2020
DOI: 10.1177/1550147720911009
|View full text |Cite
|
Sign up to set email alerts
|

General model for best feature extraction of EEG using discrete wavelet transform wavelet family and differential evolution

Abstract: Wavelet family and differential evolution are proposed for categorization of epilepsy cases based on electroencephalogram (EEG) signals. Discrete wavelet transform is widely used in feature extraction step because it efficiently works in this field, as confirmed by the results of previous studies. The feature selection step is used to minimize dimensionality by excluding irrelevant features. This step is conducted using differential evolution. This article presents an efficient model for EEG classification by … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 60 publications
(29 citation statements)
references
References 41 publications
0
29
0
Order By: Relevance
“…The essential challenges in the implementation and use of a WMSN are associated with the patient's privacy and the credibility of the received medical instructions [3]. Due to the open nature of wireless networks, unauthorized parties can access, modify, and forward the transmitted messages to deliver incorrect instructions or advice to patients [7,8]. It is particularly dangerous if the unauthorized party is able to instruct the patient to disable the wearable sensor devices, such as heart pumps [9].…”
Section: Introductionmentioning
confidence: 99%
“…The essential challenges in the implementation and use of a WMSN are associated with the patient's privacy and the credibility of the received medical instructions [3]. Due to the open nature of wireless networks, unauthorized parties can access, modify, and forward the transmitted messages to deliver incorrect instructions or advice to patients [7,8]. It is particularly dangerous if the unauthorized party is able to instruct the patient to disable the wearable sensor devices, such as heart pumps [9].…”
Section: Introductionmentioning
confidence: 99%
“…The SAK-AKA scheme can support attractive security services such as full mutual authentication, perfect forward secrecy, and anonymity services [3], [4], [5], [6] [7]. Furthermore, the SAK-AKA scheme can resist numerous types of related attacks such as the denial of service (DOS), replay, desynchronization, and man-in-the-middle attacks [8], [10], [11]. The main authentication entities of the SAK-AKA scheme are the home subscriber server (HSS), mobility management entity (MME), and user equipment (UE) [3].…”
Section: Introductionmentioning
confidence: 99%
“…Today, the Internet of Things (IoT) healthcare system is in common use around the world. Its essential goal is to monitor a patient’s vital signs while a physician delivers treatment and medical advice remotely; moreover, it can reduce the number of the healthcare centers and bring expert medical care to remote areas where there is a shortage of them [ 1 , 2 , 3 , 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…In E2EA, the communication nodes of the IoT architecture are the gateway node (GWN), representing the healthcare service provider, the physician’s monitoring device (P i ), the patient’s smart device (SD j ), and the nodes (S k ) as illustrated in Figure 1 . The S k sensor nodes collect the patient’s vital signs and send them as an on-demand report to the SD j ; the S k actuator nodes receive medical orders from the P i through the SD j to perform a specific action such as turning on the insulin pumps [ 1 , 2 , 3 , 4 , 5 , 6 ]. Communication between the SD j and S k nodes is accomplished via the WMSN [ 1 , 2 , 3 , 4 , 5 , 6 , 12 ].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation