2023 연구성과 (20 / 285)
※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
WoS | SCOPUS | Document Type | Document Title | Abstract | Authors | Affiliation | ResearcherID (WoS) | AuthorsID (SCOPUS) | Author Email(s) | Journal Name | JCR Abbreviation | ISSN | eISSN | Volume | Issue | WoS Edition | WoS Category | JCR Year | IF | JCR (%) | FWCI | FWCI Update Date | WoS Citation | SCOPUS Citation | Keywords (WoS) | KeywordsPlus (WoS) | Keywords (SCOPUS) | KeywordsPlus (SCOPUS) | Language | Publication Stage | Publication Year | Publication Date | DOI | JCR Link | DOI Link | WOS Link | SCOPUS Link |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
○ | ○ | Article | What are the risk factors for a second osteoporotic vertebral fracture? | BACKGROUND CONTEXT: Osteoporosis is characterized by decreased bone strength and an increased risk of fracture. Osteoporosis-related fractures are associated with increased morbidity, mortality, dysfunction, access to health care, health-care costs, and reduced quality of life. Therefore, preventing osteoporotic vertebral compression fractures (OVCF) is important. Secondary OVCFs often occur after the first OVCF.PURPOSE: This study aimed to identify risk factors for a second OVCF after a first OVCF.STUDY DESIGN: Retrospective observational study.PATIENT SAMPLE: One hundred seventy-eight patients from a single institution who had their first OVCF between January 1, 2000 and December 31, 2019 were enrolled in this study.OUTCOME MEASURES: The following data were observed for all cases: patient demographics, bone mineral density, and pelvic parameters. METHODS: We retrospectively reviewed patients from a single institution who had their first OVCF between January 1, 2000 and December 31, 2019. Demographic factors, medication (oral bisphosphonate, zoledronic acid, denosumab), bone mineral density (BMD), body mass index (BMI), fat, and muscle amount of the trunk using dual-energy X-ray absorptiometry (DEXA), and pelvic parameters (lumbar lordosis, sacral slope, pelvic tilt, pelvic incidence minus lumbar lordosis) were investigated.RESULTS: Of 178 patients who had an OVCF, 68 (38.2%) had a second OVCF. Patients were followed up for >2 years and wore braces for an average of 6 months. The mean age was 71.9 +/- 8.63 years, mean BMD T-score was -3.1 +/- 1.09, and mean BMI was 23.3 +/- 2.96. Comparing those with and without a second OVCF, the smaller the BMD T-score and trunk muscle mass to fat ratio, the more likely a second OVCF occurred (p<.05). There were fewer second OVCF cases in the injection medication group than in the peroral group (p<.05). There were no significant differences in radiologic parameters between these groups.CONCLUSIONS: Patients who had a second OVCF had an average of 21.3 months after the first OVCF. Risk factors for a second OVCF are low T-scores in the femur, and low M/F ratio of the trunk, android, and gynoid regions. For patients with an OVCF, injection medications may be advisable. (c) 2023 Elsevier Inc. All rights reserved. | Hwang, Sang Hoon; Cho, Pyung Goo; Kim, Kyoung-Tae; Kim, Keung Nyun; Kim, Sang Hyun; Noh, Sung Hyun | Ajou Univ, Sch Med, Dept Neurosurg, Suwon, South Korea; Yonsei Univ, Coll Med, Dept Neurosurg, Seoul, South Korea; Yonsei Univ, Severance Hosp, Spine & Spinal Cord Inst, Dept Neurosurg,Coll Med, Seoul, South Korea; Kyungpook Natl Univ, Kyungpook Natl Univ Hosp, Sch Med, Dept Neurosurg, Daegu, South Korea; Ajou Univ, Sch Med, Ajou Univ Hosp, Dept Neurosurg, Suwon, South Korea | 58534913000; 56366637100; 57201369790; 55666109100; 57202337309; 57194978247 | ulove07@ajou.ac.kr; | SPINE JOURNAL | SPINE J | 1529-9430 | 1878-1632 | 23 | 11 | SCIE | CLINICAL NEUROLOGY;ORTHOPEDICS | 2023 | 4.9 | 3.3 | 4.36 | 2025-06-25 | 15 | 17 | Android; BMD; Gynoid; Osteoporosis medications; Osteoporotic vertebral compression fracture; Trunk | COMPRESSION FRACTURES; MANAGEMENT; DIAGNOSIS | Android; BMD; Gynoid; Osteoporosis medications; Osteoporotic vertebral compression fracture; Trunk | bazedoxifene; bisphosphonic acid derivative; denosumab; parathyroid hormone[1-34]; raloxifene; zoledronic acid; aged; Article; body fat; body mass; bone density; comparative study; compression fracture; controlled study; demographics; drug efficacy; dual energy X ray absorptiometry; female; follow up; human; lordosis; lumbar spine; major clinical study; male; muscle mass; observational study; osteoporosis; pelvic incidence; pelvic tilt; retrospective study; risk factor; sacral slope; skeletal muscle; spine fracture | English | 2023 | 2023-11 | 10.1016/j.spinee.2023.07.010 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||
○ | ○ | Article | A New Index Modulation for LoRa | Long range (LoRa) is a widely adopted Internet of Things (IoT) technique, but its fatal limit is a low-data rate. In this letter, we propose a new index modulation for LoRa to increase the data rate, in which multiple quasi-orthogonal chirps modulated under different spreading factors (SFs) are concurrently transmitted, thereby leveraging the SF domain as a means to carry more information. Both the coherent and noncoherent detection algorithms for the proposed index modulation are also developed in efficient forms. Numerical results demonstrate that the proposed scheme notably outperforms the state-of-the-art techniques. | Kang, Jae-Mo | Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea | 56024930400 | jmkang@knu.ac.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 13 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.46 | 2025-06-25 | 3 | 4 | Chirp; Modulation; Indexes; Signal to noise ratio; Detection algorithms; Symbols; Sensitivity; Chirp spread spectrum; index modulation; Internet of Things (IoT); long-range (LoRa) | Chirp spread spectrum; index modulation; Internet of Things (IoT); long-range (LoRa) | Chirp modulation; Internet of things; Signal detection; Chirp; Chirp spread spectrum; Detection algorithm; Index; Index modulation; Long range; Low data rates; Sensitivity; Spreading factor; Symbol; Signal to noise ratio | English | 2023 | 2023-07-01 | 10.1109/jiot.2023.3240521 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
○ | Article | Analytical Models for Distributed Resource Allocation in NR-V2X Mode 2 | Cellular vehicle-to-everything (C-V2X) is the first standard introduced by the 3rd generation partnership project (3GPP) in its Rel. 14 to enable V2X communication. This standard is endorsed by the industries, scientists, and researchers. In C-V2X, mode 4 is designed to enable direct V2V communication via the PC-5 interface. In mode 4 vehicles select the resources which are over two-dimensional frequency and time domain for their packet transmission. These resources are scheduled based on a semi-persistent scheduling algorithm introduced by 3GPP to avoid resource contention. However, when the density of vehicles is high resolving resource contention is a major concern. To this end, 3GPP introduced NR-V2X which is the evolution of C-V2X in its Release 16. NR-V2X mode 2 is introduced as an alternative to C-V2X mode 4 for distributed resource scheduling. NR-numerologies and semi-persistent scheduling with re-evaluation mechanism is introduced by 3GPP in NR-V2X play a vital role in resolving resource contention. This paper presents first the analytical models for NR-V2X mode 2 considering the impact of NR-numerologies and re-evaluation mechanism on resource selection. The analytical models are designed considering the four transmission errors that could occur in NR-V2X mode 2. Moreover, the model validation is performed by comparing the proposed analytical models with the NR-V2X simulator implemented in ns-3. The model validation shows that the proposed analytical models are accurate. IEEE | Saad, Malik Muhammad; Tariq, Muhammad Ashar; Siddiqa, Ayesha; Kim, Dongkyun | School of Computer Science and Engineering, Kyungpook National University, Daegu, Republic of Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, Republic of Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, Republic of Korea; School of Computer Science and Engineering, Kyungpook National University, Daegu, Republic of Korea | 57220715290; 57219865336; 57811639800; 35753648800 | IEEE Internet of Things Journal | IEEE INTERNET THINGS | 2327-4662 | 2327-4662 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 1.03 | 2025-06-25 | 9 | 3GPP; Analytical Models; Analytical models; NR-V2X Mode 2; NR-V2X Semi-persistent Scheduling; Quality of service; Rail to rail inputs; Re-evaluation mechanism; Resource management; Sensors; Vehicle-to-everything | Quality control; Quality of service; Resource allocation; Scheduling algorithms; Vehicle to Everything; Vehicle to vehicle communications; Vehicle transmissions; 3rd generation; 3rd generation partnership project; NR-V2X mode 2; NR-V2X semi-persistent scheduling; Quality-of-service; Rail-to-rail input; Re-evaluation; Re-evaluation mechanism; Resource contention; Resource management; Analytical models | English | Article in press | 2023 | 10.1109/jiot.2023.3328885 | 바로가기 | 바로가기 | 바로가기 | ||||||||||
○ | ○ | Article | Blockchain-Enabled Secure Big Data Analytics for Internet of Things Smart Applications | Smart devices in an Internet of Things (IoT) generate a massive amount of big data through sensors. The data is used to build intelligent applications through machine learning (ML). To build these applications, the data is collected from devices into data centers for training ML models. Usually, the training of models is performed on central server, but this approach requires the transfer of data from devices to central server. This centralized training approach is not efficient because the users are much less likely to share data to the centralized data centers due to privacy issues and bandwidth limitations. To mitigate these issues, we propose an efficient hybrid secure federated learning approach with the blockchain to securely train the model locally on devices and then to store the model and its parameters into the blockchain for traceability and immutability. A detailed security and performance analysis is presented to show the efficacy of the proposed approach in terms of security, resilience against many security attacks, and cost effectiveness in computation and communication as compared to other existing competing schemes. | Tekchandani, Prakash; Pradhan, Indranil; Das, Ashok Kumar; Kumar, Neeraj; Park, Youngho | Lebanese Amer Univ, Dept Elect & Comp Engn, Beirut 11022801, Lebanon; Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, India; Univ Petr, Sch Comp Sci, Energy Studies, Dehra Dun 248007, India; Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; King Abdulaziz Univ, Fac Comp & IT, Jeddah 21589, Saudi Arabia; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | Kumar, Neeraj/ABA-5200-2021; Das, Ashok Kumar/U-2790-2019 | 58375402000; 57807401200; 55450732800; 57206866080; 56962990300 | prakash.tekchandani@research.iiit.ac.in;indranil.pradhan@yahoo.in;iitkgp.akdas@gmail.com;neeraj.kumar@thapar.edu;parkyh@knu.ac.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 7 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.69 | 2025-06-25 | 4 | 6 | Authentication; big data analytics; blockchain; Internet of Things (IoT); key agreement; security | APPROXIMATION; ATTACKS | Authentication; big data analytics; blockchain; Internet of Things (IoT); key agreement; security | Big data; Cost effectiveness; Data Analytics; Data transfer; Internet of things; Machine learning; Big data analytic; Block-chain; Computational modelling; Data analytics; Datacenter; Internet of thing; Key agreement; Security; Blockchain | English | 2023 | 2023-04-01 | 10.1109/jiot.2022.3227162 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||
○ | ○ | Article | Efficient Demodulation Algorithms for MIMO-LoRa | Multiple-input-multiple-output (MIMO) and long range (LoRa) have been synergistically combined to better support a variety of Internet of Things (IoT) applications. This letter investigates the problem of demodulation for a MIMO-LoRa system. The existing demodulation strategy for MIMO-LoRa is based on the maximum-likelihood criterion, which, however, suffers from its high computational complexity. To cope with this issue, in this letter, we develop efficient coherent and noncoherent demodulation algorithms for the MIMO-LoRa system by leveraging useful properties of modulated chirps through multiple antennas. We also analyze the computational complexities of the proposed algorithms and demonstrate their validity through numerical simulations. | Kang, Jae-Mo; Choi, Kae Won | Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea; Sungkyunkwan Univ, Dept Elect & Comp Engn, Suwon, South Korea | 56024930400; 8843335600 | jmkang@knu.ac.kr;kaewonchoi@skku.edu; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 23 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.57 | 2025-06-25 | 3 | 5 | Demodulation; Signal to noise ratio; Internet of Things; Computational complexity; Chirp; MIMO communication; Discrete Fourier transforms; Internet of Things (IoT); long range (LoRa); multiple-input-multiple-output (MIMO) | MODULATION | Demodulation; Internet of Things (IoT); long range (LoRa); multiple-input-multiple-output (MIMO) | Computational efficiency; Demodulation; Discrete Fourier transforms; Internet of things; Maximum likelihood; MIMO systems; Optical variables measurement; Signal to noise ratio; Chirp; Demodulation algorithms; Internet-of-thing; Long range; Long range systems; Maximum likelihood criteria; Multiple inputs; Multiple outputs; Multiple-input multiple-output; Multiple-input multiple-output communications; Computational complexity | English | 2023 | 2023-12-01 | 10.1109/jiot.2023.3294946 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
○ | ○ | Article | Fine phase mixtures in one-dimensional non-convex elastodynamics | We show that fine phase mixtures arise in the initial-boundary value problem for a class of equations of non-convex elastodynamics in one space dimension. Specifically, we prove that there are infinitely many local-in-time Lipschitz weak solutions to such a problem that exhibit immediate fine-scale oscillations of the strain whenever the range of the initial strain has a nonempty intersection with the elliptic regime. Consequently, such solutions are nowhere C1 in the part of the space-time domain with fine phase mixtures, but are smooth in the other part of the domain. (c) 2023 Elsevier Inc. All rights reserved. | Choi, Hyung Jun; Kim, Seonghak | Korea Univ Technol & Educ, Sch Liberal Arts, Cheonan 31253, South Korea; Kyungpook Natl Univ, Coll Nat Sci, Dept Math, Daegu 41566, South Korea | 55780425800; 56489490600 | hjchoi@koreatech.ac.kr;shkim17@knu.ac.kr; | JOURNAL OF DIFFERENTIAL EQUATIONS | J DIFFER EQUATIONS | 0022-0396 | 1090-2732 | 363 | SCIE | MATHEMATICS | 2023 | 2.4 | 3.4 | 0.25 | 2025-06-25 | 1 | 1 | Fine phase mixtures; Elastodynamics; Non-convex energy; Partial differential inclusion; Convex integration | BOUNDARIES; EXISTENCE; ADMISSIBILITY; PROPAGATION; EQUATIONS; BEHAVIOR; SYSTEMS; SCHEME | Convex integration; Elastodynamics; Fine phase mixtures; Non-convex energy; Partial differential inclusion | English | 2023 | 2023-08-05 | 10.1016/j.jde.2023.03.020 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
○ | ○ | Article | Fog-Based Single Sign-On Authentication Protocol for Electronic Healthcare Applications | Increasing use of electronic healthcare (eHealth) services demands efficient and secure solutions. Such solutions need to ensure the prevention of unauthorized access to the patient data and provide faster response. Fog computing is a viable solution to provide faster responses in eHealth systems. Key distribution and authentication play a major role in providing security to patient data. Existing centralized architectures are susceptible to single-point-of-compromise, that is, the entire system is vulnerable when the centralized authority keys are unexpectedly revealed to an adversary. In this article, we present a fog-based semi-centralized architecture for key distribution and authentication, in which the key distribution service is delegated to individual fog servers. Thus, the fog servers become responsible for key distribution to the users without the involvement of the centralized authority, which forms a paradigm of multiple client-server architecture. Thus, achieving centralized trust by designing a single sign-on authentication in such environments is a challenging problem. We design a single sign-on authentication protocol for semi-centralized architectures to achieve centralized trust by ensuring that the user keys are independent of the centralized authority's keys. A rigorous security analysis under the random oracle model is performed to prove that the proposed protocol is secure against single-point-of-compromise. We also conduct extensive experiments to show the practical perspectives of the proposed scheme. The results show that the protocol is suitable for eHealth applications, including emergency services. | Mookherji, Srijanee; Odelu, Vanga; Prasath, Rajendra; Das, Ashok Kumar; Park, Youngho | Indian Inst Informat Technol Sri City, Dept Comp Sci & Engn, Chittoor 517646, India; Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Old Dominion Univ, Analysis & Simulat Ctr, Virginia Modeling, Suffolk, VA 23435 USA; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | Das, Ashok Kumar/U-2790-2019; Prasath, Rajendra/HNT-0329-2023; vanga, odelu/B-5428-2017 | 57203781737; 55418632300; 36180057500; 55450732800; 56962990300 | srijanee.mookherji@iiits.in;odelu.vanga@gmail.com;rajendra.prasath@iiits.in;iitkgp.akdas@gmail.com;parkyh@knu.ac.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 12 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.92 | 2025-06-25 | 6 | 9 | Servers; Authentication; Computer architecture; Protocols; Security; Electronic healthcare; Medical services; electronic healthcare (eHealth); fog computing; security and privacy; single sign-on | KEY EXCHANGE; SMART HEALTH; SCHEME; SECURITY | Authentication; electronic healthcare (eHealth); fog computing; security and privacy; single sign-on | Architecture; Client server computer systems; Computer architecture; Data privacy; eHealth; Emergency services; Fog; Fog computing; Hospital data processing; Network architecture; Network security; Centralised; Centralized architecture; Electronic healthcare; Key distribution; Medical services; Security; Security and privacy; Single sign on; Single signs-on; Authentication | English | 2023 | 2023-06-15 | 10.1109/jiot.2023.3242903 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||
○ | ○ | Article | LoRa Preamble Detection With Optimized Thresholds | Long Range (LoRa) is one of the widely adopted techniques for Internet of Things (IoT). Preamble detection is a key initial task for LoRa systems. Meanwhile, the so-called threshold-based preamble detection is a common technique for compatibility with LoRa. However, the existing methods on the threshold-based LoRa preamble detection suffer from low performance because the detection thresholds are heuristically chosen. To tackle this issue, in this letter, we aim to optimize those thresholds by maximizing the preamble detection probability while satisfying a constraint on false alarm rate. For this purpose, coherent and noncoherent procedures for the preamble detection are presented in a universal manner, followed by conducting their performance analysis. Simulation results demonstrate the superiority and effectiveness of the proposed scheme. | Kang, Jae-Mo | Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea | 56024930400 | jmkang@knu.ac.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 7 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.69 | 2025-06-25 | 7 | 6 | Chirp; Signal to noise ratio; Simulation; Task analysis; Symbols; Random variables; Discrete Fourier transforms; Detection; Internet of Things (IoT); Long Range (LoRa); preamble | Detection; Internet of Things (IoT); Long Range (LoRa); preamble | Internet of things; Job analysis; Optimization; Signal to noise ratio; Chirp; Detection; Internet-of-thing; Long range; Long range systems; Preamble; Preamble detection; Simulation; Symbol; Task analysis; Discrete Fourier transforms | English | 2023 | 2023-04-01 | 10.1109/jiot.2022.3231417 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
○ | Article | Marine IoT Systems With Space-Air-Sea Integrated Networks: Hybrid LEO and UAV Edge Computing | Marine Internet of Things (IoT) systems have grown substantially with the development of nonterrestrial networks (NTNs) via aerial and space vehicles in the upcoming sixth-generation (6G), thereby assisting environment protection, military reconnaissance, and sea transportation. Due to the unpredictable climate changes and the extreme channel conditions of maritime networks, however, it is challenging to efficiently and reliably collect and compute a huge amount of maritime data. In this article, we propose a hybrid low-Earth orbit (LEO) and unmanned aerial vehicle (UAV) edge computing method in space-air-sea integrated networks for marine IoT systems. Specifically, two types of edge servers mounted on UAVs and LEO satellites are endowed with computational capabilities for the real-time utilization of a sizable data collected from ocean IoT sensors. Our system aims at minimizing the total energy consumption of the battery-constrained UAV by jointly optimizing the bit allocation of communication and computation along with the UAV path planning under latency, energy budget, and operational constraints. For availability and practicality, the proposed methods are developed for three different cases according to the accessibility of the LEO satellite, 'Always On,' 'Always Off,' and 'Intermediate Disconnected,' by leveraging successive convex approximation (SCA) strategies. Via numerical results, we verify that significant energy savings can be accrued for all cases of LEO accessibility by means of joint optimization of bit allocation and UAV path planning compared to partial optimization schemes that design for only the bit allocation or trajectory of the UAV. © 2014 IEEE. | Jung, Sooyeob; Jeong, Seongah; Kang, Jinkyu; Kang, Joonhyuk | Korea Advanced Institute of Science and Technology, School of Electrical Engineering, Daejeon, 34141, South Korea, Electronics and Telecommunications Research Institute, Satellite Communication Infra Research Section, Daejeon, 34129, South Korea; Kyungpook National University, School of Electronics Engineering, Daegu, 14566, South Korea; Myongji University, Department of Information and Communications Engineering, Gyeonggi-do, 17058, South Korea; Korea Advanced Institute of Science and Technology, School of Electrical Engineering, Daejeon, 34141, South Korea | 57189047890; 55210226900; 56283062100; 7404517651 | jhkang@ee.kaist.ac.kr; | IEEE Internet of Things Journal | IEEE INTERNET THINGS | 2327-4662 | 2327-4662 | 10 | 23 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 4.01 | 2025-06-25 | 36 | Edge computing; Internet of Things (IoT); low-Earth orbit (LEO) satellite; marine networks; successive convex approximation (SCA); unmanned aerial vehicles (UAVs) | Antennas; Budget control; Climate change; Constrained optimization; Earth (planet); Energy conservation; Energy utilization; Internet of things; Military vehicles; Orbits; Satellites; Unmanned aerial vehicles (UAV); Vehicle to vehicle communications; Aerial vehicle; Edge computing; Internet of thing; Low earth orbit satellites; Marine network; Maritime communication; Ocean; Successive convex approximation; Successive convex approximations; Unmanned aerial vehicle; Edge computing | English | Final | 2023 | 10.1109/jiot.2023.3287196 | 바로가기 | 바로가기 | 바로가기 | |||||||
○ | ○ | Article | On the Quasi-Orthogonality of LoRa Modulation | Long Range (LoRa), a low power and wide-area modulation scheme based on chirp spread spectrum, is the most popular and widely adopted Internet of Things (IoT) technique in industry. A notable and interesting property of LoRa modulation is the quasi-orthogonality of signals modulated under different spreading factors (SFs). Unfortunately, in the literature, there has been no analytical effort to establish the theoretical validity of such quasi-orthogonality. This article, for the first time, theoretically tackles the quasi-orthogonality of the LoRa modulation. First, we derive in both continuous- and discrete-time domains the cross-correlation between two nonsynchronized LoRa signals with different SFs, based on which we analyze the quasi-orthogonality of the LoRa modulation and draw some useful engineering insights. Particularly, we analytically show that in the continuous-time domain, the quasi-orthogonality is guaranteed if one of the SFs of the two LoRa signals is large enough; while, in the discrete-time domain, the quasi-orthogonality is ensured if the maximum of the SFs is large enough. Furthermore, for practical values of the SF, the maximum squared magnitudes of the cross-correlation in the continuous- and discrete-time domains are shown to be 1.14% and 1.08%, respectively, compared to their peak values. We demonstrate the validity and accuracy of our analysis through extensive numerical simulations. | Kang, Jae-Mo; Lim, Dong-Woo | Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea; Elect & Telecommun Res Inst, Radio & Satellite Res Div, Daejeon 34129, South Korea | 56024930400; 55694295300 | jmkang@knu.ac.kr;window0508@etri.re.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 14 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 0.57 | 2025-06-25 | 5 | 5 | Cross-correlation; Internet of Things (IoT); long-range (LoRa); performance analysis; quasi-orthogonality | Cross-correlation; Internet of Things (IoT); long-range (LoRa); performance analysis; quasi-orthogonality | Chirp modulation; Continuous time systems; Numerical models; Time domain analysis; Chirp; Correlation; Cross-correlations; Internet-of-thing; Long range; Performances analysis; Quasi-orthogonality; Spreading factor; Symbol; Internet of things | English | 2023 | 2023-07-15 | 10.1109/jiot.2023.3245885 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
○ | ○ | Article | Post-Quantum Lattice-Based Secure Reconciliation Enabled Key Agreement Protocol for IoT | The authenticated key agreement is one of the major security services that can be used to secure an Internet of Things (IoT) environment, where the devices collect the data and the data is then aggregated at the cloud server, and then a user needs to access the data stored at the server(s) securely. For this purpose, after a mutual authentication performed between a user and the accessed server, a session key needs to be established among them for secure communication. In this article, we design an efficient lattice-based authenticated key exchange protocol using ring-based version of learning with errors assumption for the IoT-enabled smart devices. The proposed protocol is basically a key exchange that uses the reconciliation mechanism. The detailed security analysis under the standard model has been performed along with the informal security analysis to show that the proposed protocol is robust against different attacks. We then simulate the proposed protocol under the NS-3 simulator to measure the network performance parameters like network throughput and latency. A comparative analysis shows that the proposed protocol has superior security, less computational cost, and comparable communication cost when compered these parameters with the other competing schemes. | Dharminder, Dharminder; Reddy, Challa Bhageeratha; Das, Ashok Kumar; Park, Youngho; Jamal, Sajjad Shaukat | Amrita Sch Comp, Dept Comp Sci & Engn, Amrita Vishwa Vidyapeetham, Chennai 601103, India; Int Inst Informat Technol Hyderabad, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea; King Khalid Univ, Coll Sci, Dept Math, Abha 62529, Saudi Arabia | ; Chaudhary, Dharminder/AIA-7732-2022; Jamal, Sajjad/AHE-6498-2022; Das, Ashok Kumar/U-2790-2019 | 57210165312; 57927949300; 55450732800; 56962990300; 57198092048 | c_dharminder@ch.amrita.edu;ch.en.u4cys20009@ch.students.amrita.edu;iitkgp.akdas@gmail.com;parkyh@knu.ac.kr;shussain@kku.edu.sa; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 3 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 3.55 | 2025-06-25 | 20 | 31 | Protocols; Security; Internet of Things; Cryptography; Lattices; Authentication; Wireless communication; Authentication and key agreement; Internet of Things (IoT); lattice-based cryptography; security; simulation | USER AUTHENTICATION; DISCRETE LOGARITHMS; PROVABLY SECURE; SCHEME; EXCHANGE; INTERNET; ALGORITHMS | Authentication and key agreement; Internet of Things (IoT); lattice-based cryptography; security; simulation | Cost benefit analysis; Internet of things; Internet protocols; Network security; Quantum cryptography; Security systems; Authentication and key agreements; Internet of thing; Lattice; Lattice-based; Lattice-based cryptography; Security; Security analysis; Simulation; Wireless communications; Authentication | English | 2023 | 2023-02-01 | 10.1109/jiot.2022.3213990 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||
○ | ○ | Article | Solutions of Schrodinger equations with symmetry in orientation preserving tetrahedral group | We consider the nonlinear Schrodinger equation [GRAPHICS] The phenomenon of pattern formation has been a central theme in the study of nonlinear Schrodinger equations. However, the following nonexistence of O (N) symmetry breaking solution is well-known: if the potential function is radial and nondecreasing, any positive solution must be radial. Therefore, solutions of interesting patterns can only exist after violating the assumptions. O (N) symmetry breaking solutions have been presented by Wei and Yan [20]. Symmetry groups of regular polygons describe their solution patterns. Ever since work of Wei and Yan, there have been substantial generalizations but solutions with higher dimensional symmetry have not been constructed. In this study, the existence of nonradial solutions whose symmetry group is a discrete subgroup of O (3), more precisely, the orientation-preserving regular tetrahedral group is shown. (c) 2023 Elsevier Inc. All rights reserved. | Kwon, Ohsang; Lee, Min-Gi | Chungbuk Natl Univ, Dept Math, Cheongju, South Korea; Kyungpook Natl Univ, Dept Math, Daegu, South Korea | 57218663165; 36704125500 | ohsangkwon@chungbuk.ac.kr;leem@knu.ac.kr; | JOURNAL OF DIFFERENTIAL EQUATIONS | J DIFFER EQUATIONS | 0022-0396 | 1090-2732 | 361 | SCIE | MATHEMATICS | 2023 | 2.4 | 3.4 | 0 | 2025-06-25 | 0 | 0 | Coupled Schrodinger system; Segregation; Vector solution; Distribution of bump; Energy expansion | POSITIVE SOLUTIONS; ELLIPTIC-EQUATIONS; VECTOR SOLUTIONS; BIFURCATION; EXISTENCE | Coupled Schrodinger system; Distribution of bump; Energy expansion; Segregation; Vector solution | English | 2023 | 2023-07-15 | 10.1016/j.jde.2023.03.044 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
○ | ○ | Article | Transmit Power Adaptation for D2D Communications Underlaying SWIPT-Based IoT Cellular Networks | Device-to-device (D2D) communications and simultaneous wireless information and power transfer (SWIPT) technologies are key to Internet of Things (IoT) to achieve massive connectivity and to prolong battery lifetime, respectively. In this article, we propose novel schemes for transmit power adaptation to maximize the average data rate and to minimize the outage probability of D2D communications over fast and slow-fading channels, respectively, where the D2D network coexists with a SWIPT-based IoT cellular network operating with the time-switching protocol. Also, different from the existing works, circuit power consumption for information decoding is taken into account in this article. To solve the formulated nonconvex power adaptation problems, we first derive tractable lower bound and upper bound on the average data rate and outage probability of cellular user (CU), respectively. Then, based on the conservative approximation, power adaptation solutions are determined. Intriguingly, we show that in the proposed schemes, the performance tradeoff between information decoding and energy harvesting at the CU is not degraded despite the reception of the D2D signals (i.e., interfering signals). Furthermore, deriving and analyzing closed-form bounds on the D2D performance, we obtain useful insights into the D2D performance improvement by the proposed power adaptation schemes. Numerical results demonstrate that the proposed schemes outperform the baseline scheme, and verify the obtained insights. | Lim, Dong-Woo; Chun, Chang-Jae; Kang, Jae-Mo | Elect & Telecommun Res Inst, Radio & Satellite Res Div, Daejeon 34129, South Korea; Sejong Univ, Dept Artificial Intelligence, Seoul 05006, South Korea; Kyungpook Natl Univ, Dept Artificial Intelligence, Daegu 41566, South Korea | ; Chun, Changjae/AAF-2393-2019 | 55694295300; 55694574800; 56024930400 | window0508@etri.re.kr;cjchun84@gmail.com;jmkang@knu.ac.kr; | IEEE INTERNET OF THINGS JOURNAL | IEEE INTERNET THINGS | 2327-4662 | 10 | 2 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.2 | 3.4 | 1.26 | 2025-06-25 | 8 | 11 | Device-to-device (D2D) communication; simultaneous wireless information and power transfer (SWIPT); transmit power adaptation | SIMULTANEOUS WIRELESS INFORMATION; TO-DEVICE COMMUNICATIONS; RESOURCE-ALLOCATION; REQUIREMENTS; ARCHITECTURE; CHALLENGES; VISION; DESIGN; 6G | Device-to-device (D2D) communication; simultaneous wireless information and power transfer (SWIPT); transmit power adaptation | Decoding; Energy harvesting; Energy transfer; Fading channels; Information management; Internet of things; Mobile telecommunication systems; Outages; Power control; Wireless networks; D2D communications; Device-to-device (D2D) communication; Device-to-Device communications; Fadings channels; Information and power transfers; Power systems reliability; Power-control; Resource management; Simultaneous wireless information and power transfer; Transmit power adaptations; Probability | English | 2023 | 2023-01-15 | 10.1109/jiot.2022.3206360 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||
○ | ○ | Article | A Tractable Approach to Coverage Analysis in Downlink Satellite Networks | Satellite networks are promising to provide ubiquitous and high-capacity global wireless connectivity. Traditionally, satellite networks are modeled by placing satellites on a grid of multiple circular orbit geometries. Such a network model, however, requires intricate system-level simulations to evaluate coverage performance, and analytical understanding of the satellite network is limited. Continuing the success of stochastic geometry in a tractable analysis for terrestrial networks, in this paper, we develop novel models that are tractable for the coverage analysis of satellite networks using stochastic geometry. By modeling the locations of satellites and users using Poisson point processes on the surfaces of concentric spheres, we characterize analytical expressions for the coverage probability of a typical downlink user as a function of relevant parameters, including path-loss exponent, satellite height, density, and Nakagami fading parameter. Then, we also derive a tight lower bound of the coverage probability in tractable expression while keeping full generality. Leveraging the derived expression, we identify the optimal density of satellites in terms of the height and the path-loss exponent. Our key finding is that the optimal average number of satellites decreases logarithmically with the satellite height to maximize the coverage performance. Simulation results verify the exactness of the derived expressions. | Park, Jeonghun; Choi, Jinseok; Lee, Namyoon | Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea; Ulsan Natl Inst Sci & Technol, Dept Elect Engn, Ulsan 44919, South Korea; Korea Univ, Sch Elect Engn, Seoul 02841, South Korea | Choi, Jinseok/AAL-6383-2020; Aldhahir, Naofal/HCH-5192-2022; Lee, Namyoon/ADH-9232-2022 | 57853652900; 57190581671; 35148128800 | jeonghun.park@knu.ac.kr;jinseokchoi@unist.ac.kr;namyoon@korea.ac.kr; | IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS | IEEE T WIREL COMMUN | 1536-1276 | 1558-2248 | 22 | 2 | SCIE | ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2023 | 8.9 | 3.5 | 6.38 | 2025-06-25 | 29 | 44 | Satellite networks; stochastic geometry; coverage probability | STOCHASTIC GEOMETRY; PERFORMANCE; LEO; INTERFERENCE; DESIGN | coverage probability; Satellite networks; stochastic geometry | Analytical models; Orbits; Random processes; Satellites; Stochastic models; Stochastic systems; Coverage analysis; Coverage probabilities; Downlink; High capacity; Low earth orbit satellites; Path loss exponent; Performance; Receiver; Satellite network; Stochastic geometry; Geometry | English | 2023 | 2023-02 | 10.1109/twc.2022.3198103 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |
○ | ○ | Article | Association between the use of statins and risk of interstitial lung disease/idiopathic pulmonary fibrosis: time-dependent analysis of population-based nationwide data | BackgroundWe aimed to study whether statin use is associated with lowering the development of interstitial lung disease (ILD) and idiopathic pulmonary fibrosis (IPF).MethodsThe study population was the Korean National Health Insurance Service-Health Screening Cohort. ILD and IPF cases were identified using diagnosis codes (J84.1 for ILD and J84.1A as a special code for IPF) based on the International Classification of Diseases, 10th Revision. The study participants were followed up from 1 January 2004 to 31 December 2015. Statin use was defined by the cumulative defined daily dose (cDDD) per 2-year interval and participants were categorised into never-users, <182.5, 182.5-365.0, 365.0-547.5 and & GT;547.5 by cDDD. A Cox regression was used to fit models with timedependent variables of statin use.ResultsIncidence rates for ILD with and without statin use were 20.0 and 44.8 per 100 000 person-years, respectively, and those for IPF were 15.6 and 19.3 per 100 000 person-years, respectively. The use of statins was independently associated with a lower incidence of ILD and IPF in a dose-response manner (p-values for trend <0.001). ILD showed respective adjusted hazard ratios (aHRs) of 1.02 (95% CI 0.87- 1.20), 0.60 (95% CI 0.47-0.77), 0.27 (95% CI 0.16-0.45) and 0.24 (95% CI 0.13-0.42) according to the increasing category of statin use compared with never-users. IPF showed respective aHRs of 1.29 (95% CI 1.07-1.57), 0.74 (95% CI 0.57-0.96), 0.40 (95% CI 0.25-0.64) and 0.21 (95% CI 0.11-0.41).ConclusionA population-based cohort analysis found that statin use is independently associated with a decreased risk of ILD and IPF in a dose-response manner. | Jang, Hye Jin; Lee, Dong Yoon; Loloci, Gjustina; Jeong, Jihyeon; Choi, Won-Il | Hanyang Univ, Myongji Hosp, Dept Internal Med, Seoul, Gyeonggi Do, South Korea; Kyungpook Natl Univ, Dept Stat, Daegu, South Korea | Lee, DongYoon/KFR-2934-2024; Jang, Hye Jin/IZE-4223-2023 | 57222352277; 57309281000; 56394529600; 57209972988; 7402516121 | choi_wi@hanmail.net; | EUROPEAN RESPIRATORY JOURNAL | EUR RESPIR J | 0903-1936 | 1399-3003 | 62 | 1 | SCIE | RESPIRATORY SYSTEM | 2023 | 17 | 3.5 | 2.54 | 2025-06-25 | 12 | 14 | ACUTE CORONARY SYNDROMES; CARDIOVASCULAR-DISEASE; PREVENTION; ATORVASTATIN; METAANALYSIS; INHIBITORS; SURVIVAL; OUTCOMES; THERAPY; TRIALS | Cohort Studies; Humans; Hydroxymethylglutaryl-CoA Reductase Inhibitors; Idiopathic Pulmonary Fibrosis; Incidence; Lung Diseases, Interstitial; cholesterol; hydroxymethylglutaryl coenzyme A reductase inhibitor; hydroxymethylglutaryl coenzyme A reductase inhibitor; adult; age; aged; Article; cardiovascular disease; cardiovascular risk; chemoprophylaxis; cholesterol blood level; cohort analysis; controlled study; current smoker; dose response; drug use; ex-smoker; female; fibrosing alveolitis; gender; human; incidence; interstitial lung disease; Korea; longitudinal study; major clinical study; male; population research; prevalence; protection; risk factor; risk reduction; complication; fibrosing alveolitis; interstitial lung disease | English | 2023 | 2023-07-01 | 10.1183/13993003.00291-2023 | 바로가기 | 바로가기 | 바로가기 | 바로가기 |
페이지 이동: