instagram

Sunday, March 12, 2017

EMG Chase Game

I dusted off SparkyEEG recently and used it for some fun with EMG processing, as well as an excuse to do some learning with TensorFlow and deep learning (as an aside I read the Deep Learning Book by Goodfellow et al. and really enjoyed it). I placed the 8 electrodes across various muscles, mostly around shoulders.

I'm using some fairly simple (and common) preprocessing on the raw electrophysiology data to first get the EMG power. This applies a bandpass filter, rectification, and then measures the "waveform length" which is the integral of the absolute value of the difference.


Representation learning

First I wrote up an autoencoder (and then a variational autoencoder) to take some EMG data and perform unsupervised dimensionality reduction. It also helps denoise the data and remove things like EKG contamination.



And here are some graphs of the latent variables learned



Arm movement tracking

Then I used my kinect to record my arm positions while recording EMG data in parallel. I used the a neural network to predict my arm positions based upon the EMG data.



And again here is a graph of the reconstruction (the data after 150s is held back test data), sorry for the time shift.


Game

Then sort of putting this all together I wrote a game to chase a maker using EMG activity. The way this works is first prelearning a representation using a variational autoencoder as I sit and move my arms around. These graphs are from the tensor board that shows the log likelihood of the data improving and the Kullback-Liebler divergence of the latent space increases (the total lower bound does continue to increase). I should probably run it for longer as it hasn't stabilized, but it gets a bit boring :).




Then I start playing a game which adds a linear network to the output of the latent space to try and predict the X and Y positions of the cursor. Here you can see the mean squared prediction error improves while playing the game and then stabilizes after a while. The residual noise appears to be mostly high frequency noise. The learning function initially learns just the output network but then after enough time to initialize that can back-propagate through the representation layer to try and improve the representation.


Here is a video of me playing this game and how well it does. Not perfect but not bad for a first implementation I wrote up an autoencoder (and then a variational autoencoder) to take some EMG data and perform unsupervised dimensionality reduction. It also helps denoise the data and remove things like EKG contamination.


While playing it's basically co-learning with the user, as you pick some movements to try and control the cursor and keep sticking with it, and it tries to map from those movements to the cursor position. It will take some exploring to figure out the right dynamics to try and let it optimally bootstrap this system. For example:

1. picking the set of cursor position where the decoder is most uncertain
2. how long should the memory buffer be to stabilize the system versus to allow it to evolve
3. how should the learning rate of the network adapt with time.

67 comments:

  1. Hey James,

    is there a way to replace the ADS1299? it is too expensive.

    can i ask the availability and cost of sparky eeg?

    Thanks..

    ReplyDelete
    Replies


    1. CYBER HACKING INTEL (CHI)
      Email-: CyberHackingIntel@gmail.com

      Hacking seems to look difficult (which it actually is if you don’t know anything about it) but it’s not if you really understand computer coding .

      Hacking has been made simple in the word today, there are several hacking tools(Hacking Softwares and Hacking devices) out there that can be used to complete simple Hacking task.

      CYBER HACKING INTEL(CHI) is a group of skilled hackers that understand the use of this Hacking tools and can give you the best and secure Hacking services. Our services are fast and unique and guarantee a ­čĺ» % chance of success.
      We have certified and the bests of Hackers in the world , Hackers sucks as-:

      Corben Leo(cdl) ­čç║­čçŞ
      Ivan Grigorov(reactor08) ­čçĚ­čç║
      Yumi (Yumi)­čç»­čçÁ
      Mostashio(flashdisk) ­čçÁ­čç░
      EronX(Philippines eronX) ­čçÁ­čçş
      Peter(peter-676) ­čç║­čçŞ
      Khaled Hassan(m16) ­čç«­čç│
      Jack(wkcaj) ­čç║­čçŞ
      Zeeshan(zee_shan) ­čç«­čç│
      Bounty(hunter) ­čç║­čçŞ

      ❌Beware of Spammers and fake Hackers‼️ They are everywhere in the internet posting false ads and opening false sites. Do not be a victim of this guys, we am have come across so many of their victims, many of them we helped recover back what was taken falsely from them, few of them weren’t that lucky.

      We are descrete and won't expose our service to you to anyone.

      Email-: CYBERHACKINGINTEL@gmail.com
      2019 © Cyber Hacking Intel.

      CHI.





      Delete

  2. Thank you for your post. This is excellent information. It is amazing and wonderful to visit your site.
    best kitchen sinks providers in Guntur

    ReplyDelete
  3. Hey, do check out our Cryptography assignment help provided by the subject experts at TutorVersal. We are an online assignment help provider who assists students in overcoming their assignment writing challenges. Our highly qualified team of academic helpers write quality assignments that are 100% plagiarism-free and deliver them right on time. Recently, we launched child care assignment help service, and it has got a favorable response from hundreds of students in Australia who used it. We provide assignment solutions for over 180 subjects such as management, economics, nursing, engineering, and more. You can easily get your essays, dissertations, and case study assignments solved by us and score excellent grades in them!

    ReplyDelete


  4. COPE TECHS is an organization of Technology experts��️�� with the aim to help individuals with solving Technology difficulties. We offer the best hacking services as well as our aim is not for Theft purpose but to help individuals overcoming Technology issues with our skills.

    ✴️For example-: There are so many individuals out there who owe a lot of debts���� to Banks and other Loan Firms and are working hard ��️⚒️to pay back but really can't pay. That's were our help can come in. We have designed a platform that have been helping so many in extracting crypto currency�� such as Bit Coin, Lite Coin e.t.c

    ✴️Another Example of our service-: A Man or Woman who suspects his/her Spouse of Cheating but have no prove, we could help by HACKING the Spouse Cell phone�� so he/she could get access to Chats, Emails��, Location��, Phone calls ��and text message✉️ of the Spouse anywhere they are.

    Other services we offer are-:
    ✴️Recovery of Lost Bitcoin in binary auctions��
    ✴️ Changing of Grades from Universities.��
    ✴️ Detection of weakness in Computer system security⚛️
    ✴️Funding a PayPal account����
    ✴️Cyber Attacks☣️ and lots more

    Put this on your mind, "AS LONG AS IT'S TECHNOLOGY, IT CAN BE HACKED"

    We belong to the HACKERS forum HackerOne and we have the Top hackers in the forum always ready to take the risk and do a job.

    If you need hacking Services, contact-:
    COPETECHS@GMAIL.COM

    We look forward to hacking for you.

    ReplyDelete
  5. Yes I love the post! I would like to see more posts like this. You can also visit my website where you can find best quality Leather Padfolios, Custom Leather Pad Folio, Personalized Leather Padfolio, Embossed Leather Portfolio, Leather Legal Pad Portfolio like stationery and office products.

    ReplyDelete
  6. Mcafee product activation is an antivirus program. this program secures your computer with a virus so you can install it. to know more please visit our website mcafee activate product key

    ReplyDelete
  7. Present McAfee antivirus in your PC with high-class specialists and best tech gathering. Essentially ring us and we are set up to assist you till the last snapshot of foundation. on the off chance that you need to introduce it, at that point visit our site: enter mcafee activation code

    ReplyDelete
  8. AVG Retail is the best Antivirus programming that is accessible on download and install avg ultimate gives the total suite of highlights which can verify your computerized on the web and disconnected work of the framework or gadgets.

    ReplyDelete
  9. enter avg retail activation code to install and activate your avg antivirus software instantly to download avg visit : Avg is a well- known name in the field of virus protection. The reason for which this name is common among all end users is its free antivirus and malware protection. It not only sounds install avg with license number free but it provides a lot more with no money. It scans for viruses and malware.

    ReplyDelete
  10. McAfee antivirus is widely used antivirus helps to detect and neutralize computer virus, the mail worms, the trojan programs, and also helps your system free of virus and other malware is quite a daily challenge. for more details visit: mcafee activate product key


    ReplyDelete
  11. How to login to office.com/setup? if you want proper information about office.com/setup.Here is our website for your help so visit our site you will find the right way to operate MS office. if you want to install enter office 365 product key then visit our site:

    ReplyDelete

  12. webroot cybersecurity is an ultimate internet security suite for complete protection against today's diverse range of threat on windows. key features are 100% secure shopping, 1 click virus scanning, malicious website filtering, unblock antivirus.if you want to install webroot secureanywhere download with key code then visit our site:

    ReplyDelete

  13. It is all time best protective antivirus and anti-spyware .It is real time protection technology and it is safer , faster and more complete than ever before.if want to install install webroot antivirus with key code then visit our site.

    ReplyDelete

  14. office setup is essential for noways every youth and businessmen to use it to make the presentation, and many more features include in Microsoft office. if you want to install office so you must visit : enter microsoft product key

    ReplyDelete
  15. Get one of the best Office setup support! We offer MS Office 365 setup and MS Office 2016 setup services. And our aim is to remove all the problems of your pc , laptop etc. you can visit: www.office.com/myaccount our site for more information.

    ReplyDelete
  16. Setup an office 365 package with us. We are a team of technical professionals and give the best technical help to our clients even after the installation process. if you want to install activate office 2016 product key then visit our site:

    ReplyDelete

  17. Introduce mcafee antivirus in your PC with high class experts and best tech group. Simply ring us and we are prepared to help you till the last moment of establishment visit install mcafee with activation code here for more details.

    ReplyDelete
  18. Download office tools without putting any effort. We are ready to give you complete help until the completion of the installation process. if you want to install enter microsoft product key then visit our site:

    ReplyDelete

  19. Webroot software is one of the proven best Antivirus software. If you own a device or system and you are connecting it to internet or another device then you must have antivirus software. Virus or any risky threat like Malware, Trojan, Spyware, Rootkit or online hacking or attack can steal your data and damage your system. And to save your system from such treats, install antivirus software known as webroot from install webroot antivirus with key code and secure your system. You can also install it on your device such as the laptop, mobile, tablet, PC etc.

    ReplyDelete
  20. Visit install norton using product key to present cost or paid version of the item. Expertise to present Norton game plan and Norton focus to check your Wi-Fi arrange. The Norton Security programming at a sensible expense.

    ReplyDelete
  21. McAfee inception with Mcafee antivirus mcafee product key gives all-around protection blocking all the bothersome perils, malware disease which can hurt your PC.

    ReplyDelete
  22. Setup Office 365 group with us. We are the gathering of specific specialists and give the best particular help to install office our clients a lot after the foundation strategy.

    ReplyDelete
  23. Introduce Office course of action 365 with our help. By and by setting up activate office your record will be a cakewalk with us.

    ReplyDelete
  24. Office it the heap of Office instruments to make your working smooth and effective. Get it downloaded office activation in your PC with the speedy assistance.

    ReplyDelete
  25. Get your Office Setup Installed with download office the help of the best help gathering. You may present the all out office 365 pack with no caught work.

    ReplyDelete
  26. Download Norton Mobile Security and Antivirus application that can shield your records from getting norton 360 affected from any online malware or contamination.

    ReplyDelete
  27. Antivirus is the need of PCs that makes them contamination free and we are going to give you full help to get the best antivirus norton login presented in your PCs and workstations. Download norton antivirus group with us.

    ReplyDelete
  28. Download Norton Antivirus to make your PC contamination free with the best help and tech gathering. Try not to stop for a second to connect with norton security us.

    ReplyDelete
  29. Norton web security is commonly used antivirus norton antivirus gives the least requesting to use and most intutive protection for your PC and your mobiles . Present it and negligence viruses, spyware, root-packs, developers.

    ReplyDelete
  30. Achieve more with OneDrive and Office 365 Create cleaned reports, open bits of information, present with clarity, and group up dynamically using activate office 365 Office 365.

    ReplyDelete
  31. Office Setup is a gathering of client programming, server programming and organizations through this you can make professsional looking documents , diagrams , tallies, reports, and presentation in quick and accuracy. If you have to present it by then visit download office 2016 our site.

    ReplyDelete
  32. Present Mcafee Antivirus in your PC with high class specialists and best tech gathering. Essentially ring us and we are set up to assist you with mcafee download working the last snapshot of foundation.

    ReplyDelete
  33. Go to Roku page record enter Roku com association code appeared on Roku TV. My Roku com associate not working roku code use new Roku code.

    ReplyDelete
  34. McAfee is a leader in online vulnerability protection. McAfee, the device-to-cloud cybersecurity company, provides security solutions that protect data and stop threats from device to cloud using an open install mcafee proactive, and intelligence-driven approach.

    ReplyDelete
  35. Roku is a streaming device, which is a reasonable roku setup activate roku Code and other Set-up Box. Roku is a bundle of amusement, where client can stream for boundless motion appears, web arrangement, news, animation and a lot more projects.

    ReplyDelete
  36. AVG Retail is the best Antivirus software which provides the complete suite of features which can secure your digital online and offline work of the system or devices.
    www.avg.com/retail |
    avg.com/retail |
    www.avg.com/activation |
    install avg with license number |
    avg download


    ReplyDelete
  37. download kaspersky using activation code is a nice choice to have for your own or business needs. This is a standout amongst the most prominent security arrangements available worldwide and you can find it here at Antivirus complete security. In addition to the fact that we assist you to get the antivirus application introduced. Antivirus protection is essential for your PC and dependably its most recent form must be offered and promising refreshed.

    ReplyDelete

  38. www.avg.com/retail is the official website where you can insert the AVG activation code and activate your AVG antivirus setup. AVG is an antivirus that grants users to safeguard their data, files, computer, mobile phone, and online work from threats. Download AVG and activating it through www avg com activation is an excellent option to secure your device from Malware, Ransomware, Phishing attacks, Adware and other threats. AVG antivirus is compatible with Windows, Mac, iOS, and android, with 100% network and data protection. After purchasing AVG Internet Security, you require to activate the product using either an activation code or via your AVG Account that is registered with the same email address you used to create the purchase.

    ReplyDelete
  39. Thank you for the informative article with us. Thanks for the sharing this post.I really impressed by your approach.
    www.trendmicro.com/downloadme

    ReplyDelete
  40. Great information, i was searching of this kind of
    information, thank you very much for sharing with us.webroot.com/safe

    ReplyDelete
  41. Thank you so much for this Post and all the best for your future, You are really a talented person I have ever seen.
    www.norton.com/setup

    ReplyDelete
  42. Norton gives this another option for downloading the complete Norton setup. The Steps are mostly same but with some changes in the downloading procedures. Visit: www.norton.com/setup

    ReplyDelete
  43. www.norton.com/setup Internet Security or Norton Antivirus products are the essential tools for protecting the computer or digital devices from malware, spyware, Trojans and other virus attacks.

    ReplyDelete
  44. www.trendmicro.com/downloadme Antivirus and cybersecurity products from this brand are easy to use and install and can be done in a simple manner by following a few steps. The security package offered by this brand is incredibly easy to set up and install.

    ReplyDelete
  45. Thank you for your post. This is excellent information. It is amazing and wonderful to visit your site.

    Visit: webroot.com/safe

    ReplyDelete
  46. Great information, i was searching of this kind of
    information,

    Visit: Webroot geek squad download

    ReplyDelete
  47. Very Nice Article thanks for sharing me Like this information.

    Visit: www.norton.com/setup

    ReplyDelete
  48. Thank you for your post. This is excellent information. It is amazing and wonderful to visit your site.

    Visit: www.trendmicro.com/bestbuypc

    ReplyDelete
  49. Thank you for your post. This is excellent information.

    Visit: www.trendmicro.com/downloadme

    ReplyDelete

  50. www.webroot.com/safe is one of the easiest processes to secure your online web surfing and data.

    ReplyDelete
  51. www.norton.com/setup– As we know that cyber attacks are increasing in today’s time, in which hackers reach into our device using different techniques and work to harm useful data, financial, personal information, damage to our device.

    ReplyDelete
  52. www.trendmicro.com/downloadme- Defend against the unknown threats and proceed for Trend micro download with TrendMicro having Advanced Machine Learning Technology.

    ReplyDelete
  53. Islamic Teachers is a major and exclusive Quran Classes Academy in UK , USA AUS.

    ReplyDelete
  54. At USA Car Removal Adelaide, you have the buyer you’ve been looking for. Give us a call and we’ll make you Cash for Cars offer. We buy Sedans, Trucks, 4x4s, Vans, SUVs, Utes, Jeeps, buses, 4WDs, Light Trucks, Trucks and motorcycles of any make and condition. At SA Car Removal Adelaide, you have a licensed and insured auto buyer that will make you a Top Cash offer for your Unwanted Car today. We buy any make, any model, any year and in any condition of a vehicle. We provide eco-friendly Wrecking & Recycling and our Auto Wrecking helps to curb manufacturing for new parts so we keep the environment green. With more than many years of experience in cash for cars At SA Car Removal, our customers get

    Cash for cars in adelaide
    Cash for cars Caboolture
    Cash for cars ipswich
    Cash for cars in adelaide in australia

    ReplyDelete
  55. Need Help With management accounting case study assignment? Our Top Academic Writers Provide Quality Assignment Help Online. Get 100% Unique Content & Score a+ Grade. On-time Delivery, 24X7 Support

    ReplyDelete


  56. To play out the activation process you simply need a Primevideo.com/mytv account, where you can make a record on the Prime video in the event that you have not bought in to watch the Prime video. Keep in mind, you may likewise profit the great video of the I month preliminary membership. How about we discover the essential advances which will assist you with making the great video account.
    Read more…

    ReplyDelete
  57. more information q7v21a2o03 replica louis vuitton replica bags qatar e7p13p6z50 replica bags hong kong about his y6z05q0o18 replica bags for sale you can look here h1g61j8i59 best replica designer replica bags hermes

    ReplyDelete
  58. This comment has been removed by the author.

    ReplyDelete
  59. El Pollo Loco offers a variety of daily specials, which typically include a specific menu item at a discounted price.

    ReplyDelete