Skip to main content

Transient ischemic attack analysis through non-contact approaches

Abstract

The transient ischemic attack (TIA) is a kind of sudden disease, which has the characteristics of short duration and high frequency. Since most patients can return to normal after the onset of the disease, it is often neglected. Medical research has proved that patients are prone to stroke in a relatively short time after the transient ischemic attacks. Therefore, it is extremely important to effectively monitor transient ischemic attack, especially for elderly people living alone. At present, video monitoring and wearing sensors are generally used to monitor transient ischemic attacks, but these methods have certain disadvantages. In order to more conveniently and accurately monitor transient ischemic attack in the indoor environment and improve risk management of stroke, this paper uses a microwave sensing platform working in C-Band (4.0 GHz–8.0 GHz) to monitor in a non-contact way. The platform first collects data, then preprocesses the data, and finally uses principal component analysis to reduce the dimension of the data. Two machine learning algorithms support vector machine (SVM) and random forest (RF) are used to establish prediction models respectively. The experimental results show that the accuracy of SVM and RF approaches are 97.3% and 98.7%, respectively; indicating that the scheme described in this paper is feasible and reliable.

Introduction

Transient ischemic attack (TIA) is a transient neurological disorder caused by focal ischemia of the brain or retina without acute infarction. The clinical symptoms usually last less than 1 hour and the neurological function can return to normal after the onset [1]. TIA is characterized by sudden onset, short duration and high frequency of attack. Currently, the causes of TIA are generally recognized by the medical community as follows :(1) Embolus in arterial blood flows into the brain, resulting in blockage and poor circulation of blood. (2) When blood pressure fluctuates, especially when blood pressure drops, the blood flow in the distal part of the brain’s smaller blood vessels decreases. (3) Changes in blood composition cause blood clots to form in blood vessels, which can block blood vessels in the brain [2] [3]. Relevant clinical experimental data show that TIA has an early warning effect on stroke. After TIA, the incidence of stroke within 48 h is as high as 50%, and the incidence of stroke within 3 months is 10%–20% [4]. Every year, there are many old people living alone in the world who do not receive effective attention and timely treatment when suffering from TIA, resulting in a subsequent stroke or even death. Some literatures also give other aspects of TIA [5,6,7], indicating the necessity of monitoring TIA at early stage [8].

The main symptom of TIA is that the patient suddenly falling down due to the weakness of both legs, accompanied by vertigo or vomiting, especially when he suddenly gets up after sitting or lying for a long time [9]. For patients with TIA, early treatment should be given to quickly rule out bleeding in the brain or seizures.

At present, various advanced methods and technologies have been used in the diseases prediction and healthcare fields, including acceleration sensors [10], cameras [11], Multiple GPUs [12], Accounting for Label Uncertainty in Machine Learning [13], machine intelligence [14], mobile healthcare framework [15], deep learning approach [16], system in Internet of Medical Things [17], predictive analytics [18] and cloud computing environment [19]. All these significant contributions show their advantage and great usefulness.

In this work, the authors develop a wireless sensing platform (WSP), which is composed of a transmitter and a receiver and this platform also has its unique advantage. It can be installed indoors without any contact with patients. The working process of the WSP is as follows: the transmitter transmits the electromagnetic wave in the C band, the receiver receives the wireless signal and simultaneously extracts the wireless channel state information (CSI) data and saves them. Firstly, we conducted a series of preprocessing on the collected CSI data, including removal of outliers and signal denoising, and then used principal component analysis (PCA) to reduce the dimensionality of the preprocessed data [20]. Finally, two machine learning algorithms, support vector machine (SVM) and random forest (RF) [21, 22], were used to classify, so as to monitor TIA. The experimental results in this paper show that the accuracy of the two machine learning algorithms can reach over 95%, which proves that the method described in this paper can effectively monitor TIA, so as to reduce the life risk of the elderly living alone.

The contributions of this paper are as follows:

  1. 1.

    It is proposed for the first time to monitor TIA by using C-band wireless sensing technology, which avoids the additional burden of wearable devices of monitored objects and does not invade their privacy;

  2. 2.

    Two kinds of machine learning algorithms are used to train the prediction model to increase the stability and accuracy of the prediction results;

  3. 3.

    Our self-developed WSP has the advantages of low cost, convenient and fast.

The rest of the paper is arranged as follows. In the second part, we will introduce the principle of C-Band wireless sensing technology in detail, and the third part will describe the experimental scheme. In the fourth part, we will preprocess the experimental data and classify them by the machine learning algorithms. Experimental results will be discussed in the fifth part, and finally, we summarize the article in the sixth part.

Principle of C-band wireless sensing technology

Wireless signal propagation model

C band has been included in the official document of the Ministry of Industry and Information Technology of the People’s Republic of China; in addition, the usage of this band is also recommended by the microwave stations within the Chinese territory. C-Band wireless signal has the characteristics of light like scattering and line-of-sight (LOS) propagation. In the process of propagation, it is easy to be interfered with space environment and appear fading, so that the electromagnetic wave propagating in different paths shows different amplitudes and phases at the receiving end, resulting in multipath effect [23]. The indoor propagation model of C-Band signal is shown in Fig. 1.

Fig. 1
figure 1

Wireless signal propagation model for indoor environment

According to Fries transfer formula [24], the power of the receiving antenna can be expressed as:

$$P_{r} = \frac{{P_{t} G_{t} G_{r} \lambda^{2} }}{{\left( {4\pi R} \right)^{2} }}$$
(1)

where \(P_{t}\), \(P_{r}\) are the power of transmitting antenna and receiving antenna respectively. \(G_{t} ,G_{r}\) are the gain of transmitting antenna and receiving antenna respectively, \(\lambda\) is the wavelength of wireless signal, and R is the distance between the two antennas.

According to Fig. 1, we assume that the distance of the wireless signal reflected through the ceiling and the ground is D, and the distance scattered by the human body is H, then (1) can be rewritten as:

$$P_{r} = \frac{{P_{t} G_{t} G_{r} \lambda^{2} }}{{16\pi^{2} \left( {R + D + H} \right)^{2} }}$$
(2)

According to (2), when there is no moving object on the signal transmission path, R, D and H remain unchanged, and the power of the receiving antenna \(P_{r}\) is stable. When an object moves in the path of signal transmission, H will change, resulting in a change in the received power, that is, the amplitude and phase of the received signal will change. The different amplitude and phase of the received signal contains rich information about the external environment. By processing of the received signal, we can extract the change information of the external environment from the received signal, so as to achieve the purpose of monitoring.

Channel information

The C-Band WSP used in this paper adopts orthogonal frequency division multiplexing (OFDM) technology at the transmitter. The main advantage of this technology is to improve the data transmission efficiency and spectrum utilization, and it has a good anti-multipath attenuation capability [25]. The platform includes: spectrum analyzer, RF generator, Cables, vector network analyzer, antennas, absorbing material, networked computer, etc.

OFDM technology supports multi-antenna access. If MIMO-OFDM system has \(N_{T}\) (at least 2) antennas at the transmitter and \(N_{R}\) (at least 2) antennas at the receiver, the number of OFDM subcarriers is \(N_{C}\), then the channel model of wireless system can be expressed as [26],

$$Y = \varvec{H}X + N$$
(3)

where \(Y\) represents received signal, \(X\) represents transmitted signal, \(N\) represents ambient noise, \(\varvec{H}\) represents the wireless channel state matrix, and its dimension is \(N_{T} \times N_{R} \times N_{C}\), as shown below,

$$H = \left[ {\begin{array}{*{20}c} {H_{11} } & {H_{12} } & \ldots & {H_{{1N_{R} }} } \\ {H_{21} } & {H_{22} } & \ldots & {H_{{2N_{R} }} } \\ \vdots & \vdots & \ldots & \vdots \\ {H_{{N_{T} 1}} } & {H_{{N_{T} 2}} } & \ldots & {H_{{N_{T} N_{R} }} } \\ \end{array} } \right].$$
(4)

In the formula above,

$$H_{ij} = \left[ {H_{1} \left( {f_{1} } \right),H_{2} \left( {f_{2} } \right), \ldots ,H_{{N_{C} }} \left( {f_{{N_{C} }} } \right)} \right].$$
(5)

where \(f_{k}\) represents the center frequency of the Kth subcarrier, and \(H_{k} \left( {f_{k} } \right)\left( {1 \le k \le N_{C} } \right)\) represents the frequency response of each subcarrier, which can be rewritten as,

$$H_{k} \left( {f_{k} } \right) = \begin{array}{*{20}c} {H_{k} \left( {f_{k} } \right)} \\ \end{array} e^{{jarg\left( {H_{k} \left( {f_{k} } \right)} \right)}}$$
(6)

where \(\begin{array}{*{20}c} {H_{k} \left( {f_{k} } \right)} \\ \end{array}\) represents CSI amplitude of the Kth subcarrier, and \(arg(H_{k} \left( {f_{k} } \right)\) represents CSI phase of the Kth subcarrier.

The received signal is continuously sampled in a certain period of time. Through channel estimation [27], a series of discrete \(\widehat{H}\) matrices are obtained. Thus, the CSI data we need is obtained. The channel estimation formula is as follows,

$$\widehat{H} \approx \frac{Y}{X}$$
(7)

The experimental scheme

It can be seen from the first section that the obvious symptom of TIA is that the patient suddenly falls down due to weakness of both legs. We need to distinguish TIA from other normal daily actions. In this experiment, we will collect data of several actions as shown in Table 1.

Table 1 Daily actions and TIA in the experiment

Before the experiment, all the subjects were informed about the matters needing attention, on the other hand, all the subjects were trained, rigorously, about the TIA movements simulation. The experiment was carried out in an approximate ward environment. The size of the laboratory is 7 × 5 m. The transmitter and the receiver of WSP are placed at both ends of the room, respectively. The object makes the actions shown in Table 1 in the room. The experimental scene is similar to Fig. 1, and the actual experimental scene has sofa, bookcase and other furniture. Absorbing material will reduce the signal reflection and thus the non-line-of-sight propagation would be affected. However, in actual application scenarios, absorbing material is seldomly used, leading to the fact that the multipath propagation has to be taken into account. Due to the fact that single subject was considered, monopole antennas were used in the experiment. They transmit and receive omnidirectional EM waves and easy to design; more complicated directional antennas can be used for some other special environments.

The experimental flow is shown in Fig. 2.

Fig. 2
figure 2

The experiment flow chart

In Fig. 2, the WSP is a self-designed device for monitoring TIA, which is composed of a transmitter, a receiver and a data processing module. The transmitter works in C-Band and adopts OFDM technology. The transmitting signal bandwidth is 40 MHz and there are 30 subcarriers in total. At the same time, the time window is 5 s. The receiver receives the signal, calculates the channel state matrix, and obtains the CSI data. The data processing module first processes the CSI data, and then classifies the indoor human activities through the model trained by the machine learning algorithm, so as to achieve the purpose of monitoring. The platform is a non-contact monitoring tool, which can be directly installed indoors, very safe and convenient.

We collected 300 samples for each action. The waveform of TIA original data collected in the experiment is shown in Fig. 3.

Fig. 3
figure 3

The waveform of TIA original data

From Fig. 3, we can see that the waveform contains a lot of burrs (noise), which need to be processed. Next, we will describe how to process the data.

The data processing

This section details the data processing approach as shown in Fig. 2.

Data preprocessing

Select subcarrier

In order to eliminate redundant information and facilitate subsequent data processing, we need to pick out the appropriate subcarriers. We calculate the variance of 30 subcarriers of each group of data separately. According to the principle, the larger the variance, the larger the amount of information [28], the sequence number of subcarriers selected for each action is shown in Table 2.

Table 2 Selected subcarrier number for each action

Remove outliers

The fluctuation of equipment voltage or other factors will cause outliers, which will affect the subsequent data processing. We will remove the outliers according to the Pauta criterion [29]. The original waveform of the TIA is shown in Fig. 4a, after removing the outliers, the waveform is shown in Fig. 4b.

Fig. 4
figure 4

TIA No.11 subcarrier waveform. a Original waveform of TIA. b TIA waveform after removing outliers

Signal filtering

Before feature extraction, we need to denoise the signal. In this paper, a wavelet transform is used to filter out the signal noise [30], which is mainly based on the following considerations: (1) wavelet transform has good time–frequency characteristics; (2) wavelet transform can well describe the non-stationary characteristics of the signal; (3) wavelet basis function selection is relatively flexible.

In this paper, the signal is decomposed into five layers using the “sym8” wavelet. The Symlet wavelet function is an approximate symmetric wavelet function proposed by Ingrid Daubechies, which is an improvement on the dB function. SimN (N = 2,3,…,8) wavelet has good symmetry, which can reduce the phase distortion of signal analysis and reconstruction to some extent [31]. The waveforms of the motion after the wavelet transform filtering process are shown in Fig. 5. It can be clearly seen from Fig. 5 that the signal waveform is clear and smooth.

Fig. 5
figure 5

Waveform of each action after denoising. a The waveform of “standing”. b The waveform of “sitting”. c The waveform of “lying”. d The waveform of “stand up”. e The waveform of “sit down” . f The waveform of “walking”. g The waveform of “TIA”

Data classification

Feature extraction

Due to the large dimension of data, we will use PCA to reduce the dimension and extract features. In 1901, K. Pearson proposed PCA. The idea of this method is to extract a set of new features that are not related to each other from old features. The new features are arranged in descending order of importance [32].

The principle of PCA is as follows,

$$Y = \varvec{A}X$$
(8)

where, \(X = \left( {x_{1} ,x_{2} , \ldots ,x_{n} } \right)\) is the vector in the original n-dimensional feature space, \(Y = \left( {y_{1} ,y_{2} , \ldots ,y_{n} } \right)\) is a vector composed of n new features, and \(\varvec{A}\) is an orthogonal transformation matrix. The new features can be expressed as follows,

$$y_{i} = \mathop \sum \limits_{j = 1}^{n} a_{ij} x_{j} = \varvec{a}_{i}^{T} x_{j} \left( {i = 1,2, \ldots n} \right)$$
(9)

The larger the variance of the new feature, the greater difference in the feature of the sample, and this feature is more important. The variance of each new feature is:

$$var\left( {y_{i} } \right) = E\left[ {y_{i}^{2} } \right] - E\left[ {y_{i} } \right]^{2} .$$
(10)

E[] is a mathematical expectation, combined with (2), (3) can be reduced to

$$var\left( {y_{i} } \right) = \varvec{a}_{i}^{T} {\varvec{\Sigma}}\varvec{a}_{i}$$
(11)

where \({\varvec{\Sigma}}\) is the covariance matrix of the original eigenvector \(X\), which can be estimated and calculated with samples. Because \(\varvec{A}\) is an orthogonal matrix, so \(\varvec{a}_{i}^{T} \varvec{a}_{i} = 1\). Using Lagrange method, we can get the maximum variance value as follows,

$$f\left( {\varvec{a}_{i} } \right) = \varvec{a}_{i}^{T} {\varvec{\Sigma}}\varvec{a}_{i} - \lambda \left( {\varvec{a}_{i}^{T} \varvec{a}_{i} - 1} \right)$$
(12)

where λ is the Lagrange multiplier, and the derivative of (5) for \(\varvec{a}_{i}\) is obtained as follows,

$${\varvec{\Sigma}}\varvec{a}_{i} = \lambda \varvec{a}_{i}$$
(13)

Substituting (13) into (11), we can get

$$var\left( {y_{i} } \right) = \varvec{a}_{i}^{T} {\varvec{\Sigma}}\varvec{a}_{i} = \lambda \varvec{a}_{i}^{T} \varvec{a}_{i} = \lambda$$
(14)

Combining (13) and (14), the optimal \(\varvec{a}_{i}\) should be the eigenvector corresponding to the maximum eigenvalue of \({\varvec{\Sigma}}\), and the corresponding \(y_{i}\) is the first principal component, with the largest variance. The covariance matrix \({\varvec{\Sigma}}\) has a total of n eigenvalues, sorting them from large to small, and then obtaining the second principal component,…, the nth principal component. Thus, the corresponding \(\varvec{a}_{i}\) is obtained, and then the orthogonal transformation matrix \(\varvec{A}\) is obtained.

The proportion of information represented by the first k principal components is:

$$P = \mathop \sum \limits_{i = 1}^{k} \lambda_{i} /\mathop \sum \limits_{i = 1}^{n} \lambda_{i}$$
(15)

As a rule of thumb, most of the information in the data is concentrated on a few principal components. As shown in Fig. 6, we selected the first 53 principal components.

Fig. 6
figure 6

Principal component cumulative contribution rate curve

Fig. 7
figure 7

Precision comparison of two algorithms

Training model

In this paper, SVM and RF are used to classify the data respectively. The basic idea of SVM is to transform the original nonlinear problems in low-dimensional space into linear classification problems in high-dimensional space through feature transformation. This feature transformation is realized by defining appropriate inner product kernel functions. SVM implements different forms of nonlinear classifiers by using different kernel functions, whose performance depends on the selection of kernel functions and the parameter setting of kernel functions. The commonly used kernel functions are: (1) radial basis function; (2) polynomial function; (3) Sigmoid function. Since the linear function can only deal with the linear classification problem and the performance of the Sigmoid function can be obtained by taking a certain parameter of the radial basis function, the radial basis function will be adopted in this paper [21] [33]. The advantages of SVM include high precision, good theoretical guarantees on the overfitting, etc.

The idea of RF is to build many decision trees to form a “forest” and make decisions by voting. Both theoretical and experimental studies show that this method can effectively improve the accuracy of classification [22]. The RF in this paper has 500 decision trees. The advantages of RF include: the resistance to over fitting, stability, etc. It is also worth mentioning that some other advanced machine learning approaches have also been used in the various healthcare and Internet of Things applications [34,35,36,37,38,39,40], which also indicate the path of future research.

Results and discussion

The experimental results

The confusion matrix of the results processed by the classification algorithm is shown in Table 3. The total number of samples for each action is 300, 225 samples are taken as the training set and 75 samples are taken as the test set.

Table 3 Confusion matrix of different classification algorithms

Discussion

  1. 1.

    As shown in Table 3, the accuracy of both SVM and RF is over 95%, and the errors mainly come from static actions (standing, sitting and lying). This result can effectively prove the feasibility and reliability of the method described in this paper.

  2. 2.

    From Table 3, we can also see that if only TIA and other actions are distinguished, the accuracy of SVM will reach 97.3%, and the accuracy of RF will reach 98.7%.

  3. 3.

    It can be seen from Fig. 5a, b and c that the amplitude of static action oscillogram is very gentle, and the differentiation is more obvious than other actions. At the same time, it can be seen from Table 3 that static actions are only internal classification deviation, and other actions will not be misjudged as static actions, and static actions will not be misjudged as other actions. At the same time, the accuracy of walking is 100% in both classification algorithms.

  4. 4.

    It can be seen from Fig. 5 d–g that the oscillogram of stand up, sit down, walk and TIA all have their own characteristics. However, due to the similarity between sit down and TIA, there will be some errors between them. From Table 3, it can be seen that there are one or two sample classification errors in sit down and TIA.

  5. 5.

    In this paper, the accuracy of the RF algorithm is higher than that of the SVM algorithm., so RF is more suitable algorithm for monitoring of TIA.

All the important abbreviations are summarized in the following table:

Conclusion

Monitoring TIA can make patients get timely treatment, which is helpful to prevent patients from subsequent stroke. As far as we know, this paper is the first time to use C-Band wireless sensing technology to monitor TIA in a non-contact way. Firstly, we remove the outliers from the data, filter the data by wavelet transform, then reduce the dimension of the preprocessed data by PCA, and finally train the model by SVM and RF. The accuracy of SVM and RF approaches are 97.3% and 98.7%, respectively; demonstrating the effectiveness of the technology presented in the paper. Next, we further explore the applications of C-Band wireless sensing technology in medical care, and propose more reliable, safe and convenient technical application programs; the main contribution and novelty of the work lies in the development of the platform and the non-contact disease warning in the early stage.

Availability of data and materials

The data were collected by specialized facilities and platforms.

Abbreviations

TIA:

Transient ischemic attack

PCA:

Principle component analysis

SVM:

Support vector machine

RF:

Random forest

IoT:

Internet of things

WCSI:

Wireless channel state information

LoS:

Line of sight

OFDM:

Orthogonal frequency division multiplexing

MIMO:

Multi-input multi-output

RBF:

Radial basis function

References

  1. Bernstein RA, Alberts MJ (2003) Transient ischemic attack-proposed new definition. N Engl J Med 348(16):1607–1609

    Article  Google Scholar 

  2. Johnston SC (2002) Transient ischemic attack. N Engl J Med 348(16):4339

    Google Scholar 

  3. Meyer JS, Muramatsu K, Shirai T (1996) Cerebral embolism as a cause of stroke and transient ischemic attack. Echocardiography 13(5):513–518

    Article  Google Scholar 

  4. Easton JD et al (2009) Definition and evaluation of transient ischemic attack: a scientific statement for healthcare professionals from the American heart Association/American stroke association stroke council; council on cardiovascular surgery and anesthesia; council on cardiovascular radiology and intervention; council on cardiovascular nursing; and the interdisciplinary council on peripheral vascular disease: the American academy of neurology affirms the value of this statement as an educational tool for neurologists. Stroke 40(6):2276–2293

    Article  Google Scholar 

  5. Gennesseaux J, Orsini GG, Lefour S et al (2020) Early management of transient ischemic attack in emergency departments in France. J Stroke Cerebrovascu Dis 29(1):104464

    Article  Google Scholar 

  6. Chang Bernard P, Rostanski Sara, Willey Joshua et al (2019) Safety and feasibility of a rapid outpatient management strategy for transient ischemic attack and minor stroke: the rapid access vascular evaluation-neurology (RAVEN) approach. Ann Emerg Med 74(4):562–571

    Article  Google Scholar 

  7. DeSimone CV, Friedman PA, Noheria A (2013) Stroke or transient ischemic attack in patients with transvenous pacemaker or defibrillator and echocardiographically detected patent foramen ovale. Circulation 128(13):1433–1441

    Article  Google Scholar 

  8. Mcelveen WA, Alway D (2009) Ischemic stroke and transient ischemic attack—acute evaluation and management. Stroke essentials for primary care. Humana Press. https://doi.org/10.1007/978-1-59745-433-9_2

    Article  Google Scholar 

  9. Nakajima M et al (2010) Symptom progression or fluctuation in transient ischemic attack patients predicts subsequent stroke. Cerebrovascular 29(3):221–227

    Article  Google Scholar 

  10. Ichwana D, Arief M, Puteri N Ekariani S. Movements Monitoring and Falling Detection Systems for Transient Ischemic Attack Patients Using Accelerometer Based on Internet of Things,  2018 International Conference on Information Technology Systems and Innovation (ICITSI), BandungPadang, Indonesia, 2018, pp. 491-496

  11. Nguyen VD, Le MT, Do AD, Duong HH, Thai TD, Tran DH. An efficient camera-based surveillance for fall detection of elderly people,  2014 9th IEEE Conference on Industrial Electronics and Applications, Hangzhou, 2014, pp. 994-997

  12. Sierra-Sosa Daniel, Garcia-Zapirain Begonya, Castillo Cristian et al (2019) Scalable healthcare assessment for diabetic patients using deep learning on multiple GPUs. IEEE Trans Industr Inf 15(10):5682–5689

    Article  Google Scholar 

  13. Reamaroon Narathip, Sjoding Michael W, Lin Kaiwen et al (2019) Accounting for label uncertainty in machine learning for detection of acute respiratory distress syndrome. IEEE J Biomed Health Inform 23(1):407–415

    Article  Google Scholar 

  14. Shishvan OR, Zois DS, Soyata T (2018) Machine intelligence in healthcare and medical cyber physical systems: a survey. IEEE Access 20(6):46419–46494

    Article  Google Scholar 

  15. Alhussein M, Muhammad G (2018) Voice pathology detection using deep learning on mobile healthcare framework. IEEE Access 16(6):41034–41041

    Article  Google Scholar 

  16. Benjamin S, Patrick JT, Azra B et al (2018) Deep EHR: a survey of recent advances in deep learning techniques for electronic health record (EHR) analysis. IEEE J Biomed Health Inform 22(5):1589–1604

    Article  Google Scholar 

  17. Sayeed MA, Mohanty SP, Kougianos E, Zaveri HP (2019) Neuro-detect: a machine learning-based fast and accurate seizure detection system in the IoMT. IEEE Transact Consum Electron 65(3):359–368

    Article  Google Scholar 

  18. Johnston Stephen S, Morton John M et al (2019) Using machine learning applied to real-world healthcare data for predictive analytics: an applied example in bariatric surgery. Value Health (Elsevier) 22(5):580–586

    Article  Google Scholar 

  19. Abdelaziz Ahmed, Elhoseny Mohamed et al (2018) A machine learning model for improving healthcare services on cloud computing environment. Measurement 119:117–128

    Article  Google Scholar 

  20. Wold S (1987) Principal component analysis. Chemom Intell Lab Syst 2(1):37–52

    Article  Google Scholar 

  21. Yasutoshi Y (2005) Linear programming approaches for multicategory support vector machines. Eur J Operational Res 162(2):514–531

    Article  MathSciNet  Google Scholar 

  22. Breiman L (2001) Random forests. Mach Learn 45(1):5–32

    Article  Google Scholar 

  23. Chen Z, Zhao Y, Zhao D (2016) Multipath effects on time reversal OFDM communications between wireless sensors, 11th International Symposium on Antennas, Propagation and EM Theory (ISAPE). Guilin 2016:376–379

    Google Scholar 

  24. Volakis J (2009) Antenna engineering handbook, 4th edn. McGraw-Hill, New york

    Google Scholar 

  25. Nee RV, House A (2000) OFDM for wireless multimedia communications. Artech House, Boston

    Google Scholar 

  26. Wang Y, Wu K, Ni LM (2016) Wifall: device-free fall detection by wireless networks. IEEE Transac Mobile Comput 16(2):581–594

    Article  Google Scholar 

  27. Van De Beek JJ et al (2005) On channel estimation in OFDM systems. Vehic Technol Conference IEEE 2:815–819

    Google Scholar 

  28. Stephens DW (1989) Variance and the value of information. Am Nat 134(1):128–140

    Article  Google Scholar 

  29. Dao-Wen C et al. Study on the fast judgment of abnormal value with Excel. International Conference on Computer Science & Network Technology IEEE, 2013

  30. Rieder P, Nossek JA. Implementation of orthogonal wavelet transforms and their applications, Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors, Zurich, Switzerland, 1997, p 489-498

  31. Vijayakumari B, Devi JG, Mathi MI. Analysis of noise removal in ECG signal using symlet wavelet, 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE’16), Kovilpatti, 2016, p 1-6

  32. Pearson K. On lines and planes of closest fit to systems of points in space. London, Edinburgh & Dublin Philosophical Magazine & Journal of Science 1901

  33. Zhiliang L, Zuo MJ, Xu H. Parameter selection for Gaussian radial basis function in support vector machine classification. 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering IEEE, 2012

  34. Shah SA, Fioranelli F. (2019) Human activity recognition: preliminary results for dataset portability using FMCW Radar. In: 2019 International Radar Conference, Toulon, France, 2327 Sept 2019, in press

  35. Fioranelli F, Le Kernec J, Shah SA. Radar for health care: recognizing human activities and monitoring vital signs, in IEEE Potentials, vol. 38, no. 4, p 1623, July-Aug 2019

  36. Shah SA, Fioranelli F, RF Sensing Technologies for Assisted Daily Living in Healthcare: A Comprehensive Review, in IEEE Aerospace and Electronic Systems Magazine, vol. 34, no. 11, p 26-44, 1 Nov. 2019

  37. Shah SI, Shah SY, Shah SA. Intrusion detection through leaky wave cable in conjunction with channel state information. 2019 UK/China Emerging Technologies (UCET) 2019 Aug 21 p1-4. IEEE

  38. Tahir A, Ahmad J, Shah SA, Morison G, Skelton DA, Larijani H, Abbasi QH, Imran MA, Gibson RM (2019) WiFreeze: multiresolution scalograms for freezing of gait detection in Parkinson’s leveraging 5G spectrum with deep learning. Electronics 8:1433

    Article  Google Scholar 

  39. Al-Turjman F, Zahmatkesh H. An Overview of Security and Privacy in Smart Cities IoT Communications, Wiley Transactions on Emerging Telecommunications Technologies, 2019. https://doi.org/10.1002/ett.3677

  40. Al-Turjman F (2020) Intelligence and security in big 5G-oriented IoNT: an overview. Elsevier Future Gener Comput Syst 102(1):357–368

    Article  Google Scholar 

Download references

Acknowledgements

Not applicable.

Funding

The work was supported in part by the National Natural Science Foundation of China 61301175.

Author information

Authors and Affiliations

Authors

Contributions

Idea QZ, original manuscript QZ and XZ, editing and guidance YL and FT, Funding XY, project management XY. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Xiaodong Yang.

Ethics declarations

Competing interests

There are no Competing interests for this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Q., Li, Y., Al-Turjman, F. et al. Transient ischemic attack analysis through non-contact approaches. Hum. Cent. Comput. Inf. Sci. 10, 16 (2020). https://doi.org/10.1186/s13673-020-00223-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13673-020-00223-z

Keywords