 17.Neuromodulators change the conductance parameters of neurons and maintain the ratios of these parameters [5]. Our results show that such changes may shift the individual contribution of two PD neurons to the PD-phase of the pyloric rhythm altering their functionality within this rhythm. Our work paves the way towards an accessible experimental and computational framework for the analysis of the mechanisms and impact of functional variability of neurons within the neural circuits to which they belong
    corecore