|
|
|
Anfal Ahmed Aleidan, Qaisar Abbas, Yassine Daadaa, Imran Qureshi, Ganeshkumar Perumal, Mostafa E. A. Ibrahim and Alaa E. S. Ahmed
User authentication has become necessary in different life domains. Traditional authentication methods like personal information numbers (PINs), password ID cards, and tokens are vulnerable to attacks. For secure authentication, methods like biometrics h...
ver más
|
|
|
|
|
|
|
Abrar Alamr and Abdelmonim Artoli
Anomaly detection is one of the basic issues in data processing that addresses different problems in healthcare sensory data. Technology has made it easier to collect large and highly variant time series data; however, complex predictive analysis models ...
ver más
|
|
|
|
|
|
|
Jin-A Lee and Keun-Chang Kwak
Conventional personal identification methods (ID, password, authorization certificate, etc.) entail various issues, including forgery or loss. Technological advances and the diffusion across industries have enhanced convenience; however, privacy risks du...
ver más
|
|
|
|
|
|
|
Di Wang, Yujuan Si, Weiyi Yang, Gong Zhang and Tong Liu
In the past decades, the electrocardiogram (ECG) has been investigated as a promising biometric by exploiting the subtle discrepancy of ECG signals between subjects. However, the heart rate (HR) for one subject may vary because of physical activities or ...
ver más
|
|
|
|
|
|
|
Kai Feng, Xitian Pi, Hongying Liu and Kai Sun
Myocardial infarction is one of the most threatening cardiovascular diseases for human beings. With the rapid development of wearable devices and portable electrocardiogram (ECG) medical devices, it is possible and conceivable to detect and monitor myoca...
ver más
|
|
|
|
|
|
|
Annisa Darmawahyuni, Siti Nurmaini, Sukemi, Wahyu Caesarendra, Vicko Bhayyu, M Naufal Rachmatullah and Firdaus
The interpretation of Myocardial Infarction (MI) via electrocardiogram (ECG) signal is a challenging task. ECG signals? morphological view show significant variation in different patients under different physical conditions. Several learning algorithms h...
ver más
|
|
|
|