Early Detection of Numerical Typing Errors Using Data Mining Techniques

被引:17
|
作者
Wang, Shouyi [1 ]
Lin, Cheng-Jhe [2 ]
Wu, Changxu [2 ]
Chaovalitwongse, Wanpracha Art [1 ,3 ,4 ]
机构
[1] Rutgers State Univ, Dept Ind & Syst Engn, Piscataway, NJ 08854 USA
[2] SUNY Buffalo, Dept Ind & Syst Engn, Buffalo, NY 14260 USA
[3] Princeton Univ, Dept Operat Res & Financial Engn, Princeton, NJ 08544 USA
[4] Univ Washington, Dept Ind & Syst Engn, Seattle, WA 98195 USA
基金
美国国家科学基金会;
关键词
Early detection; electroencephalography (EEG) classification; mental state monitoring; typing errors; SUPPORT VECTOR MACHINES; EEG; CLASSIFICATION; POTENTIALS;
D O I
10.1109/TSMCA.2011.2116006
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper studies the applications of data mining techniques in early detection of numerical typing errors by human operators through a quantitative analysis of multichannel electroencephalogram (EEG) recordings. Three feature extraction techniques were developed to capture temporal, morphological, and time-frequency (wavelet) characteristics of EEG data. Two most commonly used data mining techniques, namely, linear discriminant analysis (LDA) and support vector machine (SVM), were employed to classify EEG samples associated with correct and erroneous keystrokes. The leave-one-error-pattern-out and leave-one-subject-out cross-validation methods were designed to evaluate the in-and cross-subject classification performances, respectively. For the in-subject classification, the best testing performance had a sensitivity of 62.20% and a specificity of 51.68%, which were achieved by SVM using morphological features. For the cross-subject classification, the best testing performance was achieved by LDA using temporal features, based on which it had a sensitivity of 68.72% and a specificity of 49.45%. In addition, the receiver operating characteristic (ROC) analysis revealed that the averaged values of the area under ROC curves of LDA and SVM for the in- and cross-subject classifications were both greater than 0.60 using the EEG 300 ms prior to the keystrokes. The classification results of this study indicated that the EEG patterns of erroneous keystrokes might be different from those of the correct ones. As a result, it may be possible to predict erroneous keystrokes prior to error occurrence. The classification problem addressed in this study is extremely challenging due to the very limited number of erroneous keystrokes made by each subject and the complex spatiotemporal characteristics of the EEG data. However, the outcome of this study is quite encouraging, and it is promising to develop a prospective early detection system for erroneous keystrokes based on brain-wave signals.
引用
收藏
页码:1199 / 1212
页数:14
相关论文
共 50 条
  • [1] Integrating Human Behavior Modeling and Data Mining Techniques to Predict Human Errors in Numerical Typing
    Lin, Cheng-Jhe
    Wu, Changxu
    Chaovalitwongse, Wanpracha A.
    [J]. IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2015, 45 (01) : 39 - 50
  • [2] Early DDoS Detection Based on Data Mining Techniques
    Xylogiannopoulos, Konstantinos
    Karampelas, Panagiotis
    Alhajj, Reda
    [J]. INFORMATION SECURITY THEORY AND PRACTICE: SECURING THE INTERNET OF THINGS, 2014, 8501 : 190 - 199
  • [3] Data Mining Techniques for Early Detection of Breast Cancer
    Cruz, Maria Ines
    Bernardino, Jorge
    [J]. KDIR: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON KNOWLEDGE DISCOVERY, KNOWLEDGE ENGINEERING AND KNOWLEDGE MANAGEMENT - VOL 1: KDIR, 2019, : 434 - 441
  • [4] Detection of Subtle Sensor Errors in Mineral Processing Circuits Using Data-Mining Techniques
    Pothina, Rambabu
    Ganguli, Rajive
    [J]. MINING METALLURGY & EXPLORATION, 2020, 37 (02) : 399 - 414
  • [5] Detection of Subtle Sensor Errors in Mineral Processing Circuits Using Data-Mining Techniques
    Rambabu Pothina
    Rajive Ganguli
    [J]. Mining, Metallurgy & Exploration, 2020, 37 : 399 - 414
  • [6] Analysis and Prevention of Dispension Errors by Using Data Mining Techniques
    Tseng, Vincent S.
    Chen, Chun-Hao
    Chen, Hsiao-Ming
    Chang, Hui-Jen
    Yu, Chin-Tai
    [J]. 2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, 2007, : 65 - +
  • [7] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [8] Using Opinion Mining Techniques for Early Crisis Detection
    Iftene, Adrian
    Ginsca, Alexandru-Lucian
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012, 7 (05) : 857 - 864
  • [9] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [10] A Survey on Malware Detection Using Data Mining Techniques
    Ye, Yanfang
    Li, Tao
    Adjeroh, Donald
    Iyengar, S. Sitharama
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (03)