Neural Information Processing

In this paper, we present the results of classifying electroencephalo‐ graphic (EEG) signals into four motor imagery tasks using a new method for feature extraction. This method is based on a signal-dependent orthogonal trans‐ form, referred to as LP-SVD, defined as the left singular vectors of the LPC filter impulse response matrix. Using a logistic tree based model classifier, the extracted features are mapped into one of four motor imagery movements, namely left hand, right hand, foot, and tongue. The proposed technique-based classification performance was benchmarked against those based on two widely used linear transform for feature extraction methods, namely discrete cosine transform (DCT) and adaptive autoregressive (AAR). By achieving an accuracy of 67.35 %, the LP-SVD based method outperformed the other two by large margins (+25 % compared to DCT and +6 % compared to AAR-based methods).

[1]  Urszula Boryczka,et al.  Genetic Transformation Techniques in Cryptanalysis , 2014, ACIIDS.

[2]  Xin-She Yang,et al.  Engineering optimisation by cuckoo search , 2010 .

[3]  R. Spang,et al.  Predicting the clinical status of human breast cancer by using gene expression profiles , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[4]  Huan Liu,et al.  Community Detection and Mining in Social Media , 2010, Community Detection and Mining in Social Media.

[5]  Xin-She Yang,et al.  Nature-Inspired Optimization Algorithms: Challenges and Open Problems , 2020, J. Comput. Sci..

[6]  Teuvo Kohonen,et al.  Self-Organizing Maps , 2010 .

[7]  J. Ross Quinlan,et al.  Simplifying Decision Trees , 1987, Int. J. Man Mach. Stud..

[8]  R. Mantegna,et al.  Fast, accurate algorithm for numerical simulation of Lévy stable stochastic processes. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[9]  Richard Spillman,et al.  Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers , 1993 .

[10]  Jasper Snoek,et al.  Multi-Task Bayesian Optimization , 2013, NIPS.

[11]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[12]  Andrew Clark,et al.  Optimisation heuristics for cryptology , 1998 .

[13]  Fan Yang,et al.  Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm , 2008, ISICA.

[14]  Richard S. Johannes,et al.  Using the ADAP Learning Algorithm to Forecast the Onset of Diabetes Mellitus , 1988 .

[15]  Zhihua Cui,et al.  Swarm Intelligence and Bio-Inspired Computation: Theory and Applications , 2013 .

[16]  Daniel D. Suthers,et al.  Discovery of Community Structures in a Heterogeneous Professional Online Network , 2013, 2013 46th Hawaii International Conference on System Sciences.

[17]  Kevin Baker,et al.  Classification of radar returns from the ionosphere using neural networks , 1989 .

[18]  Habiba Drias,et al.  Cryptanalysis of Substitution Ciphers Using Scatter Search , 2005, IWINAC.

[19]  Michael J. Cowan Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm , 2008, Cryptologia.

[20]  Michael Ian Shamos,et al.  A Multiparty Computation for Randomly Ordering Players and Making Random Selections , 2004 .

[21]  Andrew Clark,et al.  Modern optimisation algorithms for cryptanalysis , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.

[22]  U. Alon,et al.  Broad patterns of gene expression revealed by clustering analysis of tumor and normal colon tissues probed by oligonucleotide arrays. , 1999, Proceedings of the National Academy of Sciences of the United States of America.

[23]  Joydeep Ghosh,et al.  Cluster Ensembles --- A Knowledge Reuse Framework for Combining Multiple Partitions , 2002, J. Mach. Learn. Res..

[24]  Reihaneh Safavi-Naini,et al.  Automated Cryptanalysis of Substitution Ciphers , 1993, Cryptologia.