Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.004
Seok Ryu , Sungjun Hong , Sangyun Lee
In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.
{"title":"Making TSM better: Preserving foundational philosophy for efficient action recognition","authors":"Seok Ryu , Sungjun Hong , Sangyun Lee","doi":"10.1016/j.icte.2023.12.004","DOIUrl":"10.1016/j.icte.2023.12.004","url":null,"abstract":"<div><p>In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 570-575"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001625/pdfft?md5=7071ddbe7afa0f6d6c37f5b8286e72a6&pid=1-s2.0-S2405959523001625-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.03.005
Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim
Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.
{"title":"A study of the relationship of malware detection mechanisms using Artificial Intelligence","authors":"Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim","doi":"10.1016/j.icte.2024.03.005","DOIUrl":"10.1016/j.icte.2024.03.005","url":null,"abstract":"<div><p>Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 632-649"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000298/pdfft?md5=8c3370dad7e696a91dedc176306bffcb&pid=1-s2.0-S2405959524000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.009
Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang
Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.
{"title":"Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems","authors":"Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang","doi":"10.1016/j.icte.2023.12.009","DOIUrl":"10.1016/j.icte.2023.12.009","url":null,"abstract":"<div><p>Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 583-587"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001674/pdfft?md5=dd4ee824a5b20f3fe5bb80495e43d67c&pid=1-s2.0-S2405959523001674-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139395104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.01.001
Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho
In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.
在 CRN 中,开发一种能持续提供准确信道状态信息的高效可靠的频谱检测器至关重要。在这项工作中,我们研究了完全分布式环境中的 CSS,在这种环境中,所有次级用户(SU)都配备了定向天线,并且仅根据其本地知识做出决策,SU 之间不共享信息。首先,我们建立了一个随机顺序优化问题(NP-hard),通过对能量感应/检测阈值的动态优化控制,最大化 SU 的检测精度。它能使 SU 在不对主网络造成干扰的情况下选择可用信道和扇区。为了在分布式环境中解决这个问题,我们将其转化为一个分布式部分观测马尔可夫决策过程(Dec-POMDP)问题。其次,为了在实际环境中确定 Dec-POMDP 的最佳控制,而无需事先了解状态-行动转换概率,我们开发了一种基于多代理深度确定性策略梯度(MADDPG)的算法,简称为 MA-DCSS。该算法采用集中训练和分散执行(CTDE)架构。第三,我们分析了该算法的计算复杂度,并通过计算复杂度的多项式(以信道、扇区和 SU 的数量为单位)展示了所提方法的可扩展性。最后,仿真证实,与基线算法相比,所提出的方案在收敛速度、精确检测和误报概率等方面都具有更高的性能。
{"title":"Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna","authors":"Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho","doi":"10.1016/j.icte.2024.01.001","DOIUrl":"10.1016/j.icte.2024.01.001","url":null,"abstract":"<div><p>In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 472-478"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000018/pdfft?md5=d4778771f73447943cd1a8d63fc1e1b7&pid=1-s2.0-S2405959524000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.04.005
Ehtsham Irshad, Abdul Basit Siddiqui
With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.
随着技术的快速发展,识别网络攻击背后的攻击者变得越来越复杂。为应对这一现象,当前的网络威胁归因过程包括战术、技术和程序(TTP)、工具、目标国家/公司和应用等特征。它们不包括攻击者的背景和动机;因此,它们需要更精细的特征。要更好地了解攻击者的背景、动机和目标,在这一过程中加入行为特征至关重要。本研究强调了在现有技术特征基础上添加行为特征对确定实际攻击者的影响。行为特征是从泰国 CERT 发布的数据集 Threat actor encyclopedia 中提取的。本研究调查还分析了混合特征(技术特征和行为特征)的影响。为此,我们采用了特征选择技术来选择最佳特征。在实证结果中,我们使用了威胁行为者百科全书(由泰国计算机应急小组发布的数据集)来提取行为属性。通过使用机器/深度学习算法进行增强,我们在准确率、精确度、召回率和 F1 测量方面分别取得了 97%、98.8%、97% 和 97.2% 的高分。
{"title":"Context-aware cyber-threat attribution based on hybrid features","authors":"Ehtsham Irshad, Abdul Basit Siddiqui","doi":"10.1016/j.icte.2024.04.005","DOIUrl":"10.1016/j.icte.2024.04.005","url":null,"abstract":"<div><p>With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 553-569"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000420/pdfft?md5=acf5e622fa03761320f62de48e4bf144&pid=1-s2.0-S2405959524000420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140785956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.003
Md. Roisul Ajom Ruku , Md. Ibrahim , A.S.M. Badrudduza , Imran Shafique Ansari , Waqas Khalid , Heejung Yu
In this study, the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination is investigated. In particular, three critical issues in the design of secure RIS-assisted networks are examined: effects of interferers, operation of multiple eavesdroppers (colluding and non-colluding), and benefit of RISs. To examine their effects, the analytical expressions of secrecy outage probability are derived in a closed form. Additionally, asymptotic analyses at a high signal-to-noise ratio (SNR) regime are provided. Finally, the analytical results are validated through numerical simulations.
{"title":"Effects of co-channel interference on RIS empowered wireless networks amid multiple eavesdropping attempts","authors":"Md. Roisul Ajom Ruku , Md. Ibrahim , A.S.M. Badrudduza , Imran Shafique Ansari , Waqas Khalid , Heejung Yu","doi":"10.1016/j.icte.2023.12.003","DOIUrl":"https://doi.org/10.1016/j.icte.2023.12.003","url":null,"abstract":"<div><p>In this study, the secrecy performance of reconfigurable intelligent surfaces (RIS)-aided wireless networks in the existence of multiple interferers towards the destination is investigated. In particular, three critical issues in the design of secure RIS-assisted networks are examined: effects of interferers, operation of multiple eavesdroppers (colluding and non-colluding), and benefit of RISs. To examine their effects, the analytical expressions of secrecy outage probability are derived in a closed form. Additionally, asymptotic analyses at a high signal-to-noise ratio (SNR) regime are provided. Finally, the analytical results are validated through numerical simulations.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 491-497"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001613/pdfft?md5=601be4e6ac761ba8943f4ff1135e5eea&pid=1-s2.0-S2405959523001613-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141438752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.03.003
Giovanni Stanco, Annalisa Navarro, Flavio Frattini, Giorgio Ventre, Alessio Botta
While the spreading of the Internet of Things continues beyond expectations, the security of networking technologies used in this context remains an open issue. This paper provides a comprehensive overview of the state of the art on the security of Low Power Wide Area Networks (LPWANs), with a focus on Sigfox, LoRaWAN, and Narrowband Internet of Things. The paper covers five main areas: (1) security requirements and their implementation in these networks, such as authentication, encryption, access control, and key management; (2) categorization of attacks and threat modeling, with the identification of the attack vectors and the presentation of an attack categorization and analysis; (3) a detailed explanation of attacks documented on Sigfox, LoRaWAN, and Narrowband Internet of Things, examining the underlying vulnerabilities exploited, outlining potential consequences, and discussing countermeasures proposed to mitigate these attacks; (4) security enhancements proposed to address vulnerabilities in each network; (5) the integration of LPWANs with 5G and the consequent security challenges. This survey constitutes an important and missing resource for the study and the development of secure Internet of Things solutions based on Low Power Wide Area Networks, raising awareness of potential threats, and guiding future research efforts towards strengthening the security of these networks and of the broader IoT landscape.
{"title":"A comprehensive survey on the security of low power wide area networks for the Internet of Things","authors":"Giovanni Stanco, Annalisa Navarro, Flavio Frattini, Giorgio Ventre, Alessio Botta","doi":"10.1016/j.icte.2024.03.003","DOIUrl":"10.1016/j.icte.2024.03.003","url":null,"abstract":"<div><p>While the spreading of the Internet of Things continues beyond expectations, the security of networking technologies used in this context remains an open issue. This paper provides a comprehensive overview of the state of the art on the security of Low Power Wide Area Networks (LPWANs), with a focus on Sigfox, LoRaWAN, and Narrowband Internet of Things. The paper covers five main areas: (1) security requirements and their implementation in these networks, such as authentication, encryption, access control, and key management; (2) categorization of attacks and threat modeling, with the identification of the attack vectors and the presentation of an attack categorization and analysis; (3) a detailed explanation of attacks documented on Sigfox, LoRaWAN, and Narrowband Internet of Things, examining the underlying vulnerabilities exploited, outlining potential consequences, and discussing countermeasures proposed to mitigate these attacks; (4) security enhancements proposed to address vulnerabilities in each network; (5) the integration of LPWANs with 5G and the consequent security challenges. This survey constitutes an important and missing resource for the study and the development of secure Internet of Things solutions based on Low Power Wide Area Networks, raising awareness of potential threats, and guiding future research efforts towards strengthening the security of these networks and of the broader IoT landscape.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 519-552"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000274/pdfft?md5=794cf07bac0df7843e84d64bed01dc07&pid=1-s2.0-S2405959524000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140279677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.02.007
Chushi Yu, Yoan Shin
Synthetic aperture radar (SAR) is a crucial active imaging technology in remote sensing, offering valuable information for applications like climate monitoring, environmental analysis, and ship surveillance. Ship detection in SAR images remains challenging due to diverse vessel types and environmental interference, especially in inshore areas, despite the proven effectiveness of deep learning-based algorithms. This paper presents an efficient deep learning method named you only look once-shuffle reparameterized blocks with dynamic head (YOLO-SRBD) based on YOLOv8. Additionally, post-processing incorporates the soft non-maximum suppression to enhance precision. Experiments conducted on SAR image datasets demonstrate that the proposed method surpasses the original YOLOv8 both qualitatively and quantitatively, highlighting its feasibility for practical applications. The detection accuracy of the proposed YOLO-SRBD in the high resolution SAR images dataset rose from 89.9% to 91.3%, and the average precision increased from 66.7% to 74.3%, showing significant performance enhancement.
{"title":"An efficient YOLO for ship detection in SAR images via channel shuffled reparameterized convolution blocks and dynamic head","authors":"Chushi Yu, Yoan Shin","doi":"10.1016/j.icte.2024.02.007","DOIUrl":"10.1016/j.icte.2024.02.007","url":null,"abstract":"<div><p>Synthetic aperture radar (SAR) is a crucial active imaging technology in remote sensing, offering valuable information for applications like climate monitoring, environmental analysis, and ship surveillance. Ship detection in SAR images remains challenging due to diverse vessel types and environmental interference, especially in inshore areas, despite the proven effectiveness of deep learning-based algorithms. This paper presents an efficient deep learning method named you only look once-shuffle reparameterized blocks with dynamic head (YOLO-SRBD) based on YOLOv8. Additionally, post-processing incorporates the soft non-maximum suppression to enhance precision. Experiments conducted on SAR image datasets demonstrate that the proposed method surpasses the original YOLOv8 both qualitatively and quantitatively, highlighting its feasibility for practical applications. The detection accuracy of the proposed YOLO-SRBD in the high resolution SAR images dataset rose from 89.9% to 91.3%, and the average precision increased from 66.7% to 74.3%, showing significant performance enhancement.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 673-679"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000201/pdfft?md5=2e42a950f60cf54cca6e54d60dbe6aa0&pid=1-s2.0-S2405959524000201-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140463699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.01.002
Siyu Lu , Jun Yang , Bo Yang , Xiaolu Li , Zhengtong Yin , Lirong Yin , Wenfeng Zheng
The surgical navigation system enhances surgical safety and accuracy by providing precise guidance. However, traditional pose estimation algorithms lack real-time performance and accuracy. To address this issue, a multi-average Long Short Term Memory (LSTM) prediction network is designed to maintain sensitivity in estimating the position of surgical instruments and track their random motion trends. Additionally, the spatial coordinates of positioning markers are applied back to the imaging plane, reducing the recognition range and improving algorithm running speed. Experimental results show that the average time of estimation is less than 1ms while ensuring the prediction effect.
{"title":"Surgical instrument posture estimation and tracking based on LSTM","authors":"Siyu Lu , Jun Yang , Bo Yang , Xiaolu Li , Zhengtong Yin , Lirong Yin , Wenfeng Zheng","doi":"10.1016/j.icte.2024.01.002","DOIUrl":"10.1016/j.icte.2024.01.002","url":null,"abstract":"<div><p>The surgical navigation system enhances surgical safety and accuracy by providing precise guidance. However, traditional pose estimation algorithms lack real-time performance and accuracy. To address this issue, a multi-average Long Short Term Memory (LSTM) prediction network is designed to maintain sensitivity in estimating the position of surgical instruments and track their random motion trends. Additionally, the spatial coordinates of positioning markers are applied back to the imaging plane, reducing the recognition range and improving algorithm running speed. Experimental results show that the average time of estimation is less than 1ms while ensuring the prediction effect.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 465-471"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S240595952400002X/pdfft?md5=756714a846ef1b135648aacc1cfe6d16&pid=1-s2.0-S240595952400002X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139454739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.04.004
Daniar Estu Widiyanti, Krisma Asmoro, Soo Young Shin
Beyond 6G services and applications demand high and efficient processing capacity due to the massive connectivity of users equipment (UEs). However, the high computational capability and energy consumption of UEs are limited, which becomes a main challenge to overcome. Multi-access edge computing (MEC) has recently been studied widely as it can potentially assist complex tasks executed at UEs. Furthermore, several techniques have been proposed to optimize task offloading among users. Thus, another challenge in MEC is emerging due to the fact that mobile users do not always have a line-of-sight (LoS) to the base station (BS) due to the blocking object. Therefore, it can affect users data rate and result in incremental energy consumption. This research introduces the concept of reconfigurable intelligence surfaces (RIS) to support multiple-input-single-output (MISO) base stations (BS) in both uplink (UL) and downlink (DL) using BCD algorithms. While previous studies concentrate on enhancing task offloading and neglecting inter-user interference, this study suggests an optimization approach for UL and DL data rates, as well as minimizing task offloading delays. The results indicate that optimizing task placement, phase shift, and precoding can reduce the duration of task offloading.
{"title":"Joint optimization of phase shift and task offloading for RIS-assisted multi-access edge computing in beyond 6G communication","authors":"Daniar Estu Widiyanti, Krisma Asmoro, Soo Young Shin","doi":"10.1016/j.icte.2024.04.004","DOIUrl":"10.1016/j.icte.2024.04.004","url":null,"abstract":"<div><p>Beyond 6G services and applications demand high and efficient processing capacity due to the massive connectivity of users equipment (UEs). However, the high computational capability and energy consumption of UEs are limited, which becomes a main challenge to overcome. Multi-access edge computing (MEC) has recently been studied widely as it can potentially assist complex tasks executed at UEs. Furthermore, several techniques have been proposed to optimize task offloading among users. Thus, another challenge in MEC is emerging due to the fact that mobile users do not always have a line-of-sight (LoS) to the base station (BS) due to the blocking object. Therefore, it can affect users data rate and result in incremental energy consumption. This research introduces the concept of reconfigurable intelligence surfaces (RIS) to support multiple-input-single-output (MISO) base stations (BS) in both uplink (UL) and downlink (DL) using BCD algorithms. While previous studies concentrate on enhancing task offloading and neglecting inter-user interference, this study suggests an optimization approach for UL and DL data rates, as well as minimizing task offloading delays. The results indicate that optimizing task placement, phase shift, and precoding can reduce the duration of task offloading.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 620-625"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000419/pdfft?md5=3ad3f653a2f1f8aa864d3acf87e8b4c4&pid=1-s2.0-S2405959524000419-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}