【摘 要】
:
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this pap
【机 构】
:
School of Information Engineering,China University of Geosciences in Beijing,Beijing 100083,China;In
论文部分内容阅读
Automatic identification of intracranial electroencephalogram (iEEG) signals has become more and more important in the field of medical diagnostics. In this paper, an optimized neural network classifier is proposed based on an improved feature extraction method for the identification of iEEG epileptic seizures. Four kinds of entropy, Sample entropy, Approximate entropy, Shannon entropy, Log energy entropy are extracted from the database as the feature vectors of Neural network (NN) during the identification process. Four kinds of classification tasks, namely Pre-ictal v Post-ictal (CD), Pre-ictal v Epileptic (CE), Post-ictal v Epileptic (DE), Pre-ictal v Post-ictal v Epileptic (CDE), are used to test the effect of our classification method. The experimental results show that our algorithm achieves higher performance in all tasks than previous algorithms. The effect of hidden layer nodes number is investigated by a constructive approach named growth method. We obtain the optimized number ranges of hidden layer nodes for the binary classification problems CD, CE, DE, and the multitask classification problem CDE, respectively.
其他文献
In recent decades, a number of protocols for Remote data integrity checking (RDIC) have been proposed.Identity (ID) based RDIC protocols are constructed to guar
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe
In this paper, we propose a fully automatic mesh segmentation method, which divides meshes into sub-meshes recursively through spectral analysis. A common problem in the spectral analysis of geometric
In this paper, based on a result of Lidl and Mullen (Mathematical Journal of Okayama University, 1991), the maximum length and the second maximum length that ca
An algorithm for output spectrum analysis of nonlinear system with correlative sources is proposed. First, the output terms of nonlinear system are analyzed bas
Automated human facial image deidentification is a much-needed technology for privacypreserving social media and intelligent surveillance applications. We propose a novel utility preserved facial imag
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing t
Network on a chip (NoC) uses packet-switched network to implement interconnections in System on chip (SoC). In SoC design, performance and energy efficiency are
Inspired by the self-similar fractal proper-ties of chaotic attractors and the heuristics of similarity filtering of images, a novel chaotic signal denoising al
In order to reduce the volume, weight and cost of conventional hybrid energy storage system (HESS) while properly exploring the complementary features of differ