首页 > 最新文献

arXiv - CS - Emerging Technologies最新文献

英文 中文
Semantic Communication for Efficient Point Cloud Transmission 高效点云传输的语义通信
Pub Date : 2024-09-05 DOI: arxiv-2409.03319
Shangzhuo Xie, Qianqian Yang, Yuyi Sun, Tianxiao Han, Zhaohui Yang, Zhiguo Shi
As three-dimensional acquisition technologies like LiDAR cameras advance, theneed for efficient transmission of 3D point clouds is becoming increasinglyimportant. In this paper, we present a novel semantic communication (SemCom)approach for efficient 3D point cloud transmission. Different from existingmethods that rely on downsampling and feature extraction for compression, ourapproach utilizes a parallel structure to separately extract both global andlocal information from point clouds. This system is composed of five keycomponents: local semantic encoder, global semantic encoder, channel encoder,channel decoder, and semantic decoder. Our numerical results indicate that thisapproach surpasses both the traditional Octree compression methodology andalternative deep learning-based strategies in terms of reconstruction quality.Moreover, our system is capable of achieving high-quality point cloudreconstruction under adverse channel conditions, specifically maintaining areconstruction quality of over 37dB even with severe channel noise.
随着激光雷达(LiDAR)相机等三维采集技术的发展,高效传输三维点云的需求变得越来越重要。在本文中,我们提出了一种用于高效传输三维点云的新型语义通信(SemCom)方法。与现有的依靠降低采样率和特征提取进行压缩的方法不同,我们的方法利用并行结构分别提取点云的全局和局部信息。该系统由五个关键部分组成:局部语义编码器、全局语义编码器、信道编码器、信道解码器和语义解码器。我们的数值结果表明,这种方法在重建质量方面超越了传统的八叉树压缩方法和基于深度学习的其他策略。此外,我们的系统还能在不利的信道条件下实现高质量的点云重建,特别是在严重的信道噪声下仍能保持超过 37dB 的重建质量。
{"title":"Semantic Communication for Efficient Point Cloud Transmission","authors":"Shangzhuo Xie, Qianqian Yang, Yuyi Sun, Tianxiao Han, Zhaohui Yang, Zhiguo Shi","doi":"arxiv-2409.03319","DOIUrl":"https://doi.org/arxiv-2409.03319","url":null,"abstract":"As three-dimensional acquisition technologies like LiDAR cameras advance, the\u0000need for efficient transmission of 3D point clouds is becoming increasingly\u0000important. In this paper, we present a novel semantic communication (SemCom)\u0000approach for efficient 3D point cloud transmission. Different from existing\u0000methods that rely on downsampling and feature extraction for compression, our\u0000approach utilizes a parallel structure to separately extract both global and\u0000local information from point clouds. This system is composed of five key\u0000components: local semantic encoder, global semantic encoder, channel encoder,\u0000channel decoder, and semantic decoder. Our numerical results indicate that this\u0000approach surpasses both the traditional Octree compression methodology and\u0000alternative deep learning-based strategies in terms of reconstruction quality.\u0000Moreover, our system is capable of achieving high-quality point cloud\u0000reconstruction under adverse channel conditions, specifically maintaining a\u0000reconstruction quality of over 37dB even with severe channel noise.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neuromorphic Heart Rate Monitors: Neural State Machines for Monotonic Change Detection 神经形态心率监测器:单调变化检测神经状态机
Pub Date : 2024-09-04 DOI: arxiv-2409.02618
Alessio Carpegna, Chiara De Luca, Federico Emanuele Pozzi, Alessandro Savino, Stefano Di Carlo, Giacomo Indiveri, Elisa Donati
Detecting monotonic changes in heart rate (HR) is crucial for earlyidentification of cardiac conditions and health management. This isparticularly important for dementia patients, where HR trends can signal stressor agitation. Developing wearable technologies that can perform always-onmonitoring of HRs is essential to effectively detect slow changes over extendedperiods of time. However, designing compact electronic circuits that canmonitor and process bio-signals continuously, and that can operate in alow-power regime to ensure long-lasting performance, is still an openchallenge. Neuromorphic technology offers an energy-efficient solution forreal-time health monitoring. We propose a neuromorphic implementation of aNeural State Machine (NSM) network to encode different health states and switchbetween them based on the input stimuli. Our focus is on detecting monotonicstate switches in electrocardiogram data to identify progressive HR increases.This innovative approach promises significant advancements in continuous healthmonitoring and management.
检测心率(HR)的单调变化对于早期识别心脏状况和健康管理至关重要。这一点对痴呆症患者尤为重要,因为心率变化趋势可能预示着应激性躁动。开发可随时监测心率的可穿戴技术对于有效检测长时间的缓慢变化至关重要。然而,设计能够连续监测和处理生物信号,并能在低功耗环境中运行以确保持久性能的紧凑型电子电路仍然是一个巨大的挑战。神经形态技术为实时健康监测提供了一种节能解决方案。我们提出了一种神经形态的神经状态机(NSM)网络实现方法,用于编码不同的健康状态,并根据输入刺激在它们之间进行切换。我们的重点是检测心电图数据中的单调状态切换,以识别渐进式心率增加。
{"title":"Neuromorphic Heart Rate Monitors: Neural State Machines for Monotonic Change Detection","authors":"Alessio Carpegna, Chiara De Luca, Federico Emanuele Pozzi, Alessandro Savino, Stefano Di Carlo, Giacomo Indiveri, Elisa Donati","doi":"arxiv-2409.02618","DOIUrl":"https://doi.org/arxiv-2409.02618","url":null,"abstract":"Detecting monotonic changes in heart rate (HR) is crucial for early\u0000identification of cardiac conditions and health management. This is\u0000particularly important for dementia patients, where HR trends can signal stress\u0000or agitation. Developing wearable technologies that can perform always-on\u0000monitoring of HRs is essential to effectively detect slow changes over extended\u0000periods of time. However, designing compact electronic circuits that can\u0000monitor and process bio-signals continuously, and that can operate in a\u0000low-power regime to ensure long-lasting performance, is still an open\u0000challenge. Neuromorphic technology offers an energy-efficient solution for\u0000real-time health monitoring. We propose a neuromorphic implementation of a\u0000Neural State Machine (NSM) network to encode different health states and switch\u0000between them based on the input stimuli. Our focus is on detecting monotonic\u0000state switches in electrocardiogram data to identify progressive HR increases.\u0000This innovative approach promises significant advancements in continuous health\u0000monitoring and management.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models 通过基于规则的人工智能和大型语言模型推进网络事件时间轴分析
Pub Date : 2024-09-04 DOI: arxiv-2409.02572
Fatma Yasmine Loumachi, Mohamed Chahine Ghanem
Timeline Analysis (TA) is a key part of Timeline Forensics (TF) in DigitalForensics (DF), focusing primarily on examining and analysing temporal digitalartefacts such as timestamps, derived from event logs, file metadata, and otherrelated data to correlate events resulting from cyber incidents and reconstructtheir chronological timeline. Traditional tools often struggle to efficientlyprocess the vast volume and variety of data acquired during DF investigationsand Incident Response (IR) processes. This paper presents a novel framework,GenDFIR, that combines Rule-Based Artificial Intelligence (R-BAI) algorithmswith Large Language Models (LLMs) to advance and automate the TA process. Ourapproach consists of two main stages (1) We use R-BAI to identify and selectanomalous digital artefacts based on predefined rules. (2) The selectedartefacts are then converted into embeddings for processing by an LLM with thehelp of a Retrieval-Augmented Generation (RAG) agent. The LLM consequentlyleverages its capabilities to perform automated TA on the artefacts and predictpotential incident scenarios. To validate our framework, we evaluate GenDFIRperformance, efficiency, and reliability using various metrics across syntheticcyber incident simulation scenarios. This paper presents a proof of concept,where the findings demonstrate the significant potential of integrating R-BAIand LLMs for TA. This novel approach highlights the power of Generative AI(GenAI), specifically LLMs, and opens new avenues for advanced threat detectionand incident reconstruction, representing a significant step forward in thefield.
时间线分析(TA)是数字取证(DF)中时间线取证(TF)的关键部分,主要侧重于检查和分析时间数字文物,如从事件日志、文件元数据和其他相关数据中提取的时间戳,以关联网络事件中的事件并重建其时间线。传统工具往往难以有效处理 DF 调查和事件响应 (IR) 过程中获取的大量数据和各种数据。本文介绍了一种新型框架 GenDFIR,它将基于规则的人工智能(R-BAI)算法与大型语言模型(LLM)相结合,以推进 TA 流程并使其自动化。我们的方法包括两个主要阶段 (1) 我们使用 R-BAI 根据预定义规则识别和选择异常数字人工制品。(2) 然后,在检索增强生成(RAG)代理的帮助下,将所选文物转换为嵌入,供 LLM 处理。随后,LLM 利用其能力对人工制品执行自动 TA,并预测潜在的事件场景。为了验证我们的框架,我们在合成网络事件模拟场景中使用各种指标对 GenDFIR 的性能、效率和可靠性进行了评估。本文提出了一个概念验证,其研究结果证明了将 R-BAI 和 LLM 集成到 TA 中的巨大潜力。这种新方法凸显了生成式人工智能(GenAI),特别是 LLMs 的强大功能,为高级威胁检测和事件重建开辟了新途径,代表着该领域向前迈出的重要一步。
{"title":"Advancing Cyber Incident Timeline Analysis Through Rule Based AI and Large Language Models","authors":"Fatma Yasmine Loumachi, Mohamed Chahine Ghanem","doi":"arxiv-2409.02572","DOIUrl":"https://doi.org/arxiv-2409.02572","url":null,"abstract":"Timeline Analysis (TA) is a key part of Timeline Forensics (TF) in Digital\u0000Forensics (DF), focusing primarily on examining and analysing temporal digital\u0000artefacts such as timestamps, derived from event logs, file metadata, and other\u0000related data to correlate events resulting from cyber incidents and reconstruct\u0000their chronological timeline. Traditional tools often struggle to efficiently\u0000process the vast volume and variety of data acquired during DF investigations\u0000and Incident Response (IR) processes. This paper presents a novel framework,\u0000GenDFIR, that combines Rule-Based Artificial Intelligence (R-BAI) algorithms\u0000with Large Language Models (LLMs) to advance and automate the TA process. Our\u0000approach consists of two main stages (1) We use R-BAI to identify and select\u0000anomalous digital artefacts based on predefined rules. (2) The selected\u0000artefacts are then converted into embeddings for processing by an LLM with the\u0000help of a Retrieval-Augmented Generation (RAG) agent. The LLM consequently\u0000leverages its capabilities to perform automated TA on the artefacts and predict\u0000potential incident scenarios. To validate our framework, we evaluate GenDFIR\u0000performance, efficiency, and reliability using various metrics across synthetic\u0000cyber incident simulation scenarios. This paper presents a proof of concept,\u0000where the findings demonstrate the significant potential of integrating R-BAI\u0000and LLMs for TA. This novel approach highlights the power of Generative AI\u0000(GenAI), specifically LLMs, and opens new avenues for advanced threat detection\u0000and incident reconstruction, representing a significant step forward in the\u0000field.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: Bitcoin Layer Two (L2) SoK:比特币第二层 (L2)
Pub Date : 2024-09-04 DOI: arxiv-2409.02650
Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono
We present the first Systematization of Knowledge (SoK) on constructing LayerTwo (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions(40 out of 335 extensively investigated cases) and provide a concise yetimpactful identification of six classic design patterns through two approaches(i.e., modifying transactions & creating proofs). Notably, we are the first toincorporate the inscription technology (emerged in mid-2023), along with aseries of related innovations. We further establish a reference framework thatserves as a baseline criterion ideally suited for evaluating the securityaspects of Bitcoin L2 solutions, and which can also be extended to broader L2applications. We apply this framework to evaluate each of the projects weinvestigated. We find that the inscription-based approaches introduce new functionality(i.e., programability) to Bitcoin systems, whereas existing proof-basedsolutions primarily address scalability challenges. Our security analysisreveals new attack vectors targeting data/state (availability, verification),assets (withdrawal, recovery), and users (disputes, censorship).
我们首次提出了关于构建比特币第二层(L2)解决方案的知识系统化(SoK)。我们仔细研究了正在进行中的比特币第二层解决方案的代表性子集(335 个广泛调查案例中的 40 个),并通过两种方法(即修改交易和创建证明)对六种经典设计模式进行了简明而有影响力的识别。值得注意的是,我们首次纳入了铭文技术(2023 年中期出现)以及一系列相关创新。我们进一步建立了一个参考框架,作为评估比特币二级解决方案安全方面的理想基准标准,也可扩展到更广泛的二级应用。我们应用这一框架来评估我们调查的每个项目。我们发现,基于铭文的方法为比特币系统引入了新的功能(即可编程性),而现有的基于证明的解决方案主要是解决可扩展性的挑战。我们的安全分析揭示了针对数据/状态(可用性、验证)、资产(提取、恢复)和用户(争议、审查)的新攻击向量。
{"title":"SoK: Bitcoin Layer Two (L2)","authors":"Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono","doi":"arxiv-2409.02650","DOIUrl":"https://doi.org/arxiv-2409.02650","url":null,"abstract":"We present the first Systematization of Knowledge (SoK) on constructing Layer\u0000Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions\u0000(40 out of 335 extensively investigated cases) and provide a concise yet\u0000impactful identification of six classic design patterns through two approaches\u0000(i.e., modifying transactions & creating proofs). Notably, we are the first to\u0000incorporate the inscription technology (emerged in mid-2023), along with a\u0000series of related innovations. We further establish a reference framework that\u0000serves as a baseline criterion ideally suited for evaluating the security\u0000aspects of Bitcoin L2 solutions, and which can also be extended to broader L2\u0000applications. We apply this framework to evaluate each of the projects we\u0000investigated. We find that the inscription-based approaches introduce new functionality\u0000(i.e., programability) to Bitcoin systems, whereas existing proof-based\u0000solutions primarily address scalability challenges. Our security analysis\u0000reveals new attack vectors targeting data/state (availability, verification),\u0000assets (withdrawal, recovery), and users (disputes, censorship).","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SELCC: Coherent Caching over Compute-Limited Disaggregated Memory SELCC:计算受限的分解内存上的相干缓存
Pub Date : 2024-09-03 DOI: arxiv-2409.02088
Ruihong Wang, Jianguo Wang, Walid G. Aref
Disaggregating memory from compute offers the opportunity to better utilizestranded memory in data centers. It is important to cache data in the computenodes and maintain cache coherence across multiple compute nodes to save onround-trip communication cost between the disaggregated memory and the computenodes. However, the limited computing power on the disaggregated memory serversmakes it challenging to maintain cache coherence among multiple compute-sidecaches over disaggregated shared memory. This paper introduces SELCC; aShared-Exclusive Latch Cache Coherence protocol that maintains cache coherencewithout imposing any computational burden on the remote memory side. SELCCbuilds on a one-sided shared-exclusive latch protocol by introducing lazy latchrelease and invalidation messages among the compute nodes so that it canguarantee both data access atomicity and cache coherence. SELCC minimizescommunication round-trips by embedding the current cache copy holder IDs intoRDMA latch words and prioritizes local concurrency control over globalconcurrency control. We instantiate the SELCC protocol onto compute-sidedcache, forming an abstraction layer over disaggregated memory. This abstractionlayer provides main-memory-like APIs to upper-level applications, and thusenabling existing data structures and algorithms to function over disaggregatedmemory with minimal code change. To demonstrate the usability of SELCC, weimplement a B-tree and three transaction concurrency control algorithms overSELCC's APIs. Micro-benchmark results show that the SELCC protocol achievesbetter performance compared to RPC-based cache-coherence protocols.Additionally, YCSB and TPC-C benchmarks indicate that applications over SELCCcan achieve comparable or superior performance against competitors overdisaggregated memory.
将内存从计算中分离出来为更好地利用数据中心的内存提供了机会。在计算节点中缓存数据并在多个计算节点之间保持缓存一致性以节省分解内存与计算节点之间的往返通信成本非常重要。然而,由于分解内存服务器的计算能力有限,在分解共享内存上保持多个计算侧缓存之间的缓存一致性具有挑战性。本文介绍的 SELCC 是一种共享独占锁存器缓存一致性协议,它能在不给远程内存侧带来任何计算负担的情况下保持缓存一致性。SELCC 建立在单边共享独占锁存器协议的基础上,在计算节点之间引入了懒锁存器释放和失效消息,从而保证了数据访问的原子性和高速缓存的一致性。SELCC 通过将当前缓存副本持有者 ID 嵌入到 RDMA 锁存字中,最大限度地减少了通信往返次数,并将本地并发控制置于全局并发控制之上。我们将 SELCC 协议实例化到计算侧高速缓存上,在分解内存上形成一个抽象层。这个抽象层为上层应用提供了类似于主存储器的应用程序接口,从而使现有的数据结构和算法只需最少的代码改动就能在分解内存上运行。为了证明SELCC的可用性,我们在SELCC的API上实现了一个B树和三个事务并发控制算法。微基准测试结果表明,与基于RPC的高速缓存一致性协议相比,SELCC协议实现了更高的性能。此外,YCSB和TPC-C基准测试表明,通过SELCC的应用程序可以在分解内存上实现与竞争对手相当或更高的性能。
{"title":"SELCC: Coherent Caching over Compute-Limited Disaggregated Memory","authors":"Ruihong Wang, Jianguo Wang, Walid G. Aref","doi":"arxiv-2409.02088","DOIUrl":"https://doi.org/arxiv-2409.02088","url":null,"abstract":"Disaggregating memory from compute offers the opportunity to better utilize\u0000stranded memory in data centers. It is important to cache data in the compute\u0000nodes and maintain cache coherence across multiple compute nodes to save on\u0000round-trip communication cost between the disaggregated memory and the compute\u0000nodes. However, the limited computing power on the disaggregated memory servers\u0000makes it challenging to maintain cache coherence among multiple compute-side\u0000caches over disaggregated shared memory. This paper introduces SELCC; a\u0000Shared-Exclusive Latch Cache Coherence protocol that maintains cache coherence\u0000without imposing any computational burden on the remote memory side. SELCC\u0000builds on a one-sided shared-exclusive latch protocol by introducing lazy latch\u0000release and invalidation messages among the compute nodes so that it can\u0000guarantee both data access atomicity and cache coherence. SELCC minimizes\u0000communication round-trips by embedding the current cache copy holder IDs into\u0000RDMA latch words and prioritizes local concurrency control over global\u0000concurrency control. We instantiate the SELCC protocol onto compute-sided\u0000cache, forming an abstraction layer over disaggregated memory. This abstraction\u0000layer provides main-memory-like APIs to upper-level applications, and thus\u0000enabling existing data structures and algorithms to function over disaggregated\u0000memory with minimal code change. To demonstrate the usability of SELCC, we\u0000implement a B-tree and three transaction concurrency control algorithms over\u0000SELCC's APIs. Micro-benchmark results show that the SELCC protocol achieves\u0000better performance compared to RPC-based cache-coherence protocols.\u0000Additionally, YCSB and TPC-C benchmarks indicate that applications over SELCC\u0000can achieve comparable or superior performance against competitors over\u0000disaggregated memory.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142213907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acoustic Levitation for Environmental Remediation: An Effective Approach for Containment and Forecasting of Oil Spills 声悬浮技术用于环境修复:遏制和预测石油泄漏的有效方法
Pub Date : 2024-09-03 DOI: arxiv-2409.01642
L Rochit, Nithish Kumar N, Devi Priya V S, Sibi Chakkaravarthy Sethuraman, Anitha Subramanian
The ocean ecology is badly impacted by large-scale oil spills, plastic waste,and chemical pollution, which destroy ecosystems and endanger marine life.Acknowledging the detrimental effects of oil spills on ecosystems, our researchaims to establish the foundation for creative methods to lessen their impact.With an emphasis on the containment and prediction of oil spills, this researchinvestigates the potential of acoustic levitation as a cutting-edge techniquefor environmental cleanup. Effectively separating and eliminating pollutantswithout causing additional ecological harm is a major issue for traditional oilspill cleanup techniques. Acoustic levitation provides a non-invasive,accurate, and effective alternative by using sound waves to precisely andsubtly separate oil droplets from water in controlled environments. Thisproposed approach can reduce the negative effects on the environment andincrease the efficacy of cleanup efforts. The findings have been examined andassessed by proof of concept experiments with oil droplets, identifying therelationship between the intensity of ultrasonic pressure and the proportion ofoil droplets collected.
海洋生态受到大规模溢油、塑料垃圾和化学污染的严重影响,这些污染破坏了生态系统并危及海洋生物。我们的研究认识到溢油对生态系统的有害影响,旨在为减少溢油影响的创新方法奠定基础。有效分离和消除污染物,同时不造成额外的生态危害,是传统溢油清理技术面临的主要问题。声学悬浮技术提供了一种非侵入性、精确和有效的替代方法,它利用声波在受控环境中精确地将油滴从水中分离出来。这种拟议的方法可以减少对环境的负面影响,提高清理工作的效率。研究结果已通过油滴概念验证实验进行了检验和评估,确定了超声波压力强度与收集到的油滴比例之间的关系。
{"title":"Acoustic Levitation for Environmental Remediation: An Effective Approach for Containment and Forecasting of Oil Spills","authors":"L Rochit, Nithish Kumar N, Devi Priya V S, Sibi Chakkaravarthy Sethuraman, Anitha Subramanian","doi":"arxiv-2409.01642","DOIUrl":"https://doi.org/arxiv-2409.01642","url":null,"abstract":"The ocean ecology is badly impacted by large-scale oil spills, plastic waste,\u0000and chemical pollution, which destroy ecosystems and endanger marine life.\u0000Acknowledging the detrimental effects of oil spills on ecosystems, our research\u0000aims to establish the foundation for creative methods to lessen their impact.\u0000With an emphasis on the containment and prediction of oil spills, this research\u0000investigates the potential of acoustic levitation as a cutting-edge technique\u0000for environmental cleanup. Effectively separating and eliminating pollutants\u0000without causing additional ecological harm is a major issue for traditional oil\u0000spill cleanup techniques. Acoustic levitation provides a non-invasive,\u0000accurate, and effective alternative by using sound waves to precisely and\u0000subtly separate oil droplets from water in controlled environments. This\u0000proposed approach can reduce the negative effects on the environment and\u0000increase the efficacy of cleanup efforts. The findings have been examined and\u0000assessed by proof of concept experiments with oil droplets, identifying the\u0000relationship between the intensity of ultrasonic pressure and the proportion of\u0000oil droplets collected.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142214107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Annealing-inspired training of an optical neural network with ternary weights 三元权重光神经网络的退火启发式训练
Pub Date : 2024-09-02 DOI: arxiv-2409.01042
Anas Skalli, Mirko Goldmann, Nasibeh Haghighi, Stephan Reitzenstein, James A. Lott, Daniel Brunner
Artificial neural networks (ANNs) represent a fundamentally connectionnistand distributed approach to computing, and as such they differ from classicalcomputers that utilize the von Neumann architecture. This has revived researchinterest in new unconventional hardware to enable more efficientimplementations of ANNs rather than emulating them on traditional machines. Inorder to fully leverage the capabilities of this new generation of ANNs,optimization algorithms that take into account hardware limitations andimperfections are necessary. Photonics represents a particularly promisingplatform, offering scalability, high speed, energy efficiency, and thecapability for parallel information processing. Yet, fully fledgedimplementations of autonomous optical neural networks (ONNs) with in-situlearning remain scarce. In this work, we propose a ternary weight architecturehigh-dimensional semiconductor laser-based ONN. We introduce a simple methodfor achieving ternary weights with Boolean hardware, significantly increasingthe ONN's information processing capabilities. Furthermore, we design a novelin-situ optimization algorithm that is compatible with, both, Boolean andternary weights, and provide a detailed hyperparameter study of said algorithmfor two different tasks. Our novel algorithm results in benefits, both in termsof convergence speed and performance. Finally, we experimentally characterizethe long-term inference stability of our ONN and find that it is extremelystable with a consistency above 99% over a period of more than 10 hours,addressing one of the main concerns in the field. Our work is of particularrelevance in the context of in-situ learning under restricted hardwareresources, especially since minimizing the power consumption of auxiliaryhardware is crucial to preserving efficiency gains achieved by non-von NeumannANN implementations.
人工神经网络(ANN)从根本上代表了一种连接主义和分布式计算方法,因此有别于采用冯-诺依曼体系结构的经典计算机。这重新激发了人们对新的非传统硬件的研究兴趣,以便更有效地实现神经网络,而不是在传统机器上模拟神经网络。为了充分发挥新一代人工神经网络的能力,必须采用考虑到硬件限制和缺陷的优化算法。光子技术是一个特别有前途的平台,它具有可扩展性、高速度、高能效和并行信息处理能力。然而,具有现场学习功能的自主光学神经网络(ONNs)的成熟实施方案仍然很少。在这项研究中,我们提出了一种基于三元权重架构的高维半导体激光光神经网络。我们介绍了一种利用布尔硬件实现三元权重的简单方法,大大提高了 ONN 的信息处理能力。此外,我们还设计了一种与布尔权重和三元权重兼容的新型原位优化算法,并针对两个不同任务对该算法进行了详细的超参数研究。我们的新算法在收敛速度和性能方面都有优势。最后,我们在实验中描述了我们的ONN的长期推理稳定性,发现它非常稳定,在超过10小时的时间内一致性超过99%,解决了该领域的主要问题之一。我们的工作对于在硬件资源受限的情况下进行原位学习具有特别重要的意义,尤其是因为最大限度地降低辅助硬件的功耗对于保持非冯诺依曼ONN实现所取得的效率提升至关重要。
{"title":"Annealing-inspired training of an optical neural network with ternary weights","authors":"Anas Skalli, Mirko Goldmann, Nasibeh Haghighi, Stephan Reitzenstein, James A. Lott, Daniel Brunner","doi":"arxiv-2409.01042","DOIUrl":"https://doi.org/arxiv-2409.01042","url":null,"abstract":"Artificial neural networks (ANNs) represent a fundamentally connectionnist\u0000and distributed approach to computing, and as such they differ from classical\u0000computers that utilize the von Neumann architecture. This has revived research\u0000interest in new unconventional hardware to enable more efficient\u0000implementations of ANNs rather than emulating them on traditional machines. In\u0000order to fully leverage the capabilities of this new generation of ANNs,\u0000optimization algorithms that take into account hardware limitations and\u0000imperfections are necessary. Photonics represents a particularly promising\u0000platform, offering scalability, high speed, energy efficiency, and the\u0000capability for parallel information processing. Yet, fully fledged\u0000implementations of autonomous optical neural networks (ONNs) with in-situ\u0000learning remain scarce. In this work, we propose a ternary weight architecture\u0000high-dimensional semiconductor laser-based ONN. We introduce a simple method\u0000for achieving ternary weights with Boolean hardware, significantly increasing\u0000the ONN's information processing capabilities. Furthermore, we design a novel\u0000in-situ optimization algorithm that is compatible with, both, Boolean and\u0000ternary weights, and provide a detailed hyperparameter study of said algorithm\u0000for two different tasks. Our novel algorithm results in benefits, both in terms\u0000of convergence speed and performance. Finally, we experimentally characterize\u0000the long-term inference stability of our ONN and find that it is extremely\u0000stable with a consistency above 99% over a period of more than 10 hours,\u0000addressing one of the main concerns in the field. Our work is of particular\u0000relevance in the context of in-situ learning under restricted hardware\u0000resources, especially since minimizing the power consumption of auxiliary\u0000hardware is crucial to preserving efficiency gains achieved by non-von Neumann\u0000ANN implementations.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142213906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyper-Compression: Model Compression via Hyperfunction 超压缩:通过超函数压缩模型
Pub Date : 2024-09-01 DOI: arxiv-2409.00592
Fenglei Fan, Juntong Fan, Dayang Wang, Jingbo Zhang, Zelin Dong, Shijun Zhang, Ge Wang, Tieyong Zeng
The rapid growth of large models' size has far outpaced that of GPU memory.To bridge this gap, inspired by the succinct relationship between genotype andphenotype, we turn the model compression problem into the issue of parameterrepresentation to propose the so-called hyper-compression. Thehyper-compression uses a hyperfunction to represent the parameters of thetarget network, and notably, here the hyperfunction is designed per ergodictheory that relates to a problem: if a low-dimensional dynamic system can fillthe high-dimensional space eventually. Empirically, the proposedhyper-compression enjoys the following merits: 1) textbf{P}referablecompression ratio; 2) textbf{N}o post-hoc retraining; 3) textbf{A}ffordableinference time; and 4) textbf{S}hort compression time. It compresses LLaMA2-7Bin an hour and achieves close-to-int4-quantization performance, withoutretraining and with a performance drop of less than 1%. Our work has thepotential to invigorate the field of model compression, towards a harmonybetween the scaling law and the stagnation of hardware upgradation.
为了弥补这一差距,受基因型和表型之间简洁关系的启发,我们将模型压缩问题转化为参数表示问题,提出了所谓的超压缩。超压缩使用一个超函数来表示目标网络的参数,值得注意的是,这里的超函数是根据与一个问题相关的麦格理论设计的:一个低维动态系统最终能否填充高维空间。从经验来看,所提出的超压缩具有以下优点:1)可取的压缩比;2)无需事后重新训练;3)可负担的推理时间;4)压缩时间短。它能在一小时内压缩 LLaMA2-7B,并实现接近int4 量化的性能,无需重新训练,性能下降不到 1%。我们的工作有可能为模型压缩领域注入新的活力,从而实现扩展规律与硬件升级停滞之间的和谐。
{"title":"Hyper-Compression: Model Compression via Hyperfunction","authors":"Fenglei Fan, Juntong Fan, Dayang Wang, Jingbo Zhang, Zelin Dong, Shijun Zhang, Ge Wang, Tieyong Zeng","doi":"arxiv-2409.00592","DOIUrl":"https://doi.org/arxiv-2409.00592","url":null,"abstract":"The rapid growth of large models' size has far outpaced that of GPU memory.\u0000To bridge this gap, inspired by the succinct relationship between genotype and\u0000phenotype, we turn the model compression problem into the issue of parameter\u0000representation to propose the so-called hyper-compression. The\u0000hyper-compression uses a hyperfunction to represent the parameters of the\u0000target network, and notably, here the hyperfunction is designed per ergodic\u0000theory that relates to a problem: if a low-dimensional dynamic system can fill\u0000the high-dimensional space eventually. Empirically, the proposed\u0000hyper-compression enjoys the following merits: 1) textbf{P}referable\u0000compression ratio; 2) textbf{N}o post-hoc retraining; 3) textbf{A}ffordable\u0000inference time; and 4) textbf{S}hort compression time. It compresses LLaMA2-7B\u0000in an hour and achieves close-to-int4-quantization performance, without\u0000retraining and with a performance drop of less than 1%. Our work has the\u0000potential to invigorate the field of model compression, towards a harmony\u0000between the scaling law and the stagnation of hardware upgradation.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142213910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards 3D AI Hardware: Fine-Grain Hardware Characterization of 3D Stacks for Heterogeneous System Integration & AI Systems 迈向 3D AI 硬件:用于异构系统集成和人工智能系统的三维堆栈的细粒度硬件特性分析
Pub Date : 2024-08-31 DOI: arxiv-2409.10539
Eren Kurshan, Paul Franzon
3D integration offers key advantages in improving system performance andefficiency for the End-of-Scaling era. It enables the incorporation ofheterogeneous system components and disparate technologies, eliminates off-chipcommunication constraints, reduces on-chip latency and total power dissipation.Moreover, AIs demand for increased computational power, larger GPU cachecapacity, energy efficiency and low power custom AI hardware integration allserve as drivers for 3D integration. Although 3D advantages such as enhancedinterconnectivity and increased performance have been demonstrated throughnumerous technology sites, heterogeneous 3D system design raises numerousunanswered questions. Among the primary challenges are the temperature andlifetime reliability issues caused by the complex interaction patterns amongsystem components. Such interactions are harder to model with current modelingtools and require detailed hardware characterization. This study presents thelatest drivers for 3D integration and the resulting need for hardware emulationframeworks. It then presents a design to profile power, temperature, noise,inter-layer bandwidth and lifetime reliability characterization that canemulate a wide range of stacking alternatives. This framework allows forcontrolling activity levels at the macro-level, along with customized sensorinfrastructure to characterize heat propagation, inter-layer noise, powerdelivery, reliability and inter-connectivity as well as the interactions amongcritical design objectives.
三维集成在提高系统性能和效率方面具有关键优势,可满足 "规模末期 "时代的需求。此外,人工智能对更高计算能力、更大 GPU 缓存容量、能效和低功耗定制人工智能硬件集成的需求都是三维集成的驱动力。尽管 3D 的优势(如增强的互联性和更高的性能)已通过众多技术网站得到证实,但异构 3D 系统设计仍存在许多未解之谜。其中最主要的挑战是系统组件之间复杂的交互模式所导致的温度和寿命可靠性问题。目前的建模工具难以对这种相互作用进行建模,需要进行详细的硬件表征。本研究介绍了三维集成的最新驱动力以及由此产生的对硬件仿真框架的需求。然后,它介绍了一种用于功率、温度、噪声、层间带宽和寿命可靠性特征描述的设计,可以模拟各种堆叠替代方案。该框架允许在宏观层面控制活动水平,同时采用定制的传感器基础设施来描述热传播、层间噪声、功率传输、可靠性和互连性,以及关键设计目标之间的相互作用。
{"title":"Towards 3D AI Hardware: Fine-Grain Hardware Characterization of 3D Stacks for Heterogeneous System Integration & AI Systems","authors":"Eren Kurshan, Paul Franzon","doi":"arxiv-2409.10539","DOIUrl":"https://doi.org/arxiv-2409.10539","url":null,"abstract":"3D integration offers key advantages in improving system performance and\u0000efficiency for the End-of-Scaling era. It enables the incorporation of\u0000heterogeneous system components and disparate technologies, eliminates off-chip\u0000communication constraints, reduces on-chip latency and total power dissipation.\u0000Moreover, AIs demand for increased computational power, larger GPU cache\u0000capacity, energy efficiency and low power custom AI hardware integration all\u0000serve as drivers for 3D integration. Although 3D advantages such as enhanced\u0000interconnectivity and increased performance have been demonstrated through\u0000numerous technology sites, heterogeneous 3D system design raises numerous\u0000unanswered questions. Among the primary challenges are the temperature and\u0000lifetime reliability issues caused by the complex interaction patterns among\u0000system components. Such interactions are harder to model with current modeling\u0000tools and require detailed hardware characterization. This study presents the\u0000latest drivers for 3D integration and the resulting need for hardware emulation\u0000frameworks. It then presents a design to profile power, temperature, noise,\u0000inter-layer bandwidth and lifetime reliability characterization that can\u0000emulate a wide range of stacking alternatives. This framework allows for\u0000controlling activity levels at the macro-level, along with customized sensor\u0000infrastructure to characterize heat propagation, inter-layer noise, power\u0000delivery, reliability and inter-connectivity as well as the interactions among\u0000critical design objectives.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"30 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142263119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity 利用自我主权身份确保消费物联网设备所有权的安全管理和转让
Pub Date : 2024-08-30 DOI: arxiv-2408.17184
Nazmus Sakib, Md Yeasin Ali, Nuran Mubashshira Momo, Marzia Islam Mumu, Masum Al Nahid, Fairuz Rahaman Chowdhury, Md Sadek Ferdous
The popularity of the Internet of Things (IoT) has driven its usage in ourhomes and industries over the past 10-12 years. However, there have been somemajor issues related to identity management and ownership transfer involvingIoT devices, particularly for consumer IoT devices, e. g. smart appliances suchas smart TVs, smart refrigerators, and so on. There have been a few attempts toaddress this issue; however, user-centric and effective ownership and identitymanagement of IoT devices have not been very successful so far. Recently,blockchain technology has been used to address these issues with limitedsuccess. This article presents a Self-sovereign Identity (SSI) based systemthat facilitates a secure and user-centric ownership management and transfer ofconsumer IoT devices. The system leverages a number of emerging technologies,such as blockchain and decentralized identifiers (DID), verifiable credentials(VC), under the umbrella of SSI. We present the architecture of the systembased on a threat model and requirement analysis, discuss the implementation ofa Proof-of-Concept based on the proposed system and illustrate a number ofuse-cases with their detailed protocol flows. Furthermore, we analyse itssecurity using ProVerif, a state-of-the art protocol verification tool andexamine its performance.
过去 10-12 年间,物联网(IoT)的普及推动了其在家庭和工业领域的应用。然而,在涉及物联网设备的身份管理和所有权转移方面一直存在一些重大问题,特别是对于消费类物联网设备,如智能电视、智能冰箱等智能电器。已经有一些尝试来解决这个问题,但迄今为止,以用户为中心、有效的物联网设备所有权和身份管理还不是很成功。最近,区块链技术被用来解决这些问题,但成效有限。本文介绍了一种基于自我主权身份(SSI)的系统,该系统有助于以用户为中心对消费者物联网设备进行安全的所有权管理和转让。该系统利用了一系列新兴技术,如区块链、去中心化标识符(DID)、可验证凭证(VC)等。我们在威胁模型和需求分析的基础上介绍了该系统的架构,讨论了基于拟议系统的概念验证的实施情况,并举例说明了一些使用案例及其详细的协议流。此外,我们还使用最先进的协议验证工具 ProVerif 分析了系统的安全性,并检验了其性能。
{"title":"Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity","authors":"Nazmus Sakib, Md Yeasin Ali, Nuran Mubashshira Momo, Marzia Islam Mumu, Masum Al Nahid, Fairuz Rahaman Chowdhury, Md Sadek Ferdous","doi":"arxiv-2408.17184","DOIUrl":"https://doi.org/arxiv-2408.17184","url":null,"abstract":"The popularity of the Internet of Things (IoT) has driven its usage in our\u0000homes and industries over the past 10-12 years. However, there have been some\u0000major issues related to identity management and ownership transfer involving\u0000IoT devices, particularly for consumer IoT devices, e. g. smart appliances such\u0000as smart TVs, smart refrigerators, and so on. There have been a few attempts to\u0000address this issue; however, user-centric and effective ownership and identity\u0000management of IoT devices have not been very successful so far. Recently,\u0000blockchain technology has been used to address these issues with limited\u0000success. This article presents a Self-sovereign Identity (SSI) based system\u0000that facilitates a secure and user-centric ownership management and transfer of\u0000consumer IoT devices. The system leverages a number of emerging technologies,\u0000such as blockchain and decentralized identifiers (DID), verifiable credentials\u0000(VC), under the umbrella of SSI. We present the architecture of the system\u0000based on a threat model and requirement analysis, discuss the implementation of\u0000a Proof-of-Concept based on the proposed system and illustrate a number of\u0000use-cases with their detailed protocol flows. Furthermore, we analyse its\u0000security using ProVerif, a state-of-the art protocol verification tool and\u0000examine its performance.","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142213911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Emerging Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1