首页 > 最新文献

Digital Signal Processing最新文献

英文 中文
On the skew-symmetric binary sequences and the merit factor problem 关于倾斜对称二进制序列和优点因子问题
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-10-02 DOI: 10.1016/j.dsp.2024.104793
Miroslav Dimitrov
The merit factor problem is of practical importance to manifold domains, such as digital communications engineering, radars, system modulation, system testing, information theory, physics, chemistry. In this work, some useful mathematical properties related to the flip operation of the skew-symmetric binary sequences are presented. By exploiting those properties, the space complexity of state-of-the-art stochastic merit factor optimization algorithms could be reduced from O(n2) to O(n). As a proof of concept, a lightweight stochastic algorithm was constructed, which can optimize pseudo-randomly generated skew-symmetric binary sequences with long lengths (up to 105+1) to skew-symmetric binary sequences with a merit factor greater than 5. An approximation of the required time is also provided. The numerical experiments suggest that the algorithm is universal and could be applied to skew-symmetric binary sequences with arbitrary lengths.
绩因问题对数字通信工程、雷达、系统调制、系统测试、信息论、物理学、化学等多个领域都具有重要的实际意义。本研究提出了一些与偏斜对称二进制序列的翻转操作相关的有用数学特性。利用这些特性,最先进的随机优点因子优化算法的空间复杂度可从 O(n2) 降至 O(n)。作为概念验证,我们构建了一种轻量级随机算法,它可以将伪随机生成的长度较长(达 105+1)的偏斜对称二进制序列优化为优点因子大于 5 的偏斜对称二进制序列。同时还提供了所需时间的近似值。数值实验表明,该算法具有通用性,可用于任意长度的偏斜对称二进制序列。
{"title":"On the skew-symmetric binary sequences and the merit factor problem","authors":"Miroslav Dimitrov","doi":"10.1016/j.dsp.2024.104793","DOIUrl":"10.1016/j.dsp.2024.104793","url":null,"abstract":"<div><div>The merit factor problem is of practical importance to manifold domains, such as digital communications engineering, radars, system modulation, system testing, information theory, physics, chemistry. In this work, some useful mathematical properties related to the flip operation of the skew-symmetric binary sequences are presented. By exploiting those properties, the space complexity of state-of-the-art stochastic merit factor optimization algorithms could be reduced from <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> to <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span>. As a proof of concept, a lightweight stochastic algorithm was constructed, which can optimize pseudo-randomly generated skew-symmetric binary sequences with long lengths (up to <span><math><msup><mrow><mn>10</mn></mrow><mrow><mn>5</mn></mrow></msup><mo>+</mo><mn>1</mn></math></span>) to skew-symmetric binary sequences with a merit factor greater than 5. An approximation of the required time is also provided. The numerical experiments suggest that the algorithm is universal and could be applied to skew-symmetric binary sequences with arbitrary lengths.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104793"},"PeriodicalIF":2.9,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure distributed estimation via an average diffusion LMS and average likelihood ratio test 通过平均扩散 LMS 和平均似然比检验进行安全分布式估计
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-10-01 DOI: 10.1016/j.dsp.2024.104782
Hadi Zayyani , Mehdi Korki
Secure distributed estimation algorithms are designed to protect against a spectrum of attacks by exploring different attack models and implementing strategies to enhance the resilience of the algorithm. These models encompass diverse scenarios such as measurement sensor attacks and communication link attacks, which have been extensively investigated in existing literature. This paper, however, focuses on a specific type of attack: the multiplicative sensor attack model. To counter this, the paper introduces the Average diffusion least mean square (ADLMS) algorithm as a viable solution. Furthermore, the paper introduces the Average Likelihood Ratio Test (ALRT) detector, which provides a straightforward detection criterion. In the presence of communication link attacks, the paper considers the manipulation attack model and presents an ALRT adversary detector. The analysis extends to these ALRT detectors, encompassing the calculation of adversary detection probability and false alarm probability, both achieved in closed form. The paper also provides the mean convergence analysis of the proposed ADLMS algorithm. Simulation results reveal that the proposed algorithms exhibit enhanced performance compared to the DLMS algorithm, while the incremental complexity remains only marginally higher than that of the DLMS algorithm.
安全分布式估算算法旨在通过探索不同的攻击模型和实施增强算法弹性的策略来抵御各种攻击。这些模型包括多种情况,如测量传感器攻击和通信链路攻击,现有文献已对这些情况进行了广泛研究。不过,本文重点关注一种特定类型的攻击:乘法传感器攻击模型。为了应对这种攻击,本文引入了平均扩散最小均方算法(ADLMS)作为可行的解决方案。此外,本文还介绍了平均似然比检验(ALRT)检测器,它提供了一种直接的检测标准。在存在通信链路攻击的情况下,本文考虑了操纵攻击模型,并提出了 ALRT 对手检测器。分析扩展到这些 ALRT 检测器,包括对手检测概率和误报概率的计算,两者都以封闭形式实现。论文还对所提出的 ADLMS 算法进行了平均收敛分析。仿真结果表明,与 DLMS 算法相比,所提出的算法表现出更强的性能,而增量复杂度仍然只略高于 DLMS 算法。
{"title":"Secure distributed estimation via an average diffusion LMS and average likelihood ratio test","authors":"Hadi Zayyani ,&nbsp;Mehdi Korki","doi":"10.1016/j.dsp.2024.104782","DOIUrl":"10.1016/j.dsp.2024.104782","url":null,"abstract":"<div><div>Secure distributed estimation algorithms are designed to protect against a spectrum of attacks by exploring different attack models and implementing strategies to enhance the resilience of the algorithm. These models encompass diverse scenarios such as measurement sensor attacks and communication link attacks, which have been extensively investigated in existing literature. This paper, however, focuses on a specific type of attack: the multiplicative sensor attack model. To counter this, the paper introduces the Average diffusion least mean square (ADLMS) algorithm as a viable solution. Furthermore, the paper introduces the Average Likelihood Ratio Test (ALRT) detector, which provides a straightforward detection criterion. In the presence of communication link attacks, the paper considers the manipulation attack model and presents an ALRT adversary detector. The analysis extends to these ALRT detectors, encompassing the calculation of adversary detection probability and false alarm probability, both achieved in closed form. The paper also provides the mean convergence analysis of the proposed ADLMS algorithm. Simulation results reveal that the proposed algorithms exhibit enhanced performance compared to the DLMS algorithm, while the incremental complexity remains only marginally higher than that of the DLMS algorithm.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104782"},"PeriodicalIF":2.9,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-coherent short-packet communications: Novel z-domain user multiplexing 非相干短包通信:新颖的 z 域用户多路复用
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-10-01 DOI: 10.1016/j.dsp.2024.104777
Tuncay Eren
In the evolution of fifth generation (5G) and beyond wireless communication systems, non-coherent (NC) short packet communication (SPC) is crucial for achieving ultra-reliable low-latency communication (URLLC). Frame design, latency, and reliability are some of the challenges associated with short-packet communication. Recently, to address these challenges, a novel modulation scheme known as modulation on conjugate-reciprocal zeros (MOCZ) has been proposed. MOCZ modulates information on conjugate reciprocal zeros in the z-domain, thereby eliminating the need for channel estimation and providing a robust solution for NC communication. However, in multi-user MOCZ (MU-MOCZ) scheme, adding guard intervals to each short packet to mitigate channel impact remains an issue, as it increases the transmission time and consequently reduces efficiency. To address the aforementioned problem, this paper introduces a novel frame design approach called z-domain user multiplexing MOCZ (ZDUM-MOCZ or ZDM-MOCZ). Unlike traditional time division multiplexing (TDM), which serves users consecutively in the time domain, this method multiplexes users in the z-domain. In this approach, each user is allocated a specific set of zeros in the z-domain, which collectively form a unique sequence in the time domain. The findings illustrate the potential for reduced latency in downlink transmission, highlighting the benefits of this novel methodology over conventional MU-MOCZ method. The proposed ZDUM-MOCZ scheme not only addresses the existing issues in the frame design of the MU-MOCZ scheme but also facilitates more efficient and reliable short packet communication in 5G and beyond wireless systems.
在第五代(5G)及以后的无线通信系统中,非相干(NC)短数据包通信(SPC)对于实现超可靠低延迟通信(URLLC)至关重要。帧设计、延迟和可靠性是与短数据包通信相关的一些挑战。最近,为了应对这些挑战,有人提出了一种新的调制方案,即共轭倒数零点调制(MOCZ)。MOCZ 将信息调制在 z 域的共轭倒数零点上,因此无需进行信道估计,为数控通信提供了一种稳健的解决方案。然而,在多用户 MOCZ(MU-MOCZ)方案中,为每个短数据包添加保护间隔以减轻信道影响仍是一个问题,因为这会增加传输时间,从而降低效率。为解决上述问题,本文提出了一种新颖的帧设计方法,称为 z 域用户复用 MOCZ(ZDUM-MOCZ 或 ZDM-MOCZ)。与在时域连续服务用户的传统时分复用(TDM)不同,这种方法在 z 域复用用户。在这种方法中,每个用户在 z 域被分配一组特定的零,这些零在时域中共同形成一个独特的序列。研究结果表明,ZDUM-MOCZ 有可能缩短下行链路传输的延迟时间,凸显了这种新方法与传统 MU-MOCZ 方法相比的优势。所提出的 ZDUM-MOCZ 方案不仅解决了 MU-MOCZ 方案帧设计中的现有问题,还有助于在 5G 及其他无线系统中实现更高效、更可靠的短数据包通信。
{"title":"Non-coherent short-packet communications: Novel z-domain user multiplexing","authors":"Tuncay Eren","doi":"10.1016/j.dsp.2024.104777","DOIUrl":"10.1016/j.dsp.2024.104777","url":null,"abstract":"<div><div>In the evolution of fifth generation (5G) and beyond wireless communication systems, non-coherent (NC) short packet communication (SPC) is crucial for achieving ultra-reliable low-latency communication (URLLC). Frame design, latency, and reliability are some of the challenges associated with short-packet communication. Recently, to address these challenges, a novel modulation scheme known as modulation on conjugate-reciprocal zeros (MOCZ) has been proposed. MOCZ modulates information on conjugate reciprocal zeros in the z-domain, thereby eliminating the need for channel estimation and providing a robust solution for NC communication. However, in multi-user MOCZ (MU-MOCZ) scheme, adding guard intervals to each short packet to mitigate channel impact remains an issue, as it increases the transmission time and consequently reduces efficiency. To address the aforementioned problem, this paper introduces a novel frame design approach called z-domain user multiplexing MOCZ (ZDUM-MOCZ or ZDM-MOCZ). Unlike traditional time division multiplexing (TDM), which serves users consecutively in the time domain, this method multiplexes users in the z-domain. In this approach, each user is allocated a specific set of zeros in the z-domain, which collectively form a unique sequence in the time domain. The findings illustrate the potential for reduced latency in downlink transmission, highlighting the benefits of this novel methodology over conventional MU-MOCZ method. The proposed ZDUM-MOCZ scheme not only addresses the existing issues in the frame design of the MU-MOCZ scheme but also facilitates more efficient and reliable short packet communication in 5G and beyond wireless systems.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104777"},"PeriodicalIF":2.9,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFRNet: Edge feature refinement network for real-time semantic segmentation of driving scenes EFRNet:用于驾驶场景实时语义分割的边缘特征细化网络
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-10-01 DOI: 10.1016/j.dsp.2024.104791
Zhiqiang Hou , Minjie Qu , Minjie Cheng , Sugang Ma , Yunchen Wang , Xiaobao Yang
In the semantic segmentation field, the dual-branch structure is a highly effective segmentation model. However, the frequent downsampling in the semantic branch reduces the accuracy of features expression with increasing network depth, resulting in suboptimal segmentation performance. To address the above issues, this paper proposes a real-time semantic segmentation network based on Edge Feature Refinement (Edge Feature Refinement Network, EFRNet). A dual-branch structure is used in the encoder. To enhance the accuracy of deep features expression in the network, an edge refinement module (ERM) is designed in the dual-branch interaction stage to refine the features of the two branches and improve segmentation accuracy. In the decoder, a Bilateral Channel Attention (BCA) module is designed, which is used to extract detailed information and semantic information of features at different levels of the network, and gradually restore small target features. To capture multi-scale context information, we introduce a Multi-scale Context Aggregation Module (MCAM), which efficiently integrates multi-scale information in a parallel manner. The proposed algorithm has experimented on Cityscapes and CamVid datasets, and reaches 78.8% mIoU and 79.6% mIoU, with speeds of 81FPS and 115FPS, respectively. Experimental results show that the proposed algorithm effectively improves segmentation performance while maintaining a high segmentation speed.
在语义分割领域,双分支结构是一种高效的分割模型。然而,随着网络深度的增加,语义分支中频繁的下采样降低了特征表达的准确性,导致分割性能不理想。针对上述问题,本文提出了一种基于边缘特征细化的实时语义分割网络(边缘特征细化网络,EFRNet)。编码器采用双分支结构。为了提高网络中深层特征表达的准确性,在双分支交互阶段设计了边缘细化模块(ERM),以细化两个分支的特征,提高分割准确性。在解码器中,我们设计了双通道注意(BCA)模块,用于提取网络中不同层次特征的细节信息和语义信息,并逐步还原小目标特征。为了捕捉多尺度上下文信息,我们引入了多尺度上下文聚合模块(MCAM),以并行的方式有效地整合多尺度信息。所提出的算法在 Cityscapes 和 CamVid 数据集上进行了实验,分别达到了 78.8% mIoU 和 79.6% mIoU,速度分别为 81FPS 和 115FPS。实验结果表明,所提出的算法在保持较高分割速度的同时,有效地提高了分割性能。
{"title":"EFRNet: Edge feature refinement network for real-time semantic segmentation of driving scenes","authors":"Zhiqiang Hou ,&nbsp;Minjie Qu ,&nbsp;Minjie Cheng ,&nbsp;Sugang Ma ,&nbsp;Yunchen Wang ,&nbsp;Xiaobao Yang","doi":"10.1016/j.dsp.2024.104791","DOIUrl":"10.1016/j.dsp.2024.104791","url":null,"abstract":"<div><div>In the semantic segmentation field, the dual-branch structure is a highly effective segmentation model. However, the frequent downsampling in the semantic branch reduces the accuracy of features expression with increasing network depth, resulting in suboptimal segmentation performance. To address the above issues, this paper proposes a real-time semantic segmentation network based on Edge Feature Refinement (Edge Feature Refinement Network, EFRNet). A dual-branch structure is used in the encoder. To enhance the accuracy of deep features expression in the network, an edge refinement module (ERM) is designed in the dual-branch interaction stage to refine the features of the two branches and improve segmentation accuracy. In the decoder, a Bilateral Channel Attention (BCA) module is designed, which is used to extract detailed information and semantic information of features at different levels of the network, and gradually restore small target features. To capture multi-scale context information, we introduce a Multi-scale Context Aggregation Module (MCAM), which efficiently integrates multi-scale information in a parallel manner. The proposed algorithm has experimented on Cityscapes and CamVid datasets, and reaches 78.8% mIoU and 79.6% mIoU, with speeds of 81FPS and 115FPS, respectively. Experimental results show that the proposed algorithm effectively improves segmentation performance while maintaining a high segmentation speed.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104791"},"PeriodicalIF":2.9,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards generalized face forgery detection with domain-robust representation learning 利用领域可靠的表征学习实现通用人脸伪造检测
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-30 DOI: 10.1016/j.dsp.2024.104792
Caiyu Li, Yan Wo
Face forgery detection is crucial for the security of digital identities. However, existing methods often struggle to generalize effectively to unseen domains due to the domain shift between training and testing data. We propose a Domain-robust Representation Learning (DRRL) method for generalized face forgery detection. Specifically, we observe that domain shifts in face forgery detection tasks are often caused by forgery differences and content differences between domain data, while the limitations of training data lead the model to overfit to these feature expressions in the seen domain. Therefore, DRRL enhances the model's generalization to unseen domains by first adding representative data representations to mitigate overfitting to seen data and then removing the features of expressed domain information to learn a robust, discriminative representation of domain variation. Data augmentation is achieved by stylizing sample representations and exploring representative new styles to generate rich data variants, with the Content-style Augmentation (CSA) module and Forgery-style Augmentation (FSA) module implemented for content and forgery expression, respectively. Based on this, the Content Decorrelation (CTD) module and Sensitive Channels Drop (SCD) module are used to remove content features irrelevant to forgery and domain-sensitive forgery features, encouraging the model to focus on clean and robust forgery features, thereby achieving the goal of learning domain-robust representations. Extensive experiments on five large-scale datasets demonstrate that our method exhibits advanced and stable generalization performance in practical scenarios.
人脸伪造检测对数字身份安全至关重要。然而,由于训练数据和测试数据之间的领域转移,现有方法往往难以有效地推广到未知领域。我们提出了一种用于通用人脸伪造检测的领域稳健表征学习(DRRL)方法。具体来说,我们观察到人脸伪造检测任务中的域转移通常是由域数据之间的伪造差异和内容差异引起的,而训练数据的局限性导致模型在可见域中过度拟合这些特征表达。因此,DRRL 首先通过添加有代表性的数据表示来减轻对所见数据的过度拟合,然后移除所表达的领域信息特征,从而学习领域变化的稳健性和鉴别性表征,从而增强模型对未见领域的泛化能力。数据增强是通过将样本表示风格化和探索有代表性的新风格来生成丰富的数据变体来实现的,内容风格增强(CSA)模块和伪造风格增强(FSA)模块分别用于内容和伪造表达。在此基础上,利用内容去相关性(Content Decorrelation,CTD)模块和敏感通道去除(Sensitive Channels Drop,SCD)模块去除与伪造无关的内容特征和对领域敏感的伪造特征,促使模型专注于干净、稳健的伪造特征,从而实现学习领域稳健表征的目标。在五个大规模数据集上进行的广泛实验证明,我们的方法在实际应用场景中表现出先进而稳定的泛化性能。
{"title":"Towards generalized face forgery detection with domain-robust representation learning","authors":"Caiyu Li,&nbsp;Yan Wo","doi":"10.1016/j.dsp.2024.104792","DOIUrl":"10.1016/j.dsp.2024.104792","url":null,"abstract":"<div><div>Face forgery detection is crucial for the security of digital identities. However, existing methods often struggle to generalize effectively to unseen domains due to the domain shift between training and testing data. We propose a Domain-robust Representation Learning (DRRL) method for generalized face forgery detection. Specifically, we observe that domain shifts in face forgery detection tasks are often caused by forgery differences and content differences between domain data, while the limitations of training data lead the model to overfit to these feature expressions in the seen domain. Therefore, DRRL enhances the model's generalization to unseen domains by first adding representative data representations to mitigate overfitting to seen data and then removing the features of expressed domain information to learn a robust, discriminative representation of domain variation. Data augmentation is achieved by stylizing sample representations and exploring representative new styles to generate rich data variants, with the Content-style Augmentation (CSA) module and Forgery-style Augmentation (FSA) module implemented for content and forgery expression, respectively. Based on this, the Content Decorrelation (CTD) module and Sensitive Channels Drop (SCD) module are used to remove content features irrelevant to forgery and domain-sensitive forgery features, encouraging the model to focus on clean and robust forgery features, thereby achieving the goal of learning domain-robust representations. Extensive experiments on five large-scale datasets demonstrate that our method exhibits advanced and stable generalization performance in practical scenarios.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104792"},"PeriodicalIF":2.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic thresholding method using single information entropy under product transformation of order difference filter response 阶差滤波器响应乘积变换下的单信息熵自动阈值法
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-30 DOI: 10.1016/j.dsp.2024.104798
Yaobin Zou , Shutong Chen
To automatically threshold images with unimodal, bimodal, multimodal or non-modal gray level distributions within a unified framework, an automatic thresholding method using single information entropy under the product transformation of order difference filter response is proposed. The proposed method first performs the product transformation of order difference filter response on an input image at different scales to obtain the product transformation image. Critical or non-critical pixels are labelled on each pixel of the binary images corresponding to different thresholds to construct a series of binary label images that are used for distinguishing critical or non-critical regions. A single information entropy is finally used for characterizing the information obtained from the product transformation image with the critical regions of different binary label images, and the threshold corresponding to maximum information entropy is selected as final threshold. The proposed method is compared with seven state-of-the-art segmentation methods. Experimental results on 12 synthetic images and 98 real-world images show that the average Matthews correlation coefficients of the proposed method reached 0.994 and 0.966 for the synthetic images and the real-world images, which outperform the second-best method by 52.4 % and 27.8 %, respectively. The proposed method has more robust segmentation adaptability to test images with different modalities, despite not offering an advantage in terms of computational efficiency.
为了在统一的框架内自动阈值化具有单模态、双模态、多模态或非模态灰度分布的图像,提出了一种在阶差滤波器响应的乘积变换下使用单信息熵的自动阈值化方法。该方法首先对不同尺度的输入图像进行阶差滤波响应的乘积变换,得到乘积变换图像。在二值图像的每个像素上标注与不同阈值相对应的临界或非临界像素,从而构建一系列二值标签图像,用于区分临界或非临界区域。最后使用单一信息熵来表征产品变换图像与不同二进制标签图像的临界区域所获得的信息,并选择与最大信息熵相对应的阈值作为最终阈值。将所提出的方法与七种最先进的分割方法进行了比较。在 12 幅合成图像和 98 幅真实世界图像上的实验结果表明,所提方法在合成图像和真实世界图像上的平均马修斯相关系数分别达到了 0.994 和 0.966,比排名第二的方法分别高出 52.4% 和 27.8%。尽管在计算效率方面没有优势,但提出的方法对不同模式的测试图像具有更强的分割适应性。
{"title":"Automatic thresholding method using single information entropy under product transformation of order difference filter response","authors":"Yaobin Zou ,&nbsp;Shutong Chen","doi":"10.1016/j.dsp.2024.104798","DOIUrl":"10.1016/j.dsp.2024.104798","url":null,"abstract":"<div><div>To automatically threshold images with unimodal, bimodal, multimodal or non-modal gray level distributions within a unified framework, an automatic thresholding method using single information entropy under the product transformation of order difference filter response is proposed. The proposed method first performs the product transformation of order difference filter response on an input image at different scales to obtain the product transformation image. Critical or non-critical pixels are labelled on each pixel of the binary images corresponding to different thresholds to construct a series of binary label images that are used for distinguishing critical or non-critical regions. A single information entropy is finally used for characterizing the information obtained from the product transformation image with the critical regions of different binary label images, and the threshold corresponding to maximum information entropy is selected as final threshold. The proposed method is compared with seven state-of-the-art segmentation methods. Experimental results on 12 synthetic images and 98 real-world images show that the average Matthews correlation coefficients of the proposed method reached 0.994 and 0.966 for the synthetic images and the real-world images, which outperform the second-best method by 52.4 % and 27.8 %, respectively. The proposed method has more robust segmentation adaptability to test images with different modalities, despite not offering an advantage in terms of computational efficiency.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104798"},"PeriodicalIF":2.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142427694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S2VSNet: Single stage V-shaped network for image deraining & dehazing S2VSNet:用于图像去毛刺和去细化的单级 V 型网络
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-30 DOI: 10.1016/j.dsp.2024.104786
Thatikonda Ragini , Kodali Prakash , Ramalinga Swamy Cheruku
Producing high-quality, noise-free images from noisy or hazy inputs relies on essential tasks such as single image deraining and dehazing. In many advanced multi-stage networks, there is often an imbalance in contextual information, leading to increased complexity. To address these challenges, we propose a simplified method inspired by a U-Net structure, resulting in the “Single-Stage V-Shaped Network” (S2VSNet), capable of handling both deraining and dehazing tasks. A key innovation in our approach is the introduction of a Feature Fusion Module (FFM), which facilitates the sharing of information across multiple scales and hierarchical layers within the encoder-decoder structure. As the network progresses towards deeper layers, the FFM gradually integrates insights from higher levels, ensuring that spatial details are preserved while contextual feature maps are balanced. This integration enhances the image processing capability, producing noise-free, high-quality outputs. To maintain efficiency and reduce system complexity, we replaced or removed several non-essential non-linear activation functions, opting instead for simple multiplication operations. Additionally, we introduced a “Multi-Head Attention Integrated Module” (MHAIM) as an intermediary layer between encoder-decoder levels. This module addresses the limited receptive fields of traditional Convolutional Neural Networks (CNNs), allowing for the capture of more comprehensive feature-map information. Our focus on deraining and dehazing led to extensive experiments on a wide range of synthetic and real-world datasets. To further validate the robustness of our network, we implemented S2VSNet on a low-end edge device, achieving deraining in 2.46 seconds.
要从嘈杂或朦胧的输入图像中生成高质量、无噪音的图像,需要完成一些基本任务,如单幅图像去毛刺和去阴影。在许多先进的多级网络中,上下文信息往往不平衡,导致复杂性增加。为了应对这些挑战,我们提出了一种受 U 型网络结构启发的简化方法,即 "单级 V 型网络"(S2VSNet),它能够同时处理去毛刺和去雾化任务。我们的方法的一个关键创新是引入了特征融合模块(FFM),该模块有助于在编码器-解码器结构中的多个尺度和层次层之间共享信息。随着网络向更深层次发展,FFM 会逐渐整合来自更高层次的洞察力,确保保留空间细节,同时平衡上下文特征图。这种整合增强了图像处理能力,产生无噪声的高质量输出。为了保持效率并降低系统复杂性,我们替换或删除了几个非必要的非线性激活函数,转而使用简单的乘法运算。此外,我们还引入了 "多头注意力集成模块"(MHAIM),作为编码器-解码器层之间的中间层。该模块解决了传统卷积神经网络(CNN)感受野有限的问题,从而可以捕捉到更全面的特征图信息。我们将重点放在了去毛刺和去马赛克上,并在大量的合成数据集和真实数据集上进行了广泛的实验。为了进一步验证我们网络的鲁棒性,我们在低端边缘设备上实施了 S2VSNet,在 2.46 秒内实现了去链。
{"title":"S2VSNet: Single stage V-shaped network for image deraining & dehazing","authors":"Thatikonda Ragini ,&nbsp;Kodali Prakash ,&nbsp;Ramalinga Swamy Cheruku","doi":"10.1016/j.dsp.2024.104786","DOIUrl":"10.1016/j.dsp.2024.104786","url":null,"abstract":"<div><div>Producing high-quality, noise-free images from noisy or hazy inputs relies on essential tasks such as single image deraining and dehazing. In many advanced multi-stage networks, there is often an imbalance in contextual information, leading to increased complexity. To address these challenges, we propose a simplified method inspired by a U-Net structure, resulting in the “Single-Stage V-Shaped Network” (<span><math><msup><mrow><mtext>S</mtext></mrow><mrow><mn>2</mn></mrow></msup><mtext>VSNet</mtext></math></span>), capable of handling both deraining and dehazing tasks. A key innovation in our approach is the introduction of a Feature Fusion Module (FFM), which facilitates the sharing of information across multiple scales and hierarchical layers within the encoder-decoder structure. As the network progresses towards deeper layers, the FFM gradually integrates insights from higher levels, ensuring that spatial details are preserved while contextual feature maps are balanced. This integration enhances the image processing capability, producing noise-free, high-quality outputs. To maintain efficiency and reduce system complexity, we replaced or removed several non-essential non-linear activation functions, opting instead for simple multiplication operations. Additionally, we introduced a “Multi-Head Attention Integrated Module” (MHAIM) as an intermediary layer between encoder-decoder levels. This module addresses the limited receptive fields of traditional Convolutional Neural Networks (CNNs), allowing for the capture of more comprehensive feature-map information. Our focus on deraining and dehazing led to extensive experiments on a wide range of synthetic and real-world datasets. To further validate the robustness of our network, we implemented <span><math><msup><mrow><mtext>S</mtext></mrow><mrow><mn>2</mn></mrow></msup><mtext>VSNet</mtext></math></span> on a low-end edge device, achieving deraining in 2.46 seconds.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104786"},"PeriodicalIF":2.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantized kernel recursive q-Rényi-like algorithm 量化核递归 q-Rényi-like 算法
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-27 DOI: 10.1016/j.dsp.2024.104790
Wenwen Zhou , Yanmin Zhang , Chunlong Huang , Sergey V. Volvenko , Wei Xue
This paper introduces the kernel recursive q-Rényi-like (KRqRL) algorithm, based on the q-Rényi kernel function and the kernel recursive least squares (KRLS) algorithm. To reduce the computational complexity and memory requirements of the KRqRL algorithm, an online vector quantization (VQ) method is employed to quantize the network size to a codebook size, resulting in the quantized KRqRL (QKRqRL) algorithm. This paper provides a detailed analysis of the convergence and computational complexity of the QKRqRL algorithm. In the simulation experiments, the network size of each algorithm is reduced to 25% of its original size. The performance of the QKRqRL algorithm is evaluated in terms of convergence speed, prediction error, and computation time under non-Gaussian noise conditions. Finally, the QKRqRL algorithm is further validated using sunspot data, demonstrating its superior stability and online prediction performance.
本文介绍了基于 q-Rényi 核函数和核递归最小二乘法(KRLS)的核递归 q-Rényi-like 算法(KRqRL)。为了降低 KRqRL 算法的计算复杂度和内存需求,本文采用了在线矢量量化(VQ)方法,将网络大小量化为编码本大小,从而形成了量化 KRqRL(QKRqRL)算法。本文详细分析了 QKRqRL 算法的收敛性和计算复杂度。在仿真实验中,每种算法的网络规模都缩小到原来的 25%。在非高斯噪声条件下,从收敛速度、预测误差和计算时间等方面评估了 QKRqRL 算法的性能。最后,利用太阳黑子数据对 QKRqRL 算法进行了进一步验证,证明了其卓越的稳定性和在线预测性能。
{"title":"Quantized kernel recursive q-Rényi-like algorithm","authors":"Wenwen Zhou ,&nbsp;Yanmin Zhang ,&nbsp;Chunlong Huang ,&nbsp;Sergey V. Volvenko ,&nbsp;Wei Xue","doi":"10.1016/j.dsp.2024.104790","DOIUrl":"10.1016/j.dsp.2024.104790","url":null,"abstract":"<div><div>This paper introduces the kernel recursive <em>q</em>-Rényi-like (KR<em>q</em>RL) algorithm, based on the <em>q</em>-Rényi kernel function and the kernel recursive least squares (KRLS) algorithm. To reduce the computational complexity and memory requirements of the KR<em>q</em>RL algorithm, an online vector quantization (VQ) method is employed to quantize the network size to a codebook size, resulting in the quantized KR<em>q</em>RL (QKR<em>q</em>RL) algorithm. This paper provides a detailed analysis of the convergence and computational complexity of the QKR<em>q</em>RL algorithm. In the simulation experiments, the network size of each algorithm is reduced to 25% of its original size. The performance of the QKR<em>q</em>RL algorithm is evaluated in terms of convergence speed, prediction error, and computation time under non-Gaussian noise conditions. Finally, the QKR<em>q</em>RL algorithm is further validated using sunspot data, demonstrating its superior stability and online prediction performance.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104790"},"PeriodicalIF":2.9,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEDBNet: DoG-enhanced dual-branch object detection network for remote sensing object detection DEDBNet:用于遥感物体探测的 DoG 增强型双分支物体探测网络
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-27 DOI: 10.1016/j.dsp.2024.104789
Dongbo Pan, Jingfeng Zhao, Tianchi Zhu, Jianjun Yuan
With the improvement of spatial resolution of remote sensing images, object detection of remote sensing images has gradually become a difficult task. Extracted object features are usually hidden in a large amount of interference information in the background due to the complexity and large area of backgrounds, as well as the multi-scale nature of objects in remote sensing images. Still, many existing background weakening methods face difficulties in practical applications and are prone to high rates of false positives and false negatives. Therefore, remote sensing object detection has become increasingly challenging. To address these challenges, a novel background weakening method called Difference of Gaussian (DoG) to weaken background (DWB) module is proposed. Then, we develop a dual-branch network, named DoG-Enhanced Dual-Branch Object Detection Network (DEDBNet) for Remote Sensing Object Detection. The base branch network is responsible for detecting objects, while the DWB's branch network corrects the detected objects using feature-level attention. To combine the features of these branches, we propose two new methods Self-Mutual-Correcter with Detect heads (SMCD) for corrective learning and Map Channel Attention (MCA) for channel attention. Self-Corrector (SC) enables modification and integration of features, while the Mutual-Corrector (MC) enhances the features and further fuses them. We evaluate our proposed network, DEDBNet, through extensive experiments on four public datasets (DOTA with an mAP of 0.836, DIOR with an mAP of 0.871, NWPU VHR-10 with an mAP of 0.973, and RSOD with an mAP of 0.975). The results demonstrate that our method outperforms other state-of-the-art object detection methods significantly for remote sensing images.
随着遥感图像空间分辨率的提高,遥感图像的目标检测逐渐成为一项艰巨的任务。由于遥感图像中背景的复杂性和大面积性以及物体的多尺度性,提取的物体特征通常隐藏在背景的大量干扰信息中。然而,现有的许多背景弱化方法在实际应用中都面临着困难,容易产生较高的假阳性和假阴性。因此,遥感物体检测变得越来越具有挑战性。为了应对这些挑战,我们提出了一种新颖的背景弱化方法--高斯差(DoG)弱化背景(DWB)模块。然后,我们开发了一种双分支网络,名为 DoG 增强双分支目标检测网络(DEDBNet),用于遥感目标检测。基础分支网络负责检测物体,而 DWB 的分支网络则利用特征级关注修正检测到的物体。为了结合这些分支的特点,我们提出了两种新方法:用于矫正学习的带检测头的自互矫正器(SMCD)和用于通道关注的地图通道关注(MCA)。自校正器(SC)可对特征进行修改和整合,而互校正器(MC)可增强特征并进一步将其融合。我们在四个公开数据集(DOTA 的 mAP 为 0.836,DIOR 的 mAP 为 0.871,NWPU VHR-10 的 mAP 为 0.973,RSOD 的 mAP 为 0.975)上进行了大量实验,评估了我们提出的网络 DEDBNet。结果表明,在遥感图像方面,我们的方法明显优于其他最先进的物体检测方法。
{"title":"DEDBNet: DoG-enhanced dual-branch object detection network for remote sensing object detection","authors":"Dongbo Pan,&nbsp;Jingfeng Zhao,&nbsp;Tianchi Zhu,&nbsp;Jianjun Yuan","doi":"10.1016/j.dsp.2024.104789","DOIUrl":"10.1016/j.dsp.2024.104789","url":null,"abstract":"<div><div>With the improvement of spatial resolution of remote sensing images, object detection of remote sensing images has gradually become a difficult task. Extracted object features are usually hidden in a large amount of interference information in the background due to the complexity and large area of backgrounds, as well as the multi-scale nature of objects in remote sensing images. Still, many existing background weakening methods face difficulties in practical applications and are prone to high rates of false positives and false negatives. Therefore, remote sensing object detection has become increasingly challenging. To address these challenges, a novel background weakening method called Difference of Gaussian (DoG) to weaken background (DWB) module is proposed. Then, we develop a dual-branch network, named DoG-Enhanced Dual-Branch Object Detection Network (DEDBNet) for Remote Sensing Object Detection. The base branch network is responsible for detecting objects, while the DWB's branch network corrects the detected objects using feature-level attention. To combine the features of these branches, we propose two new methods Self-Mutual-Correcter with Detect heads (SMCD) for corrective learning and Map Channel Attention (MCA) for channel attention. Self-Corrector (SC) enables modification and integration of features, while the Mutual-Corrector (MC) enhances the features and further fuses them. We evaluate our proposed network, DEDBNet, through extensive experiments on four public datasets (DOTA with an mAP of 0.836, DIOR with an mAP of 0.871, NWPU VHR-10 with an mAP of 0.973, and RSOD with an mAP of 0.975). The results demonstrate that our method outperforms other state-of-the-art object detection methods significantly for remote sensing images.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104789"},"PeriodicalIF":2.9,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142428112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-modal signal adaptive time-reassigned multisynchrosqueezing transform of mechanism 多模式信号自适应时间分配多同步阙值变换的机制
IF 2.9 3区 工程技术 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC Pub Date : 2024-09-24 DOI: 10.1016/j.dsp.2024.104788
Qiqiang Wu , Xianmin Zhang , Bo Zhao
High-end mechanical equipment often operates under non-stationary conditions, such as varying loads, changing speeds, and transient impacts, which can lead to failures. Time-frequency analysis (TFA) integrates time and frequency parameters, allowing for detailed signal analysis and is widely used in this context. To improve the accuracy of assessing the operational status of mechanical equipment, this paper proposed a multi-modal signal adaptive time reassignment multiple synchrosqueezing transform (MSST) TFA method. This method enhances the MSST method by using a local maximum technique to address energy ambiguity in TFA. Additionally, the optimal window width for each function is determined through iterative processes to better concentrate energy in the TFA. Multi-modal signals are jointly analyzed using an impulse feature extraction method for signal reconstruction, enabling multi-dimensional fault analysis. The proposed method is validated with both simulation and experimental data from a planar parallel mechanism (PPM) and is compared against classical and advanced techniques. The results show that the method effectively captures shock features in multi-modal signals, offering a more consolidated time-frequency representation (TFR) than existing TFA algorithms.
高端机械设备通常在非稳态条件下运行,如负载变化、速度变化和瞬态冲击,这些都可能导致故障。时频分析(TFA)集成了时间和频率参数,可以进行详细的信号分析,在这方面得到了广泛应用。为了提高评估机械设备运行状态的准确性,本文提出了一种多模态信号自适应时间重分配多重同步阙值变换(MSST)TFA 方法。该方法通过使用局部最大值技术来解决 TFA 中的能量模糊问题,从而增强了 MSST 方法。此外,通过迭代过程确定每个函数的最佳窗宽,以更好地集中 TFA 中的能量。使用脉冲特征提取方法对多模态信号进行联合分析,以重建信号,从而实现多维故障分析。利用平面并联机构 (PPM) 的模拟和实验数据对所提出的方法进行了验证,并与经典和先进技术进行了比较。结果表明,与现有的 TFA 算法相比,该方法能有效捕捉多模态信号中的冲击特征,提供更全面的时频表示(TFR)。
{"title":"Multi-modal signal adaptive time-reassigned multisynchrosqueezing transform of mechanism","authors":"Qiqiang Wu ,&nbsp;Xianmin Zhang ,&nbsp;Bo Zhao","doi":"10.1016/j.dsp.2024.104788","DOIUrl":"10.1016/j.dsp.2024.104788","url":null,"abstract":"<div><div>High-end mechanical equipment often operates under non-stationary conditions, such as varying loads, changing speeds, and transient impacts, which can lead to failures. Time-frequency analysis (TFA) integrates time and frequency parameters, allowing for detailed signal analysis and is widely used in this context. To improve the accuracy of assessing the operational status of mechanical equipment, this paper proposed a multi-modal signal adaptive time reassignment multiple synchrosqueezing transform (MSST) TFA method. This method enhances the MSST method by using a local maximum technique to address energy ambiguity in TFA. Additionally, the optimal window width for each function is determined through iterative processes to better concentrate energy in the TFA. Multi-modal signals are jointly analyzed using an impulse feature extraction method for signal reconstruction, enabling multi-dimensional fault analysis. The proposed method is validated with both simulation and experimental data from a planar parallel mechanism (PPM) and is compared against classical and advanced techniques. The results show that the method effectively captures shock features in multi-modal signals, offering a more consolidated time-frequency representation (TFR) than existing TFA algorithms.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"156 ","pages":"Article 104788"},"PeriodicalIF":2.9,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1