4.6 Letter

Artifacts and noise removal in electrocardiograms using independent component analysis

期刊

INTERNATIONAL JOURNAL OF CARDIOLOGY
卷 129, 期 2, 页码 278-281

出版社

ELSEVIER IRELAND LTD
DOI: 10.1016/j.ijcard.2007.06.037

关键词

electrocardiogram; feature extraction; reconstruction error; kurtosis; variance of variance; modeling; independent component analysis

资金

  1. G. S. Institute of Technology AMP
  2. Science, Indore
  3. AICTE, Government of India

向作者/读者索取更多资源

Independent component analysis (ICA) is a novel technique capable of separating independent components from electrocardiogram ( ECG) complex signals. The purpose of this analysis is to evaluate the effectiveness of ICA in removing artifacts and noise from ECG recordings. ICA is applied to remove artifacts and noise in ECG segments of either an individual ECG CSE data base file or all files. The reconstructed ECGs are compared with the original ECG signal. For the four special cases discussed, the R-Peak magnitudes of the CSE data base ECG waveforms before and after applying ICA are also found. In the results, it is shown that in most of the cases, the percentage error in reconstruction is very small. The results show that there is a significant improvement in signal quality, i.e. SNR. All the ECG recording cases dealt showed an improved ECG appearance after the use of ICA. This establishes the efficacy of ICA in elimination of noise and artifacts in electrocardiograms. (C) 2007 Elsevier Ireland Ltd. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Electrical & Electronic

SEBAP: A secure and efficient biometric-assisted authentication protocol using ECC for vehicular cloud computing

Vinod Kumar, Musheer Ahmad, Adesh Kumari, Saru Kumari, M. K. Khan

Summary: Vehicular cloud computing is a new area of research that equips vehicles with networking and sensing capacities to improve vehicle-to-vehicle or vehicle-to-infrastructure communication, which is beneficial for traffic management and road safety. This technology presents a smart structure for vehicular communication, maintaining autonomous traffic, improved vehicle control, and enhanced system security.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2021)

Article Telecommunications

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Information Systems

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

Adesh Kumari, Srinivas Jangirala, M. Yahya Abbasi, Vinod Kumar, Mansaf Alam

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Article Computer Science, Information Systems

A Computationally Efficient and Scalable Key Management Scheme for Access Control of Media Delivery in Digital Pay-TV Systems

Vinod Kumar, Rajendra Kumar, S. K. Pandey

Summary: The paper proposed a key distribution protocol based on the Chinese Remainder Theorem that significantly reduced computational complexity, increased security, improved efficiency in handling large groups, and effectively prevented illegal access.

MULTIMEDIA TOOLS AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

PALK: Password-based anonymous lightweight key agreement framework for smart grid

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana, Dheerendra Mishra

INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS (2020)

Article Computer Science, Information Systems

LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid

Vinod Kumar, Rajendra Kumar, S. K. Pandey

Summary: Smart Grid is a modernized power grid system that requires a secure and robust key management scheme to ensure confidentiality during communication in the Advanced Metering Infrastructure (AMI). This paper proposes a tailored key management scheme for Home Area Networks (HAN) in AMI, which significantly reduces rekeying overhead and enhances privacy protection.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Computer Science, Hardware & Architecture

LAKAF: Lightweight authentication and key agreement framework for smart grid network

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Saurabh Rana

Summary: The development of IoT technology presents new challenges for smart grid systems. To enhance security and privacy in smart grids, lightweight authentication and key agreement protocols are proposed. Analyzing and verifying these new protocols can improve the efficiency of smart grid systems.

JOURNAL OF SYSTEMS ARCHITECTURE (2021)

Article Telecommunications

A secure and efficient key agreement framework for critical energy infrastructure using mobile device

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif

Summary: This article introduces the two-way communication of the Internet of Energy to address the security, efficiency, and reliability in energy reform. A mutual authenticated key agreement framework is proposed in the vehicle-grid system using elliptic curve cryptography and hash function to maintain secure communication with reliable computation and communication costs. The proposed protocol is shown to be secure through formal and informal methods, and is more efficient in terms of computation and communication costs compared to related protocols in the same environment.

TELECOMMUNICATION SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure

Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, Jangirala Srinivas, Musheer Ahmad, Adesh Kumari

Summary: This article presents a secure and lightweight authentication scheme (RAPCHI) for Internet of medical Things (IoMT) in cloud-healthcare infrastructure (CHI) during a pandemic. The proposed framework provides resistance against various security threats and is compared to existing frameworks, demonstrating its superiority in terms of security, computation, and communication. The formal security analysis and simulation tests validate RAPCHI's security against man-in-the-middle and replay attacks.

JOURNAL OF SUPERCOMPUTING (2022)

Article Chemistry, Analytical

RAFI: Robust Authentication Framework for IoT-Based RFID Infrastructure

Vikas Kumar, Rahul Kumar, Akber Ali Khan, Vinod Kumar, Yu-Chi Chen, Chin-Chieh Chang

Summary: The Internet of Things (IoT) is a future trend that connects physical things with the cyber world through the Internet. While IoT technology brings convenience to our daily lives, it also poses security and privacy risks, particularly in RFID-tag-connected devices. To address these concerns, we propose a robust authentication framework for IoT-based RFID infrastructure, which satisfies all security requirements and improves communication performance.

SENSORS (2022)

Article Computer Science, Information Systems

An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach

Akber Ali Khan, Vinod Kumar, Musheer Ahmad

Summary: Smart grid adjusts power generation by supervising consumer behavior and promoting cultural heritage. Ensuring environmental security and privacy are key concerns in smart systems, with authentication protocols enabling secure communication.

JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES (2022)

Article Telecommunications

RAKS: robust authentication and key agreement scheme for satellite infrastructure

Akber Ali Khan, Vinod Kumar, Jangirala Srinivas, Saru Kumari, Mridul Kumar Gupta

Summary: This article presents a secure and efficient architecture for satellite network systems using elliptic curve cryptography and a hash function. The proposed protocol ensures secure communication and key agreement, and is resistant to various security threats. It also includes different security features and capabilities, and allows easy password updates. The random oracle model is used to demonstrate its security, and security verification is performed against man in the middle and replay attacks using AVISPA software. The proposed protocol is shown to have lower computation and transmission overhead compared to competing methods.

TELECOMMUNICATION SYSTEMS (2022)

Article Computer Science, Information Systems

A secure and energy efficient key agreement framework for vehicle-grid system

Akber Ali Khan, Vinod Kumar, Musheer Ahmad, Srinivas Jangirala

Summary: This paper proposes a key agreement and authentication framework for vehicular to grid networks based on elliptic curve cryptography and the hash function, aiming to achieve secure and efficient communication in the Energy Internet.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Computer Science, Information Systems

PSEBVC: Provably Secure ECC and Biometric Based Authentication Framework Using Smartphone for Vehicular Cloud Environment

Vinod Kumar, Ammar Mohammed Ali Al-Tameemi, Adesh Kumari, Musheer Ahmad, Mayadah Waheed Falah, Ahmed A. Abd El-Latif

Summary: The Vehicular Cloud Environment (VCE) is a new research field that combines cloud computing and vehicular networks to enable communication between vehicles and roadside infrastructure. A hybrid technical solution utilizing vehicle resources, cloud infrastructure, and IoT is necessary for effective vehicular communication networking. Security and privacy are significant challenges in VCE due to the integration of unknown vehicles and infrastructure via the public network. In this regard, we propose a provably secure authentication system for VCE employing smartphones. The proposed system demonstrates both security and efficiency in terms of communication and processing overhead.

IEEE ACCESS (2022)

Article Computer Science, Information Systems

CKMIB: Construction of Key Agreement Protocol for Cloud Medical Infrastructure Using Blockchain

Samiulla Itoo, Akber Ali Khan, Vinod Kumar, Ahmed Alkhayyat, Musheer Ahmad, Jangirala Srinivas

Summary: In the traditional medical healthcare system, sharing patient data is challenging. Blockchain technology and cloud computing can address this issue and provide better privacy and security.

IEEE ACCESS (2022)

暂无数据