Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160207
Naser Alajmi, K. Elleithy
Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.
{"title":"Selective forwarding detection (SFD) in wireless sensor networks","authors":"Naser Alajmi, K. Elleithy","doi":"10.1109/LISAT.2015.7160207","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160207","url":null,"abstract":"Security is the critical subject in wireless sensor networks. Therefore, WSNs are susceptible to several types of security attacks. One reason to attack sensor networks is the limited capacity of sensor nodes. The security attacks could affect the most significant applications in WSNs area such as military surveillance, traffic monitor, and healthcare. Thus, there are different types of detection approaches against security attacks on the network layer in WSNs. Also, there are severe constraints on sensor nodes like reliability, energy efficiency, and scalability, which affect the security in WSNs. Since the sensor nodes have limited capabilities for most of these constraints, a selective forwarding attack is difficult to detect in the networks. Malicious nodes in the selective forwarding attack, work as normal nodes. However, it attempts to find the sensitive messages and drop them before sending the packet to other nodes. In order to keep this type of attacks away from networks, we propose a multi layers approach (SFD) that preserves the safely of data transmission between sensor nodes while detecting the selective forwarding attack. Furthermore, the approach includes reliability, energy efficiency, and scalability.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160174
Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh
Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.
{"title":"Development of a microcontroller based electrical impedance tomography system","authors":"Gurmeet Singh, S. Anand, Brejesh Lall, Anurag Srivastava, Vaneet Singh","doi":"10.1109/LISAT.2015.7160174","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160174","url":null,"abstract":"Electrical Impedance Tomography (EIT) is one of the growing and optimistic imaging modality for clinical imaging with such advantages as: non-invasive, low cost, ease of use and practicality, this method has been used in many areas of science and research. This paper consists of designing and development of hardware for EIT system using microcontroller MSP430G2 and AVR ATMEGA 16. A 16-electrode phantom is developed and studied with an instrumentation for EIT. Using serial communication data applies to PC for image reconstruction using EIDORS.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160178
Abdulbast A. Abushgra, K. Elleithy
After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.
{"title":"Initiated decoy states in quantum key distribution protocol by 3 ways channel","authors":"Abdulbast A. Abushgra, K. Elleithy","doi":"10.1109/LISAT.2015.7160178","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160178","url":null,"abstract":"After decades of research, computer scientists have in recent years come close to reaching substantive results which prove the usability of quantum key distribution (QKD). Several QKD protocols and different schemes have surfaced since the last century. Additionally, some of these protocols were created in new algorithms and up until now, have been proven to be secure; however, other scientists only made modifications to previous original protocols. This paper seeks to create a new scheme in QKD that will communicate between two parties and will give them a high level of security against any well-known attacks while handling both of parties in a manner that will reduce their dependency on both classic communication and the classical channel.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129471924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.
{"title":"IPLMS: An intelligent parking lot management system","authors":"Jiameng Wang, Stefanie Gebara, Zhengyi Sun, Qi Wu, Keqin Zong, Hao Sun, A. Farajidavar","doi":"10.1109/LISAT.2015.7160219","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160219","url":null,"abstract":"In this paper, we are introducing an intelligent valet parking management system that guides the cars to autonomously park within a parking lot. The IPLMS for Intelligent Parking Lot Management System, consists of two modules: 1) a model car with a set of micro-controllers and sensors which can scan the environment for suitable parking spot and avoid collision to obstacles, and a Parking Lot Management System (IPLMS) which screens the parking spaces within the parking lot and offers guidelines to the car. The model car has the capability to autonomously maneuver within the parking lot using a fuzzy logic algorithm, and execute parking in the spot determined by the IPLMS, using a parking algorithm. The car receives the instructions from the IPLMS through a wireless communication link. The IPLMS has the flexibility to be adopted by any parking management system, and can potentially save the clients time to look for a parking spot, and/or to stroll from an inaccessible parking space. Moreover, the IPLMS can decrease the financial burden from the parking lot management by offering an easy-to-install system for self-guided valet parking.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160192
Ramadhan J. Mstafa, K. Elleithy
Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.
{"title":"A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes","authors":"Ramadhan J. Mstafa, K. Elleithy","doi":"10.1109/LISAT.2015.7160192","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160192","url":null,"abstract":"Recently, video steganography has become a popular option for a secret data communication. The performance of any steganography algorithm is based on the embedding efficiency, embedding payload, and robustness against attackers. In this paper, we propose a novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes. The proposed algorithm includes four different phases. First, the secret message is preprocessed, and BCH codes (n, k, t) are applied in order to produce an encoded message. Second, face detection and face tracking algorithms are applied on the cover videos in order to identify the facial regions of interest. Third, the process of embedding the encoded message into the high and middle frequency wavelet coefficients of all facial regions is performed. Forth, the process of extracting the secret message from the high and middle frequency wavelet coefficients for each RGB components of all facial regions is accomplished. Experimental results of the proposed video steganography algorithm have demonstrated a high embedding efficiency and a high embedding payload.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128546392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160213
Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah
Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.
{"title":"Analysis of video streaming using LTE technology","authors":"Andre Santos, Edson Pinheiro, R. Mateus, A. Odeh, Eman Abdel Fattah","doi":"10.1109/LISAT.2015.7160213","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160213","url":null,"abstract":"Long-Term Evolution (LTE) is a radio access technology. It is a standard cellular network that enables mobile transmission of streaming high definition video in real time. This paper analyzes the development and LTE performance in streaming multimedia through an analysis of the video transmission package performance. Furthermore, we examined the influence of LTE in streaming multimedia through the adoption of a simulator.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114918353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160220
Remah Alshinina, K. Elleithy
Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.
{"title":"An efficient message authentication and source privacy with a hidden generator point based on ECC","authors":"Remah Alshinina, K. Elleithy","doi":"10.1109/LISAT.2015.7160220","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160220","url":null,"abstract":"Wireless Sensor Networks have been widely used by researchers in different personal and organizational applications. Recently, WSN has become the major focus of researchers to establish a secure network against malicious node. The security of WSN can be subjected to threats by attackers. In order to limit these threats on WSNs, Elliptic Curve Cryptography (ECC) introduces great features such as smaller key size, less parameters, and higher intensity compared with RSA and public key algorithms. In this paper, we proposed an ECC based approach using a unique authentication message and source privacy through a hidden generator point. This scheme contains the initialization phase, registration phase, and authentication phase. These phases were introduced to develop an efficient algorithm, decrease the overhead, and increase the authentication between nodes. The scheme allows many nodes to transfer unlimited messages without any imposed threshold and guarantee the message source privacy.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160175
B. Beheshti
Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.
{"title":"Fixed point performance of interpolation/extrapolation algorithms for resource constrained wireless sensors","authors":"B. Beheshti","doi":"10.1109/LISAT.2015.7160175","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160175","url":null,"abstract":"Date collection in wireless networks is performed by sampling the phenomenon to be measured at recurring intervals in time. In situations where the sensors must operate over a very long time without the possibility of battery replacement, the sleep cycle for these sensors must be as long as possible (and the longest the design allows). Longer sleep cycles, while extending battery life may be too long for the sampling rate required to collect data - i.e. more frequent wake ups would be needed from the sensor. On the other hand, the sensors can collect samples at a lower than required rate, but interpolate data-points in between the actual measured sampled data. Interpolation implemented in floating point can be demanding in terms of energy cost to the sensors. Therefore as it is generally the case, fixed point implementations have to be introduced to reduce the energy demands due to excessive computations/instruction count due to floating point arithmetic. In this paper we present a fixed point implementation of the Neville's interpolation scheme, and present performance results as compared to the floating point (ideal) results.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126776957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160209
A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah
This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.
{"title":"Highly efficient novel text steganography algorithms","authors":"A. Odeh, K. Elleithy, M. Faezipour, Eman Abdelfattah","doi":"10.1109/LISAT.2015.7160209","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160209","url":null,"abstract":"This paper investigates eight novel Steganography algorithms employing text file as a carrier file. The proposed model hides secret data in the text file by manipulating the font format or inserting special symbols in the text file. Furthermore, the suggested algorithms can be applied to both Unicode and ASCII code languages, regardless of the text file format. In addition, a merging capability among the techniques is introduced, which allows alternatives for users based on the system requirements. The proposed algorithms achieve a high degree of optimized Steganography attributes such as hidden ratio, robustness, and transparency.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"83 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134392130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-05-01DOI: 10.1109/LISAT.2015.7160185
K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour
In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.
{"title":"A comparison of different machine learning algorithms using single channel EEG signal for classifying human sleep stages","authors":"K. Aboalayon, Wafaa S. Almuhammadi, M. Faezipour","doi":"10.1109/LISAT.2015.7160185","DOIUrl":"https://doi.org/10.1109/LISAT.2015.7160185","url":null,"abstract":"In recent years, the estimation of human sleep disorders from Electroencephalogram (EEG) signals have played an important role in developing automatic detection of sleep stages. A few methods exist in the market presently towards this aim. However, sleep physicians may not have full assurance and consideration in such methods due to concerns associated with systems accuracy, sensitivity and specificity. This paper presents a novel and efficient technique that can be implemented in a microcontroller device to identify sleep stages in an effort to assist physicians in the diagnosis and treatment of related sleep disorders by enhancing the accuracy of the developed algorithm using a single channel of EEG signals. First, the dataset of EEG signal is filtered and decomposed into delta, theta, alpha, beta and gamma subbands using Butterworth band-pass filters. Second, a set of sample statistical discriminating features are derived from each frequency band. Finally, sleep stages consisting of Wakefulness, Rapid Eye Movement (REM) and Non-Rapid Eye Movement (NREM) are classified using several supervised machine learning classifiers including multi-class Support Vector Machines (SVM), Decision Trees (DT), Neural Networks (NN), K-Nearest Neighbors (KNN) and Naive Bayes (NB). This paper combines REM with Stage 1 NREM due to data similarities. Performance is then compared based on single channel EEG signals that were obtained from 20 healthy subjects. The results show that the proposed technique using DT classifier efficiently achieves high accuracy of 97.30% in differentiating sleeps stages. Also, a comparison of our method with some recent available works in the literature reiterates the high classification accuracy performance.","PeriodicalId":235333,"journal":{"name":"2015 Long Island Systems, Applications and Technology","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134641059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}