Computational Intelligence in Image and Video AnalysisView this Special Issue
EEG Channel Selection Using Multiobjective Cuckoo Search for Person Identification as Protection System in Healthcare Applications
Recently, the electroencephalogram (EEG) signal presents an excellent potential for a new person identification technique. Several studies defined the EEG with unique features, universality, and natural robustness to be used as a new track to prevent spoofing attacks. The EEG signals are a visual recording of the brain’s electrical activities, measured by placing electrodes (channels) in various scalp positions. However, traditional EEG-based systems lead to high complexity with many channels, and some channels have critical information for the identification system while others do not. Several studies have proposed a single objective to address the EEG channel for person identification. Unfortunately, these studies only focused on increasing the accuracy rate without balancing the accuracy and the total number of selected EEG channels. The novelty of this paper is to propose a multiobjective binary version of the cuckoo search algorithm (MOBCS-KNN) to find optimal EEG channel selections for person identification. The proposed method (MOBCS-KNN) used a weighted sum technique to implement a multiobjective approach. In addition, a KNN classifier for EEG-based biometric person identification is used. It is worth mentioning that this is the initial investigation of using a multiobjective technique with EEG channel selection problem. A standard EEG motor imagery dataset is used to evaluate the performance of the MOBCS-KNN. The experiments show that the MOBCS-KNN obtained accuracy of using only 24 sensors with autoregressive coefficients. Another critical point is that the MOBCS-KNN finds channels not too close to each other to capture relevant information from all over the head. In conclusion, the MOBCS-KNN algorithm achieves the best results compared with metaheuristic algorithms. Finally, the recommended approach can draw future directions to be applied to different research areas.
Over many years, our universe has transferred to a digital community in which each person is living with a particular digital identifier. Indeed, there are several kinds of identifiers, such as identification cards and passwords. Meanwhile, they can be easily circumvented, stolen, and forgotten . Therefore, personal behavior or characteristics can be used to strengthen identification systems. Such techniques, the so-called biometrics, make use of several pieces of in-person information to allow more robust identification systems, such as face and voice recognition, fingerprint information, and iris data . The motivation of using EEG and body sensors in healthcare systems has been an interesting area for many researchers [3–5].
On the other hand, the widespread and influential deployment of biometric systems leads to a new challenge, which is called “spoofing” [1, 6–8]. Such type of attack is classified as the most dangerous in security systems since it is designed to break the biometric systems’ security, thus allowing unwarranted persons to get admission to the system .
In real life, there have already been several spoofing attacks on the biometrics systems, such as face spoofing (printed photos and 3D mask attack [9–12]), fake fingerprints (gummy fingers), finger-vein systems fooled through a piece of paper , iris recognition systems fooled by an eyeball opposite to the scanner of iris, and voice recognition fooled through replaying a voice recording opposite to the recognition system speaker . Therefore, people are looking for biometric authentication systems that can grant access to a person based on invisible characteristics, thus becoming harder to be attacked by an external threat. In this context, one shall refer to user authentication based on brain signals, which can be captured by the well-known electroencephalogram (EEG) exam .
The EEG signals appear as a great alternative for designing new biometric systems since several studies showed that such information presents uniqueness features, universality, and natural robustness to spoofing attacks [1, 16]. These signals represent the graphical recording of the brain electrical activity, which can be measured by placing electrodes (sensors) in different positions of the scalp [1, 17–20]. EEG channel selection is totally dependent on the characteristics of the EEG signal, where the most informative features that provide the highest accuracy rate from the channel selection shall be determined.
Multiobjective optimization algorithms have been applied in different methodological phases and criteria [21, 22]. In a multiobjective formulation of the feature selection problem, the possible features define the vector of decision variables. The space of features in many classification problems is usually very large . In [24, 25], the authors proposed new methods for feature selection, based on a multiobjective evolutionary algorithm, which managed to select a small subset of features, trying to avoid the overfitting problems and reduce classification problems in high-dimensional feature space. In the same direction, the feature selection problem has been also solved by an embedded multiobjective genetic optimization procedure, subject to the simultaneous minimization of the misclassification ratio and number of selected attributes [26, 27]. Multiobjective optimization algorithms have been also used in the deionizing stage of EEG signal. In , an approach has been adopted in the signal deionizing stage to model decomposition and present two metrics to quantify the amount of EEG information lost during the cleaning process. Furthermore, in , the authors proposed a novel method for extracting unique features from the original EEG signals using the multiobjective flower pollination algorithm and the wavelet transform.
One of the significant challenges concerning EEG-based user identification technique is signal acquisition, which is performed by placing several electrodes (sensors) on a person’s head. As a drawback, such a process is usually uncomfortable since it requires good knowledge to place the sensors in their correct positions. Additionally, some questions must be considered such as the following: “Is it really necessary to put all these electrodes on a persons’ head? If not, can we identify the most relevant ones for user identification and then use a smaller number of sensors?” The above questions motivated our attempts to model the EEG channel selection as an optimization problem. In this work, we aim at learning the most important EEG channels by proposing a hybrid approach composed of the cuckoo search algorithm (CSA) , hereinafter called “MOCS-EEG.” The classification step is performed by KNN classifier. The main contributions of this paper are threefold:(1)To evaluate binary cuckoo search algorithm (BCSA) for EEG-based person identification(2)To model the problem of EEG channel selection as an evolutionary-based optimization task(3)To propose a multiobjective technique combined with the KNN classifier for EEG-based biometric person identification
We use evolutionary optimization algorithms for the EEG channel selection due to their efficiency when solving challenging real-world problems and their simplicity. The performance of the proposed method (MOCS-KNN) is compared with other seven multiobjective metaheuristic algorithms (binary PSO (MOPSO-KNN), binary GWO (MOGWO-KNN), binary FFA (MOFFA-KNN), binary BAT (MOBAT-KNN), binary MVO (MOMVO-KNN), binary WOA (MOWOA-KNN), and binary MFO (MOMFO-KNN)). The comparison includes five measures, which are accuracy ratio , channels selected , Specificity , F-score , and Recall . The results show that the proposed technique (MOCS-KNN) is able to outperform other metaheuristic algorithms in almost all results produced.
The remainder of this paper is organized as follows: the related works about a number of EEG-based identification techniques are reviewed in Section 2. A discussion about cuckoo search algorithm is presented in Section 3. The proposed method is provided in Section 4. Results are discussed in Section 5, and Section 6 provides conclusions and future work.
2. Related Works
This section presents an overview of previous studies related to using optimization algorithms in the BCI applications. Several works have been proposed based on optimization algorithms for tackling issues relevant to person identification case study. According to [1, 30], the number of selected channels can effect positively the accuracy of classification task. The authors especially addressed the problem of reducing the number of required sensors while maintaining a comparable performance. They have achieved significant results by obtaining very good person identification rates using much fewer channels. In , the authors proposed a binary version of the flower pollination algorithm under different transfer functions to select the best subset of channels that maximizes the accuracy. In , the authors proposed a genetic algorithm to reduce the number of necessary electrodes for measurements by EEG devices. The results were encouraging, and it was possible to accurately identify a subject using about 10 out of 64 electrodes. The Authors in  proposed hybrid optimization techniques based on binary flower pollination algorithm (FPA) and -hill climbing (called FPA -hc) for selecting the most relative EEG channels (i.e., features) that come up with efficient accuracy rate of personal identification. The proposed method is able to identify persons with high Acc, Sen, , and and less number of channels selected. However, these studies have concentrated only on the number of channels as baseline for optimization process.
In , the authors have proposed novel method for EEG signal denoising based on the multiobjective flower pollination algorithm. They designed a multiobjective function that considers a balance between reducing the EEG noise and keeping its signal energy. In , the authors proposed multiobjective optimization method for optimal electroencephalographic (EEG) channel selection to provide access to subjects with permission in a system by detecting intruders and identifying the subject. The optimization process was performed by the nondominated sorting genetic algorithm (NSGA). The optimization process consists of finding the best nu and gamma for the SVM with the RBF kernel to increase the TAR, TRR, and accuracy of subject identification or maintain them as high as possible for previous configurations, while using the smallest number of possible EEG channels. However, the optimization process is restricted within SVM hyperparameters, and it is hard to generalize for another study, especially when using different classifiers where each classifier has its own characteristics and hyperparameters.
To summarize, for person identification within optimization algorithms, two schemes have been observed: first, optimization scheme based on single objective criteria, mainly channel selection; second, optimization scheme based multiobjective criteria such as channel selection, EEG noise, and classifiers hyperparameters. Bioinformatics applications frequently involve classification problems that require improving the learning accuracy . According to , certain aspects need to be analyzed and improved before reaching an industrial level application of new biometric systems. One is person identification, which is an essential security layer in any secure system. This is also important for the development of portable low-density EEG devices that retain similar accuracy to high-density EEG. Thus, the accuracy of person identification is very important aspect. To the best of our knowledge, on the one hand, this is the first study to present multiobjective optimization based on the number of channels and the classification accuracy weights as baseline for optimization process. On the other hand, this is the first study to implement and test eight optimization algorithms in order to generalize the best algorithm that can be adopted for the person identification task.
3. Cuckoo Search Algorithm
Cuckoo search (CS) algorithm is a natural-based swarm-intelligence metaheuristic proposed by Yang and Deb  to imitate the behavior of cuckoo birds in the reproduction process. It simulates the way of cuckoo bird when laying its fertilized eggs in other bird’s nest where its children are looked after by proxy parents. Cuckoo bird may also remove the original nest eggs to improve the hatching chance of their eggs. When the proxy parents discover that their foreign eggs do not belong to them, they either throw them out of the nest or abandon the nest. The process of the cuckoo egg reproductions is modeled as an optimization algorithm to formulate CS. Three assumptions are adopted to formulate CS algorithm in optimization context.(i)Each cuckoo chooses only one nest to lay one egg in that nest.(ii)The high quality egg in the best nest is marked to be used in the next generations.(iii)Since the number of hosting nests is predetermined in advance, the host cuckoo can discover that the eggs in the nest are not its own eggs with a probability of where . In this case, the host birds either throw the foreign eggs or abandon the nest and rebuild another one in different place.
In CS algorithm, the eggs in each nest represent the set of solutions while the cuckoo eggs represent the new solution (see Figure 1). The quality of eggs in the nest is the fitness function of that solution. The ultimate aim is to replace the eggs in a nest with potentially better cuckoo eggs. The cuckoo frequently changes its position using Levy flights after leaving nest. The host bird can throw the cuckoo eggs or leave the nest when cuckoo eggs are discovered. The flowchart of the CS algorithm is given in Figure 1. The pseudocode of CS algorithm is given in Algorithm 1. Table 1 shows the local and global search parameters of CS algorithm. The discussion below provides procedural steps of the CS algorithm.
Step 1: initialize CS algorithm parameters. Initially, the optimization problem is conventionally modeled in terms of objective function as follows: where is the objective function to evaluate the quality of the solution of decision variables. Each decision variable in which is the lower bound and is the upper bound of variable , respectively. The parameters of the optimization problem are normally extracted from the datasets. The objective function is used to evaluate the solutions of the problem. The CS parameters can be divided into two types: (i) algorithmic parameters such as maximum number of iterations and number of nests or population size; (ii) control parameter which is the discovery rate of alien eggs/solutions. Step 2: initialize the host nest population (HNP). The host nest population is formulated as a matrix of size , where the is the total number of eggs in the nests and is the solution dimension. Each row in the represents a solution as shown in the following equation: The objective function value of each solution is also calculated. Step 3: this step is also called global random walk. For each solution, in the is updated (i.e., ) using Levy flights step as formulated in the following equation: where where is the step size scale factor while is the step size. Note that the step size is calculated based on the scale size of the optimization problem on hand [35–37]. The mathematical notation refers to pairwise product operation. is the flights and is calculated based on heavy-tailed probability distribution formulated in (3). The random walk is represented in the stochastic equation (4). is the gamma function. Step 4: update the host nest population. In order to update the HNP, each solution updated by flights step is compared with another randomly selected solution . Thereafter, the solution is replaced by solution , if the latter is better. Step 5: local random probability of , each solution in the is check for weather or not abandoned as follows: where and are two different randomly selected solutions and is the Heaviside function. is a function that generates a random number extracted from a uniform distribution, and is the step size. For more clarifications about the CS algorithm convergence behavior, interesting papers can be referred to [34, 35, 38]. Step 6: stop criterion. Steps 3, 4, and 5 are repeated until the termination criterion; for example, the maximum number of iterations is met.
CS algorithm is successfully applied to solve several optimization problems like traveling salesman problem , economic load dispatch , face recognition , loading pattern optimization , data clustering , feature selection , short-term load forecasting , modeling proton exchange membrane fuel cells , electric distribution network reconfiguration , optimal reactive power scheduling , contrast enhancement of gray scale images , estimating peak particle velocity in mine blasting , systems of nonlinear equations , maximizing area coverage in wireless sensor networks , job scheduling , and others reported in [35, 54, 55].
However, the framework of the CS algorithm is modified and integrated with other components in order to improve its performance. These modifications include CS algorithm with adaptive parameters [56, 57], multiobjective CSA [45, 58], chaotic CSA [43, 59], binary CS algorithm [60, 61], CS algorithm with other metaheuristic algorithms [52, 62, 63], CS algorithm with other components [52, 64], and other improvements of CS algorithm [44, 51, 59, 65].
This section provides a full explanation of the methodology of the proposed MOCS with KNN classifier (MOCS-KNN) to solve EEG channel selection problem. Overall, the methodology has five phases. Figure 2 shows the flowchart of these phases. Phase I involved EEG signal acquisition task which has been done using 64 electrodes. Section 5.2 will provide more details about this phase. In Phase II, two conventional filters (band-pass and notch filter) were used to remove unwanted artifacts from the original EEG signal such as those used in , and then wavelet was applied to denoise the EEG signal as suggested in . In Phase III, three autoregressive coefficients have been extracted from the denoised EEG signal as feature extraction data, that is, , , and , which are suggested by Rodrigues et al. .
Phase IV is the main contribution of this work where a multiobjective cuckoo search algorithm for EEG channel selection is proposed. The following subsections explain in detail the proposed method.
4.1. Formulation of Multiobjective Approach
In this work, we used a weight sum approach for implementing multiobjective optimization as suggested by . In the weighted sum approach, the weighting coefficients consider the preferences of the multiple objectives. Basically, the multiobjective optimization for EEG channel selection can be defined as follows:withwhere is the number of objective functions and refers to the nonnegative weights.where and refer to accuracy measure (12) and number of electrodes selected, respectively. and refer to the weights of and .
4.2. Transfer Function
Since the proposed approach was initially designed to handle continuous-valued optimization problems, we need to map each possible solution onto a binary-valued position (i.e., the EEG channel selection problem requires encoding each possible solution as a binary vector, where “0” means the channel will not be used and “1” the opposite situation) [1, 67]. In order to restrict binary solutions only, we need to use the so-called “transfer function” , which is defined as follows:whereand . Figure 3 illustrates how to build a binary vector and to select the optimal EEG subset channels using MOCS-KNN.
There are three steps that must be considered to select the optimal subset of channels. First, random initialization of the binary vector (representing the EEG channels) is conducted, where “1” means that a given channel will be selected and “0” indicates that the channel will not be selected. Later, the MOCS-KNN will start searching for the space to find the optimal subset of channels, i.e., the one that can provide the highest accuracy rate. Finally, we discard all channels with “0” values and keep the remaining ones.
4.3. Cuckoo Search Algorithm for EEG Channel Selection
MOCS-KKN is a powerful metaheuristic swarm-based optimization algorithm. MOCS-KKN has a high ability to explore and exploit a particular problem search space using its two control parameters, A and C. In addition, it can explore the search space optimally using its best three solutions. Therefore, MOCS-KKN is adapted for the EEG channel selection problem (MOCS-KKN) in an attempt to find the optimal/near-optimal EEG channel set and achieve the highest accuracy rate. Each solution provided by MOCS-KKN is evaluated based on the objective function (12). The main MOCS-KKN adaptation steps for the EEG channel selection problem are thoroughly discussed below. Step 1: initialize MOCS parameters. The first step of adapting MOCS is initializing the EEG channel selection problem and MOCS parameters. The EEG channel selection problem parameters are . MOCS parameters are the minimum and maximum ranges for the search agent, which are initialized to be 1 and 64, respectively, due to the total number of EEG channels, the number of search agents in the pack , and the maximum number of iterations . Step 2: initialize MOCS population. In this step, all MOCS’s solutions are initialized and generated randomly to configure the population. Each solution represents a cuckoo in MOCS and contains the AR feature’s coefficient. Figure 4 presents a solution in MOCS-CS population (P). P contains 30 solutions as shown in the following equation: Step 3: objective function evaluation. As mentioned previously, each solution is evaluated based on the objective function in (8). After this evaluation, the best three solutions will be assigned to best cuckoo. Step 4: update MOCS-KNN population. The population of BMOCS-KNN method will be updated in this step in an attempt to find better solutions and achieve the optimal EEG channel set. This updating can be done using (4). The updating mechanism starts by generating new solutions. Step 5: check the stop criterion.
Steps 3 and 4 of MOCS-KNN are repeated until the stop criterion is met.
5. Result and Discussion
In this section, we discuss the details of the experiments used to assess the robustness of the proposed approach as well as the dataset employed in this work. Parameter setting and experimental setup are later discussed in Section 5.3, while Section 5.4 presents a comparison between the proposed approach, MOCS-KNN, and other metaheuristic algorithms.
5.1. The Performance of Traditional EEG Classification Methods
The main purpose of this section is to provide a brief idea about the performance of traditional machine learning classification approach used for EEG-based personal identification problem. The measurements used to evaluate the performance are the classification accuracy and the area under curve (AUC). The results obtained are summarized in Table 2 using three datasets. Several traditional EEG classification methods are experimented with: artificial neural networks (ANN), linear support vector machines, support vector machine with radial basis function (RBF-SVM), -nearest neighbors (-NN), decision tree (J48), optimum-path forest (OPF), Naive Bayes, and linear discriminant analysis (LDA). Based on the results reported, the KNN is able to achieve better classification accuracy for EEG-based personal identification problem. Therefore, the KNN is adopted for MOCS-EEG.
The area under curve (AUC) measures and confusion matrix are also visualized for KNN results in Figure 5.
In this work, a standard EEG dataset  has been used for evaluating the proposed method (FPA -hc). The brain signals of this dataset are collected from 109 subjects using brain-computer interface software called BCI2000 system . The EEG signals are then acquired from 64 electrodes (i.e., channels), and each subject performs 12 motor/imagery tasks (i.e., 12 records of EEG signals for each subject). Further, AR features are extracted from these 12 recordings with three different number of coefficients: AR5, AR10, and AR20. To reduce the dispersion of the EEG patterns and to quickly process the extracted features, we compute the mean value of each electrode. Figure 6 shows the distribution of the electrodes of the EEG dataset used in the paper.
5.3. Experimental Setup
In this section, the performance of the proposed channel selection approach and other approaches was evaluated using three EEG signal datasets collected by applying autoregressive (AR) models according to three different coefficients. The solution representation in all channel selection approaches is represented by a vector that consists of a series of 1’s and 0’s, where “1” means that the channel is selected and “0” means that the channel is ignored. During classification process, the EEG signal data dimension will be reduced and formed solely according to those channels endorsed by channel selection approaches. On the other hand, the channels that were not endorsed will be removed from the original dataset. Afterwards, the classification process is applied here using 10-fold-cross-validation, where the reduced data is iteratively divided into 10 parts, where one part is considered as testing data and the remaining parts as training data. This process is repeated 10 times where the testing part is allocated new samples each time until all samples being covered. The 10-fold-cross-validation process is presented in Figure 7. In this work, the classification accuracy obtained by -nearest neighbors (KNN) and the number of channels are used to design the multiobjective fitness function.
Table 3 shows the parameters used for selected metaheuristic algorithms in this work. With respect to CS, we need to define , which is utilized for the computation of the Levy distribution and . stands for the probability of replacing worst nest by new constructed ones.
5.4. Comparison between MOCS-KNN and Other Metaheuristic Algorithms
Since the proposed approach is nondeterministic, we computed the mean accuracy rate over 25 runs to avoid biased results. The experiments have been performed using a Lenovo PC, Intel® Core i7 2.59 GHz processor, 12 GB of RAM, and official Windows 10. The performance of the MOCS-KNN is evaluated using five measures: (i) accuracy , (ii) Specificity , (iii) F-score , (iv) Sensitivity or Recall , and (v) the number of selected channels , which can be computed as follows:where , , and represent the false rejection, false acceptance, true acceptance, and true rejection, respectively.
Figures 8–10 show the boxplot and convergence rate over 25 runs for selected metaheuristic algorithms during the experimental evaluation using AR5, AR10, and AR20, respectively. The boxplot components are defined as follows: box length illustrates interquartile range, the whiskers indicate the range of the values, the horizontal line in the box indicates the median value, and the outliers are represented by the circles. The boxplots reveal that MOCS-KNN managed to yield highly accurate results. As shown in Figure 8, for AR5 and AR20 datasets, it can be observed that MOCS-KNN shows a superior efficacy in convergence trends compared to other metaheuristic algorithms. For AR10 dataset, MOCS-KNN and MOMVO-KNN show competitive efficacy in the early stage of convergence, but in the later stages, MOCS-KNN surpasses MOMVO-KNN. Overall, MOCS-KNN shows improved convergence learning due to its capability to pave the way for its swarm to achieve the best trajectory leading to global optimal solution by avoiding stagnation drawbacks.
To further validate the results obtained by MOCS-KNN and other methods, Wilcoxon signed-rank statistical test  is adopted in this study to show if there is statistically significant difference between these methods. In Table 4, Z-value represents standardized test statistics, and -value represents the statistical significance . A value 0.5 means that there is statistical significant difference between paired methods; otherwise, there is no statistical significant difference. From Table 4, it can be observed that MOCS-KNN achieved statistical significant results in all datasets when compared with other methods.
In this section, the performance of the proposed method (MOCS-KNN) is compared with other seven metaheuristic algorithms (PSO algorithm (MOPSO-KNN), GWO algorithm (MOGWO-KNN), binary FFA algorithm (MOFFA-KNN), binary BAT (MOBAT-KNN), MVO (MOMVO-KNN), WOA (MOWOA-KNN), and MFO (MOMFO-KNN)). The comparison includes five measures, which are accuracy ratio , channels selected , Specificity , F-score , and Recall . Table 5 shows the results of proposed technique (MOCS-KNN) with other metaheuristic algorithms using autoregressive three different coefficients. Overall, it is worth mentioning that the MOCS-KNN obtained the best results on all measurements for all datasets. To be more precise, in terms of number of channels, the results of MOCS-KNN and MOWOA-KNN are equal, where MOCS-KNN obtained the minimum number of channels in AR20 (24), while MOWOA-KNN obtained the minimum number of channels in AR10 (25), and both methods minimize the number of channels in AR5 to the least length (24). To gain a clear overview of the performance of MOCS-KNN and other methods in all measurements, the summation of ranks is applied in AR5, AR10, and AR20 datasets for all measurements as shown in Table 6. To elaborate the summation of ranks procedure, the method that achieved the best result will be given a rank of “1,” the second best method will be given a rank of “2,” etc. The summation of ranks in the last row of Table 6 represents the sum of ranks of each method with the corresponding datasets. The bold font highlights the best result. The results suggest that MOCS-KNN achieved the best performance in all evaluation measurements, followed by MOMVO, MOPSO, MOWOA, MOFFA, MOMFO, and MOGWO.
6. Conclusion and Future Work
In this work, we proposed a binary version of multiobjective approach using several metaheuristic algorithms with the aim of addressing the challenge of channel selection in EEG-based biometric person identification. The main purpose of this work is to demonstrate that not all available EEG channels need to be used to achieve high accuracy rate. Therefore, we introduce for modeling the problem of channel selection as an optimization issue, where the channel subset which optimizes the recognition ratio over a validation set is utilized as the fitness function.
The outcomes of experiments showed that the introduced method outperformed several metaheuristic algorithms and the one proposed by Rodrigues et al. . It is worth noting that, while retaining high accuracy rates, the number of sensors has been lessened by half. Additionally, the outcomes displayed a positive correlation between the number of features obtained from the EEG signal and the accuracy ratio; i.e., further features lead to higher accuracy rates. Such finding suggests that the proposed algorithm has the potential to remove duplicate and undesirable features whereas retaining specific features.
Regarding the future work, we intend to evaluate selected metaheuristic algorithms over different features, such as time- and frequency-domain information, to improve the overall identification performance while selecting fewer channels.
The dataset was taken from https://www.physionet.org/.
Conflicts of Interest
The authors declare that they have no conflicts of interest.
This work was supported in part by the Korea Institute for Advancement of Technology (KIAT) grant funded by the Korea Government (MOTIE), the Competency Development Program for Industry Specialist, under Grant P0008703, and in part by the Ministry of Science and ICT (MSIT), South Korea, under the Information Technology Research Center (ITRC) Support Program IITP-2021-2018-0-01799 supervised by the Institute for Information and Communications Technology Planning and Evaluation (IITP).
T. Kumar, A. Braeken, M. Liyanage, and M. Ylianttila, “Identity privacy preserving biometric based authentication scheme for naked healthcare environment,” in Proceedings of the 2017 IEEE International Conference on Communications (ICC), pp. 1–7, Paris, France, May 2017.View at: Google Scholar
Y. Sun, “Securing body sensor networks and pervasive healthcare systems,” Imperial College London, London, UK, 2019, Thesis (Ph.D).View at: Google Scholar
Z. A. A. Alyasseri, A. T. Khader, M. A. Al-Betar, J. P. Papa, and O. ahmad Alomari, “EEG-based person authentication using multi-objective flower pollination algorithm,” in Proceedings of the 2018 IEEE Congress on Evolutionary Computation (CEC), pp. 1–8, Rio de Janeiro, Brazil, July 2018.View at: Google Scholar
J. Määttä, A. Hadid, and M. Pietikäinen, “Face spoofing detection from single images using micro-texture analysis,” in Proceedings of the 2011 International Joint Conference on Biometrics, pp. 1–7, Washington, DC, USA, October 2011.View at: Google Scholar
N. Erdogmus and S. Marcel, “Spoofing in 2D face recognition with 3D masks and anti-spoofing with kinect,” in Proceedings of the 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pp. 1–6, Arlington, VA, USA, September 2013.View at: Google Scholar
P. Tome, M. Vanoni, and S. Marcel, “On the vulnerability of finger vein recognition to spoofing,” in Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), pp. 1–10, Darmstadt, Germany, September 2014.View at: Google Scholar
S. Marcel, M. S. Nixon, and S. Z. Li, Handbook of Biometric Anti-spoofing, Springer, Berlin, Germany, 2014.
Z. A. A. Alyasseri, A. T. Khader, M. A. Al-Betar, A. K. Abasi, and S. N. Makhadmeh, “EEG signal denoising using hybridizing method between wavelet transform with genetic algorithm,” in Proceedings of the 11th National Technical Seminar on Unmanned System Technology 2019, pp. 449–469, Singapore, January 2021.View at: Google Scholar
Z. A. A. Alyasseri, A. K. Abasi, M. A. Al-Betar et al., “EEG-based person identification using multi-verse optimizer as unsupervised clustering techniques, Evolutionary Data Clustering,” Algorithms and Applications, vol. 89, 2021.View at: Google Scholar
M. S. Omar, S. A. Hassan, H. Pervaiz et al., “Multiobjective optimization in 5g hybrid networks,” IEEE Internet of Things Journal, vol. 5, no. 3, pp. 1588–1597, 2017.View at: Google Scholar
M. Neyja, S. Mumtaz, K. M. S. Huq, S. A. Busari, J. Rodriguez, and Z. Zhou, “An iot-based e-health monitoring system using ECG signal,” in Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference, pp. 1–6, Singapore, December 2017.View at: Google Scholar
D. Kimovski, J. Ortega, A. Ortiz, and R. Banos, “Feature selection in high-dimensional EEG data by parallel multi-objective optimization,” in Proceedings of the 2014 IEEE International Conference on Cluster Computing (CLUSTER), pp. 314–322, Madrid, Spain, September 2014.View at: Google Scholar
L. Ferariu, C. Cîmpanu, T. Dumitriu, and F. Ungureanu, “EEG multi-objective feature selection using temporal extension,” in Proceedings of the 2018 IEEE 14th International Conference on Intelligent Computer Communication and Processing (ICCP), pp. 105–110, Cluj-Napoca, Romania, September 2018.View at: Google Scholar
S. K. Goh, H. A. Abbass, K. C. Tan, and A. Al Mamun, “Artifact removal from EEG using a multi-objective independent component analysis model,” in Proceedings of the International Conference on Neural Information Processing, pp. 570–577, Kuching, Malaysia, November 2014.View at: Google Scholar
X.-S. Yang and S. Deb, “Cuckoo search via lévy flights,” in Proceedings of the 2009 World Congress on Nature and Biologically Inspired Computing (NaBIC), pp. 210–214, Coimbatore, India, December 2009.View at: Google Scholar
S. N. Makhadmeh, A. T. Khader, M. A. Al-Betar, S. Naim, A. K. Abasi, and Z. A. A. Alyasseri, “A novel hybrid grey wolf optimizer with min-conflict algorithm for power scheduling problem in a smart home,” Swarm and Evolutionary Computation, vol. 60, Article ID 100793, 2021.View at: Publisher Site | Google Scholar
Z. A. A. Alyasseri, M. A. Al-Betar, M. A. Awadallah et al., “A hybrid flower pollination with β-hill climbing algorithm for global optimization,” Journal of King Saud University-Computer and Information Sciences, vol. 21, 2021, In press.View at: Google Scholar
H. T. T. Binh, N. T. Hanh, L. Van Quan, and N. Dey, “Improved cuckoo search and chaotic flower pollination optimization algorithm for maximizing area coverage in wireless sensor networks,” Neural Computing and Applications, vol. 30, no. 7, pp. 2305–2317, 2018.View at: Publisher Site | Google Scholar
M. Shehab, A. T. Khader, and M. A. Al-Betar, “A survey on applications and variants of the cuckoo search algorithm,” Applied Soft Computing, vol. 61, 2017.View at: Google Scholar
M. M. Sahoo, R. Dash, R. Dash, and R. Rautray, “Cuckoo search algorithm: a review,” in ICDSMLA 2019, Springer, Berlin, Germany, 2020.View at: Google Scholar
M. kelidari and J. Hamidzadeh, “Feature selection by using chaotic cuckoo optimization algorithm with levy flight, opposition-based learning and disruption operator,” Soft Computing, vol. 25, pp. 1–23, 2020.View at: Google Scholar
D. Rodrigues, X.-S. Yang, A. N. De Souza, and J. P. Papa, “Binary flower pollination algorithm and its application to feature selection,” in Recent Advances in Swarm Intelligence and Evolutionary Computation, Springer, Berlin, Germany, 2015.View at: Google Scholar
F. Wilcoxon, “Individual comparisons by ranking methods,” in Breakthroughs in Statistics, Springer, Berlin, Germany, 1992.View at: Google Scholar