首页 > 最新文献

Chinese Journal of Electronics最新文献

英文 中文
A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network 端到端多跳无线通信网络的安全通信干扰方法
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.448
Xiao Ma;Dan Li;Liang Wang;Weijia Han;Nan Zhao
With the rapid development of wireless communications, cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent communication. However, to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this area. To this end, we focus on secure communication in multi-hop wireless communication network, and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point (P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative interferer. Furthermore, to achieve the end-to-end (E2E) multi-hop secure communication, we devise the secure network topology discovering scheme via constructing a proper network topology with at least one proper node as the cooperative interferer in each hop, and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination, respectively. Experiments on the wireless open-access research platform demonstrate the feasibility of the proposed schemes. Besides, simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.
随着无线通信的飞速发展,蜂窝通信和分布式无线网络由于用户分布广、通信透明,很容易受到窃听。然而,在特定区域采用较大的发射功率来干扰潜在的窃听者,不仅会造成巨大的能源浪费,还可能会抑制该区域的正常通信。为此,我们重点研究了多跳无线通信网络中的安全通信问题,并分别针对窄带和宽带点对点(P2P)系统,提出了两种在存在潜在窃听者的情况下,借助所选合作干扰者发射的人工噪声进行安全通信的通信干扰方案。此外,为了实现端到端 (E2E) 多跳安全通信,我们设计了安全网络拓扑发现方案,通过构建一个适当的网络拓扑,在每一跳中至少有一个适当的节点作为合作干扰器,然后提出安全传输路径规划方案,分别找到从源到目的地的 E2E 安全传输路由。在无线开放存取研究平台上进行的实验证明了所提方案的可行性。此外,仿真结果验证了在 P2P 通信和 E2E 多跳通信网络场景中,与现有方法相比,所提出的方案都能获得更好的性能。
{"title":"A Secure Communicating While Jamming Approach for End-to-End Multi-Hop Wireless Communication Network","authors":"Xiao Ma;Dan Li;Liang Wang;Weijia Han;Nan Zhao","doi":"10.23919/cje.2022.00.448","DOIUrl":"https://doi.org/10.23919/cje.2022.00.448","url":null,"abstract":"With the rapid development of wireless communications, cellular communication and distributed wireless network are fragile to eavesdropping due to distributed users and transparent communication. However, to adopt bigger transmit power at a given area to interfere potential eavesdroppers not only incurs huge energy waste but also may suppresses regular communication in this area. To this end, we focus on secure communication in multi-hop wireless communication network, and propose two communicating while jamming schemes for secure communication in presence of potential eavesdroppers for the narrow band and broad band point-to-point (P2P) systems respectively with the aid of artificial noise transmitted by a chosen cooperative interferer. Furthermore, to achieve the end-to-end (E2E) multi-hop secure communication, we devise the secure network topology discovering scheme via constructing a proper network topology with at least one proper node as the cooperative interferer in each hop, and then propose the secure transmission path planning scheme to find an E2E secure transmission route from source to destination, respectively. Experiments on the wireless open-access research platform demonstrate the feasibility of the proposed schemes. Besides, simulations results validate that the proposed schemes can achieve better performance compared with existing methods in both the P2P communication case and E2E multi-hop communication network scenario.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"833-846"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543235","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Optimization of Trajectory and Task Offloading for Cellular-Connected Multi-UAV Mobile Edge Computing 为蜂窝连接的多无人机移动边缘计算联合优化轨迹和任务卸载
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.159
Jingming Xia;Yufeng Liu;Ling Tan
Since the computing capacity and battery energy of unmanned aerial vehicle (UAV) are constrained, UAV as aerial user is hard to handle the high computational complexity and time-sensitive applications. This paper investigates a cellular-connected multi-UAV network supported by mobile edge computing. Multiple UAVs carrying tasks fly from a given initial position to a termination position within a specified time. To handle the large number of tasks carried by UAVs, we propose a energy cost of all UAVs based problem to determine how many tasks should be offloaded to high-altitude balloons (HABs) for computing, where UAV-HAB association, the trajectory of UAV, and calculation task splitting are jointly optimized. However, the formulated problem has nonconvex structure. Hence, an efficient iterative algorithm by applying successive convex approximation and the block coordinate descent methods is put forward. Specifically, in each iteration, the UAV-HAB association, calculation task splitting, and UAV trajec-tory are alternately optimized. Especially, for the nonconvex UAV trajectory optimization problem, an approximate convex optimization problem is settled. The numerical results indicate that the scheme of this paper proposed is guaranteed to converge and also significantly reduces the entire power consumption of all UAVs compared to the benchmark schemes.
由于无人机(UAV)的计算能力和电池能量受到限制,作为空中用户的无人机很难处理高计算复杂性和时间敏感性的应用。本文研究了一种由移动边缘计算支持的蜂窝连接多无人机网络。多个无人机携带任务,在规定时间内从给定的初始位置飞到终止位置。为了处理无人机携带的大量任务,我们提出了一个基于所有无人机能量成本的问题,以确定有多少任务应卸载到高空气球(HABs)上进行计算,其中无人机与 HAB 的关联、无人机的轨迹和计算任务的分割是共同优化的。然而,所提出的问题具有非凸结构。因此,本文提出了一种应用连续凸逼近法和块坐标下降法的高效迭代算法。具体来说,在每次迭代中,交替优化 UAV-HAB 关联、计算任务分割和 UAV 轨迹。特别是对于非凸的无人机轨迹优化问题,解决了一个近似凸优化问题。数值结果表明,本文提出的方案保证了收敛性,与基准方案相比,还显著降低了所有无人机的总功耗。
{"title":"Joint Optimization of Trajectory and Task Offloading for Cellular-Connected Multi-UAV Mobile Edge Computing","authors":"Jingming Xia;Yufeng Liu;Ling Tan","doi":"10.23919/cje.2022.00.159","DOIUrl":"https://doi.org/10.23919/cje.2022.00.159","url":null,"abstract":"Since the computing capacity and battery energy of unmanned aerial vehicle (UAV) are constrained, UAV as aerial user is hard to handle the high computational complexity and time-sensitive applications. This paper investigates a cellular-connected multi-UAV network supported by mobile edge computing. Multiple UAVs carrying tasks fly from a given initial position to a termination position within a specified time. To handle the large number of tasks carried by UAVs, we propose a energy cost of all UAVs based problem to determine how many tasks should be offloaded to high-altitude balloons (HABs) for computing, where UAV-HAB association, the trajectory of UAV, and calculation task splitting are jointly optimized. However, the formulated problem has nonconvex structure. Hence, an efficient iterative algorithm by applying successive convex approximation and the block coordinate descent methods is put forward. Specifically, in each iteration, the UAV-HAB association, calculation task splitting, and UAV trajec-tory are alternately optimized. Especially, for the nonconvex UAV trajectory optimization problem, an approximate convex optimization problem is settled. The numerical results indicate that the scheme of this paper proposed is guaranteed to converge and also significantly reduces the entire power consumption of all UAVs compared to the benchmark schemes.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"823-832"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543192","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Squeeze & Excitation Normalization Based nnU-Net for Segmenting Head & Neck Tumors 基于挤压和激发归一化的 nnU-Net 用于分割头颈部肿瘤
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.306
Juanying Xie;Ying Peng;Mingzhao Wang
Head and neck cancer is one of the most common malignancies in the world. We propose SE-nnU-Net by adapting SE (squeeze and excitation) normalization into nnU-Net, so as to segment head and neck tumors in PET/CT images by combining advantages of SE capturing features of interest regions and nnU-Net configuring itself for a specific task. The basic module referred to convolution-ReLU-SE is designed for SE-nnU-Net. In the encoder it is combined with residual structure while in the decoder without residual structure. The loss function combines Dice loss and Focal loss. The specific data preprocessing and augmentation techniques are developed, and specific network architecture is designed. Moreover, the deep supervised mechanism is introduced to calculate the loss function using the last four layers of the decoder of SE-nnU-Net. This SE-nnU-net is applied to HECKTOR 2020 and HECKTOR 2021 challenges, respectively, using different experimental design. The experimental results show that SE-nnU-Net for HECKTOR 2020 obtained 0.745, 0.821, and 0.725 in terms of Dice, Precision, and Recall, respectively, while the SE-nnU-Net for HECKTOR 2021 obtains 0.778 and 3.088 in terms of Dice and median HD95, respectively. This SE-nnU-Net for segmenting head and neck tumors can provide auxiliary opinions for doctors' diagnoses.
头颈部癌症是世界上最常见的恶性肿瘤之一。我们将 SE(挤压和激发)归一化技术引入 nnU-Net,结合 SE 捕捉感兴趣区域特征和 nnU-Net 为特定任务配置自身的优势,提出了 SE-nnU-Net 技术,以分割 PET/CT 图像中的头颈部肿瘤。被称为卷积-ReLU-SE 的基本模块是为 SE-nnU-Net 设计的。在编码器中,它与残差结构相结合,而在解码器中则没有残差结构。损失函数结合了 Dice 损失和 Focal 损失。开发了特定的数据预处理和增强技术,并设计了特定的网络架构。此外,还引入了深度监督机制,利用 SE-nnU 网络解码器的最后四层计算损失函数。利用不同的实验设计,该 SE-nnU 网络分别应用于 HECKTOR 2020 和 HECKTOR 2021 挑战。实验结果表明,针对 HECKTOR 2020 的 SE-nnU-Net 在 Dice、Precision 和 Recall 方面分别获得了 0.745、0.821 和 0.725 的结果,而针对 HECKTOR 2021 的 SE-nnU-Net 在 Dice 和 HD95 中值方面分别获得了 0.778 和 3.088 的结果。这种用于分割头颈部肿瘤的 SE-nnU-Net 可以为医生的诊断提供辅助意见。
{"title":"The Squeeze & Excitation Normalization Based nnU-Net for Segmenting Head & Neck Tumors","authors":"Juanying Xie;Ying Peng;Mingzhao Wang","doi":"10.23919/cje.2022.00.306","DOIUrl":"https://doi.org/10.23919/cje.2022.00.306","url":null,"abstract":"Head and neck cancer is one of the most common malignancies in the world. We propose SE-nnU-Net by adapting SE (squeeze and excitation) normalization into nnU-Net, so as to segment head and neck tumors in PET/CT images by combining advantages of SE capturing features of interest regions and nnU-Net configuring itself for a specific task. The basic module referred to convolution-ReLU-SE is designed for SE-nnU-Net. In the encoder it is combined with residual structure while in the decoder without residual structure. The loss function combines Dice loss and Focal loss. The specific data preprocessing and augmentation techniques are developed, and specific network architecture is designed. Moreover, the deep supervised mechanism is introduced to calculate the loss function using the last four layers of the decoder of SE-nnU-Net. This SE-nnU-net is applied to HECKTOR 2020 and HECKTOR 2021 challenges, respectively, using different experimental design. The experimental results show that SE-nnU-Net for HECKTOR 2020 obtained 0.745, 0.821, and 0.725 in terms of Dice, Precision, and Recall, respectively, while the SE-nnU-Net for HECKTOR 2021 obtains 0.778 and 3.088 in terms of Dice and median HD95, respectively. This SE-nnU-Net for segmenting head and neck tumors can provide auxiliary opinions for doctors' diagnoses.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"766-775"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543238","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules 对具有线性密钥时间表的块密码的相关密钥零相关线性攻击
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.419
Yi Zhang;Kai Zhang;Ting Cui
Related-key model is a favourable approach to improve attacks on block ciphers with a simple key schedule. However, to the best of our knowledge, there are a few results in which zero-correlation linear attacks take advantage of the related-key model. We ascribe this phenomenon to the lack of consideration of the key input in zero-correlation linear attacks. Concentrating on the linear key schedule of a block cipher, we generalize the zero-correlation linear attack by using a related-key setting. Specifically, we propose the creation of generalized linear hulls (GLHs) when the key input is involved; moreover, we indicate the links between GLHs and conventional linear hulls (CLHs). Then, we prove that the existence of zero-correlation GLHs is completely determined by the corresponding CLHs and the linear key schedule. In addition, we introduce a method to construct zero-correlation GLHs by CLHs and transform them into an integral distinguisher. The correctness is verified by applying it to SIMON16/16, a SIMON-like toy cipher. Based on our method, we find 12/13/14/15/15/17/20/22-round related-key zero-correlation linear distinguishers of SIMON32/64, SIMON48/72, SIMON48/96, SIMON64/96, SIMON64/128, SIMON96/144, SIMON128/192 and SIMON128/256, respectively. As far as we know, these distinguishers are one, two, or three rounds longer than current best zero-correlation linear distinguishers of SIMON.
关联密钥模型是改进对具有简单密钥时间表的块密码攻击的一种有利方法。然而,据我们所知,零相关线性攻击利用相关密钥模型的成果寥寥无几。我们将这一现象归咎于零相关线性攻击中缺乏对密钥输入的考虑。我们专注于块密码的线性密钥时间表,通过使用相关密钥设置来推广零相关线性攻击。具体来说,我们提出了在涉及密钥输入时创建广义线性外壳(GLH)的方法;此外,我们还指出了 GLH 与传统线性外壳(CLH)之间的联系。然后,我们证明零相关 GLH 的存在完全由相应的 CLH 和线性密钥时间表决定。此外,我们还介绍了一种用 CLH 构建零相关 GLH 并将其转化为积分区分器的方法。通过将其应用于 SIMON16/16(一种类似 SIMON 的玩具密码),验证了其正确性。根据我们的方法,我们分别找到了 SIMON32/64、SIMON48/72、SIMON48/96、SIMON64/96、SIMON64/128、SIMON96/144、SIMON128/192 和 SIMON128/256 的 12/13/14/15/15/17/20/22 轮相关密钥零相关线性区分器。据我们所知,这些分辨器比 SIMON 目前最好的零相关线性分辨器要长一轮、两轮或三轮。
{"title":"Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules","authors":"Yi Zhang;Kai Zhang;Ting Cui","doi":"10.23919/cje.2022.00.419","DOIUrl":"https://doi.org/10.23919/cje.2022.00.419","url":null,"abstract":"Related-key model is a favourable approach to improve attacks on block ciphers with a simple key schedule. However, to the best of our knowledge, there are a few results in which zero-correlation linear attacks take advantage of the related-key model. We ascribe this phenomenon to the lack of consideration of the key input in zero-correlation linear attacks. Concentrating on the linear key schedule of a block cipher, we generalize the zero-correlation linear attack by using a related-key setting. Specifically, we propose the creation of generalized linear hulls (GLHs) when the key input is involved; moreover, we indicate the links between GLHs and conventional linear hulls (CLHs). Then, we prove that the existence of zero-correlation GLHs is completely determined by the corresponding CLHs and the linear key schedule. In addition, we introduce a method to construct zero-correlation GLHs by CLHs and transform them into an integral distinguisher. The correctness is verified by applying it to SIMON16/16, a SIMON-like toy cipher. Based on our method, we find 12/13/14/15/15/17/20/22-round related-key zero-correlation linear distinguishers of SIMON32/64, SIMON48/72, SIMON48/96, SIMON64/96, SIMON64/128, SIMON96/144, SIMON128/192 and SIMON128/256, respectively. As far as we know, these distinguishers are one, two, or three rounds longer than current best zero-correlation linear distinguishers of SIMON.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"672-682"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543213","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network 基于四元卷积神经网络的双重混合压缩图像检测
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.179
Hao Wang;Jinwei Wang;Xuelong Hu;Bingtao Hu;Qilin Yin;Xiangyang Luo;Bin Ma;Jinsheng Sun
Detection of color images that have undergone double compression is a critical aspect of digital image forensics. Despite the existence of various methods capable of detecting double Joint Photographic Experts Group (JPEG) compression, they are unable to address the issue of mixed double compression resulting from the use of different compression standards. In particular, the implementation of Joint Photographic Experts Group 2000 (JPEG2000) as the secondary compression standard can result in a decline or complete loss of performance in existing methods. To tackle this challenge of JPEG+JPEG2000 compression, a detection method based on quaternion convolutional neural networks (QCNN) is proposed. The QCNN processes the data as a quaternion, transforming the components of a traditional convolutional neural network (CNN) into a quaternion representation. The relationships between the color channels of the image are preserved, and the utilization of color information is optimized. Additionally, the method includes a feature conversion module that converts the extracted features into quaternion statistical features, thereby amplifying the evidence of double compression. Experimental results indicate that the proposed QCNN-based method improves, on average, by 27% compared to existing methods in the detection of JPEG+JPEG2000 compression.
检测经过双重压缩的彩色图像是数字图像取证的一个重要方面。尽管有各种方法能够检测联合图像专家组(JPEG)的双重压缩,但它们无法解决因使用不同压缩标准而产生的混合双重压缩问题。特别是,将联合图像专家组 2000(JPEG2000)作为二级压缩标准的实施会导致现有方法的性能下降或完全丧失。为了应对 JPEG+JPEG2000 压缩带来的挑战,我们提出了一种基于四元卷积神经网络(QCNN)的检测方法。QCNN 将数据处理为四元数,将传统卷积神经网络 (CNN) 的分量转换为四元数表示。该方法保留了图像色彩通道之间的关系,并优化了色彩信息的利用。此外,该方法还包含一个特征转换模块,可将提取的特征转换为四元数统计特征,从而放大双重压缩的证据。实验结果表明,与现有方法相比,基于 QCNN 的拟议方法在 JPEG+JPEG2000 压缩检测方面平均提高了 27%。
{"title":"Detecting Double Mixed Compressed Images Based on Quaternion Convolutional Neural Network","authors":"Hao Wang;Jinwei Wang;Xuelong Hu;Bingtao Hu;Qilin Yin;Xiangyang Luo;Bin Ma;Jinsheng Sun","doi":"10.23919/cje.2022.00.179","DOIUrl":"https://doi.org/10.23919/cje.2022.00.179","url":null,"abstract":"Detection of color images that have undergone double compression is a critical aspect of digital image forensics. Despite the existence of various methods capable of detecting double Joint Photographic Experts Group (JPEG) compression, they are unable to address the issue of mixed double compression resulting from the use of different compression standards. In particular, the implementation of Joint Photographic Experts Group 2000 (JPEG2000) as the secondary compression standard can result in a decline or complete loss of performance in existing methods. To tackle this challenge of JPEG+JPEG2000 compression, a detection method based on quaternion convolutional neural networks (QCNN) is proposed. The QCNN processes the data as a quaternion, transforming the components of a traditional convolutional neural network (CNN) into a quaternion representation. The relationships between the color channels of the image are preserved, and the utilization of color information is optimized. Additionally, the method includes a feature conversion module that converts the extracted features into quaternion statistical features, thereby amplifying the evidence of double compression. Experimental results indicate that the proposed QCNN-based method improves, on average, by 27% compared to existing methods in the detection of JPEG+JPEG2000 compression.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"657-671"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543242","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Friendship Inference Based on Interest Trajectory Similarity and Co-Occurrence 基于兴趣轨迹相似性和共现性的友谊推断
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.363
Junfeng Tian;Zhengqi Hou
Most of the current research on user friendship speculation in location-based social networks is based on the co-occurrence characteristics of users, however, statistics find that co-occurrence is not common among all users; meanwhile, most of the existing work focuses on mining more features to improve the accuracy but ignoring the time complexity in practical applications. On this basis, a friendship inference model named ITSIC is proposed based on the similarity of user interest tracks and joint user location co-occurrence. By utilizing MeanShift clustering algorithm, ITSIC clustered and filtered user check-ins and divided the dataset into interesting, abnormal, and noise check-ins. User interest trajectories were constructed from user interest check-in data, which allows ITSIC to work efficiently even for users without co-occurrences. At the same time, by application of clustering, the single-moment multi-interest trajectory was further proposed, which increased the richness of the meaning of the trajectory moment. The extensive experiments on two real online social network datasets show that ITSIC outperforms existing methods in terms of AUC score and time efficiency compared to existing methods.
目前关于基于位置的社交网络中用户友情推测的研究大多基于用户的共现特征,但统计发现,共现并非在所有用户中都普遍存在;同时,现有工作大多侧重于挖掘更多特征以提高准确性,却忽略了实际应用中的时间复杂性。在此基础上,基于用户兴趣轨迹的相似性和联合用户位置共现,提出了一种名为 ITSIC 的友情推理模型。通过使用 MeanShift 聚类算法,ITSIC 对用户签到进行了聚类和过滤,并将数据集分为有趣签到、异常签到和噪音签到。根据用户兴趣签到数据构建用户兴趣轨迹,这使得 ITSIC 即使在没有共同发生的情况下也能高效工作。同时,通过聚类,进一步提出了单时刻多兴趣轨迹,增加了轨迹时刻意义的丰富性。在两个真实在线社交网络数据集上的大量实验表明,与现有方法相比,ITSIC 在 AUC 分数和时间效率方面都优于现有方法。
{"title":"Friendship Inference Based on Interest Trajectory Similarity and Co-Occurrence","authors":"Junfeng Tian;Zhengqi Hou","doi":"10.23919/cje.2022.00.363","DOIUrl":"https://doi.org/10.23919/cje.2022.00.363","url":null,"abstract":"Most of the current research on user friendship speculation in location-based social networks is based on the co-occurrence characteristics of users, however, statistics find that co-occurrence is not common among all users; meanwhile, most of the existing work focuses on mining more features to improve the accuracy but ignoring the time complexity in practical applications. On this basis, a friendship inference model named ITSIC is proposed based on the similarity of user interest tracks and joint user location co-occurrence. By utilizing MeanShift clustering algorithm, ITSIC clustered and filtered user check-ins and divided the dataset into interesting, abnormal, and noise check-ins. User interest trajectories were constructed from user interest check-in data, which allows ITSIC to work efficiently even for users without co-occurrences. At the same time, by application of clustering, the single-moment multi-interest trajectory was further proposed, which increased the richness of the meaning of the trajectory moment. The extensive experiments on two real online social network datasets show that ITSIC outperforms existing methods in terms of AUC score and time efficiency compared to existing methods.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"708-720"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543220","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Long Short-Term Memory Spiking Neural Networks for Classification of Snoring and Non-Snoring Sound Events 用于鼾声和非鼾声事件分类的长短期记忆尖峰神经网络
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.210
Rulin Zhang;Ruixue Li;Jiakai Liang;Keqiang Yue;Wenjun Li;Yilin Li
Snoring is a widespread occurrence that impacts human sleep quality. It is also one of the earliest symptoms of many sleep disorders. Snoring is accurately detected, making further screening and diagnosis of sleep problems easier. Snoring is frequently ignored because of its underrated and costly detection costs. As a result, this research offered an alternative method for snoring detection based on a long short-term memory based spiking neural network (LSTM-SNN) that is appropriate for large-scale home detection for snoring. We designed acquisition equipment to collect the sleep recordings of 54 subjects and constructed the sleep sound database in the home environment. And Mel frequency cepstral coefficients (MFCCs) were extracted from these sound signals and encoded into spike trains by a threshold encoding approach. They were classified automatically as non-snoring or snoring sounds by our LSTM-SNN model. We used the backpropagation algorithm based on an alternative gradient in the LSTM-SNN to complete the parameter update. The categorization percentage reached an impressive 93.4%, accompanied by a remarkable 36.9% reduction in computer power compared to the regular LSTM model.
打鼾是影响人类睡眠质量的一种普遍现象。它也是许多睡眠障碍的最早症状之一。准确检测出打鼾,可以更容易地对睡眠问题进行进一步筛查和诊断。打鼾常常被忽视,因为它被低估了,而且检测成本高昂。因此,本研究提供了一种基于长短期记忆尖峰神经网络(LSTM-SNN)的鼾声检测替代方法,该方法适合大规模家庭鼾声检测。我们设计了采集设备来收集 54 名受试者的睡眠录音,并在家庭环境中构建了睡眠声音数据库。然后从这些声音信号中提取梅尔频率共振频率系数(MFCC),并通过阈值编码方法将其编码为尖峰序列。我们的 LSTM-SNN 模型将这些声音自动分类为非打鼾声和打鼾声。我们在 LSTM-SNN 中使用了基于替代梯度的反向传播算法来完成参数更新。与普通 LSTM 模型相比,分类率达到了令人印象深刻的 93.4%,同时还显著降低了 36.9% 的计算机功耗。
{"title":"Long Short-Term Memory Spiking Neural Networks for Classification of Snoring and Non-Snoring Sound Events","authors":"Rulin Zhang;Ruixue Li;Jiakai Liang;Keqiang Yue;Wenjun Li;Yilin Li","doi":"10.23919/cje.2022.00.210","DOIUrl":"https://doi.org/10.23919/cje.2022.00.210","url":null,"abstract":"Snoring is a widespread occurrence that impacts human sleep quality. It is also one of the earliest symptoms of many sleep disorders. Snoring is accurately detected, making further screening and diagnosis of sleep problems easier. Snoring is frequently ignored because of its underrated and costly detection costs. As a result, this research offered an alternative method for snoring detection based on a long short-term memory based spiking neural network (LSTM-SNN) that is appropriate for large-scale home detection for snoring. We designed acquisition equipment to collect the sleep recordings of 54 subjects and constructed the sleep sound database in the home environment. And Mel frequency cepstral coefficients (MFCCs) were extracted from these sound signals and encoded into spike trains by a threshold encoding approach. They were classified automatically as non-snoring or snoring sounds by our LSTM-SNN model. We used the backpropagation algorithm based on an alternative gradient in the LSTM-SNN to complete the parameter update. The categorization percentage reached an impressive 93.4%, accompanied by a remarkable 36.9% reduction in computer power compared to the regular LSTM model.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"793-802"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543234","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Linear Loss Large Margin Distribution Machine for Pattern Classification 用于模式分类的加权线性损耗大边际分布机
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.156
Ling Liu;Maoxiang Chu;Rongfen Gong;Liming Liu;Yonghui Yang
Compared with support vector machine, large margin distribution machine (LDM) has better generalization performance. The central idea of LDM is to maximize the margin mean and minimize the margin variance simultaneously. But the computational complexity of LDM is high. In order to reduce the computational complexity of LDM, a weighted linear loss LDM (WLLDM) is proposed. The framework of WLLDM is built based on LDM and the weighted linear loss. The weighted linear loss is adopted instead of the hinge loss in WLLDM. This modification can transform the quadratic programming problem into a simple linear equation, resulting in lower computational complexity. Thus, WLLDM has the potential to deal with large-scale datasets. The WLLDM is similar in principle to the LDM algorithm, which can optimize the margin distribution and achieve better generalization performance. The WLLDM algorithm is compared with other models by conducting experiments on different datasets. The experimental results show that the proposed WLLDM has better generalization performance and faster training speed.
与支持向量机相比,大边际分布机(LDM)具有更好的泛化性能。LDM 的核心思想是同时实现边际均值最大化和边际方差最小化。但 LDM 的计算复杂度较高。为了降低 LDM 的计算复杂度,有人提出了加权线性损失 LDM(WLLDM)。WLLDM 的框架是基于 LDM 和加权线性损耗建立的。WLLDM 采用加权线性损耗代替铰链损耗。这种修改可以将二次方程式编程问题转化为简单的线性方程,从而降低计算复杂度。因此,WLLDM 具有处理大规模数据集的潜力。WLLDM 算法与 LDM 算法原理相似,可以优化边际分布,实现更好的泛化性能。通过在不同数据集上进行实验,将 WLLDM 算法与其他模型进行了比较。实验结果表明,所提出的 WLLDM 具有更好的泛化性能和更快的训练速度。
{"title":"Weighted Linear Loss Large Margin Distribution Machine for Pattern Classification","authors":"Ling Liu;Maoxiang Chu;Rongfen Gong;Liming Liu;Yonghui Yang","doi":"10.23919/cje.2022.00.156","DOIUrl":"https://doi.org/10.23919/cje.2022.00.156","url":null,"abstract":"Compared with support vector machine, large margin distribution machine (LDM) has better generalization performance. The central idea of LDM is to maximize the margin mean and minimize the margin variance simultaneously. But the computational complexity of LDM is high. In order to reduce the computational complexity of LDM, a weighted linear loss LDM (WLLDM) is proposed. The framework of WLLDM is built based on LDM and the weighted linear loss. The weighted linear loss is adopted instead of the hinge loss in WLLDM. This modification can transform the quadratic programming problem into a simple linear equation, resulting in lower computational complexity. Thus, WLLDM has the potential to deal with large-scale datasets. The WLLDM is similar in principle to the LDM algorithm, which can optimize the margin distribution and achieve better generalization performance. The WLLDM algorithm is compared with other models by conducting experiments on different datasets. The experimental results show that the proposed WLLDM has better generalization performance and faster training speed.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"753-765"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543193","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence IP-Pealing:基于 IP 数据包序列的鲁棒网络流水印方法
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2022.00.366
Wangxin Feng;Xiangyang Luo;Tengyao Li;Chunfang Yang
Network flow watermarking (NFW) is usually used for flow correlation. By actively modulating some features of the carrier traffic, NFW can establish the correspondence between different network nodes. In the face of strict demands of network traffic tracing, current watermarking methods cannot work efficiently due to the dependence on specific protocols, demand for large quantities of packets, weakness on resisting network channel interferences and so on. To this end, we propose a robust network flow watermarking method based on IP packet sequence, called as IP-Pealing. It is designed to utilize the packet sequence as watermark carrier with IP identification field which is insensitive to time jitter and suitable for all IP based traffic. To enhance the robustness against packet loss and packet reordering, the detection sequence set is constructed in terms of the variation range of packet sequence, correcting the possible errors caused by the network transmission. To improve the detection accuracy, the long watermark information is divided into several short sequences to embed in turn and assembled during detection. By a large number of experiments on the Internet, the overall detection rate and accuracy of IP-Pealing reach 99.91% and 99.42% respectively. In comparison with the classical network flow watermarking methods, such as PROFW, IBW, ICBW, WBIPD and SBTT, the accuracy of IP-Pealing is increased by 13.70% to 54.00%.
网络流量水印(NFW)通常用于流量关联。通过主动调制载波流量的某些特征,NFW 可以建立不同网络节点之间的对应关系。面对网络流量追踪的严格要求,目前的水印方法由于对特定协议的依赖、对大量数据包的需求、抗网络信道干扰能力弱等原因,无法有效发挥作用。为此,我们提出了一种基于 IP 数据包序列的稳健网络流水印方法,称为 IP-Pealing。该方法利用数据包序列作为水印载体,并带有 IP 识别字段,对时间抖动不敏感,适用于所有基于 IP 的流量。为了增强对数据包丢失和数据包重排的鲁棒性,检测序列集是根据数据包序列的变化范围构建的,以纠正网络传输可能造成的错误。为提高检测精度,将长水印信息分成若干短序列依次嵌入,并在检测时进行组合。通过在互联网上的大量实验,IP-Pealing 的总体检测率和准确率分别达到了 99.91% 和 99.42%。与 PROFW、IBW、ICBW、WBIPD 和 SBTT 等经典网络流量水印方法相比,IP-Pealing 的准确率提高了 13.70% 至 54.00%。
{"title":"IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence","authors":"Wangxin Feng;Xiangyang Luo;Tengyao Li;Chunfang Yang","doi":"10.23919/cje.2022.00.366","DOIUrl":"https://doi.org/10.23919/cje.2022.00.366","url":null,"abstract":"Network flow watermarking (NFW) is usually used for flow correlation. By actively modulating some features of the carrier traffic, NFW can establish the correspondence between different network nodes. In the face of strict demands of network traffic tracing, current watermarking methods cannot work efficiently due to the dependence on specific protocols, demand for large quantities of packets, weakness on resisting network channel interferences and so on. To this end, we propose a robust network flow watermarking method based on IP packet sequence, called as IP-Pealing. It is designed to utilize the packet sequence as watermark carrier with IP identification field which is insensitive to time jitter and suitable for all IP based traffic. To enhance the robustness against packet loss and packet reordering, the detection sequence set is constructed in terms of the variation range of packet sequence, correcting the possible errors caused by the network transmission. To improve the detection accuracy, the long watermark information is divided into several short sequences to embed in turn and assembled during detection. By a large number of experiments on the Internet, the overall detection rate and accuracy of IP-Pealing reach 99.91% and 99.42% respectively. In comparison with the classical network flow watermarking methods, such as PROFW, IBW, ICBW, WBIPD and SBTT, the accuracy of IP-Pealing is increased by 13.70% to 54.00%.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"694-707"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543218","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Integrated Features of Electronic Medical Records Big Data for Mortality and Phenotype Prediction 从电子病历大数据中提取综合特征,用于死亡率和表型预测
IF 1.2 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-03-31 DOI: 10.23919/cje.2023.00.181
Fei Li;Yiqiang Chen;Yang Gu;Yaowei Wang
The key to synthesizing the features of electronic medical records (EMR) big data and using them for specific medical purposes, such as mortality and phenotype prediction, is to integrate the individual medical event and the overall multivariate time series feature extraction automatically, as well as to alleviate data imbalance problems. This paper provides a general feature extraction method to reduce manual intervention and automatically process large-scale data. The processing uses two variational auto-encoders (VAEs) to automatically extract individual and global features. It avoids the well-known posterior collapse problem of Transformer VAE through a uniquely designed “proportional and stabilizing” mechanism and forms a unique means to alleviate the data imbalance problem. We conducted experiments using ICU-STAY patients' data from the MIMIC-III database and compared them with the mainstream EMR time series processing methods. The results show that the method extracts visible and comprehensive features, alleviates data imbalance problems and improves the accuracy in specific predicting tasks.
综合电子病历(EMR)大数据的特征并将其用于死亡率和表型预测等特定医疗目的,关键在于自动整合单个医疗事件和整体多变量时间序列特征提取,以及缓解数据不平衡问题。本文提供了一种通用特征提取方法,以减少人工干预并自动处理大规模数据。处理过程使用两个变异自动编码器(VAE)来自动提取单个和整体特征。它通过独特设计的 "比例和稳定 "机制,避免了变分自动编码器(VAE)众所周知的后验崩溃问题,并形成了缓解数据不平衡问题的独特手段。我们使用 MIMIC-III 数据库中的 ICU-STAY 患者数据进行了实验,并与主流的 EMR 时间序列处理方法进行了比较。结果表明,该方法提取了可见的综合特征,缓解了数据不平衡问题,提高了特定预测任务的准确性。
{"title":"Extracting Integrated Features of Electronic Medical Records Big Data for Mortality and Phenotype Prediction","authors":"Fei Li;Yiqiang Chen;Yang Gu;Yaowei Wang","doi":"10.23919/cje.2023.00.181","DOIUrl":"https://doi.org/10.23919/cje.2023.00.181","url":null,"abstract":"The key to synthesizing the features of electronic medical records (EMR) big data and using them for specific medical purposes, such as mortality and phenotype prediction, is to integrate the individual medical event and the overall multivariate time series feature extraction automatically, as well as to alleviate data imbalance problems. This paper provides a general feature extraction method to reduce manual intervention and automatically process large-scale data. The processing uses two variational auto-encoders (VAEs) to automatically extract individual and global features. It avoids the well-known posterior collapse problem of Transformer VAE through a uniquely designed “proportional and stabilizing” mechanism and forms a unique means to alleviate the data imbalance problem. We conducted experiments using ICU-STAY patients' data from the MIMIC-III database and compared them with the mainstream EMR time series processing methods. The results show that the method extracts visible and comprehensive features, alleviates data imbalance problems and improves the accuracy in specific predicting tasks.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"776-792"},"PeriodicalIF":1.2,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543236","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Chinese Journal of Electronics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1