首页 > 最新文献

IEEE journal on selected areas in information theory最新文献

英文 中文
Learning and Communications Co-Design for Remote Inference Systems: Feature Length Selection and Transmission Scheduling 远程推理系统的学习和通信协同设计:特征长度选择和传输调度
Pub Date : 2023-10-06 DOI: 10.1109/JSAIT.2023.3322620
Md Kamran Chowdhury Shisher;Bo Ji;I-Hong Hou;Yin Sun
In this paper, we consider a remote inference system, where a neural network is used to infer a time-varying target (e.g., robot movement), based on features (e.g., video clips) that are progressively received from a sensing node (e.g., a camera). Each feature is a temporal sequence of sensory data. The inference error is determined by (i) the timeliness and (ii) the sequence length of the feature, where we use Age of Information (AoI) as a metric for timeliness. While a longer feature can typically provide better inference performance, it often requires more channel resources for sending the feature. To minimize the time-averaged inference error, we study a learning and communication co-design problem that jointly optimizes feature length selection and transmission scheduling. When there is a single sensor-predictor pair and a single channel, we develop low-complexity optimal co-designs for both the cases of time-invariant and time-variant feature length. When there are multiple sensor-predictor pairs and multiple channels, the co-design problem becomes a restless multi-arm multi-action bandit problem that is PSPACE-hard. For this setting, we design a low-complexity algorithm to solve the problem. Trace-driven evaluations demonstrate the potential of these co-designs to reduce inference error by up to 10000 times.
在本文中,我们考虑了一个远程推理系统,其中神经网络用于根据从感测节点(例如相机)逐渐接收到的特征(例如视频剪辑)来推断时变目标(例如机器人运动)。每个特征都是感官数据的时间序列。推断误差由(i)特征的及时性和(ii)序列长度决定,其中我们使用信息年龄(AoI)作为及时性的度量。虽然较长的特征通常可以提供更好的推理性能,但发送该特征通常需要更多的信道资源。为了最小化时间平均推断误差,我们研究了一个学习和通信协同设计问题,该问题联合优化了特征长度选择和传输调度。当存在单个传感器预测器对和单个通道时,我们针对时不变和时变特征长度的情况开发了低复杂度的最优联合设计。当存在多个传感器预测器对和多个通道时,协同设计问题变成了PSPACE难以解决的多臂多动作土匪问题。对于这种设置,我们设计了一个低复杂度的算法来解决这个问题。跟踪驱动的评估证明了这些协同设计可以将推理误差减少10000倍的潜力。
{"title":"Learning and Communications Co-Design for Remote Inference Systems: Feature Length Selection and Transmission Scheduling","authors":"Md Kamran Chowdhury Shisher;Bo Ji;I-Hong Hou;Yin Sun","doi":"10.1109/JSAIT.2023.3322620","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3322620","url":null,"abstract":"In this paper, we consider a remote inference system, where a neural network is used to infer a time-varying target (e.g., robot movement), based on features (e.g., video clips) that are progressively received from a sensing node (e.g., a camera). Each feature is a temporal sequence of sensory data. The inference error is determined by (i) the timeliness and (ii) the sequence length of the feature, where we use Age of Information (AoI) as a metric for timeliness. While a longer feature can typically provide better inference performance, it often requires more channel resources for sending the feature. To minimize the time-averaged inference error, we study a learning and communication co-design problem that jointly optimizes feature length selection and transmission scheduling. When there is a single sensor-predictor pair and a single channel, we develop low-complexity optimal co-designs for both the cases of time-invariant and time-variant feature length. When there are multiple sensor-predictor pairs and multiple channels, the co-design problem becomes a restless multi-arm multi-action bandit problem that is PSPACE-hard. For this setting, we design a low-complexity algorithm to solve the problem. Trace-driven evaluations demonstrate the potential of these co-designs to reduce inference error by up to 10000 times.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"524-538"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cache-Aided Communication Schemes via Combinatorial Designs and Their q-Analogs 基于组合设计的缓存辅助通信方案及其q-类比
Pub Date : 2023-09-29 DOI: 10.1109/JSAIT.2023.3320068
Shailja Agrawal;K. V. Sushena Sree;Prasad Krishnan;Abhinav Vaishya;Srikar Kale
We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called cache) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and the channel together optimally. In prior literature, various combinatorial structures have been used to construct coded caching schemes. One of the chief drawbacks of many of these existing constructions is the large subpacketization level, which denotes the number of times a file should be split for the schemes to provide coding gain. In this work, using a new binary matrix model, we present several novel constructions for coded caching based on the various types of combinatorial designs and their $q$ -analogs, which are also called subspace designs. While most of the schemes constructed in this work (based on existing designs) have a high cache requirement, they provide a rate that is either constant or decreasing, and moreover require competitively small levels of subpacketization, which is an extremely important feature in practical applications of coded caching. We also apply our constructions to the distributed computing framework of MapReduce, which consists of three phases, the Map phase, the Shuffle phase and the Reduce phase. Using our binary matrix framework, we present a new simple generic coded data shuffling scheme. Employing our designs-based constructions in conjunction with this new shuffling scheme, we obtain new coded computing schemes which have low file complexity, with marginally higher communication load compared to the optimal scheme for equivalent parameters. We show that our schemes can neatly extend to the scenario with full and partial stragglers also.
我们考虑的标准广播设置是,单个服务器向多个客户机广播信息,每个客户机都包含一定大小的本地存储(称为缓存),可以在服务器上存储可用文件的某些部分。集中式编码缓存框架由缓存阶段和交付阶段组成,这两个阶段都经过精心设计,以便以最佳方式同时使用缓存和通道。在先前的文献中,已经使用各种组合结构来构建编码缓存方案。许多现有结构的主要缺点之一是大的子分组级别,这表示为了提供编码增益,方案应该分割文件的次数。在这项工作中,我们使用一个新的二进制矩阵模型,基于不同类型的组合设计和它们的$q$类似物,提出了几种新的编码缓存结构,这些结构也被称为子空间设计。虽然在这项工作中构建的大多数方案(基于现有设计)都有很高的缓存要求,但它们提供的速率要么是恒定的,要么是递减的,而且需要具有竞争力的小级别的子分组,这是编码缓存实际应用中的一个极其重要的特征。我们还将我们的结构应用于MapReduce的分布式计算框架,该框架由三个阶段组成,Map阶段,Shuffle阶段和Reduce阶段。利用二元矩阵框架,提出了一种新的简单的通用编码数据变换方案。采用基于设计的结构与这种新的变换方案相结合,我们获得了新的编码计算方案,该方案具有较低的文件复杂度,与等效参数的最优方案相比,通信负载略高。我们还证明了我们的方案可以很好地扩展到具有完全和部分离散体的情况。
{"title":"Cache-Aided Communication Schemes via Combinatorial Designs and Their q-Analogs","authors":"Shailja Agrawal;K. V. Sushena Sree;Prasad Krishnan;Abhinav Vaishya;Srikar Kale","doi":"10.1109/JSAIT.2023.3320068","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3320068","url":null,"abstract":"We consider the standard broadcast setup with a single server broadcasting information to a number of clients, each of which contains local storage (called \u0000<italic>cache</i>\u0000) of some size, which can store some parts of the available files at the server. The centralized coded caching framework, consists of a caching phase and a delivery phase, both of which are carefully designed in order to use the cache and the channel together optimally. In prior literature, various combinatorial structures have been used to construct coded caching schemes. One of the chief drawbacks of many of these existing constructions is the large subpacketization level, which denotes the number of times a file should be split for the schemes to provide coding gain. In this work, using a new binary matrix model, we present several novel constructions for coded caching based on the various types of combinatorial designs and their \u0000<inline-formula> <tex-math>$q$ </tex-math></inline-formula>\u0000-analogs, which are also called subspace designs. While most of the schemes constructed in this work (based on existing designs) have a high cache requirement, they provide a rate that is either constant or decreasing, and moreover require competitively small levels of subpacketization, which is an extremely important feature in practical applications of coded caching. We also apply our constructions to the distributed computing framework of MapReduce, which consists of three phases, the Map phase, the Shuffle phase and the Reduce phase. Using our binary matrix framework, we present a new simple generic coded data shuffling scheme. Employing our designs-based constructions in conjunction with this new shuffling scheme, we obtain new coded computing schemes which have low file complexity, with marginally higher communication load compared to the optimal scheme for equivalent parameters. We show that our schemes can neatly extend to the scenario with full and partial stragglers also.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"551-568"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134795149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Revisit of Linear Network Error Correction Coding 线性网络纠错编码的再认识
Pub Date : 2023-09-22 DOI: 10.1109/JSAIT.2023.3317941
Xuan Guang;Raymond W. Yeung
We consider linear network erro correction (LNEC) coding when errors may occur on the edges of a communication network of which the topology is known. In this paper, we first present a framework of additive adversarial network for LNEC coding, and then prove the equivalence of two well-known LNEC coding approaches, which can be unified under this framework. Furthermore, by developing a graph-theoretic approach, we obtain a significantly enhanced characterization of the error correction capability of LNEC codes in terms of the minimum distances at the sink nodes. Specifically, in order to ensure that an LNEC code can correct up to $r$ errors at a sink node $t$ , it suffices to ensure that this code can correct every error vector in a reduced set of error vectors; and on the other hand, this LNEC code in fact can correct every error vector in an enlarged set of error vectors. In general, the size of this reduced set is considerably smaller than the number of error vectors with Hamming weight not larger than $r$ , and the size of this enlarged set is considerably larger than the same number. This result has the important implication that the computational complexities for decoding and for code construction can be significantly reduced.
当拓扑结构已知的通信网络的边缘可能出现错误时,我们考虑线性网络纠错(LNEC)编码。在本文中,我们首先提出了一个用于LNEC编码的加性对抗性网络框架,然后证明了两种众所周知的LNEC编码方法的等价性,它们可以在该框架下统一。此外,通过开发图论方法,我们获得了LNEC码在汇聚节点处的最小距离方面的纠错能力的显著增强的表征。具体地,为了确保LNEC代码能够在汇聚节点$t$处校正高达$r$的错误,只要确保该代码能够校正误差向量的缩减集合中的每个误差向量就足够了;而另一方面该LNEC码实际上可以校正放大的一组误差矢量中的每个误差矢量。通常,该缩减集的大小明显小于汉明权重不大于$r$的误差向量的数量,并且该放大集的大小显著大于相同数量。这一结果具有重要意义,即解码和代码构造的计算复杂性可以显著降低。
{"title":"A Revisit of Linear Network Error Correction Coding","authors":"Xuan Guang;Raymond W. Yeung","doi":"10.1109/JSAIT.2023.3317941","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3317941","url":null,"abstract":"We consider linear network erro correction (LNEC) coding when errors may occur on the edges of a communication network of which the topology is known. In this paper, we first present a framework of additive adversarial network for LNEC coding, and then prove the equivalence of two well-known LNEC coding approaches, which can be unified under this framework. Furthermore, by developing a graph-theoretic approach, we obtain a significantly enhanced characterization of the error correction capability of LNEC codes in terms of the minimum distances at the sink nodes. Specifically, in order to ensure that an LNEC code can correct up to \u0000<inline-formula> <tex-math>$r$ </tex-math></inline-formula>\u0000 errors at a sink node \u0000<inline-formula> <tex-math>$t$ </tex-math></inline-formula>\u0000, it suffices to ensure that this code can correct every error vector in a reduced set of error vectors; and on the other hand, this LNEC code in fact can correct every error vector in an enlarged set of error vectors. In general, the size of this reduced set is considerably smaller than the number of error vectors with Hamming weight not larger than \u0000<inline-formula> <tex-math>$r$ </tex-math></inline-formula>\u0000, and the size of this enlarged set is considerably larger than the same number. This result has the important implication that the computational complexities for decoding and for code construction can be significantly reduced.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"514-523"},"PeriodicalIF":0.0,"publicationDate":"2023-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative Broadband Source Localization 迭代宽带源定位
Pub Date : 2023-09-19 DOI: 10.1109/JSAIT.2023.3317094
Coleman DeLude;Rakshith S. Srinivasa;Santhosh Karnik;Christopher Hood;Mark A. Davenport;Justin Romberg
In this paper we consider the problem of localizing a set of broadband sources from a finite window of measurements. In the case of narrowband sources this can be reduced to the problem of spectral line estimation, where our goal is simply to estimate the active frequencies from a weighted mixture of pure sinusoids. There exists a plethora of modern and classical methods that effectively solve this problem. However, for a wide variety of applications the underlying sources are not narrowband and can have an appreciable amount of bandwidth. In this work, we extend classical greedy algorithms for sparse recovery (e.g., orthogonal matching pursuit) to localize broadband sources. We leverage models for samples of broadband signals based on a union of Slepian subspaces, which are more aptly suited for dealing with spectral leakage and dynamic range disparities. We show that by using these models, our adapted algorithms can successfully localize broadband sources under a variety of adverse operating scenarios. Furthermore, we show that our algorithms outperform complementary methods that use more standard Fourier models. We also show that we can perform estimation from compressed measurements with little loss in fidelity as long as the number of measurements are on the order of the signal’s implicit degrees of freedom. We conclude with an in-depth application of these ideas to the problem of localization in multi-sensor arrays.
在本文中,我们考虑从有限的测量窗口定位一组宽带源的问题。在窄带源的情况下,这可以简化为谱线估计问题,其中我们的目标只是从纯正弦曲线的加权混合物中估计有效频率。有大量的现代和古典方法可以有效地解决这个问题。然而,对于各种各样的应用,底层源不是窄带的,并且可以具有可观的带宽。在这项工作中,我们扩展了用于稀疏恢复的经典贪婪算法(例如,正交匹配追踪)来定位宽带源。我们利用基于Slepian子空间联合的宽带信号样本模型,这些模型更适合处理频谱泄漏和动态范围差异。我们表明,通过使用这些模型,我们的自适应算法可以在各种不利的操作场景下成功地定位宽带源。此外,我们还表明,我们的算法优于使用更多标准傅立叶模型的互补方法。我们还表明,只要测量次数在信号隐含自由度的数量级上,我们就可以从压缩测量中进行估计,而保真度损失很小。最后,我们将这些思想深入应用于多传感器阵列的定位问题。
{"title":"Iterative Broadband Source Localization","authors":"Coleman DeLude;Rakshith S. Srinivasa;Santhosh Karnik;Christopher Hood;Mark A. Davenport;Justin Romberg","doi":"10.1109/JSAIT.2023.3317094","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3317094","url":null,"abstract":"In this paper we consider the problem of localizing a set of broadband sources from a finite window of measurements. In the case of narrowband sources this can be reduced to the problem of spectral line estimation, where our goal is simply to estimate the active frequencies from a weighted mixture of pure sinusoids. There exists a plethora of modern and classical methods that effectively solve this problem. However, for a wide variety of applications the underlying sources are not narrowband and can have an appreciable amount of bandwidth. In this work, we extend classical greedy algorithms for sparse recovery (e.g., orthogonal matching pursuit) to localize broadband sources. We leverage models for samples of broadband signals based on a union of Slepian subspaces, which are more aptly suited for dealing with spectral leakage and dynamic range disparities. We show that by using these models, our adapted algorithms can successfully localize broadband sources under a variety of adverse operating scenarios. Furthermore, we show that our algorithms outperform complementary methods that use more standard Fourier models. We also show that we can perform estimation from compressed measurements with little loss in fidelity as long as the number of measurements are on the order of the signal’s implicit degrees of freedom. We conclude with an in-depth application of these ideas to the problem of localization in multi-sensor arrays.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"453-469"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Strategy to Count Cycles in the Tanner Graph of Quasi-Cyclic LDPC Codes 准循环LDPC码Tanner图中一种有效的循环计数策略
Pub Date : 2023-09-14 DOI: 10.1109/JSAIT.2023.3315585
Anthony Gómez-Fonseca;Roxana Smarandache;David G. M. Mitchell
In this paper, we present an efficient strategy to enumerate the number of $k$ -cycles, $gleq k < 2g$ , in the Tanner graph of a quasi-cyclic low-density parity-check (QC-LDPC) code with girth $g$ using its polynomial parity-check matrix $H$ . This strategy works for both $(d_{v},d_{c})$ -regular and irregular QC-LDPC codes. In this approach, we note that the $m$ th power of the polynomial adjacency matrix can be used to describe walks of length $m$ in the protograph and can therefore be sufficiently described by the matrices $B_{m}(H) triangleq (HH^{mathsf {T}})^{lfloor {m/2}rfloor }H^{(mmod 2)}$ , where $mgeq 0$ . We provide formulas for the number of $k$ -cycles, $mathcal {N}_{k}$ , by just taking into account repetitions in some multisets constructed from the matrices $B_{m}(H)$ . This approach is shown to have low complexity. For example, in the case of QC-LDPC codes based on the $3times n_{v}$ fully-connected protograph, the complexity of determining $mathcal {N}_{k}$ , for $k=4,6,8,10$ and 12, is $O(n_{v}^{2}log (N))$ , $O(n_{v}^{2}log (n_{v})log (N))$ , $O(n_{v}^{4}log ^{4}(n_{v})log (N))$ , $O(n_{v}^{4}log (n_{v})log (N))$ and $O(n_{v}^{6}log ^{6}(n_{v})log (N))$ , respectively. The complexity, depending logarithmically on the lifting factor $N$ , gives our approach, to the best of our knowledge, a significant advantage over previous works on the cycle distribution of QC-LDPC codes.
在本文中,我们提出了一种有效的策略来枚举$k$-循环的数量,$gleqk<;在周长为$g$的准循环低密度奇偶校验(QC-LDPC)码的Tanner图中。该策略适用于$(d_{v},d_{c})$正则和非正则QC-LDPC码。在这种方法中,我们注意到多项式邻接矩阵的$m$次方可以用来描述原图中长度为$m$的走,因此可以用矩阵$B_{m}(H)tatragleq(HH^{mathsf{T}})^{lfloor{m/2}rfloor}H^{(mmod 2)}$来充分描述,其中$mgeq 0$。我们提供了$k$-循环数的公式,$mathcal{N}_{k} 通过仅考虑由矩阵$B_{m}(H)$构造的一些多集中的重复。这种方法被证明具有较低的复杂性。例如,在基于$3times_{v}$全连通原图的QC-LDPC码的情况下,确定$mathcal{N}_{k} 对于$k=4,6,8,10$和12,$是$O(n_{v}^{2}log(n))$、$O(n-{v}^}2}log(n_{v}})log(n))$。复杂性对数依赖于提升因子$N$,据我们所知,与以前关于QC-LDPC码的周期分布的工作相比,我们的方法具有显著的优势。
{"title":"An Efficient Strategy to Count Cycles in the Tanner Graph of Quasi-Cyclic LDPC Codes","authors":"Anthony Gómez-Fonseca;Roxana Smarandache;David G. M. Mitchell","doi":"10.1109/JSAIT.2023.3315585","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3315585","url":null,"abstract":"In this paper, we present an efficient strategy to enumerate the number of \u0000<inline-formula> <tex-math>$k$ </tex-math></inline-formula>\u0000-cycles, \u0000<inline-formula> <tex-math>$gleq k &lt; 2g$ </tex-math></inline-formula>\u0000, in the Tanner graph of a quasi-cyclic low-density parity-check (QC-LDPC) code with girth \u0000<inline-formula> <tex-math>$g$ </tex-math></inline-formula>\u0000 using its polynomial parity-check matrix \u0000<inline-formula> <tex-math>$H$ </tex-math></inline-formula>\u0000. This strategy works for both \u0000<inline-formula> <tex-math>$(d_{v},d_{c})$ </tex-math></inline-formula>\u0000-regular and irregular QC-LDPC codes. In this approach, we note that the \u0000<inline-formula> <tex-math>$m$ </tex-math></inline-formula>\u0000th power of the polynomial adjacency matrix can be used to describe walks of length \u0000<inline-formula> <tex-math>$m$ </tex-math></inline-formula>\u0000 in the protograph and can therefore be sufficiently described by the matrices \u0000<inline-formula> <tex-math>$B_{m}(H) triangleq (HH^{mathsf {T}})^{lfloor {m/2}rfloor }H^{(mmod 2)}$ </tex-math></inline-formula>\u0000, where \u0000<inline-formula> <tex-math>$mgeq 0$ </tex-math></inline-formula>\u0000. We provide formulas for the number of \u0000<inline-formula> <tex-math>$k$ </tex-math></inline-formula>\u0000-cycles, \u0000<inline-formula> <tex-math>$mathcal {N}_{k}$ </tex-math></inline-formula>\u0000, by just taking into account repetitions in some multisets constructed from the matrices \u0000<inline-formula> <tex-math>$B_{m}(H)$ </tex-math></inline-formula>\u0000. This approach is shown to have low complexity. For example, in the case of QC-LDPC codes based on the \u0000<inline-formula> <tex-math>$3times n_{v}$ </tex-math></inline-formula>\u0000 fully-connected protograph, the complexity of determining \u0000<inline-formula> <tex-math>$mathcal {N}_{k}$ </tex-math></inline-formula>\u0000, for \u0000<inline-formula> <tex-math>$k=4,6,8,10$ </tex-math></inline-formula>\u0000 and 12, is \u0000<inline-formula> <tex-math>$O(n_{v}^{2}log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{2}log (n_{v})log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{4}log ^{4}(n_{v})log (N))$ </tex-math></inline-formula>\u0000, \u0000<inline-formula> <tex-math>$O(n_{v}^{4}log (n_{v})log (N))$ </tex-math></inline-formula>\u0000 and \u0000<inline-formula> <tex-math>$O(n_{v}^{6}log ^{6}(n_{v})log (N))$ </tex-math></inline-formula>\u0000, respectively. The complexity, depending logarithmically on the lifting factor \u0000<inline-formula> <tex-math>$N$ </tex-math></inline-formula>\u0000, gives our approach, to the best of our knowledge, a significant advantage over previous works on the cycle distribution of QC-LDPC codes.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"499-513"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50354741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph-Based Soft-Decision Decoding Scheme for Reed-Solomon Codes Reed-Solomon码的一种基于图的软判决译码方案
Pub Date : 2023-09-14 DOI: 10.1109/JSAIT.2023.3315453
Huang-Chang Lee;Jyun-Han Wu;Chung-Hsuan Wang;Yeong-Luh Ueng
This paper presents a soft decoding scheme based on the binary representations transferred from the parity-check matrices (PCMs) for Reed-Solomon (RS) codes. Referring to the modified binary PCM that has a systematic part and a high-density part corresponding to the least reliable variable nodes (LRVNs) and the most reliable variable nodes (MRVNs), respectively, an informed dynamic scheduling method, called Nested-Polling Residual Belief Propagation (NP-RBP), is applied to the corresponding Tanner graph. As with the popular adaptive BP (ABP) decoding approach, adaptation in a binary PCM based on the reliability of variable nodes is also conducted in the proposed NP-RBP decoding. The NP-RBP enables the LRVNs to receive significant updates and limits the correlation accumulation from the short cycles in the MRVNs. In order to enhance the error-rate performance for long codes, a bit-flipping (BF) technique is conducted in order to correct a selection of the errors in the MRVNs such that the propagation of these errors in the subsequent NP-RBP process can be avoided. The resultant decoder is termed NP-RBP-BF. For short codes such as the (31, 25) and (63, 55) RS codes, NP-RBP is able to provide an error-rate performance close to the maximum-likelihood (ML) bound. A more significant improvement can be observed for long codes. For instance, when the proposed NP-RBP-BF decoding is applied to the (255, 239) RS code, it can provide a gain of about 0.4 dB compared to the ABP decoding and the performance gap to the ML bound can be narrowed to about 0.25 dB at a frame error rate of $2times 10^{-3}$ .
本文提出了一种基于奇偶校验矩阵(PCM)传输的Reed-Solomon(RS)码二进制表示的软解码方案。参考修改的二进制PCM,其具有分别对应于最不可靠变量节点(LRVNs)和最可靠可变节点(MRVNs)的系统部分和高密度部分,将一种称为嵌套轮询残差置信传播(NP-RBP)的知情动态调度方法应用于相应的Tanner图。与流行的自适应BP(ABP)解码方法一样,在所提出的NP-RBP解码中,也进行了基于可变节点可靠性的二进制PCM中的自适应。NP-RBP使LRVN能够接收显著的更新,并限制MRVN中短周期的相关性累积。为了增强长代码的错误率性能,进行了比特翻转(BF)技术,以便校正MRVN中的错误的选择,使得可以避免这些错误在随后的NP-RBP过程中的传播。所得到的解码器被称为NP-RBP-BF。对于诸如(31,25)和(63,55)RS码的短码,NP-RBP能够提供接近最大似然(ML)界的错误率性能。对于长代码,可以观察到更显著的改进。例如,当所提出的NP-RBP-BF解码被应用于(255239)RS码时,与ABP解码相比,它可以提供大约0.4dB的增益,并且在$2乘以10^{-3}$的帧差错率下,与ML界的性能差距可以缩小到大约0.25dB。
{"title":"A Graph-Based Soft-Decision Decoding Scheme for Reed-Solomon Codes","authors":"Huang-Chang Lee;Jyun-Han Wu;Chung-Hsuan Wang;Yeong-Luh Ueng","doi":"10.1109/JSAIT.2023.3315453","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3315453","url":null,"abstract":"This paper presents a soft decoding scheme based on the binary representations transferred from the parity-check matrices (PCMs) for Reed-Solomon (RS) codes. Referring to the modified binary PCM that has a systematic part and a high-density part corresponding to the least reliable variable nodes (LRVNs) and the most reliable variable nodes (MRVNs), respectively, an informed dynamic scheduling method, called Nested-Polling Residual Belief Propagation (NP-RBP), is applied to the corresponding Tanner graph. As with the popular adaptive BP (ABP) decoding approach, adaptation in a binary PCM based on the reliability of variable nodes is also conducted in the proposed NP-RBP decoding. The NP-RBP enables the LRVNs to receive significant updates and limits the correlation accumulation from the short cycles in the MRVNs. In order to enhance the error-rate performance for long codes, a bit-flipping (BF) technique is conducted in order to correct a selection of the errors in the MRVNs such that the propagation of these errors in the subsequent NP-RBP process can be avoided. The resultant decoder is termed NP-RBP-BF. For short codes such as the (31, 25) and (63, 55) RS codes, NP-RBP is able to provide an error-rate performance close to the maximum-likelihood (ML) bound. A more significant improvement can be observed for long codes. For instance, when the proposed NP-RBP-BF decoding is applied to the (255, 239) RS code, it can provide a gain of about 0.4 dB compared to the ABP decoding and the performance gap to the ML bound can be narrowed to about 0.25 dB at a frame error rate of \u0000<inline-formula> <tex-math>$2times 10^{-3}$ </tex-math></inline-formula>\u0000.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"420-433"},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50426629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Design of Polar Factor Graphs 图编码Merkle树:利用极因子图的知情设计缓解区块链系统中的数据可用性攻击
Pub Date : 2023-09-13 DOI: 10.1109/JSAIT.2023.3315148
Debarnab Mitra;Lev Tauz;Lara Dolecek
Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks. These codes perform well across various metrics such as DA detection probability and communication cost. However, these codes are difficult to apply to blockchains with large blocks due to large decoding complexity and coding fraud proof size (2D-RS codes), and intractable code guarantees for large code lengths (LDPC codes). In this paper, we focus on large block size applications and address the above challenges by proposing the novel Graph Coded Merkle Tree (GCMT): a Merkle tree encoded using polar encoding graphs. We provide a specialized polar encoding graph design algorithm called Sampling Efficient Freezing and an algorithm to prune the polar encoding graph. We demonstrate that the GCMT built using the above techniques results in a better DA detection probability and communication cost compared to LDPC codes, has a lower coding fraud proof size compared to LDPC and 2D-RS codes, provides tractable code guarantees at large code lengths (similar to 2D-RS codes), and has comparable decoding complexity to 2D-RS and LDPC codes.
在某些区块链中,数据可用性(DA)攻击是一个众所周知的问题,用户接受具有不可用部分的无效区块。先前的工作已经使用LDPC和具有Merkle树的2-D Reed-Solomon(2D-RS)码来减轻DA攻击。这些代码在诸如DA检测概率和通信成本之类的各种度量中表现良好。然而,由于大的解码复杂性和编码防欺诈大小(2D-RS码),以及针对大码长的难以处理的码保证(LDPC码),这些码难以应用于具有大块的块链。在本文中,我们专注于大块大小的应用,并通过提出新的图编码Merkle树(GCMT)来解决上述挑战:一种使用极坐标编码图编码的Merkle树法。我们提供了一种专门的极坐标编码图设计算法,称为采样高效冻结,以及一种修剪极坐标编码图形的算法。我们证明,与LDPC码相比,使用上述技术构建的GCMT导致更好的DA检测概率和通信成本,与LDPC和2D-RS码相比,具有更低的编码防欺诈大小,在大码长(类似于2D-RS代码)下提供可处理的码保证,并且具有与2D-RS和LDPC码相当的解码复杂度。
{"title":"Graph Coded Merkle Tree: Mitigating Data Availability Attacks in Blockchain Systems Using Informed Design of Polar Factor Graphs","authors":"Debarnab Mitra;Lev Tauz;Lara Dolecek","doi":"10.1109/JSAIT.2023.3315148","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3315148","url":null,"abstract":"Data availability (DA) attack is a well-known problem in certain blockchains where users accept an invalid block with unavailable portions. Previous works have used LDPC and 2-D Reed Solomon (2D-RS) codes with Merkle trees to mitigate DA attacks. These codes perform well across various metrics such as DA detection probability and communication cost. However, these codes are difficult to apply to blockchains with large blocks due to large decoding complexity and coding fraud proof size (2D-RS codes), and intractable code guarantees for large code lengths (LDPC codes). In this paper, we focus on large block size applications and address the above challenges by proposing the novel Graph Coded Merkle Tree (GCMT): a Merkle tree encoded using polar encoding graphs. We provide a specialized polar encoding graph design algorithm called Sampling Efficient Freezing and an algorithm to prune the polar encoding graph. We demonstrate that the GCMT built using the above techniques results in a better DA detection probability and communication cost compared to LDPC codes, has a lower coding fraud proof size compared to LDPC and 2D-RS codes, provides tractable code guarantees at large code lengths (similar to 2D-RS codes), and has comparable decoding complexity to 2D-RS and LDPC codes.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"434-452"},"PeriodicalIF":0.0,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50426630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Minimum Weight Codewords of PAC Codes: The Impact of Pre-Transformation 关于PAC码的最小权值码字:预变换的影响
Pub Date : 2023-09-11 DOI: 10.1109/JSAIT.2023.3312678
Mohammad Rowshan;Jinhong Yuan
The minimum Hamming distance of a linear block code is the smallest number of bit changes required to transform one valid codeword into another. The code’s minimum distance determines the code’s error-correcting capabilities. Furthermore, The number of minimum weight codewords, a.k.a. error coefficient, gives a good comparative measure for the block error rate (BLER) of linear block codes with identical minimum distance, in particular at a high SNR regime under maximum likelihood (ML) decoding. A code with a smaller error coefficient would give a lower BLER. Unlike polar codes, a closed-form expression for the enumeration of the error coefficient of polarization-adjusted convolutional (PAC) codes is yet unknown. As PAC codes are convolutionally pre-transformed polar codes, we study the impact of pre-transformation on polar codes in terms of minimum Hamming distance and error coefficient by partitioning the codewords into cosets. We show that the minimum distance of PAC codes does not decrease; however, the pre-transformation may reduce the error coefficient depending on the choice of convolutional polynomial. We recognize the properties of the cosets where pre-transformation is ineffective in decreasing the error coefficient, giving a lower bound for the error coefficient. Then, we propose a low-complexity enumeration method that determines the number of minimum weight codewords of PAC codes relying on the error coefficient of polar codes. That is, given the error coefficient ${mathcal {A}}_{w_{min}}$ of polar codes, we determine the reduction $X$ in the error coefficient due to convolutional pre-transformation in PAC coding and subtract it from the error coefficient of polar codes, ${mathcal {A}}_{w_{min}}-X$ . Furthermore, we numerically analyze the tightness of the lower bound and the impact of the choice of the convolutional polynomial on the error coefficient based on the sub-patterns in the polynomial’s coefficients. Eventually, we show how we can further reduce the error coefficient in the cosets.
线性块码的最小汉明距离是将一个有效码字转换为另一个有效的码字所需的最小比特变化数。代码的最小距离决定了代码的纠错能力。此外,最小权重码字的数量,也称为误差系数,对于具有相同最小距离的线性块码的块错误率(BLER),特别是在最大似然(ML)解码下的高SNR状态下,给出了良好的比较度量。具有较小误差系数的代码将给出较低的BLER。与极性码不同,偏振调整卷积码(PAC)的误差系数的枚举的闭合形式表达式尚不清楚。由于PAC码是卷积预变换的极性码,我们通过将码字划分为陪集,从最小汉明距离和误差系数的角度研究了预变换对极性码的影响。我们证明了PAC码的最小距离没有减小;然而,根据卷积多项式的选择,预变换可以降低误差系数。我们认识到陪集的性质,其中预变换在降低误差系数方面是无效的,给出了误差系数的下界。然后,我们提出了一种低复杂度的枚举方法,该方法根据极性码的误差系数来确定PAC码的最小权值码字的数量。也就是说,给定极性码的误差系数${mathcal{A}}_{w_{min}}$,我们确定由于PAC编码中的卷积预变换而导致的误差系数的减少$X$,并将其从极性码误差系数${mathcal{A}}}_{w _{min}}-X$中减去。此外,基于多项式系数中的子模式,我们数值分析了下界的严密性以及卷积多项式的选择对误差系数的影响。最后,我们展示了如何进一步降低陪集中的误差系数。
{"title":"On the Minimum Weight Codewords of PAC Codes: The Impact of Pre-Transformation","authors":"Mohammad Rowshan;Jinhong Yuan","doi":"10.1109/JSAIT.2023.3312678","DOIUrl":"https://doi.org/10.1109/JSAIT.2023.3312678","url":null,"abstract":"The minimum Hamming distance of a linear block code is the smallest number of bit changes required to transform one valid codeword into another. The code’s minimum distance determines the code’s error-correcting capabilities. Furthermore, The number of minimum weight codewords, a.k.a. error coefficient, gives a good comparative measure for the block error rate (BLER) of linear block codes with identical minimum distance, in particular at a high SNR regime under maximum likelihood (ML) decoding. A code with a smaller error coefficient would give a lower BLER. Unlike polar codes, a closed-form expression for the enumeration of the error coefficient of polarization-adjusted convolutional (PAC) codes is yet unknown. As PAC codes are convolutionally pre-transformed polar codes, we study the impact of pre-transformation on polar codes in terms of minimum Hamming distance and error coefficient by partitioning the codewords into cosets. We show that the minimum distance of PAC codes does not decrease; however, the pre-transformation may reduce the error coefficient depending on the choice of convolutional polynomial. We recognize the properties of the cosets where pre-transformation is ineffective in decreasing the error coefficient, giving a lower bound for the error coefficient. Then, we propose a low-complexity enumeration method that determines the number of minimum weight codewords of PAC codes relying on the error coefficient of polar codes. That is, given the error coefficient \u0000<inline-formula> <tex-math>${mathcal {A}}_{w_{min}}$ </tex-math></inline-formula>\u0000 of polar codes, we determine the reduction \u0000<inline-formula> <tex-math>$X$ </tex-math></inline-formula>\u0000 in the error coefficient due to convolutional pre-transformation in PAC coding and subtract it from the error coefficient of polar codes, \u0000<inline-formula> <tex-math>${mathcal {A}}_{w_{min}}-X$ </tex-math></inline-formula>\u0000. Furthermore, we numerically analyze the tightness of the lower bound and the impact of the choice of the convolutional polynomial on the error coefficient based on the sub-patterns in the polynomial’s coefficients. Eventually, we show how we can further reduce the error coefficient in the cosets.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"487-498"},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50426700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securely Aggregated Coded Matrix Inversion 安全聚合编码矩阵反演
Pub Date : 2023-09-08 DOI: 10.1109/JSAIT.2023.3312233
Neophytos Charalambides;Mert Pilanci;Alfred O. Hero
Coded computing is a method for mitigating straggling workers in a centralized computing network, by using erasure-coding techniques. Federated learning is a decentralized model for training data distributed across client devices. In this work we propose approximating the inverse of an aggregated data matrix, where the data is generated by clients; similar to the federated learning paradigm, while also being resilient to stragglers. To do so, we propose a coded computing method based on gradient coding. We modify this method so that the coordinator does not access the local data at any point; while the clients access the aggregated matrix in order to complete their tasks. The network we consider is not centrally administrated, and the communications which take place are secure against potential eavesdroppers.
编码计算是一种通过使用擦除编码技术来减轻集中式计算网络中分散工作的方法。联邦学习是一种分散的模型,用于训练分布在客户机设备上的数据。在这项工作中,我们建议近似汇总数据矩阵的逆,其中数据由客户生成;类似于联邦学习范式,同时也能适应掉队者。为此,我们提出了一种基于梯度编码的编码计算方法。我们修改这个方法,使协调器在任何时候都不访问本地数据;而客户端访问聚合矩阵以完成其任务。我们考虑的网络不是集中管理的,发生的通信是安全的,防止潜在的窃听者。
{"title":"Securely Aggregated Coded Matrix Inversion","authors":"Neophytos Charalambides;Mert Pilanci;Alfred O. Hero","doi":"10.1109/JSAIT.2023.3312233","DOIUrl":"10.1109/JSAIT.2023.3312233","url":null,"abstract":"Coded computing is a method for mitigating straggling workers in a centralized computing network, by using erasure-coding techniques. Federated learning is a decentralized model for training data distributed across client devices. In this work we propose approximating the inverse of an aggregated data matrix, where the data is generated by clients; similar to the federated learning paradigm, while also being resilient to stragglers. To do so, we propose a coded computing method based on gradient coding. We modify this method so that the coordinator does not access the local data at any point; while the clients access the aggregated matrix in order to complete their tasks. The network we consider is not centrally administrated, and the communications which take place are secure against potential eavesdroppers.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"405-419"},"PeriodicalIF":0.0,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46029173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Randomized Polar Codes for Anytime Distributed Machine Learning 随时分布式机器学习的随机极性码
Pub Date : 2023-09-04 DOI: 10.1109/JSAIT.2023.3310931
Burak Bartan;Mert Pilanci
We present a novel distributed computing framework that is robust to slow compute nodes, and is capable of both approximate and exact computation of linear operations. The proposed mechanism integrates the concepts of randomized sketching and polar codes in the context of coded computation. We propose a sequential decoding algorithm designed to handle real valued data while maintaining low computational complexity for recovery. Additionally, we provide an anytime estimator that can generate provably accurate estimates even when the set of available node outputs is not decodable. We demonstrate the potential applications of this framework in various contexts, such as large-scale matrix multiplication and black-box optimization. We present the implementation of these methods on a serverless cloud computing system and provide numerical results to demonstrate their scalability in practice, including ImageNet scale computations.
我们提出了一种新的分布式计算框架,该框架对慢速计算节点具有鲁棒性,并且能够对线性运算进行近似和精确计算。所提出的机制在编码计算的背景下集成了随机绘制和极性代码的概念。我们提出了一种顺序解码算法,旨在处理实值数据,同时保持较低的恢复计算复杂度。此外,我们提供了一种随时估计器,即使在可用节点输出集不可解码的情况下,该估计器也可以生成可证明的精确估计。我们展示了该框架在各种环境中的潜在应用,如大规模矩阵乘法和黑盒优化。我们介绍了这些方法在无服务器云计算系统上的实现,并提供了数值结果来证明它们在实践中的可扩展性,包括ImageNet规模的计算。
{"title":"Randomized Polar Codes for Anytime Distributed Machine Learning","authors":"Burak Bartan;Mert Pilanci","doi":"10.1109/JSAIT.2023.3310931","DOIUrl":"10.1109/JSAIT.2023.3310931","url":null,"abstract":"We present a novel distributed computing framework that is robust to slow compute nodes, and is capable of both approximate and exact computation of linear operations. The proposed mechanism integrates the concepts of randomized sketching and polar codes in the context of coded computation. We propose a sequential decoding algorithm designed to handle real valued data while maintaining low computational complexity for recovery. Additionally, we provide an anytime estimator that can generate provably accurate estimates even when the set of available node outputs is not decodable. We demonstrate the potential applications of this framework in various contexts, such as large-scale matrix multiplication and black-box optimization. We present the implementation of these methods on a serverless cloud computing system and provide numerical results to demonstrate their scalability in practice, including ImageNet scale computations.","PeriodicalId":73295,"journal":{"name":"IEEE journal on selected areas in information theory","volume":"4 ","pages":"393-404"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43691019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE journal on selected areas in information theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1