LOW COMPLEXITY ALGORITHM FOR EXTRACTION OF ECG FIDUCIAL POINTS
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 12
Abstract
An automated algorithm for detection of fiducial points from the electrocardiogram (ECG) and identification of its various morphologies is proposed in this work. The application area we consider is that of remote cardiovascular monitoring, where continuous sensing and processing takes place in computationally constrained devices, thus the complexity of the processing algorithms should remain at a minimum level. Under this context, a discrete wavelet transform (DWT) with the Haar function as mother wavelet, is used as principal analysis method in this paper. From the modulus-maxima analysis on the DWT coefficients, an approximation of the ECG fiducial points is extracted. These initial findings are complimented with a refinement stage, based on the time-domain morphological properties of the ECG, which alleviates the decreased temporal resolution of the DWT. The resulting algorithm is a hybrid scheme of time- and frequency domain signal processing. Conventionally such ECG signals are acquired by ECG acquisition devices and those devices generate a printout of the lead outputs. A cardiologist analyzes the data for checking the abnormality or normalcy of the signal. But in recent times, automatic ECG processing has been of tremendous focus. The main point of concern is how to develop a system for extracting the features from ECG signal so that these features can be used for Automatic Diseases Diagnosis. In this Article We discuss a technique for extracting features from ECG signal and further analyze for ‘QRS’, ‘P-R’& ‘S-T’ intervals in appropriate time.
Authors and Affiliations
Mrs. (Patky) Deshpande Punam Subhashrao
SIMULATION AND HARDWARE IMPLEMENTATION OF INTERLEAVED TECHNIQUE BASED DC-DC BUCK-BOOST CONVERTER
DC-DC converters has wide range of applications in renewable energy systems, hybrid systems, electric vehicles, fuel cells, and industries. Interleaved topology of dc-dc converter has capabilities of correctin...
cryptography,
Today secure communications is increasingly more important to the intended communicators without being intercepted by eavesdroppers. Quantum cryptography promises to revolutioni the key distribution problem in cryptogr...
HUMIDITY & TEMPERATURE MONITORING BY USING CLOUD NETWORK
http: // www.ijesrt.com© International Journal of Engineering Sciences & Research Technology [59] IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY HUMIDITY & TEMPERATURE MONITORI...
A New Approach towards Gas Sensing through A.C. Conductivity of Tin Oxide-Copper Oxide Composite
Tin oxide- Copper oxide composites were synthesized by a hydrothermal method using tin chloride dihydrate and copper nitrate trihydrate as precursors in different molar ratios. The obtained powders were characteri...
An Eye Tracking Scheme Employing Viola-Jones and Template Matching Algorithm
The purpose of this paper is to develop a scheme to track the movement of the eyes. Most eye tracking systems employ Infrared cameras. Considering the application of our work, we are using a regular web camera to...