{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T19:22:19Z","timestamp":1740165739899,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T00:00:00Z","timestamp":1587513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61301175"],"award-info":[{"award-number":["61301175"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Hum. Cent. Comput. Inf. Sci."],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The transient ischemic attack (TIA) is a kind of sudden disease, which has the characteristics of short duration and high frequency. Since most patients can return to normal after the onset of the disease, it is often neglected. Medical research has proved that patients are prone to stroke in a relatively short time after the transient ischemic attacks. Therefore, it is extremely important to effectively monitor transient ischemic attack, especially for elderly people living alone. At present, video monitoring and wearing sensors are generally used to monitor transient ischemic attacks, but these methods have certain disadvantages. In order to more conveniently and accurately monitor transient ischemic attack in the indoor environment and improve risk management of stroke, this paper uses a microwave sensing platform working in C-Band (4.0\u00a0GHz\u20138.0\u00a0GHz) to monitor in a non-contact way. The platform first collects data, then preprocesses the data, and finally uses principal component analysis to reduce the dimension of the data. Two machine learning algorithms support vector machine (SVM) and random forest (RF) are used to establish prediction models respectively. The experimental results show that the accuracy of SVM and RF approaches are 97.3% and 98.7%, respectively; indicating that the scheme described in this paper is feasible and reliable.<\/jats:p>","DOI":"10.1186\/s13673-020-00223-z","type":"journal-article","created":{"date-parts":[[2020,4,22]],"date-time":"2020-04-22T10:03:02Z","timestamp":1587549782000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Transient ischemic attack analysis through non-contact approaches"],"prefix":"10.1186","volume":"10","author":[{"given":"Qing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yajun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]},{"given":"Xihui","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,22]]},"reference":[{"issue":"16","key":"223_CR1","doi-asserted-by":"publisher","first-page":"1607","DOI":"10.1056\/NEJM200304173481621","volume":"348","author":"RA Bernstein","year":"2003","unstructured":"Bernstein RA, Alberts MJ (2003) Transient ischemic attack-proposed new definition. N Engl J Med 348(16):1607\u20131609","journal-title":"N Engl J Med"},{"issue":"16","key":"223_CR2","first-page":"4339","volume":"348","author":"SC Johnston","year":"2002","unstructured":"Johnston SC (2002) Transient ischemic attack. N Engl J Med 348(16):4339","journal-title":"N Engl J Med"},{"issue":"5","key":"223_CR3","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1111\/j.1540-8175.1996.tb00929.x","volume":"13","author":"JS Meyer","year":"1996","unstructured":"Meyer JS, Muramatsu K, Shirai T (1996) Cerebral embolism as a cause of stroke and transient ischemic attack. Echocardiography 13(5):513\u2013518","journal-title":"Echocardiography"},{"issue":"6","key":"223_CR4","doi-asserted-by":"publisher","first-page":"2276","DOI":"10.1161\/STROKEAHA.108.192218","volume":"40","author":"JD Easton","year":"2009","unstructured":"Easton JD et al (2009) Definition and evaluation of transient ischemic attack: a scientific statement for healthcare professionals from the American heart Association\/American stroke association stroke council; council on cardiovascular surgery and anesthesia; council on cardiovascular radiology and intervention; council on cardiovascular nursing; and the interdisciplinary council on peripheral vascular disease: the American academy of neurology affirms the value of this statement as an educational tool for neurologists. Stroke 40(6):2276\u20132293","journal-title":"Stroke"},{"issue":"1","key":"223_CR5","doi-asserted-by":"publisher","first-page":"104464","DOI":"10.1016\/j.jstrokecerebrovasdis.2019.104464","volume":"29","author":"J Gennesseaux","year":"2020","unstructured":"Gennesseaux J, Orsini GG, Lefour S et al (2020) Early management of transient ischemic attack in emergency departments in France. J Stroke Cerebrovascu Dis 29(1):104464","journal-title":"J Stroke Cerebrovascu Dis"},{"issue":"4","key":"223_CR6","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.annemergmed.2019.05.025","volume":"74","author":"Bernard P Chang","year":"2019","unstructured":"Chang Bernard P, Rostanski Sara, Willey Joshua et al (2019) Safety and feasibility of a rapid outpatient management strategy for transient ischemic attack and minor stroke: the rapid access vascular evaluation-neurology (RAVEN) approach. Ann Emerg Med 74(4):562\u2013571","journal-title":"Ann Emerg Med"},{"issue":"13","key":"223_CR7","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.1161\/CIRCULATIONAHA.113.003540","volume":"128","author":"CV DeSimone","year":"2013","unstructured":"DeSimone CV, Friedman PA, Noheria A (2013) Stroke or transient ischemic attack in patients with transvenous pacemaker or defibrillator and echocardiographically detected patent foramen ovale. Circulation 128(13):1433\u20131441","journal-title":"Circulation"},{"key":"223_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-59745-433-9_2","author":"WA Mcelveen","year":"2009","unstructured":"Mcelveen WA, Alway D (2009) Ischemic stroke and transient ischemic attack\u2014acute evaluation and management. Stroke essentials for primary care. Humana Press. https:\/\/doi.org\/10.1007\/978-1-59745-433-9_2","journal-title":"Humana Press"},{"issue":"3","key":"223_CR9","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1159\/000267844","volume":"29","author":"M Nakajima","year":"2010","unstructured":"Nakajima M et al (2010) Symptom progression or fluctuation in transient ischemic attack patients predicts subsequent stroke. Cerebrovascular 29(3):221\u2013227","journal-title":"Cerebrovascular"},{"key":"223_CR10","doi-asserted-by":"crossref","unstructured":"Ichwana D, Arief M, Puteri N Ekariani S. Movements Monitoring and Falling Detection Systems for Transient Ischemic Attack Patients Using Accelerometer Based on Internet of Things, \u00a02018 International Conference on Information Technology Systems and Innovation (ICITSI), BandungPadang, Indonesia, 2018, pp. 491-496","DOI":"10.1109\/ICITSI.2018.8695959"},{"key":"223_CR11","doi-asserted-by":"crossref","unstructured":"Nguyen VD, Le MT, Do AD, Duong HH, Thai TD, Tran DH. An efficient camera-based surveillance for fall detection of elderly people, \u00a02014 9th IEEE Conference on Industrial Electronics and Applications, Hangzhou, 2014, pp. 994-997","DOI":"10.1109\/ICIEA.2014.6931308"},{"issue":"10","key":"223_CR12","doi-asserted-by":"publisher","first-page":"5682","DOI":"10.1109\/TII.2019.2919168","volume":"15","author":"Daniel Sierra-Sosa","year":"2019","unstructured":"Sierra-Sosa Daniel, Garcia-Zapirain Begonya, Castillo Cristian et al (2019) Scalable\u00a0healthcare\u00a0assessment for diabetic patients using deep\u00a0learning\u00a0on multiple GPUs. IEEE Trans Industr Inf 15(10):5682\u20135689","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"223_CR13","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1109\/JBHI.2018.2810820","volume":"23","author":"Narathip Reamaroon","year":"2019","unstructured":"Reamaroon Narathip, Sjoding Michael W, Lin Kaiwen et al (2019) Accounting for label uncertainty in machine learning for detection of acute respiratory distress syndrome. IEEE J Biomed Health Inform 23(1):407\u2013415","journal-title":"IEEE J Biomed Health Inform"},{"issue":"6","key":"223_CR14","doi-asserted-by":"publisher","first-page":"46419","DOI":"10.1109\/ACCESS.2018.2866049","volume":"20","author":"OR Shishvan","year":"2018","unstructured":"Shishvan OR, Zois DS, Soyata T (2018) Machine intelligence in healthcare and medical cyber physical systems: a survey. IEEE Access 20(6):46419\u201346494","journal-title":"IEEE Access"},{"issue":"6","key":"223_CR15","doi-asserted-by":"publisher","first-page":"41034","DOI":"10.1109\/ACCESS.2018.2856238","volume":"16","author":"M Alhussein","year":"2018","unstructured":"Alhussein M, Muhammad G (2018) Voice pathology detection using deep learning on mobile healthcare framework. IEEE Access 16(6):41034\u201341041","journal-title":"IEEE Access"},{"issue":"5","key":"223_CR16","doi-asserted-by":"publisher","first-page":"1589","DOI":"10.1109\/JBHI.2017.2767063","volume":"22","author":"S Benjamin","year":"2018","unstructured":"Benjamin S, Patrick JT, Azra B et al (2018) Deep EHR: a survey of recent advances in deep\u00a0learning\u00a0techniques for electronic health record (EHR) analysis. IEEE J Biomed Health Inform 22(5):1589\u20131604","journal-title":"IEEE J Biomed Health Inform"},{"issue":"3","key":"223_CR17","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1109\/TCE.2019.2917895","volume":"65","author":"MA Sayeed","year":"2019","unstructured":"Sayeed MA, Mohanty SP, Kougianos E, Zaveri HP (2019) Neuro-detect: a machine learning-based fast and accurate seizure detection system in the IoMT. IEEE Transact Consum Electron 65(3):359\u2013368","journal-title":"IEEE Transact Consum Electron"},{"issue":"5","key":"223_CR18","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.jval.2019.01.011","volume":"22","author":"Stephen S Johnston","year":"2019","unstructured":"Johnston Stephen S, Morton John M et al (2019) Using\u00a0machine\u00a0learning\u00a0applied to real-world\u00a0healthcare\u00a0data for predictive analytics: an applied example in bariatric surgery. Value Health (Elsevier) 22(5):580\u2013586","journal-title":"Value Health (Elsevier)"},{"key":"223_CR19","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/j.measurement.2018.01.022","volume":"119","author":"Ahmed Abdelaziz","year":"2018","unstructured":"Abdelaziz Ahmed, Elhoseny Mohamed et al (2018) A\u00a0machine\u00a0learning\u00a0model for improving\u00a0healthcare\u00a0services on cloud computing environment. Measurement 119:117\u2013128","journal-title":"Measurement"},{"issue":"1","key":"223_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/0169-7439(87)80084-9","volume":"2","author":"S Wold","year":"1987","unstructured":"Wold S (1987) Principal component analysis. Chemom Intell Lab Syst 2(1):37\u201352","journal-title":"Chemom Intell Lab Syst"},{"issue":"2","key":"223_CR21","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.ejor.2003.09.021","volume":"162","author":"Y Yasutoshi","year":"2005","unstructured":"Yasutoshi Y (2005) Linear programming approaches for multicategory support vector machines. Eur J Operational Res 162(2):514\u2013531","journal-title":"Eur J Operational Res"},{"issue":"1","key":"223_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"223_CR23","first-page":"376","volume":"2016","author":"Z Chen","year":"2016","unstructured":"Chen Z, Zhao Y, Zhao D (2016) Multipath effects on time reversal OFDM communications between wireless sensors, 11th International Symposium on Antennas, Propagation and EM Theory (ISAPE). Guilin 2016:376\u2013379","journal-title":"Guilin"},{"key":"223_CR24","volume-title":"Antenna engineering handbook","author":"J Volakis","year":"2009","unstructured":"Volakis J (2009) Antenna engineering handbook, 4th edn. McGraw-Hill, New york","edition":"4"},{"key":"223_CR25","volume-title":"OFDM for wireless multimedia communications","author":"RV Nee","year":"2000","unstructured":"Nee RV, House A (2000) OFDM for wireless multimedia communications. Artech House, Boston"},{"issue":"2","key":"223_CR26","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1109\/TMC.2016.2557792","volume":"16","author":"Y Wang","year":"2016","unstructured":"Wang Y, Wu K, Ni LM (2016) Wifall: device-free fall detection by wireless networks. IEEE Transac Mobile Comput 16(2):581\u2013594","journal-title":"IEEE Transac Mobile Comput"},{"key":"223_CR27","first-page":"815","volume":"2","author":"JJ Van De Beek","year":"2005","unstructured":"Van De Beek JJ et al (2005) On channel estimation in OFDM systems. Vehic Technol Conference IEEE 2:815\u2013819","journal-title":"Vehic Technol Conference IEEE"},{"issue":"1","key":"223_CR28","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1086\/284969","volume":"134","author":"DW Stephens","year":"1989","unstructured":"Stephens DW (1989) Variance and the value of information. Am Nat 134(1):128\u2013140","journal-title":"Am Nat"},{"key":"223_CR29","doi-asserted-by":"crossref","unstructured":"Dao-Wen C et al. Study on the fast judgment of abnormal value with Excel. International Conference on Computer Science & Network Technology\u00a0IEEE, 2013","DOI":"10.1109\/ICCSNT.2012.6526020"},{"key":"223_CR30","unstructured":"Rieder P, Nossek JA. Implementation of orthogonal wavelet transforms and their applications,\u00a0Proceedings IEEE International Conference on Application-Specific Systems, Architectures and Processors, Zurich, Switzerland, 1997, p 489-498"},{"key":"223_CR31","doi-asserted-by":"crossref","unstructured":"Vijayakumari B, Devi JG, Mathi MI. Analysis of noise removal in ECG signal using symlet wavelet, 2016 International Conference on Computing Technologies and Intelligent Data Engineering (ICCTIDE\u201916), Kovilpatti, 2016, p 1-6","DOI":"10.1109\/ICCTIDE.2016.7725336"},{"key":"223_CR32","doi-asserted-by":"crossref","unstructured":"Pearson K. On lines and planes of closest fit to systems of points in space.\u00a0London, Edinburgh & Dublin Philosophical Magazine & Journal of Science\u00a01901","DOI":"10.1080\/14786440109462720"},{"key":"223_CR33","unstructured":"Zhiliang L, Zuo MJ, Xu H. Parameter selection for Gaussian radial basis function in support vector machine classification. 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering\u00a0IEEE, 2012"},{"key":"223_CR34","doi-asserted-by":"crossref","unstructured":"Shah SA, Fioranelli F. (2019) Human activity recognition: preliminary results for dataset portability using FMCW Radar. In: 2019 International Radar Conference, Toulon, France, 2327 Sept 2019, in press","DOI":"10.1109\/RADAR41533.2019.171307"},{"key":"223_CR35","doi-asserted-by":"crossref","unstructured":"Fioranelli F, Le Kernec J, Shah SA. Radar for health care: recognizing human activities and monitoring vital signs, in IEEE Potentials, vol. 38, no. 4, p 1623, July-Aug 2019","DOI":"10.1109\/MPOT.2019.2906977"},{"key":"223_CR36","doi-asserted-by":"crossref","unstructured":"Shah SA, Fioranelli F, RF Sensing Technologies for Assisted Daily Living in Healthcare: A Comprehensive Review, in IEEE Aerospace and Electronic Systems Magazine, vol. 34, no. 11, p 26-44, 1 Nov. 2019","DOI":"10.1109\/MAES.2019.2933971"},{"key":"223_CR37","doi-asserted-by":"crossref","unstructured":"Shah SI, Shah SY, Shah SA. Intrusion detection through leaky wave cable in conjunction with channel state information. 2019 UK\/China Emerging Technologies (UCET) 2019 Aug 21 p1-4. IEEE","DOI":"10.1109\/UCET.2019.8881845"},{"key":"223_CR38","doi-asserted-by":"publisher","first-page":"1433","DOI":"10.3390\/electronics8121433","volume":"8","author":"A Tahir","year":"2019","unstructured":"Tahir A, Ahmad J, Shah SA, Morison G, Skelton DA, Larijani H, Abbasi QH, Imran MA, Gibson RM (2019) WiFreeze: multiresolution scalograms for freezing of gait detection in Parkinson\u2019s leveraging 5G spectrum with deep learning. Electronics 8:1433","journal-title":"Electronics"},{"key":"223_CR39","doi-asserted-by":"publisher","unstructured":"Al-Turjman F, Zahmatkesh H. An Overview of Security and Privacy in Smart Cities IoT Communications, Wiley Transactions on Emerging Telecommunications Technologies, 2019. https:\/\/doi.org\/10.1002\/ett.3677","DOI":"10.1002\/ett.3677"},{"issue":"1","key":"223_CR40","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1016\/j.future.2019.08.009","volume":"102","author":"F Al-Turjman","year":"2020","unstructured":"Al-Turjman F (2020) Intelligence and security in big 5G-oriented IoNT: an overview. Elsevier Future Gener Comput Syst 102(1):357\u2013368","journal-title":"Elsevier Future Gener Comput Syst"}],"container-title":["Human-centric Computing and Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-00223-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13673-020-00223-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13673-020-00223-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T12:10:00Z","timestamp":1627647000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13673-020-00223-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,22]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["223"],"URL":"https:\/\/doi.org\/10.1186\/s13673-020-00223-z","relation":{},"ISSN":["2192-1962"],"issn-type":[{"type":"electronic","value":"2192-1962"}],"subject":[],"published":{"date-parts":[[2020,4,22]]},"assertion":[{"value":"9 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"There are no Competing interests for this manuscript.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"16"}}