• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiang Jie and Chen Junjie. SVM Based fMRI Data Classification: An Approach to Decode Mental State[J]. Journal of Computer Research and Development, 2010, 47(2): 286-291.
Citation: Xiang Jie and Chen Junjie. SVM Based fMRI Data Classification: An Approach to Decode Mental State[J]. Journal of Computer Research and Development, 2010, 47(2): 286-291.

SVM Based fMRI Data Classification: An Approach to Decode Mental State

More Information
  • Published Date: February 14, 2010
  • Recently, a growing number of studies have shown that machine learning technologies can be used to decode mental state from functional magnetic resonance imaging (fMRI) data. Two feature extraction methods are compared in this paper, one is based on the cumulative change of blood oxygen level dependent (BOLD) signal of activated brain areas, and the other is based on the values at each time point in the BOLD signal time course of each trial. The authors collected the fMRI data while participants were performing a simplified 4×4 Sudoku problems, and predicted the complexity (easy vs. complex) or the steps (1-step vs. 2-steps) of the problem from fMRI data using these two feature extraction methods respectively. Both methods can produce quite high accuracy, and the performance of the latter approach is better than the former. The results indicate that SVM can be used to predict high-level cognitive states from fMRI data. Moreover, the feature extraction based on serial signal change of BOLD effect can predict cognitive state better because it could use abundant and typical information kept in BOLD effect data. By ranking accuracy of every single-voxel based classifier, it is interesting that voxels with higher accuracy are anatomically located in PPC, PFC, ACC and other brain regions closely related to problem solving, which is consistent with previous studies in cognitive neuroscience. The methods might shed light on brain computer interface (BCI).
  • Related Articles

    [1]Pan Yuting, Lin Li. A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment[J]. Journal of Computer Research and Development, 2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183
    [2]Zhang Long, Wang Jinsong. DDoS Attack Detection Model Based on Information Entropy and DNN in SDN[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017
    [3]Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    [4]Wang Yichuan, Ma Jianfeng, Lu Di, Zhang Liumei, Meng Xianjia. Game Optimization for Internal DDoS Attack Detection in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882. DOI: 10.7544/issn1000-1239.2015.20140608
    [5]Li Wei, Zhang Dafang, Xie Kun, Li Wenwei, He Jie. A Matrix-Indexed Bloom Filter for Flash-Based Key-Value Store[J]. Journal of Computer Research and Development, 2015, 52(5): 1210-1222. DOI: 10.7544/issn1000-1239.2015.20131940
    [6]Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108.
    [7]Cheng Jieren, Yin Jianping, Liu Yun, Cai Zhiping, Li Min. Detecting Distributed Denial of Service Attack Based on Address Correlation Value[J]. Journal of Computer Research and Development, 2009, 46(8): 1334-1340.
    [8]Ren Wei, Liu Tenghong, Jin Hai. Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development, 2006, 43(11): 1927-1932.
    [9]Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092.
    [10]Zhou Dongqing, Zhang Haifeng, Zhang Shaowu, Hu Xiangpei. A DDoS Attack Detection Method Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2005, 42(9): 1594-1599.

Catalog

    Article views (1091) PDF downloads (756) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return