2006
DOI: 10.1109/iembs.2006.4398714
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Spike Sources using Proximity Analysis through Hidden Markov Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…The second most commonly investigated phase is the surgery itself, with the clinical problem frequently being the inter-operative identification of the DBS target. Every paper addressing this problem used MER analysis [10,14,21,28,33,37,39,59,63,68,70,72,76,77,78]. Instead of helping clinicians to aim for an anatomical structure, Lu et al [69] proposed a method to predict, by analyzing MER, whether or not the electrode lead is inside a clinically predefined therapeutic site of activation.…”
Section: Surgery Problemsmentioning
confidence: 99%
See 2 more Smart Citations
“…The second most commonly investigated phase is the surgery itself, with the clinical problem frequently being the inter-operative identification of the DBS target. Every paper addressing this problem used MER analysis [10,14,21,28,33,37,39,59,63,68,70,72,76,77,78]. Instead of helping clinicians to aim for an anatomical structure, Lu et al [69] proposed a method to predict, by analyzing MER, whether or not the electrode lead is inside a clinically predefined therapeutic site of activation.…”
Section: Surgery Problemsmentioning
confidence: 99%
“…From this perspective, pre-processing can be seen as a matter of degree. For example, for machine learning methods that process MERs as input, some use a spectral representation of the entire signal [37,63], whereas others use a spectrogram [61] or Haar wavelets [10], i.e. a mixed temporal/frequential representation, and others process the temporal signal directly without explicitly representing the frequency components [14].…”
Section: The Prominent Role Of Pre-processing and Feature Engineering...mentioning
confidence: 99%
See 1 more Smart Citation
“…Examples are a Linear Discriminant Classifier (LDC) or a Quadratic Discriminant Classifier (QDC) (Pinzon et al 2010). More sophisticated classifiers have also been used including Support Vector Machines (SVM) with Polynomial Kernel (Guillen et al 2011), and Hidden Markov Models (HMM) (Tahgva 2011;Orozco et al 2006).…”
Section: Introductionmentioning
confidence: 99%