47 research outputs found

    EEG-based biometric authentication modelling using incremental fuzzy-rough nearest neighbour technique

    Get PDF
    This paper proposes an Incremental Fuzzy-Rough Nearest Neighbour (IncFRNN) technique for biometricauthentication modelling using feature extracted visual evoked. Only small training set is needed for model initialisation. Theembedded heuristic update method adjusts the knowledge granules incrementally to maintain all representativeelectroencephalogram (EEG) signal patterns and eliminate those rarely used. It reshapes the personalized knowledge granulesthrough insertion and deletion of a test object, based on similarity measures. A predefined window size can be used to reducethe overall processing time. This proposed algorithm was verified with test data from 37 healthy subjects. Signal pre-processingsteps on segmentation, filtering and artefact rejection were carried out to improve the data quality before model building. Theexperimental paradigm was designed in three different conditions to evaluate the authentication performance of the IncFRNNtechnique against the benchmarked incremental K-Nearest Neighbour (KNN) technique. The performance was measured interms of accuracy, area under the Receiver Operating Characteristic (ROC) curve (AUC) and Cohen's Kappa coefficient. Theproposed IncFRNN technique is proven to be statistically better than the KNN technique in the controlled window sizeenvironment. Future work will focus on the use of dynamic data features to improve the robustness of the proposed model

    EEG-Based Biometric Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique

    Get PDF
    This paper proposes an Incremental Fuzzy-Rough Nearest Neighbour (IncFRNN) technique for biometric authentication modelling using feature extracted visual evoked. Only small training set is needed for model initialisation. The embedded heuristic update method adjusts the knowledge granules incrementally to maintain all representative electroencephalogram (EEG) signal patterns and eliminate those rarely used. It reshapes the personalized knowledge granules through insertion and deletion of a test object, based on similarity measures. A predefined window size can be used to reduce the overall processing time. This proposed algorithm was verified with test data from 37 healthy subjects. Signal pre-processing steps on segmentation, filtering and artefact rejection were carried out to improve the data quality before model building. The experimental paradigm was designed in three different conditions to evaluate the authentication performance of the IncFRNN technique against the benchmarked incremental K-Nearest Neighbour (KNN) technique. The performance was measured in terms of accuracy, area under the Receiver Operating Characteristic (ROC) curve (AUC) and Cohen's Kappa coefficient. The proposed IncFRNN technique is proven to be statistically better than the KNN technique in the controlled window size environment. Future work will focus on the use of dynamic data features to improve the robustness of the proposed model

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique

    Get PDF
    High level security has nurtured the arisen of Electroencephalograms (EEG) signals as a noteworthy biometrics modality for person authentication modelling. Modelling distinctive characteristics among individuals, especially in a dynamic environment involves incremental knowledge updates from time to time. K-Nearest Neighbour (KNN) is a well-known incremental learning method which applies First-In-First-Out (FIFO) knowledge update strategy. However, it is not suitable for person authentication modelling because it cannot preserve the representative EEG signals patterns when individual characteristics changes over time. Fuzzy-Rough Nearest Neighbours (FRNN) technique is an outstanding technique to model uncertainty under an imperfect data condition. The current implementation of FRNN technique is not designed for incremental learning problem because there is no update function to incrementally reshape and reform the existing knowledge granules. Thus, this research aims to design an Incremental FRNN (IncFRNN) technique for person authentication modelling using feature extracted EEG signals from VEP electrodes. The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. EEG signals such as visual evoked potential (VEP) is unique but highly uncertain and difficult to process.There exists no consistant agreement on suitable feature extraction methods and VEP electrodes in the past literature. The experimental comparison in this research has suggested eight significant electrodes set located at the occipital area. Similarly, six feature extraction methods, i.e. Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. The correlation-based feature selection (CFS) method was used to select representative WPD vector subset to eliminate redundancy before combining with other features. The electrodes, feature extraction, and feature selection analysis were tested using the benchmarking dataset from UCI repositories. The IncFRNN technique was evaluated using a collected EEG data from 37 subjects. The recorded datasets were designed in three different conditions of ambient noise influence to evaluate the performance of the proposed solution. The proposed IncFRNN technique was compared with its predecessor, the FRNN and IBk technique. Accuracy and area under ROC curve (AUC) were used to measure the authentication performance. The IncFRNN technique has achieved promising results. The results have been further validated and proven significant statistically using paired sample ttest and Wilcoxon sign-ranked test. The heuristic incremental update is able to preserve the core set of individual biometrics characteristics through representative EEG signals patterns in person authentication modelling. Future work should focus on the noise management in data acquisition and modelling process to improve the robustness of the proposed person authentication model

    Distraction descriptor for brainprint authentication modelling using probability-based incremental fuzzy-rough nearest neighbour technique

    Get PDF
    The characteristics of uniqueness and proof of aliveness have driven the research in Brainprint as a biometric modality. Brainprint measuring by Electroencephalogram (EEG) suffers from low signal-to-noise ratio and are varied across time. Most of the brainprint authentication models were tested in well-controlled environments to minimize the influence of ambient disturbance on the EEG signals. These settings significantly contradict the real- world situations. Thus, making use of the distraction is wiser than eliminating it. This research aims to design a distraction descriptor, elicited through the object variation, to refine the granular knowledge incrementally, using the proposed probability-based update strategy in Incremental Fuzzy-Rough Nearest Neighbor (IncFRNN) technique. The research follows the experimental methodology, starting from data acquisition to data imputation, EEG distraction descriptor, probability-based IncFRNN and model analysis. The EEG of 45 volunteer human subjects were collected using visual stimuli in three levels of auditory ambient distraction, which are in quiet, low, and high distraction conditions. An artefact rejection with amplitude greater than 100 µV was applied for data cleaning. Occasionally, missing values occurred after removing the noisy trials. A similarity matching imputation method is proposed for EEG data imputation. The power spectral density, wavelet phase stability, and coherence were used as feature extraction methods. The probability-based IncFRNN technique was used to construct the learning model. The proposed probability- based incremental update strategy is benchmarked with the ground truth (actual class) incremental update strategy. Besides, the proposed technique is also benchmarked with First- In-First-Out (FIFO) incremental update strategy in K-Nearest Neighbour (KNN). The authentication accuracy, area under receiver operating characteristic curve, recall, precision, and the F-measure were used to evaluate the proposed technique. The experimental results have shown equivalence discriminatory performance in both high distraction and quiet conditions. This has proven that the proposed distraction descriptor is able to utilize the unique EEG response towards ambient distraction to complement person authentication modelling in the uncontrolled environment. However, the authentication results in low distraction condition are significantly worse than both the quiet and high distraction conditions. This might because the distraction is too mild to elicit the cognitive measures representing individual characteristics. The probability-based IncFRNN technique has significantly outperformed the KNN technique for both with and without defining the window size threshold. Nevertheless, its performance is slightly worse than the actual class incremental update strategy since the ground truth represents the gold standard. In overall, this study demonstrated a more practical brainprint authentication model with the proposed distraction descriptor and the probability-based incremental update strategy. However, the data acquisition was carried out in a single session. The EEG distraction descriptor may vary due to intersession variability. Future research should focus on the intersession variability to improve the robustness of the brainprint authentication model

    A survey of the application of soft computing to investment and financial trading

    Get PDF

    Recent Developments in Smart Healthcare

    Get PDF
    Medicine is undergoing a sector-wide transformation thanks to the advances in computing and networking technologies. Healthcare is changing from reactive and hospital-centered to preventive and personalized, from disease focused to well-being centered. In essence, the healthcare systems, as well as fundamental medicine research, are becoming smarter. We anticipate significant improvements in areas ranging from molecular genomics and proteomics to decision support for healthcare professionals through big data analytics, to support behavior changes through technology-enabled self-management, and social and motivational support. Furthermore, with smart technologies, healthcare delivery could also be made more efficient, higher quality, and lower cost. In this special issue, we received a total 45 submissions and accepted 19 outstanding papers that roughly span across several interesting topics on smart healthcare, including public health, health information technology (Health IT), and smart medicine

    Pattern Recognition

    Get PDF
    A wealth of advanced pattern recognition algorithms are emerging from the interdiscipline between technologies of effective visual features and the human-brain cognition process. Effective visual features are made possible through the rapid developments in appropriate sensor equipments, novel filter designs, and viable information processing architectures. While the understanding of human-brain cognition process broadens the way in which the computer can perform pattern recognition tasks. The present book is intended to collect representative researches around the globe focusing on low-level vision, filter design, features and image descriptors, data mining and analysis, and biologically inspired algorithms. The 27 chapters coved in this book disclose recent advances and new ideas in promoting the techniques, technology and applications of pattern recognition

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Personality Identification from Social Media Using Deep Learning: A Review

    Get PDF
    Social media helps in sharing of ideas and information among people scattered around the world and thus helps in creating communities, groups, and virtual networks. Identification of personality is significant in many types of applications such as in detecting the mental state or character of a person, predicting job satisfaction, professional and personal relationship success, in recommendation systems. Personality is also an important factor to determine individual variation in thoughts, feelings, and conduct systems. According to the survey of Global social media research in 2018, approximately 3.196 billion social media users are in worldwide. The numbers are estimated to grow rapidly further with the use of mobile smart devices and advancement in technology. Support vector machine (SVM), Naive Bayes (NB), Multilayer perceptron neural network, and convolutional neural network (CNN) are some of the machine learning techniques used for personality identification in the literature review. This paper presents various studies conducted in identifying the personality of social media users with the help of machine learning approaches and the recent studies that targeted to predict the personality of online social media (OSM) users are reviewed

    Semi-automatic liquid filling system using NodeMCU as an integrated Iot Learning tool

    Get PDF
    Computer programming and IoT are the key skills required in Industrial Revolution 4.0 (IR4.0). The industry demand is very high and therefore related students in this field should grasp adequate knowledge and skill in college or university prior to employment. However, learning technology related subject without applying it to an actual hardware can pose difficulty to relate the theoretical knowledge to problems in real application. It is proven that learning through hands-on activities is more effective and promotes deeper understanding of the subject matter (He et al. in Integrating Internet of Things (IoT) into STEM undergraduate education: Case study of a modern technology infused courseware for embedded system course. Erie, PA, USA, pp 1–9 (2016)). Thus, to fulfill the learning requirement, an integrated learning tool that combines learning of computer programming and IoT control for an industrial liquid filling system model is developed and tested. The integrated learning tool uses NodeMCU, Blynk app and smartphone to enable the IoT application. The system set-up is pre-designed for semi-automation liquid filling process to enhance hands-on learning experience but can be easily programmed for full automation. Overall, it is a user and cost friendly learning tool that can be developed by academic staff to aid learning of IoT and computer programming in related education levels and field
    corecore