ECG Anomaly Detection via Time Series Analysis
|
|
|
- Ada Quinn
- 10 years ago
- Views:
Transcription
1 ECG Anomaly Detection via Time Series Analysis Mooi Choo Chuah, Fen Fu Department of Computer Science & Engineering Lehigh University Abstract Recently, wireless sensor networks have been proposed for assisted living and residential monitoring. In such networks, physiological sensors are used to monitor vital signs e.g. heartbeats, pulse rates, oxygen saturation of senior citizens. Sensor data is sent periodically via wireless links to a personal computer that analyzes the data. In this paper, we propose an anomaly detection scheme based on time series analysis that will allow the computer to determine whether a stream of real-time sensor data contains any abnormal heartbeats. If anomaly exists, that time series segment will be transmitted via the network to a physician so that he/she can further diagnose the problem and take appropriate actions. When tested against the heartbeat data readings stored at the MIT database, our ECG anomaly scheme is shown to have better performance than another scheme that has been recently proposed. Our scheme enjoys an accuracy rate that varies from 7-9% while the other scheme has an accuracy that varies from 4-7%. I. Introduction Recent report [1] has indicated that an aging baby-boom generation is stressing the US healthcare system. Hospital administrators and other medical care-givers are looking for ways to maintain quality of care at reduced costs. Thus, some researchers [1] have proposed to shift from the familiar centralized, expert-driven, crisis-care model to one that allows senior citizens to live with informal caregivers e.g. family, friends, and community. They propose using wireless sensor networks that can provide capabilities that are valuable for continuous, remote monitoring [1]. In such sensor networks [1],[2],[9], wireless devices are integrated with a wide variety of environmental and medical sensors. Vital sign data can be collected automatically, thus enabling remote medical monitoring and diagnosis. It is envisioned that such a system needs to be designed efficiently since some of these monitoring devices run on battery and thus have limited power constraints. Usually sensor data is collected by some intermediate storage nodes which have higher wireless bandwidth. For better energy efficiency, the intermediate storage nodes can process these real-time streams to identify any abnormality. Once identified, only the abnormal data needs to be sent to the physician for further diagnosis while the rest of the normal data can be archived at the local storage nodes. The local storage nodes can further transfer such normal data to longer term storage units at a slower time scale (e.g. daily). The system can also provide a feature for the physician to request for more detailed immediate data from the local storage nodes or change the frequency of monitoring of the sensor nodes. Three important vital signs that are usually collected in such a medical sensor monitoring system are heartbeats, pulse rates and oxygen saturation. As described earlier, it is more energy efficient to transmit only abnormal data via wireless links. To decide if a real time sensor data stream contains abnormal data, one needs to use an anomaly detection scheme. In this paper, we propose an adaptive window-based discord discovery (AWDD) scheme to detect abnormal heartbeats within a series of heartbeat readings. Our scheme is an enhancement of the Brute Force Discord Discovery (BFDD) scheme proposed in [4]. Using the heartbeat records from the MIT-BIH arrhythmia database [3], we demonstrate that our AWDD scheme provides higher accuracy in distinguishing between
2 normal/abnormal heartbeats within a 4 seconds excerpts of heartbeat readings when compared to the BFDD. The rest of the paper is organized as follows: In Section II, we summarized related work. In Section III, we describe both the BFDD and the AWDD schemes. In Section IV, we present the training and test results when the two schemes are applied to the records selected from the MIT-BIH arrhythmia database. We conclude in Section V. II. Related work Heart arrhythmias result from any disturbance in the regularity, rate, site of origin or conduction of the cardiac electric impulse [1],[2]. There are two groups of arrhythmias [2]: (i) the first group is life threatening and includes ventricular fibrillation and tachycardia, and (ii) the second group is not life threatening but may require medical attention to prevent bigger problems. There are well researched and successful detectors for detection of the first group of arrhythmias. Such detectors have high sensitivity and specificity [3],[4],[5],[6],[7]. However, these detectors have been tested using data collected from expensive medical sensors. In our work, we hope to use cheaper medical sensor nodes which may generate more noisy data. Thus, we are focusing more on the detection of the second group events. Due to the limited power resources in a sensor-based medical information system, we need to use an anomaly detection scheme that is not computationally expensive. In a seminal paper [4], the authors introduce the new problem of finding time series discords. Time series discords are subsequences of a longer time series that are maximally different to all the rest of the time series subsequences. Time series discords have many uses for data mining including data cleaning, improving quality of clustering and anomaly detection. The authors in [4] propose two discord discovery algorithms, namely the Brute Force Discord Discovery (BFDD) and the Heuristic Discord Discovery (HDD) schemes. The BFDD scheme has a O(m 2 ) time complexity while the HDD can have an O(m) time complexity where m is the number of samples in the time series. The authors show that their schemes can be used to detect discords that exist within Electrocardiograms (ECGs) (which are a time series of the electrical potential between two points on the surface of the body caused by a beating heart). For example in Figure 1, the identified discord coincides with the annotated by a cardiologist as containing an anomalous heartbeat. The Adaptive Window Based Discord Discovery (AWDD) scheme that we design in this paper is motivated by the two schemes in [4], and will be described in more details in Section III. Figure 1: The time series discord in an excerpt of electrocardiogram qtdb/sel12 (marked in bold) which coincides with a premature ventricular contraction [4]. III. Overview of The BFDD and AWDD schemes A. Notations Used Before describing both the BFDD and the AWDD schemes that find discords in a time series, we first list the notations we use (which is the same as [4]):
3 Times Series: A time series T = t1,, tm is an ordered set of m real-valued variables. In this project, the real-valued variables are the heartbeat sensor readings. Subsequence: Given a time series T of length m, a subsequence C of T is a sampling of length n m of contiguous position from T, that is, C = tp,, tp+n-1 for 1 p m-n+1. Sliding Window: Given a time series T of length m, and a user-defined subsequence length of n, all possible subsequences can be extracted by sliding a window of size n across T and considering each subsequence Cp. Distance: Dist is a function that has C and M as inputs and returns a nonnegative value R, which is said to be the distance from M to C. For subsequent definitions to work we require that the function D be symmetric, that is, Dist(C,M) = Dist(M,C). Euclidean Distance: Given two time series Q and C of length n, the Euclidean distance between them is defined as: Dist(Q,C) = sqrt [ (qi - ci) 2 ]. Non-Self Match: Given a time series T, containing a subsequence C of length n beginning at position p and a matching subsequence M beginning at q, we say that M is a non-self match to C at distance of Dist(M,C) if p - q n. Time Series Discord: Given a time series T, the subsequence D of length n beginning at position l is said to be the discord of T if D has the largest distance to its nearest non-self match. That is, subsequence C of T, non-self match MD of D, and non-self match MC of C, min(dist(d, MD)) > min(dist(c, MC)). B. Adaptive Window Based Discord Discovery (AWDD) Scheme The original BFDD algorithm proposed in [4] is a one-pass algorithm which uses a fixed window size and hence a user needs to specify the window size. This algorithm compares a fixed length subsequence with another subsequence of the same length that is obtained by sliding down a given time series one sample at a time. Hence, the original BFDD scheme is very computational expensive. Our AWDD scheme is motivated by the BFDD scheme. The AWDD scheme is a two-pass approach with adaptive window size. In the first pass, we identify the peak points in the 4-seconds excerpts of heartbeat readings. Then, we consider only the subsequence that starts from a peak and ends at the next peak. The size of the sliding window is of one heartbeat s length, as illustrated in Figure 2. In Figure 2, RR-i denotes the heartbeat to heartbeat (denoted as RR) interval between heartbeats i and (i+1). As in the original BFDD scheme, each subsequence is normalized to have a mean of zero and a standard deviation of one before calling the euclidean distance function, since it is meaningless to compare time series with different offsets and amplitudes [8]. Note that we use only euclidean distance in this work. Figure 3 shows the effect of normalization on a subsequence of time series obtained from the patient record 25. In the second pass, we consider each possible subsequence, and find the distance between this and its nearest non-self match. The subsequence that has the largest distance is the discord. The of the discord is accomplished with nested loops, where the outer loop considers each possible candidate subsequence, and the inner loop is a linear scan to identify the candidate s nearest non-self match.
4 The time complexity of the AWDD scheme will be O(h 2 ) where h is the number of heartbeats but the technique that is used in HDD to reduce the time complexity to O(m) can be equally applied to the AWDD scheme to produce a scheme with a time complexity of O(h). As far as space is concerned, AWDD only requires an additional array to keep of peaks. Adaptive Window RR-1 RR-2 RR-3 RR-4 RR-5 RR-6 RR-7-2 Time (.3 Second) Figure 2. Adaptive Window Subsequence Before Normalization Time (.3 Second) (a) Time-Series Subsequence: Before Normalization Subsequence After Normalization Time (.3 Second) (b) Time-Series Subsequence: After Normalization Figure 3. Normalization of Time Series Subsequence For clarity, the pseudo code of the BFDD algorithm is shown in Figure 4(a), and our enhanced algorithm is shown in Figure 4(b). Since we are using adaptive windows, we make two more changes to determine and compare the discords. The first change is to ensure that we can compare subsequences of different lengths. To do this, we compress the longer subsequence to match the shorter one. The subsequences are normalized before any potential compression takes place. Figure 5 illustrates the effect of the compression on a subsequence of record 25.
5 (a) Pseudo Code for BFDD scheme (b) Pseudo-Code for the AWDD scheme Figure 4. Discord Discovery Schemes The next change is to deal with the fact that one subsequence-pair may have more samples than the other subsequence-pair and hence we cannot compare the computed distances directly. We overcome this by scaling all distances such that they correspond to the distance computed using the same number of samples. Figure 6 shows a 4-second ECG excerpt of the patient record 25 with samples from 29 th second to 33 th second. In this excerpt, abnormal heartbeats start from the th second and end at the 35.9 th second. When feeding this 4-second ECG excerpt to the discord discovery algorithm, our enhanced algorithm locates the discord at the th second. Its nearest non-self match is at the th second. Their distance is By checking the ECG record annotated by the cardiologists, we can tell that there is indeed an
6 anomaly sitting at the of the discord found by our algorithm. Figure 7 illustrates the two subsequences, where the discord and the nearest non-self match reside. Two Subsequences Before Compression Subsequence 1 Subsequence Time (.3 Second) (a) Normalized Time-Series Subsequence: Before Compression Two Subsequences After Compression Subsequence 1 Subsequence Time (.3 Second) (b) Normalized Time-Series Subsequence: After Compression Figure 5. Compression of Normalized Time Series Subsequence However, the discord found by the algorithm may or may not be an anomaly of the ECG excerpt. Thus, we use a configurable threshold to decide whether or not a discord is an anomaly. If the distance between the discord and its nearest non-self match exceeds the threshold, we determine that the discord found by our algorithm is an anomaly. Otherwise, our program will not flag this as an anomaly. This threshold is different for each patient and is found by training. 4-Second ECG Excerpt of Record 25 normal abnormal Time (Second) Figure 6. A Sample 4-Second ECG Excerpt from MIT-BIH Record 25 Discord and Nearest Non-Self Match Discord Nearest Non-Self Match Time (.3 Second) (a) Normalized & Compressed Discord & Nearest Non-Self Match: Distance = 7.843
7 Discord & Nearest Non-Self Match in Time Series z Discord Nearest Non-Self Match Time (Second) (b) Discord & Nearest Non-Self Match in the 4-Second ECG Excerpt (the same one as in Figure 6) Figure 7. Discord & Nearest Non-Self Match We select some subsets of data from each patient s records as the training data. Each set of training data consists of 5 non-overlapping 4-second excerpts from the same patient, with at least one abnormal heartbeat (an abnormal ECG time series), and another 5 nonoverlapping 4-second excerpts from the same patient, which do not contain any abnormal heartbeats (normal ECG time series). Then, we apply the algorithm to each set of training data. Our conjecture is that the distance for the discord in an abnormal ECG time series should be larger than the one in a normal ECG time series. A threshold can then be easily found to allow us to conclude if abnormal heartbeats exist. We will discuss how this threshold is chosen for each patient record and the results of applying this threshold to the test data set in Section IV. IV. Evaluation Results A. ECG Datasets Since our medical sensor boards are not ready yet, we use the ECG data from the MIT- BIH Arrhythmia Database [3]. The database contains 48 half-hour excerpts of twochannel ambulatory ECG recordings, obtained from 47 patients studied by the BIH Arrhythmia Laboratory. According to [3],[1], twenty-three of these recordings were chosen at random from a set of 4 24-hour ambulatory ECG recordings collected from a mixed population of inpatients (about 6%) and outpatients (about 4%) at Boston's Beth Israel Hospital; the other 25 recordings were selected from the same set to include less common but clinically significant arrhythmias that would not be well-represented in a small random sample. According to [3],[1], the recordings were digitized at 36 samples per second per channel with 11-bit resolution over a 1 mv range. Two or more cardiologists independently annotated each record; disagreements were resolved to obtain the computer-readable reference annotations for each beat (approximately 11, annotations in all) included with the database. Out of the 48 half-hour excerpts of twochannel ambulatory ECG recordings, we randomly select 6 half-hour excerpts, which are numbered as records 16, 18, 114, 25, 21, and 219 in the database. In each of the 6 half-hour ECG excerpts, we select 1 4-second excerpts, with 5 of them having abnormal heartbeats inside, and the other 5 having no abnormal heartbeats inside as the training set. We use the first channel ECG recordings, rather than use both channels ECG recordings. Later, we select another 1 4-second excerpts from the same patient records as the test dataset. B. Training & Testing using Record 16 The 1 4-second ECG excerpts chosen from record 16 for training purposes are listed in Table 1. The first 5 4-second excerpts contain at least one abnormal heartbeat, and the
8 remaining 5 excerpts do not contain any anomaly. The 3 rd column indicates the where the 1 st abnormal heartbeat starts. For example, the 1 st 4-second ECG excerpt from record 16 starts from the 8 th second and ends at the 12 th second, with the 1 st abnormal heartbeat starting from th second. Using the BFDD scheme, the window is shifted by one ECG sample each time in both the inner and outer loops. The discord found in each of the 1 4-second ECG excerpts from record 16 is listed in Table 2(a). The last column tells if the heartbeat that the discord belongs to is an abnormal heartbeat. The distance column, which is next to that last column, tells the distance between a discord and its nearest non-self match. We can see that for excerpts 1-5, which do contain abnormal heartbeats, the reported distance between the located discord and its non-self match exceeds 6.5, and for excerpts 6-1, which do not contain abnormal heartbeats, the reported distance never exceeds 6.5, except excerpt 6. So we could set a distance threshold of 6.5, knowing that excerpt 6 will be misclassified as having an anomaly if similar data appear in the test set. Table 1. 4-Second ECG Excerpts from MIT-BIH Record 16 Index of excerpts start point - end point 1 st anomaly s na na na na na Table 2(b) show the results of applying this threshold to the ten test datasets using the BFDD scheme. We see that with a threshold of 6.5, excerpts 1,3 and 5 will not be classified as abnormal and except 1 will be classified as abnormal. So, our accuracy is only 6% (with 3% false negative and 1% false positive) using the BFDD scheme. Table 2(a). Discords from the training set of MIT-BIH Record 16 using BFDD scheme index of excerpts start point - end point 1st anomaly s discord's nearest non-self match's distance between discord & nearest nonself match is the discord an anomaly in reality? No No Yes Yes Yes 6-4 na na Na 6.93 Na na na Na 3.32 Na na na Na 6.16 Na na na Na 3.32 Na na na Na 5. Na Table 2(b). Discords from the test set of MIT-BIH Record 16 using BFDD scheme
9 index of excerpts start point - end point 1st anomaly s discord's nearest non-self match's distance between discord & nearest nonself match is the discord an anomaly in reality? No No Yes Yes Yes na na Na 4.36 Na na na Na 4.12 Na na na Na 6.4 Na na na Na 4.58 Na na na Na 6.71 Na Next, we train the AWDD scheme using the same training dataset. Table 3(a) shows the discord found in each of the 1 4-second ECG excerpts from the training set of patient record 16. We can see that for excerpts 1-5, which do contain abnormal heartbeats, their distance exceeds 2, and for excerpts 6-1, which do not contain abnormal heartbeats, their distance never exceeds 2. Thus, we could set a distance threshold of 2. If the distance between a discord and its nearest non-self match exceeds 2, we will declare the discovered discord as an anomaly and a cardiologist needs to examine the patient s time series. Table 3(a). Discords from the training set of MIT-BIH Record 16 using AWDD scheme index of excerpts start point - end point 1st anomaly s discord's nearest non-self match's distance between discord & nearest nonself match is the discord an anomaly in reality? Yes Yes Yes Yes Yes 6-4 na na na 1.36 na na na na na na na na 1.49 na na na na 1.38 na na na na na In the test set shown in Table 3(b), all of the excerpts 1-5 have abnormal heartbeats. None of the excerpts 6-1 contain abnormal heartbeats. The results indicate that we can identify abnormality in excerpts 1-5 since the reported discord distance is greater than the threshold of 2 (which is chosen based on the training set). For excerpts 6-1 with normal heartbeats, only except 8, will report a discord distance which is slightly larger than the threshold of 2. Thus, we get an accuracy of 9% on this testing dataset using our adaptive window based discord discovery scheme. The false positive rate is 1%. Table 3(b). Discords from the test set of MIT-BIH Record 16 using AWDD scheme index of excerpts start point - end point C. Accuracy Comparison 1st anomaly s discord's nearest non-self match's distance between discord & nearest nonself match is the discord an anomaly in reality? Yes Yes Yes Yes Yes na na na na na na na na na na na 2.8 na na na na na na na na 1.6 na We repeatedly performed the above operations on 2 4-second excerpts selected from patient records 18, 114, 25, 21 and 219. Ten excerpts are used for training purposes and ten excerpts are used for testing purposes. The accuracies of the reported anomalies using the BFDD and the AWDD schemes for the various patients are summarized in Table 4. In Table 4, the first number is the accuracy, the second number is the false negative rate, and the third number is the false positive rate. A higher false positive rate
10 than the false negative rate is acceptable since it pays to check the patient slightly more frequently than to miss checking abnormal heartbeat events. The results indicate that our AWDD scheme can detect abnormality better than the BFDD scheme. Table 4. Accuracy Using BFDD vs. AWDD Schemes V. Conclusion record accuracy using fixed accuracy using window (%) adaptive window (%) 16 6 (3,1) 9 (, 1) 18 5 (1,4) 8 (1, 1) (1,2) 8 (, 2) 25 7 (3,) 8 (1,1) 21 7 (,3) 9 (, 1) (2, 4) 7 (3, ) In this paper, we have described an adaptive window-based discord discovery (AWDD) scheme for detecting abnormal patterns in the heartbeat related time series. Our scheme is motivated by the BFDD scheme proposed in [4] but we use adaptive rather than fixed windows. Our AWDD scheme uses a simple re-sampling method to compare two subsequences that are of different lengths. We apply both the BFDD and the ADWW schemes to ten 4-seconds excerpts of six patient records from the MIT-BH arrhythmia database. Our results show that the enhanced algorithm can achieve better accuracy in locating anomalies in the heartbeat time series of the patients. We are currently building the Code-Blue mote-based medical sensors designed by Harvard [2]. Once we successfully test those Code-Blue sensors, we will collect heartbeat data from several volunteers. Then, we will apply the AWDD scheme to these more noisy heartbeat sensor data. We also hope to analyze the sensor data collected from pulse oximeters using the AWDD scheme to see if it is equally effective in detecting anomalies in time series of oxygen saturation readings. In addition, we intend to optimize this algorithm so that it can be run on a PDA. Software to display excerpts of medical sensor data with anomalies will also be developed. ACKNOWLEDGMENT This work is sponsored by PITA. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of PITA. We would like to thank Dr George Moody from MIT for patiently explaining the MIT-BIH database information and to Prof Keogh for making his code on HotSax available. References [1] A. Wood et al, ALARM-NET: Wireless Sensor Networks for Assisted-Living Residential Monitoring, University of Virginia Computer Science Department Technical Report (26) [2] V. Shnayer et al, Sensor Networks for Medical Care, Harvard University Division of Engineering and Applied Sciences Technical Report, TR-8-5, (25) [3] MIT-BIH Arrhythmia Database. [4] E. Keogh, J. Lin, A. Fu. HOT SAX: Efficiently Finding the Most Unusual Time Series Subsequence. The 5 th IEEE International Conference on Data Mining (ICDM), (25) [5] M. S. Thaler, The only EKG book you ll ever need, 3 rd Ed., Philadelphia, PA: Lippincott Williams & Wilkins, (1999) [6] P. Chazal, M. O Dwyer, R. B. Reilly, Automatic Classification of Heartbeats Using ECG Morpholgy and Heartbeat Interval Features, IEEE transaction on biomedical engineering, Vol 51, No 7, July, (24) [7] S. Evans, H. Hastings, M. Bodenheimer, Differentiation of beats of ventricular and sinus origin using a self-training neural network, PACE, Vol17, (1994) [8] R. Clayton, A. Murray, R. Campbell, Recognition of ventricular fibrillation using neural networks, Med Biological Engineering and Computing, Vol 32, (1994), [9] Lehigh s Sensor-Based Medical Information System (SBMIS) [1] G. B. Moody and R. G. Mark, The impact of the MIT-BIH Arrhythmia Database, IEEE Eng in Med and Biol Vol 2(3) May-June (21) 45-5.
Feature Vector Selection for Automatic Classification of ECG Arrhythmias
Feature Vector Selection for Automatic Classification of ECG Arrhythmias Ch.Venkanna 1, B. Raja Ganapathi 2 Assistant Professor, Dept. of ECE, G.V.P. College of Engineering (A), Madhurawada, A.P., India
Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare
Using Smart Phones and Body Sensors to Deliver Pervasive Mobile Personal Healthcare Patrick Crilly 1, Vallipuram Muthukkumarasamy 2 School of Information and Communication Technology, Griffith University,
510(k) Summary May 7, 2012
510(k) Summary Medicalgorithmics 510(k) Premarket Notification 510(k) Summary May 7, 2012 1. Submitter Name and Address Medicalgorithmics LLC 245 West 107th St., Suite 11A New York, NY 10025, USA Contact
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
Classification of Electrocardiogram Anomalies
Classification of Electrocardiogram Anomalies Karthik Ravichandran, David Chiasson, Kunle Oyedele Stanford University Abstract Electrocardiography time series are a popular non-invasive tool used to classify
Detection of Heart Diseases by Mathematical Artificial Intelligence Algorithm Using Phonocardiogram Signals
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 1 May 2013, pp. 145-150 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ Detection
The choice for quality ECG arrhythmia monitoring
GE Healthcare EK-Pro The choice for quality ECG arrhythmia monitoring David A. Sitzman, MSEE. Mikko Kaski, MSAM. Ian Rowlandson, MSBE. Tarja Sivonen, RN. Olli Väisänen, MD, PhD. Clinical care environments
Electrocardiography I Laboratory
Introduction The body relies on the heart to circulate blood throughout the body. The heart is responsible for pumping oxygenated blood from the lungs out to the body through the arteries and also circulating
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
VitalJacket SDK v1.0.07 Technical Specifications
VitalJacket SDK v1.0.07 Technical Specifications Edíficio Olympus II LEGAL NOTICE AND DISCLAIMER ATENTION: Although VitalJacket is a certified medical device, its developer version is NOT certified for
Clustering. Adrian Groza. Department of Computer Science Technical University of Cluj-Napoca
Clustering Adrian Groza Department of Computer Science Technical University of Cluj-Napoca Outline 1 Cluster Analysis What is Datamining? Cluster Analysis 2 K-means 3 Hierarchical Clustering What is Datamining?
Electrocardiographic Issues in Williams Syndrome
Electrocardiographic Issues in Williams Syndrome R. Thomas Collins II, MD Assistant Professor, Pediatrics and Internal Medicine University of Arkansas for Medical Sciences Arkansas Children s Hospital
SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING
AAS 07-228 SPECIAL PERTURBATIONS UNCORRELATED TRACK PROCESSING INTRODUCTION James G. Miller * Two historical uncorrelated track (UCT) processing approaches have been employed using general perturbations
ECG SIGNAL PROCESSING AND HEART RATE FREQUENCY DETECTION METHODS
ECG SIGNAL PROCESSING AND HEART RATE FREQUENCY DETECTION METHODS J. Parak, J. Havlik Department of Circuit Theory, Faculty of Electrical Engineering Czech Technical University in Prague Abstract Digital
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Anomaly Detection and Predictive Maintenance
Anomaly Detection and Predictive Maintenance Rosaria Silipo Iris Adae Christian Dietz Phil Winters [email protected] [email protected] [email protected] [email protected]
Deriving the 12-lead Electrocardiogram From Four Standard Leads Based on the Frank Torso Model
Deriving the 12-lead Electrocardiogram From Four Standard Leads Based on the Frank Torso Model Daming Wei Graduate School of Information System The University of Aizu, Fukushima Prefecture, Japan A b s
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Normally-Off Technologies for
ASP-DAC 2014 Normally-Off Technologies for Healthcare Appliance Shintaro Izumi 1, Hiroshi Kawaguchi 1, Yoshikazu Fujimori 2, and Masahiko Yoshimoto 1 1 Kobe University, Kobe, Japan, 2 Rohm, Kyoto, Japan
Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 Mobile Phone APP Software Browsing Behavior using Clustering Analysis
Fetal monitoring on the move, from a hospital to in-home setting
Michiel Rooijakkers MSc TU/e - Signal Processing Systems SEBAN (Smart Energy Body Area Sensor Networks for Pregnancy Monitoring) 18 th October 2011 Fetal monitoring on the move, from a hospital to in-home
VitalJacket SDK v1.0.03 Technical Specifications
VitalJacket SDK v1.0.03 Technical Specifications Edíficio Olympus I Page2 LEGAL NOTICE AND DISCLAIMER ATENTION: Although VitalJacket is a certified medical device, its developer version is NOT certified
Activity 4.2.3: EKG. Introduction. Equipment. Procedure
Activity 4.2.3: EKG The following is used with permission of Vernier Software and Technology. This activity is based on the experiment Analyzing the Heart with EKG from the book Human Physiology with Vernier,
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION
A LOW-COST WIRELESS HEALTHCARE MONITORING SYSTEM AND COMMUNICATION TO A CLINICAL ALARM STATION Veysel Aslantas Rifat Kurban Tuba Caglikantar e-mail: [email protected] e-mail: [email protected]
Environmental Remote Sensing GEOG 2021
Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
A MOBILE-PHONE ECG DETECTION KIT AND CLOUD MANAGEMENT SYSTEM
A MOBILE-PHONE ECG DETECTION KIT AND CLOUD MANAGEMENT SYSTEM 1,2 SHUN-PING LIN, 2 WEN-HSU SUNG, 3 TERRY B. J. KUO, 2 JIN-JONG CHEN 1 Office of Research and Development, China University of Science and
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.
Understanding the Electrocardiogram. David C. Kasarda M.D. FAAEM St. Luke s Hospital, Bethlehem
Understanding the Electrocardiogram David C. Kasarda M.D. FAAEM St. Luke s Hospital, Bethlehem Overview 1. History 2. Review of the conduction system 3. EKG: Electrodes and Leads 4. EKG: Waves and Intervals
Remote cardiology consultation service The Heart Center model Kjell Nikus, MD, PhD Specialist in cardiology 9.4.2013
Remote cardiology consultation service The Heart Center model Kjell Nikus, MD, PhD Specialist in cardiology 9.4.2013 Challenges in health care Increase in health care expenditure >> GDP More effective
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Abnormality Detection in Electrocardiograms by Time Series Alignment
Abnormality Detection in Electrocardiograms by Time Series Alignment Bachir Boucheham Department of Informatics, University of Skikda 20 Août 1955 BP 26, Route El-Hadaek, Skikda, DZ21000 Algeria [email protected]
A Hybrid Artificial Intelligence System for Assistance in Remote Monitoring of Heart Patients
A Hybrid Artificial Intelligence System for Assistance in Remote Monitoring of Heart Patients Theodor Heinze, Robert Wierschke, Alexander Schacht and Martin v. Löwis Hasso-Plattner-Institut, Prof.-Dr.-Helmert-Str.
Il loop recorder esterno. Roberto Maggi
Il loop recorder esterno Roberto Maggi ECG monitoring and syncope In-hospital monitoring Holter Monitoring Event recorder External loop recorder Remote (at home) telemetry Implantable loop recorder External
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks
Performance Monitoring and Control in Contention- Based Wireless Sensor Networks Thomas Lindh #1, Ibrahim Orhan #2 # School of Technology and Health, KTH Royal Institute of Technology Marinens vag 30,
USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES
USING DATA SCIENCE TO DISCOVE INSIGHT OF MEDICAL PROVIDERS CHARGE FOR COMMON SERVICES Irron Williams Northwestern University [email protected] Abstract--Data science is evolving. In
STATISTICA. Clustering Techniques. Case Study: Defining Clusters of Shopping Center Patrons. and
Clustering Techniques and STATISTICA Case Study: Defining Clusters of Shopping Center Patrons STATISTICA Solutions for Business Intelligence, Data Mining, Quality Control, and Web-based Analytics Table
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
How To Cluster
Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main
Plastic Card Fraud Detection using Peer Group analysis
Plastic Card Fraud Detection using Peer Group analysis David Weston, Niall Adams, David Hand, Christopher Whitrow, Piotr Juszczak 29 August, 2007 29/08/07 1 / 54 EPSRC Think Crime Peer Group - Peer Group
Time series analysis of data from stress ECG
Communications to SIMAI Congress, ISSN 827-905, Vol. 3 (2009) DOI: 0.685/CSC09XXX Time series analysis of data from stress ECG Camillo Cammarota Dipartimento di Matematica La Sapienza Università di Roma,
Anomaly Detection in Predictive Maintenance
Anomaly Detection in Predictive Maintenance Anomaly Detection with Time Series Analysis Phil Winters Iris Adae Rosaria Silipo [email protected] [email protected] [email protected] Copyright
Research on physiological signal processing
Research on physiological signal processing Prof. Tapio Seppänen Biosignal processing team Department of computer science and engineering University of Oulu Finland Tekes 10-12.9.2013 Research topics Research
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
Frequency Prioritised Queuing in Real-Time Electrocardiograph Systems
Frequency Prioritised Queuing in Real-Time Electrocardiograph Systems Omar Hashmi, Sandun Kodituwakku and Salman Durrani School of Engineering, CECS, The Australian National University, Canberra, Australia.
IBM SPSS Direct Marketing 22
IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release
Discovering Local Subgroups, with an Application to Fraud Detection
Discovering Local Subgroups, with an Application to Fraud Detection Abstract. In Subgroup Discovery, one is interested in finding subgroups that behave differently from the average behavior of the entire
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
MobiHealthcare System: Body Sensor Network Based M-Health System for Healthcare Application
E-Health Telecommunication Systems and Networks, 2012, 1, 12-18 http://dx.doi.org/10.4236/etsn.2012.11003 Published Online March 2012 (http://www.scirp.org/journal/etsn) MobiHealthcare System: Body Sensor
ANDROID BASED PORTABLE ECG MONITOR
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1560-1567 ANDROID BASED PORTABLE ECG MONITOR Jeevan vijay*, Sathisha M.S., Shivakumar
Exemplar Learning for Extremely Efficient Anomaly Detection in Real-Valued Time Series
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Exemplar Learning for Extremely Efficient Anomaly Detection in Real-Valued Time Series Jones, M.J.; Nikovski, D.N.; Imamura, M.; Hirata, T.
ECG Signal Analysis Using Wavelet Transforms
Bulg. J. Phys. 35 (2008) 68 77 ECG Signal Analysis Using Wavelet Transforms C. Saritha, V. Sukanya, Y. Narasimha Murthy Department of Physics and Electronics, S.S.B.N. COLLEGE (Autonomous) Anantapur 515
Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition
Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
GE Healthcare. The heart of cardiology is connectivity The MUSE * v8 Cardiology Information System
GE Healthcare The heart of cardiology is connectivity The MUSE * v8 Cardiology Information System Cardiac technology. Innovation to advance care. Success in today s healthcare environment requires your
Medial Axis Construction and Applications in 3D Wireless Sensor Networks
Medial Axis Construction and Applications in 3D Wireless Sensor Networks Su Xia, Ning Ding, Miao Jin, Hongyi Wu, and Yang Yang Presenter: Hongyi Wu University of Louisiana at Lafayette Outline Introduction
Knowledge Discovery from patents using KMX Text Analytics
Knowledge Discovery from patents using KMX Text Analytics Dr. Anton Heijs [email protected] Treparel Abstract In this white paper we discuss how the KMX technology of Treparel can help searchers
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
REMOTE PATIENT MONITORING SYSTEM
REMOTE PATIENT MONITORING SYSTEM Sherin Sebastian, Neethu Rachel Jacob, Yedu Manmadhan, Anand V. R., M. J. Jayashree Department of Electronics and Communication Engineering Mar Baselios College of Engineering
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Equine Cardiovascular Disease
Equine Cardiovascular Disease 3 rd most common cause of poor performance in athletic horses (after musculoskeletal and respiratory) Cardiac abnormalities are rare Clinical Signs: Poor performance/exercise
Use of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
A NEW ARCHITECTURE OF A UBIQUITOUS HEALTH MONITORING SYSTEM:
A NEW ARCHITECTURE OF A UBIQUITOUS HEALTH MONITORING SYSTEM: A Prototype Of Cloud Mobile Health Monitoring System Abderrahim BOUROUIS 1,Mohamed FEHAM 2 and Abdelhamid BOUCHACHIA 3 1 STIC laboratory, Abou-bekr
Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification
Department of Telecommunication Engineering Hijjawi Faculty for Engineering Technology Yarmouk University Wireless Remote Monitoring System for ASTHMA Attack Detection and Classification Prepared by Orobh
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Data Mining and Machine Learning in Bioinformatics
Data Mining and Machine Learning in Bioinformatics PRINCIPAL METHODS AND SUCCESSFUL APPLICATIONS Ruben Armañanzas http://mason.gmu.edu/~rarmanan Adapted from Iñaki Inza slides http://www.sc.ehu.es/isg
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Internet of Things for Smart Crime Detection
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
IBM SPSS Direct Marketing 23
IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release
Artificial Neural Network Approach for Classification of Heart Disease Dataset
Artificial Neural Network Approach for Classification of Heart Disease Dataset Manjusha B. Wadhonkar 1, Prof. P.A. Tijare 2 and Prof. S.N.Sawalkar 3 1 M.E Computer Engineering (Second Year)., Computer
PharmaSUG2011 Paper HS03
PharmaSUG2011 Paper HS03 Using SAS Predictive Modeling to Investigate the Asthma s Patient Future Hospitalization Risk Yehia H. Khalil, University of Louisville, Louisville, KY, US ABSTRACT The focus of
Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent Trends and Challenges
Sensors 2013, 13, 17472-17500; doi:10.3390/s131217472 OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Review Data Mining for Wearable Sensors in Health Monitoring Systems: A Review of Recent
INTRODUCTORY GUIDE TO IDENTIFYING ECG IRREGULARITIES
INTRODUCTORY GUIDE TO IDENTIFYING ECG IRREGULARITIES NOTICE: This is an introductory guide for a user to understand basic ECG tracings and parameters. The guide will allow user to identify some of the
Introducing diversity among the models of multi-label classification ensemble
Introducing diversity among the models of multi-label classification ensemble Lena Chekina, Lior Rokach and Bracha Shapira Ben-Gurion University of the Negev Dept. of Information Systems Engineering and
Basics of Pacing. Ruth Hickling, RN-BSN Tasha Conley, RN-BSN
Basics of Pacing Ruth Hickling, RN-BSN Tasha Conley, RN-BSN The Cardiac Conduction System Cardiac Conduction System Review Normal Conduction Conduction QRS QRS Complex Complex RR PP ST ST segment segment
Healthcare Data Mining: Prediction Inpatient Length of Stay
3rd International IEEE Conference Intelligent Systems, September 2006 Healthcare Data Mining: Prediction Inpatient Length of Peng Liu, Lei Lei, Junjie Yin, Wei Zhang, Wu Naijun, Elia El-Darzi 1 Abstract
Social Innovation through Utilization of Big Data
Social Innovation through Utilization of Big Data Hitachi Review Vol. 62 (2013), No. 7 384 Shuntaro Hitomi Keiro Muro OVERVIEW: The analysis and utilization of large amounts of actual operational data
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS
AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,
Implementation of a Mobile Health System for Monitoring ECG signals
Implementation of a Mobile Health System for Monitoring ECG signals Nassim Amour 1, Ahmad Hersi 2, Naif Alajlan 1, Yakoub Bazi 1, Haikel AlHichri 1 1 Advanced Lab for Intelligent Systems Research (ALISR),
Investigating Clinical Care Pathways Correlated with Outcomes
Investigating Clinical Care Pathways Correlated with Outcomes Geetika T. Lakshmanan, Szabolcs Rozsnyai, Fei Wang IBM T. J. Watson Research Center, NY, USA August 2013 Outline Care Pathways Typical Challenges
1. Classification problems
Neural and Evolutionary Computing. Lab 1: Classification problems Machine Learning test data repository Weka data mining platform Introduction Scilab 1. Classification problems The main aim of a classification
Multisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]
