Skip to main content
User Image

Saad Abdullah AlAhmadi | سعد عبدالله الأحمدي

Professor

Professor in Computer Science - Specialty: Artificial Intelligence (AI), Cybersecurity, and the Internet of Things (IoT)

علوم الحاسب والمعلومات
Building 31 (CCIS Building) - 2nd Floor - Room 2179
publication
Journal Article
2024

Person identification with arrhythmic ECG signals using deep convolution neural network

Over the past decade, the use of biometrics in security systems and other applications has grown in popularity. ECG signals in particular are attracting increased attention due to their characteristics, which are required for a trustworthy identification system. The majority of ECG-based person identification systems are evaluated without considering the health-state of the individuals. Few person identification systems consider person-by-person health-state annotation. This paper proposes a person identification system considering the health-state annotated ECG signals where each person’s beats overlap among variant arrhythmia classes. This overlapping between the normal class and other arrhythmia classes grants the ability to isolate normal beats in the train set from the Arrhythmic beats in the test set. Therefore, this paper investigates the effect of arrhythmic heartbeats on biometric recognition. An effective lightweight CNN based on depth-wise separable convolution (DWSC) is proposed to enhance the performance of person identification for several common arrhythmia types using the MITBIH dataset. The proposed methodology has been tested on nine arrhythmia types and presents how different types of arrhythmia affect ECG-based biometric systems differently. The experimental results show excellent recognition performance (99.28%) on normal heartbeats and (93.81%) on arrhythmic heartbeats, outperforming other models in terms of mean accuracy.

Publication Work Type
Research Article
Publisher Name
Scientific Reports
more of publication
publications

Internet of Things (IoT) networks’ wide range and heterogeneity make them prone to cyberattacks. Most IoT devices have limited resource capabilities (e.g., memory capacity, processing power, and…

2025
Published in:
Sensors
publications

Machine Learning (ML) has been exploited across diverse fields with significant success. However, the deployment of ML models on resource-constrained devices, such as edge devices, has remained…

2025
Published in:
IEEE Access
publications

One of the most promising applications for electroencephalogram (EEG)-based brain–computer interfaces (BCIs) is motor rehabilitation through motor imagery (MI) tasks. However, current MI training…

2024
Published in:
Sensors