Seonhoon Lee, YeongSeung Baek, Heung-Seon Oh, Seonho Kim
Recognizing workers' locations and automatically assigning warnings are crucial for preventing industrial injuries. However, existing warning systems are unsuitable for industrial environments as they rely solely on images or insufficiently leverage multi-sensor inputs. Their distance- or plane-based warning assignment strategies are limited when managing 3D spatial environments. To address these issues, we propose DeepMonitor, a novel industrial automatic warning system that incorporates a prior knowledge-based 2D-to-3D conversion and a multi-sensor, space-based warning assignment strategy. We use a mature 2D object detector to avoid the need for 3D training datasets and apply prior knowledge with multi-sensors to reduce the search space for workers' locations. To manage 3D spatial environments, warnings are assigned based on the overlap ratios between workers and zones, defined as 3D bounding boxes. We have constructed a novel dataset for industrial safety and have tested our system against existing approaches. Results demonstrate our system's superiority, achieving an F1-score 16.7% and 24.7% higher than those of the image-only and camera-geometry systems, respectively.
{"title":"DeepMonitor: A comprehensive approach for real-time hazard detection for industrial safety","authors":"Seonhoon Lee, YeongSeung Baek, Heung-Seon Oh, Seonho Kim","doi":"10.4218/etrij.2024-0284","DOIUrl":"https://doi.org/10.4218/etrij.2024-0284","url":null,"abstract":"<p>Recognizing workers' locations and automatically assigning warnings are crucial for preventing industrial injuries. However, existing warning systems are unsuitable for industrial environments as they rely solely on images or insufficiently leverage multi-sensor inputs. Their distance- or plane-based warning assignment strategies are limited when managing 3D spatial environments. To address these issues, we propose DeepMonitor, a novel industrial automatic warning system that incorporates a prior knowledge-based 2D-to-3D conversion and a multi-sensor, space-based warning assignment strategy. We use a mature 2D object detector to avoid the need for 3D training datasets and apply prior knowledge with multi-sensors to reduce the search space for workers' locations. To manage 3D spatial environments, warnings are assigned based on the overlap ratios between workers and zones, defined as 3D bounding boxes. We have constructed a novel dataset for industrial safety and have tested our system against existing approaches. Results demonstrate our system's superiority, achieving an F1-score 16.7% and 24.7% higher than those of the image-only and camera-geometry systems, respectively.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 5","pages":"959-969"},"PeriodicalIF":1.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0284","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145335692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<p>A, Ashwini, Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology</p><p>A, Revathi, SASTRA Deemed University</p><p>A, UMAMAGESWARI, SRM University - Ramapuram Campus</p><p>Abd El-Hafeez, Tarek, Minia University</p><p>Abd Rahman, Mohd Amiruddin, Universiti Putra Malaysia</p><p>Abdi, Asad, University of Derby</p><p>Abdullah, Hadeel, University of Technology</p><p>Abebe, Abiy, Addis Ababa Institute of Technology</p><p>Adewunmi, Mary, National Center for Technology Management</p><p>Afify, Heba M., Higher Inst. of Engineering in Shorouk Academy</p><p>Ahmad, Mushtaq, Nanjing University of Aeronautics and Astronautics</p><p>Ahmed, Suhaib, Baba Ghulam Shah Badshah University</p><p>Ahn, Sungsoo, Gyeongsang National University</p><p>Akbar, Son, Universitas Ahmad Dahlan</p><p>Akhriza, Tubagus, Kampus STIMATA</p><p>Akoushideh, Alireza, Technical and Vocational University</p><p>Al-Araji, Ahmed S., University of technology - Iraq</p><p>Al-Azzoni, Issam, Al Ain University</p><p>Alfaverh, Fayiz, University of Hertfordshire</p><p>alghanimi, abdulhameed, Middle Technical Univ.</p><p>Ali, Dia M, Ninevah University</p><p>ali, Tariq, PMAS Arid Agriculture university</p><p>Alikhani, Nasim,</p><p>Al-Kaltakchi, Musab T. S., Mustansiriyah University</p><p>Al-kaltakchi, Musab, Mustansiriyah University</p><p>Alkinoon, Mohammed, University of Central Florida</p><p>Al-masni, Mohammed A., Sejong University</p><p>Al-Sakkaf, Ahmed Gaafar, Universidad Carlos III de Madrid Escuela Politécnica Superior</p><p>Ansarian, Sasan,</p><p>Arora, Shashank, SUNY</p><p>Asgher, Umer, National University of Sciences and Technology</p><p>Ashraf, Umer, NIT Srinagar</p><p>atashbar, mahmoud, Azarbaijan Shahid Madani University,</p><p>Atrey, Pradeep, State University of New York</p><p>Azim, Rezaul, University of Chittagong</p><p>B, Srinivas, Maharaj Vijayaram Gajapathi Ram College of Engineering</p><p>Baek, Donghyun, Chung-Ang University</p><p>Baek, Hoki, Kyungpook National University</p><p>Balbinot, Alexandre, Universidade Federal do Rio Grande do Sul</p><p>BANDI, SUDHEER, Panimalar Engineering College</p><p>Baranwal, Alok, NIT-Durgapur</p><p>Baydargil, Husnu Baris, Institute for Basic Science</p><p>Beniwal, Ruby, Jaypee Institute of Information Technology</p><p>Benrabah, Abdeldjabar,</p><p>Bhattacharya, Ratnadeep, The George Washington University</p><p>Bhowmik, Showmik, Ghani Khan Choudhury Institute of Engineering and Technology</p><p>Bonthagorla, Praveen Kumar, National Institute of Technology Goa</p><p>Byun, Gangil, UNIST</p><p>Byun, Hayoung, Myongji University</p><p>C, Arunkumar Madhuvappan, Vinayaka Mission's Kirupananda Variyar Engineering College</p><p>Callou, G., UFRPE</p><p>Cammarasana, Simone, CNR-IMATI</p><p>Castillo-Soria, Francisco, Universidad Autónoma de San Luis Potosí</p><p>Ceberio, Josu, University of the Basque Country</p><p>Cha, Ho-Young, Hongik University</p><p>Chabir, Karim, ENIG</p><p>Chaudhary, Girdhari, Jeonbuk National University</p><p>Che, Ren
{"title":"2024 Reviewer List","authors":"","doi":"10.4218/etr2.70008","DOIUrl":"https://doi.org/10.4218/etr2.70008","url":null,"abstract":"<p>A, Ashwini, Vel Tech Rangarajan Dr Sagunthala R&D Institute of Science and Technology</p><p>A, Revathi, SASTRA Deemed University</p><p>A, UMAMAGESWARI, SRM University - Ramapuram Campus</p><p>Abd El-Hafeez, Tarek, Minia University</p><p>Abd Rahman, Mohd Amiruddin, Universiti Putra Malaysia</p><p>Abdi, Asad, University of Derby</p><p>Abdullah, Hadeel, University of Technology</p><p>Abebe, Abiy, Addis Ababa Institute of Technology</p><p>Adewunmi, Mary, National Center for Technology Management</p><p>Afify, Heba M., Higher Inst. of Engineering in Shorouk Academy</p><p>Ahmad, Mushtaq, Nanjing University of Aeronautics and Astronautics</p><p>Ahmed, Suhaib, Baba Ghulam Shah Badshah University</p><p>Ahn, Sungsoo, Gyeongsang National University</p><p>Akbar, Son, Universitas Ahmad Dahlan</p><p>Akhriza, Tubagus, Kampus STIMATA</p><p>Akoushideh, Alireza, Technical and Vocational University</p><p>Al-Araji, Ahmed S., University of technology - Iraq</p><p>Al-Azzoni, Issam, Al Ain University</p><p>Alfaverh, Fayiz, University of Hertfordshire</p><p>alghanimi, abdulhameed, Middle Technical Univ.</p><p>Ali, Dia M, Ninevah University</p><p>ali, Tariq, PMAS Arid Agriculture university</p><p>Alikhani, Nasim,</p><p>Al-Kaltakchi, Musab T. S., Mustansiriyah University</p><p>Al-kaltakchi, Musab, Mustansiriyah University</p><p>Alkinoon, Mohammed, University of Central Florida</p><p>Al-masni, Mohammed A., Sejong University</p><p>Al-Sakkaf, Ahmed Gaafar, Universidad Carlos III de Madrid Escuela Politécnica Superior</p><p>Ansarian, Sasan,</p><p>Arora, Shashank, SUNY</p><p>Asgher, Umer, National University of Sciences and Technology</p><p>Ashraf, Umer, NIT Srinagar</p><p>atashbar, mahmoud, Azarbaijan Shahid Madani University,</p><p>Atrey, Pradeep, State University of New York</p><p>Azim, Rezaul, University of Chittagong</p><p>B, Srinivas, Maharaj Vijayaram Gajapathi Ram College of Engineering</p><p>Baek, Donghyun, Chung-Ang University</p><p>Baek, Hoki, Kyungpook National University</p><p>Balbinot, Alexandre, Universidade Federal do Rio Grande do Sul</p><p>BANDI, SUDHEER, Panimalar Engineering College</p><p>Baranwal, Alok, NIT-Durgapur</p><p>Baydargil, Husnu Baris, Institute for Basic Science</p><p>Beniwal, Ruby, Jaypee Institute of Information Technology</p><p>Benrabah, Abdeldjabar,</p><p>Bhattacharya, Ratnadeep, The George Washington University</p><p>Bhowmik, Showmik, Ghani Khan Choudhury Institute of Engineering and Technology</p><p>Bonthagorla, Praveen Kumar, National Institute of Technology Goa</p><p>Byun, Gangil, UNIST</p><p>Byun, Hayoung, Myongji University</p><p>C, Arunkumar Madhuvappan, Vinayaka Mission's Kirupananda Variyar Engineering College</p><p>Callou, G., UFRPE</p><p>Cammarasana, Simone, CNR-IMATI</p><p>Castillo-Soria, Francisco, Universidad Autónoma de San Luis Potosí</p><p>Ceberio, Josu, University of the Basque Country</p><p>Cha, Ho-Young, Hongik University</p><p>Chabir, Karim, ENIG</p><p>Chaudhary, Girdhari, Jeonbuk National University</p><p>Che, Ren","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 1","pages":"167-171"},"PeriodicalIF":1.3,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etr2.70008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143497340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates securing nonorthogonal multiple access (NOMA) by leveraging receivers equipped with full-duplex (FD) communication and energy harvesting (EH) capabilities. These receivers decode their intended information while simultaneously jamming eavesdroppers using harvested energy, aiming to achieve high security, energy efficiency, and spectral efficiency. The study analyzes the proposed NOMA scheme with EH-assisted FD receivers across various key performance metrics for a quick performance assessment. The proposed analysis is validated through simulations, which demonstrate the influence of the proposed model on multiple specifications. Furthermore, the proposed model is shown to be considerably more secure than the conventional orthogonal multiple access (OMA) with EH-assisted FD receivers, revealing the advantages of NOMA over OMA.
{"title":"Secure nonorthogonal multiple access with energy harvesting-assisted full-duplex receivers","authors":"Toi Le-Thanh, Khuong Ho-Van","doi":"10.4218/etrij.2024-0335","DOIUrl":"https://doi.org/10.4218/etrij.2024-0335","url":null,"abstract":"<p>This paper investigates securing nonorthogonal multiple access (NOMA) by leveraging receivers equipped with full-duplex (FD) communication and energy harvesting (EH) capabilities. These receivers decode their intended information while simultaneously jamming eavesdroppers using harvested energy, aiming to achieve high security, energy efficiency, and spectral efficiency. The study analyzes the proposed NOMA scheme with EH-assisted FD receivers across various key performance metrics for a quick performance assessment. The proposed analysis is validated through simulations, which demonstrate the influence of the proposed model on multiple specifications. Furthermore, the proposed model is shown to be considerably more secure than the conventional orthogonal multiple access (OMA) with EH-assisted FD receivers, revealing the advantages of NOMA over OMA.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 6","pages":"1028-1038"},"PeriodicalIF":1.6,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0335","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145719771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jung Ho Lee, Taehun Kim, Youngsu Cho, Juil Jeon, Kyeongsoo Han, Taikjin Lee
This paper presents a radio-frequency (RF) signal modeling technology that builds a fingerprinting database for indoor localization quickly and accurately. Fingerprinting-based localization technology uses location-specific signal characteristics as a database; therefore, it is less sensitive to multipath problems. The proposed approach predicts signal propagation paths and calculates attenuation based on an indoor map, reducing infrastructure installation and data collection time. Because the indoor map lacks accurate information about all structures, the modeling results contain errors when compared to measurements. To address this, measurements from a partial area improve modeling accuracy by accounting for received signal strength changes caused by indoor structures. In experiments with seven beacons, the proposed database construction method achieves an average error of 5.16 dBm and a localization error of 1.61 m, comparable to the 1.14-m error in measurement-based databases, while reducing database construction time by 41.06%. These results demonstrate the effectiveness of the proposed technology in rapidly and accurately building databases for indoor localization.
{"title":"Effective fingerprinting database construction through digital map-based RF signal modeling and partial measurements in indoor environments","authors":"Jung Ho Lee, Taehun Kim, Youngsu Cho, Juil Jeon, Kyeongsoo Han, Taikjin Lee","doi":"10.4218/etrij.2024-0165","DOIUrl":"https://doi.org/10.4218/etrij.2024-0165","url":null,"abstract":"<p>This paper presents a radio-frequency (RF) signal modeling technology that builds a fingerprinting database for indoor localization quickly and accurately. Fingerprinting-based localization technology uses location-specific signal characteristics as a database; therefore, it is less sensitive to multipath problems. The proposed approach predicts signal propagation paths and calculates attenuation based on an indoor map, reducing infrastructure installation and data collection time. Because the indoor map lacks accurate information about all structures, the modeling results contain errors when compared to measurements. To address this, measurements from a partial area improve modeling accuracy by accounting for received signal strength changes caused by indoor structures. In experiments with seven beacons, the proposed database construction method achieves an average error of 5.16 dBm and a localization error of 1.61 m, comparable to the 1.14-m error in measurement-based databases, while reducing database construction time by 41.06%. These results demonstrate the effectiveness of the proposed technology in rapidly and accurately building databases for indoor localization.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 4","pages":"643-656"},"PeriodicalIF":1.6,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0165","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144843482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) is an intelligent network paradigm created by interconnected device networks. Although the importance of IoT systems has increased in various applications, the increasing number of connected devices has made security even more critical. This study presents the ROUT-4-2023 dataset, which represents a step toward the security of IoT networks. This dataset simulates potential attacks on RPL-based IoT networks and provides a new platform for researchers in this field. Using artificial intelligence and machine-learning techniques, a performance evaluation was performed on four different artificial neural network models (convolutional neural network, deep neural network, multilayer perceptron structure, and routing attack detection-fed forward neural network [RaD-FFNN]). The results show that the RaD-FFNN model has high accuracy, precision, and retrieval rates, indicating that it can be used as an effective tool for the security of IoT networks. This study contributes to the protection of IoT networks from potential attacks by presenting ROUT-4-2023 and RaD-FFNN models, which will lead to further research on IoT security.
{"title":"Detection of IPv6 routing attacks using ANN and a novel IoT dataset","authors":"Murat Emeç","doi":"10.4218/etrij.2023-0506","DOIUrl":"https://doi.org/10.4218/etrij.2023-0506","url":null,"abstract":"<p>The Internet of Things (IoT) is an intelligent network paradigm created by interconnected device networks. Although the importance of IoT systems has increased in various applications, the increasing number of connected devices has made security even more critical. This study presents the ROUT-4-2023 dataset, which represents a step toward the security of IoT networks. This dataset simulates potential attacks on RPL-based IoT networks and provides a new platform for researchers in this field. Using artificial intelligence and machine-learning techniques, a performance evaluation was performed on four different artificial neural network models (convolutional neural network, deep neural network, multilayer perceptron structure, and routing attack detection-fed forward neural network [RaD-FFNN]). The results show that the RaD-FFNN model has high accuracy, precision, and retrieval rates, indicating that it can be used as an effective tool for the security of IoT networks. This study contributes to the protection of IoT networks from potential attacks by presenting ROUT-4-2023 and RaD-FFNN models, which will lead to further research on IoT security.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 2","pages":"350-361"},"PeriodicalIF":1.3,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2023-0506","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143835975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unmanned aerial vehicles (UAVs) are highly mobile and easily deployable devices that have become an important component of wireless communication countermeasures. Covert communication, the main method used to ensure wireless communication security, has been extensively studied in recent years. However, existing research primarily uses UAVs as auxiliary tools for covert communications, to improve communication performance, ignoring situations in which the detector utilizes UAVs for interference suppression. In this study, we propose a UAV-assisted jamming detection covert communication game model. Specifically, the UAV actively transmits noise to Alice's transmission channels to disrupt covert transmission when Willie detects a covert communication transmission. Furthermore, we analyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditions for the existence of a Nash equilibrium, and formulate optimal strategies for both sides.
{"title":"Strategy optimization method based on UAVs-assisted detection of covert communication","authors":"Xiaohan Wang, Wen Tian, Guangjie Liu, Yuwei Dai","doi":"10.4218/etrij.2024-0178","DOIUrl":"https://doi.org/10.4218/etrij.2024-0178","url":null,"abstract":"<p>Unmanned aerial vehicles (UAVs) are highly mobile and easily deployable devices that have become an important component of wireless communication countermeasures. Covert communication, the main method used to ensure wireless communication security, has been extensively studied in recent years. However, existing research primarily uses UAVs as auxiliary tools for covert communications, to improve communication performance, ignoring situations in which the detector utilizes UAVs for interference suppression. In this study, we propose a UAV-assisted jamming detection covert communication game model. Specifically, the UAV actively transmits noise to Alice's transmission channels to disrupt covert transmission when Willie detects a covert communication transmission. Furthermore, we analyze the adversarial process between the detector and Alice under UAV-assisted jamming based on game theory, theoretically verify the conditions for the existence of a Nash equilibrium, and formulate optimal strategies for both sides.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 4","pages":"603-616"},"PeriodicalIF":1.6,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0178","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144843428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We address the challenge of jointly representing uplink (UL) and downlink (DL) channels for a massive multiple-input multiple-output satellite system. We employ dictionary learning for sparse representation with the goal of minimizing the number of UL/DL pilots and improving accuracy. Additionally, by considering the angular reciprocity, a common dictionary support can be established to enhance the performance. However, what type of dictionary model is suited for UL/DL channel representation remains an unknown field. Previous research has utilized predefined dictionaries, such as DFT or ODFT bases, which are unable to adapt to dynamic scenarios. Training dictionaries have demonstrated the potential to significantly improve accuracy; however, a lack of analysis regarding dictionary constraints exists. To address this issue, we analyze the conditional constraints of the dictionary for joint UL/DL channel representation, aiming to quantify the maximum boundary while proposing a constrained dictionary learning algorithm with singular value decomposition to obtain an effective representation and conduct an adaptability analysis in dynamic satellite communication scenarios.
{"title":"Sparse joint representation for massive MIMO satellite uplink and downlink based on dictionary learning","authors":"Qing-Yang Guan, Shuang Wu, Zhuang Miao","doi":"10.4218/etrij.2024-0190","DOIUrl":"https://doi.org/10.4218/etrij.2024-0190","url":null,"abstract":"<p>We address the challenge of jointly representing uplink (UL) and downlink (DL) channels for a massive multiple-input multiple-output satellite system. We employ dictionary learning for sparse representation with the goal of minimizing the number of UL/DL pilots and improving accuracy. Additionally, by considering the angular reciprocity, a common dictionary support can be established to enhance the performance. However, what type of dictionary model is suited for UL/DL channel representation remains an unknown field. Previous research has utilized predefined dictionaries, such as DFT or ODFT bases, which are unable to adapt to dynamic scenarios. Training dictionaries have demonstrated the potential to significantly improve accuracy; however, a lack of analysis regarding dictionary constraints exists. To address this issue, we analyze the conditional constraints of the dictionary for joint UL/DL channel representation, aiming to quantify the maximum boundary while proposing a constrained dictionary learning algorithm with singular value decomposition to obtain an effective representation and conduct an adaptability analysis in dynamic satellite communication scenarios.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 4","pages":"617-631"},"PeriodicalIF":1.6,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144843419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Several peak-to-average power ratio (PAPR) reduction methods have been used in orthogonal frequency division multiplexing (OFDM) applications. Among the available methods, partial transmit sequence (PTS) is an efficient PAPR reduction method but can be computationally expensive while determining optimal phase factors (OPFs). Therefore, an optimization algorithm, namely, the improved salp swarm optimization algorithm (ISSA), is incorporated with the PTS to reduce the PAPR of the OFDM signals with limited computational cost. The ISSA includes a dynamic weight element and Lévy flight process to improve the global exploration ability of the optimization algorithm and to control the global and local search ability of the population with a better convergence rate. Three evaluation measures, namely, the complementary cumulative distribution function (CCDF), bit error rate (BER), and symbol error rate (SER), demonstrate the efficacy of the PTS-ISSA model, which achieves a lower PAPR of 3.47 dB and is superior to other optimization algorithms using the PTS method.
{"title":"Peak-to-average power ratio reduction of orthogonal frequency division multiplexing signals using improved salp swarm optimization-based partial transmit sequence model","authors":"Vandana Tripathi, Prabhat Patel, Prashant Kumar Jain, Shailja Shukla","doi":"10.4218/etrij.2023-0347","DOIUrl":"https://doi.org/10.4218/etrij.2023-0347","url":null,"abstract":"<p>Several peak-to-average power ratio (PAPR) reduction methods have been used in orthogonal frequency division multiplexing (OFDM) applications. Among the available methods, partial transmit sequence (PTS) is an efficient PAPR reduction method but can be computationally expensive while determining optimal phase factors (OPFs). Therefore, an optimization algorithm, namely, the improved salp swarm optimization algorithm (ISSA), is incorporated with the PTS to reduce the PAPR of the OFDM signals with limited computational cost. The ISSA includes a dynamic weight element and Lévy flight process to improve the global exploration ability of the optimization algorithm and to control the global and local search ability of the population with a better convergence rate. Three evaluation measures, namely, the complementary cumulative distribution function (CCDF), bit error rate (BER), and symbol error rate (SER), demonstrate the efficacy of the PTS-ISSA model, which achieves a lower PAPR of 3.47 dB and is superior to other optimization algorithms using the PTS method.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 2","pages":"256-269"},"PeriodicalIF":1.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2023-0347","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mardi Hardjianto, Jazi Eko Istiyanto, A. Min Tjoa, Arfa Shaha Syahrulfath, Satriawan Rasyid Purnama, Rifda Hakima Sari, Zaidan Hakim, M. Ridho Fuadin, Nias Ananto
The prolonged sitting inherent in modern work and study environments poses significant health risks, necessitating effective monitoring solutions. Traditional human activity recognition systems often fall short in these contexts owing to their reliance on structured data, which may fail to capture the complexity of human movements or accommodate the often incomplete or unstructured nature of healthcare data. To address this gap, our study introduces a novel application of graph neural networks (GNNs) for detecting prolonged sitting periods using point cloud data from smartphone sensors. Unlike conventional methods, our GNN model excels at processing the unordered, three-dimensional structure of sensor data, enabling more accurate classification of sedentary activities. The effectiveness of our approach is demonstrated by its superior ability to identify sitting, standing, and walking activities—critical for assessing health risks associated with prolonged sitting. By providing real-time activity recognition, our model offers a promising tool for healthcare professionals to mitigate the adverse effects of sedentary behavior.
{"title":"A graph neural network model application in point cloud structure for prolonged sitting detection system based on smartphone sensor data","authors":"Mardi Hardjianto, Jazi Eko Istiyanto, A. Min Tjoa, Arfa Shaha Syahrulfath, Satriawan Rasyid Purnama, Rifda Hakima Sari, Zaidan Hakim, M. Ridho Fuadin, Nias Ananto","doi":"10.4218/etrij.2023-0190","DOIUrl":"https://doi.org/10.4218/etrij.2023-0190","url":null,"abstract":"<p>The prolonged sitting inherent in modern work and study environments poses significant health risks, necessitating effective monitoring solutions. Traditional human activity recognition systems often fall short in these contexts owing to their reliance on structured data, which may fail to capture the complexity of human movements or accommodate the often incomplete or unstructured nature of healthcare data. To address this gap, our study introduces a novel application of graph neural networks (GNNs) for detecting prolonged sitting periods using point cloud data from smartphone sensors. Unlike conventional methods, our GNN model excels at processing the unordered, three-dimensional structure of sensor data, enabling more accurate classification of sedentary activities. The effectiveness of our approach is demonstrated by its superior ability to identify sitting, standing, and walking activities—critical for assessing health risks associated with prolonged sitting. By providing real-time activity recognition, our model offers a promising tool for healthcare professionals to mitigate the adverse effects of sedentary behavior.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 2","pages":"290-302"},"PeriodicalIF":1.3,"publicationDate":"2025-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2023-0190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143836442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxuan Gu, Fengyu Liu, Xiaodi Yi, Lewei Yang, Yunshu Wang
Existing spatial feature recognition and layout methods primarily identify spatial components manually, which is time-consuming and inefficient, and the constraint relationship between objects in space can be difficult to observe. Consequently, this study introduces an advanced spatial feature recognition and layout methodology employing enhanced CenterNet and LSTM (Long Short-Term Memory) frameworks, which is bifurcated into two major components—first, HCenterNet-based feature recognition enhances feature extraction through an attention mechanism and feature fusion technology, refining the identification of small targets within complex background areas; second, a GA-BiLSTM (Genetic Algorithm - Bidirectional LSTM)-based spatial layout model uses a bidirectional LSTM network optimized with a genetic algorithm (GA), aimed at fine-tuning the network parameters to yield more accurate spatial layouts. Experiments verified that compared with the CenterNet model, the recognition performance of the proposed HCenterNet-DIoU model improved by 7.44%. Moreover, the GA-BiLSTM model improved the overall layout accuracy by 10.08% compared with the LSTM model. Time cost analysis also confirmed that the proposed model could meet the real-time requirements.
{"title":"Spatial feature recognition and layout method based on improved CenterNet and LSTM frameworks","authors":"Yuxuan Gu, Fengyu Liu, Xiaodi Yi, Lewei Yang, Yunshu Wang","doi":"10.4218/etrij.2024-0192","DOIUrl":"https://doi.org/10.4218/etrij.2024-0192","url":null,"abstract":"<p>Existing spatial feature recognition and layout methods primarily identify spatial components manually, which is time-consuming and inefficient, and the constraint relationship between objects in space can be difficult to observe. Consequently, this study introduces an advanced spatial feature recognition and layout methodology employing enhanced CenterNet and LSTM (Long Short-Term Memory) frameworks, which is bifurcated into two major components—first, HCenterNet-based feature recognition enhances feature extraction through an attention mechanism and feature fusion technology, refining the identification of small targets within complex background areas; second, a GA-BiLSTM (Genetic Algorithm - Bidirectional LSTM)-based spatial layout model uses a bidirectional LSTM network optimized with a genetic algorithm (GA), aimed at fine-tuning the network parameters to yield more accurate spatial layouts. Experiments verified that compared with the CenterNet model, the recognition performance of the proposed HCenterNet-DIoU model improved by 7.44%. Moreover, the GA-BiLSTM model improved the overall layout accuracy by 10.08% compared with the LSTM model. Time cost analysis also confirmed that the proposed model could meet the real-time requirements.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 4","pages":"721-736"},"PeriodicalIF":1.6,"publicationDate":"2025-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0192","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144843601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}