2015 IEEE 15th International Conference on Bioinformatics and Bioengineering (BIBE) 2015
DOI: 10.1109/bibe.2015.7367628
|View full text |Cite
|
Sign up to set email alerts
|

False alarm suppression in early prediction of cardiac arrhythmia

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Roychoudhury et al ( 50 ), Wang et al ( 49 ) and Srivastava et al ( 61 ) use data from the MIMIC-II database ( 18 ) for detecting false arrhythmia alarms. Roychoudhury et al ( 50 ) developed a method for extracting shapelets from the ECG signal that are distinctive for false alarms concerning ASY and VT that can be matched for prediction while considering some uncertainty. The other two publications present classical machine learning (ML) systems.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Roychoudhury et al ( 50 ), Wang et al ( 49 ) and Srivastava et al ( 61 ) use data from the MIMIC-II database ( 18 ) for detecting false arrhythmia alarms. Roychoudhury et al ( 50 ) developed a method for extracting shapelets from the ECG signal that are distinctive for false alarms concerning ASY and VT that can be matched for prediction while considering some uncertainty. The other two publications present classical machine learning (ML) systems.…”
Section: Resultsmentioning
confidence: 99%
“…This is the case in (43)(44)(45)(46)(47) Furthermore, the MIMIC-II database is an important material in alarm fatigue research. MIMIC-II is used by (36,(48)(49)(50)(51)(52)(53). It is, however, noteworthy that specifically MIMIC-II is used while its successor MIMIC-III (54) and other ICU databases such as HiRID (55) and eICU CRD (56) are not even mentioned in the publications under review.…”
Section: Datamentioning
confidence: 99%
“…Another example in network security, the application associated with TCP flow can be identified at an early stage by observing the initial few packets of TCP traffic flow and as a result no need to observe the complete flow of TCP connection 3 . Also, early classification has demonstrated its usefulness in various domains as well as in applications such as early event detection, 4,5 health informatics 1,6 and process control in industries 7 …”
Section: Introductionmentioning
confidence: 99%
“…1,2 Another example in network security, the application associated with TCP flow can be identified at an early stage by observing the initial few packets of TCP traffic flow and as a result no need to observe the complete flow of TCP connection. 3 Also, early classification has demonstrated its usefulness in various domains as well as in applications such as early event detection, 4,5 health informatics 1,6 and process control in industries. 7 In recent years, many extensions of conventional classification problems for sequence data have been explored such as early classification, [7][8][9][10][11][12] semisupervised classification, 13,14 and sequence to sequence classification.…”
Section: Introductionmentioning
confidence: 99%