scholarly journals Heart Attack Detection System

IJARCCE ◽  
2019 ◽  
Vol 8 (2) ◽  
pp. 204-206
Author(s):  
Abhimanyu. H ◽  
Biju Balakrishnan
Author(s):  
Isna Fatimatuz Zahra ◽  
I Dewa Gede Hari Wisana ◽  
Priyambada Cahya Nugraha ◽  
Hayder J Hassaballah

Acute myocardial infarction, commonly referred to as a heart attack, is the most common cause of sudden death where a monitoring tool is needed that is equipped with a system that can notify doctors to take immediate action. The purpose of this study was to design a heart attack detection device through indicators of vital human signs. The contribution of this research is that the system works in real-time, has more parameters, uses wireless, and is equipped with a system to detect indications of a heart attack. In order for wireless monitoring to be carried out in real-time and supported by a detection system, this design uses a radio frequency module as data transmission and uses a warning system that is used for detection. Respiration rate was measured using the piezoelectric sensor, and body temperature was measured using the DS18B20 temperature sensor. Processing of sensor data is done with ESP32, which is displayed wirelessly by the HC-12 module on the PC. If an indication of a heart attack is detected in the parameter value, the tool will activate a notification on the PC. In every indication of a heart attack, it was found that this design can provide notification properly. The results showed that the largest respiratory error value was 4%, and the largest body temperature error value was 0.55%. The results of this study can be implemented in patients who have been diagnosed with heart attack disease so that it can facilitate monitoring the patient's condition.


2020 ◽  
Author(s):  
Suchitra Giri ◽  
Ujjwal Kumar ◽  
Varsha Sharma ◽  
Satish Kumar ◽  
Sikha Kumari ◽  
...  

2014 ◽  
Vol 530-531 ◽  
pp. 705-708
Author(s):  
Yao Meng

This paper first engine starting defense from Intrusion Detection, Intrusion detection engine analyzes the hardware platform, the overall structure of the technology and the design of the overall structure of the plug, which on the whole structure from intrusion defense systems were designed; then described in detail improved DDOS attack detection algorithm design thesis, and the design of anomaly detection algorithms.


Processes ◽  
2021 ◽  
Vol 9 (5) ◽  
pp. 834
Author(s):  
Muhammad Ashfaq Khan

Nowadays, network attacks are the most crucial problem of modern society. All networks, from small to large, are vulnerable to network threats. An intrusion detection (ID) system is critical for mitigating and identifying malicious threats in networks. Currently, deep learning (DL) and machine learning (ML) are being applied in different domains, especially information security, for developing effective ID systems. These ID systems are capable of detecting malicious threats automatically and on time. However, malicious threats are occurring and changing continuously, so the network requires a very advanced security solution. Thus, creating an effective and smart ID system is a massive research problem. Various ID datasets are publicly available for ID research. Due to the complex nature of malicious attacks with a constantly changing attack detection mechanism, publicly existing ID datasets must be modified systematically on a regular basis. So, in this paper, a convolutional recurrent neural network (CRNN) is used to create a DL-based hybrid ID framework that predicts and classifies malicious cyberattacks in the network. In the HCRNNIDS, the convolutional neural network (CNN) performs convolution to capture local features, and the recurrent neural network (RNN) captures temporal features to improve the ID system’s performance and prediction. To assess the efficacy of the hybrid convolutional recurrent neural network intrusion detection system (HCRNNIDS), experiments were done on publicly available ID data, specifically the modern and realistic CSE-CIC-DS2018 data. The simulation outcomes prove that the proposed HCRNNIDS substantially outperforms current ID methodologies, attaining a high malicious attack detection rate accuracy of up to 97.75% for CSE-CIC-IDS2018 data with 10-fold cross-validation.


Sign in / Sign up

Export Citation Format

Share Document