4.7 Article

Detection of myocardial infarction in 12 lead ECG using support vector machine

Journal

APPLIED SOFT COMPUTING
Volume 64, Issue -, Pages 138-147

Publisher

ELSEVIER
DOI: 10.1016/j.asoc.2017.12.001

Keywords

Electrocardiogram; Composite lead; Myocardial infarction; Statistical parameters support vector; machine; Principal component analysis (PCA)

Funding

  1. Engineering College Rewa, Technical Education & Training Department, M.P. Govt.
  2. All India Council for Technical Education, New Delhi
  3. QIP Centre, I.I.T. Roorkee

Ask authors/readers for more resources

In this paper, we propose myocardial infarction (MI) detection using 12-lead ECG data and analysis of each lead with the help of composite lead. This composite lead is used to detect ECG wave components and clinical wave intervals in all the 12-lead ECG. The four clinical features such as P duration, QRS duration, ST-T complex interval and QT interval are globally determined from average beats of all the 12-lead ECG. Then peak to peak amplitude, area, mean, standard deviation, skewness and kurtosis are determined for P duration, QRS duration and ST-T complex interval of average beats of all the 12-lead ECG. These 220 (4 + 6 x 3 x 12) parameters are used for myocardial infarction detection. The standard 12-lead ECG data of 60 myocardial infarction subjects and 60 healthy controls (HC) cases are obtained from Physikalisch-Technische Bundesanstalt (PTB) database and tested with support vector machine (SVM) classifier. The MI detection sensitivity, specificity and accuracy are 96.66%, 100% and 98.33% respectively. To reduce the computational complexity, feature dimension reduction is important. Therefore, proposed method applies Principal Component Analysis (PCA) reduction technique. In this proposed method, 220 features are reduced to 14 features, using these 14 features, MI detection achieved by SVM classifier is: sensitivity 96.66%, specificity 96.66% and accuracy 96.66%. (C) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Engineering, Electrical & Electronic

SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing

Vinod Kumar, Musheer Ahmad, Adesh Kumari, Saru Kumari, M. K. Khan

Summary: Vehicular cloud computing is a new area of research that equips vehicles with networking and sensing capacities to improve vehicle-to-vehicle or vehicle-to-infrastructure communication, which is beneficial for traffic management and road safety. This technology presents a smart structure for vehicular communication, maintaining autonomous traffic, improved vehicle control, and enhanced system security.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2021)

Article Engineering, Electrical & Electronic

SFVCC: Chaotic map-based security framework for vehicular cloud computing

Dheerendra Mishra, Vinod Kumar, Dharminder Dharminder, Saurabh Rana

IET INTELLIGENT TRANSPORT SYSTEMS (2020)

Article Telecommunications

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Information Systems

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

Adesh Kumari, Srinivas Jangirala, M. Yahya Abbasi, Vinod Kumar, Mansaf Alam

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

A Computationally Efficient and Scalable Key Management Scheme for Access Control of Media Delivery in Digital Pay-TV Systems

Vinod Kumar, Rajendra Kumar, S. K. Pandey

Summary: The paper proposed a key distribution protocol based on the Chinese Remainder Theorem that significantly reduced computational complexity, increased security, improved efficiency in handling large groups, and effectively prevented illegal access.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid

Vinod Kumar, Rajendra Kumar, S. K. Pandey

Summary: Smart Grid is a modernized power grid system that requires a secure and robust key management scheme to ensure confidentiality during communication in the Advanced Metering Infrastructure (AMI). This paper proposes a tailored key management scheme for Home Area Networks (HAN) in AMI, which significantly reduces rekeying overhead and enhances privacy protection.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

LAKAF: Lightweight authentication and key agreement framework for smart grid network

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana

Summary: The development of IoT technology presents new challenges for smart grid systems. To enhance security and privacy in smart grids, lightweight authentication and key agreement protocols are proposed. Analyzing and verifying these new protocols can improve the efficiency of smart grid systems.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Telecommunications

A secure and efficient key agreement framework for critical energy infrastructure using mobile device

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif

Summary: This article introduces the two-way communication of the Internet of Energy to address the security, efficiency, and reliability in energy reform. A mutual authenticated key agreement framework is proposed in the vehicle-grid system using elliptic curve cryptography and hash function to maintain secure communication with reliable computation and communication costs. The proposed protocol is shown to be secure through formal and informal methods, and is more efficient in terms of computation and communication costs compared to related protocols in the same environment.

TELECOMMUNICATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure

Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, Adesh Kumari

Summary: This article presents a secure and lightweight authentication scheme (RAPCHI) for Internet of medical Things (IoMT) in cloud-healthcare infrastructure (CHI) during a pandemic. The proposed framework provides resistance against various security threats and is compared to existing frameworks, demonstrating its superiority in terms of security, computation, and communication. The formal security analysis and simulation tests validate RAPCHI's security against man-in-the-middle and replay attacks.

JOURNAL OF SUPERCOMPUTING (2022)

Article Chemistry, Analytical

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

Vikas Kumar, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, Chin-Chieh Chang

Summary: The Internet of Things (IoT) is a future trend that connects physical things with the cyber world through the Internet. While IoT technology brings convenience to our daily lives, it also poses security and privacy risks, particularly in RFID-tag-connected devices. To address these concerns, we propose a robust authentication framework for IoT-based RFID infrastructure, which satisfies all security requirements and improves communication performance.

SENSORS (2022)

Article Computer Science, Information Systems

An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

Akber Ali Khan, Vinod Kumar, Musheer Ahmad

Summary: Smart grid adjusts power generation by supervising consumer behavior and promoting cultural heritage. Ensuring environmental security and privacy are key concerns in smart systems, with authentication protocols enabling secure communication.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Telecommunications

RAKS: robust authentication and key agreement scheme for satellite infrastructure

Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta

Summary: This article presents a secure and efficient architecture for satellite network systems using elliptic curve cryptography and a hash function. The proposed protocol ensures secure communication and key agreement, and is resistant to various security threats. It also includes different security features and capabilities, and allows easy password updates. The random oracle model is used to demonstrate its security, and security verification is performed against man in the middle and replay attacks using AVISPA software. The proposed protocol is shown to have lower computation and transmission overhead compared to competing methods.

TELECOMMUNICATION SYSTEMS (2022)

Article Computer Science, Information Systems

A secure and energy efficient key agreement framework for vehicle-grid system

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Srinivas Jangirala

Summary: This paper proposes a key agreement and authentication framework for vehicular to grid networks based on elliptic curve cryptography and the hash function, aiming to achieve secure and efficient communication in the Energy Internet.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Computer Science, Information Systems

PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment

Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif

Summary: The Vehicular Cloud Environment (VCE) is a new research field that combines cloud computing and vehicular networks to enable communication between vehicles and roadside infrastructure. A hybrid technical solution utilizing vehicle resources, cloud infrastructure, and IoT is necessary for effective vehicular communication networking. Security and privacy are significant challenges in VCE due to the integration of unknown vehicles and infrastructure via the public network. In this regard, we propose a provably secure authentication system for VCE employing smartphones. The proposed system demonstrates both security and efficiency in terms of communication and processing overhead.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

CKMIB: Construction of Key Agreement Protocol for Cloud Medical Infrastructure Using Blockchain

Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Ahmed Alkhayyat, Musheer Ahmad, Jangirala Srinivas

Summary: In the traditional medical healthcare system, sharing patient data is challenging. Blockchain technology and cloud computing can address this issue and provide better privacy and security.

IEEE ACCESS (2022)

Article Computer Science, Artificial Intelligence

Style linear k-nearest neighbor classification method

Jin Zhang, Zekang Bian, Shitong Wang

Summary: This study proposes a novel style linear k-nearest neighbor method to extract stylistic features using matrix expressions and improve the generalizability of the predictor through style membership vectors.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A dimensionality reduction method for large-scale group decision-making using TF-IDF feature similarity and information loss entropy

Qifeng Wan, Xuanhua Xu, Jing Han

Summary: In this study, we propose an innovative approach for dimensionality reduction in large-scale group decision-making scenarios that targets linguistic preferences. The method combines TF-IDF feature similarity and information loss entropy to address challenges in decision-making with a large number of decision makers.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Frequency-based methods for improving the imperceptibility and transferability of adversarial examples

Hegui Zhu, Yuchen Ren, Chong Liu, Xiaoyan Sui, Libo Zhang

Summary: This paper proposes an adversarial attack method based on frequency information, which optimizes the imperceptibility and transferability of adversarial examples in white-box and black-box scenarios respectively. Experimental results validate the superiority of the proposed method and its application in real-world online model evaluation reveals their vulnerability.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Consensus-based generalized TODIM approach for occupational health and safety risk analysis with opinion interactions

Jing Tang, Xinwang Liu, Weizhong Wang

Summary: This paper proposes a hybrid generalized TODIM approach in the Fine-Kinney framework to evaluate occupational health and safety hazards. The approach integrates CRP, dynamic SIN, and PLTSs to handle opinion interactions and incomplete opinions among decision makers. The efficiency and rationality of the proposed approach are demonstrated through a numerical example, comparison, and sensitivity studies.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Deep Q-network-based heuristic intrusion detection against edge-based SIoT zero-day attacks

Shigen Shen, Chenpeng Cai, Zhenwei Li, Yizhou Shen, Guowen Wu, Shui Yu

Summary: To address the damage caused by zero-day attacks on SIoT systems, researchers propose a heuristic learning intrusion detection system named DQN-HIDS. By integrating Deep Q-Networks (DQN) into the system, DQN-HIDS gradually improves its ability to identify malicious traffic and reduces resource workloads. Experiments demonstrate the superior performance of DQN-HIDS in terms of workload, delayed sample queue, rewards, and classifier accuracy.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A Chinese text classification based on active

Song Deng, Qianliang Li, Renjie Dai, Siming Wei, Di Wu, Yi He, Xindong Wu

Summary: In this paper, we propose a Chinese text classification algorithm based on deep active learning for the power system, which addresses the challenge of specialized text classification. By applying a hierarchical confidence strategy, our model achieves higher classification accuracy with fewer labeled training data.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Ranking intuitionistic fuzzy sets with hypervolume-based approach: An application for multi-criteria assessment of energy alternatives

Kaan Deveci, Onder Guler

Summary: This study proves the lack of robustness in nonlinear IF distance functions for ranking intuitionistic fuzzy sets (IFS) and proposes an alternative ranking method based on hypervolume metric. Additionally, the suggested method is extended as a new multi-criteria decision making method called HEART, which is applied to evaluate Turkey's energy alternatives.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Improved energy management of chiller system with AI-based regression

Fu-Wing Yu, Wai-Tung Ho, Chak-Fung Jeff Wong

Summary: This research aims to enhance the energy management in commercial building air-conditioning systems, specifically focusing on chillers. Ridge regression is found to outperform lasso and elastic net regression when optimized with the appropriate hyperparameter, making it the most suitable method for modeling the system coefficient of performance (SCOP). The key variables that strongly influence SCOP include part load ratios, the operating numbers of chillers and pumps, and the temperatures of chilled water and condenser water. Additionally, July is identified as the month with the highest potential for performance improvement. This study introduces a novel approach that balances feature selection, model accuracy, and optimal tuning of hyperparameters, highlighting the significance of a generic and simplified chiller system model in evaluating energy management opportunities for sustainable operation. The findings from this research can guide future efforts towards more energy-efficient and sustainable operations in commercial buildings.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Three-dimension object detection and forward-looking control strategy for non-destructive grasp of thin-skinned fruits

Xiaoyan Chen, Yilin Sun, Qiuju Zhang, Xuesong Dai, Shen Tian, Yongxin Guo

Summary: In this study, a method for dynamically non-destructive grasping of thin-skinned fruits is proposed. It utilizes a multi-modal depth fusion convolutional neural network for image processing and segmentation, and combines the evaluation mechanism of optimal grasping stability and the forward-looking non-destructive grasp control algorithm. The proposed method greatly improves the comprehensive performance of grasping delicate fruits using flexible hands.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Siamese learning based on graph differential equation for Next-POI recommendation

Yuxuan Yang, Siyuan Zhou, He Weng, Dongjing Wang, Xin Zhang, Dongjin Yu, Shuiguang Deng

Summary: The study proposes a novel model, POIGDE, which addresses the challenges of data sparsity and elusive motives by solving graph differential equations to capture continuous variation of users' interests. The model learns interest transference dynamics using a time-serial graph and an interval-aware attention mechanism, and applies Siamese learning to directly learn from label representations for predicting future POI visits. The model outperforms state-of-the-art models on real-world datasets, showing potential in the POI recommendation domain.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

An adaptive data compression technique based on optimal thresholding using multi-objective PSO algorithm for power system data

S. Karthika, P. Rathika

Summary: The widespread development of monitoring devices in the power system has generated a large amount of power consumption data. Storing and transmitting this data has become a significant challenge. This paper proposes an adaptive data compression algorithm based on the discrete wavelet transform (DWT) for power system applications. It utilizes multi-objective particle swarm optimization (MO-PSO) to select the optimal threshold. The algorithm has been tested and outperforms other existing algorithms.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

Adaptive SV-Borderline SMOTE-SVM algorithm for imbalanced data classification

Jiaqi Guo, Haiyan Wu, Xiaolei Chen, Weiguo Lin

Summary: In this study, an adaptive SV-Borderline SMOTE-SVM algorithm is proposed to address the challenge of imbalanced data classification. The algorithm maps the data into kernel space using SVM and identifies support vectors, then generates new samples based on the neighbors of these support vectors. Extensive experiments show that this method is more effective than other approaches in imbalanced data classification.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

HilbertSCNet: Self-attention networks for small target segmentation of aerial drone images

Qiumei Zheng, Linkang Xu, Fenghua Wang, Yongqi Xu, Chao Lin, Guoqiang Zhang

Summary: This paper proposes a new semantic segmentation network model called HilbertSCNet, which combines the Hilbert curve traversal and the dual pathway idea to design a new spatial computation module to address the problem of loss of information for small targets in high-resolution images. The experiments show that the proposed network performs well in the segmentation of small targets in high-resolution maps such as drone aerial photography.

APPLIED SOFT COMPUTING (2024)

Article Computer Science, Artificial Intelligence

A comprehensive state-of-the-art survey on the recent modified and hybrid analytic hierarchy process approaches

Mojtaba Ashour, Amir Mahdiyar

Summary: Analytic Hierarchy Process (AHP) is a widely applied technique in multi-criteria decision-making problems, but the sheer number of AHP methods presents challenges for scholars and practitioners in selecting the most suitable method. This paper reviews articles published between 2010 and 2023 proposing hybrid, improved, or modified AHP methods, classifies them based on their contributions, and provides a comprehensive summary table and roadmap to guide the method selection process.

APPLIED SOFT COMPUTING (2024)

Review Computer Science, Artificial Intelligence

A systematic review of metaheuristic algorithms in electric power systems optimization

Gerardo Humberto Valencia-Rivera, Maria Torcoroma Benavides-Robles, Alonso Vela Morales, Ivan Amaya, Jorge M. Cruz-Duarte, Jose Carlos Ortiz-Bayliss, Juan Gabriel Avina-Cervantes

Summary: Electric power system applications are complex optimization problems. Most literature reviews focus on studying electrical paradigms using different optimization techniques, but there is a lack of review on Metaheuristics (MHs) in these applications. Our work provides an overview of the paradigms underlying such applications and analyzes the most commonly used MHs and their search operators. We also discover a strong synergy between the Renewable Energies paradigm and other paradigms, and a significant interest in Load-Forecasting optimization problems. Based on our findings, we provide helpful recommendations for current challenges and potential research paths to support further development in this field.

APPLIED SOFT COMPUTING (2024)