XML DATA PROCESSING APPROACH FOR AUTOMATIC IDENTIFICATION OF CARDIAC ABNORMALITIES IN ECG
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 3
Abstract
In medical applications, the process that records the electrical activity of the heart is termed as Electrocardiography (ECG). The traditional way of ECG is in the form of the transthoracic interpretation of heart’s electrical activity. Existing methodology focuses on diagnosing the 37 cardiac abnormalities by using XML ontology and ontological schema to identify the disease acquired. This methodology does not tune-up the image of the ECG before processing as the noise percentage misleads to the diagnosis report. In the proposed methodology, an image validation of histogram check is formulated to rectify the noise acquired in the input ECG Image. The validated ECG sample image has been measured with its height and amplitude to measure the abnormalities using XML ontology.
Authors and Affiliations
Divya R. , Kanagavalli V. R.
RESOURCE PROCUREMENT MECHANISM SCHEME FOR CLOUD COMPUTING
The cloud resource the limitations auctions, dynamic pricing
AN INTEGRATED FRAMEWORK FOR PARALLEL TRAINING AND CLASSIFICATION OF ECG SIGNAL
Recently, various techniques are developed to analyze and classify the Electrocardiograph (ECG) signal to know the threaten results. Many real time development tools such as VLSI, DSP, etc., are availabl...
AN EFFICIENT WI-FI INTERNET ACCESS FOR MOVING VEHICLES USING SWIMMING SCHEME
Accessing internet from moving vehicles is demanding and has been rapidly growing. Due to mobile detonation, the overloading issue of cellular networks is increasing. So, the Wi-Fi based accessing is co...
An Efficient Copy-Move Forgery Detection scheme using Segmentation
The development of new hardware and improved human-computer interfaces can effortlessly generate the fake images. Multiple image processing softwares are used to detect the image forgeries that could not be se...
VIRTUAL MACHINE SECURITY SCHEME AGAINST CO-RESIDENT ATTACK IN CLOUD COMPUTING
Cloud computing provide users and enterprises with various capabilities to store and process their data. Cloud security refers to a broad set of policies, technologies and controls deploy to product data. H...