• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhou Junkai, Wang Nian, Cui Li. EasiLTOM: Signal Activity Interval Recognition Based on Local Dynamic Threshold[J]. Journal of Computer Research and Development, 2022, 59(4): 826-833. DOI: 10.7544/issn1000-1239.20200662
Citation: Zhou Junkai, Wang Nian, Cui Li. EasiLTOM: Signal Activity Interval Recognition Based on Local Dynamic Threshold[J]. Journal of Computer Research and Development, 2022, 59(4): 826-833. DOI: 10.7544/issn1000-1239.20200662

EasiLTOM: Signal Activity Interval Recognition Based on Local Dynamic Threshold

Funds: This work was supported by the National Natural Science Foundation of China (61672498).
More Information
  • Published Date: March 31, 2022
  • In many practical applications of the Internet of things, the original collected signal data contains a lot of noise, especially in motion-related scenes. It is necessary to accurately identify the start and end points of the effective signal activity area from the one-dimensional time series signal with a lot of noise to support the relevant analysis. Existing recognition methods based on dual threshold rules are very sensitive to noise. The presence of noise will cause the calculated recognition threshold to fail to match the original data of the non-noise segment, which leads to the recognition of random noise data as signal activity intervals or missed signal activity interval. Recognition methods based on machine learning and deep learning require a large amount of sample data. In IoT scenarios with a small sample size, the model will have underfitting problems, thereby reducing recognition accuracy. In order to accurately identify the signal activity interval in a one-dimensional time series signal with a lot of noise and a small amount of data, a signal activity interval recognition based on local dynamic threshold EasiLTOM is proposed. This method calculates the recognition threshold based on the local signal, and it uses the shortest signal length to filter noise spikes, which can avoid the influence of random noise on the recognition of signal activity intervals, solve the problems of missed detection and false detection, and improve the recognition accuracy. In addition, EasiLTOM requires a small amount of data, which is suitable for IoT scenarios with scarce data. In order to verify the effectiveness of EasiLTOM, this study collects surface EMG data of 14 people in 3 months, and conducts comparative experiments using two public data sets. The results show that EasiLTOM method can achieve an average recognition accuracy of 93.17% for the signal activity range, which is 15.03% and 4.70% higher than the existing dual threshold and machine learning methods, and has practical value in motion analysis related scenes.
  • Related Articles

    [1]Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang. Survey of Artificial Intelligence Based IoT Malware Detection[J]. Journal of Computer Research and Development, 2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    [2]Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun. Survey on Internet of Things Access Control Security[J]. Journal of Computer Research and Development, 2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
    [3]Du Ruizhong, Liu Yan, Tian Junfeng. An Access Control Method Using Smart Contract for Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    [4]Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei. Attribute-Based Encryption for Data Security Sharing of Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288
    [5]Su Mang, Cao Mengyuan, Xie Rongna, Fu Anmin. PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud[J]. Journal of Computer Research and Development, 2018, 55(7): 1479-1487. DOI: 10.7544/issn1000-1239.2018.20180056
    [6]Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng. Blockchain-Based Trust Management Framework for Distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073
    [7]Zhou Weiwei, Yu Bin. A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920
    [8]Li Wei, Ge Chenyu, Gu Dawu, Liao Linfeng, Gao Zhiyong, Guo Zheng, Liu Ya, Liu Zhiqiang, Shi Xiujin. Research on the LED Lightweight Cipher Against the Statistical Fault Analysis in Internet of Things[J]. Journal of Computer Research and Development, 2017, 54(10): 2205-2214. DOI: 10.7544/issn1000-1239.2017.20170437
    [9]Dong Xiaolei. Advances of Privacy Preservation in Internet of Things[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    [10]Kong Junjun, Guo Yao, Chen Xiangqun, and Shao Weizhong. An Approach to Building Systems and Applications of Internet of Things with Smart Things[J]. Journal of Computer Research and Development, 2013, 50(6): 1198-1209.
  • Cited by

    Periodical cited type(2)

    1. 刘海峰,徐丽丽,武堂颖. 无线传感器网络恶意信标干扰信号协同过滤方法. 传感技术学报. 2024(11): 1971-1975 .
    2. 崔莉,周钧锴,王念,肖京,季宇宣,姜美驰. 便携式非特异性腰痛测量系统研制. 中国医疗器械杂志. 2021(05): 473-478 .

    Other cited types(2)

Catalog

    Article views (234) PDF downloads (89) Cited by(4)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return