首页 > 最新文献

arXiv - CS - Emerging Technologies最新文献

英文 中文
Versatile CMOS Analog LIF Neuron for Memristor-Integrated Neuromorphic Circuits 用于 Memristor 集成神经形态电路的多功能 CMOS 模拟 LIF 神经元
Pub Date : 2024-06-28 DOI: arxiv-2406.19667
Nikhil Garg, Davide Florini, Patrick Dufour, Eloir Muhr, Mathieu Faye, Marc Bocquet, Damien Querlioz, Yann Beilliard, Dominique Drouin, Fabien Alibart, Jean-Michel Portal
Heterogeneous systems with analog CMOS circuits integrated with nanoscalememristive devices enable efficient deployment of neural networks onneuromorphic hardware. CMOS Neuron with low footprint can emulate slow temporaldynamics by operating with extremely low current levels. Nevertheless, thecurrent read from the memristive synapses can be higher by several orders ofmagnitude, and performing impedance matching between neurons and synapses ismandatory. In this paper, we implement an analog leaky integrate and fire (LIF)neuron with a voltage regulator and current attenuator for interfacing CMOSneurons with memristive synapses. In addition, the neuron design proposes adual leakage that could enable the implementation of local learning rules suchas voltage-dependent synaptic plasticity. We also propose a connection schemeto implement adaptive LIF neurons based on two-neuron interaction. The proposedcircuits can be used to interface with a variety of synaptic devices andprocess signals of diverse temporal dynamics.
异构系统中的模拟 CMOS 电路集成了纳米级阻尼器件,从而能够在神经形态硬件上高效部署神经网络。CMOS 神经元占用空间小,能以极低的电流水平模拟缓慢的时间动力学。然而,从记忆突触读取的电流可能会高出几个数量级,因此必须在神经元和突触之间进行阻抗匹配。在本文中,我们实现了一个带有电压调节器和电流衰减器的模拟漏电积分与发射(LIF)神经元,用于连接 CMOS 神经元与记忆性突触。此外,该神经元的设计还提出了双重泄漏,可以实现局部学习规则,如电压依赖性突触可塑性。我们还提出了一种连接方案,以实现基于双神经元交互的自适应 LIF 神经元。所提出的电路可用于连接各种突触设备和处理不同时间动态的信号。
{"title":"Versatile CMOS Analog LIF Neuron for Memristor-Integrated Neuromorphic Circuits","authors":"Nikhil Garg, Davide Florini, Patrick Dufour, Eloir Muhr, Mathieu Faye, Marc Bocquet, Damien Querlioz, Yann Beilliard, Dominique Drouin, Fabien Alibart, Jean-Michel Portal","doi":"arxiv-2406.19667","DOIUrl":"https://doi.org/arxiv-2406.19667","url":null,"abstract":"Heterogeneous systems with analog CMOS circuits integrated with nanoscale\u0000memristive devices enable efficient deployment of neural networks on\u0000neuromorphic hardware. CMOS Neuron with low footprint can emulate slow temporal\u0000dynamics by operating with extremely low current levels. Nevertheless, the\u0000current read from the memristive synapses can be higher by several orders of\u0000magnitude, and performing impedance matching between neurons and synapses is\u0000mandatory. In this paper, we implement an analog leaky integrate and fire (LIF)\u0000neuron with a voltage regulator and current attenuator for interfacing CMOS\u0000neurons with memristive synapses. In addition, the neuron design proposes a\u0000dual leakage that could enable the implementation of local learning rules such\u0000as voltage-dependent synaptic plasticity. We also propose a connection scheme\u0000to implement adaptive LIF neurons based on two-neuron interaction. The proposed\u0000circuits can be used to interface with a variety of synaptic devices and\u0000process signals of diverse temporal dynamics.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing Unit Ising Models for Logic Gate Simulation through Integer Linear Programming 通过整数线性规划为逻辑门仿真设计单元等效模型
Pub Date : 2024-06-26 DOI: arxiv-2406.18130
Shunsuke Tsukiyama, Koji Nakano, Xiaotian Li, Yasuaki Ito, Takumi Kato, Yuya Kawamata
An Ising model is defined by a quadratic objective function known as theHamiltonian, composed of spin variables that can take values of either $-1$ or$+1$. The goal is to assign spin values to these variables in a way thatminimizes the value of the Hamiltonian. Ising models are instrumental intackling many combinatorial optimization problems, leading to significantresearch in developing solvers for them. Notably, D-Wave Systems has pioneeredthe creation of quantum annealers, programmable solvers based on quantummechanics, for these models. This paper introduces unit Ising models, where allnon-zero coefficients of linear and quadratic terms are either $-1$ or $+1$.Due to the limited resolution of quantum annealers, unit Ising models are moresuitable for quantum annealers to find optimal solutions. We propose a noveldesign methodology for unit Ising models to simulate logic circuits computingBoolean functions through integer linear programming. By optimizing these Isingmodels with quantum annealers, we can compute Boolean functions and theirinverses. With a fixed unit Ising model for a logic circuit, we can potentiallydesign Application-Specific Unit Quantum Annealers (ASUQAs) for computing theinverse function, which is analogous to Application-Specific IntegratedCircuits (ASICs) in digital circuitry. For instance, if we apply this techniqueto a multiplication circuit, we can design an ASUQA for factorization of twonumbers. Our findings suggest a powerful new method for compromising the RSAcryptosystem by leveraging ASUQAs in factorization.
伊辛模型由一个称为哈密顿的二次目标函数定义,该函数由自旋变量组成,这些变量的值可以是 $-1$ 或 $+1$。我们的目标是以最小化哈密尔顿值的方式为这些变量分配自旋值。伊辛模型有助于解决许多组合优化问题,因此在为其开发求解器方面开展了大量研究。值得注意的是,D-Wave 系统公司率先为这些模型创建了量子退火器,即基于量子力学的可编程求解器。由于量子退火器的分辨率有限,单位伊辛模型更适合量子退火器寻找最优解。我们提出了一种新的单位伊辛模型设计方法,通过整数线性编程模拟计算布尔函数的逻辑电路。通过用量子退火器优化这些伊辛模型,我们可以计算布尔函数及其反函数。有了逻辑电路的固定单元伊辛模型,我们就有可能设计出用于计算反函数的特定应用单元量子退火器(ASUQAs),这类似于数字电路中的特定应用集成电路(ASIC)。例如,如果我们将这一技术应用于乘法电路,就能设计出一个用于两个数因式分解的 ASUQA。我们的研究结果为利用因式分解中的 ASUQA 破坏 RSA 密码系统提供了一种强大的新方法。
{"title":"Designing Unit Ising Models for Logic Gate Simulation through Integer Linear Programming","authors":"Shunsuke Tsukiyama, Koji Nakano, Xiaotian Li, Yasuaki Ito, Takumi Kato, Yuya Kawamata","doi":"arxiv-2406.18130","DOIUrl":"https://doi.org/arxiv-2406.18130","url":null,"abstract":"An Ising model is defined by a quadratic objective function known as the\u0000Hamiltonian, composed of spin variables that can take values of either $-1$ or\u0000$+1$. The goal is to assign spin values to these variables in a way that\u0000minimizes the value of the Hamiltonian. Ising models are instrumental in\u0000tackling many combinatorial optimization problems, leading to significant\u0000research in developing solvers for them. Notably, D-Wave Systems has pioneered\u0000the creation of quantum annealers, programmable solvers based on quantum\u0000mechanics, for these models. This paper introduces unit Ising models, where all\u0000non-zero coefficients of linear and quadratic terms are either $-1$ or $+1$.\u0000Due to the limited resolution of quantum annealers, unit Ising models are more\u0000suitable for quantum annealers to find optimal solutions. We propose a novel\u0000design methodology for unit Ising models to simulate logic circuits computing\u0000Boolean functions through integer linear programming. By optimizing these Ising\u0000models with quantum annealers, we can compute Boolean functions and their\u0000inverses. With a fixed unit Ising model for a logic circuit, we can potentially\u0000design Application-Specific Unit Quantum Annealers (ASUQAs) for computing the\u0000inverse function, which is analogous to Application-Specific Integrated\u0000Circuits (ASICs) in digital circuitry. For instance, if we apply this technique\u0000to a multiplication circuit, we can design an ASUQA for factorization of two\u0000numbers. Our findings suggest a powerful new method for compromising the RSA\u0000cryptosystem by leveraging ASUQAs in factorization.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"110 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Impact of Feature Representation on the Accuracy of Photonic Neural Networks 特征表示对光子神经网络准确性的影响
Pub Date : 2024-06-26 DOI: arxiv-2406.18757
Mauricio Gomes de Queiroz, Paul Jimenez, Raphael Cardoso, Mateus Vidaletti da Costa, Mohab Abdalla, Ian O'Connor, Alberto Bosio, Fabio Pavanello
Photonic Neural Networks (PNNs) are gaining significant interest in theresearch community due to their potential for high parallelization, lowlatency, and energy efficiency. PNNs compute using light, which leads toseveral differences in implementation when compared to electronics, such as theneed to represent input features in the photonic domain before feeding theminto the network. In this encoding process, it is common to combine multiplefeatures into a single input to reduce the number of inputs and associateddevices, leading to smaller and more energy-efficient PNNs. Although thisalters the network's handling of input data, its impact on PNNs remainsunderstudied. This paper addresses this open question, investigating the effectof commonly used encoding strategies that combine features on the performanceand learning capabilities of PNNs. Here, using the concept of featureimportance, we develop a mathematical framework for analyzing featurecombination. Through this framework, we demonstrate that encoding multiplefeatures together in a single input determines their relative importance, thuslimiting the network's ability to learn from the data. Given some priorknowledge of the data, however, this can also be leveraged for higher accuracy.By selecting an optimal encoding method, we achieve up to a 12.3% improvementin accuracy of PNNs trained on the Iris dataset compared to other encodingtechniques, surpassing the performance of networks where features are notcombined. These findings highlight the importance of carefully choosing theencoding to the accuracy and decision-making strategies of PNNs, particularlyin size or power constrained applications.
光子神经网络(Photonic Neural Networks,PNN)因其高并行性、低延迟和高能效的潜力而备受研究界关注。光子神经网络使用光进行计算,这导致其实现方式与电子技术相比存在诸多差异,例如在将输入特征输入网络之前,需要在光子域中对其进行表示。在这一编码过程中,通常将多个特征合并为一个输入,以减少输入和相关设备的数量,从而实现更小、更节能的 PNN。虽然这改变了网络对输入数据的处理,但其对 PNN 的影响仍未得到充分研究。本文针对这一开放性问题,研究了结合特征的常用编码策略对 PNN 性能和学习能力的影响。在此,我们使用 "特征重要性 "的概念,开发了一个分析特征组合的数学框架。通过这个框架,我们证明了在单个输入中将多个特征编码在一起决定了它们的相对重要性,从而限制了网络从数据中学习的能力。通过选择最佳编码方法,我们在虹膜数据集上训练的 PNN 的准确率与其他编码技术相比提高了 12.3%,超过了未进行特征组合的网络性能。这些发现凸显了谨慎选择编码对 PNN 的准确性和决策策略的重要性,尤其是在规模或功率受限的应用中。
{"title":"The Impact of Feature Representation on the Accuracy of Photonic Neural Networks","authors":"Mauricio Gomes de Queiroz, Paul Jimenez, Raphael Cardoso, Mateus Vidaletti da Costa, Mohab Abdalla, Ian O'Connor, Alberto Bosio, Fabio Pavanello","doi":"arxiv-2406.18757","DOIUrl":"https://doi.org/arxiv-2406.18757","url":null,"abstract":"Photonic Neural Networks (PNNs) are gaining significant interest in the\u0000research community due to their potential for high parallelization, low\u0000latency, and energy efficiency. PNNs compute using light, which leads to\u0000several differences in implementation when compared to electronics, such as the\u0000need to represent input features in the photonic domain before feeding them\u0000into the network. In this encoding process, it is common to combine multiple\u0000features into a single input to reduce the number of inputs and associated\u0000devices, leading to smaller and more energy-efficient PNNs. Although this\u0000alters the network's handling of input data, its impact on PNNs remains\u0000understudied. This paper addresses this open question, investigating the effect\u0000of commonly used encoding strategies that combine features on the performance\u0000and learning capabilities of PNNs. Here, using the concept of feature\u0000importance, we develop a mathematical framework for analyzing feature\u0000combination. Through this framework, we demonstrate that encoding multiple\u0000features together in a single input determines their relative importance, thus\u0000limiting the network's ability to learn from the data. Given some prior\u0000knowledge of the data, however, this can also be leveraged for higher accuracy.\u0000By selecting an optimal encoding method, we achieve up to a 12.3% improvement\u0000in accuracy of PNNs trained on the Iris dataset compared to other encoding\u0000techniques, surpassing the performance of networks where features are not\u0000combined. These findings highlight the importance of carefully choosing the\u0000encoding to the accuracy and decision-making strategies of PNNs, particularly\u0000in size or power constrained applications.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Soley: Identification and Automated Detection of Logic Vulnerabilities in Ethereum Smart Contracts Using Large Language Models Soley:使用大型语言模型识别和自动检测以太坊智能合约中的逻辑漏洞
Pub Date : 2024-06-24 DOI: arxiv-2406.16244
Majd Soud, Waltteri Nuutinen, Grischa Liebel
Modern blockchain, such as Ethereum, supports the deployment and execution ofso-called smart contracts, autonomous digital programs with significant valueof cryptocurrency. Executing smart contracts requires gas costs paid by users,which define the limits of the contract's execution. Logic vulnerabilities insmart contracts can lead to financial losses, and are often the root cause ofhigh-impact cyberattacks. Our objective is threefold: (i) empiricallyinvestigate logic vulnerabilities in real-world smart contracts extracted fromcode changes on GitHub, (ii) introduce Soley, an automated method for detectinglogic vulnerabilities in smart contracts, leveraging Large Language Models(LLMs), and (iii) examine mitigation strategies employed by smart contractdevelopers to address these vulnerabilities in real-world scenarios. Weobtained smart contracts and related code changes from GitHub. To address thefirst and third objectives, we qualitatively investigated available logicvulnerabilities using an open coding method. We identified thesevulnerabilities and their mitigation strategies. For the second objective, weextracted various logic vulnerabilities, applied preprocessing techniques, andimplemented and trained the proposed Soley model. We evaluated Soley along withthe performance of various LLMs and compared the results with thestate-of-the-art baseline on the task of logic vulnerability detection. Fromour analysis, we identified nine novel logic vulnerabilities, extendingexisting taxonomies with these vulnerabilities. Furthermore, we introducedseveral mitigation strategies extracted from observed developer modificationsin real-world scenarios. Our Soley method outperforms existing methods inautomatically identifying logic vulnerabilities. Interestingly, the efficacy ofLLMs in this task was evident without requiring extensive feature engineering.
以太坊等现代区块链支持部署和执行所谓的智能合约,即具有重要加密货币价值的自主数字程序。执行智能合约需要用户支付气体成本,这些成本定义了合约执行的限制。智能合约中的逻辑漏洞会导致经济损失,而且往往是造成重大影响的网络攻击的根本原因。我们的目标有三个方面:(i) 从 GitHub 上的代码变更中提取经验,调查真实世界智能合约中的逻辑漏洞;(ii) 引入 Soley,这是一种利用大型语言模型(LLMs)检测智能合约中逻辑漏洞的自动化方法;(iii) 研究智能合约开发者采用的缓解策略,以解决真实世界场景中的这些漏洞。我们从 GitHub 获取了智能合约和相关代码变更。为了实现第一个和第三个目标,我们使用开放式编码方法对可用的逻辑漏洞进行了定性调查。我们确定了这些漏洞及其缓解策略。针对第二个目标,我们提取了各种逻辑漏洞,应用了预处理技术,并实施和训练了所提出的 Soley 模型。我们评估了 Soley 以及各种 LLM 的性能,并将结果与逻辑漏洞检测任务的最新基准进行了比较。通过分析,我们发现了九个新的逻辑漏洞,并用这些漏洞扩展了现有的分类标准。此外,我们还引入了几种从实际场景中观察到的开发人员修改中提取的缓解策略。在自动识别逻辑漏洞方面,我们的 Soley 方法优于现有方法。有趣的是,LLMs 在这项任务中的功效是显而易见的,而不需要大量的特征工程。
{"title":"Soley: Identification and Automated Detection of Logic Vulnerabilities in Ethereum Smart Contracts Using Large Language Models","authors":"Majd Soud, Waltteri Nuutinen, Grischa Liebel","doi":"arxiv-2406.16244","DOIUrl":"https://doi.org/arxiv-2406.16244","url":null,"abstract":"Modern blockchain, such as Ethereum, supports the deployment and execution of\u0000so-called smart contracts, autonomous digital programs with significant value\u0000of cryptocurrency. Executing smart contracts requires gas costs paid by users,\u0000which define the limits of the contract's execution. Logic vulnerabilities in\u0000smart contracts can lead to financial losses, and are often the root cause of\u0000high-impact cyberattacks. Our objective is threefold: (i) empirically\u0000investigate logic vulnerabilities in real-world smart contracts extracted from\u0000code changes on GitHub, (ii) introduce Soley, an automated method for detecting\u0000logic vulnerabilities in smart contracts, leveraging Large Language Models\u0000(LLMs), and (iii) examine mitigation strategies employed by smart contract\u0000developers to address these vulnerabilities in real-world scenarios. We\u0000obtained smart contracts and related code changes from GitHub. To address the\u0000first and third objectives, we qualitatively investigated available logic\u0000vulnerabilities using an open coding method. We identified these\u0000vulnerabilities and their mitigation strategies. For the second objective, we\u0000extracted various logic vulnerabilities, applied preprocessing techniques, and\u0000implemented and trained the proposed Soley model. We evaluated Soley along with\u0000the performance of various LLMs and compared the results with the\u0000state-of-the-art baseline on the task of logic vulnerability detection. From\u0000our analysis, we identified nine novel logic vulnerabilities, extending\u0000existing taxonomies with these vulnerabilities. Furthermore, we introduced\u0000several mitigation strategies extracted from observed developer modifications\u0000in real-world scenarios. Our Soley method outperforms existing methods in\u0000automatically identifying logic vulnerabilities. Interestingly, the efficacy of\u0000LLMs in this task was evident without requiring extensive feature engineering.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141508412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Machine Learning for Electronic Health Records using Federated Learning and Differential Privacy 使用联合学习和差异隐私保护电子健康记录的隐私保护机器学习
Pub Date : 2024-06-23 DOI: arxiv-2406.15962
Naif A. Ganadily, Han J. Xia
An Electronic Health Record (EHR) is an electronic database used byhealthcare providers to store patients' medical records which may includediagnoses, treatments, costs, and other personal information. Machine learning(ML) algorithms can be used to extract and analyze patient data to improvepatient care. Patient records contain highly sensitive information, such associal security numbers (SSNs) and residential addresses, which introduces aneed to apply privacy-preserving techniques for these ML models using federatedlearning and differential privacy.
电子病历(EHR)是医疗服务提供者用来存储患者医疗记录的电子数据库,其中可能包括诊断、治疗、费用和其他个人信息。机器学习(ML)算法可用于提取和分析患者数据,以改善患者护理。患者记录包含高度敏感的信息,如社会安全号(SSN)和住址,这就需要使用联合学习和差异隐私技术为这些 ML 模型应用隐私保护技术。
{"title":"Privacy Preserving Machine Learning for Electronic Health Records using Federated Learning and Differential Privacy","authors":"Naif A. Ganadily, Han J. Xia","doi":"arxiv-2406.15962","DOIUrl":"https://doi.org/arxiv-2406.15962","url":null,"abstract":"An Electronic Health Record (EHR) is an electronic database used by\u0000healthcare providers to store patients' medical records which may include\u0000diagnoses, treatments, costs, and other personal information. Machine learning\u0000(ML) algorithms can be used to extract and analyze patient data to improve\u0000patient care. Patient records contain highly sensitive information, such as\u0000social security numbers (SSNs) and residential addresses, which introduces a\u0000need to apply privacy-preserving techniques for these ML models using federated\u0000learning and differential privacy.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Diagonal IRS Assisted Ultra Massive THz Systems: A Low Resolution Approach 超越对角线 IRS 辅助超大规模 THz 系统:低分辨率方法
Pub Date : 2024-06-22 DOI: arxiv-2406.15880
Wali Ullah Khan, Chandan Kumar Sheemar, Zaid Abdullah, Eva Lagunas, Symeon Chatzinotas
The terahertz communications have the potential to revolutionize datatransfer with unmatched speed and facilitate the development of newhigh-bandwidth applications. This paper studies the performance of downlinkterahertz system assisted by beyond diagonal intelligent reconfigurable surface(BD-IRS). For enhanced energy efficiency and low cost, a joint precoding andBD-IRS phase shift design satisfying the $1$-bit resolution constraints tomaximize the spectral efficiency is presented. The original problem isnon-linear, NP-hard, and intricately coupled, and obtaining an optimal solutionis challenging. To reduce the complexity, we first transform the optimizationproblem into two problems and then iteratively solve them to achieve anefficient solution. Numerical results demonstrate that the proposed approachfor the BD-IRS assisted terahertz system significantly enhances the spectralefficiency compared to the conventional diagonal IRS assisted system.
太赫兹通信有望以无与伦比的速度彻底改变数据传输,并促进新的高带宽应用的发展。本文研究了超对角线智能可重构表面(BD-IRS)辅助下行太赫兹系统的性能。为了提高能效和降低成本,本文提出了一种联合预编码和 BD-IRS 相移设计方案,该方案满足 1 美元位分辨率约束,能最大限度地提高频谱效率。原始问题是一个非线性、NP 难和复杂耦合的问题,获得最优解具有挑战性。为了降低复杂性,我们首先将优化问题转化为两个问题,然后对它们进行迭代求解,以获得高效的解决方案。数值结果表明,与传统的对角 IRS 辅助系统相比,所提出的 BD-IRS 辅助太赫兹系统方法显著提高了光谱效率。
{"title":"Beyond Diagonal IRS Assisted Ultra Massive THz Systems: A Low Resolution Approach","authors":"Wali Ullah Khan, Chandan Kumar Sheemar, Zaid Abdullah, Eva Lagunas, Symeon Chatzinotas","doi":"arxiv-2406.15880","DOIUrl":"https://doi.org/arxiv-2406.15880","url":null,"abstract":"The terahertz communications have the potential to revolutionize data\u0000transfer with unmatched speed and facilitate the development of new\u0000high-bandwidth applications. This paper studies the performance of downlink\u0000terahertz system assisted by beyond diagonal intelligent reconfigurable surface\u0000(BD-IRS). For enhanced energy efficiency and low cost, a joint precoding and\u0000BD-IRS phase shift design satisfying the $1$-bit resolution constraints to\u0000maximize the spectral efficiency is presented. The original problem is\u0000non-linear, NP-hard, and intricately coupled, and obtaining an optimal solution\u0000is challenging. To reduce the complexity, we first transform the optimization\u0000problem into two problems and then iteratively solve them to achieve an\u0000efficient solution. Numerical results demonstrate that the proposed approach\u0000for the BD-IRS assisted terahertz system significantly enhances the spectral\u0000efficiency compared to the conventional diagonal IRS assisted system.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"68 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AgriLLM: Harnessing Transformers for Farmer Queries AgriLLM:利用变压器进行农民查询
Pub Date : 2024-06-21 DOI: arxiv-2407.04721
Krish Didwania, Pratinav Seth, Aditya Kasliwal, Amit Agarwal
Agriculture, vital for global sustenance, necessitates innovative solutionsdue to a lack of organized domain experts, particularly in developing countrieswhere many farmers are impoverished and cannot afford expert consulting.Initiatives like Farmers Helpline play a crucial role in such countries, yetchallenges such as high operational costs persist. Automating query resolutioncan alleviate the burden on traditional call centers, providing farmers withimmediate and contextually relevant information. The integration of Agricultureand Artificial Intelligence (AI) offers a transformative opportunity to empowerfarmers and bridge information gaps. Language models like transformers, therising stars of AI, possess remarkable language understanding capabilities,making them ideal for addressing information gaps in agriculture. This workexplores and demonstrates the transformative potential of Large Language Models(LLMs) in automating query resolution for agricultural farmers, leveragingtheir expertise in deciphering natural language and understanding context.Using a subset of a vast dataset of real-world farmer queries collected inIndia, our study focuses on approximately 4 million queries from the state ofTamil Nadu, spanning various sectors, seasonal crops, and query types.
农业对全球的生计至关重要,但由于缺乏有组织的领域专家,因此需要创新的解决方案,特别是在发展中国家,那里的许多农民都很贫困,负担不起专家咨询费用。自动解决查询问题可以减轻传统呼叫中心的负担,为农民提供即时的、与具体情况相关的信息。农业与人工智能(AI)的融合为农民赋权和弥合信息鸿沟提供了一个变革性机会。像变压器这样的语言模型是人工智能的新星,它们具有卓越的语言理解能力,是解决农业信息差距的理想选择。这项工作利用大型语言模型在解读自然语言和理解上下文方面的专长,探索并展示了大型语言模型在自动解决农业农民查询方面的变革潜力。我们的研究使用了在印度收集的大量真实世界农民查询数据集中的一个子集,重点研究了来自泰米尔纳德邦的约 400 万次查询,涵盖了各个部门、季节性作物和查询类型。
{"title":"AgriLLM: Harnessing Transformers for Farmer Queries","authors":"Krish Didwania, Pratinav Seth, Aditya Kasliwal, Amit Agarwal","doi":"arxiv-2407.04721","DOIUrl":"https://doi.org/arxiv-2407.04721","url":null,"abstract":"Agriculture, vital for global sustenance, necessitates innovative solutions\u0000due to a lack of organized domain experts, particularly in developing countries\u0000where many farmers are impoverished and cannot afford expert consulting.\u0000Initiatives like Farmers Helpline play a crucial role in such countries, yet\u0000challenges such as high operational costs persist. Automating query resolution\u0000can alleviate the burden on traditional call centers, providing farmers with\u0000immediate and contextually relevant information. The integration of Agriculture\u0000and Artificial Intelligence (AI) offers a transformative opportunity to empower\u0000farmers and bridge information gaps. Language models like transformers, the\u0000rising stars of AI, possess remarkable language understanding capabilities,\u0000making them ideal for addressing information gaps in agriculture. This work\u0000explores and demonstrates the transformative potential of Large Language Models\u0000(LLMs) in automating query resolution for agricultural farmers, leveraging\u0000their expertise in deciphering natural language and understanding context.\u0000Using a subset of a vast dataset of real-world farmer queries collected in\u0000India, our study focuses on approximately 4 million queries from the state of\u0000Tamil Nadu, spanning various sectors, seasonal crops, and query types.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141571838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting sexually explicit content in the context of the child sexual abuse materials (CSAM): end-to-end classifiers and region-based networks 检测儿童性虐待材料(CSAM)中的露骨性内容:端到端分类器和基于区域的网络
Pub Date : 2024-06-20 DOI: arxiv-2406.14131
Weronika Gutfeter, Joanna Gajewska, Andrzej Pacut
Child sexual abuse materials (CSAM) pose a significant threat to the safetyand well-being of children worldwide. Detecting and preventing the distributionof such materials is a critical task for law enforcement agencies andtechnology companies. As content moderation is often manual, developing anautomated detection system can help reduce human reviewers' exposure topotentially harmful images and accelerate the process of counteracting. Thisstudy presents methods for classifying sexually explicit content, which plays acrucial role in the automated CSAM detection system. Several approaches areexplored to solve the task: an end-to-end classifier, a classifier with persondetection and a private body parts detector. All proposed methods are tested onthe images obtained from the online tool for reporting illicit content. Due tolegal constraints, access to the data is limited, and all algorithms areexecuted remotely on the isolated server. The end-to-end classifier yields themost promising results, with an accuracy of 90.17%, after augmenting thetraining set with the additional neutral samples and adult pornography. Whiledetection-based methods may not achieve higher accuracy rates and cannot serveas a final classifier on their own, their inclusion in the system can bebeneficial. Human body-oriented approaches generate results that are easier tointerpret, and obtaining more interpretable results is essential when analyzingmodels that are trained without direct access to data.
儿童性虐待材料 (CSAM) 对全世界儿童的安全和福祉构成重大威胁。检测和防止此类材料的传播是执法机构和技术公司的一项重要任务。由于内容审核通常是人工操作,开发自动检测系统有助于减少人工审核人员接触潜在有害图像的机会,并加快反制过程。本研究介绍了对性露骨内容进行分类的方法,这在 CSAM 自动检测系统中起着至关重要的作用。研究探讨了几种方法来解决这一任务:端到端分类器、带有持续检测功能的分类器和隐私身体部位检测器。所有提出的方法都在从报告非法内容的在线工具中获取的图像上进行了测试。由于法律限制,对数据的访问是有限的,所有算法都是在独立服务器上远程执行的。在使用额外的中性样本和成人色情内容增强训练集后,端到端分类器取得了最有希望的结果,准确率达到 90.17%。虽然基于检测的方法可能无法达到更高的准确率,也不能单独作为最终分类器,但将它们纳入系统中可能会有所帮助。以人体为导向的方法产生的结果更易于解释,而在分析那些在无法直接获取数据的情况下训练出来的模型时,获得更易于解释的结果至关重要。
{"title":"Detecting sexually explicit content in the context of the child sexual abuse materials (CSAM): end-to-end classifiers and region-based networks","authors":"Weronika Gutfeter, Joanna Gajewska, Andrzej Pacut","doi":"arxiv-2406.14131","DOIUrl":"https://doi.org/arxiv-2406.14131","url":null,"abstract":"Child sexual abuse materials (CSAM) pose a significant threat to the safety\u0000and well-being of children worldwide. Detecting and preventing the distribution\u0000of such materials is a critical task for law enforcement agencies and\u0000technology companies. As content moderation is often manual, developing an\u0000automated detection system can help reduce human reviewers' exposure to\u0000potentially harmful images and accelerate the process of counteracting. This\u0000study presents methods for classifying sexually explicit content, which plays a\u0000crucial role in the automated CSAM detection system. Several approaches are\u0000explored to solve the task: an end-to-end classifier, a classifier with person\u0000detection and a private body parts detector. All proposed methods are tested on\u0000the images obtained from the online tool for reporting illicit content. Due to\u0000legal constraints, access to the data is limited, and all algorithms are\u0000executed remotely on the isolated server. The end-to-end classifier yields the\u0000most promising results, with an accuracy of 90.17%, after augmenting the\u0000training set with the additional neutral samples and adult pornography. While\u0000detection-based methods may not achieve higher accuracy rates and cannot serve\u0000as a final classifier on their own, their inclusion in the system can be\u0000beneficial. Human body-oriented approaches generate results that are easier to\u0000interpret, and obtaining more interpretable results is essential when analyzing\u0000models that are trained without direct access to data.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emerging-properties Mapping Using Spatial Embedding Statistics: EMUSES 利用空间嵌入统计绘制新兴属性地图EMUSES
Pub Date : 2024-06-20 DOI: arxiv-2406.14309
Chris Foulon, Marcela Ovando-Tellez, Lia Talozzi, Maurizio Corbetta, Anna Matsulevits, Michel Thiebaut de Schotten
Understanding complex phenomena often requires analyzing high-dimensionaldata to uncover emergent properties that arise from multifactorialinteractions. Here, we present EMUSES (Emerging-properties Mapping UsingSpatial Embedding Statistics), an innovative approach employing UniformManifold Approximation and Projection (UMAP) to create high-dimensionalembeddings that reveal latent structures within data. EMUSES facilitates theexploration and prediction of emergent properties by statistically analyzingthese latent spaces. Using three distinct datasets--a handwritten digitsdataset from the National Institute of Standards and Technology (NIST, E.Alpaydin, 1998), the Chicago Face Database (Ma et al., 2015), and braindisconnection data post-stroke (Talozzi et al., 2023)--we demonstrate EMUSES'effectiveness in detecting and interpreting emergent properties. Our method notonly predicts outcomes with high accuracy but also provides clearvisualizations and statistical insights into the underlying interactions withinthe data. By bridging the gap between predictive accuracy and interpretability,EMUSES offers researchers a powerful tool to understand the multifactorialorigins of complex phenomena.
要理解复杂的现象,往往需要分析高维数据,以发现多因素相互作用产生的新兴特性。在这里,我们提出了 EMUSES(使用空间嵌入统计的新兴属性映射),这是一种创新方法,它采用统一平面逼近和投影(UMAP)来创建高维嵌入,从而揭示数据中的潜在结构。EMUSES 通过对这些潜在空间进行统计分析,促进了对新兴属性的探索和预测。我们使用了三个不同的数据集--美国国家标准与技术研究院(NIST,E.Alpaydin,1998)的手写数字数据集、芝加哥人脸数据库(Ma 等人,2015)以及中风后的脑血管连接数据(Talozzi 等人,2023)--证明了 EMUSES 在检测和解释新兴属性方面的有效性。我们的方法不仅能高精度地预测结果,还能提供清晰的可视化效果,并通过统计分析深入了解数据中的潜在交互作用。通过缩小预测准确性和可解释性之间的差距,EMUSES 为研究人员理解复杂现象的多因素起源提供了强有力的工具。
{"title":"Emerging-properties Mapping Using Spatial Embedding Statistics: EMUSES","authors":"Chris Foulon, Marcela Ovando-Tellez, Lia Talozzi, Maurizio Corbetta, Anna Matsulevits, Michel Thiebaut de Schotten","doi":"arxiv-2406.14309","DOIUrl":"https://doi.org/arxiv-2406.14309","url":null,"abstract":"Understanding complex phenomena often requires analyzing high-dimensional\u0000data to uncover emergent properties that arise from multifactorial\u0000interactions. Here, we present EMUSES (Emerging-properties Mapping Using\u0000Spatial Embedding Statistics), an innovative approach employing Uniform\u0000Manifold Approximation and Projection (UMAP) to create high-dimensional\u0000embeddings that reveal latent structures within data. EMUSES facilitates the\u0000exploration and prediction of emergent properties by statistically analyzing\u0000these latent spaces. Using three distinct datasets--a handwritten digits\u0000dataset from the National Institute of Standards and Technology (NIST, E.\u0000Alpaydin, 1998), the Chicago Face Database (Ma et al., 2015), and brain\u0000disconnection data post-stroke (Talozzi et al., 2023)--we demonstrate EMUSES'\u0000effectiveness in detecting and interpreting emergent properties. Our method not\u0000only predicts outcomes with high accuracy but also provides clear\u0000visualizations and statistical insights into the underlying interactions within\u0000the data. By bridging the gap between predictive accuracy and interpretability,\u0000EMUSES offers researchers a powerful tool to understand the multifactorial\u0000origins of complex phenomena.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Protection Applications of Quantum Computing: A Review 量子计算的网络保护应用:回顾
Pub Date : 2024-06-19 DOI: arxiv-2406.13259
Ummar Ahmed, Tuomo Sipola, Jari Hautamäki
Quantum computing is a cutting-edge field of information technology thatharnesses the principles of quantum mechanics to perform computations. It hasmajor implications for the cyber security industry. Existing cyber protectionapplications are working well, but there are still challenges andvulnerabilities in computer networks. Sometimes data and privacy are alsocompromised. These complications lead to research questions asking what kind ofcyber protection applications of quantum computing are there and what potentialmethods or techniques can be used for cyber protection? These questions willreveal how much power quantum computing has and to what extent it canoutperform the conventional computing systems. This scoping review wasconducted by considering 815 papers. It showed the possibilities that can beachievedif quantum technologies are implemented in cyber environments. Thisscoping review discusses various domains such as algorithms and applications,bioinformatics, cloud and edge computing, the organization of complex systems,application areas focused on security and threats, and the broader quantumcomputing ecosystem. In each of these areas, there is significant scope forquantum computing to be implemented and to revolutionize the workingenvironment. Numerous quantum computing applications for cyber protection and anumber of techniques to protect our data and privacy were identified. Theresults are not limited to network security but also include data security.This paper also discusses societal aspects, e.g., the applications of quantumcomputing in the social sciences. This scoping review discusses how to enhancethe efficiency and security of quantum computing in various cyber securitydomains. Additionally, it encourages the reader to think about what kind oftechniques and methods can be deployed to secure the cyber world.
量子计算是利用量子力学原理进行计算的尖端信息技术领域。它对网络安全行业具有重大影响。现有的网络保护应用运行良好,但计算机网络仍存在挑战和漏洞。有时,数据和隐私也会受到损害。这些复杂情况引发了一些研究问题:量子计算有哪些网络保护应用,有哪些潜在方法或技术可用于网络保护?这些问题将揭示量子计算有多强大,以及在多大程度上可以超越传统计算系统。本次范围界定审查共审议了 815 篇论文。它展示了量子技术在网络环境中的应用所能带来的可能性。本范围综述讨论了多个领域,如算法和应用、生物信息学、云计算和边缘计算、复杂系统的组织、关注安全和威胁的应用领域,以及更广泛的量子计算生态系统。在上述每个领域,量子计算都有很大的应用空间,并将彻底改变工作环境。我们发现了大量量子计算在网络保护方面的应用,以及大量保护数据和隐私的技术。本文还讨论了社会方面的问题,例如量子计算在社会科学中的应用。本范围综述讨论了如何在各种网络安全领域提高量子计算的效率和安全性。此外,它还鼓励读者思考可以采用什么样的技术和方法来确保网络世界的安全。
{"title":"Cyber Protection Applications of Quantum Computing: A Review","authors":"Ummar Ahmed, Tuomo Sipola, Jari Hautamäki","doi":"arxiv-2406.13259","DOIUrl":"https://doi.org/arxiv-2406.13259","url":null,"abstract":"Quantum computing is a cutting-edge field of information technology that\u0000harnesses the principles of quantum mechanics to perform computations. It has\u0000major implications for the cyber security industry. Existing cyber protection\u0000applications are working well, but there are still challenges and\u0000vulnerabilities in computer networks. Sometimes data and privacy are also\u0000compromised. These complications lead to research questions asking what kind of\u0000cyber protection applications of quantum computing are there and what potential\u0000methods or techniques can be used for cyber protection? These questions will\u0000reveal how much power quantum computing has and to what extent it can\u0000outperform the conventional computing systems. This scoping review was\u0000conducted by considering 815 papers. It showed the possibilities that can be\u0000achievedif quantum technologies are implemented in cyber environments. This\u0000scoping review discusses various domains such as algorithms and applications,\u0000bioinformatics, cloud and edge computing, the organization of complex systems,\u0000application areas focused on security and threats, and the broader quantum\u0000computing ecosystem. In each of these areas, there is significant scope for\u0000quantum computing to be implemented and to revolutionize the working\u0000environment. Numerous quantum computing applications for cyber protection and a\u0000number of techniques to protect our data and privacy were identified. The\u0000results are not limited to network security but also include data security.\u0000This paper also discusses societal aspects, e.g., the applications of quantum\u0000computing in the social sciences. This scoping review discusses how to enhance\u0000the efficiency and security of quantum computing in various cyber security\u0000domains. Additionally, it encourages the reader to think about what kind of\u0000techniques and methods can be deployed to secure the cyber world.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Emerging Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1