首页 > 最新文献

Array最新文献

英文 中文
Real-time risk assessment of road vehicles based on inverse perspective mapping 基于反透视映射的道路车辆实时风险评估
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-31 DOI: 10.1016/j.array.2023.100325
Qin Shi , Yan Chen , Haoxiang Liang

Pan/Tilt/Zoom (PTZ) cameras play an important role in traffic scenes due to their wide monitoring fields and high flexibility. However, since the focal length and angle of PTZ cameras change irregularly with the monitoring needs, it is difficult to obtain accurate physical information about the real world from the image information of PTZ cameras. Aiming to address the need for real-time risk assessment of road vehicles in traffic monitoring scenarios, a vehicle position and velocity measurement scheme based on camera inverse perspective transformation is proposed, along with a method for real-time risk assessment based on the position and velocity. Specifically, Firstly, the vehicle target in the video is detected and tracked by deep learning YOLO detection algorithm and optical flow tracking algorithm. According to the obtained trajectory set, the vanishing points in the road direction are calculated by Cascade Hough Transform and the road marking lines are detected. Then, according to the vanishing point and marking line, the camera calibration task is accomplished via exploratory focal length. After camera calibration, the camera-to-road inverse perspective transformation is applied to project the image plane onto the road surface and obtain, the actual position information of vehicles. Finally, the vehicle speed measurement and real-time road risk assessment are achieved by calculating the average of instantaneous velocities across multiple frames. Simulation experiment results in a traffic monitoring scenario demonstrate that this perspective-based method for real-time road vehicle risk assessment achieves good stability and practicality, which meets the requirements for vehicle speed measurement and real-time road risk assessment.

平移/倾斜/变焦(PTZ)摄像机以其广泛的监控领域和高度的灵活性在交通场景中发挥着重要作用。然而,由于PTZ摄像机的焦距和角度会随着监控需求的变化而发生不规则的变化,因此很难从PTZ摄像机的图像信息中获得真实世界的准确物理信息。针对交通监控场景下道路车辆实时风险评估的需求,提出了一种基于摄像头反视角变换的车辆位置和速度测量方案,以及基于位置和速度的实时风险评估方法。具体而言,首先采用深度学习YOLO检测算法和光流跟踪算法对视频中的车辆目标进行检测和跟踪;根据得到的轨迹集,利用Cascade Hough变换计算道路方向上的消失点,检测道路标记线。然后,根据消失点和标记线,通过探索焦距完成摄像机标定任务。摄像机标定后,应用摄像机到道路的逆透视变换,将图像平面投影到路面上,得到车辆的实际位置信息。最后,通过计算多帧瞬时速度的平均值,实现车辆速度测量和实时道路风险评估。交通监控场景的仿真实验结果表明,基于视角的道路车辆实时风险评估方法具有良好的稳定性和实用性,满足了车辆测速和实时道路风险评估的要求。
{"title":"Real-time risk assessment of road vehicles based on inverse perspective mapping","authors":"Qin Shi ,&nbsp;Yan Chen ,&nbsp;Haoxiang Liang","doi":"10.1016/j.array.2023.100325","DOIUrl":"https://doi.org/10.1016/j.array.2023.100325","url":null,"abstract":"<div><p>Pan/Tilt/Zoom (PTZ) cameras play an important role in traffic scenes due to their wide monitoring fields and high flexibility. However, since the focal length and angle of PTZ cameras change irregularly with the monitoring needs, it is difficult to obtain accurate physical information about the real world from the image information of PTZ cameras. Aiming to address the need for real-time risk assessment of road vehicles in traffic monitoring scenarios, a vehicle position and velocity measurement scheme based on camera inverse perspective transformation is proposed, along with a method for real-time risk assessment based on the position and velocity. Specifically, Firstly, the vehicle target in the video is detected and tracked by deep learning YOLO detection algorithm and optical flow tracking algorithm. According to the obtained trajectory set, the vanishing points in the road direction are calculated by Cascade Hough Transform and the road marking lines are detected. Then, according to the vanishing point and marking line, the camera calibration task is accomplished via exploratory focal length. After camera calibration, the camera-to-road inverse perspective transformation is applied to project the image plane onto the road surface and obtain, the actual position information of vehicles. Finally, the vehicle speed measurement and real-time road risk assessment are achieved by calculating the average of instantaneous velocities across multiple frames. Simulation experiment results in a traffic monitoring scenario demonstrate that this perspective-based method for real-time road vehicle risk assessment achieves good stability and practicality, which meets the requirements for vehicle speed measurement and real-time road risk assessment.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100325"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000504/pdfft?md5=603e38f95b92deff16c80d0971d0ed44&pid=1-s2.0-S2590005623000504-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138086804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A CNN based multifaceted signal processing framework for heart rate proctoring using Millimeter wave radar ballistocardiography 一种基于CNN的多层信号处理框架,用于毫米波雷达弹道心动图的心率监测
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-28 DOI: 10.1016/j.array.2023.100327
Rafid Umayer Murshed , Md. Abrar Istiak , Md. Toufiqur Rahman , Zulqarnain Bin Ashraf , Md. Saheed Ullah , Mohammad Saquib

The recent pandemic has refocused the medical world’s attention on the diagnostic techniques associated with cardiovascular disease. Heart rate provides a real-time snapshot of cardiovascular health. A more precise heart rate reading enables a better understanding of cardiac muscle activity. Although many existing diagnostic techniques are approaching the limits of perfection, there remains potential for further development. In this paper, we propose MIBINET, a novel multifaceted approach for real-time proctoring of heart rate from Millimeter wave (mm-wave) radar ballistocardiography signals via inter-beat-interval (IBI) using a convolutional neural NETwork (CNN). The central theme of our approach is to synergize the feature extraction capabilities of CNN with novel signal processing techniques, resulting in enhanced estimation accuracy while simultaneously reducing computational complexity. This proposed network can be used in hospitals, homes, and passenger vehicles due to its lightweight and contactless properties. It employs classical signal processing prior to fitting the data into the network. Although MIBINET is primarily designed to work on mm-wave signals, it is found equally effective on signals of various modalities such as PCG, ECG, and PPG. Our approach outperforms state-of-the-art techniques by more than 5% in inter-beat-interval (IBI) estimation accuracy. The architecture achieves a 98.73% correlation coefficient and a 20.69 ms Root-Mean-Square Error (RMSE) over 11 different test subjects. The paper contributes by being the first to apply CNN-based feature extraction in concert with unique signal processing strategies to mm-wave radar data for heart rate monitoring. Our methodology also introduces a synthetic IBI augmentation technique, custom loss function, and novel post-processing methods, all contributing to the robust performance of the model in various settings and modalities.

最近的大流行使医学界的注意力重新集中在与心血管疾病相关的诊断技术上。心率提供了心血管健康的实时快照。更精确的心率读数可以更好地了解心肌活动。虽然许多现有的诊断技术正在接近完美的极限,但仍有进一步发展的潜力。在本文中,我们提出了MIBINET,这是一种利用卷积神经网络(CNN)通过心跳间隔(IBI)从毫米波(mm-wave)雷达弹道心动图信号实时监测心率的新方法。我们的方法的中心主题是将CNN的特征提取能力与新的信号处理技术相结合,从而提高估计精度,同时降低计算复杂度。由于其轻量化和非接触式特性,该网络可用于医院、家庭和乘用车。在将数据拟合到网络之前,它采用经典的信号处理。虽然MIBINET主要设计用于毫米波信号,但它对各种模式的信号(如PCG, ECG和PPG)同样有效。我们的方法比最先进的技术在间歇(IBI)估计精度上高出5%以上。该架构在11个不同的测试对象上实现了98.73%的相关系数和20.69 ms的均方根误差(RMSE)。本文的贡献在于首次将基于cnn的特征提取与独特的信号处理策略应用于毫米波雷达数据的心率监测。我们的方法还引入了一种合成的IBI增强技术、自定义损失函数和新的后处理方法,所有这些都有助于模型在各种设置和模式下的鲁棒性能。
{"title":"A CNN based multifaceted signal processing framework for heart rate proctoring using Millimeter wave radar ballistocardiography","authors":"Rafid Umayer Murshed ,&nbsp;Md. Abrar Istiak ,&nbsp;Md. Toufiqur Rahman ,&nbsp;Zulqarnain Bin Ashraf ,&nbsp;Md. Saheed Ullah ,&nbsp;Mohammad Saquib","doi":"10.1016/j.array.2023.100327","DOIUrl":"https://doi.org/10.1016/j.array.2023.100327","url":null,"abstract":"<div><p>The recent pandemic has refocused the medical world’s attention on the diagnostic techniques associated with cardiovascular disease. Heart rate provides a real-time snapshot of cardiovascular health. A more precise heart rate reading enables a better understanding of cardiac muscle activity. Although many existing diagnostic techniques are approaching the limits of perfection, there remains potential for further development. In this paper, we propose MIBINET, a novel multifaceted approach for real-time proctoring of heart rate from <strong>M</strong>illimeter wave (mm-wave) radar ballistocardiography signals via inter-beat-interval (<strong>IBI</strong>) using a convolutional neural <strong>NET</strong>work (CNN). The central theme of our approach is to synergize the feature extraction capabilities of CNN with novel signal processing techniques, resulting in enhanced estimation accuracy while simultaneously reducing computational complexity. This proposed network can be used in hospitals, homes, and passenger vehicles due to its lightweight and contactless properties. It employs classical signal processing prior to fitting the data into the network. Although MIBINET is primarily designed to work on mm-wave signals, it is found equally effective on signals of various modalities such as PCG, ECG, and PPG. Our approach outperforms state-of-the-art techniques by more than 5% in inter-beat-interval (IBI) estimation accuracy. The architecture achieves a 98.73% correlation coefficient and a 20.69 ms Root-Mean-Square Error (RMSE) over 11 different test subjects. The paper contributes by being the first to apply CNN-based feature extraction in concert with unique signal processing strategies to mm-wave radar data for heart rate monitoring. Our methodology also introduces a synthetic IBI augmentation technique, custom loss function, and novel post-processing methods, all contributing to the robust performance of the model in various settings and modalities.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100327"},"PeriodicalIF":0.0,"publicationDate":"2023-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2590005623000528/pdfft?md5=1ee5b581501a206bfdef0f20bd9711c6&pid=1-s2.0-S2590005623000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138087190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient perturbation techniques for preserving privacy of multivariate sensitive data 保护多变量敏感数据隐私的有效摄动技术
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-06 DOI: 10.1016/j.array.2023.100324
Mahbubur Rahman, Mahit Kumar Paul, A.H.M. Sarowar Sattar

Cloud data is increasing significantly recently because of the advancement of technology which can contain individuals’ sensitive information, such as medical diagnostics reports. While deriving knowledge from such sensitive data, different third party can get their hands on this sensitive information. Therefore, privacy preservation of such sensitive data has become a vital issue. Data perturbation is one of the most often used data mining approaches for safeguarding privacy. A significant challenge in data perturbation is balancing the privacy and utility of data. Securing an individual’s privacy often entails the forfeiture of the data utility, and the contrary is true. Though there exist several approaches to deal with the trade-off between privacy and utility, researchers are always looking for new approaches. In order to address this critical issue, this paper proposes two data perturbation approaches namely NOS2R and NOS2R2. The proposed perturbation techniques are experimented with over ten benchmark UCI data set for analyzing privacy protection, information entropy, attack resistance, data utility, and classification error. The proposed approaches are compared with two existing approaches 3DRT and NRoReM. The thorough experimental analysis exhibits that the best-performing approach NOS2R2 offers 15.48% higher entropy and 15.53% more resistance against ICA attack compared to the best existing approach NRoReM. Furthermore, in terms of utility, the accuracy, f1-score, precision and recall of NOS2R2 perturbed data are 42.32%, 31.22%, 30.77% and 16.15% more close to the original data respectively than the NRoReM perturbed data.

由于技术的进步,云数据最近显著增加,这些技术可以包含个人的敏感信息,如医疗诊断报告。在从这些敏感数据中获取知识的同时,不同的第三方可以获得这些敏感信息。因此,保护此类敏感数据的隐私已成为一个至关重要的问题。数据扰动是保护隐私最常用的数据挖掘方法之一。数据扰动中的一个重大挑战是平衡数据的隐私性和实用性。保护个人隐私往往意味着数据实用程序的丧失,而事实恰恰相反。尽管有几种方法可以处理隐私和效用之间的权衡,但研究人员总是在寻找新的方法。为了解决这一关键问题,本文提出了两种数据扰动方法,即NOS2R和NOS2R2。所提出的扰动技术在十多个基准UCI数据集上进行了实验,用于分析隐私保护、信息熵、抗攻击性、数据效用和分类误差。将所提出的方法与现有的两种方法3DRT和NRoReM进行了比较。全面的实验分析表明,与现有的最佳方法NRoReM相比,性能最佳的方法NOS2R2提供了15.48%的熵和15.53%的抗ICA攻击能力。此外,在效用方面,NOS2R2扰动数据的准确度、f1得分、准确度和召回率分别比NRoReM扰动数据接近原始数据42.32%、31.22%、30.77%和16.15%。
{"title":"Efficient perturbation techniques for preserving privacy of multivariate sensitive data","authors":"Mahbubur Rahman,&nbsp;Mahit Kumar Paul,&nbsp;A.H.M. Sarowar Sattar","doi":"10.1016/j.array.2023.100324","DOIUrl":"https://doi.org/10.1016/j.array.2023.100324","url":null,"abstract":"<div><p>Cloud data is increasing significantly recently because of the advancement of technology which can contain individuals’ sensitive information, such as medical diagnostics reports. While deriving knowledge from such sensitive data, different third party can get their hands on this sensitive information. Therefore, privacy preservation of such sensitive data has become a vital issue. Data perturbation is one of the most often used data mining approaches for safeguarding privacy. A significant challenge in data perturbation is balancing the privacy and utility of data. Securing an individual’s privacy often entails the forfeiture of the data utility, and the contrary is true. Though there exist several approaches to deal with the trade-off between privacy and utility, researchers are always looking for new approaches. In order to address this critical issue, this paper proposes two data perturbation approaches namely NOS2R and NOS2R2. The proposed perturbation techniques are experimented with over ten benchmark UCI data set for analyzing privacy protection, information entropy, attack resistance, data utility, and classification error. The proposed approaches are compared with two existing approaches 3DRT and NRoReM. The thorough experimental analysis exhibits that the best-performing approach NOS2R2 offers 15.48% higher entropy and 15.53% more resistance against ICA attack compared to the best existing approach NRoReM. Furthermore, in terms of utility, the accuracy, f1-score, precision and recall of NOS2R2 perturbed data are 42.32%, 31.22%, 30.77% and 16.15% more close to the original data respectively than the NRoReM perturbed data.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100324"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in spiking neural network communication and synchronization techniques for event-driven neuromorphic systems 事件驱动神经形态系统的脉冲神经网络通信与同步技术研究进展
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-05 DOI: 10.1016/j.array.2023.100323
Mahyar Shahsavari , David Thomas , Marcel van Gerven , Andrew Brown , Wayne Luk

Neuromorphic event-driven systems emulate the computational mechanisms of the brain through the utilization of spiking neural networks (SNN). Neuromorphic systems serve two primary application domains: simulating neural information processing in neuroscience and acting as accelerators for cognitive computing in engineering applications. A distinguishing characteristic of neuromorphic systems is their asynchronous or event-driven nature, but even event-driven systems require some synchronous time management of the neuron populations to guarantee sufficient time for the proper delivery of spiking messages. In this study, we assess three distinct algorithms proposed for adding a synchronization capability to asynchronous event-driven compute systems. We run these algorithms on POETS (Partially Ordered Event-Triggered Systems), a custom-built FPGA-based hardware platform, as a neuromorphic architecture. This study presents the simulation speed of SNNs of various sizes. We explore essential aspects of event-driven neuromorphic system design that contribute to efficient computation and communication. These aspects include varying degrees of connectivity, routing methods, mapping techniques onto hardware components, and firing rates. The hardware mapping and simulation of up to eight million neurons, where each neuron is connected to up to one thousand other neurons, are presented in this work using 3072 reconfigurable processing cores, each of which has 16 hardware threads. Using the best synchronization and communication methods, our architecture design demonstrates 20-fold and 16-fold speedups over the Brian simulator and one 48-chip SpiNNaker node, respectively. We conclude with a brief comparison between our platform and existing large-scale neuromorphic systems in terms of synchronization, routing, and communication methods, to guide the development of future event-driven neuromorphic systems.

神经形态事件驱动系统通过利用尖峰神经网络(SNN)来模拟大脑的计算机制。神经形态系统有两个主要应用领域:在神经科学中模拟神经信息处理和在工程应用中充当认知计算的加速器。神经形态系统的一个显著特征是其异步或事件驱动的性质,但即使是事件驱动的系统也需要对神经元群体进行一些同步的时间管理,以确保有足够的时间来正确传递尖峰信息。在这项研究中,我们评估了为异步事件驱动计算系统添加同步功能而提出的三种不同算法。我们在POETS(部分有序事件触发系统)上运行这些算法,POETS是一个定制的基于FPGA的硬件平台,作为一种神经形态架构。本研究展示了不同大小SNN的模拟速度。我们探索了事件驱动的神经形态系统设计的基本方面,这些方面有助于高效的计算和通信。这些方面包括不同程度的连接、路由方法、到硬件组件的映射技术以及发射率。这项工作使用3072个可重新配置的处理核心,每个处理核心有16个硬件线程,对多达800万个神经元进行了硬件映射和模拟,每个神经元与多达1000个其他神经元相连。使用最佳的同步和通信方法,我们的架构设计分别比Brian模拟器和一个48芯片SpiNNaker节点实现了20倍和16倍的加速。最后,我们在同步、路由和通信方法方面将我们的平台与现有的大型神经形态系统进行了简要比较,以指导未来事件驱动的神经形态系统的发展。
{"title":"Advancements in spiking neural network communication and synchronization techniques for event-driven neuromorphic systems","authors":"Mahyar Shahsavari ,&nbsp;David Thomas ,&nbsp;Marcel van Gerven ,&nbsp;Andrew Brown ,&nbsp;Wayne Luk","doi":"10.1016/j.array.2023.100323","DOIUrl":"https://doi.org/10.1016/j.array.2023.100323","url":null,"abstract":"<div><p>Neuromorphic event-driven systems emulate the computational mechanisms of the brain through the utilization of spiking neural networks (SNN). Neuromorphic systems serve two primary application domains: simulating neural information processing in neuroscience and acting as accelerators for cognitive computing in engineering applications. A distinguishing characteristic of neuromorphic systems is their asynchronous or event-driven nature, but even event-driven systems require some synchronous time management of the neuron populations to guarantee sufficient time for the proper delivery of spiking messages. In this study, we assess three distinct algorithms proposed for adding a synchronization capability to asynchronous event-driven compute systems. We run these algorithms on <em>POETS (Partially Ordered Event-Triggered Systems)</em>, a custom-built FPGA-based hardware platform, as a neuromorphic architecture. This study presents the simulation speed of SNNs of various sizes. We explore essential aspects of event-driven neuromorphic system design that contribute to efficient computation and communication. These aspects include varying degrees of connectivity, routing methods, mapping techniques onto hardware components, and firing rates. The hardware mapping and simulation of up to eight million neurons, where each neuron is connected to up to one thousand other neurons, are presented in this work using 3072 reconfigurable processing cores, each of which has 16 hardware threads. Using the best synchronization and communication methods, our architecture design demonstrates 20-fold and 16-fold speedups over the Brian simulator and one 48-chip SpiNNaker node, respectively. We conclude with a brief comparison between our platform and existing large-scale neuromorphic systems in terms of synchronization, routing, and communication methods, to guide the development of future event-driven neuromorphic systems.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100323"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extractive social media text summarization based on MFMMR-BertSum 基于MFMMR-BertSum的提取社交媒体文本摘要
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-04 DOI: 10.1016/j.array.2023.100322
Junqing Fan , Xiaorong Tian , Chengyao Lv , Simin Zhang , Yuewei Wang , Junfeng Zhang

The advancement of computer technology has led to an overwhelming amount of textual information, hindering the efficiency of knowledge intake. To address this issue, various text summarization techniques have been developed, including statistics, graph sorting, machine learning, and deep learning. However, the rich semantic features of text often interfere with the abstract effects and lack effective processing of redundant information. In this paper, we propose the Multi-Features Maximal Marginal Relevance BERT (MFMMR-BertSum) model for Extractive Summarization, which utilizes the pre-trained model BERT to tackle the text summarization task. The model incorporates a classification layer for extractive summarization. Additionally, the Maximal Marginal Relevance (MMR) component is utilized to remove information redundancy and optimize the summary results. The proposed method outperforms other sentence-level extractive summarization baseline methods on the CNN/DailyMail dataset, thus verifying its effectiveness.

计算机技术的进步导致了大量的文本信息,阻碍了知识获取的效率。为了解决这个问题,已经开发了各种文本摘要技术,包括统计、图形排序、机器学习和深度学习。然而,文本丰富的语义特征往往会干扰抽象效果,缺乏对冗余信息的有效处理。在本文中,我们提出了用于提取摘要的多特征最大边际相关BERT(MFMMR-BertSum)模型,该模型利用预先训练的模型BERT来处理文本摘要任务。该模型结合了一个用于提取摘要的分类层。此外,最大边际相关性(MMR)组件用于消除信息冗余并优化汇总结果。在CNN/DaylyMail数据集上,该方法优于其他句子级提取摘要基线方法,从而验证了其有效性。
{"title":"Extractive social media text summarization based on MFMMR-BertSum","authors":"Junqing Fan ,&nbsp;Xiaorong Tian ,&nbsp;Chengyao Lv ,&nbsp;Simin Zhang ,&nbsp;Yuewei Wang ,&nbsp;Junfeng Zhang","doi":"10.1016/j.array.2023.100322","DOIUrl":"https://doi.org/10.1016/j.array.2023.100322","url":null,"abstract":"<div><p>The advancement of computer technology has led to an overwhelming amount of textual information, hindering the efficiency of knowledge intake. To address this issue, various text summarization techniques have been developed, including statistics, graph sorting, machine learning, and deep learning. However, the rich semantic features of text often interfere with the abstract effects and lack effective processing of redundant information. In this paper, we propose the Multi-Features Maximal Marginal Relevance BERT (MFMMR-BertSum) model for Extractive Summarization, which utilizes the pre-trained model BERT to tackle the text summarization task. The model incorporates a classification layer for extractive summarization. Additionally, the Maximal Marginal Relevance (MMR) component is utilized to remove information redundancy and optimize the summary results. The proposed method outperforms other sentence-level extractive summarization baseline methods on the CNN/DailyMail dataset, thus verifying its effectiveness.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100322"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49750419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Learning remaining useful life with incomplete health information: A case study on battery deterioration assessment 使用不完整的健康信息了解剩余使用寿命:电池劣化评估案例研究
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-29 DOI: 10.1016/j.array.2023.100321
Luciano Sánchez , Nahuel Costa , José Otero , David Anseán , Inés Couso

This study proposes a method for developing equipment lifespan estimators that combine physical information and numerical data, both of which may be incomplete. Physical information may not have a uniform fit to all experimental data, and health information may only be available at the initial and final periods. To address these issues, a procedure is defined to adjust the model to different subsets of available data, constrained by feasible trajectories in the health status space. Additionally, a new health model for rechargeable lithium batteries is proposed, and a use case is presented to demonstrate its efficacy. The optimistic (max–max) strategy is found to be the most suitable for diagnosing battery lifetime, based on the results.

这项研究提出了一种开发设备寿命估算器的方法,该方法结合了物理信息和数值数据,这两种数据可能都是不完整的。身体信息可能不适合所有实验数据,健康信息可能只在最初和最后阶段可用。为了解决这些问题,定义了一个程序,以根据可用数据的不同子集调整模型,并受健康状态空间中可行轨迹的约束。此外,还提出了一种新的可充电锂电池健康模型,并给出了一个用例来证明其有效性。根据研究结果,乐观(最大-最大)策略被认为是最适合诊断电池寿命的策略。
{"title":"Learning remaining useful life with incomplete health information: A case study on battery deterioration assessment","authors":"Luciano Sánchez ,&nbsp;Nahuel Costa ,&nbsp;José Otero ,&nbsp;David Anseán ,&nbsp;Inés Couso","doi":"10.1016/j.array.2023.100321","DOIUrl":"https://doi.org/10.1016/j.array.2023.100321","url":null,"abstract":"<div><p>This study proposes a method for developing equipment lifespan estimators that combine physical information and numerical data, both of which may be incomplete. Physical information may not have a uniform fit to all experimental data, and health information may only be available at the initial and final periods. To address these issues, a procedure is defined to adjust the model to different subsets of available data, constrained by feasible trajectories in the health status space. Additionally, a new health model for rechargeable lithium batteries is proposed, and a use case is presented to demonstrate its efficacy. The optimistic (max–max) strategy is found to be the most suitable for diagnosing battery lifetime, based on the results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"20 ","pages":"Article 100321"},"PeriodicalIF":0.0,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49765441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The study of the hyper-parameter modelling the decision rule of the cautious classifiers based on the Fβ measure 基于Fβ测度的谨慎分类器决策规则的超参数建模研究
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-01 DOI: 10.1016/j.array.2023.100310
Abdelhak Imoussaten

In some sensitive domains where data imperfections are present, standard classification techniques reach their limits. To avoid misclassifications that have serious consequences, recent works propose cautious classification algorithms to handle this problem. Despite of the presence of uncertainty and/or imprecision, a point prediction classifier is forced to bet on a single class. While a cautious classifier proposes the appropriate subset of candidate classes that can be assigned to the sample in the presence of imperfect information. On the other hand, cautiousness should not be at the expense of precision and a trade-off has to be made between these two criteria. Among the existing cautious classifiers, two classifiers propose to manage this trade-off in the decision step by the mean of a parametrized objective function. The first one is the non-deterministic classifier (ndc) proposed within the framework of probability theory and the second one is “evidential classifier based on imprecise relabelling” (eclair) proposed within the framework of belief functions. The theoretical aim of the mentioned hyper-parameters is to control the size of predictions for both classifiers. This paper proposes to study this hyper-parameter in order to select the “best” value in a classification task. First the utility for each candidate subset is studied related to the values of the hyper-parameter and some thresholds are proposed to control the size of the predictions. Then two illustrations are proposed where a method to choose this hyper-parameters based on the calibration data is proposed. The first illustration concerns randomly generated data and the second one concerns the images data of fashion mnist. These illustrations show how to control the size of the predictions and give a comparison between the performances of the two classifiers for a tuning based on our proposition and the one based on grid search method.

在一些存在数据缺陷的敏感领域,标准分类技术达到了极限。为了避免产生严重后果的错误分类,最近的工作提出了谨慎的分类算法来处理这个问题。尽管存在不确定性和/或不精确性,点预测分类器还是被迫将赌注押在单个类别上。而谨慎的分类器提出了在存在不完美信息的情况下可以分配给样本的候选类的适当子集。另一方面,谨慎不应以牺牲准确性为代价,必须在这两个标准之间进行权衡。在现有的谨慎分类器中,有两个分类器提出通过参数化的目标函数来管理决策步骤中的这种权衡。第一种是在概率论框架内提出的非确定性分类器(ndc),第二种是在置信函数框架下提出的“基于不精确重新标记的证据分类器”(eclair)。上述超参数的理论目的是控制两个分类器的预测大小。本文提出研究这个超参数,以便在分类任务中选择“最佳”值。首先,研究了每个候选子集与超参数值相关的效用,并提出了一些阈值来控制预测的大小。然后给出了两个例子,其中提出了一种基于校准数据选择该超参数的方法。第一个图示涉及随机生成的数据,第二个图示涉及时尚mnist的图像数据。这些插图展示了如何控制预测的大小,并比较了基于我们的命题和基于网格搜索方法的两个分类器的性能。
{"title":"The study of the hyper-parameter modelling the decision rule of the cautious classifiers based on the Fβ measure","authors":"Abdelhak Imoussaten","doi":"10.1016/j.array.2023.100310","DOIUrl":"https://doi.org/10.1016/j.array.2023.100310","url":null,"abstract":"<div><p>In some sensitive domains where data imperfections are present, standard classification techniques reach their limits. To avoid misclassifications that have serious consequences, recent works propose cautious classification algorithms to handle this problem. Despite of the presence of uncertainty and/or imprecision, a point prediction classifier is forced to bet on a single class. While a cautious classifier proposes the appropriate subset of candidate classes that can be assigned to the sample in the presence of imperfect information. On the other hand, cautiousness should not be at the expense of precision and a trade-off has to be made between these two criteria. Among the existing cautious classifiers, two classifiers propose to manage this trade-off in the decision step by the mean of a parametrized objective function. The first one is the non-deterministic classifier (ndc) proposed within the framework of probability theory and the second one is “evidential classifier based on imprecise relabelling” (eclair) proposed within the framework of belief functions. The theoretical aim of the mentioned hyper-parameters is to control the size of predictions for both classifiers. This paper proposes to study this hyper-parameter in order to select the “best” value in a classification task. First the utility for each candidate subset is studied related to the values of the hyper-parameter and some thresholds are proposed to control the size of the predictions. Then two illustrations are proposed where a method to choose this hyper-parameters based on the calibration data is proposed. The first illustration concerns randomly generated data and the second one concerns the images data of fashion mnist. These illustrations show how to control the size of the predictions and give a comparison between the performances of the two classifiers for a tuning based on our proposition and the one based on grid search method.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100310"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SSFuzzyART: A Semi-Supervised Fuzzy ART through seeding initialization and a clustered data generation algorithm to deeply study clustering solutions SSFuzyART:一种通过种子初始化的半监督模糊ART和聚类数据生成算法来深入研究聚类解决方案
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-01 DOI: 10.1016/j.array.2023.100319
Siwar Jendoubi, Aurélien Baelde, Thong Tran

Semi-supervised clustering is a machine learning technique that was introduced to boost clustering performance when labeled data is available. Indeed, some labeled data are usually available in real use cases, and can be used to initialize the clustering process to guide it and to make it more efficient. Fuzzy ART is a clustering technique that is proved to be efficient in several real cases, but as an unsupervised algorithm, it cannot use available labeled data. This paper introduces a semi-supervised variant of the FuzzyART clustering algorithm (SSFuzzyART). The proposed solution uses the available labeled data to initialize clusters centers. In another hand, to deeply evaluate the characteristics of the proposed algorithm, a clustered binary data generation algorithm with controlled partitioning is also introduced in this paper. Indeed, the controlled generated clusters allows studying the characteristics of the proposed SSFuzzyART. Furthermore, a set of experiments is carried out on some available benchmarks. SSFuzzyART demonstrated better clustering prediction results than its classic counterpart.

半监督聚类是一种机器学习技术,用于在标记数据可用时提高聚类性能。事实上,一些标记的数据通常在实际用例中是可用的,并且可以用于初始化集群过程,以指导它并使它更高效。模糊ART是一种聚类技术,在一些实际情况下被证明是有效的,但作为一种无监督算法,它不能使用可用的标记数据。本文介绍了FuzzyART聚类算法的一个半监督变体(SSFuzzyART)。所提出的解决方案使用可用的标记数据来初始化集群中心。另一方面,为了深入评估该算法的特点,本文还介绍了一种具有控制分区的聚类二进制数据生成算法。事实上,受控生成的簇允许研究所提出的SSFuzyART的特性。此外,还在一些可用的基准上进行了一系列实验。SSFuzyART的聚类预测结果优于传统的聚类预测方法。
{"title":"SSFuzzyART: A Semi-Supervised Fuzzy ART through seeding initialization and a clustered data generation algorithm to deeply study clustering solutions","authors":"Siwar Jendoubi,&nbsp;Aurélien Baelde,&nbsp;Thong Tran","doi":"10.1016/j.array.2023.100319","DOIUrl":"https://doi.org/10.1016/j.array.2023.100319","url":null,"abstract":"<div><p>Semi-supervised clustering is a machine learning technique that was introduced to boost clustering performance when labeled data is available. Indeed, some labeled data are usually available in real use cases, and can be used to initialize the clustering process to guide it and to make it more efficient. Fuzzy ART is a clustering technique that is proved to be efficient in several real cases, but as an unsupervised algorithm, it cannot use available labeled data. This paper introduces a semi-supervised variant of the FuzzyART clustering algorithm (SSFuzzyART). The proposed solution uses the available labeled data to initialize clusters centers. In another hand, to deeply evaluate the characteristics of the proposed algorithm, a clustered binary data generation algorithm with controlled partitioning is also introduced in this paper. Indeed, the controlled generated clusters allows studying the characteristics of the proposed SSFuzzyART. Furthermore, a set of experiments is carried out on some available benchmarks. SSFuzzyART demonstrated better clustering prediction results than its classic counterpart.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100319"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors 非对称性能多核处理器上偷工特征并行程序的性能评价
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-01 DOI: 10.1016/j.array.2023.100311
Adnan

The speed difference between high-performance CPUs and energy-efficient CPUs, which are found in asymmetric performance multicore processors, affects the current form of Amdahl’s law equation. This paper proposes two updates to that equation based on the performance evaluation results of a simple parallel pi program written with OpenCilk. Performance evaluation was done by measuring execution time and instructions per cycle (IPC). The performance evaluation of the parallel program executed on the Intel Core i5 1240P processor did not indicate decreased performance due to asymmetric performance. Instead, the program with efficient work-stealing advantages from OpenCilk performed well. In the case of using the execution time of the P-CPU as a reference to obtain speedup, the evaluation results in a sublinear speedup. Conversely, in the case of using the execution time of the E-CPU as a reference, the evaluation results in a superlinear speedup. This paper proposes two updates to Amdahl’s law equation based on these two evaluation results.

在非对称性能多核处理器中发现的高性能CPU和节能CPU之间的速度差异影响了Amdahl定律方程的当前形式。本文根据用OpenCilk编写的一个简单并行pi程序的性能评估结果,对该方程提出了两种更新。通过测量每个周期的执行时间和指令(IPC)来进行性能评估。在英特尔酷睿i5 1240P处理器上执行的并行程序的性能评估没有表明性能由于不对称而降低。相反,具有高效工作窃取OpenCilk优势的程序表现良好。在使用P-CPU的执行时间作为获得加速的参考的情况下,评估结果是次线性加速。相反,在使用E-CPU的执行时间作为参考的情况下,评估结果是超线性加速。基于这两个评价结果,本文对Amdahl定律方程提出了两个更新。
{"title":"Performance evaluation on work-stealing featured parallel programs on asymmetric performance multicore processors","authors":"Adnan","doi":"10.1016/j.array.2023.100311","DOIUrl":"https://doi.org/10.1016/j.array.2023.100311","url":null,"abstract":"<div><p>The speed difference between high-performance CPUs and energy-efficient CPUs, which are found in asymmetric performance multicore processors, affects the current form of Amdahl’s law equation. This paper proposes two updates to that equation based on the performance evaluation results of a simple parallel pi program written with OpenCilk. Performance evaluation was done by measuring execution time and instructions per cycle (IPC). The performance evaluation of the parallel program executed on the Intel Core i5 1240P processor did not indicate decreased performance due to asymmetric performance. Instead, the program with efficient work-stealing advantages from OpenCilk performed well. In the case of using the execution time of the P-CPU as a reference to obtain speedup, the evaluation results in a sublinear speedup. Conversely, in the case of using the execution time of the E-CPU as a reference, the evaluation results in a superlinear speedup. This paper proposes two updates to Amdahl’s law equation based on these two evaluation results.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100311"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49759091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiple robust approaches for EEG-based driving fatigue detection and classification 基于脑电的驾驶疲劳检测与分类的多种鲁棒方法
Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-09-01 DOI: 10.1016/j.array.2023.100320
Sunil Kumar Prabhakar, Dong-Ok Won

Electroencephalography (EEG) signals are used to evaluate the activities of the brain. For the accidents occurring on the road, one of the primary reasons is driver fatigueness and it can be easily identified by the EEG. In this work, five efficient and robust approaches for the EEG-based driving fatigue detection and classification are proposed. In the first proposed strategy, the concept of Multi-Dimensional Scaling (MDS) and Singular Value Decomposition (SVD) are merged and then the Fuzzy C Means based Support Vector Regression (FCM-SVR) classification module is utilized to get the output. In the second proposed strategy, the Marginal Fisher Analysis (MFA) is implemented and the concepts of conditional feature mapping and cross domain transfer learning are implemented and classified with machine learning classifiers. In the third proposed strategy, the concepts of Flexible Analytic Wavelet Transform (FAWT) and Tunable Q Wavelet Transform (TQWT) are implemented and merged and then it is classified with Extreme Learning Machine (ELM), Kernel ELM and Adaptive Neuro Fuzzy Inference System (ANFIS) classifiers. In the fourth proposed strategy, the concepts of Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented and then the multi distance signal level difference is computed followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented to it before feeding it to classification. In the fifth or final proposed strategy, the Hilbert Huang Transform (HHT) is implemented and then the Hilbert marginal spectrum is computed. Then using the Blackhole optimization algorithm, the features are selected and finally it is classified with Cascade Adaboost classifier. The proposed techniques are applied on publicly available EEG datasets and the best result of 99.13% is obtained when the proposed Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented with the multi distance signal level difference followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented with Support Vector Machine (SVM) classifier.

脑电图(EEG)信号用于评估大脑的活动。对于道路上发生的事故,驾驶员疲劳是主要原因之一,脑电图很容易识别。在这项工作中,提出了五种有效且稳健的基于脑电的驾驶疲劳检测和分类方法。在第一种策略中,融合了多维尺度(MDS)和奇异值分解(SVD)的概念,然后利用基于模糊C均值的支持向量回归(FCM-SVR)分类模块来获得输出。在第二种策略中,实现了边际Fisher分析(MFA),并利用机器学习分类器实现了条件特征映射和跨域迁移学习的概念并进行了分类。在第三种策略中,实现并融合了柔性分析小波变换(FAWT)和可调Q小波变换(TQWT)的概念,并将其与极限学习机(ELM)、核ELM和自适应神经模糊推理系统(ANFIS)分类器进行了分类。在第四种策略中,用Rosenstein算法实现了相关谱密度和李雅普诺夫指数的概念,然后计算了多距离信号电平差,然后计算到黎曼均值的大地测量最小距离,最后在将其输入分类之前实现了切空间映射。在第五种或最后一种策略中,实现了希尔伯特-黄变换(HHT),然后计算了希尔伯特边缘谱。然后使用黑洞优化算法对特征进行选择,最后用级联Adaboost分类器对其进行分类。将所提出的技术应用于公开的EEG数据集,当利用多距离信号电平差实现所提出的Rosenstein算法的Correntropy谱密度和Lyapunov指数,然后计算到黎曼均值的大地测量最小距离,最后得到切空间映射时,获得了99.13%的最佳结果用支持向量机(SVM)分类器实现。
{"title":"Multiple robust approaches for EEG-based driving fatigue detection and classification","authors":"Sunil Kumar Prabhakar,&nbsp;Dong-Ok Won","doi":"10.1016/j.array.2023.100320","DOIUrl":"https://doi.org/10.1016/j.array.2023.100320","url":null,"abstract":"<div><p>Electroencephalography (EEG) signals are used to evaluate the activities of the brain. For the accidents occurring on the road, one of the primary reasons is driver fatigueness and it can be easily identified by the EEG. In this work, five efficient and robust approaches for the EEG-based driving fatigue detection and classification are proposed. In the first proposed strategy, the concept of Multi-Dimensional Scaling (MDS) and Singular Value Decomposition (SVD) are merged and then the Fuzzy C Means based Support Vector Regression (FCM-SVR) classification module is utilized to get the output. In the second proposed strategy, the Marginal Fisher Analysis (MFA) is implemented and the concepts of conditional feature mapping and cross domain transfer learning are implemented and classified with machine learning classifiers. In the third proposed strategy, the concepts of Flexible Analytic Wavelet Transform (FAWT) and Tunable Q Wavelet Transform (TQWT) are implemented and merged and then it is classified with Extreme Learning Machine (ELM), Kernel ELM and Adaptive Neuro Fuzzy Inference System (ANFIS) classifiers. In the fourth proposed strategy, the concepts of Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented and then the multi distance signal level difference is computed followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented to it before feeding it to classification. In the fifth or final proposed strategy, the Hilbert Huang Transform (HHT) is implemented and then the Hilbert marginal spectrum is computed. Then using the Blackhole optimization algorithm, the features are selected and finally it is classified with Cascade Adaboost classifier. The proposed techniques are applied on publicly available EEG datasets and the best result of 99.13% is obtained when the proposed Correntropy spectral density and Lyapunov exponent with Rosenstein algorithm is implemented with the multi distance signal level difference followed by the calculation of the Geodesic minimum distance to the Riemannian means and finally tangent space mapping is implemented with Support Vector Machine (SVM) classifier.</p></div>","PeriodicalId":8417,"journal":{"name":"Array","volume":"19 ","pages":"Article 100320"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49749362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Array
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1