Incursion Model for Nomenclature of EEG Signals via Wavelet Transform
Journal: International Journal of Communication Network and Security (Vol.1, No. 1)Publication Date: 2011-07-11
Authors : P.V.RamaRaju; V.Malleswara Rao; N.AnogjnaAurora;
Page : 29-33
Keywords : Electroencephalography(EEG); Matlab; Continuous wavelet transform;
- Incursion Model for Nomenclature of EEG Signals via Wavelet Transform
- SEIZURE EEG SIGNALS DETECTION AND CLASSIFICATION USING WAVELET TRANSFORM AND WOA BASED LLRBFNN MODEL
- Time Scale Modification of Speech Signals Using Wavelet Packet Transform
- THE NEW PROCESSING METHOD OF QUASI-PERIODIC PULSE SIGNALS USING WAVELET ANALYSIS AND HERMIT TRANSFORM
- Classification of EEG Signals under Different Mental Tasks Using Wavelet Transform and Neural Network with One Step Secant Algorithm
Abstract
EEG refers to the recording of the brain’s spontaneous electrical activity over a short period of time, usually 20?40 minutes, as recorded from multiple electrodes placed on the scalp. In advance EEG signals used to be a first-line method for the diagnosis of tumors, stroke and other focal brain disorders. The structure generating the signal is not simply linear, but also involves nonlinear contributions [7, 8, 9].Thesenon-stationary signals are may contain indicators of current disease,or even warnings about impending diseases. This work aims at providing new insights on the Electroencephalography (EEG) fragmentation problem using wavelets [2, 5]. The present work describes a computer model to provide a more accurate picture of the EEG signal processing via Wavelet Transform [16, 17, 18, 19]. The Matlab techniques have been uses which provide a system oriented scientific decision making modal [16, 17]. Within this practice the applied signal has been compared in a sequential order with dissimilar cases in attendance in the database. Special EEG signals have been considered from Physio bank [1] and Vijaya Medical Centre, Visakhapatnam, India. Analyze the signal under consideration and renowned the holder 100% truthfully.
Other Latest Articles
- Impact of Mobility models on Mobile Sensor Networks
- Encryption and Decryption algorithm using two dimensional cellular automata rules in Cryptography
- Recovery of loss of packet in network using constant packet reordering
- Computing Symmetric Block Cipher Using Linear Algebraic Equation
- Performance of Joint Admission and Power Control Algorithms for Cognitive Radio CDMA Networks in Shadowed Environment
Last modified: 2013-09-21 16:30:39