首页 > 最新文献

Frontiers of Information Technology & Electronic Engineering最新文献

英文 中文
A novel overlapping minimization SMOTE algorithm for imbalanced classification 用于不平衡分类的新型重叠最小化 SMOTE 算法
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-09-05 DOI: 10.1631/fitee.2300278
Yulin He, Xuan Lu, Philippe Fournier-Viger, Joshua Zhexue Huang

The synthetic minority oversampling technique (SMOTE) is a popular algorithm to reduce the impact of class imbalance in building classifiers, and has received several enhancements over the past 20 years. SMOTE and its variants synthesize a number of minority-class sample points in the original sample space to alleviate the adverse effects of class imbalance. This approach works well in many cases, but problems arise when synthetic sample points are generated in overlapping areas between different classes, which further complicates classifier training. To address this issue, this paper proposes a novel generalization-oriented rather than imputation-oriented minority-class sample point generation algorithm, named overlapping minimization SMOTE (OM-SMOTE). This algorithm is designed specifically for binary imbalanced classification problems. OM-SMOTE first maps the original sample points into a new sample space by balancing sample encoding and classifier generalization. Then, OM-SMOTE employs a set of sophisticated minority-class sample point imputation rules to generate synthetic sample points that are as far as possible from overlapping areas between classes. Extensive experiments have been conducted on 32 imbalanced datasets to validate the effectiveness of OM-SMOTE. Results show that using OM-SMOTE to generate synthetic minority-class sample points leads to better classifier training performances for the naive Bayes, support vector machine, decision tree, and logistic regression classifiers than the 11 state-of-the-art SMOTE-based imputation algorithms. This demonstrates that OM-SMOTE is a viable approach for supporting the training of high-quality classifiers for imbalanced classification. The implementation of OM-SMOTE is shared publicly on the GitHub platform at https://github.com/luxuan123123/OM-SMOTE/.

合成少数群体过度采样技术(SMOTE)是一种在构建分类器时减少类不平衡影响的流行算法,在过去的 20 年中得到了多次改进。SMOTE 及其变体在原始样本空间中合成了一些少数类样本点,以减轻类不平衡的不利影响。这种方法在很多情况下都很有效,但当合成样本点产生于不同类别之间的重叠区域时,就会出现问题,从而使分类器训练变得更加复杂。为了解决这个问题,本文提出了一种新颖的面向泛化而非面向估算的少数类样本点生成算法,命名为重叠最小化 SMOTE(OM-SMOTE)。该算法专为二元不平衡分类问题而设计。OM-SMOTE 首先通过平衡样本编码和分类器泛化,将原始样本点映射到一个新的样本空间。然后,OM-SMOTE 采用一套复杂的少数类样本点估算规则,生成尽可能远离类间重叠区域的合成样本点。为了验证 OM-SMOTE 的有效性,我们在 32 个不平衡数据集上进行了广泛的实验。结果表明,使用 OM-SMOTE 生成合成少数类样本点,与 11 种最先进的基于 SMOTE 的归因算法相比,能为天真贝叶斯、支持向量机、决策树和逻辑回归分类器带来更好的分类器训练性能。这表明,OM-SMOTE 是支持不平衡分类的高质量分类器训练的可行方法。OM-SMOTE 的实现在 GitHub 平台上公开共享,网址为 https://github.com/luxuan123123/OM-SMOTE/。
{"title":"A novel overlapping minimization SMOTE algorithm for imbalanced classification","authors":"Yulin He, Xuan Lu, Philippe Fournier-Viger, Joshua Zhexue Huang","doi":"10.1631/fitee.2300278","DOIUrl":"https://doi.org/10.1631/fitee.2300278","url":null,"abstract":"<p>The synthetic minority oversampling technique (SMOTE) is a popular algorithm to reduce the impact of class imbalance in building classifiers, and has received several enhancements over the past 20 years. SMOTE and its variants synthesize a number of minority-class sample points in the original sample space to alleviate the adverse effects of class imbalance. This approach works well in many cases, but problems arise when synthetic sample points are generated in overlapping areas between different classes, which further complicates classifier training. To address this issue, this paper proposes a novel generalization-oriented rather than imputation-oriented minority-class sample point generation algorithm, named overlapping minimization SMOTE (OM-SMOTE). This algorithm is designed specifically for binary imbalanced classification problems. OM-SMOTE first maps the original sample points into a new sample space by balancing sample encoding and classifier generalization. Then, OM-SMOTE employs a set of sophisticated minority-class sample point imputation rules to generate synthetic sample points that are as far as possible from overlapping areas between classes. Extensive experiments have been conducted on 32 imbalanced datasets to validate the effectiveness of OM-SMOTE. Results show that using OM-SMOTE to generate synthetic minority-class sample points leads to better classifier training performances for the naive Bayes, support vector machine, decision tree, and logistic regression classifiers than the 11 state-of-the-art SMOTE-based imputation algorithms. This demonstrates that OM-SMOTE is a viable approach for supporting the training of high-quality classifiers for imbalanced classification. The implementation of OM-SMOTE is shared publicly on the GitHub platform at https://github.com/luxuan123123/OM-SMOTE/.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"142 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-triggered distributed cross-dimensional formation control for heterogeneous multi-agent systems 异构多代理系统的事件触发分布式跨维编队控制
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300627
Huimin Wei, Chen Peng, Min Zhao

This paper concerns the event-triggered distributed cross-dimensional formation control problem of heterogeneous multi-agent systems (HMASs) subject to limited network resources. The central aim is to design an effective distributed formation control scheme that will achieve the desired formation control objectives even in the presence of restricted communication. Consequently, a multi-dimensional HMAS is first developed, where a group of agents are assigned to several subgroups based on their dimensions. Then, to mitigate the excessive consumption of communication resources, a cross-dimensional event-triggered communication mechanism is designed to reduce the information interaction among agents with different dimensions. Under the proposed event-based communication mechanism, the problem of HMAS cross-dimensional formation control is transformed into the asymptotic stability problem of a closed-loop error system. Furthermore, several stability criteria for designing a cross-dimensional formation control protocol and communication schedule are presented in an environment where there is no information interaction among follower agents. Finally, a simulation case study is provided to validate the effectiveness of the proposed formation control protocol.

本文涉及网络资源有限的异构多代理系统(HMAS)的事件触发分布式跨维编队控制问题。其核心目标是设计一种有效的分布式编队控制方案,即使在通信受限的情况下也能实现预期的编队控制目标。因此,首先开发了一种多维 HMAS,其中一组代理根据其维度被分配到多个子组。然后,为了减少通信资源的过度消耗,设计了一种跨维度的事件触发通信机制,以减少不同维度的代理之间的信息交互。在所提出的基于事件的通信机制下,HMAS 跨维编队控制问题被转化为闭环误差系统的渐近稳定性问题。此外,在跟随者之间不存在信息交互的环境下,提出了设计跨维编队控制协议和通信时间表的几种稳定性标准。最后,提供了一个仿真案例研究,以验证所提编队控制协议的有效性。
{"title":"Event-triggered distributed cross-dimensional formation control for heterogeneous multi-agent systems","authors":"Huimin Wei, Chen Peng, Min Zhao","doi":"10.1631/fitee.2300627","DOIUrl":"https://doi.org/10.1631/fitee.2300627","url":null,"abstract":"<p>This paper concerns the event-triggered distributed cross-dimensional formation control problem of heterogeneous multi-agent systems (HMASs) subject to limited network resources. The central aim is to design an effective distributed formation control scheme that will achieve the desired formation control objectives even in the presence of restricted communication. Consequently, a multi-dimensional HMAS is first developed, where a group of agents are assigned to several subgroups based on their dimensions. Then, to mitigate the excessive consumption of communication resources, a cross-dimensional event-triggered communication mechanism is designed to reduce the information interaction among agents with different dimensions. Under the proposed event-based communication mechanism, the problem of HMAS cross-dimensional formation control is transformed into the asymptotic stability problem of a closed-loop error system. Furthermore, several stability criteria for designing a cross-dimensional formation control protocol and communication schedule are presented in an environment where there is no information interaction among follower agents. Finally, a simulation case study is provided to validate the effectiveness of the proposed formation control protocol.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"126 3 Pt 1 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review on the developments and space applications of mid- and long-wavelength infrared detection technologies 中长波红外探测技术的发展和空间应用综述
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300218
Yuying Wang, Jindong Li, Hezhi Sun, Xiang Li

Mid-wavelength infrared (MWIR) detection and long-wavelength infrared (LWIR) detection constitute the key technologies for space-based Earth observation and astronomical detection. The advanced ability of infrared (IR) detection technology to penetrate the atmosphere and identify the camouflaged targets makes it excellent for space-based remote sensing. Thus, such detectors play an essential role in detecting and tracking low-temperature and far-distance moving targets. However, due to the diverse scenarios in which space-based IR detection systems are built, the key parameters of IR technologies are subject to unique demands. We review the developments and features of MWIR and LWIR detectors with a particular focus on their applications in space-based detection. We conduct a comprehensive analysis of key performance indicators for IR detection systems, including the ground sampling distance (GSD), operation range, and noise equivalent temperature difference (NETD) among others, and their interconnections with IR detector parameters. Additionally, the influences of pixel distance, focal plane array size, and operation temperature of space-based IR remote sensing are evaluated. The development requirements and technical challenges of MWIR and LWIR detection systems are also identified to achieve high-quality space-based observation platforms.

中波红外(MWIR)探测和长波红外(LWIR)探测是天基地球观测和天文探测的关键技术。红外探测技术具有穿透大气层和识别伪装目标的先进能力,是天基遥感的绝佳技术。因此,这类探测器在探测和跟踪低温和远距离移动目标方面发挥着至关重要的作用。然而,由于天基红外探测系统的应用场景多种多样,因此对红外技术的关键参数有着独特的要求。我们回顾了中波红外和低波红外探测器的发展和特点,尤其关注它们在天基探测中的应用。我们全面分析了红外探测系统的关键性能指标,包括地面采样距离(GSD)、工作范围和噪声等效温差(NETD)等,以及它们与红外探测器参数之间的相互关系。此外,还评估了天基红外遥感的像素距离、焦平面阵列尺寸和工作温度的影响。还确定了中波红外和低波红外探测系统的开发要求和技术挑战,以实现高质量的天基观测平台。
{"title":"A review on the developments and space applications of mid- and long-wavelength infrared detection technologies","authors":"Yuying Wang, Jindong Li, Hezhi Sun, Xiang Li","doi":"10.1631/fitee.2300218","DOIUrl":"https://doi.org/10.1631/fitee.2300218","url":null,"abstract":"<p>Mid-wavelength infrared (MWIR) detection and long-wavelength infrared (LWIR) detection constitute the key technologies for space-based Earth observation and astronomical detection. The advanced ability of infrared (IR) detection technology to penetrate the atmosphere and identify the camouflaged targets makes it excellent for space-based remote sensing. Thus, such detectors play an essential role in detecting and tracking low-temperature and far-distance moving targets. However, due to the diverse scenarios in which space-based IR detection systems are built, the key parameters of IR technologies are subject to unique demands. We review the developments and features of MWIR and LWIR detectors with a particular focus on their applications in space-based detection. We conduct a comprehensive analysis of key performance indicators for IR detection systems, including the ground sampling distance (GSD), operation range, and noise equivalent temperature difference (NETD) among others, and their interconnections with IR detector parameters. Additionally, the influences of pixel distance, focal plane array size, and operation temperature of space-based IR remote sensing are evaluated. The development requirements and technical challenges of MWIR and LWIR detection systems are also identified to achieve high-quality space-based observation platforms.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"37 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example 以美团为例:检测电商平台因电话号码回收而导致的账户泄露
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300291
Min Gao, Shutong Chen, Yangbo Gao, Zhenhua Zhang, Yu Chen, Yupeng Li, Qiongzan Ye, Xin Wang, Yang Chen

Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account with which the number is associated, and may perform fraudulent activities. Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users. Thus, alternative solutions that depend on only the information of the applications are imperative. In this work, we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers. Our analysis on Meituan’s real-world dataset shows that compromised accounts have unique statistical features and temporal patterns. Based on the observations, we propose a novel model called temporal pattern and statistical feature fusion model (TSF) to tackle the problem, which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features. Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines, demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.

电话号码回收(PNR)是指移动运营商回收已停机号码并将其重新分配给新机主的行为。它对电子商务平台现有身份验证解决方案的可靠性构成了威胁。具体来说,重新分配号码的新机主可以访问与该号码关联的应用账户,并可能进行欺诈活动。对于拥有大量用户的电子商务平台来说,采用移动运营商重新分配号码数据库的现有解决方案成本高昂。因此,只依赖应用程序信息的替代解决方案势在必行。在这项工作中,我们研究了检测因电话号码重新分配而泄露的账户的问题。我们对美团真实数据集的分析表明,被泄露的账户具有独特的统计特征和时间模式。基于这些观察结果,我们提出了一种名为 "时间模式与统计特征融合模型(TSF)"的新模型来解决这一问题,该模型集成了时间模式编码器和统计特征编码器,以捕捉行为演化交互和重要操作特征。在美团和 IEEE-CIS 数据集上进行的大量实验表明,TSF 的性能明显优于基线模型,这证明了它在检测因重新分配号码而受损的账户方面的有效性。
{"title":"Detecting compromised accounts caused by phone number recycling on e-commerce platforms: taking Meituan as an example","authors":"Min Gao, Shutong Chen, Yangbo Gao, Zhenhua Zhang, Yu Chen, Yupeng Li, Qiongzan Ye, Xin Wang, Yang Chen","doi":"10.1631/fitee.2300291","DOIUrl":"https://doi.org/10.1631/fitee.2300291","url":null,"abstract":"<p>Phone number recycling (PNR) refers to the event wherein a mobile operator collects a disconnected number and reassigns it to a new owner. It has posed a threat to the reliability of the existing authentication solution for e-commerce platforms. Specifically, a new owner of a reassigned number can access the application account with which the number is associated, and may perform fraudulent activities. Existing solutions that employ a reassigned number database from mobile operators are costly for e-commerce platforms with large-scale users. Thus, alternative solutions that depend on only the information of the applications are imperative. In this work, we study the problem of detecting accounts that have been compromised owing to the reassignment of phone numbers. Our analysis on Meituan’s real-world dataset shows that compromised accounts have unique statistical features and temporal patterns. Based on the observations, we propose a novel model called temporal pattern and statistical feature fusion model (TSF) to tackle the problem, which integrates a temporal pattern encoder and a statistical feature encoder to capture behavioral evolutionary interaction and significant operation features. Extensive experiments on the Meituan and IEEE-CIS datasets show that TSF significantly outperforms the baselines, demonstrating its effectiveness in detecting compromised accounts due to reassigned numbers.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"274 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient online histogram publication method for data streams with local differential privacy 针对具有局部差分隐私的数据流的高效在线直方图发布方法
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300368
Tao Tao, Funan Zhang, Xiujun Wang, Xiao Zheng, Xin Zhao

Many areas are now experiencing data streams that contain privacy-sensitive information. Although the sharing and release of these data are of great commercial value, if these data are released directly, the private user information in the data will be disclosed. Therefore, how to continuously generate publishable histograms (meeting privacy protection requirements) based on sliding data stream windows has become a critical issue, especially when sending data to an untrusted third party. Existing histogram publication methods are unsatisfactory in terms of time and storage costs, because they must cache all elements in the current sliding window (SW). Our work addresses this drawback by designing an efficient online histogram publication (EOHP) method for local differential privacy data streams. Specifically, in the EOHP method, the data collector first crafts a histogram of the current SW using an approximate counting method. Second, the data collector reduces the privacy budget by using the optimized budget absorption mechanism and adds appropriate noise to the approximate histogram, making it possible to publish the histogram while retaining satisfactory data utility. Extensive experimental results on two different real datasets show that the EOHP algorithm significantly reduces the time and storage costs and improves data utility compared to other existing algorithms.

目前,许多领域都出现了包含隐私敏感信息的数据流。虽然这些数据的共享和发布具有很大的商业价值,但如果直接发布这些数据,数据中的用户隐私信息就会泄露。因此,如何在滑动数据流窗口的基础上连续生成可发布的直方图(满足隐私保护要求)已成为一个关键问题,尤其是在将数据发送给不受信任的第三方时。现有的直方图发布方法必须缓存当前滑动窗口(SW)中的所有元素,因此在时间和存储成本方面都不能令人满意。我们的工作通过为本地差分隐私数据流设计一种高效的在线直方图发布(EOHP)方法来解决这一缺点。具体来说,在 EOHP 方法中,数据收集器首先使用近似计数法制作当前 SW 的直方图。其次,数据收集器利用优化的预算吸收机制减少隐私预算,并在近似直方图中添加适当的噪声,从而在发布直方图的同时保留令人满意的数据效用。在两个不同真实数据集上的大量实验结果表明,与其他现有算法相比,EOHP 算法大大降低了时间和存储成本,提高了数据效用。
{"title":"An efficient online histogram publication method for data streams with local differential privacy","authors":"Tao Tao, Funan Zhang, Xiujun Wang, Xiao Zheng, Xin Zhao","doi":"10.1631/fitee.2300368","DOIUrl":"https://doi.org/10.1631/fitee.2300368","url":null,"abstract":"<p>Many areas are now experiencing data streams that contain privacy-sensitive information. Although the sharing and release of these data are of great commercial value, if these data are released directly, the private user information in the data will be disclosed. Therefore, how to continuously generate publishable histograms (meeting privacy protection requirements) based on sliding data stream windows has become a critical issue, especially when sending data to an untrusted third party. Existing histogram publication methods are unsatisfactory in terms of time and storage costs, because they must cache all elements in the current sliding window (SW). Our work addresses this drawback by designing an efficient online histogram publication (EOHP) method for local differential privacy data streams. Specifically, in the EOHP method, the data collector first crafts a histogram of the current SW using an approximate counting method. Second, the data collector reduces the privacy budget by using the optimized budget absorption mechanism and adds appropriate noise to the approximate histogram, making it possible to publish the histogram while retaining satisfactory data utility. Extensive experimental results on two different real datasets show that the EOHP algorithm significantly reduces the time and storage costs and improves data utility compared to other existing algorithms.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"72 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event-triggered adaptive tracking control of a class of nonlinear systems with asymmetric time-varying output constraints 具有非对称时变输出约束的一类非线性系统的事件触发自适应跟踪控制
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300679
Yitao Yang, Lidong Zhang

This article investigates the event-triggered adaptive neural network (NN) tracking control problem with deferred asymmetric time-varying (DATV) output constraints. To deal with the DATV output constraints, an asymmetric time-varying barrier Lyapunov function (ATBLF) is first built to make the stability analysis and the controller construction simpler. Second, an event-triggered adaptive NN tracking controller is constructed by incorporating an error-shifting function, which ensures that the tracking error converges to an arbitrarily small neighborhood of the origin within a predetermined settling time, consequently optimizing the utilization of network resources. It is theoretically proven that all signals in the closed-loop system are semi-globally uniformly ultimately bounded (SGUUB), while the initial value is outside the constraint boundary. Finally, a single-link robotic arm (SLRA) application example is employed to verify the viability of the acquired control algorithm.

本文研究了具有延迟非对称时变(DATV)输出约束的事件触发自适应神经网络(NN)跟踪控制问题。为了处理 DATV 输出约束,首先建立了非对称时变势垒 Lyapunov 函数 (ATBLF),使稳定性分析和控制器构建变得更简单。其次,通过加入误差转移函数,构建了事件触发自适应 NN 跟踪控制器,确保跟踪误差在预定的沉降时间内收敛到原点的任意小邻域,从而优化网络资源的利用。理论证明,闭环系统中的所有信号都是半全局均匀最终有界(SGUUB)的,而初始值在约束边界之外。最后,以单链机械臂(SLRA)应用为例,验证了所获控制算法的可行性。
{"title":"Event-triggered adaptive tracking control of a class of nonlinear systems with asymmetric time-varying output constraints","authors":"Yitao Yang, Lidong Zhang","doi":"10.1631/fitee.2300679","DOIUrl":"https://doi.org/10.1631/fitee.2300679","url":null,"abstract":"<p>This article investigates the event-triggered adaptive neural network (NN) tracking control problem with deferred asymmetric time-varying (DATV) output constraints. To deal with the DATV output constraints, an asymmetric time-varying barrier Lyapunov function (ATBLF) is first built to make the stability analysis and the controller construction simpler. Second, an event-triggered adaptive NN tracking controller is constructed by incorporating an error-shifting function, which ensures that the tracking error converges to an arbitrarily small neighborhood of the origin within a predetermined settling time, consequently optimizing the utilization of network resources. It is theoretically proven that all signals in the closed-loop system are semi-globally uniformly ultimately bounded (SGUUB), while the initial value is outside the constraint boundary. Finally, a single-link robotic arm (SLRA) application example is employed to verify the viability of the acquired control algorithm.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"13 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low-profile dual-broadband dual-circularly-polarized reflectarray for K-/Ka-band space applications 用于 K-/Ka 波段空间应用的低剖面双宽带双圆极化反射阵列
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300214
Xuanfeng Tong, Zhi Hao Jiang, Yuan Li, Fan Wu, Lin Peng, Taiwei Yue, Wei Hong

A low-profile dual-broadband dual-circularly-polarized (dual-CP) reflectarray (RA) is proposed and demonstrated, supporting independent beamforming for right-/left-handed CP waves at both K-band and Ka-band. Such functionality is achieved by incorporating multi-layered phase shifting elements individually operating in the K- and Ka-band, which are then interleaved in a shared aperture, resulting in a cell thickness of only about 0.1λL. By rotating the designed K- and Ka-band elements around their own geometrical centers, the dual-CP waves in each band can be modulated separately. To reduce the overall profile, planar K-/Ka-band dual-CP feeds with a broad band are designed based on the magnetoelectric dipoles and multi-branch hybrid couplers. The planar feeds achieve bandwidths of about 32% and 26% at K- and Ka-band respectively with reflection magnitudes below −13 dB, an axial ratio smaller than 2 dB, and a gain variation of less than 1 dB. A proof-of-concept dual-band dual-CP RA integrated with the planar feeds is fabricated and characterized which is capable of generating asymmetrically distributed dual-band dual-CP beams. The measured peak gain values of the beams are around 24.3 and 27.3 dBic, with joint gain variation <1 dB and axial ratio <2 dB bandwidths wider than 20.6% and 14.6% at the lower and higher bands, respectively. The demonstrated dual-broadband dual-CP RA with four degrees of freedom of beamforming could be a promising candidate for space and satellite communications.

本文提出并演示了一种低调的双宽带双圆极化(dual-CP)反射阵列(RA),支持 K 波段和 Ka 波段左右手 CP 波的独立波束成形。实现这种功能的方法是在 K 波段和 Ka 波段中分别加入多层移相元件,然后在共享孔径中交错排列,从而使单元厚度仅为 0.1λL 左右。通过围绕各自的几何中心旋转所设计的 K 波段和 Ka 波段元件,可以分别调制每个波段的双 CP 波。为了减小整体轮廓,我们设计了基于磁电偶极子和多分支混合耦合器的宽带平面 K-/Ka 波段双 CP 馈源。平面馈电在 K 波段和 Ka 波段的带宽分别达到约 32% 和 26%,反射幅度低于 -13 dB,轴向比小于 2 dB,增益变化小于 1 dB。与平面馈源集成的双波段双 CP RA 的概念验证已经制作完成,并进行了表征,它能够产生非对称分布的双波段双 CP 波束。测得的波束峰值增益约为 24.3 和 27.3 dBic,低频段和高频段的联合增益变化<1 dB 和轴向比<2 dB 带宽分别大于 20.6% 和 14.6%。所展示的具有四个波束成形自由度的双宽带双 CP RA 有望成为空间和卫星通信的理想选择。
{"title":"A low-profile dual-broadband dual-circularly-polarized reflectarray for K-/Ka-band space applications","authors":"Xuanfeng Tong, Zhi Hao Jiang, Yuan Li, Fan Wu, Lin Peng, Taiwei Yue, Wei Hong","doi":"10.1631/fitee.2300214","DOIUrl":"https://doi.org/10.1631/fitee.2300214","url":null,"abstract":"<p>A low-profile dual-broadband dual-circularly-polarized (dual-CP) reflectarray (RA) is proposed and demonstrated, supporting independent beamforming for right-/left-handed CP waves at both K-band and Ka-band. Such functionality is achieved by incorporating multi-layered phase shifting elements individually operating in the K- and Ka-band, which are then interleaved in a shared aperture, resulting in a cell thickness of only about 0.1<i>λ</i><sub>L</sub>. By rotating the designed K- and Ka-band elements around their own geometrical centers, the dual-CP waves in each band can be modulated separately. To reduce the overall profile, planar K-/Ka-band dual-CP feeds with a broad band are designed based on the magnetoelectric dipoles and multi-branch hybrid couplers. The planar feeds achieve bandwidths of about 32% and 26% at K- and Ka-band respectively with reflection magnitudes below −13 dB, an axial ratio smaller than 2 dB, and a gain variation of less than 1 dB. A proof-of-concept dual-band dual-CP RA integrated with the planar feeds is fabricated and characterized which is capable of generating asymmetrically distributed dual-band dual-CP beams. The measured peak gain values of the beams are around 24.3 and 27.3 dBic, with joint gain variation &lt;1 dB and axial ratio &lt;2 dB bandwidths wider than 20.6% and 14.6% at the lower and higher bands, respectively. The demonstrated dual-broadband dual-CP RA with four degrees of freedom of beamforming could be a promising candidate for space and satellite communications.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"18 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flocking fragmentation formulation for a multi-robot system under multi-hop and lossy ad hoc networks 多跳和有损特设网络下多机器人系统的成群分片方案
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-30 DOI: 10.1631/fitee.2300295
Silan Li, Shengyu Zhang, Tao Jiang

We investigate the impact of network topology characteristics on flocking fragmentation for a multi-robot system under a multi-hop and lossy ad hoc network, including the network’s hop count features and information’s successful transmission probability (STP). Specifically, we first propose a distributed communication–calculation–execution protocol to describe the practical interaction and control process in the ad hoc network based multi-robot system, where flocking control is realized by a discrete-time Olfati-Saber model incorporating STP-related variables. Then, we develop a fragmentation prediction model (FPM) to formulate the impact of hop count features on fragmentation for specific flocking scenarios. This model identifies the critical system and network features that are associated with fragmentation. Further considering general flocking scenarios affected by both hop count features and STP, we formulate the flocking fragmentation probability (FFP) by a data fitting model based on the back propagation neural network, whose input is extracted from the FPM. The FFP formulation quantifies the impact of key network topology characteristics on fragmentation phenomena. Simulation results verify the effectiveness and accuracy of the proposed prediction model and FFP formulation, and several guidelines for constructing the multi-robot ad hoc network are concluded.

我们研究了多跳、有损特设网络下网络拓扑特征对多机器人系统植群分裂的影响,包括网络的跳数特征和信息的成功传输概率(STP)。具体来说,我们首先提出了一种分布式通信-计算-执行协议,以描述基于 ad hoc 网络的多机器人系统的实际交互和控制过程,其中植群控制是通过一个包含 STP 相关变量的离散时间 Olfati-Saber 模型来实现的。然后,我们开发了一个碎片预测模型(FPM),以制定特定成群情况下跳数特征对碎片的影响。该模型确定了与分片相关的关键系统和网络特征。考虑到受跳数特征和 STP 影响的一般成群情况,我们通过基于反向传播神经网络的数据拟合模型来计算成群分裂概率(FFP),该模型的输入是从 FPM 中提取的。FFP 公式量化了关键网络拓扑特征对分片现象的影响。仿真结果验证了所提出的预测模型和 FFP 公式的有效性和准确性,并总结出构建多机器人特设网络的若干指导原则。
{"title":"Flocking fragmentation formulation for a multi-robot system under multi-hop and lossy ad hoc networks","authors":"Silan Li, Shengyu Zhang, Tao Jiang","doi":"10.1631/fitee.2300295","DOIUrl":"https://doi.org/10.1631/fitee.2300295","url":null,"abstract":"<p>We investigate the impact of network topology characteristics on flocking fragmentation for a multi-robot system under a multi-hop and lossy ad hoc network, including the network’s hop count features and information’s successful transmission probability (STP). Specifically, we first propose a distributed communication–calculation–execution protocol to describe the practical interaction and control process in the ad hoc network based multi-robot system, where flocking control is realized by a discrete-time Olfati-Saber model incorporating STP-related variables. Then, we develop a fragmentation prediction model (FPM) to formulate the impact of hop count features on fragmentation for specific flocking scenarios. This model identifies the critical system and network features that are associated with fragmentation. Further considering general flocking scenarios affected by both hop count features and STP, we formulate the flocking fragmentation probability (FFP) by a data fitting model based on the back propagation neural network, whose input is extracted from the FPM. The FFP formulation quantifies the impact of key network topology characteristics on fragmentation phenomena. Simulation results verify the effectiveness and accuracy of the proposed prediction model and FFP formulation, and several guidelines for constructing the multi-robot ad hoc network are concluded.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"159 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithm for 3D point cloud steganalysis based on composite operator feature enhancement 基于复合算子特征增强的三维点云隐写分析算法
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-28 DOI: 10.1631/fitee.2400360
Shuai Ren, Hao Gong, Suya Zheng

Three-dimensional (3D) point cloud information hiding algorithms are mainly concentrated in the spatial domain. Existing spatial domain steganalysis algorithms are subject to more disturbing factors during the analysis and detection process, and can only be applied to 3D mesh objects, so there is a lack of steganalysis algorithms for 3D point cloud objects. To change the fact that steganalysis is limited to 3D mesh and eliminate the redundant features in the 3D mesh steganalysis feature set, we propose a 3D point cloud steganalysis algorithm based on composite operator feature enhancement. First, the 3D point cloud is normalized and smoothed. Second, the feature points that may contain secret information in 3D point clouds and their neighboring points are extracted as the feature enhancement region by the improved 3DHarris-ISS composite operator. Feature enhancement is performed in the feature enhancement region to form a feature-enhanced 3D point cloud, which highlights the feature points while suppressing the interference created by the rest of the vertices. Third, the existing 3D mesh feature set is screened to reduce the data redundancy of more relevant features, and the newly proposed local neighborhood feature set is added to the screened feature set to form the 3D point cloud steganography feature set POINT72. Finally, the steganographic features are extracted from the enhanced 3D point cloud using the POINT72 feature set, and steganalysis experiments are carried out. Experimental analysis shows that the algorithm can accurately analyze the 3D point cloud’s spatial steganography and determine whether the 3D point cloud contains hidden information, so the accuracy of 3D point cloud steganalysis, under the prerequisite of missing edge and face information, is close to that of the existing 3D mesh steganalysis algorithms.

三维(3D)点云信息隐藏算法主要集中在空间域。现有的空间域隐分析算法在分析检测过程中受到的干扰因素较多,且只能应用于三维网格对象,因此缺乏针对三维点云对象的隐分析算法。为了改变隐分析仅限于三维网格的现状,消除三维网格隐分析特征集中的冗余特征,我们提出了一种基于复合算子特征增强的三维点云隐分析算法。首先,对三维点云进行归一化和平滑处理。其次,通过改进的 3DHarris-ISS 复合算子提取三维点云中可能包含秘密信息的特征点及其邻近点作为特征增强区域。在特征增强区域内进行特征增强,形成特征增强三维点云,突出特征点,同时抑制其他顶点产生的干扰。第三,对现有的三维网格特征集进行筛选,以减少更多相关特征的数据冗余,并将新提出的局部邻域特征集添加到筛选后的特征集中,形成三维点云隐写特征集 POINT72。最后,利用 POINT72 特征集从增强的三维点云中提取隐写特征,并进行隐写分析实验。实验分析表明,该算法能准确分析三维点云的空间隐写术,并判断三维点云是否包含隐藏信息,因此在缺失边缘信息和人脸信息的前提下,三维点云隐写分析的准确性接近于现有的三维网格隐写分析算法。
{"title":"Algorithm for 3D point cloud steganalysis based on composite operator feature enhancement","authors":"Shuai Ren, Hao Gong, Suya Zheng","doi":"10.1631/fitee.2400360","DOIUrl":"https://doi.org/10.1631/fitee.2400360","url":null,"abstract":"<p>Three-dimensional (3D) point cloud information hiding algorithms are mainly concentrated in the spatial domain. Existing spatial domain steganalysis algorithms are subject to more disturbing factors during the analysis and detection process, and can only be applied to 3D mesh objects, so there is a lack of steganalysis algorithms for 3D point cloud objects. To change the fact that steganalysis is limited to 3D mesh and eliminate the redundant features in the 3D mesh steganalysis feature set, we propose a 3D point cloud steganalysis algorithm based on composite operator feature enhancement. First, the 3D point cloud is normalized and smoothed. Second, the feature points that may contain secret information in 3D point clouds and their neighboring points are extracted as the feature enhancement region by the improved 3DHarris-ISS composite operator. Feature enhancement is performed in the feature enhancement region to form a feature-enhanced 3D point cloud, which highlights the feature points while suppressing the interference created by the rest of the vertices. Third, the existing 3D mesh feature set is screened to reduce the data redundancy of more relevant features, and the newly proposed local neighborhood feature set is added to the screened feature set to form the 3D point cloud steganography feature set POINT72. Finally, the steganographic features are extracted from the enhanced 3D point cloud using the POINT72 feature set, and steganalysis experiments are carried out. Experimental analysis shows that the algorithm can accurately analyze the 3D point cloud’s spatial steganography and determine whether the 3D point cloud contains hidden information, so the accuracy of 3D point cloud steganalysis, under the prerequisite of missing edge and face information, is close to that of the existing 3D mesh steganalysis algorithms.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"8 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing 具有增强型端口间缓冲区共享功能的面向流量的可重构 NoC
IF 3 3区 工程技术 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-08-16 DOI: 10.1631/fitee.2300458
Chenglong Sun, Yiming Ouyang, Huaguo Liang

As the number of cores in a multicore system increases, the communication pressure on the interconnection network also increases. The network-on-chip (NoC) architecture is expected to take on the ever-expanding communication demands triggered by the ever-increasing number of cores. The communication behavior of the NoC architecture exhibits significant spatial-temporal variation, posing a considerable challenge for NoC reconfiguration. In this paper, we propose a traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing to adapt to the varying traffic flows with a high flexibility. First, a modified input port is introduced to support buffer sharing between adjacent ports. Specifically, the modified input port can be dynamically reconfigured to react to on-demand traffic. Second, it is ascertained that a centralized output-oriented buffer management works well with the reconfigurable input ports. Finally, this reconfiguration method can be implemented with a low overhead hardware design without imposing a great burden on the system implementation. The experimental results show that compared to other proposals, the proposed NoC architecture can greatly reduce the packet latency and improve the saturation throughput, without incurring significant area and power overhead.

随着多核系统内核数量的增加,互连网络的通信压力也随之增大。片上网络(NoC)架构有望承担因内核数量不断增加而引发的不断扩大的通信需求。NoC 架构的通信行为呈现出显著的时空变化,给 NoC 的重新配置带来了巨大挑战。在本文中,我们提出了一种面向流量的可重构 NoC,它具有增强的端口间缓冲区共享功能,能以高度的灵活性适应不断变化的流量。首先,我们引入了一个修改过的输入端口,以支持相邻端口之间的缓冲区共享。具体来说,修改后的输入端口可以动态地重新配置,以应对按需流量。其次,可以确定面向输出的集中式缓冲区管理与可重新配置的输入端口配合得很好。最后,这种重新配置方法可以通过低开销的硬件设计来实现,不会给系统实现带来很大负担。实验结果表明,与其他方案相比,所提出的 NoC 架构可以大大降低数据包延迟并提高饱和吞吐量,同时不会产生显著的面积和功耗开销。
{"title":"Traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing","authors":"Chenglong Sun, Yiming Ouyang, Huaguo Liang","doi":"10.1631/fitee.2300458","DOIUrl":"https://doi.org/10.1631/fitee.2300458","url":null,"abstract":"<p>As the number of cores in a multicore system increases, the communication pressure on the interconnection network also increases. The network-on-chip (NoC) architecture is expected to take on the ever-expanding communication demands triggered by the ever-increasing number of cores. The communication behavior of the NoC architecture exhibits significant spatial-temporal variation, posing a considerable challenge for NoC reconfiguration. In this paper, we propose a traffic-oriented reconfigurable NoC with augmented inter-port buffer sharing to adapt to the varying traffic flows with a high flexibility. First, a modified input port is introduced to support buffer sharing between adjacent ports. Specifically, the modified input port can be dynamically reconfigured to react to on-demand traffic. Second, it is ascertained that a centralized output-oriented buffer management works well with the reconfigurable input ports. Finally, this reconfiguration method can be implemented with a low overhead hardware design without imposing a great burden on the system implementation. The experimental results show that compared to other proposals, the proposed NoC architecture can greatly reduce the packet latency and improve the saturation throughput, without incurring significant area and power overhead.</p>","PeriodicalId":12608,"journal":{"name":"Frontiers of Information Technology & Electronic Engineering","volume":"98 1","pages":""},"PeriodicalIF":3.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142215364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Frontiers of Information Technology & Electronic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1