Cloud service for authentication of a person based on their electrocardiogram

Telemedicine grows faster with each year. In scope of it new technologies have been created to solve information communication problems. One of them is distance monitoring which requires electrocardiogram analysis. In this case it is important to confirm that the transferred electrocardiogram throug...

Повний опис

Збережено в:
Бібліографічні деталі
Дата:2022
Автор: Luhovskyi, Yu.O.
Формат: Стаття
Мова:English
Опубліковано: Інститут програмних систем НАН України 2022
Назва видання:Проблеми програмування
Теми:
Онлайн доступ:http://dspace.nbuv.gov.ua/handle/123456789/188672
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
Назва журналу:Digital Library of Periodicals of National Academy of Sciences of Ukraine
Цитувати:Cloud service for authentication of a person based on their electrocardiogram / Yu.O. Luhovskyi // Проблеми програмування. — 2022. — № 3-4. — С. 485-490. — Бібліогр.: 11 назв. — англ.

Репозиторії

Digital Library of Periodicals of National Academy of Sciences of Ukraine
Опис
Резюме:Telemedicine grows faster with each year. In scope of it new technologies have been created to solve information communication problems. One of them is distance monitoring which requires electrocardiogram analysis. In this case it is important to confirm that the transferred electrocardiogram through information channels belongs to the patient. Researchers from different countries work on this problem. They suggest different methods of authentication by electrocardiogram. The goal of this work is to suggest a prototype of a service that could be used to authenticate electrocardiograms. The paper describes which algorithms have been used to build authentication technology and how it was implemented. There is a short history of built applications. It shows their structures and the purpose. The recently developed system is a prototype to authentication service. It performs registration of new electrocardiograms which is the most time consuming process in authentication. The paper describes the architecture of the system and shows the result of executed experiments. The results show that there is a performance issue with the machine learning library ML.NET. When a lot of cores are allocated to one machine learning instance the overheads highly decrease the overall experiment time. These experiments confirmed Amdahl’s law. Nevertheless, an architecture was found where experiments took the least time for execution. Knowing the issue with the machine learning library, a new architecture setup was suggested and will be implemented in future works. Besides, attention is paid on how developed service should help researchers to improve the technology. The main idea of the system is using one service for developing and testing the technology. That means we can be sure that the cloud service that runs on production would behave the same as in the research phase.