[go: up one dir, main page]

Next Article in Journal
Fast Depth Map Coding Algorithm for 3D-HEVC Based on Gradient Boosting Machine
Previous Article in Journal
Evaluating Multimodal Techniques for Predicting Visibility in the Atmosphere Using Satellite Images and Environmental Data
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Simple Siamese Model with Long Short-Term Memory for User Authentication with Field-Programmable Gate Arrays

Department of Electronic Engineering, College of IT Convergence Engineering, Chosun University, Gwangju 61452, Republic of Korea
Electronics 2024, 13(13), 2584; https://doi.org/10.3390/electronics13132584
Submission received: 14 May 2024 / Revised: 28 June 2024 / Accepted: 28 June 2024 / Published: 1 July 2024

Abstract

:
Recent studies have focused on user authentication methods that use biometric signals such as electrocardiogram (ECG) and photo-plethysmography (PPG). These authentication technologies have advantages such as ease of acquisition, strong security, and the capability for non-aware authentication. This study addresses user authentication using electromyogram (EMG) signals, which are particularly easy to acquire, can be fabricated in a wearable form such as a wristwatch, and are readily expandable with technologies such as human–machine interface. However, despite their potential, they often exhibit lower accuracy (approximately 90%) than traditional methods such as fingerprint recognition. Accuracy can be improved using complex algorithms and multiple biometric authentication technologies; however, complex algorithms use substantial hardware resources, making their application to wearable devices difficult. In this study, a simple Siamese model with long short-term memory (LSTM) (SSiamese-LSTM) is proposed to achieve a high accuracy of over 99% with limited resources suitable for wearable devices. The hardware implementation was accomplished using field-programmable gate arrays (FPGAs). In terms of accuracy, EMG measurement results from Chosun University were used, and data from 100 individuals were employed for verification. The proposed digital logic will be integrated with an EMG sensor in the form of a watch that can be used for user authentication.

1. Introduction

User authentication technology has been studied for many years and has a variety of applications. Representative examples include account access to financial services, secure access to networks and physical spaces in corporate environments, retail and payment systems, and smart home user identification [1,2,3]. User authentication technologies can be divided into the following categories. Knowledge-based authentication technology relies on information learned by the user, such as passwords, personal identification numbers (PINs), and security questions. Possession-based methods use a physical element owned by the user, such as a smart card, USB token, or smartphone. In such cases, there is a risk of loss. Biometric methods use an individual’s biological characteristics, including fingerprints, face, iris, vein patterns, and voice. These features are unique, secure, and easy to use, but they are relatively expensive to implement and maintain. Dynamic, secure code-based authentication uses a one-time password (OTP) that can be used only once and is often delivered through SMS, apps, or hardware tokens. This method is highly secure and can be implemented on various devices; however, it may also affect user convenience. Recent research trends have tended to adopt multi-authentication methods to strengthen security and provide convenience to users.
The key features of user authentication technology include security, convenience, and personal information protection. User authentication technologies must provide strong security to reliably verify the identity of a user and prevent unauthorized access. Security is linked to the accuracy of the authentication method, which is a crucial criterion for judging the quality of a specific authentication method and should be considered when evaluating the performance of user authentication technology. Security can be enhanced using secure algorithms, encryption technologies, multi-factor authentication, and biometrics. In addition, user authentication should provide a convenient and easy experience for users. Convenience can be improved through faster access, fewer clicks or inputs, and user-friendly interfaces. Finally, user authentication technology must adequately protect user privacy and provide transparency regarding the collected data. Based on these features, fingerprint recognition and passwords are mainly used in user authentication. The easiest and most accurate technology is fingerprint recognition, which has a recognition rate of 99%. However, fingerprint recognition has the disadvantage that the user must perform separate actions. Similarly, because passwords are composed of a combination of letters and numbers, there is always the possibility of hacking.
Recently, biometric signal-based user authentication methods, such as ECG, PPG, EMG, and electroencephalography (EEG), have been studied. Authentication using biometric signals is simple to acquire and enables user-unconscious authentication; therefore, it is a highly scalable technology that can overcome the shortcomings of traditional methods. Additionally, it can continuously acquire signals for user authentication and is highly secure. Since various bio-signals are generated unconsciously and each individual’s signals contain unique information, a high recognition rate can be obtained.
User authentication based on ECG signals is the most widely studied method [4,5,6]. There are three main applications: the authentication of patients in a hospital (HOS), the authentication of people at a building entrance (security check), and continuous authentication for personal usage (wearable device) [7]. In the proposed algorithm, a machine learning-based ECG authentication mechanism can be applied. Methods for implementing an embedded authentication system that considers user convenience have also been studied [8,9]. When tested on 90 individuals, the system achieved 99.54% accuracy for QRS complex identification [8]. However, the data represent results obtained only under stable conditions. When implemented on an Artix-7 FPGA, the entire design occupies 1712 slices (5%) and 978.7 KB of memory and dissipates 31.75 mW of total chip dynamic power. User authentication using PPG signals has also been proposed. Since PPG sensors can be attached to the wrist, much research is being conducted on wearable devices [10]. The proposed system can continuously authenticate users based on their cardiac characteristics with a high accuracy of over 90%. However, it is difficult to distinguish between users using PPGs; therefore, accuracy remains a considerable problem [11,12]. When using EEG signals, wearing a sensor to acquire the signals is inconvenient; however, its accuracy is high. The accuracy is significantly affected by the environmental conditions under which the EEG is acquired [13]. EEG signals offer a more secure biometric approach for user authentication [14]. The classification is based on an artificial neural network (ANN).
An authentication method using EMG signals has also been proposed; however, its accuracy remains at approximately 90% [15]. Compared to existing fingerprint recognition methods, much improvement is still needed for practical applications. However, EMG signals, similar to PPG signals, can be produced in the form of watches, making them suitable for wearable applications. Additionally, several EMG sensors have been developed for HMI applications. A representative example is the MYO armband developed by Thalmic Labs (Kitchener, ON, Canada). Using these armbands, EMG-based personal identification based on continuous wavelet transform (CWT) and convolutional neural networks (CNNs) showed that the identification accuracy could exceed 90% for 21 subjects [16].
However, in the case of EMG signals, the characteristic points of each user are extremely small compared to those of other biological signals; therefore, accuracy becomes a crucial factor in the field of user authentication [17,18]. Additionally, signals obtained from the same person tend to vary based on muscle fatigue and measurement conditions. This variation results in a decline in the certification rate, making practical application difficult. To address this issue, complex algorithms and multiple biometric authentication technologies have been proposed; however, these complex algorithms tend to be hardware-intensive [19]. Moreover, when calculations are performed on a server system, security vulnerabilities arise due to transmission time and the risk of hacking during the transmission process. Consequently, interest in on-device artificial intelligence (AI) has recently increased, leading to the development and utilization of processing units (PUs) designed for AI [20,21,22,23,24]. The focus of this study is on the characteristics of an authentication system that includes the development of a wearable device using an EMG sensor and direct authentication through an on-device neural network implemented on an edge device.
From a hardware deployment perspective, AI hardware is largely divided into microcontroller unit (MCU)-based acceleration and digital accelerators. Representative examples of MCU-based acceleration include Hello Edge, which focuses on keyword spotting, and IoTNet [21]. In this case, the number of calculations was approximately 40 mega floating-point operations (MFLOPs). The MCU performs sequential operations according to instruction sets; therefore, it requires a long time to execute. In contrast, digital accelerators, including FPGAs, can perform parallel operations, making them suitable for high-speed operations. FPGA-based deep learning accelerators generally exhibit a calculation capacity above 50 giga floating-point operations (GFLOPs). However, since an FPGA is a hardware implementation, it has limited resources for network configuration. To address this constraint, the network size must be reduced while maintaining accuracy [25].
In this study, a hardware structure that uses fewer resources to enable the production of wearable devices is proposed. It maintains an accuracy above 99% by applying an innovative optimization algorithm. First, to effectively extract the features of EMG signals, various time analysis and time-frequency analysis methods were compared. Based on this comparison, the empirical mode decomposition (EMD) method was selected and applied. Next, for classification, a neural network was used, incorporating both the Siamese model and the LSTM model. The Siamese model can easily categorize differences during the recognition process. It consists of twin CNNs to perform feature extraction. In the case of CNNs, hardware usage is minimized by using a simple structure for approximate feature extraction. While most Siamese models use 4 to 10 CNN layers to achieve high accuracy, this study employs only 2 CNN layers [26]. Errors that occur in a simple Siamese model can be precisely classified using the LSTM. The LSTM contributes to improving accuracy by efficiently distinguishing between content that should be retained for a long time and content that is less important. The overall structure is called the SSiamese-LSTM, which emphasizes the simple Siamese structure. For the network proposed in this study, the hardware resource requirements are analyzed using an FPGA. For accuracy evaluation, EMG measurement results from Chosun University were used, and data from 100 individuals were compared. Thus, a high-accuracy AI system using SSiamese-LSTM for user authentication can be developed for edge devices. This system will be integrated with the proposed EMG sensor in the form of a watch and used for user authentication.
Section 2 discusses the EMG signal acquisition method for the user authentication system. Section 3 provides an in-depth exploration of the SSiamese-LSTM network. Section 4 presents the testing and analysis results of the network discussed in Section 3. Section 5 presents the overall hardware structure and the verification process using high-level synthesis (HLS) for hardware deployment. Finally, Section 6 presents the conclusions, discussions, and future research directions.

2. Signal Acquisition

2.1. Chosun University’s EMG Dataset

The wearable wristwatch-type EMG sensor requires several verifications. A dataset for user authentication was first compiled using the commercial equipment MP160 from BIOPAC systems in Goleta, CA, USA (“Chosun University’s EMG dataset”) [27]. The dataset provides EMG signals from the palmaris longus and extensor digitorum of the right arm of 100 subjects, with an average age of 24 years (ranging from 19 to 70 years). A dataset of 12 movements was constructed for user authentication, and in this paper, user authentication is performed using only the representative fist-clenching movement. The measured results encompassed both stable and unstable conditions following the exercise. The EMG signal was sampled at a rate of 2000 Hz, generating a total of 8000 data points over 4 s, with the first clenching repeated twice in each 4 s interval. Of the EMG dataset of 100 individuals, 80 were used for the learning phase, and 20 were used for testing. EMG signals from the same person were categorized as class 1, whereas EMG signals from different individuals were classified as class 0. Three types of features can be extracted from EMG signals: time domain, frequency domain, and time–frequency domain features [17]. The time domain feature is an easy method for EMG signal analysis because of the small number of calculations required. Frequently used features include the mean absolute value (MAV), variance (VAR), root mean square (RMS), and number of zero crossings (NZCs).
M A V = 1 N i = 1 N | X i |
V A R = 1 N i = 1 N ( X i X ¯ ) 2
R M S = 1 N i = 1 N X i 2
N Z C = i = 1 N 1 s g n X i × X i + 1 X i X i + 1 T
s g n x = 1 ,   i f   x < 0 ,     0 ,   o t h e r w i s e .
Table 1 presents the EMG signal analysis measured for classes 0 and 1. This shows that in the case of the time domain analysis of EMG signals, there is little difference between users, and even the same user exhibits different characteristics based on the measurement time.
This is because the EMG signal converts the movements of various muscles into electrical signals, and unlike fingerprints, there is little difference between users. Since this study focuses on accurate user authentication, time–frequency domain features are more helpful, even if they require a slightly increased amount of computation. Notably, when using time domain analysis, an accuracy of approximately 86% was achieved in user authentication.

2.2. Feature Extraction for Time-Frequency Domain

The time–frequency domain features are used to analyze the characteristics of the EMG signal accurately. These features essentially employ filters to classify the similarity of each frequency component, enabling simultaneous time and frequency analysis. The representative methods for the time–frequency domain are continuous wavelet transform (CWT) and EMD [28,29,30,31].
In CWT, scaling and shifting are continuous; that is, they operate as continuous variables in the process of applying wavelets. Therefore, it can be mathematically expressed using the following formula:
X w a , b = 1 | a | 1 / 2 x ( t ) φ ¯ ( t b a ) d t ,
where a is the scale factor and b is the shift factor. Since they are continuous, the original signals can scale and shift into infinite wavelets. CWT results are often used for spectrograms. In contrast, in discrete wavelet transform (DWT), a and b are discrete values. a moves in multiples of two and b is expressed as an increasing integer. CWT provides more accurate results for time–frequency domain analysis but uses more hardware resources for computation compared to DWT. CWT can use various types of wavelets, such as the Morlet wavelet, Mexican Hat wavelet, Gaussian wavelet, Daubechies wavelet, and Haar wavelet.
EMD is a technique for decomposing nonlinear and nonstationary time series data into intrinsic mode functions (IMFs), which constitute the characteristic elements of a time series. Unlike the traditional filter-bank method, the EMD calculates the IMFs based on the unique oscillation structure of the signal without limiting the frequency bands.
The sifting process is the core of the EMD algorithm, where each IMF can be extracted from the original signal. In this process, all the local maxima and minima of the signal are identified and connected to form the upper and lower envelopes, respectively. The mean of the two envelopes is the local mean. Subtracting this local mean from the original signal results in an oscillatory component called the IMF.
After extracting all the IMFs, the residual component is obtained by subtracting the sum of all the IMFs from the original signal. Therefore, the original signal can be represented as follows:
x t = i = 1 n I M F i + r e s i d u a l .
Both the DWT and EMD methods are suitable for time series data, but in cases with large signal changes, such as EMG signals, the EMD method, which can derive its own oscillatory component, is more advantageous in increasing accuracy. When using the same neural network, the EMD method brought about an accuracy improvement of approximately 1% to 2% compared to the DWT method. On the other hand, while DWT is simpler to implement in hardware using digital logic, such as a finite impulse response (FIR) filter, implementing EMD on hardware is complex as it requires additional memory for signal processing [32]. In this study, the EMD method was adopted owing to its accuracy. When applying EMD, n is set to 4, and the residual signal is used for user authentication. This EMD method can provide more information than time domain analysis. Figure 1 presents a comparison of the original signal, IMF1, and IMF4 obtained using the EMD method in class 0. Thus, even if the original signals appear similar in the time domain, the oscillatory component of the EMD signal can be separated, helping to classify it more clearly as another person’s EMG signal.

3. SSiamese-LSTM Network

3.1. SSiamese Network

Siamese neural networks incorporate two inputs with identical weights and structures into an ANN. The output of each neural network measures the Euclidean distance to predict the similarity or difference between the two inputs. Thus, Siamese neural networks can learn even with small amounts of data and represent a notable example of few-shot learning. This method is well-suited for user authentication using EMG datasets, where data acquisition is limited. Consequently, even in noisy measurement environments, achieving relatively high accuracy in user authentication becomes feasible with new data. Moreover, a Siamese neural network can transform input data into embeddings, facilitating efficient feature extraction. These characteristics suggest that a Siamese network can enhance the accuracy of user authentication systems utilizing EMG signals. However, since the embedding process using Siamese networks necessitates multiple CNNs or dense neural networks (DNNs), considerable hardware resources are required for implementation. In this study, while maintaining the structure using the Siamese network, hardware resources were minimized. A simple Siamese model was proposed to elucidate this effect. Each layer utilizes only 2 one-dimensional CNN layers to streamline the embedding process, whereas most Siamese models employ 4 to 10 CNN layers to achieve high accuracy. Given that the CNN layer entails substantial computation, simplifying its structure is imperative for wearable applications. Figure 2 illustrates the proposed SSiamese neural networks for user authentication.
The activation function for the 1-dimensional CNN layers is rectified linear unit (ReLU), and padding is not utilized. The kernel for the CNN layer employs L1 regularization with a parameter of 0.001. A max-pooling layer is added to effectively reduce the number of features. Following computations, resulting feature values are transformed into distances for each feature using a merge layer, where smaller distances correspond to values closer to class 1. These distances are derived using fundamental Euclidean distance calculations. Optimization is conducted using the Keras Tuner and the Bayesian optimization method. Hyperparameters, such as the number of filters in the CNN layers, are selected, and the Bayesian method is employed to efficiently utilize information from the previous steps, aiming to find the optimal solution that maximizes accuracy.

3.2. LSTM

Achieving a user authentication accuracy of over 99% using only the SSiamese method with limited hardware resources is challenging. To address this limitation, an LSTM structure was incorporated for user authentication. The LSTM method employs a shallow layer depth to minimize the computational load. LSTM belongs to the family of recurrent neural networks (RNNs), which are renowned for their effectiveness in processing and modeling sequential data such as sentences, speech, and time series. RNNs leverage internal states to retain information from previous steps, allowing the model to store and utilize contextual information across the entire observed sequence. Additionally, RNNs can share weights equally for each element in a sequence, reducing the number of model parameters and enhancing training efficiency. However, RNNs encounter difficulties in capturing long-term dependencies and may experience issues like gradient loss or runaway. Variants, such as LSTM and the gated recurrent unit (GRU), have been developed as alternatives.
Compared to RNNs, LSTMs more effectively capture long-term dependencies and mitigate the vanishing gradient problem [33]. LSTMs are capable of retaining information for extended periods in long sequences, making them particularly valuable for processing long time series data or lengthy sentences. The following is a simple schematic of the LSTM blocks (Figure 3).
LSTM plays the role of preserving information over extended periods through the cell state (Ct-1, Ct). Here, xt and ht represent the input and output, respectively. The forget gate layer determines which information to discard from the previous cell state. The input gate layer determines which information from the current input is stored in the cell state. The output gate layer determines the subsequent output state based on the current cell state, generating a new output state by considering the previous output state and current input. In this study, only 28 LSTM hidden layers are utilized to minimize hardware resources. Classification is performed with each hidden output. Two dense layers are employed for the final user authentication, with the sigmoid function serving as the activation function for the dense layers.

3.3. Overall Network

A simple Siamese model with LSTM (SSiamese-LSTM) was implemented using Keras. Keras is a powerful, user-friendly, high-level deep learning library for building and training deep learning models. It provides a concise and intuitive interface to help users easily construct deep learning models. Moreover, Keras is modular, making it straightforward to incorporate new layers, loss functions, and optimization algorithms. In the case of the Siamese model, the focus is on embedding with a small number of layers, as it utilizes CNN layers, while for the LSTM model, the emphasis is on minimizing the number of hidden layers and maximizing accuracy. Two dense layers were utilized for the final classification. Table 2 shows the model structure implemented in Keras and the number of parameters in each layer.
The total number of parameters is 17,268, of which 17,076 are trainable. A small number of weights and biases implies less memory usage, which is essential for minimizing hardware resource consumption. Approximately 60% of the weight parameters are used for the CNN layers, and approximately 34% are used for the LSTM layer.

4. Testing and Analysis Results of the Proposed SSiamese-LSTM Network

The training dataset consisted of EMG data from 80 individuals. Additionally, the learning process utilized validation data comprising 25% of the total training data. In this case, categorical cross-entropy for the two classes was used as the loss function for training. These two classes were separated using one-hot encoding, which converts categorical variables into binary vectors. An adaptive moment estimation (Adam) optimizer with an adaptive gradient algorithm (AdaGrad) was used in the learning process. The batch size, an important hyperparameter for the learning process, was determined to be 512 after optimization.
The parameters are updated through the learning process, and the accuracy, recall, and precision of user authentication applications can be calculated. These evaluation indicators can be derived using true positive (TP), true negative (TN), false positive (FP), and false negative (FN) values [34]. In this paper, cases where the same individual is recognized are assumed to be “positive”.
A c c u r a c y = T P + T N T P + T N + F P + F N
R e c a l l = T P T P + F N
P r e c i s i o n = T P T P + F P
Using these parameters, the F1 score, which is often used for comparisons between neural networks, is defined as follows:
F 1   s c o r e = 2 × P r e c i s i o n × R e c a l l P r e c i s i o n + R e c a l l .
The accuracy of the training data, including the validation data, was approximately 99.17%, while the recall of the training data was approximately 100%. The precision of the training data, including the validation data, was approximately 98.4%. This analysis was performed based on actual measured EMG data from 80 individuals of various age groups. The F1 score, a crucial metric for assessment, was calculated to be approximately 0.992. Figure 4 depicts the confusion matrix, showing the relationship between the values predicted by the model (x-axis) and those observed (y-axis). Figure 5 shows the receiver operating characteristic (ROC) curve. The x-axis of the ROC curve represents the false positive rate (FPR), and the y-axis represents the true positive rate (TPR). The area under the ROC curve, known as the area under the curve (AUC), is used to evaluate the overall classification performance of the model. The AUC value for this model is 1, indicating excellent performance.
These results show extremely high accuracy compared to previous results for user authentication using biometric signals, and the comparison is summarized in Table 3 [35,36,37]. Although direct comparison is challenging due to the variety of biometric signals, the differing number of acquisition channels, the diverse signal interpretation methods, and the different neural network models used, the proposed method achieved higher accuracy compared to existing methods. This outcome holds significance as it was accomplished with limited hardware resources and approaches the accuracy levels of commercial systems. This is particularly noteworthy as it relies on EMG data collected across diverse environmental conditions. Additionally, using the same or similar datasets with different neural networks resulted in accuracies of 92.5% [38], 94% [25], and 94.35% [39], respectively, demonstrating that the proposed network has relatively higher accuracy.
To ensure high accuracy in user authentication using EMG signals, a time–frequency domain analysis was performed using the EMD method, and embedding was carried out using a simple Siamese model. Classification was then performed using an LSTM model, emphasizing the key parts to remember. Additionally, the goal is to minimize hardware resources for wearable applications. A user authentication system suitable for wearable devices ensures high accuracy and can be utilized in applications such as access control for doors, system logins, and financial transactions. In this context, a multimodal method would help ensure 100% accuracy; however, this requires additional hardware resources. To address this challenge more easily, it can be beneficial to repeat the user’s actions or reduce the number of users for authentication.
Based on this learned model, an accuracy analysis was performed using a completely new EMG dataset of 20 individuals. In this case, because a simple Siamese structure and an additional LSTM model are used, the adaptability to new data is relatively poor compared with the basic Siamese model. The accuracy, recall, and precision for the 20 participants are 86.3%, 80%, and 91.5%, respectively. The F1 score for the 20 individuals was calculated to be approximately 0.854. When applying to an actual wearable device, the hardware needs to be configured using an existing model, and the learned parameters are transmitted and used. In this case, fine-tuning for each user is performed separately to ensure individualization and higher accuracy. Fine-tuning is the process of adjusting the weights of a pre-trained model to enhance its performance on a specific task or dataset. Therefore, fine-tuning enables achieving high accuracy even with a short learning process. The results of fine-tuning with the existing learning parameters are as follows: the accuracy, recall, and precision for the 20 individuals after fine-tuning are 99.4%, 100%, and 98.8%, respectively. The F1 score after fine-tuning is 0.994. These results demonstrate that the proposed neural networks can be easily applied to new users and that accuracy is further improved when fine-tuning is applied. From a security perspective, personalized models such as these are desirable.

5. Hardware Deployment

On-device AI systems refer to technologies that run AI models directly on the device itself. Unlike cloud-based AI systems, these systems operate without sending data to external servers. On-device AI systems do not transmit the user’s data externally but process the data on the device itself, thereby protecting privacy. This reduces the risk of personal information infringement by avoiding the exposure of users’ sensitive data to external entities.
Additionally, cloud-based AI systems transmit data to external servers for processing and then report the results back to the device, which may cause delays due to the data transfer time. In contrast, on-device AI systems execute models directly on the device, significantly reducing latency. Furthermore, on-device AI systems can execute models even when they are not connected to a network, reducing network dependency.
Finally, on-device AI systems are more energy-efficient than cloud-based systems. Because data are processed on the device, the bandwidth load for data transmission is reduced, which can lower energy consumption and promote environmental friendliness. Due to these advantages, the market for on-device AI is expanding.
The hardware used to implement on-device AI primarily consists of mobile devices or embedded systems. Typical mobile processors such as Qualcomm’s Snapdragon, Graphics Processing Units (GPUs), Neural Processing Units (NPUs), or AI accelerators are used for mobile devices. In the case of embedded systems, certain types use application-specific integrated circuits (ASICs), digital signal processors (DSPs), and FPGAs. Hardware for on-device AI primarily aims at achieving low power consumption and low latency. For mobile devices, battery life and thermal management must also be considered.
In this study, an FPGA was employed to implement on-device AI. When compared to a GPU, an FPGA offers several advantages. Firstly, while the GPU relies on instruction-based operations, leading to longer execution times, the FPGA allows for parallel computation, thus reducing latency. Additionally, the FPGA enables a reduction in the number of computations, resulting in a significant decrease in power consumption. Lastly, on-device AI implemented with an FPGA can be readily transitioned to digital-based ASICs, offering further cost advantages.
Hardware deployment using an FPGA is conducted through high-level synthesis (HLS). HLS offers a high-level abstraction for hardware design, enabling software engineers to design hardware effectively. This is particularly beneficial when engineers need to convert software-containing complex algorithms, such as deep learning models, into hardware. Initially, the software code is written in a high-level language (e.g., C, C++), typically describing the algorithm’s behavior and utilizing abstract data structures. Subsequently, HLS tools convert the high-level source code into the Verilog hardware description language (HDL) for hardware design. Within Verilog HDL, the network is transformed into digital logic components such as NAND gates, NOR gates, etc., through synthesis. While writing extensive logic directly in Verilog HDL can be time-consuming, HLS significantly reduces hardware development time and enhances user convenience [40]. The SSiamese-LSTM network, initially implemented using Keras, can be translated into digital logic using HLS for hardware deployment.
For further convenience in neural network design, high-level synthesis for machine learning (hls4ml) simplifies hardware deployment by configuring and combining basic utilities corresponding to each layer, such as 1-dimensional convolutional, batch normalization, max-pooling, and LSTM layers [41]. Other hardware implementation methods with automatic generation include Vivado SDAccel and the NVIDIA deep learning accelerator (NVDLA), where the core directly converts a neural network written in Caffe or similar frameworks into a register-transfer level (RTL) [42]. In this paper, hls4ml served as the primary hardware deployment method.
First, in the hardware deployment, the 32-bit floating-point numbers implemented in Keras are converted to fixed-point numbers for high computational accuracy and efficiency. In this case, although quantized Keras (QKeras) could assist with quantization, it was not considered in this paper due to potential accuracy degradation. The syntax for fixed-point numbers is “ap_fixed<9,4>” with a sign bit. In this case, “9” denotes the total number of bits used, and “4” represents the number of bits in the integer part, including the sign bit. Bit precision directly affects accuracy and hardware resource usage. The objective of this study is to achieve high accuracy; thus, high-bit precision is employed for hardware deployment. Through numerical profiling, hardware deployment is performed using “ap_fixes<33,8>”. Figure 6 illustrates the bit precision of the parameters used in each layer by Keras and the bit precision of the implemented hardware.
For hardware deployment, the additional components required from hls4ml are the optimization strategy and reuse factor. The optimization strategy includes “latency” for reducing response time and “resource” for minimizing hardware usage. For FPGA implementation, the resource optimization strategy is chosen. The reuse factor implies that the same hardware is used for multiple calculations. A high reuse factor is detrimental to latency; however, it is an effective way to reduce hardware resource usage. Excessive reuse factors may increase memory usage and require caution. In this study, the reuse factor was set to 300 through various comparisons. Additionally, for the merged layers where no defined reuse factor exists, it is added and utilized accordingly.
For the FPGA chipset, “xcku5p-ffva676-3-e” was chosen due to its relatively abundant internal memory. The proposed neural network architecture comprises configuring units for each layer and driving them in block form, which involves the heavy use of first-in-first-out buffers (FIFOs). Both the CNN and LSTM layers require significant memory usage due to their behavioral characteristics. In an FPGA, the internal memory is divided into relatively small-sized block random access memory (BRAM) and relatively large-sized ultra RAM (URAM).
The accuracy, recall, and precision of the implemented hardware for the EMG data from 80 individuals are approximately 99%, 100%, and 98.1%, respectively. The F1 score is approximately 0.99. The decrease in the F1 score through hardware implementation was approximately 0.002, which is an exceedingly small value. Table 4 shows the device utilization for the FPGA chipset “xcku5p-ffva676-3-e”.
The implemented device utilization indicates that a significant amount of BRAM memory is consumed due to the use of FIFOs to connect many layers and buffers for storing intermediate results of the CNNs and LSTMs. To optimize this, #pragma-based methods provided by HLS for efficient hardware implementation should be utilized. For FIFOs, data packing can be applied using the syntax “#pragma HLS DATA_PACK variable=a”. Data packing is a technique that can reduce overall memory usage and improve processing speed by mapping data types to appropriately sized bundles of registers. Secondly, for CNNs and LSTMs, the hardware can be implemented to force the use of URAM instead of BRAM by using the syntax “#pragma HLS RESOURCE variable=a core=RAM_S2P_URAM” to store intermediate calculation values. This method forcibly allocates resources to the URAM, enabling memory optimization. The final device utilization results are presented in Table 5. Thus, it can be confirmed that the proposed SSiamese-LSTM model can be implemented in an FPGA through the redistribution of resources.
In the case of hardware deployment, such as in the proposed structure, the operation speed is as follows: when using a high-performance Intel Core i7-7700HQ CPU, it takes approximately 2.5 ms to process one data point. In contrast, the proposed structure takes approximately 7 ms. In the case of the proposed hardware, the computation speed is slightly slower due to the use of limited resources. However, real-time user authentication is possible using the proposed hardware because there is no need to transmit data to a separate server.
For the gate count, when finally implemented in IC form, “yosys” is used to perform the gate count based on a 2-input NAND gate [43]. Yosys is an open-source hardware synthesis tool used to synthesize and optimize digital circuits written in Verilog, VHDL, and other hardware description languages. It facilitates the preparation of physical implementations by mapping designs to ASIC technology. Accordingly, the total number of gates is synthesized to 4,969,698 NAND gates. This represents a medium-sized AI system and is of a size that can be applied to wearable devices. For example, assuming that the size of a 2-input NAND gate is 6 µm2 based on 90 nm technology, this indicates that an IC can be manufactured with a size of 30 mm2. Figure 7 shows a schematic diagram of a user authentication system configured in the form of a wearable watch using the proposed SSiamese-LSTM structure, including an EMG sensor, analog-to-digital converter (ADC), and neural networks implemented with digital logic (single printed circuit board (PCB)).

6. Conclusions and Discussions

In conclusion, this study explores user authentication using EMG signals, focusing on their ease of acquisition and potential for wearable applications such as wristwatches. Despite the advantages of EMG, its reported accuracy is approximately 90%, which is inferior to traditional methods such as fingerprint recognition. To address the relatively lower accuracy of EMG signals compared to traditional methods like fingerprint recognition, novel approaches such as EMD feature extraction for time–frequency domain analysis and the SSiamese-LSTM model were introduced. The proposed neural network effectively combines the strengths of the Siamese model for efficient embedding and the LSTM model to improve classification.
The primary goal of this study was to reduce hardware resource consumption while maintaining high accuracy, making the system suitable for wearable devices. The proposed network structure, optimized using Keras, was validated with EMG data from 100 individuals collected from Chosun University. The model achieved an accuracy of 99.17%, a recall of 100%, a precision of 98.4%, and an F1 score of 0.992 while maintaining low resource requirements suitable for wearable devices implemented via FPGAs.
Maintaining accuracy and managing memory efficiently are essential for FPGA implementation. The model was implemented on the “xcku5p-ffva676-3-e” FPGA chipset through various optimizations. The obtained accuracy was 99%, which is almost identical to that of the Keras implementation. In terms of hardware implementation, the system demonstrated a latency of 7 ms per data processing, confirming that real-time user authentication is possible. The optimized neural network can be implemented on an FPGA for edge devices and easily converted to digital logic. Additionally, when manufacturing the proposed neural network as an IC, 4,969,698 2-input NAND gates are used, creating a medium-sized AI system. Using a 90 nm process, it can be manufactured in 30 mm2.
The proposed research has several advantages, including high accuracy, low resource requirements, and suitability for real-time user authentication on wearable devices. However, it also has some limitations, such as slightly slower processing speed due to limited resources and the need for further integration and optimization for practical applications.
Future work will focus on integrating the entire circuit into hardware, including the fabricated EMG sensor and the proposed SSiamese-LSTM model, within a single PCB system. The goal is to produce the system in the form of a wearable watch. Addressing the current limitations, such as optimizing processing speed and further reducing resource consumption, will be critical in enhancing user authentication systems for various applications.

Funding

This study was supported by a research fund from Chosun University (2023).

Data Availability Statement

The data supporting the findings of this study are available in reference [27].

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Al-Janah, S.; Zhang, N.; Siok, W.; Tay, S.W. A survey on smart home authentication: Toward secure, multi-level and interaction-based identification. IEEE Access 2021, 9, 130914–130927. [Google Scholar] [CrossRef]
  2. Wang, F.; Yang, N.; Shakeel, P.M.; Saravanan, V. Machine learning for mobile network payment security evaluation system. Trans. Emerg. Tel. Tech. 2021, 35, e4226. [Google Scholar] [CrossRef]
  3. Ali, Z.; Chaudhry, S.A.; Ramzan, M.S.; Al-Turjman, F. Securing smart city surveillance: A lightweight authentication mechanism for unmanned vehicles. IEEE Access 2020, 8, 43711–43724. [Google Scholar] [CrossRef]
  4. Chamatidis, I.; Katsika, A.; Spathoulas, G. Using deep learning neural networks for ECG based authentication. In Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, 23–26 October 2017; pp. 1–6. [Google Scholar]
  5. Ingale, M.; Cordeiro, R.; Thentu, S.; Park, Y.; Karimian, N. ECG biometric authentication: A comparative analysis. IEEE Access 2020, 8, 117853–117866. [Google Scholar] [CrossRef]
  6. Uwaechia, A.N.; Ramli, D.A. A comprehensive survey on ECG signals as new biometric modality for human authentication: Recent advances and future challenges. IEEE Access 2021, 9, 97760–97802. [Google Scholar] [CrossRef]
  7. Kim, S.-K.; Yeun, C.Y.; Damiani, E.; Lo, N.-W. A machine learning framework for biometric authentication using electrocardiogram. IEEE Access 2019, 7, 94858–94868. [Google Scholar] [CrossRef]
  8. Page, A.; Kulkarni, A.; Mohsenin, T. Utilizing deep neural nets for an embedded ECG-based biometric authentication system. In Proceedings of the 2015 IEEE Biomedical Circuits and Systems Conference (BioCAS), Atlanta, GA, USA, 22–24 October 2015; pp. 1–4. [Google Scholar]
  9. Arteaga-Falconi, J.S.; Al-Osman, H.; El-Saddik, A. ECG authentication for mobile devices. IEEE Trans. Instrum. Meas. 2015, 65, 591–600. [Google Scholar] [CrossRef]
  10. Zhao, T.; Wang, Y.; Liu, J.; Chen, Y.; Cheng, J.; Yu, J. Trueheart: Continuous authentication on wrist-worn wearables using ppg-based biometrics. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications, Toronto, ON, Canada, 6–9 July 2020; pp. 30–39. [Google Scholar]
  11. Lee, S.W.; Woo, D.K.; Son, Y.K.; Mah, P.S. Wearable bio-signal (PPG)-based personal authentication method using random forest and period setting considering the feature of PPG Signals. J. Comput. 2019, 14, 283–294. [Google Scholar] [CrossRef]
  12. Hwang, D.Y.; Hatzinakos, D. PPG-based personalized verification system. In Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE), Edmonton, AB, Canada, 5–8 May 2019; pp. 1–4. [Google Scholar]
  13. Fidas, C.A.; Lyras, D. A review of EEG-based user authentication: Trends and future research directions. IEEE Access 2023, 11, 22917–22934. [Google Scholar] [CrossRef]
  14. Gui, Q.; Jin, Z.; Xu, W. Exploring EEG-based biometrics for user identification and authentication. In Proceedings of the 2014 IEEE Signal Processing in Medicine and Biology Symposium (SPMB), Philadelphia, PA, USA, 13 December 2014; pp. 1–6. [Google Scholar]
  15. Shin, S.; Kang, M.; Jung, J.; Kim, Y.T. Development of miniaturized wearable wristband type surface EMG measurement system for biometric authentication. Electronics 2021, 10, 923. [Google Scholar] [CrossRef]
  16. Lu, L.; Mao, J.; Wang, W.; Ding, G.; Zhang, Z. A study of personal recognition method based on EMG signal. IEEE Trans. Biomed. Circuits Syst. 2020, 14, 681–691. [Google Scholar] [CrossRef] [PubMed]
  17. Li, Q.; Dong, P.; Zheng, J. Enhancing the security of pattern unlock with surface EMG-based biometrics. Appl. Sci. 2020, 10, 541. [Google Scholar] [CrossRef]
  18. Fan, B.; Liu, X.; Su, X.; Hui, P.; Niu, J. Emgauth: An emg-based smartphone unlocking system using siamese network. In Proceedings of the 2020 IEEE International Conference on Pervasive Computing and Communications (PerCom), Austin, TX, USA, 23–27 March 2020; pp. 1–10. [Google Scholar]
  19. Lu, L.; Mao, J.; Wang, W.; Ding, G.; Zhang, Z. An EMG-based personal identification method using continuous wavelet transform and convolutional neural networks. In Proceedings of the 2019 IEEE Biomedical Circuits and Systems Conference (BioCAS), Nara, Japan, 17–19 October 2019; pp. 1–4. [Google Scholar]
  20. Zhou, Q.; Qu, Z.; Guo, S.; Luo, B.; Guo, J.; Xu, Z.; Akerkar, R. On-device learning systems for edge intelligence: A software and hardware synergy perspective. IEEE Internet Things J. 2021, 8, 11916–11934. [Google Scholar] [CrossRef]
  21. Mazumder, A.N.; Meng, J.; Rashid, H.A.; Kallakuri, U.; Zhang, X.; Seo, J.S.; Mohsenin, T. A survey on the optimization of neural network accelerators for micro-ai on-device inference. IEEE J. Emerg. Sel. Top. Circuits Syst. 2021, 11, 532–547. [Google Scholar] [CrossRef]
  22. Kang, S.; Park, G.; Kim, S.; Kim, S.; Han, D.; Yoo, H.J. An overview of sparsity exploitation in CNNs for on-device intelligence with software-hardware cross-layer optimizations. IEEE J. Emerg. Sel. Top. Circuits Syst. 2021, 11, 634–648. [Google Scholar] [CrossRef]
  23. Chang, Z.; Liu, S.; Xiong, X.; Cai, Z.; Tu, G. A survey of recent advances in edge-computing-powered artificial intelligence of things. IEEE Internet Things J. 2021, 8, 13849–13875. [Google Scholar] [CrossRef]
  24. Wang, T.; Wang, C.; Zhou, X.; Chen, H. An overview of FPGA based deep learning accelerators: Challenges and opportunities. In Proceedings of the 2019 IEEE 21st International Conference on High Performance Computing and Communications (HPCC), Zhangjiajie, China, 10–12 August 2019; pp. 1674–1681. [Google Scholar]
  25. Choi, H.S. Siamese Neural Network for User Authentication in Field-Programmable Gate Arrays (FPGAs) for Wearable Applications. Electronics 2023, 12, 4030. [Google Scholar] [CrossRef]
  26. Xiao, W.; Ding, Y. A Two-Stage Siamese Network Model for Offline Handwritten Signature Verification. Symmetry 2022, 14, 1216. [Google Scholar] [CrossRef]
  27. Kim, J.S.; Song, C.H.; Bak, E.; Pan, S.B. Multi-Session Surface Electromyogram Signal Database for Personal Identification. Sustainability 2022, 14, 5739. [Google Scholar] [CrossRef]
  28. Gupta, V.; Mittal, M.; Mittal, V.; Gupta, A. ECG signal analysis using CWT, spectrogram and autoregressive technique. Iran J. Comput. Sci. 2021, 4, 265–280. [Google Scholar] [CrossRef]
  29. Rahul, J.; Sora, M.; Sharma, L.D. An overview on biomedical signal analysis. Int. J. Recent Technol. Eng. 2019, 7, 206–209. [Google Scholar]
  30. Yochum, M.; Renaud, C.; Jacquir, S. Automatic detection of P, QRS and T patterns in 12 leads ECG signal based on CWT. Biomed. Signal Process. Control 2016, 25, 46–52. [Google Scholar] [CrossRef]
  31. Carvalho, V.R.; Moraes, M.F.; Braga, A.P.; Mendes, E.M. Evaluating five different adaptive decomposition methods for EEG signal seizure detection and classification. Biomed. Signal Process. Control 2020, 62, 102073. [Google Scholar] [CrossRef]
  32. Das, K.; Nath, D.; Pradhan, S.N. FPGA and ASIC realisation of EMD algorithm for real-time signal processing. IET Circuits Devices Syst. 2020, 14, 741–749. [Google Scholar] [CrossRef]
  33. Wang, Y. A new concept using LSTM Neural Networks for dynamic system identification. In Proceedings of the 2017 American Control Conference (ACC), Seattle, WA, USA, 24–26 May 2017; pp. 5324–5329. [Google Scholar]
  34. Choi, H.S. Electromyogram (EMG) Signal Classification Based on Light-Weight Neural Network with FPGAs for Wearable Application. Electronics 2023, 12, 1398. [Google Scholar] [CrossRef]
  35. Hammad, M.; Pławiak, P.; Wang, K.; Acharya, U.R. ResNet-Attention model for human authentication using ECG signals. Expert Syst. 2021, 38, e12547. [Google Scholar] [CrossRef]
  36. Aljanabi, R.A.; Al-Qaysi, Z.T.; Ahmed, M.A.; Salih, M.M. Hybrid Model for Motor Imagery Biometric Identification. Iraqi J. Comput. Sci. Math. 2024, 5, 1–12. [Google Scholar] [CrossRef]
  37. Hu, Q.; Sarmadi, A.; Gulati, P.; Krishnamurthy, P.; Khorrami, F.; Atashzar, S.F. X-MyoNET: Biometric Identification using Deep Processing of Dynamic Surface Electromyography. IEEE Trans. Instrum. Meas. 2024, 73, 1–13. [Google Scholar] [CrossRef]
  38. Byeon, Y.H.; Kwak, K.C. Personal Identification Using Long Short-Term Memory with Efficient Features of Electromyogram Biomedical Signals. Electronics 2023, 12, 4192. [Google Scholar] [CrossRef]
  39. Kim, J.S.; Pan, S. Electromyogram Based Personal Recognition Using Attention Mechanism for IoT Security. Comput. Mater. Contin. 2023, 77, 1663–1678. [Google Scholar] [CrossRef]
  40. Zhao, J.; Zhao, Y.; Li, H.; Zhang, Y.; Wu, L. HLS-based FPGA implementation of convolutional deep belief network for signal modulation recognition. In Proceedings of the IGARSS 2020–2020 IEEE International Geoscience and Remote Sensing Symposium, Waikoloa, HI, USA, 26 September–2 October 2020; pp. 6985–6988. [Google Scholar]
  41. Fast Machine Learning Lab. Available online: https://github.com/fastmachinelearning/ (accessed on 1 May 2023).
  42. Farshchi, F.; Huang, Q.; Yun, H. Integrating NVIDIA deep learning accelerator (NVDLA) with RISC-V SoC on FireSim. In Proceedings of the 2nd Workshop on Energy Efficient Machine Learning and Cognitive Computing for Embedded Applications (EMC2), Washington, DC, USA, 17 February 2019; pp. 21–25. [Google Scholar]
  43. Shah, D.; Hung, E.; Wolf, C.; Bazanski, S.; Gisselquist, D.; Milanovic, M. Yosys+ nextpnr: An open source framework from verilog to bitstream for commercial fpgas. In Proceedings of the 2019 IEEE 27th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM), San Diego, CA, USA, 28 April–1 May 2019; pp. 1–4. [Google Scholar]
Figure 1. EMD signal analysis. (a) Original signal (A), (b) Original signal (B), (c) IMF1 (A), (d) IMF1 (B), (e) IMF4 (A), and (f) IMF4 (B). A and B refer to different individuals.
Figure 1. EMD signal analysis. (a) Original signal (A), (b) Original signal (B), (c) IMF1 (A), (d) IMF1 (B), (e) IMF4 (A), and (f) IMF4 (B). A and B refer to different individuals.
Electronics 13 02584 g001
Figure 2. Structure of the proposed SSiamese neural networks for embeddings.
Figure 2. Structure of the proposed SSiamese neural networks for embeddings.
Electronics 13 02584 g002
Figure 3. Simple schematic of LSTM blocks.
Figure 3. Simple schematic of LSTM blocks.
Electronics 13 02584 g003
Figure 4. Confusion matrix for user authentication.
Figure 4. Confusion matrix for user authentication.
Electronics 13 02584 g004
Figure 5. ROC curve for user authentication. The dashed line represents the performance of a random classifier.
Figure 5. ROC curve for user authentication. The dashed line represents the performance of a random classifier.
Electronics 13 02584 g005
Figure 6. Bit precision of parameters used in each layer by Keras and implemented in hardware.
Figure 6. Bit precision of parameters used in each layer by Keras and implemented in hardware.
Electronics 13 02584 g006
Figure 7. Schematic diagram of the proposed user authentication system implemented in the form of a wearable watch.
Figure 7. Schematic diagram of the proposed user authentication system implemented in the form of a wearable watch.
Electronics 13 02584 g007
Table 1. Representative time domain analysis of EMG signals for class 1 and class 0.
Table 1. Representative time domain analysis of EMG signals for class 1 and class 0.
CategoryClass 1 (Same Person)Class 0 (Different Person)
MAV0.056530.042450.027790.03802
VAR0.009860.008110.002540.00621
RMS0.008110.008110.006210.00621
NZCs7717801020778
Table 2. Overall model structure proposed for user authentication.
Table 2. Overall model structure proposed for user authentication.
Layer (Type)Output ShapeNumber of Parameters
Input_1 (InputLayer)[None, 8000, 5]0
Input_1 (InputLayer)[None, 8000, 5]0
Conv1d (Conv1D)[None, 1996, 24]2424
Batch (BatchNormalization)[None, 1996, 24]96
Max_pooling1d (MaxPooling1D)[None, 665, 24]0
Conv1d_1 (Conv1D)[None, 163, 24]8088
Batch_1 (BatchNormalization)[None, 163, 24]96
Max_pooling1d_1 (MaxPooling1D)[None, 32, 24]0
Lstm (LSTM)[None, 28]5936
Dense (Dense)[None, 14]406
Dense_1 (Dense)[None, 2]30
Table 3. Comparison of model accuracy for user authentication using biometric signals.
Table 3. Comparison of model accuracy for user authentication using biometric signals.
CategoryReference [35]Reference [36]Reference [37]This Paper
Biometric signalsECGEEGEMGEMG
Accuracy0.9850.9750.9700.992
Recall0.9830.9750.9701
Precision0.9930.9750.9720.984
F1 score0.9880.9750.9700.992
Table 4. Device utilization for the FPGA chipset “xcku5p-ffva676-3-e”.
Table 4. Device utilization for the FPGA chipset “xcku5p-ffva676-3-e”.
NameBRAM_18KDSP48EFFLUTURAM
DSP00000
Expression000300
FIFO960023,28235,6820
Instance150768103,23097,4140
Memory00000
Multiplexer000360
Register00600
Total1110768126,518133,1620
Available9601824433,920216,96064
Utilization (%)1154229610
Table 5. Device utilization for the FPGA chipset “xcku035-fbva676-3-e” after optimization.
Table 5. Device utilization for the FPGA chipset “xcku035-fbva676-3-e” after optimization.
NameBRAM_18KDSP48EFFLUTURAM
DSP00000
Expression000300
FIFO932014,07915,3540
Instance15600112,29696,96757
Memory00000
Multiplexer000360
Register00600
Total947600126,381112,38757
Available9601824433,920216,96064
Utilization (%)9832295189
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Choi, H.-S. Simple Siamese Model with Long Short-Term Memory for User Authentication with Field-Programmable Gate Arrays. Electronics 2024, 13, 2584. https://doi.org/10.3390/electronics13132584

AMA Style

Choi H-S. Simple Siamese Model with Long Short-Term Memory for User Authentication with Field-Programmable Gate Arrays. Electronics. 2024; 13(13):2584. https://doi.org/10.3390/electronics13132584

Chicago/Turabian Style

Choi, Hyun-Sik. 2024. "Simple Siamese Model with Long Short-Term Memory for User Authentication with Field-Programmable Gate Arrays" Electronics 13, no. 13: 2584. https://doi.org/10.3390/electronics13132584

APA Style

Choi, H. -S. (2024). Simple Siamese Model with Long Short-Term Memory for User Authentication with Field-Programmable Gate Arrays. Electronics, 13(13), 2584. https://doi.org/10.3390/electronics13132584

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop