首页 > 最新文献

ETRI Journal最新文献

英文 中文
Early prediction of thrombocytopenia in critical ill patients admitted to the intensive care unit based on sequence embedding 基于序列嵌入的重症监护病房重症患者血小板减少症早期预测
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-08-07 DOI: 10.4218/etrij.2024-0201
Yuan Wang, Ning Xiong, Mengru Sheng, Shilong Wang, Yisong Cheng, Lin Wang, Jucheng Yang, Qin Wu

Thrombocytopenia is a common complication among critically ill patients. To enable early prediction, we conducted a retrospective study using five machine learning (ML) models developed with a sequence embedding approach that integrates temporal medication and diagnostic data. Models were trained on the MIMIC-IV database and evaluated on the eICU database. We propose a novel sequence feature fusion method combining explicit and implicit features with embeddings for ICD codes and drug sequences to capture complex interactions. To our knowledge, this is the first study to make continuous predictions for ICU patients until thrombocytopenia onset. Model performance was assessed using AUC; t-SNE and SHAP were used to evaluate feature importance. XGBoost with sequence feature fusion performed best, achieving AUCs of 0.80, 0.85, and 0.92 at ICU admission, and 72 h and 24 h before onset, respectively. Platelet count, phosphate, and lactate were the top predictors. These findings demonstrate that ML models with sequence embeddings can effectively predict thrombocytopenia by capturing temporal patterns in patient data.

血小板减少症是危重症患者常见的并发症。为了实现早期预测,我们使用五种机器学习(ML)模型进行了回顾性研究,这些模型采用序列嵌入方法开发,整合了时间药物和诊断数据。模型在MIMIC-IV数据库上进行训练,在eICU数据库上进行评估。我们提出了一种新的序列特征融合方法,将显式和隐式特征与嵌入相结合,用于捕获ICD代码和药物序列的复杂相互作用。据我们所知,这是第一个对ICU患者进行持续预测直到血小板减少症发病的研究。采用AUC评估模型性能;采用t-SNE和SHAP评价特征重要性。序列特征融合的XGBoost表现最好,在ICU入院时、发病前72 h和24 h的auc分别为0.80、0.85和0.92。血小板计数、磷酸盐和乳酸是最重要的预测因子。这些发现表明,具有序列嵌入的ML模型可以通过捕获患者数据中的时间模式有效地预测血小板减少症。
{"title":"Early prediction of thrombocytopenia in critical ill patients admitted to the intensive care unit based on sequence embedding","authors":"Yuan Wang,&nbsp;Ning Xiong,&nbsp;Mengru Sheng,&nbsp;Shilong Wang,&nbsp;Yisong Cheng,&nbsp;Lin Wang,&nbsp;Jucheng Yang,&nbsp;Qin Wu","doi":"10.4218/etrij.2024-0201","DOIUrl":"https://doi.org/10.4218/etrij.2024-0201","url":null,"abstract":"<p>Thrombocytopenia is a common complication among critically ill patients. To enable early prediction, we conducted a retrospective study using five machine learning (ML) models developed with a sequence embedding approach that integrates temporal medication and diagnostic data. Models were trained on the MIMIC-IV database and evaluated on the eICU database. We propose a novel sequence feature fusion method combining explicit and implicit features with embeddings for ICD codes and drug sequences to capture complex interactions. To our knowledge, this is the first study to make continuous predictions for ICU patients until thrombocytopenia onset. Model performance was assessed using AUC; t-SNE and SHAP were used to evaluate feature importance. XGBoost with sequence feature fusion performed best, achieving AUCs of 0.80, 0.85, and 0.92 at ICU admission, and 72 h and 24 h before onset, respectively. Platelet count, phosphate, and lactate were the top predictors. These findings demonstrate that ML models with sequence embeddings can effectively predict thrombocytopenia by capturing temporal patterns in patient data.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 6","pages":"1071-1084"},"PeriodicalIF":1.6,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145730492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text adversarial attacks using policy gradients against deep learning classifiers 使用策略梯度对抗深度学习分类器的文本对抗性攻击
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-08-07 DOI: 10.4218/etrij.2024-0339
Debin Zeng, Zhiwei Zuo, Li Yang, Xiong Xiao, Zhuo Tang

Texts are widely used in natural language processing. However, such applications are vulnerable to adversarial attacks. Existing research attempts to artificially add semantically meaningless word-, character-, or sentence-level perturbations, which compromise the syntax and consistency of texts. However, they fail to ensure high-quality outputs. Therefore, we propose an attack model for generating adversarial samples using policy gradients and a generative adversarial network. In our model, first, a Seq2Seq encoder is used to generate sentences, mapping discrete text data into continuous hidden space vectors and then transforming them into adversarial text samples. Second, to emphasize semantics, we compute the cosine similarity or BERT-based semantic similarity between the original and adversarial texts for reward calculation. Finally, a policy gradient is applied to optimize the parameters. Experiments show that, while maintaining a semantic similarity above 0.8, our BERT-based method reduces classification accuracy by 51.77% on the DBpedia dataset. Our cosine similarity-based method requires only one-third to one-half the runtime of the baseline approach.

文本在自然语言处理中有着广泛的应用。然而,这样的应用程序很容易受到对抗性攻击。现有的研究试图人为地添加语义上无意义的单词、字符或句子级扰动,这损害了文本的语法和一致性。然而,它们无法确保高质量的产出。因此,我们提出了一个使用策略梯度和生成对抗网络生成对抗样本的攻击模型。在我们的模型中,首先使用Seq2Seq编码器生成句子,将离散文本数据映射到连续的隐藏空间向量中,然后将其转换为对抗性文本样本。其次,为了强调语义,我们计算原始文本和对抗文本之间的余弦相似度或基于bert的语义相似度来计算奖励。最后,应用策略梯度对参数进行优化。实验表明,在保持语义相似度在0.8以上的情况下,基于bert的方法在DBpedia数据集上的分类准确率降低了51.77%。我们基于余弦相似度的方法只需要基线方法的三分之一到二分之一的运行时间。
{"title":"Text adversarial attacks using policy gradients against deep learning classifiers","authors":"Debin Zeng,&nbsp;Zhiwei Zuo,&nbsp;Li Yang,&nbsp;Xiong Xiao,&nbsp;Zhuo Tang","doi":"10.4218/etrij.2024-0339","DOIUrl":"https://doi.org/10.4218/etrij.2024-0339","url":null,"abstract":"<p>Texts are widely used in natural language processing. However, such applications are vulnerable to adversarial attacks. Existing research attempts to artificially add semantically meaningless word-, character-, or sentence-level perturbations, which compromise the syntax and consistency of texts. However, they fail to ensure high-quality outputs. Therefore, we propose an attack model for generating adversarial samples using policy gradients and a generative adversarial network. In our model, first, a Seq2Seq encoder is used to generate sentences, mapping discrete text data into continuous hidden space vectors and then transforming them into adversarial text samples. Second, to emphasize semantics, we compute the cosine similarity or BERT-based semantic similarity between the original and adversarial texts for reward calculation. Finally, a policy gradient is applied to optimize the parameters. Experiments show that, while maintaining a semantic similarity above 0.8, our BERT-based method reduces classification accuracy by 51.77% on the DBpedia dataset. Our cosine similarity-based method requires only one-third to one-half the runtime of the baseline approach.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 6","pages":"1085-1103"},"PeriodicalIF":1.6,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0339","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145719369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic tile-map generation for crack-free rendering of large-scale terrain data 大规模地形数据无裂纹渲染的动态贴图生成
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-21 DOI: 10.4218/etrij.2024-0496
Cheonin Oh, Ahyun Lee

Three-dimensional (3D) geospatial technologies are essential in urban digital twins, smart cities, and metaverse. Rendering large-scale terrain data, often exceeding tens of terabytes, presents challenges. While planetary-scale platforms, like Google Earth and Cesium stream data, the streaming of data and the use of regular grid-type digital elevation models lead to cracks among tiles with different levels of detail. This paper proposes a novel dynamic tile-map generation method to eliminate these cracks. Unlike existing methods, our approach leverages tile subindex information to efficiently construct a tile adjacency map, significant reducing the search space for neighboring tiles and eliminating the need for prior knowledge of the terrain tile structure. Furthermore, our approach is robust to data loss, mitigating cracks caused by missing or incomplete tiles. Compared with existing root-down search methods, our method reduces processing time by 1–5 ms per frame and decreases the number of tile-to-tile links by a factor of 3–5, as demonstrated by experimental results.

三维(3D)地理空间技术在城市数字孪生、智慧城市和虚拟世界中至关重要。渲染大规模地形数据(通常超过数十tb)带来了挑战。虽然像谷歌Earth和Cesium这样的行星尺度平台会传输数据,但数据流和常规网格型数字高程模型的使用会导致不同细节水平的瓦片之间出现裂缝。本文提出了一种新的动态贴图生成方法来消除这些裂纹。与现有方法不同,我们的方法利用瓦片子索引信息有效地构建瓦片邻接图,大大减少了对相邻瓦片的搜索空间,消除了对地形瓦片结构先验知识的需要。此外,我们的方法是健壮的数据丢失,减轻裂缝造成的缺失或不完整的瓷砖。实验结果表明,与现有的根向下搜索方法相比,我们的方法每帧的处理时间缩短了1-5 ms,瓦片到瓦片的链接数量减少了3-5倍。
{"title":"Dynamic tile-map generation for crack-free rendering of large-scale terrain data","authors":"Cheonin Oh,&nbsp;Ahyun Lee","doi":"10.4218/etrij.2024-0496","DOIUrl":"https://doi.org/10.4218/etrij.2024-0496","url":null,"abstract":"<p>Three-dimensional (3D) geospatial technologies are essential in urban digital twins, smart cities, and metaverse. Rendering large-scale terrain data, often exceeding tens of terabytes, presents challenges. While planetary-scale platforms, like Google Earth and Cesium stream data, the streaming of data and the use of regular grid-type digital elevation models lead to cracks among tiles with different levels of detail. This paper proposes a novel dynamic tile-map generation method to eliminate these cracks. Unlike existing methods, our approach leverages tile subindex information to efficiently construct a tile adjacency map, significant reducing the search space for neighboring tiles and eliminating the need for prior knowledge of the terrain tile structure. Furthermore, our approach is robust to data loss, mitigating cracks caused by missing or incomplete tiles. Compared with existing root-down search methods, our method reduces processing time by 1–5 ms per frame and decreases the number of tile-to-tile links by a factor of 3–5, as demonstrated by experimental results.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 5","pages":"970-982"},"PeriodicalIF":1.6,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0496","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145335823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coding caching method for user privacy protection based on decentralization 基于分散化的用户隐私保护编码缓存方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-07-21 DOI: 10.4218/etrij.2024-0057
Jin Ren, Gangpei Li

Coded caching reduces the communication load substantially, exploiting the caches of end devices to generate multicast opportunities during the transmission phase. To address user-request privacy, we propose a decentralized coding caching method that focuses on protecting user privacy. This method involves creating file subpackages for users to cache linear combinations of files. We also expand the key scheme for decentralized situations, ensuring that files shared among users do not exceed each user's cache size. We make sure that the unencoded part of each packet in the user cache is larger than the size of the cached file after being cut, determining the range of values for the file allocation coefficient, θ. With fixed N and M, we can calculate that the load is a convex function of θ. Through mathematical analysis, we can determine the worst case load scenario. Subsequent simulation results unequivocally demonstrate the capability of the proposed scheme to fulfill any file request from users, all while achieving a communication load comparable to that of an enhanced distributed nonprivate cache scheme.

编码缓存利用终端设备的缓存在传输阶段产生多播机会,大大减少了通信负载。为了解决用户请求隐私问题,我们提出了一种以保护用户隐私为重点的分散编码缓存方法。这种方法需要为用户创建文件子包来缓存文件的线性组合。我们还扩展了分散情况下的密钥方案,确保用户之间共享的文件不会超过每个用户的缓存大小。我们确保用户缓存中每个数据包的未编码部分大于被切割后的缓存文件的大小,确定文件分配系数θ的值范围。当N和M固定时,我们可以计算出载荷是θ的凸函数。通过数学分析,可以确定最坏情况下的负载场景。随后的仿真结果明确地证明了所提出的方案能够满足用户的任何文件请求,同时实现与增强型分布式非私有缓存方案相当的通信负载。
{"title":"Coding caching method for user privacy protection based on decentralization","authors":"Jin Ren,&nbsp;Gangpei Li","doi":"10.4218/etrij.2024-0057","DOIUrl":"https://doi.org/10.4218/etrij.2024-0057","url":null,"abstract":"<p>Coded caching reduces the communication load substantially, exploiting the caches of end devices to generate multicast opportunities during the transmission phase. To address user-request privacy, we propose a decentralized coding caching method that focuses on protecting user privacy. This method involves creating file subpackages for users to cache linear combinations of files. We also expand the key scheme for decentralized situations, ensuring that files shared among users do not exceed each user's cache size. We make sure that the unencoded part of each packet in the user cache is larger than the size of the cached file after being cut, determining the range of values for the file allocation coefficient, <i>θ</i>. With fixed <i>N</i> and <i>M</i>, we can calculate that the load is a convex function of <i>θ</i>. Through mathematical analysis, we can determine the worst case load scenario. Subsequent simulation results unequivocally demonstrate the capability of the proposed scheme to fulfill any file request from users, all while achieving a communication load comparable to that of an enhanced distributed nonprivate cache scheme.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 6","pages":"1152-1162"},"PeriodicalIF":1.6,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0057","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145730441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special issue on defense and disaster response technologies 国防和救灾技术专刊
IF 1.3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-27 DOI: 10.4218/etr2.70040
Hea Sook Park, Jong-Moon Chung, Moosung Park, Youngok Kim, Ji-Bum Chung, Sangtae Ha, Yong-Yuk Won

In today's technological landscape, the rapid and widespread adoption of new technologies is crucial to enhance the capabilities, robustness, and efficiency of military defense and disaster response operations. Technologies such as artificial intelligence, mobile communication, and the Internet of Things have enriched battlefield communication, surveillance, tactical decision-making, and early warning systems. This trend is common across various fields, including disaster response technologies, and has led to considerable improvements in disaster prediction, mitigation, response, and recovery applications.

The emergence of new technologies has resulted in dramatic changes in the operational environment. For example, the increasing diversity of connections between combat/rescue equipment, weaponry, and operational headquarters imposes complex communication requirements related to availability, reliability, and latency, as well as the need for safe processing of unprecedented volumes of data. Conversely, responses to disasters must consider their potential impacts, including their high frequency, widespread damage, and global scale. Additionally, preemptive interventions that allow for accurate forecasting of disasters are essential for modern disaster response. Overall, myriad factors collectively contribute to the complexity of developing efficient solutions for military defense and disaster response applications.

The Electronics and Telecommunications Research Institute (ETRI) Journal is a peer-reviewed open-access journal launched in 1993 and published bimonthly by ETRI (Republic of Korea), aiming to promote worldwide academic exchange in the fields of information, telecommunications, and electronics. This special issue explores recent research trends in the technological advances driving the digital transformation of military defense and disaster response systems. It presents notable, cutting-edge studies aimed at improving the efficiency, safety, and real-time responsiveness of these critical domains. Given the central role of technologies such as virtual training, robotic navigation, drone countermeasures, and secure communications in the modernization of defense operations, the contributions in this special issue offer valuable insights into the future direction of digitalized military defense and disaster response strategies. Accordingly, we have selected eight critical papers on three aspects of military defense and disaster response technology for this special issue. A brief review regarding commitments for this special issue follows.

The first invited paper [1], entitled “Next-generation wireless communication technologies for improved disaster response and management” by Song et al., introduces next-generation wireless communication technologies that can improve disaster response and management. This study proposes an integrated disaster-response communication framework with the potential to achieve ul

在当今的技术环境中,快速和广泛采用新技术对于增强军事防御和灾害响应行动的能力、稳健性和效率至关重要。人工智能、移动通信、物联网等技术丰富了战场通信、监视、战术决策和预警系统。这一趋势在包括灾害响应技术在内的各个领域都很普遍,并导致了灾害预测、减轻、响应和恢复应用方面的重大改进。新技术的出现使作战环境发生了巨大变化。例如,战斗/救援设备、武器和作战总部之间的连接日益多样化,对可用性、可靠性和延迟提出了复杂的通信要求,同时需要安全处理前所未有的大量数据。相反,对灾害的反应必须考虑其潜在影响,包括其高频率、广泛的破坏和全球规模。此外,能够准确预测灾害的先发制人的干预措施对于现代灾害应对至关重要。总的来说,无数的因素共同促成了为军事防御和灾害响应应用开发有效解决方案的复杂性。电子和电信研究所(ETRI)期刊是韩国电子和电信研究所(ETRI)于1993年创办的一份同行评审的开放获取期刊,每双月出版一次,旨在促进信息、电信和电子领域的全球学术交流。本期特刊探讨了推动军事防御和灾害响应系统数字化转型的技术进步的最新研究趋势。它提出了引人注目的前沿研究,旨在提高这些关键领域的效率、安全性和实时响应能力。鉴于虚拟训练、机器人导航、无人机对抗和安全通信等技术在国防作战现代化中的核心作用,本期特刊的贡献为数字化军事防御和灾害应对战略的未来方向提供了宝贵的见解。因此,我们在本期特刊中选取了军事防御和灾害应对技术三个方面的八篇重要论文。下面简要回顾一下本期特刊的承付情况。第一篇受邀论文[1],题为“下一代无线通信技术用于改善灾害响应和管理”,由Song等人撰写,介绍了可以改善灾害响应和管理的下一代无线通信技术。本研究提出了一种综合灾害响应通信框架,具有实现超低延迟和高速数据传输的潜力,以支持救援行动,并提供更可靠的态势感知,从而在灾害环境中实现更准确、更快速的决策,从而将人类风险降至最低。Tong等人的第二篇论文[2]题为“基于标记的自适应虚拟军事训练系统,用于增强沉浸感和真实感”,通过引入基于标记的自适应虚拟军事系统,为虚拟军事训练领域做出了重大贡献。这种方法通过最大限度地减少可穿戴设备的使用,有效地减轻了受训者的身体负担,与现有系统相比,这是一个值得称赞的进步。编委会把这篇文章选为“专题文章”。它解决了与最近的军事防御虚拟学习系统相关的重要问题,被认为是本专题的合适主题。第三篇论文[3],题为“使用网格地图的移动机器人导航的语义势场”,由Pham等人提出了一种新的移动机器人导航的语义势场方法。该方案基于几何数据和语义数据,采用语义网格图,提高了导航效率和自适应性。通过仿真和实际实验对该方案的有效性进行了评价。该方案被认为是一种有前途的移动机器人导航方法,适用于各种应用,如灾害、国防和自主物流。Choi等人发表的第四篇论文[4]题为“军事行动中使用多机器人系统的特定情况估计函数的设计”,提出了一种新的框架,用于快速有效的目标定位识别和危险区评估功能,即使在资源有限的情况下,这些功能也将由军事机器人执行。值得注意的是,所提出的框架使用一群机器人在空间中合并目标位置数据,而不依赖于同时定位和映射(SLAM)。 提议的框架有望用于室内军事行动中的态势评估。第五篇论文[5],题为“使用零信任架构的商用gndeb的5G防御网络”,由Kim等人撰写,提出了一种利用商用gnb (gnb)的网络,具有军事公共陆地移动网络身份,确保广泛覆盖、强大的安全性和成本效益。为了增强安全访问,采用了使用软件定义周界(SDP)的零信任(ZT)架构。阐述了基于5G和ZT接入管理的用户设备接入专网的连接过程。本研究通过模拟5G分析,对比了SDP应用于拒绝服务攻击和IP扫描攻击前后的场景。第六篇论文[6],题为“基于多调制解调器的FHSS-无人机接管与精确欺骗”,由Kang等人介绍了一种劫持基于跳频扩频(FHSS)的无人机的方法,该方法使用C2信号发射进行接管和精确欺骗信号,以使使用多调制解调器的所有者的发射机信号无效。提出的方法同时向目标无人机发送C2信号以实现安全接管,并发送精确欺骗信号以抵消所有者的发射器,从而最大限度地减少与其他设备的射频碰撞。第七篇论文[7],题为“通过优化透明导电电极电阻最大化近红外调制”,由Han等人提出了一种通过调整氧化铟锡(ITO)厚度来优化红外传输的方法,在电致变色器件中表现出优异的调制效果。测试了ITO厚度为40、75和302 nm的器件,75 nm电极在可见光范围内的透射率调制性能为67.73%,近红外范围内的透射率调制性能为51.41%。漂白和着色反应时间分别为4.0 s和2.8 s。第八篇论文[8],题为“灾害响应中应急服务响应代码有序分类的距离均方损失函数”,由Lee等人提出了距离均方(DiMS)损失函数,以提高国家警察厅(NPA)对灾害严重程度分类的准确性。国家行动计划数据具有有序数据的特征,如紧急服务响应代码(ESRC)数据,这些数据根据其震级(从C0到C4)进行分类。采用DiMS损失函数的风险识别方法有可能加强灾害响应工作。特邀编辑感谢ETRI杂志的所有作者、审稿人和编辑人员使本期特刊取得成功。客座编辑们很高兴能够及时地发表高质量的技术论文。这些研究将有助于出现各种军事防御和救灾技术创新,以确保目前和未来的日常安全。作者声明不存在利益冲突。
{"title":"Special issue on defense and disaster response technologies","authors":"Hea Sook Park,&nbsp;Jong-Moon Chung,&nbsp;Moosung Park,&nbsp;Youngok Kim,&nbsp;Ji-Bum Chung,&nbsp;Sangtae Ha,&nbsp;Yong-Yuk Won","doi":"10.4218/etr2.70040","DOIUrl":"https://doi.org/10.4218/etr2.70040","url":null,"abstract":"<p>In today's technological landscape, the rapid and widespread adoption of new technologies is crucial to enhance the capabilities, robustness, and efficiency of military defense and disaster response operations. Technologies such as artificial intelligence, mobile communication, and the Internet of Things have enriched battlefield communication, surveillance, tactical decision-making, and early warning systems. This trend is common across various fields, including disaster response technologies, and has led to considerable improvements in disaster prediction, mitigation, response, and recovery applications.</p><p>The emergence of new technologies has resulted in dramatic changes in the operational environment. For example, the increasing diversity of connections between combat/rescue equipment, weaponry, and operational headquarters imposes complex communication requirements related to availability, reliability, and latency, as well as the need for safe processing of unprecedented volumes of data. Conversely, responses to disasters must consider their potential impacts, including their high frequency, widespread damage, and global scale. Additionally, preemptive interventions that allow for accurate forecasting of disasters are essential for modern disaster response. Overall, myriad factors collectively contribute to the complexity of developing efficient solutions for military defense and disaster response applications.</p><p>The Electronics and Telecommunications Research Institute (ETRI) Journal is a peer-reviewed open-access journal launched in 1993 and published bimonthly by ETRI (Republic of Korea), aiming to promote worldwide academic exchange in the fields of information, telecommunications, and electronics. This special issue explores recent research trends in the technological advances driving the digital transformation of military defense and disaster response systems. It presents notable, cutting-edge studies aimed at improving the efficiency, safety, and real-time responsiveness of these critical domains. Given the central role of technologies such as virtual training, robotic navigation, drone countermeasures, and secure communications in the modernization of defense operations, the contributions in this special issue offer valuable insights into the future direction of digitalized military defense and disaster response strategies. Accordingly, we have selected eight critical papers on three aspects of military defense and disaster response technology for this special issue. A brief review regarding commitments for this special issue follows.</p><p>The first invited paper [<span>1</span>], entitled “Next-generation wireless communication technologies for improved disaster response and management” by Song et al., introduces next-generation wireless communication technologies that can improve disaster response and management. This study proposes an integrated disaster-response communication framework with the potential to achieve ul","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 3","pages":"371-374"},"PeriodicalIF":1.3,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etr2.70040","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144503048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance mean-square loss function for ordinal text classification of emergency service response codes in disaster management 灾害管理中应急服务响应码有序文本分类的距离均方损失函数
IF 1.3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-27 DOI: 10.4218/etrij.2024-0478
Eungyeol Lee, Sungwon Byon, Eui-Suk Jung, Eunjung Kwon, Hyunho Park

The National Fire Agency (NFA) and National Police Agency (NPA) have defined risk levels based on the severity of disasters. Risk-level data possess the characteristics of ordinal data such as NPA's Emergency Service Response Code (ESRC) data, which are classified based on their magnitudes (from C0 to C4). In this study, we propose a distance mean-square (DiMS) loss function to improve the accuracy of ordinal data classification. The DiMS loss function calculates loss values based on the distances between the predicted and true labels: value distances (commonly used in regression analysis for magnitude data) and probability distances (typically used in classification analysis). Therefore, the DiMS loss function contributes to improved accuracy when classifying ordinal data, such as ESRC. In addition, using the DiMS loss function, we achieved state-of-the-art performance in classifying the SST-5 data, which is a representative ordinal dataset. The DiMS loss function for ordinal classification enabled accurate risk recognition. Thus, accurate risk recognition using the DiMS loss function enhances disaster response.

国家消防局(NFA)和国家警察厅(NPA)根据灾害的严重程度确定了风险等级。风险级别数据具有序数数据的特征,如NPA的紧急服务响应代码(ESRC)数据,这些数据根据其震级(从C0到C4)进行分类。在本研究中,我们提出了距离均方(DiMS)损失函数来提高有序数据分类的准确性。DiMS损失函数根据预测和真实标签之间的距离计算损失值:值距离(通常用于数量级数据的回归分析)和概率距离(通常用于分类分析)。因此,DiMS损失函数有助于提高对有序数据(如ESRC)分类的准确性。此外,使用DiMS损失函数,我们在SST-5数据分类方面取得了最先进的性能,这是一个具有代表性的有序数据集。DiMS损失函数用于有序分类,可以准确识别风险。因此,使用DiMS损失函数进行准确的风险识别可以增强灾害响应。
{"title":"Distance mean-square loss function for ordinal text classification of emergency service response codes in disaster management","authors":"Eungyeol Lee,&nbsp;Sungwon Byon,&nbsp;Eui-Suk Jung,&nbsp;Eunjung Kwon,&nbsp;Hyunho Park","doi":"10.4218/etrij.2024-0478","DOIUrl":"https://doi.org/10.4218/etrij.2024-0478","url":null,"abstract":"<p>The National Fire Agency (NFA) and National Police Agency (NPA) have defined risk levels based on the severity of disasters. Risk-level data possess the characteristics of ordinal data such as NPA's Emergency Service Response Code (ESRC) data, which are classified based on their magnitudes (from C0 to C4). In this study, we propose a distance mean-square (DiMS) loss function to improve the accuracy of ordinal data classification. The DiMS loss function calculates loss values based on the distances between the predicted and true labels: value distances (commonly used in regression analysis for magnitude data) and probability distances (typically used in classification analysis). Therefore, the DiMS loss function contributes to improved accuracy when classifying ordinal data, such as ESRC. In addition, using the DiMS loss function, we achieved state-of-the-art performance in classifying the SST-5 data, which is a representative ordinal dataset. The DiMS loss function for ordinal classification enabled accurate risk recognition. Thus, accurate risk recognition using the DiMS loss function enhances disaster response.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 3","pages":"472-479"},"PeriodicalIF":1.3,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0478","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144502997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acoustic and linguistic effects in synthesized speech augmentation for speech recognition 语音识别中合成语音增强的声学和语言效应
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-25 DOI: 10.4218/etrij.2024-0050
Yohan Lim, Donghyun Kim, Sang Hun Kim

Recently, numerous studies have been conducted to incorporate the knowledge of massive text corpora into speech recognition via text to speech (TTS). However, the distribution mismatch between synthetic and real speech has always been an issue. In this paper, we analyzed how these mismatches affect the acoustic and linguistic aspects of automatic speech recognition (ASR) performance. For acoustics, we divided the acoustic mismatch into TTS-related and non-TTS-related and analyzed how each acoustic mismatch affected ASR performance. Next, from a linguistic perspective, we experimented to determine how synthetic speech from a large text corpus affects the performance of speech recognition in various domains. The experimental results show that (i) substitution errors, which are the bulk of the recognition errors in ASR trained on synthetic speech data, are affected by the prosody mismatch between synthetic and real speech; (ii) pretraining ASR with synthetic speech data first and performing transfer learning with real speech outperformed training in the reverse order; and (iii) pretraining with a large amount of synthetic speech improves performance further in language model shallow fusion.

近年来,大量研究将海量文本语料库知识应用到文本到语音(TTS)的语音识别中。然而,合成语音和真实语音之间的分布不匹配一直是一个问题。在本文中,我们分析了这些不匹配如何影响自动语音识别(ASR)性能的声学和语言方面。声学方面,我们将声学失配分为tts相关和非tts相关,并分析了每种声学失配对ASR性能的影响。接下来,从语言学的角度出发,我们进行了实验,以确定来自大型文本语料库的合成语音如何影响不同领域的语音识别性能。实验结果表明:(1)合成语音与真实语音的韵律不匹配对替换错误的影响较大;(ii)先用合成语音数据对ASR进行预训练,再用真实语音进行迁移学习,以相反的顺序优于训练;(3)大量合成语音的预训练进一步提高了语言模型浅融合的性能。
{"title":"Acoustic and linguistic effects in synthesized speech augmentation for speech recognition","authors":"Yohan Lim,&nbsp;Donghyun Kim,&nbsp;Sang Hun Kim","doi":"10.4218/etrij.2024-0050","DOIUrl":"https://doi.org/10.4218/etrij.2024-0050","url":null,"abstract":"<p>Recently, numerous studies have been conducted to incorporate the knowledge of massive text corpora into speech recognition via text to speech (TTS). However, the distribution mismatch between synthetic and real speech has always been an issue. In this paper, we analyzed how these mismatches affect the acoustic and linguistic aspects of automatic speech recognition (ASR) performance. For acoustics, we divided the acoustic mismatch into TTS-related and non-TTS-related and analyzed how each acoustic mismatch affected ASR performance. Next, from a linguistic perspective, we experimented to determine how synthetic speech from a large text corpus affects the performance of speech recognition in various domains. The experimental results show that (i) substitution errors, which are the bulk of the recognition errors in ASR trained on synthetic speech data, are affected by the prosody mismatch between synthetic and real speech; (ii) pretraining ASR with synthetic speech data first and performing transfer learning with real speech outperformed training in the reverse order; and (iii) pretraining with a large amount of synthetic speech improves performance further in language model shallow fusion.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 6","pages":"1061-1070"},"PeriodicalIF":1.6,"publicationDate":"2025-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145719752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure task offloading scheme for traffic video surveillance via reinforcement learning 基于强化学习的交通视频监控安全任务分流方案
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-25 DOI: 10.4218/etrij.2024-0363
Jianhua Liu, Kexin Wang, Xiaoni Shi, Xiaoguang Tu, Jiajia Liu

Edge computing deploys computing resources to the network edge to diminish task processing delays and power consumption. However, in traffic video surveillance systems, vehicular movement can lead to service interruptions. Moreover, the low credibility of the edge systems affects the success rate of edge offloading. To address these issues, we propose a secure task offloading scheme for traffic video surveillance. This scheme comprehensively evaluates trust values by integrating direct and indirect trust values, selecting nodes based on predefined trust thresholds, and achieving secure offloading and migration with short delays and energy consumption. To model the service migration problem, we adopted a Markov decision process-based approach and employed a Q-learning algorithm to determine the optimal solution, thereby establishing an effective migration path. Simulation results demonstrate that the proposed scheme yields higher comprehensive trust values and improved reliability. Furthermore, while ensuring seamless task migration, the migration success rate exceeded 90%, with the energy consumption reduced by more than 9.8%.

边缘计算将计算资源部署到网络边缘,以减少任务处理延迟和功耗。然而,在交通视频监控系统中,车辆的移动可能导致服务中断。此外,边缘系统的低可信度影响了边缘卸载的成功率。为了解决这些问题,我们提出了一种安全的交通视频监控任务分流方案。该方案通过整合直接信任值和间接信任值,根据预定义的信任阈值选择节点,综合评估信任值,实现时延短、能耗小的安全卸载和迁移。为了对服务迁移问题进行建模,我们采用基于马尔可夫决策过程的方法,并采用q -学习算法确定最优解,从而建立有效的迁移路径。仿真结果表明,该方案具有较高的综合信任值和较高的可靠性。在保证任务无缝迁移的同时,迁移成功率超过90%,能耗降低9.8%以上。
{"title":"Secure task offloading scheme for traffic video surveillance via reinforcement learning","authors":"Jianhua Liu,&nbsp;Kexin Wang,&nbsp;Xiaoni Shi,&nbsp;Xiaoguang Tu,&nbsp;Jiajia Liu","doi":"10.4218/etrij.2024-0363","DOIUrl":"https://doi.org/10.4218/etrij.2024-0363","url":null,"abstract":"<p>Edge computing deploys computing resources to the network edge to diminish task processing delays and power consumption. However, in traffic video surveillance systems, vehicular movement can lead to service interruptions. Moreover, the low credibility of the edge systems affects the success rate of edge offloading. To address these issues, we propose a secure task offloading scheme for traffic video surveillance. This scheme comprehensively evaluates trust values by integrating direct and indirect trust values, selecting nodes based on predefined trust thresholds, and achieving secure offloading and migration with short delays and energy consumption. To model the service migration problem, we adopted a Markov decision process-based approach and employed a \u0000<span></span><math>\u0000 <mi>Q</mi></math>-learning algorithm to determine the optimal solution, thereby establishing an effective migration path. Simulation results demonstrate that the proposed scheme yields higher comprehensive trust values and improved reliability. Furthermore, while ensuring seamless task migration, the migration success rate exceeded 90%, with the energy consumption reduced by more than 9.8%.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 5","pages":"893-908"},"PeriodicalIF":1.6,"publicationDate":"2025-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0363","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145335848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Marker-based adaptive virtual military training system for enhanced immersion and realism 基于标记的增强沉浸感和真实感的自适应虚拟军事训练系统
IF 1.3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-19 DOI: 10.4218/etrij.2024-0456
Hoseok Tong, Seongjean Kim, Hyunse Yoon, Jungsu Kim, Soyeon Lee, Sangjoon Park, Blagovest Vladimirov, Sanghoon Lee

The complexity of modern battlefields demands advanced military training systems that prepare forces for realistic scenarios. Even though traditional training methods are effective, they are costly and time consuming and are associated with safety risks. Virtual training systems offer a safer and more cost-effective alternative; however, current solutions often compromise realism because of the need for multiple sensors and wearable devices that can diminish immersion. To address these limitations, we propose a marker-based, adaptive, virtual military training system (MAVMTS) that enhances realism by using a minimal set of fiducial markers and multiview cameras to estimate the trainee's posture and weapon orientation without cumbersome wearables. The system integrates action recognition to generate responsive virtual adversaries, thereby creating dynamic and immersive training environments. MAVMTS reduces considerably the equipment burden and enhances the realism of virtual military training, thereby offering a more effective solution for preparing personnel for modern warfare.

现代战场的复杂性需要先进的军事训练系统,使部队为现实场景做好准备。尽管传统的培训方法是有效的,但它们既昂贵又耗时,还存在安全风险。虚拟培训系统提供了一种更安全、更具成本效益的替代方案;然而,由于需要多个传感器和可穿戴设备,目前的解决方案往往会损害现实性,从而降低沉浸感。为了解决这些限制,我们提出了一种基于标记的自适应虚拟军事训练系统(MAVMTS),该系统通过使用最小的基准标记集和多视图摄像机来估计受训者的姿势和武器方向,从而增强了真实感,而无需笨重的可穿戴设备。该系统集成了动作识别以生成响应性虚拟对手,从而创建动态和沉浸式训练环境。MAVMTS大大减轻了装备负担,提高了虚拟军事训练的真实感,从而为现代战争的人员准备提供了更有效的解决方案。
{"title":"Marker-based adaptive virtual military training system for enhanced immersion and realism","authors":"Hoseok Tong,&nbsp;Seongjean Kim,&nbsp;Hyunse Yoon,&nbsp;Jungsu Kim,&nbsp;Soyeon Lee,&nbsp;Sangjoon Park,&nbsp;Blagovest Vladimirov,&nbsp;Sanghoon Lee","doi":"10.4218/etrij.2024-0456","DOIUrl":"https://doi.org/10.4218/etrij.2024-0456","url":null,"abstract":"<p>The complexity of modern battlefields demands advanced military training systems that prepare forces for realistic scenarios. Even though traditional training methods are effective, they are costly and time consuming and are associated with safety risks. Virtual training systems offer a safer and more cost-effective alternative; however, current solutions often compromise realism because of the need for multiple sensors and wearable devices that can diminish immersion. To address these limitations, we propose a marker-based, adaptive, virtual military training system (MAVMTS) that enhances realism by using a minimal set of fiducial markers and multiview cameras to estimate the trainee's posture and weapon orientation without cumbersome wearables. The system integrates action recognition to generate responsive virtual adversaries, thereby creating dynamic and immersive training environments. MAVMTS reduces considerably the equipment burden and enhances the realism of virtual military training, thereby offering a more effective solution for preparing personnel for modern warfare.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 3","pages":"393-409"},"PeriodicalIF":1.3,"publicationDate":"2025-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0456","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144502989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next-generation wireless communication technologies for improved disaster response and management 改进灾害响应和管理的下一代无线通信技术
IF 1.3 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2025-06-09 DOI: 10.4218/etrij.2024-0546
Hwankyu Song, Jong-Moon Chung

This paper introduces next-generation wireless communication technologies applicable to disaster response. With recent technological advances—such as 5G new radio vehicle-to-everything (NR-V2X)—real-time communication, decision-making, and emergency operations can be enhanced through ultralow latency and high-speed transmission. Additionally, several technologies—such as autonomous mobility, drones, and Internet of Things (IoT)-based sensor networks—can improve rescue operations and mitigate human risks during disasters. Moreover, future communication technologies—including platooning, digital twins, and cell on wheels (COW)—can support situational awareness and rapid decision-making in disaster environments. Consequently, we propose industrial applications and standardization strategies to effectively utilize next-generation communication technologies for disaster response. Lastly, we analyze current wireless technologies and suggest future research directions for optimizing disaster preparedness and response.

本文介绍了适用于灾害响应的下一代无线通信技术。随着最近的技术进步,例如5G新型无线车联网(NR-V2X),可以通过超低延迟和高速传输增强实时通信、决策和应急操作。此外,一些技术,如自主移动、无人机和基于物联网(IoT)的传感器网络,可以改善救援行动,减轻灾害期间的人类风险。此外,未来的通信技术——包括队列、数字孪生和车轮上的单元(COW)——可以支持灾害环境中的态势感知和快速决策。因此,我们提出了工业应用和标准化策略,以有效地利用下一代通信技术进行灾害响应。最后,我们分析了当前的无线技术,并提出了优化灾害准备和响应的未来研究方向。
{"title":"Next-generation wireless communication technologies for improved disaster response and management","authors":"Hwankyu Song,&nbsp;Jong-Moon Chung","doi":"10.4218/etrij.2024-0546","DOIUrl":"https://doi.org/10.4218/etrij.2024-0546","url":null,"abstract":"<p>This paper introduces next-generation wireless communication technologies applicable to disaster response. With recent technological advances—such as 5G new radio vehicle-to-everything (NR-V2X)—real-time communication, decision-making, and emergency operations can be enhanced through ultralow latency and high-speed transmission. Additionally, several technologies—such as autonomous mobility, drones, and Internet of Things (IoT)-based sensor networks—can improve rescue operations and mitigate human risks during disasters. Moreover, future communication technologies—including platooning, digital twins, and cell on wheels (COW)—can support situational awareness and rapid decision-making in disaster environments. Consequently, we propose industrial applications and standardization strategies to effectively utilize next-generation communication technologies for disaster response. Lastly, we analyze current wireless technologies and suggest future research directions for optimizing disaster preparedness and response.</p>","PeriodicalId":11901,"journal":{"name":"ETRI Journal","volume":"47 3","pages":"375-392"},"PeriodicalIF":1.3,"publicationDate":"2025-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.4218/etrij.2024-0546","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144502973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ETRI Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1