首页 > 最新文献

Recent Advances in Electrical & Electronic Engineering最新文献

英文 中文
FOG-RPL: Fog Computing based Routing Protocol for IoT Networks Fog - rpl:基于雾计算的物联网网络路由协议
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-10 DOI: 10.2174/2352096516666230510125238
Ankit Verma, S. Deswal
The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network.The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function.The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters.The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.
物联网(IoT)被广泛使用,因为设备与互联网连接,提供可访问性,快速传输和更广泛的覆盖范围。物联网网络提供了广泛的连接,但由于有限的资源,如有限的功率和有限的带宽,找到共享信息的最佳路径是一个巨大的挑战。低功耗网络(RPL)的路由协议是标准协议,但它选择的是在繁忙网络中已经被选择的节点。将雾计算技术与RPL相结合,利用新的目标函数设计了fog -RPL协议,该协议是利用雾计算原理减少网络负载,并利用新的目标函数选择正确节点的最优路由协议。仿真和实验结果表明,FOG-RPL在改进和性能参数方面都取得了较好的效果。fog - rpl协议采用了雾计算原理和新的目标函数,性能分析表明,与现有的路由协议相比,fog - rpl协议的效率更高。
{"title":"FOG-RPL: Fog Computing based Routing Protocol for IoT Networks","authors":"Ankit Verma, S. Deswal","doi":"10.2174/2352096516666230510125238","DOIUrl":"https://doi.org/10.2174/2352096516666230510125238","url":null,"abstract":"\u0000\u0000The Internet of Things (IoT) is widely used because of the connectivity of devices with the Internet which provides accessibility, quick transmission, and broader coverage. IoT networks provide vast connectivity but finding the best path for sharing information is a big challenge because of limited resources like limited power and limited bandwidth. The routing protocol for low power lossy network (RPL) is standard protocol but it selects a node that has already been selected in a busty network.\u0000\u0000\u0000\u0000The fog computing technique is combined with RPL and the new objective function is used to design FOG-RPL which is the optimum routing protocol that reduces the network load using the fog computing principle and selects the right node using the new objective function.\u0000\u0000\u0000\u0000The simulation is performed and experimental results show that FOG-RPL gives better results in terms of improvement and in terms of performance parameters.\u0000\u0000\u0000\u0000The FOG-RPL protocol uses the fog computing principle with a new objective function and performance analysis shows that as compared to the existing routing protocol, it is more efficient.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"88 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91132249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent technique for moving object detection from problematic video captured through camera sensor 从摄像机传感器捕获的问题视频中检测运动目标的智能技术
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-10 DOI: 10.2174/2215083810666230510113140
D. Yadav, Sneha Mishra
The significant aim of the proposed work is to develop an adaptive method to compute the threshold during run-time and update it adaptively for each pixel in the testing phase. It classifies motion-oriented pixels from the scene for moving objects using background subtraction and enhances using post-processing.According to the huge demand for surveillance system, society is towards an intelligent video surveillance system that detects and track moving objects from video captured through a surveillance camera. So, it is very crucial and highly recommended throughout the globe in numerous domains such as video-based surveillance, healthcare, transportation, and many more. Practically, this research area faces lots of challenging issues such as illumination variation, cluttered background, camouflage, etc. So, this paper has developed an adaptive background subtraction method to handle such challenging problems.• To focus and study the problematic video data captured through the camera sensor.• To handle challenging issues available in real-time video scenes.• To develop a background subtraction method and update the background model adap-tively for moving object detection.The proposed method has been accomplished using the following sections: • Background model construction • Automatic generation of threshold • Background subtraction• Maintenance of background modelThe qualitative analysis of the proposed work is experimented with publicly available datasets and compared with considered state-of-the-art methods. In this work, library sequence (thermal data) of CDNET and other color video frame sequences Foreground aperture, Waving Tree and Camouflage are considered from Microsoft’s Wallflower. The quantitative values depicted in Table-1 this work demonstrate the better performance of the proposed method as compared to state-of-the-art methods. It also generates better outcomes and handles the problem of a dynamic environment and illumination variation.Currently, the world is demanding computer vision-based security and surveillance-based applications for society. This work has provided a method for the detection of moving information using an adaptive method of background subtraction approach for moving object detection in video scenes. The performance evaluation depicts better average results as compared to considered peer methods.
提出的工作的重要目的是开发一种自适应方法,在运行时计算阈值,并在测试阶段自适应地更新每个像素。它使用背景减法从场景中对运动对象的运动方向像素进行分类,并使用后处理进行增强。根据对监控系统的巨大需求,社会正朝着智能视频监控系统的方向发展,通过监控摄像头拍摄的视频来检测和跟踪运动物体。因此,在全球许多领域,如基于视频的监控、医疗保健、交通运输等领域,它是非常重要的,强烈推荐使用。在实际应用中,该研究领域面临着光照变化、背景杂乱、伪装等诸多难题。因此,本文提出了一种自适应背景减法来处理这类具有挑战性的问题。•关注和研究通过摄像头传感器捕获的有问题的视频数据。•在实时视频场景中处理具有挑战性的问题。•开发一种用于运动目标检测的背景减除方法,并自适应更新背景模型。所提出的方法已通过以下部分完成:•背景模型构建•阈值自动生成•背景减法•背景模型维护。对所提出的工作进行定性分析,并使用公开可用的数据集进行实验,并与考虑的最先进的方法进行比较。在本工作中,考虑了来自微软的Wallflower的前景光圈,波浪树和伪装的彩色视频帧序列CDNET库序列(热数据)和其他彩色视频帧序列。表1中描述的定量值表明,与最先进的方法相比,所提出的方法具有更好的性能。它还可以产生更好的结果,并处理动态环境和光照变化的问题。目前,世界对基于计算机视觉的安全和基于监视的社会应用的需求很大。本工作提供了一种检测运动信息的方法,使用自适应的背景减法方法检测视频场景中的运动物体。与考虑的同行方法相比,性能评估描述了更好的平均结果。
{"title":"Intelligent technique for moving object detection from problematic video captured through camera sensor","authors":"D. Yadav, Sneha Mishra","doi":"10.2174/2215083810666230510113140","DOIUrl":"https://doi.org/10.2174/2215083810666230510113140","url":null,"abstract":"\u0000\u0000The significant aim of the proposed work is to develop an adaptive method to compute the threshold during run-time and update it adaptively for each pixel in the testing phase. It classifies motion-oriented pixels from the scene for moving objects using background subtraction and enhances using post-processing.\u0000\u0000\u0000\u0000According to the huge demand for surveillance system, society is towards an intelligent video surveillance system that detects and track moving objects from video captured through a surveillance camera. So, it is very crucial and highly recommended throughout the globe in numerous domains such as video-based surveillance, healthcare, transportation, and many more. Practically, this research area faces lots of challenging issues such as illumination variation, cluttered background, camouflage, etc. So, this paper has developed an adaptive background subtraction method to handle such challenging problems.\u0000\u0000\u0000\u0000• To focus and study the problematic video data captured through the camera sensor.\u0000• To handle challenging issues available in real-time video scenes.\u0000• To develop a background subtraction method and update the background model adap-tively for moving object detection.\u0000\u0000\u0000\u0000The proposed method has been accomplished using the following sections: \u0000• Background model construction \u0000• Automatic generation of threshold \u0000• Background subtraction\u0000• Maintenance of background model\u0000\u0000\u0000\u0000The qualitative analysis of the proposed work is experimented with publicly available datasets and compared with considered state-of-the-art methods. In this work, library sequence (thermal data) of CDNET and other color video frame sequences Foreground aperture, Waving Tree and Camouflage are considered from Microsoft’s Wallflower. The quantitative values depicted in Table-1 this work demonstrate the better performance of the proposed method as compared to state-of-the-art methods. It also generates better outcomes and handles the problem of a dynamic environment and illumination variation.\u0000\u0000\u0000\u0000Currently, the world is demanding computer vision-based security and surveillance-based applications for society. This work has provided a method for the detection of moving information using an adaptive method of background subtraction approach for moving object detection in video scenes. The performance evaluation depicts better average results as compared to considered peer methods.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"55 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86409332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Surplus Force (torque) Control and Compensation of Electro hydraulic Load Simulator 电液负载模拟器剩余力(转矩)控制与补偿研究
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-05 DOI: 10.2174/2352096516666230505111206
Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu
The electro-hydraulic load simulator can simulate any force (torque) load required by the loaded object under test conditions, which greatly reduces the equipment development time and cost. However, the process of force loading inevitably creates a surplus force (torque). The existence of surplus force (torque) in the system will seriously interfere with the loading accuracy of the system and even damage the equipment in serious cases.In this paper, based on the research status of the suppression and compensation of the surplus force (torque) in the electro-hydraulic load simulator, the effective control strategies and methods to overcome the surplus force (torque) in the system are summarized.This paper analyzes the generation mechanism of the surplus force (torque), and summarizes the effective strategies to overcome the surplus force (torque) of the system in structural compensation and control compensation.Using the control method to compensate for the surplus force (torque) has the advantages of simple structure, convenient debugging, and strong universality. It is widely used in the electro-hydraulic load simulator to suppress the surplus force (torque).With the development of control theory, more and more control strategies and methods are applied to restrain and compensate for the surplus force (torque) in the electro-hydraulic load simulator, which not only restrains the surplus force (torque) in the system but also improves the loading accuracy and anti-interference.
电液负载模拟器可以模拟被加载对象在试验条件下所需的任何力(扭矩)负载,大大减少了设备的研制时间和成本。然而,力加载的过程不可避免地会产生多余的力(扭矩)。系统中存在多余的力(扭矩)会严重干扰系统的加载精度,严重时甚至会损坏设备。本文基于电液负载模拟器中剩余力(转矩)的抑制与补偿研究现状,总结了克服系统剩余力(转矩)的有效控制策略和方法。分析了系统剩余力(转矩)的产生机理,从结构补偿和控制补偿两方面总结了克服系统剩余力(转矩)的有效策略。采用该控制方法对多余力(转矩)进行补偿,结构简单,调试方便,通用性强。它广泛应用于电液负载模拟器中,以抑制多余的力(扭矩)。随着控制理论的发展,越来越多的控制策略和方法被用于抑制和补偿电液负载模拟器中的剩余力(转矩),既能抑制系统中的剩余力(转矩),又能提高加载精度和抗干扰性。
{"title":"Research on Surplus Force (torque) Control and Compensation of Electro hydraulic Load Simulator","authors":"Bing-Tuan Gao, Wei Zhang, Lin Zheng, Bin Xu","doi":"10.2174/2352096516666230505111206","DOIUrl":"https://doi.org/10.2174/2352096516666230505111206","url":null,"abstract":"\u0000\u0000The electro-hydraulic load simulator can simulate any force (torque) load required by the loaded object under test conditions, which greatly reduces the equipment development time and cost. However, the process of force loading inevitably creates a surplus force (torque). The existence of surplus force (torque) in the system will seriously interfere with the loading accuracy of the system and even damage the equipment in serious cases.\u0000\u0000\u0000\u0000In this paper, based on the research status of the suppression and compensation of the surplus force (torque) in the electro-hydraulic load simulator, the effective control strategies and methods to overcome the surplus force (torque) in the system are summarized.\u0000\u0000\u0000\u0000This paper analyzes the generation mechanism of the surplus force (torque), and summarizes the effective strategies to overcome the surplus force (torque) of the system in structural compensation and control compensation.\u0000\u0000\u0000\u0000Using the control method to compensate for the surplus force (torque) has the advantages of simple structure, convenient debugging, and strong universality. It is widely used in the electro-hydraulic load simulator to suppress the surplus force (torque).\u0000\u0000\u0000\u0000With the development of control theory, more and more control strategies and methods are applied to restrain and compensate for the surplus force (torque) in the electro-hydraulic load simulator, which not only restrains the surplus force (torque) in the system but also improves the loading accuracy and anti-interference.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"78 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77419527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APT Attack Detection of a New Power System Based on DPI-Transformer 基于dpi变压器的新型电力系统APT攻击检测
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-04 DOI: 10.2174/2352096516666230504111123
Yuancheng Li, Yazhuo Zhang
In recent years, the frequent occurrence of network security attacks in the power field has brought huge risks to the production, transmission, and supply of power systems, and Advanced Persistent Threat (APT) is a covert advanced network security attack, which has become one of the network security risks that cannot be ignored in the construction of new power systems.This study aims to resist the increasing risk of APT attacks in the construction of new power systems, this paper proposes an attack detection model based on Deep Packet Inspection (DPI) and TransformerFirstly, we extracted 606 traffic characteristics from the original traffic data through the extended CIC Flowmeter and used them all to train the Transformer network. Then, we used the DPI-Transformer model and traffic labels to perform feature analysis on the traffic data and finally obtained the APT-Score. If the APT-Score is greater than the threshold, the alarm module is triggered.By analyzing the headers and payloads of the network traffic in the APT-2020 dataset, the experimental results show that the detection accuracy of APT attacks by the DPI-Transformer detection model is significantly higher than that of the current mainstream APT attack detection algorithms.Combined with the characteristics of the new power system and APT attacks, this paper proposes an attack detection model DPI-Transformer, which proves that the model has greatly improved the detection accuracy.
近年来,电力领域网络安全攻击事件频发,给电力系统的生产、输电、供电带来了巨大的风险,而高级持续威胁(Advanced Persistent Threat, APT)是一种隐蔽的高级网络安全攻击,已成为新建电力系统建设中不可忽视的网络安全风险之一。为了抵御新型电力系统建设中日益增加的APT攻击风险,本文提出了一种基于深度包检测(Deep Packet Inspection, DPI)和Transformer的攻击检测模型。首先,通过扩展CIC流量计从原始流量数据中提取606个流量特征,并全部用于训练Transformer网络。然后,我们使用DPI-Transformer模型和交通标签对交通数据进行特征分析,最终得到APT-Score。如果APT-Score大于设置的阈值,则触发告警模块。通过分析APT-2020数据集中网络流量的报头和有效负载,实验结果表明,DPI-Transformer检测模型对APT攻击的检测精度明显高于目前主流的APT攻击检测算法。结合新型电力系统和APT攻击的特点,提出了一种DPI-Transformer攻击检测模型,实验证明该模型大大提高了检测精度。
{"title":"APT Attack Detection of a New Power System Based on DPI-Transformer","authors":"Yuancheng Li, Yazhuo Zhang","doi":"10.2174/2352096516666230504111123","DOIUrl":"https://doi.org/10.2174/2352096516666230504111123","url":null,"abstract":"\u0000\u0000In recent years, the frequent occurrence of network security attacks in the power field has brought huge risks to the production, transmission, and supply of power systems, and Advanced Persistent Threat (APT) is a covert advanced network security attack, which has become one of the network security risks that cannot be ignored in the construction of new power systems.\u0000\u0000\u0000\u0000This study aims to resist the increasing risk of APT attacks in the construction of new power systems, this paper proposes an attack detection model based on Deep Packet Inspection (DPI) and Transformer\u0000\u0000\u0000\u0000Firstly, we extracted 606 traffic characteristics from the original traffic data through the extended CIC Flowmeter and used them all to train the Transformer network. Then, we used the DPI-Transformer model and traffic labels to perform feature analysis on the traffic data and finally obtained the APT-Score. If the APT-Score is greater than the threshold, the alarm module is triggered.\u0000\u0000\u0000\u0000By analyzing the headers and payloads of the network traffic in the APT-2020 dataset, the experimental results show that the detection accuracy of APT attacks by the DPI-Transformer detection model is significantly higher than that of the current mainstream APT attack detection algorithms.\u0000\u0000\u0000\u0000Combined with the characteristics of the new power system and APT attacks, this paper proposes an attack detection model DPI-Transformer, which proves that the model has greatly improved the detection accuracy.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"33 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81884223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Objective Optimization in the Presence of OGIPFC using NSMMP Algorithm 基于NSMMP算法的OGIPFC多目标优化
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-04 DOI: 10.2174/2352096516666230504105054
Balasubbareddy Mallala, Venkata Prasad Papana, Kowstubha Palle
Customers expect quality, uninterrupted power with cost-effective electricity in the latest trend. However, outages, severe storms, old infrastructure, and cost pressures can lead to ambiguity in power generation and transmission. To improve line power transmission capability, the right flexible AC transmission systems (FACTS) device may save millions of dollars.In this study, a FACTS controller named Optimal Generalized Interline Power Flow Controller (OGIPFC) was developed. Furthermore, for optimization, the Modified Marine Predator Algorithm (MMPA), which is a modification of the recently developed Marine Predator Algorithm (MPA), was used. The optimum technique was used to evaluate a set of prioritized considered objective minimizations. A variety of factors must be maximized, such as generation cost, emissions, and power loss.The performance of the proposed algorithm was analysed on benchmark test functions, and then single objective optimization problems of standard IEEE-30 bus system were solved and compared with the existing algorithms. The proposed algorithm was restricted to solving the single objective problem only, so it was further implemented with non-dominating sorting to solve the multi-objective optimization problem. The proposed multi-objective version is named as Non-dominating Sorting Modified Marine Predator Algorithm (NSMMPA), and it was validated on benchmark test functions and the IEEE-30 bus system.Finally, the OPF problem was solved with the incorporation of OGIPFC using the proposed methods, which resulted in better solutions and made the system more effective in operation.
客户期望最新趋势的高质量、不间断的电力和高性价比的电力。然而,停电、严重的风暴、陈旧的基础设施和成本压力可能导致发电和输电的不确定性。为了提高线路输电能力,合适的灵活交流输电系统(FACTS)设备可以节省数百万美元。在本研究中,开发了一种称为最优广义线间潮流控制器(OGIPFC)的FACTS控制器。在此基础上,采用改进的海洋捕食者算法(MPA)进行优化。最优技术被用来评估一组优先考虑的目标最小化。必须最大化各种因素,如发电成本、排放和功率损失。在基准测试函数上分析了所提算法的性能,求解了标准IEEE-30总线系统的单目标优化问题,并与现有算法进行了比较。该算法仅局限于求解单目标问题,因此进一步采用非支配排序的方法求解多目标优化问题。提出的多目标版本被命名为非支配排序改进的海洋捕食者算法(NSMMPA),并在基准测试函数和IEEE-30总线系统上进行了验证。最后,利用所提出的方法结合OGIPFC解决了OPF问题,得到了更好的解决方案,提高了系统的运行效率。
{"title":"Multi-Objective Optimization in the Presence of OGIPFC using NSMMP Algorithm","authors":"Balasubbareddy Mallala, Venkata Prasad Papana, Kowstubha Palle","doi":"10.2174/2352096516666230504105054","DOIUrl":"https://doi.org/10.2174/2352096516666230504105054","url":null,"abstract":"\u0000\u0000Customers expect quality, uninterrupted power with cost-effective electricity in the latest trend. However, outages, severe storms, old infrastructure, and cost pressures can lead to ambiguity in power generation and transmission. To improve line power transmission capability, the right flexible AC transmission systems (FACTS) device may save millions of dollars.\u0000\u0000\u0000\u0000In this study, a FACTS controller named Optimal Generalized Interline Power Flow Controller (OGIPFC) was developed. Furthermore, for optimization, the Modified Marine Predator Algorithm (MMPA), which is a modification of the recently developed Marine Predator Algorithm (MPA), was used. The optimum technique was used to evaluate a set of prioritized considered objective minimizations. A variety of factors must be maximized, such as generation cost, emissions, and power loss.\u0000\u0000\u0000\u0000The performance of the proposed algorithm was analysed on benchmark test functions, and then single objective optimization problems of standard IEEE-30 bus system were solved and compared with the existing algorithms. The proposed algorithm was restricted to solving the single objective problem only, so it was further implemented with non-dominating sorting to solve the multi-objective optimization problem. The proposed multi-objective version is named as Non-dominating Sorting Modified Marine Predator Algorithm (NSMMPA), and it was validated on benchmark test functions and the IEEE-30 bus system.\u0000\u0000\u0000\u0000Finally, the OPF problem was solved with the incorporation of OGIPFC using the proposed methods, which resulted in better solutions and made the system more effective in operation.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"27 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89313756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permittivity- Customizable Low-Cost Laminated PET Sheet Multilayer Substrate to Design Flexible and Conformal Planar Inverted F Antenna 介电常数-可定制的低成本层压PET片多层基板,用于设计柔性和共形平面倒F天线
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-03 DOI: 10.2174/2352096516666230503150934
Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal
In this article, a Planar Inverted F Antenna (PIFA) has been designed using low-cost commercially available transparent laminated sheets. Energy Dispersive X-ray (EDX) analysis is used to acquire the element composition of the transparent laminated sheet.The flexibility is attained using a market-available low-cost Polyethylene Terephthalate (PET) sheet as a substrate. The dielectric properties of this non-conventional laminated sheet need to be identified for antenna design and the microstrip ring resonator test method is used to determine the dielectric properties of the multilayer PET sheets.The linear match has been observed on multilayer laminated PET sheets for dielectric properties and radiation characteristics. Adhesive copper foil of a thickness of 0.08 mm has been used as for conducting layer on the PET lamination sheet. As per the literature survey, it is evident that this is the first attempt to use the reported methodology for PIFA design application. The gain of proposed antenna is 5.2dB.The designed flexible antenna has been developed for wearable and IoT applications in 2.45 GHz ISM band. A good match has been observed between the simulated and measured characteristics.
在这篇文章中,一个平面倒F天线(PIFA)已经设计使用低成本的市售透明层压片。利用能量色散x射线(EDX)分析获得了透明层压片的元素组成。使用市场上可用的低成本聚对苯二甲酸乙二醇酯(PET)片材作为衬底,可以获得灵活性。在天线设计中需要确定这种非常规层合片的介电性能,并采用微带环形谐振器测试方法测定多层PET片的介电性能。在多层层合PET片材的介电性能和辐射特性上观察到线性匹配。在PET层压片上采用厚度为0.08 mm的粘接铜箔作为导电层。根据文献调查,很明显,这是第一次尝试使用报告的PIFA设计应用方法。该天线的增益为5.2dB。设计的柔性天线已开发用于2.45 GHz ISM频段的可穿戴和物联网应用。仿真结果与实测结果吻合良好。
{"title":"Permittivity- Customizable Low-Cost Laminated PET Sheet Multilayer Substrate to Design Flexible and Conformal Planar Inverted F Antenna","authors":"Sachin Maithani, Shivam Bansal, G. Saini, Balwinder Singh Dhaliwal","doi":"10.2174/2352096516666230503150934","DOIUrl":"https://doi.org/10.2174/2352096516666230503150934","url":null,"abstract":"\u0000\u0000In this article, a Planar Inverted F Antenna (PIFA) has been designed using low-cost commercially available transparent laminated sheets. Energy Dispersive X-ray (EDX) analysis is used to acquire the element composition of the transparent laminated sheet.\u0000\u0000\u0000\u0000The flexibility is attained using a market-available low-cost Polyethylene Terephthalate (PET) sheet as a substrate. The dielectric properties of this non-conventional laminated sheet need to be identified for antenna design and the microstrip ring resonator test method is used to determine the dielectric properties of the multilayer PET sheets.\u0000\u0000\u0000\u0000The linear match has been observed on multilayer laminated PET sheets for dielectric properties and radiation characteristics. Adhesive copper foil of a thickness of 0.08 mm has been used as for conducting layer on the PET lamination sheet. As per the literature survey, it is evident that this is the first attempt to use the reported methodology for PIFA design application. The gain of proposed antenna is 5.2dB.\u0000\u0000\u0000\u0000The designed flexible antenna has been developed for wearable and IoT applications in 2.45 GHz ISM band. A good match has been observed between the simulated and measured characteristics.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"13 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82635273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission 基于矩阵逆的高有效载荷隐蔽传输新方法
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-02 DOI: 10.2174/2352096516666230502145422
Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari
The necessity for data security is demanding in the digital age. The maintechnique for achieving data security is Steganography. The technique of camouflaging the secretobject behind another cover object is known as Steganography. A novel, robust, high payload, andimperceptible image steganography approach using matrix inverse in the spatial domain are proposedin this manuscript. The basic idea is to devise a robust novel approach against various imageprocessing attacks, like cropping, compression, filters, and noise.The study's objective is to develop a novel data-hiding approach that increases imperceptibilityand payload capacity and is robust against various image processing attacks, like filters,compression, cropping, and noise.The matrix inverse procedure is used for the insertion and extraction of data. The symmetryfeature of the matrix inverse makes the task of insertion of data simple and efficient. It alsoincreases the hiding capacity while maintaining a finer level of imperceptibility and robustness.MATLAB is used for the implementation of the new technique and results analysis.The matrix inverse procedure is used for the insertion and extraction of data. The symmetryfeature of the matrix inverse makes the task of insertion of data simple and efficient. It alsoincreases the hiding capacity while maintaining a finer level of imperceptibility and robustness.MATLAB is used for the implementation of the new technique and results analysis.The proposed method's robustness has been analyzed against image processing assaultssuch as the inclusion of various noises, cropping, a variety of filters, and compression assaults.The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCCmetrics. The proposed method has been compared with the other two techniques. The experimentaland comparison results depict that the proposed approach provides high hiding capacity,finer robustness, and imperceptibility.A novel, robust and imperceptible approach has been developed in this manuscript.The proposed method has been compared with the methods developed by Jung & Yoo and Joshi& Gill. The experimental findings show that the proposed technique offers better resilience, payloadcapacity, and finer imperceptibility.
在数字时代,数据安全的必要性越来越高。实现数据安全的主要技术是隐写术。将秘密对象隐藏在另一个掩护对象后面的技术被称为隐写术。本文提出了一种新的、鲁棒的、高有效载荷的、在空间域中使用矩阵逆的图像隐写方法。基本思想是设计一种健壮的新方法来对抗各种图像处理攻击,如裁剪、压缩、过滤器和噪声。该研究的目标是开发一种新的数据隐藏方法,以增加不可感知性和有效载荷能力,并对各种图像处理攻击(如过滤器、压缩、裁剪和噪声)具有鲁棒性。数据的插入和提取采用矩阵逆过程。矩阵逆的对称性使得插入数据的任务简单而高效。它还增加了隐藏能力,同时保持了更好的不可感知性和鲁棒性。利用MATLAB对新技术进行了实现和结果分析。数据的插入和提取采用矩阵逆过程。矩阵逆的对称性使得插入数据的任务简单而高效。它还增加了隐藏能力,同时保持了更好的不可感知性和鲁棒性。利用MATLAB对新技术进行了实现和结果分析。该方法的鲁棒性分析了图像处理攻击,如包含各种噪声,裁剪,各种滤波器和压缩攻击。该方法的不可感知性已经通过PSNR、BER和NCCmetrics成功地进行了测试。并与其他两种技术进行了比较。实验和比较结果表明,该方法具有较高的隐藏能力、较好的鲁棒性和不可感知性。一种新颖的、健壮的、不易察觉的方法在这份手稿中得到了发展。该方法已与Jung & Yoo和Joshi& Gill开发的方法进行了比较。实验结果表明,该技术具有更好的弹性、有效载荷能力和更好的隐蔽性。
{"title":"Matrix Inverse-based Highly Payload Novel Approach for Covert Transmission","authors":"Ravinder Saini, Kamaldeep Joshi, Rainu Nandal, Rajkumar Yadav, D. Kumari","doi":"10.2174/2352096516666230502145422","DOIUrl":"https://doi.org/10.2174/2352096516666230502145422","url":null,"abstract":"\u0000\u0000The necessity for data security is demanding in the digital age. The main\u0000technique for achieving data security is Steganography. The technique of camouflaging the secret\u0000object behind another cover object is known as Steganography. A novel, robust, high payload, and\u0000imperceptible image steganography approach using matrix inverse in the spatial domain are proposed\u0000in this manuscript. The basic idea is to devise a robust novel approach against various image\u0000processing attacks, like cropping, compression, filters, and noise.\u0000\u0000\u0000\u0000The study's objective is to develop a novel data-hiding approach that increases imperceptibility\u0000and payload capacity and is robust against various image processing attacks, like filters,\u0000compression, cropping, and noise.\u0000\u0000\u0000\u0000The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.The matrix inverse procedure is used for the insertion and extraction of data. The symmetry\u0000feature of the matrix inverse makes the task of insertion of data simple and efficient. It also\u0000increases the hiding capacity while maintaining a finer level of imperceptibility and robustness.\u0000MATLAB is used for the implementation of the new technique and results analysis.\u0000\u0000\u0000\u0000The proposed method's robustness has been analyzed against image processing assaults\u0000such as the inclusion of various noises, cropping, a variety of filters, and compression assaults.\u0000The imperceptibility of the approach has been tested successfully using PSNR, BER, and NCC\u0000metrics. The proposed method has been compared with the other two techniques. The experimental\u0000and comparison results depict that the proposed approach provides high hiding capacity,\u0000finer robustness, and imperceptibility.\u0000\u0000\u0000\u0000A novel, robust and imperceptible approach has been developed in this manuscript.\u0000The proposed method has been compared with the methods developed by Jung & Yoo and Joshi\u0000& Gill. The experimental findings show that the proposed technique offers better resilience, payload\u0000capacity, and finer imperceptibility.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"43 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87421484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meet the Editorial Board Member 认识编辑委员会成员
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-05-01 DOI: 10.2174/235209651603230224104014
B. Francesco
{"title":"Meet the Editorial Board Member","authors":"B. Francesco","doi":"10.2174/235209651603230224104014","DOIUrl":"https://doi.org/10.2174/235209651603230224104014","url":null,"abstract":"<jats:sec>\u0000<jats:title />\u0000<jats:p />\u0000</jats:sec>","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"47 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90180982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vehicle Detection in High Density Traffic Surveillance Data UsingYOLO.v5 基于yolo .v5的高密度交通监控数据车辆检测
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-04-28 DOI: 10.2174/2352096516666230428103829
Sneha Mishra, D. Yadav
Computer vision is one of the prime domains that enable to derive meaningful and crispinformation from digital media, such as images, videos, and other visual inputs.Detection and correctly tracking the moving objects in a video streaming is still achallenging problem in India. Due to the high density of vehicles, it is difficult to identify the correct objects on the roads.In this work, we have used a YOLO.v5 (You Only Look Once) algorithm to identify thedifferent objects on road, such as trucks, cars, trams, and vans. YOLO.v5 is the latest algorithm inthe family of YOLO. To train the YOLO.v5, KITTY dataset was used having 11682 images havingdifferent objects in a traffic surveillance system. After training and validating the dataset, three different models have been constructed setting various parameters. To further validate the proposedapproach, results have also been evaluated on the Indian traffic dataset DATS_2022.All the models have been evaluated using three performance metrics, such as precision, recall, and mean average precision (MAP). The final model has attained the best performance onKITTY dataset as 93.5% precision, 90.7% recall, and 0.67 MAP for different objects. The resultsattained on the Indian traffic dataset DATS_2022 included 0.65 precision, 0.78 recall value, and0.74 MAP for different objects.The results depict the proposed model to have improved results as compared to stateof-the-art approaches in terms of performance and also reduce the computation time and objectloss.
计算机视觉是能够从数字媒体(如图像、视频和其他视觉输入)中获得有意义和清晰信息的主要领域之一。在印度,检测和正确跟踪视频流中的移动物体仍然是一个具有挑战性的问题。由于车辆密度高,很难识别道路上正确的物体。在这项工作中,我们使用了YOLO。v5(你只看一次)算法,以识别道路上不同的物体,如卡车,汽车,有轨电车和货车。YOLO。意思v5是YOLO家族中最新的算法。训练YOLO。在某交通监控系统中,使用了包含11682幅不同对象图像的KITTY数据集。在对数据集进行训练和验证后,设置不同的参数,构建了三个不同的模型。为了进一步验证所提出的方法,结果也在印度交通数据集DATS_2022上进行了评估。所有模型都使用三个性能指标进行了评估,如精度、召回率和平均平均精度(MAP)。最终的模型在kitty数据集上达到了最佳性能,准确率为93.5%,召回率为90.7%,MAP为0.67。在印度交通数据集DATS_2022上获得的结果包括:精度0.65,召回值0.78,MAP 0.74。结果表明,与最先进的方法相比,所提出的模型在性能方面具有改进的结果,并且还减少了计算时间和对象损失。
{"title":"Vehicle Detection in High Density Traffic Surveillance Data Using\u0000YOLO.v5","authors":"Sneha Mishra, D. Yadav","doi":"10.2174/2352096516666230428103829","DOIUrl":"https://doi.org/10.2174/2352096516666230428103829","url":null,"abstract":"\u0000\u0000Computer vision is one of the prime domains that enable to derive meaningful and crisp\u0000information from digital media, such as images, videos, and other visual inputs.\u0000\u0000\u0000\u0000Detection and correctly tracking the moving objects in a video streaming is still a\u0000challenging problem in India. Due to the high density of vehicles, it is difficult to identify the correct objects on the roads.\u0000\u0000\u0000\u0000In this work, we have used a YOLO.v5 (You Only Look Once) algorithm to identify the\u0000different objects on road, such as trucks, cars, trams, and vans. YOLO.v5 is the latest algorithm in\u0000the family of YOLO. To train the YOLO.v5, KITTY dataset was used having 11682 images having\u0000different objects in a traffic surveillance system. After training and validating the dataset, three different models have been constructed setting various parameters. To further validate the proposed\u0000approach, results have also been evaluated on the Indian traffic dataset DATS_2022.\u0000\u0000\u0000\u0000All the models have been evaluated using three performance metrics, such as precision, recall, and mean average precision (MAP). The final model has attained the best performance on\u0000KITTY dataset as 93.5% precision, 90.7% recall, and 0.67 MAP for different objects. The results\u0000attained on the Indian traffic dataset DATS_2022 included 0.65 precision, 0.78 recall value, and\u00000.74 MAP for different objects.\u0000\u0000\u0000\u0000The results depict the proposed model to have improved results as compared to stateof-the-art approaches in terms of performance and also reduce the computation time and object\u0000loss.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"120 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79425133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpolated Implicit Pixel-based Novel Hybrid Approach towards Image Steganography 基于插值隐式像素的图像隐写新混合方法
IF 0.6 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2023-04-28 DOI: 10.2174/2352096516666230428104626
Ravinder Saini, Kamaldeep Joshi, Khusboo Punyani, Rajkumar Yadav, Rainu Nandal, D. Kumari
Steganography is the approach of camouflaging the covert object within another cover object. This manuscript suggested a novel steganography approach to conceal the covert data presence. The basic idea behind this is to generate an information-hiding approach that increases the payload capacity and good PSNR value without sacrificing much distortion of the image.To develop a novel data-hiding approach that increases imperceptibility, robustness, and payload capacity.The Neighbour Mean Interpolation technique is used to scale up the original image to generate Interpolated pixels of the given image. An even-odd scheme on the interpolated stego pixel is used to camouflage the obscure code. MATLAB is used for the implementation of the new approach and results calculation.The Experimental analysis reveals that our suggested approach has a finer embedding capacity for camouflaging the secret data as the original image of size (MxN) is scaled up to size (2M-1 x2N-1) and also manages the good visuality of the cover or graven image. The proposed method is compared with Jung and Yoo, and Selvrani's method. The result of this comparison shows that the proposed method has finer imperceptibility than these two previously existing techniques.A novel approach towards image steganography using neighbor mean interpolation has been proposed and implemented. A new steganography method is used for camouflaging the confidential code into the cover object using NMI without producing any major differences in the input image. The new approach provides better imperceptibility, robustness, and payload capacity.
隐写术是将隐藏对象伪装成另一个隐藏对象的方法。这篇手稿提出了一种新的隐写方法来隐藏隐藏数据的存在。这背后的基本思想是生成一种信息隐藏方法,在不牺牲太多图像失真的情况下增加有效载荷容量和良好的PSNR值。开发一种新的数据隐藏方法,提高不可感知性、鲁棒性和有效负载能力。邻均值插值技术用于对原始图像进行缩放,生成给定图像的插值像素。在插入的隐写像素上采用奇偶方案来伪装模糊的代码。利用MATLAB对新方法进行了实现并进行了结果计算。实验分析表明,当原始图像的大小(MxN)被放大到大小(2M-1 x2N-1)时,我们提出的方法具有更好的隐藏秘密数据的嵌入能力,并且还可以管理覆盖物或雕刻图像的良好可视性。并与Jung和Yoo以及Selvrani的方法进行了比较。对比结果表明,该方法具有较好的隐蔽性。提出并实现了一种基于邻均值插值的图像隐写新方法。采用一种新的隐写方法,利用NMI将机密代码伪装成掩蔽对象,而不会在输入图像中产生任何重大差异。新方法提供了更好的不可感知性、鲁棒性和有效载荷能力。
{"title":"Interpolated Implicit Pixel-based Novel Hybrid Approach towards Image Steganography","authors":"Ravinder Saini, Kamaldeep Joshi, Khusboo Punyani, Rajkumar Yadav, Rainu Nandal, D. Kumari","doi":"10.2174/2352096516666230428104626","DOIUrl":"https://doi.org/10.2174/2352096516666230428104626","url":null,"abstract":"\u0000\u0000Steganography is the approach of camouflaging the covert object within another cover object. This manuscript suggested a novel steganography approach to conceal the covert data presence. The basic idea behind this is to generate an information-hiding approach that increases the payload capacity and good PSNR value without sacrificing much distortion of the image.\u0000\u0000\u0000\u0000To develop a novel data-hiding approach that increases imperceptibility, robustness, and payload capacity.\u0000\u0000\u0000\u0000The Neighbour Mean Interpolation technique is used to scale up the original image to generate Interpolated pixels of the given image. An even-odd scheme on the interpolated stego pixel is used to camouflage the obscure code. MATLAB is used for the implementation of the new approach and results calculation.\u0000\u0000\u0000\u0000The Experimental analysis reveals that our suggested approach has a finer embedding capacity for camouflaging the secret data as the original image of size (MxN) is scaled up to size (2M-1 x2N-1) and also manages the good visuality of the cover or graven image. The proposed method is compared with Jung and Yoo, and Selvrani's method. The result of this comparison shows that the proposed method has finer imperceptibility than these two previously existing techniques.\u0000\u0000\u0000\u0000A novel approach towards image steganography using neighbor mean interpolation has been proposed and implemented. A new steganography method is used for camouflaging the confidential code into the cover object using NMI without producing any major differences in the input image. The new approach provides better imperceptibility, robustness, and payload capacity.\u0000","PeriodicalId":43275,"journal":{"name":"Recent Advances in Electrical & Electronic Engineering","volume":"45 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2023-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76490913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Recent Advances in Electrical & Electronic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1