One of the common types of arrhythmia is Atrial Fibrillation (AF), it may cause death to patients. Correct diagnosing of heart problem through examining the Electrocardiogram (ECG) signal will lead to prescribe the right treatment for a patient. This study proposes a system that distinguishes between the normal and AF ECG signals. First, this work provides a novel algorithm for segmenting the ECG signal for extracting a single heartbeat. The algorithm utilizes low computational cost techniques to segment the ECG signal. Then, useful pre-processing and feature extraction methods are suggested. Two classifiers, Support Vector Machine (SVM) and Multilayer Perceptron (MLP), are separately used to evaluate the two proposed algorithms. The performance of the last proposed method with the two classifiers (SVM and MLP) show an improvement of about (19% and 17%, respectively) after using the proposed segmentation method so it became 96.2% and 97.5%, respectively.
<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>
Recently, personal verifications become crucial demands for providing securities in personal accounts and financial activities. This paper suggests a new Deep Learning (DL) model called the Re-enforced Deep Learning (RDL). This approach provides another way of personal verification by using the Finger Veins (FVs). The RDL consists of multiple layers with a feedback. Two FV fingers are employed for each person, FV of the index finger for first personal verification and FV of the middle finger for re-enforced verification. The used database is from the Hong Kong Polytechnic University Finger Image (PolyUFI) database (Version 1.0). The result shows that the proposed RDL achieved a promising performance of 91.19%. Also, other DL approaches are exploited for comparisons in this study including state-of-the-art models.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.