首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
A Recursive DRL-Based Resource Allocation Method for Multibeam Satellite Communication Systems 基于递归 DRL 的多波束卫星通信系统资源分配方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-09 DOI: 10.23919/cje.2022.00.135
Haowei Meng;Ning Xin;Hao Qin;Di Zhao
Optimization-based radio resource management (RRM) has shown significant performance gains on high-throughput satellites (HTSs). However, as the number of allocable on-board resources increases, traditional RRM is difficult to apply in real satellite systems due to its intense computational complexity. Deep reinforcement learning (DRL) is a promising solution for the resource allocation problem due to its model-free advantages. Nevertheless, the action space faced by DRL increases exponentially with the increase of communication scale, which leads to an excessive exploration cost of the algorithm. In this paper, we propose a recursive frequency resource allocation algorithm based on long-short term memory (LSTM) and proximal policy optimization (PPO), called PPO-RA-LOOP, where RA means resource allocation and LOOP means the algorithm outputs actions in a recursive manner. Specifically, the PPO algorithm uses LSTM network to recursively generate sub-actions about frequency resource allocation for each beam, which significantly cuts down the action space. In addition, the LSTM-based recursive architecture allows PPO to better allocate the next frequency resource by using the generated sub-actions information as a prior knowledge, which reduces the complexity of the neural network. The simulation results show that PPO-RA-LOOP achieved higher spectral efficiency and system satisfaction compared with other frequency allocation algorithms.
基于优化的无线电资源管理(RRM)已在高通量卫星(HTS)上显示出显著的性能提升。然而,随着可分配星载资源数量的增加,传统的 RRM 因其计算复杂度高而难以在实际卫星系统中应用。深度强化学习(DRL)因其无模型的优势而成为资源分配问题的一种有前途的解决方案。然而,随着通信规模的扩大,DRL 面临的行动空间呈指数级增长,导致算法的探索成本过高。本文提出了一种基于长短期记忆(LSTM)和近端策略优化(PPO)的递归频率资源分配算法,称为 PPO-RA-LOOP,其中 RA 表示资源分配,LOOP 表示算法以递归方式输出动作。具体来说,PPO 算法使用 LSTM 网络递归生成每个波束的频率资源分配子操作,从而大大缩小了操作空间。此外,基于 LSTM 的递归结构允许 PPO 将生成的子动作信息作为先验知识,从而更好地分配下一个频率资源,这降低了神经网络的复杂性。仿真结果表明,与其他频率分配算法相比,PPO-RA-LOOP 实现了更高的频谱效率和系统满意度。
{"title":"A Recursive DRL-Based Resource Allocation Method for Multibeam Satellite Communication Systems","authors":"Haowei Meng;Ning Xin;Hao Qin;Di Zhao","doi":"10.23919/cje.2022.00.135","DOIUrl":"https://doi.org/10.23919/cje.2022.00.135","url":null,"abstract":"Optimization-based radio resource management (RRM) has shown significant performance gains on high-throughput satellites (HTSs). However, as the number of allocable on-board resources increases, traditional RRM is difficult to apply in real satellite systems due to its intense computational complexity. Deep reinforcement learning (DRL) is a promising solution for the resource allocation problem due to its model-free advantages. Nevertheless, the action space faced by DRL increases exponentially with the increase of communication scale, which leads to an excessive exploration cost of the algorithm. In this paper, we propose a recursive frequency resource allocation algorithm based on long-short term memory (LSTM) and proximal policy optimization (PPO), called PPO-RA-LOOP, where RA means resource allocation and LOOP means the algorithm outputs actions in a recursive manner. Specifically, the PPO algorithm uses LSTM network to recursively generate sub-actions about frequency resource allocation for each beam, which significantly cuts down the action space. In addition, the LSTM-based recursive architecture allows PPO to better allocate the next frequency resource by using the generated sub-actions information as a prior knowledge, which reduces the complexity of the neural network. The simulation results show that PPO-RA-LOOP achieved higher spectral efficiency and system satisfaction compared with other frequency allocation algorithms.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10669755","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142159987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits 混合极性里德-穆勒逻辑电路的高效快速面积优化方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-09 DOI: 10.23919/cje.2022.00.407
Yuhao Zhou;Zhenxue He;Jianhui Jiang;Xiaojun Zhao;Fan Zhang;Limin Xiao;Xiang Wang
Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller (MPRM) circuits have poor optimization effect and efficiency. Given that the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm (WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. To address the issue of low conversion efficiency in existing polarity conversion approaches, we introduce a fast polarity conversion algorithm (FPCA). Moreover, we present an MPRM circuits area optimization approach that uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. Experimental results demonstrate that the proposed MPRM circuits area optimization approach is effective and can be used as a promising EDA tool.
面积已成为制约集成电路发展的主要瓶颈之一。现有基于 XNOR/OR 的混合极性里德-穆勒(MPRM)电路的面积优化方法的优化效果和效率较差。鉴于 MPRM 逻辑电路的面积优化是一个组合优化问题,我们提出了一种整体退火自适应细菌觅食算法(WAA-BFA),其中包括基于马尔可夫链和 Metropolis 接受准则的个体进化和基于自适应概率的个体突变。针对现有极性转换方法转换效率低的问题,我们引入了快速极性转换算法(FPCA)。此外,我们还提出了一种 MPRM 电路面积优化方法,利用 FPCA 和 WAA-BFA 搜索与最小电路面积相对应的最佳极性。实验结果表明,所提出的 MPRM 电路面积优化方法是有效的,可作为一种有前途的 EDA 工具使用。
{"title":"An Efficient and Fast Area Optimization Approach for Mixed Polarity Reed-Muller Logic Circuits","authors":"Yuhao Zhou;Zhenxue He;Jianhui Jiang;Xiaojun Zhao;Fan Zhang;Limin Xiao;Xiang Wang","doi":"10.23919/cje.2022.00.407","DOIUrl":"https://doi.org/10.23919/cje.2022.00.407","url":null,"abstract":"Area has become one of the main bottlenecks restricting the development of integrated circuits. The area optimization approaches of existing XNOR/OR-based mixed polarity Reed-Muller (MPRM) circuits have poor optimization effect and efficiency. Given that the area optimization of MPRM logic circuits is a combinatorial optimization problem, we propose a whole annealing adaptive bacterial foraging algorithm (WAA-BFA), which includes individual evolution based on Markov chain and Metropolis acceptance criteria, and individual mutation based on adaptive probability. To address the issue of low conversion efficiency in existing polarity conversion approaches, we introduce a fast polarity conversion algorithm (FPCA). Moreover, we present an MPRM circuits area optimization approach that uses the FPCA and WAA-BFA to search for the best polarity corresponding to the minimum circuits area. Experimental results demonstrate that the proposed MPRM circuits area optimization approach is effective and can be used as a promising EDA tool.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10669742","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142159955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
YOLO-Drone: A Scale-Aware Detector for Drone Vision YOLO-Drone:用于无人机视觉的规模感知探测器
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2023.00.254
Yutong Li;Miao Ma;Shichang Liu;Chao Yao;Longjiang Guo
Object detection is an important task in drone vision. Since the number of objects and their scales always vary greatly in the drone-captured video, small object-oriented feature becomes the bottleneck of model performance, and most existing object detectors tend to underperform in drone-vision scenes. To solve these problems, we propose a novel detector named YOLO-Drone. In the proposed detector, the backbone of YOLO is firstly replaced with ConvNeXt, which is the state-of-the-art one to extract more discriminative features. Then, a novel scale-aware attention (SAA) module is designed in detection head to solve the large disparity scale problem. A scale-sensitive loss (SSL) is also introduced to put more emphasis on object scale to enhance the discriminative ability of the proposed detector. Experimental results on the latest VisDrone 2022 test-challenge dataset (detection track) show that our detector can achieve average precision (AP) of 39.43%, which is tied with the previous state-of-the-art, meanwhile, reducing 39.8% of the computational cost.
物体检测是无人机视觉中的一项重要任务。由于无人机捕获的视频中物体的数量和尺度总是千差万别,面向小物体的特征成为模型性能的瓶颈,现有的大多数物体检测器在无人机视觉场景中往往表现不佳。为了解决这些问题,我们提出了一种名为 YOLO-Drone 的新型检测器。在所提出的检测器中,YOLO 的主干首先被最先进的 ConvNeXt 所取代,以提取更多的判别特征。然后,在检测头中设计了一个新颖的规模感知注意力(SAA)模块,以解决大差距尺度问题。此外,还引入了尺度敏感损失(SSL),以更加重视物体的尺度,从而提高拟议检测器的判别能力。在最新的 VisDrone 2022 测试挑战数据集(检测轨迹)上的实验结果表明,我们的检测器可以达到 39.43% 的平均精度(AP),与之前的先进水平持平,同时降低了 39.8% 的计算成本。
{"title":"YOLO-Drone: A Scale-Aware Detector for Drone Vision","authors":"Yutong Li;Miao Ma;Shichang Liu;Chao Yao;Longjiang Guo","doi":"10.23919/cje.2023.00.254","DOIUrl":"10.23919/cje.2023.00.254","url":null,"abstract":"Object detection is an important task in drone vision. Since the number of objects and their scales always vary greatly in the drone-captured video, small object-oriented feature becomes the bottleneck of model performance, and most existing object detectors tend to underperform in drone-vision scenes. To solve these problems, we propose a novel detector named YOLO-Drone. In the proposed detector, the backbone of YOLO is firstly replaced with ConvNeXt, which is the state-of-the-art one to extract more discriminative features. Then, a novel scale-aware attention (SAA) module is designed in detection head to solve the large disparity scale problem. A scale-sensitive loss (SSL) is also introduced to put more emphasis on object scale to enhance the discriminative ability of the proposed detector. Experimental results on the latest VisDrone 2022 test-challenge dataset (detection track) show that our detector can achieve average precision (AP) of 39.43%, which is tied with the previous state-of-the-art, meanwhile, reducing 39.8% of the computational cost.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606208","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141852824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Object Detection Networks for UAV Aerial Images Based on YOLO 基于 YOLO 的无人机航空图像轻量级物体检测网络
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2022.00.300
Yanshan Li;Jiarong Wang;Kunhua Zhang;Jiawei Yi;Miaomiao Wei;Lirong Zheng;Weixin Xie
Existing high-precision object detection algorithms for UAV (unmanned aerial vehicle) aerial images often have a large number of parameters and heavy weight, which makes it difficult to be applied to mobile devices. We propose three YOLO-based lightweight object detection networks for UAVs, named YOLO-L, YOLO-S, and YOLO-M, respectively. In YOLO-L, we adopt a deconvolution approach to explore suitable upsampling rules during training to improve the detection accuracy. The convolution-batch normalization-SiLU activation function (CBS) structure is replaced with Ghost CBS to reduce the number of parameters and weight, meanwhile Maxpool maximum pooling operation is proposed to replace the CBS structure to avoid generating parameters and weight. YOLO-S greatly reduces the weight of the network by directly introducing CSPGhostNeck residual structures, so that the parameters and weight are respectively decreased by about 15% at the expense of 2.4% mAP. And YOLO-M adopts the CSPGhostNeck residual structure and deconvolution to reduce parameters by 5.6% and weight by 5.7%, while mAP only by 1.8%. The results show that the three lightweight detection networks proposed in this paper have good performance in UAV aerial image object detection task.
现有的无人机(UAV)航空图像高精度物体检测算法往往参数多、重量大,难以应用于移动设备。我们提出了三种基于 YOLO 的无人机轻量级物体检测网络,分别命名为 YOLO-L、YOLO-S 和 YOLO-M。在 YOLO-L 中,我们采用去卷积方法,在训练过程中探索合适的上采样规则,以提高检测精度。用 Ghost CBS 代替卷积-批处理归一化-SiLU 激活函数(CBS)结构,减少参数和权重的数量,同时提出 Maxpool 最大池化操作代替 CBS 结构,避免产生参数和权重。YOLO-S 通过直接引入 CSPGhostNeck 残差结构,大大降低了网络的权重,使参数和权重分别降低了约 15%,而 mAP 却降低了 2.4%。而 YOLO-M 采用 CSPGhostNeck 残差结构和解卷积技术,参数降低了 5.6%,权重降低了 5.7%,而 mAP 仅降低了 1.8%。结果表明,本文提出的三种轻量级检测网络在无人机航空图像物体检测任务中具有良好的性能。
{"title":"Lightweight Object Detection Networks for UAV Aerial Images Based on YOLO","authors":"Yanshan Li;Jiarong Wang;Kunhua Zhang;Jiawei Yi;Miaomiao Wei;Lirong Zheng;Weixin Xie","doi":"10.23919/cje.2022.00.300","DOIUrl":"10.23919/cje.2022.00.300","url":null,"abstract":"Existing high-precision object detection algorithms for UAV (unmanned aerial vehicle) aerial images often have a large number of parameters and heavy weight, which makes it difficult to be applied to mobile devices. We propose three YOLO-based lightweight object detection networks for UAVs, named YOLO-L, YOLO-S, and YOLO-M, respectively. In YOLO-L, we adopt a deconvolution approach to explore suitable upsampling rules during training to improve the detection accuracy. The convolution-batch normalization-SiLU activation function (CBS) structure is replaced with Ghost CBS to reduce the number of parameters and weight, meanwhile Maxpool maximum pooling operation is proposed to replace the CBS structure to avoid generating parameters and weight. YOLO-S greatly reduces the weight of the network by directly introducing CSPGhostNeck residual structures, so that the parameters and weight are respectively decreased by about 15% at the expense of 2.4% mAP. And YOLO-M adopts the CSPGhostNeck residual structure and deconvolution to reduce parameters by 5.6% and weight by 5.7%, while mAP only by 1.8%. The results show that the three lightweight detection networks proposed in this paper have good performance in UAV aerial image object detection task.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606207","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141839371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BAD-FM: Backdoor Attacks Against Factorization-Machine Based Neural Network for Tabular Data Prediction BAD-FM:针对基于因式分解神经网络的表格式数据预测的后门攻击
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2023.00.041
Lingshuo Meng;Xueluan Gong;Yanjiao Chen
Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data (image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components (e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e., HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100% at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.
后门攻击对深度神经网络模型构成巨大威胁。现有的后门攻击都是针对非结构化数据(图像、语音和文本)设计的,但没有针对结构化表格数据,而表格数据在现实世界中有着广泛的应用,例如推荐系统、欺诈检测和点击率预测。为了弥补这一研究空白,我们首次尝试为表格数据预测模型设计了一个名为 BAD-FM 的后门攻击框架。与由具有连续值的同质像素或信号组成的图像或语音样本不同,表格数据样本包含定义明确的异质字段,通常是稀疏和离散的。表格数据预测模型并不完全依赖于深度网络,而是将浅层组件(如因式分解机、FM)与深度组件相结合,以捕捉字段之间复杂的特征交互。为了针对表格数据模型定制后门攻击框架,我们精心设计了字段选择和触发器形成算法,以加强触发器对后门模型的影响。我们在四个数据集(即 HUAWEI、Criteo、Avazu 和 KDD)上对 BAD-FM 进行了广泛的实验评估。结果表明,在中毒率为 0.001% 的情况下,BAD-FM 的攻击成功率高达 100%,优于现有针对非结构化数据模型的后门攻击基线。由于金融和商业领域广泛采用表格数据预测模型,我们的工作可能会对这些模型的潜在风险发出警报,并刺激未来的防御研究。
{"title":"BAD-FM: Backdoor Attacks Against Factorization-Machine Based Neural Network for Tabular Data Prediction","authors":"Lingshuo Meng;Xueluan Gong;Yanjiao Chen","doi":"10.23919/cje.2023.00.041","DOIUrl":"10.23919/cje.2023.00.041","url":null,"abstract":"Backdoor attacks pose great threats to deep neural network models. All existing backdoor attacks are designed for unstructured data (image, voice, and text), but not structured tabular data, which has wide real-world applications, e.g., recommendation systems, fraud detection, and click-through rate prediction. To bridge this research gap, we make the first attempt to design a backdoor attack framework, named BAD-FM, for tabular data prediction models. Unlike images or voice samples composed of homogeneous pixels or signals with continuous values, tabular data samples contain well-defined heterogeneous fields that are usually sparse and discrete. Tabular data prediction models do not solely rely on deep networks but combine shallow components (e.g., factorization machine, FM) with deep components to capture sophisticated feature interactions among fields. To tailor the backdoor attack framework to tabular data models, we carefully design field selection and trigger formation algorithms to intensify the influence of the trigger on the backdoored model. We evaluate BAD-FM with extensive experiments on four datasets, i.e., HUAWEI, Criteo, Avazu, and KDD. The results show that BAD-FM can achieve an attack success rate as high as 100% at a poisoning ratio of 0.001%, outperforming baselines adapted from existing backdoor attacks against unstructured data models. As tabular data prediction models are widely adopted in finance and commerce, our work may raise alarms on the potential risks of these models and spur future research on defenses.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606191","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141852860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC 基于深度确定性策略梯度的方法,用于在 MEC 中执行服务容错
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2023.00.105
Tingyan Long;Peng Chen;Yunni Xia;Yong Ma;Xiaoning Sun;Jiale Zhao;Yifei Lyu
Mobile edge computing (MEC) provides edge services to users in a distributed and on-demand way. Due to the heterogeneity of edge applications, deploying latency and resource-intensive applications on resource-constrained devices is a key challenge for service providers. This is especially true when underlying edge infrastructures are fault and error-prone. In this paper, we propose a fault tolerance approach named DFGP, for enforcing mobile service fault-tolerance in MEC. It synthesizes a generative optimization network (GON) model for predicting resource failure and a deep deterministic policy gradient (DDPG) model for yielding preemptive migration decisions. We show through extensive simulation experiments that DFGP is more effective in fault detection and guaranteeing quality of service, in terms of fault detection accuracy, migration efficiency, task migration time, task scheduling time, and energy consumption than other existing methods.
移动边缘计算(MEC)以分布式和按需方式为用户提供边缘服务。由于边缘应用的异构性,在资源有限的设备上部署延迟和资源密集型应用是服务提供商面临的主要挑战。当底层边缘基础设施容易出现故障和错误时,情况更是如此。本文提出了一种名为 DFGP 的容错方法,用于在 MEC 中执行移动服务容错。它综合了用于预测资源故障的生成优化网络(GON)模型和用于做出抢占式迁移决策的深度确定性策略梯度(DDPG)模型。我们通过大量仿真实验表明,与其他现有方法相比,DFGP 在故障检测准确性、迁移效率、任务迁移时间、任务调度时间和能耗等方面都能更有效地检测故障并保证服务质量。
{"title":"A Deep Deterministic Policy Gradient-Based Method for Enforcing Service Fault-Tolerance in MEC","authors":"Tingyan Long;Peng Chen;Yunni Xia;Yong Ma;Xiaoning Sun;Jiale Zhao;Yifei Lyu","doi":"10.23919/cje.2023.00.105","DOIUrl":"10.23919/cje.2023.00.105","url":null,"abstract":"Mobile edge computing (MEC) provides edge services to users in a distributed and on-demand way. Due to the heterogeneity of edge applications, deploying latency and resource-intensive applications on resource-constrained devices is a key challenge for service providers. This is especially true when underlying edge infrastructures are fault and error-prone. In this paper, we propose a fault tolerance approach named DFGP, for enforcing mobile service fault-tolerance in MEC. It synthesizes a generative optimization network (GON) model for predicting resource failure and a deep deterministic policy gradient (DDPG) model for yielding preemptive migration decisions. We show through extensive simulation experiments that DFGP is more effective in fault detection and guaranteeing quality of service, in terms of fault detection accuracy, migration efficiency, task migration time, task scheduling time, and energy consumption than other existing methods.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606213","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141843834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS-Aware Computation Offloading in LEO Satellite Edge Computing for IoT: A Game-Theoretical Approach 面向物联网的低地轨道卫星边缘计算中的 QoS 感知计算卸载:游戏理论方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2022.00.412
Ying Chen;Jintao Hu;Jie Zhao;Geyong Min
Low earth orbit (LEO) satellite edge computing can overcome communication difficulties in harsh environments, which lack the support of terrestrial communication infrastructure. It is an indispensable option for achieving worldwide wireless communication coverage in the future. To improve the quality-of-service (QoS) for Internet-of-things (IoT) devices, we combine LEO satellite edge computing and ground communication systems to provide network services for IoT devices in harsh environments. We study the QoS-aware computation offloading (QCO) problem for IoT devices in LEO satellite edge computing. Then we investigate the computation offloading strategy for IoT devices that can minimize the total QoS cost of all devices while satisfying multiple constraints, such as the computing resource constraint, delay constraint, and energy consumption constraint. We formulate the QoS-aware computation offloading problem as a game model named QCO game based on the non-cooperative competition game among IoT devices. We analyze the finite improvement property of the QCO game and prove that there is a Nash equilibrium for the QCO game. We propose a distributed QoS-aware computation offloading (DQCO) algorithm for the QCO game. Experimental results show that the DQCO algorithm can effectively reduce the total QoS cost of IoT devices.
低地球轨道(LEO)卫星边缘计算可以克服缺乏地面通信基础设施支持的恶劣环境中的通信困难。它是未来实现全球无线通信覆盖不可或缺的选择。为了提高物联网(IoT)设备的服务质量(QoS),我们将低地轨道卫星边缘计算与地面通信系统相结合,为恶劣环境中的物联网设备提供网络服务。我们研究了低地轨道卫星边缘计算中物联网设备的 QoS 感知计算卸载(QCO)问题。然后,我们研究了物联网设备的计算卸载策略,该策略可在满足计算资源约束、延迟约束和能耗约束等多重约束的同时,使所有设备的总 QoS 成本最小化。我们基于物联网设备间的非合作竞争博弈,将 QoS 感知计算卸载问题表述为一个名为 QCO 博弈的博弈模型。我们分析了 QCO 博弈的有限改进属性,并证明 QCO 博弈存在纳什均衡。我们针对 QCO 博弈提出了分布式 QoS 感知计算卸载(DQCO)算法。实验结果表明,DQCO 算法能有效降低物联网设备的总 QoS 成本。
{"title":"QoS-Aware Computation Offloading in LEO Satellite Edge Computing for IoT: A Game-Theoretical Approach","authors":"Ying Chen;Jintao Hu;Jie Zhao;Geyong Min","doi":"10.23919/cje.2022.00.412","DOIUrl":"10.23919/cje.2022.00.412","url":null,"abstract":"Low earth orbit (LEO) satellite edge computing can overcome communication difficulties in harsh environments, which lack the support of terrestrial communication infrastructure. It is an indispensable option for achieving worldwide wireless communication coverage in the future. To improve the quality-of-service (QoS) for Internet-of-things (IoT) devices, we combine LEO satellite edge computing and ground communication systems to provide network services for IoT devices in harsh environments. We study the QoS-aware computation offloading (QCO) problem for IoT devices in LEO satellite edge computing. Then we investigate the computation offloading strategy for IoT devices that can minimize the total QoS cost of all devices while satisfying multiple constraints, such as the computing resource constraint, delay constraint, and energy consumption constraint. We formulate the QoS-aware computation offloading problem as a game model named QCO game based on the non-cooperative competition game among IoT devices. We analyze the finite improvement property of the QCO game and prove that there is a Nash equilibrium for the QCO game. We propose a distributed QoS-aware computation offloading (DQCO) algorithm for the QCO game. Experimental results show that the DQCO algorithm can effectively reduce the total QoS cost of IoT devices.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606190","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141847454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer 基于多重残差结构和变换器的轻量级隐写术检测方法
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2022.00.452
Hao Li;Yi Zhang;Jinwei Wang;Weiming Zhang;Xiangyang Luo
Existing deep learning-based steganography detection methods utilize convolution to automatically capture and learn steganographic features, yielding higher detection efficiency compared to manually designed steganography detection methods. Detection methods based on convolutional neural network frameworks can extract global features by increasing the network's depth and width. These frameworks are not highly sensitive to global features and can lead to significant resource consumption. This manuscript proposes a lightweight steganography detection method based on multiple residual structures and Transformer (ResFormer). A multi-residuals block based on channel rearrangement is designed in the preprocessing layer. Multiple residuals are used to enrich the residual features and channel shuffle is used to enhance the feature representation capability. A lightweight convolutional and Transformer feature extraction backbone is constructed, which reduces the computational and parameter complexity of the network by employing depth-wise separable convolutions. This backbone integrates local and global image features through the fusion of convolutional layers and Transformer, enhancing the network's ability to learn global features and effectively enriching feature diversity. An effective weighted loss function is introduced for learning both local and global features, BiasLoss loss function is used to give full play to the role of feature diversity in classification, and cross-entropy loss function and contrast loss function are organically combined to enhance the expression ability of features. Based on BossBase-1.01, BOWS2 and ALASKA#2, extensive experiments are conducted on the stego images generated by spatial and JPEG domain adaptive steganographic algorithms, employing both classical and state-of-the-art steganalysis techniques. The experimental results demonstrate that compared to the SRM, SRNet, SiaStegNet, CSANet, LWENet, and SiaIRNet methods, the proposed ResFormer method achieves the highest reduction in the parameter, up to 91.82%. It achieves the highest improvement in detection accuracy, up to 5.10%. Compared to the SRNet and EWNet methods, the proposed ResFormer method achieves an improvement in detection accuracy for the J-UNIWARD algorithm by 5.78% and 6.24%, respectively.
现有的基于深度学习的隐写术检测方法利用卷积来自动捕捉和学习隐写术特征,与人工设计的隐写术检测方法相比,检测效率更高。基于卷积神经网络框架的检测方法可以通过增加网络的深度和宽度来提取全局特征。这些框架对全局特征的敏感度不高,而且会导致大量资源消耗。本手稿提出了一种基于多残差结构和变换器(ResFormer)的轻量级隐写检测方法。在预处理层设计了一个基于信道重排的多残差块。多重残差用于丰富残差特征,信道洗牌用于增强特征表示能力。构建了一个轻量级卷积和变换器特征提取骨干网,通过采用深度可分离卷积,降低了网络的计算和参数复杂度。该骨干网通过卷积层和 Transformer 的融合,整合了局部和全局图像特征,增强了网络学习全局特征的能力,有效丰富了特征多样性。引入有效的加权损失函数来学习局部和全局特征,使用 BiasLoss 损失函数来充分发挥特征多样性在分类中的作用,并将交叉熵损失函数和对比度损失函数有机地结合起来,以增强特征的表达能力。以BossBase-1.01、BOWS2和ALASKA#2为基础,采用经典和最先进的隐写分析技术,对空间域和JPEG域自适应隐写算法生成的隐写图像进行了大量实验。实验结果表明,与 SRM、SRNet、SiaStegNet、CSANet、LWENet 和 SiaIRNet 方法相比,所提出的 ResFormer 方法的参数降低率最高,达到 91.82%。检测准确率的提高幅度最大,达到 5.10%。与 SRNet 和 EWNet 方法相比,所提出的 ResFormer 方法使 J-UNIWARD 算法的检测精度分别提高了 5.78% 和 6.24%。
{"title":"Lightweight Steganography Detection Method Based on Multiple Residual Structures and Transformer","authors":"Hao Li;Yi Zhang;Jinwei Wang;Weiming Zhang;Xiangyang Luo","doi":"10.23919/cje.2022.00.452","DOIUrl":"10.23919/cje.2022.00.452","url":null,"abstract":"Existing deep learning-based steganography detection methods utilize convolution to automatically capture and learn steganographic features, yielding higher detection efficiency compared to manually designed steganography detection methods. Detection methods based on convolutional neural network frameworks can extract global features by increasing the network's depth and width. These frameworks are not highly sensitive to global features and can lead to significant resource consumption. This manuscript proposes a lightweight steganography detection method based on multiple residual structures and Transformer (ResFormer). A multi-residuals block based on channel rearrangement is designed in the preprocessing layer. Multiple residuals are used to enrich the residual features and channel shuffle is used to enhance the feature representation capability. A lightweight convolutional and Transformer feature extraction backbone is constructed, which reduces the computational and parameter complexity of the network by employing depth-wise separable convolutions. This backbone integrates local and global image features through the fusion of convolutional layers and Transformer, enhancing the network's ability to learn global features and effectively enriching feature diversity. An effective weighted loss function is introduced for learning both local and global features, BiasLoss loss function is used to give full play to the role of feature diversity in classification, and cross-entropy loss function and contrast loss function are organically combined to enhance the expression ability of features. Based on BossBase-1.01, BOWS2 and ALASKA#2, extensive experiments are conducted on the stego images generated by spatial and JPEG domain adaptive steganographic algorithms, employing both classical and state-of-the-art steganalysis techniques. The experimental results demonstrate that compared to the SRM, SRNet, SiaStegNet, CSANet, LWENet, and SiaIRNet methods, the proposed ResFormer method achieves the highest reduction in the parameter, up to 91.82%. It achieves the highest improvement in detection accuracy, up to 5.10%. Compared to the SRNet and EWNet methods, the proposed ResFormer method achieves an improvement in detection accuracy for the J-UNIWARD algorithm by 5.78% and 6.24%, respectively.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606201","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141847662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepLogic: Priority Testing of Deep Learning Through Interpretable Logic Units DeepLogic:通过可解释逻辑单元优先测试深度学习
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2022.00.451
Chenhao Lin;Xingliang Zhang;Chao Shen
With the increasing deployment of deep learning-based systems in various scenes, it is becoming important to conduct sufficient testing and evaluation of deep learning models to improve their interpretability and robustness. Recent studies have proposed different criteria and strategies for deep neural network (DNN) testing. However, they rarely conduct effective testing on the robustness of DNN models and lack interpretability. This paper proposes a new priority testing criterion, called DeepLogic, to analyze the robustness of the DNN models from the perspective of model interpretability. We first define the neural units in DNN with the highest average activation probability as “interpretable logic units”. We analyze the changes in these units to evaluate the model's robustness by conducting adversarial attacks. After that, the interpretable logic units of the inputs are taken as context attributes, and the probability distribution of the softmax layer in the model is taken as internal attributes to establish a comprehensive test prioritization framework. The weight fusion of context and internal factors is carried out, and the test cases are sorted according to this priority. The experimental results on four popular DNN models using eight testing metrics show that our DeepLogic significantly outperforms existing state-of-the-art methods.
随着基于深度学习的系统在各种场景中的部署越来越多,对深度学习模型进行充分的测试和评估以提高其可解释性和鲁棒性变得越来越重要。最近的研究提出了不同的深度神经网络(DNN)测试标准和策略。然而,它们很少对 DNN 模型的鲁棒性进行有效测试,缺乏可解释性。本文提出了一种新的优先测试标准,称为 DeepLogic,从模型可解释性的角度分析 DNN 模型的鲁棒性。我们首先将 DNN 中平均激活概率最高的神经单元定义为 "可解释逻辑单元"。我们通过分析这些单元的变化来评估模型的鲁棒性。然后,将输入的可解释逻辑单元作为上下文属性,将模型中 softmax 层的概率分布作为内部属性,从而建立一个全面的测试优先级排序框架。对上下文和内部因素进行权重融合,并根据此优先级对测试用例进行排序。使用八项测试指标对四种流行的 DNN 模型进行的实验结果表明,我们的 DeepLogic 明显优于现有的最先进方法。
{"title":"DeepLogic: Priority Testing of Deep Learning Through Interpretable Logic Units","authors":"Chenhao Lin;Xingliang Zhang;Chao Shen","doi":"10.23919/cje.2022.00.451","DOIUrl":"https://doi.org/10.23919/cje.2022.00.451","url":null,"abstract":"With the increasing deployment of deep learning-based systems in various scenes, it is becoming important to conduct sufficient testing and evaluation of deep learning models to improve their interpretability and robustness. Recent studies have proposed different criteria and strategies for deep neural network (DNN) testing. However, they rarely conduct effective testing on the robustness of DNN models and lack interpretability. This paper proposes a new priority testing criterion, called DeepLogic, to analyze the robustness of the DNN models from the perspective of model interpretability. We first define the neural units in DNN with the highest average activation probability as “interpretable logic units”. We analyze the changes in these units to evaluate the model's robustness by conducting adversarial attacks. After that, the interpretable logic units of the inputs are taken as context attributes, and the probability distribution of the softmax layer in the model is taken as internal attributes to establish a comprehensive test prioritization framework. The weight fusion of context and internal factors is carried out, and the test cases are sorted according to this priority. The experimental results on four popular DNN models using eight testing metrics show that our DeepLogic significantly outperforms existing state-of-the-art methods.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606210","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141964672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cellular V2X-Based Integrated Sensing and Communication System: Feasibility and Performance Analysis 基于蜂窝 V2X 的综合传感与通信系统:可行性和性能分析
IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-07-22 DOI: 10.23919/cje.2022.00.340
Yibo Li;Junhui Zhao;Jieyu Liao;Fajin Hu
Communication and sensing are basically required in intelligent transportation. The combination of two functions can provide a viable way in alleviating concerns about resource limitations. To achieve this, we propose an integrated sensing and communication (ISAC) system based on cellular vehicle-to-everything (C-V2X). We first analyze the feasibility of new radio (NR) waveform for ISAC system. We discuss the possibility of reusing NR waveform for sensing based on current NR-V2X standards. Ambiguity function is calculated to investigate the sensing performance limitation of NR waveform. A C-V2X-based ISAC system is then designed to realize the two tasks in vehicular network simultaneously. We formulate an integrated framework of vehicular communication and automotive sensing using the already-existing NR-V2X network. Based on the proposed ISAC framework, we develop a receiver algorithm for target detection/estimation and communication with minor modifications. We evaluate the performance of the proposed ISAC system with communication throughput, detection probability, and range/velocity estimation accuracy. Simulations show that the proposed system achieves high reliability communication with 99.9999% throughput and high accuracy sensing with errors below 1 m and 1 m/s in vehicle scenarios.
通信和传感是智能交通的基本要求。将这两种功能结合起来,可以有效缓解资源限制问题。为此,我们提出了一种基于蜂窝式车对车(C-V2X)的综合传感与通信(ISAC)系统。我们首先分析了新无线电(NR)波形在 ISAC 系统中的可行性。我们讨论了在当前 NR-V2X 标准基础上重复使用 NR 波形进行传感的可能性。通过计算模糊函数来研究 NR 波形的传感性能限制。然后设计了基于 C-V2X 的 ISAC 系统,以在车载网络中同时实现这两项任务。我们利用已有的 NR-V2X 网络制定了车载通信和汽车传感的集成框架。基于所提出的 ISAC 框架,我们开发了一种接收器算法,用于目标检测/估计和通信,只需稍作修改。我们从通信吞吐量、检测概率和测距/测速精度等方面评估了拟议 ISAC 系统的性能。仿真结果表明,所提出的系统实现了高可靠性通信(吞吐量达 99.9999%)和高精度传感(在车辆场景中误差低于 1 米和 1 米/秒)。
{"title":"Cellular V2X-Based Integrated Sensing and Communication System: Feasibility and Performance Analysis","authors":"Yibo Li;Junhui Zhao;Jieyu Liao;Fajin Hu","doi":"10.23919/cje.2022.00.340","DOIUrl":"10.23919/cje.2022.00.340","url":null,"abstract":"Communication and sensing are basically required in intelligent transportation. The combination of two functions can provide a viable way in alleviating concerns about resource limitations. To achieve this, we propose an integrated sensing and communication (ISAC) system based on cellular vehicle-to-everything (C-V2X). We first analyze the feasibility of new radio (NR) waveform for ISAC system. We discuss the possibility of reusing NR waveform for sensing based on current NR-V2X standards. Ambiguity function is calculated to investigate the sensing performance limitation of NR waveform. A C-V2X-based ISAC system is then designed to realize the two tasks in vehicular network simultaneously. We formulate an integrated framework of vehicular communication and automotive sensing using the already-existing NR-V2X network. Based on the proposed ISAC framework, we develop a receiver algorithm for target detection/estimation and communication with minor modifications. We evaluate the performance of the proposed ISAC system with communication throughput, detection probability, and range/velocity estimation accuracy. Simulations show that the proposed system achieves high reliability communication with 99.9999% throughput and high accuracy sensing with errors below 1 m and 1 m/s in vehicle scenarios.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10606214","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141851789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1