
Deep learning-based snore sound analysis for the detection of night-time breathing disorders
- 1 San Francisco Bay University
- 2 Computer Information Technology, Northern Arizona University, Flagstaff, AZ, U.S.
- 3 Huacong Qingjiao Information Technology (Beijing) Co., Ltd.
- 4 Stevens Institute of Technology
- 5 San Francisco Bay University
* Author to whom correspondence should be addressed.
Abstract
Snoring, a prevalent symptom of obstructive sleep apnea, is believed to impact 57% of men and 40% of women in the United States. Night-time breathing disorders present significant challenges to both diagnosis and treatment, impacting millions of individuals worldwide. Traditional methods like CPAP machines and lifestyle changes face barriers such as discomfort, low adherence, and high costs, prompting the need for innovative solutions. This paper presents a novel approach using artificial intelligence, specifically deep learning, to create a snore sound analysis-based alerting system. This system aims to detect sleep disorders by analyzing snore patterns, providing a non-intrusive, cost-effective, and user-friendly alternative to traditional methods. By training models on snore sound characteristics, we've achieved promising results in identifying sleep apnea, showcasing the potential of this system in transforming the detection and management of night-time breathing disorders.
Keywords
Deep Learning, Sleep Apnea Detection, Snore Sound Analysis, Artificial Intelligence in Healthcare, Machine Learning
[1]. S. Nerella et al., “Transformers in healthcare: A survey,” arXiv preprint arXiv:2307.00067, 2023.
[2]. X. Yan, M. Xiao, W. Wang, Y. Li, and F. Zhang, “A Self-Guided Deep Learning Technique for MRI Image Noise Reduction,” Journal of Theory and Practice of Engineering Science, vol. 4, no. 01, pp. 109–117, 2024.
[3]. K. Chen, X. Du, B. Zhu, Z. Ma, T. Berg-Kirkpatrick, and S. Dubnov, “HTS-AT: A Hierarchical Token-Semantic Audio Transformer for Sound Classification and Detection,” in ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2022, pp. 646–650. doi: 10.1109/ICASSP43922.2022.9746312.
[4]. Y. Chen, X. Gao, and X. Wu, “Application of AI Technology in Defense of Big Data Network Security,” J Phys Conf Ser, vol. 1802, no. 3, p. 32105, Mar. 2021, doi: 10.1088/1742-6596/1802/3/032105.
[5]. T. Song, X. Li, B. Wang, and L. Han, “Research on Intelligent Application Design Based on Artificial Intelligence and Adaptive Interface,” 2024.
[6]. Y. Liu et al., “ML-Bench: Large Language Models Leverage Open-source Libraries for Machine Learning Tasks.” 2023.
[7]. Y. Li, W. Wang, X. Yan, M. Gao, and M. Xiao, “Research on the Application of Semantic Network in Disease Diagnosis Prompts Based on Medical Corpus,” International Journal of Innovative Research in Computer Science & Technology, vol. 12, no. 2, pp. 1–9, 2024.
[8]. M. Zhu, Y. Zhang, Y. Gong, K. Xing, X. Yan, and J. Song, “Ensemble Methodology: Innovations in Credit Default Prediction Using LightGBM, XGBoost, and LocalEnsemble,” arXiv preprint arXiv:2402.17979, 2024.
[9]. Y. Lin, L.-Y. Bao, Z.-M. Li, S.-Z. Si, and C.-H. Chu, “Differential privacy protection over deep learning: An investigation of its impacted factors,” Comput Secur, vol. 99, p. 102061, 2020, doi: https://doi.org/10.1016/j.cose.2020.102061.
[10]. M. Zhu, Y. Zhang, Y. Gong, C. Xu, and Y. Xiang, “Enhancing Credit Card Fraud Detection: A Neural Network and SMOTE Integrated Approach,” Journal of Theory and Practice of Engineering Science, vol. 4, no. 02, pp. 23–30, 2024.
[11]. K. Xu, L. Chen, and S. Wang, “Data-driven Kernel Subspace Clustering with Local Manifold Preservation,” in 2022 IEEE International Conference on Data Mining Workshops (ICDMW), 2022, pp. 876–884.
[12]. Z. Jiang, G. Song, Y. Qian, and Y. Wang, “A deep learning framework for detecting and localizing abnormal pedestrian behaviors at grade crossings,” Neural Comput Appl, vol. 34, no. 24, pp. 22099–22113, 2022.
[13]. J. Liu and J. Neville, “Stationary Algorithmic Balancing For Dynamic Email Re-Ranking Problem,” in Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, in KDD ’23. ACM, Aug. 2023. doi: 10.1145/3580305.3599909.
[14]. R. Jia et al., “Molecular Formula Image Segmentation with Shape Constraint Loss and Data Augmentation,” in IEEE International Conference on Bioinformatics and Biomedicine, (BIBM), 2022, pp. 3821–3823.
[15]. Y. Zhang, Y. Gong, D. Cui, X. Li, and X. Shen, “Deepgi: An automated approach for gastrointestinal tract segmentation in mri scans,” arXiv preprint arXiv:2401.15354, 2024.
[16]. Z. Li, Y. Huang, M. Zhu, J. Zhang, J. Chang, and H. Liu, “Feature Manipulation for DDPM based Change Detection.” 2024.
[17]. Y. Liu, H. Yang, and C. Wu, “Unveiling Patterns: A Study on Semi-Supervised Classification of Strip Surface Defects,” IEEE Access, vol. 11, pp. 119933–119946, 2023.
[18]. Z. Tang, J. Tang, H. Luo, F. Wang, and T.-H. Chang, “Accelerating Parallel Sampling of Diffusion Models,” arXiv preprint arXiv:2402.09970, 2024.
[19]. Y.-T. Hsieh, K. Anjum, S. Huang, I. Kulkarni, and D. Pompili, “Neural Network Design via Voltage-based Resistive Processing Unit and Diode Activation Function - A New Architecture,” in 2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS), 2021, pp. 59–62. doi: 10.1109/MWSCAS47672.2021.9531917.
[20]. L. Zeng, H. Li, T. Xiao, F. Shen, and Z. Zhong, “Graph convolutional network with sample and feature weights for Alzheimer’s disease diagnosis,” Inf Process Manag, vol. 59, no. 4, p. 102952, 2022.
[21]. Y. Chen, W. Huang, S. Zhou, Q. Chen, and Z. Xiong, “Self-Supervised Neuron Segmentation with Multi-Agent Reinforcement Learning,” in Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, in IJCAI-2023. International Joint Conferences on Artificial Intelligence Organization, Aug. 2023. doi: 10.24963/ijcai.2023/68.
[22]. X. Wang, T. Xiao, and J. Shao, “EMRM: Enhanced Multi-source Review-Based Model for Rating Prediction,” in Knowledge Science, Engineering and Management: 14th International Conference, KSEM 2021, Tokyo, Japan, August 14–16, 2021, Proceedings, Part III 14, 2021, pp. 487–499.
[23]. W. Weimin, L. I. Yufeng, Y. A. N. Xu, X. Mingxuan, and G. A. O. Min, “Enhancing Liver Segmentation: A Deep Learning Approach with EAS Feature Extraction and Multi-Scale Fusion,” International Journal of Innovative Research in Computer Science & Technology, vol. 12, no. 1, pp. 26–34, 2024.
[24]. G. Qiao, H. Jiang, and Y. Min, “Research on Vehicle Distance Recognition System Based on Machine Learning and OpenCV,” in 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), 2022, pp. 334–337. doi: 10.1109/ICETCI55101.2022.9832244.
[25]. Z. Tang, Y. Wang, and T.-H. Chang, “z-SignFedAvg: A Unified Stochastic Sign-based Compression for Federated Learning,” arXiv preprint arXiv:2302.02589, 2023.
[26]. Z. Tang and T.-H. Chang, “FedLion: Faster Adaptive Federated Optimization with Fewer Communication,” arXiv preprint arXiv:2402.09941, 2024.
[27]. Y. Chen, J. Arkin, Y. Zhang, N. Roy, and C. Fan, “Scalable multi-robot collaboration with large language models: Centralized or decentralized systems?,” arXiv preprint arXiv:2309.15943, 2023.
[28]. Y. Zhang, M. Zhu, Y. Gong, and R. Ding, “Optimizing science question ranking through model and retrieval-augmented generation,” International Journal of Computer Science and Information Technology, vol. 1, no. 1, pp. 124–130, 2023.
[29]. K. Xu, L. Chen, and S. Wang, “A Multi-view Kernel Clustering framework for Categorical sequences,” Expert Syst Appl, vol. 197, p. 116637, 2022.
[30]. K. Wantlin et al., “Benchmd: A benchmark for modality-agnostic learning on medical images and sensors,” arXiv preprint arXiv:2304.08486, 2023.
[31]. G. Song, Y. Qian, and Y. Wang, “A Deep Generative Adversarial Network (GAN)-enabled Abnormal Pedestrian Behavior Detection at Grade Crossings,” in SoutheastCon 2023, 2023, pp. 677–684.
[32]. Z. Tang, D. Rybin, and T.-H. Chang, “Zeroth-Order Optimization Meets Human Feedback: Provable Learning via Ranking Oracles,” in The Twelfth International Conference on Learning Representations, 2024. [Online]. Available: https://openreview.net/forum?id=TVDUVpgu9s
[33]. J. Liu, T. Yang, and J. Neville, “CliqueParcel: An Approach For Batching LLM Prompts That Jointly Optimizes Efficiency And Faithfulness,” arXiv preprint arXiv:2402.14833, 2024.
[34]. H. Wang, Z. Tang, S. Zhang, C. Shen, and T.-H. Chang, “Embracing Uncertainty: A Diffusion Generative Model of Spectrum Efficiency in 5G Networks,” in 2023 International Conference on Wireless Communications and Signal Processing (WCSP), 2023, pp. 880–885.
Cite this article
Dang,B.;Ma,D.;Li,S.;Qi,Z.;Zhu,E.Y. (2024). Deep learning-based snore sound analysis for the detection of night-time breathing disorders. Applied and Computational Engineering,76,109-114.
Data availability
The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.
Disclaimer/Publisher's Note
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
About volume
Volume title: Proceedings of the 2nd International Conference on Software Engineering and Machine Learning
© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and
conditions of the Creative Commons Attribution (CC BY) license. Authors who
publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons
Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this
series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published
version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial
publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and
during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See
Open access policy for details).