Performance comparison of seizure detection methods using EEG of newborns for implementation of a DSP subsystem

Author(s):  
Mesbah ◽  
Boashash
2021 ◽  
Vol 11 (5) ◽  
pp. 668
Author(s):  
Sani Saminu ◽  
Guizhi Xu ◽  
Zhang Shuai ◽  
Isselmou Abd El Kader ◽  
Adamu Halilu Jabire ◽  
...  

The benefits of early detection and classification of epileptic seizures in analysis, monitoring and diagnosis for the realization and actualization of computer-aided devices and recent internet of medical things (IoMT) devices can never be overemphasized. The success of these applications largely depends on the accuracy of the detection and classification techniques employed. Several methods have been investigated, proposed and developed over the years. This paper investigates various seizure detection algorithms and classifications in the last decade, including conventional techniques and recent deep learning algorithms. It also discusses epileptiform detection as one of the steps towards advanced diagnoses of disorders of consciousness (DOCs) and their understanding. A performance comparison was carried out on the different algorithms investigated, and their advantages and disadvantages were explored. From our survey, much attention has recently been paid to exploring the efficacy of deep learning algorithms in seizure detection and classification, which are employed in other areas such as image processing and classification. Hybrid deep learning has also been explored, with CNN-RNN being the most popular.


Energies ◽  
2020 ◽  
Vol 13 (10) ◽  
pp. 2509 ◽  
Author(s):  
Kamran Shaukat ◽  
Suhuai Luo ◽  
Vijay Varadharajan ◽  
Ibrahim A. Hameed ◽  
Shan Chen ◽  
...  

Cyberspace has become an indispensable factor for all areas of the modern world. The world is becoming more and more dependent on the internet for everyday living. The increasing dependency on the internet has also widened the risks of malicious threats. On account of growing cybersecurity risks, cybersecurity has become the most pivotal element in the cyber world to battle against all cyber threats, attacks, and frauds. The expanding cyberspace is highly exposed to the intensifying possibility of being attacked by interminable cyber threats. The objective of this survey is to bestow a brief review of different machine learning (ML) techniques to get to the bottom of all the developments made in detection methods for potential cybersecurity risks. These cybersecurity risk detection methods mainly comprise of fraud detection, intrusion detection, spam detection, and malware detection. In this review paper, we build upon the existing literature of applications of ML models in cybersecurity and provide a comprehensive review of ML techniques in cybersecurity. To the best of our knowledge, we have made the first attempt to give a comparison of the time complexity of commonly used ML models in cybersecurity. We have comprehensively compared each classifier’s performance based on frequently used datasets and sub-domains of cyber threats. This work also provides a brief introduction of machine learning models besides commonly used security datasets. Despite having all the primary precedence, cybersecurity has its constraints compromises, and challenges. This work also expounds on the enormous current challenges and limitations faced during the application of machine learning techniques in cybersecurity.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Puneet Dheer ◽  
Ganne Chaitanya ◽  
Diana Pizarro ◽  
Rosana Esteller ◽  
Kaushik Majumdar ◽  
...  

Objective. Studies have demonstrated the utility of closed-loop neuromodulation in treating focal onset seizures. There is an utmost need of neurostimulation therapy for generalized tonic-clonic seizures. The study goals are to map the thalamocortical network dynamics during the generalized convulsive seizures and identify targets for reliable seizure detection. Methods. Local field potentials were recorded from bilateral cortex, hippocampi, and centromedian thalami in Sprague-Dawley rats. Pentylenetetrazol was used to induce multiple convulsive seizures. The performances of two automated seizure detection methods (line length and P-operators) as a function of different cortical and subcortical structures were estimated. Multiple linear correlations-Granger’s Causality was used to determine the effective connectivity. Results. Of the 29 generalized tonic-clonic seizures analyzed, line length detected 100% of seizures in all the channels while the P-operator detected only 35% of seizures. The detection latencies were shortest in the thalamus in comparison to the cortex. There was a decrease in amplitude correlation within the thalamocortical network during the seizure, and flow of information was decreased from thalamus to hippocampal-parietal nodes. Significance. The preclinical study confirms thalamus as a superior target for automated detection of generalized seizures and modulation of synchrony to increase coupling may be a strategy to abate seizures.


2008 ◽  
Vol E91-B (6) ◽  
pp. 1734-1742 ◽  
Author(s):  
X. N. TRAN ◽  
H. C. HO ◽  
T. FUJINO ◽  
Y. KARASAWA

2014 ◽  
Vol 971-973 ◽  
pp. 1680-1683
Author(s):  
Miao He ◽  
Li Yu Tian ◽  
Xiong Jun Fu ◽  
Yun Chen Jiang

In wideband radar situation, target-spread and all scattering points back wave could be considered as the pulse train of random parameters. The wideband radar target and built the related model. Then it gave two methods of target detection, one is Energy Accumulation and the other is the IPTRP. It also presented the simulation result of these two methods performance curves. It showed that the IPTRP improved by more than 3dB in the same SNR.


Optik ◽  
2014 ◽  
Vol 125 (12) ◽  
pp. 2963-2969
Author(s):  
Chungang Wang ◽  
Wenquan Feng ◽  
Chunsheng Li

Sign in / Sign up

Export Citation Format

Share Document