首页 > 最新文献

Intelligent Systems with Applications最新文献

英文 中文
Solution of optimal reactive power dispatch by Lévy-flight phasor particle swarm optimization 用莱维飞行相位粒子群优化法解决最佳无功功率调度问题
Pub Date : 2024-06-15 DOI: 10.1016/j.iswa.2024.200398
Milad Gil , Ebrahim Akbari , Abolfazl Rahimnejad , Mojtaba Ghasemi , S. Andrew Gadsden

Optimal reactive power dispatch (ORPD) problems are important tools for the sake of security and economics of power systems. The ORPD problems are nonlinear optimization problems to minimize the real power losses and voltage profile enhancement by optimizing several discrete and continuous control variables. This paper proposes a Lévy-flight phasor particle swarm optimization (LPPSO) for solving ORPD problems while considering real power losses and voltage profile in two standard power systems. The simulation results demonstrate that the LPPSO algorithm proves itself as an acceptable method for reaching a more optimal solution for the ORPD problems.

最优无功功率调度(ORPD)问题是确保电力系统安全性和经济性的重要工具。无功优化调度问题是一种非线性优化问题,通过优化多个离散和连续控制变量,最大限度地减少实际功率损耗和改善电压曲线。本文提出了一种莱维飞行相位粒子群优化算法(LPPSO),用于解决 ORPD 问题,同时考虑两个标准电力系统中的实际功率损耗和电压曲线。仿真结果表明,LPPSO 算法是一种可接受的方法,能为 ORPD 问题找到更优化的解决方案。
{"title":"Solution of optimal reactive power dispatch by Lévy-flight phasor particle swarm optimization","authors":"Milad Gil ,&nbsp;Ebrahim Akbari ,&nbsp;Abolfazl Rahimnejad ,&nbsp;Mojtaba Ghasemi ,&nbsp;S. Andrew Gadsden","doi":"10.1016/j.iswa.2024.200398","DOIUrl":"10.1016/j.iswa.2024.200398","url":null,"abstract":"<div><p>Optimal reactive power dispatch (ORPD) problems are important tools for the sake of security and economics of power systems. The ORPD problems are nonlinear optimization problems to minimize the real power losses and voltage profile enhancement by optimizing several discrete and continuous control variables. This paper proposes a Lévy-flight phasor particle swarm optimization (LPPSO) for solving ORPD problems while considering real power losses and voltage profile in two standard power systems. The simulation results demonstrate that the LPPSO algorithm proves itself as an acceptable method for reaching a more optimal solution for the ORPD problems.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200398"},"PeriodicalIF":0.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000735/pdfft?md5=495f2e2b501a231b12ff94a77e447cb6&pid=1-s2.0-S2667305324000735-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141411684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system 增强物联网安全性:入侵检测系统特征缩减技术比较研究
Pub Date : 2024-06-14 DOI: 10.1016/j.iswa.2024.200407
Jing Li , Hewan Chen , Mohd Othman Shahizan , Lizawati Mi Yusuf

Internet of Things (IoT) devices are extensively utilized but are susceptible to cyberattacks, posing significant security challenges. To mitigate these threats, machine learning techniques have been implemented for network intrusion detection in IoT environments. These techniques commonly employ various feature reduction methods, prior to inputting data into models, in order to enhance the efficiency of detection processes to meet real-time requirements. This study provides a comprehensive comparison of feature selection (FS) and feature extraction (FE) techniques for network intrusion detection systems (NIDS) in IoT environments, utilizing the TON-IoT and BoT-IoT datasets for both binary and multi-class classification tasks. We evaluated FS methods, including Pearson correlation and Chi-square, and FE methods, such as Principal Component Analysis (PCA) and Autoencoders (AE), across five classic machine learning models: Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), k-Nearest Neighbors (kNN), and Multi-Layer Perceptron (MLP). Our analysis revealed that FE techniques generally achieve higher accuracy and robustness compared to FS methods, with RF paired with AE delivering superior performance despite higher computational demands. DTs are most effective with smaller feature sets, while MLPs excel with larger sets. Chi-square is identified as the most efficient FS method, balancing performance and computational efficiency, whereas PCA outperforms AE in runtime efficiency. The study also highlights that FE methods are more effective for complex datasets and less sensitive to feature set size, whereas FS methods show significant performance improvements with more informative features. Despite the higher computational costs of FE methods, they demonstrate a greater capability to detect diverse attack types, making them particularly suitable for complex IoT environments. These findings are crucial for both academic research and industry applications, providing insights into optimizing detection performance and computational efficiency in NIDS for IoT networks.

物联网(IoT)设备应用广泛,但容易受到网络攻击,带来了巨大的安全挑战。为了减轻这些威胁,人们采用了机器学习技术来检测物联网环境中的网络入侵。在将数据输入模型之前,这些技术通常采用各种特征缩减方法,以提高检测过程的效率,满足实时要求。本研究利用 TON-IoT 和 BoT-IoT 数据集,对物联网环境中网络入侵检测系统(NIDS)的特征选择(FS)和特征提取(FE)技术进行了全面比较,以完成二类和多类分类任务。我们评估了五种经典机器学习模型的 FS 方法(包括皮尔逊相关性和卡方)和 FE 方法(如主成分分析(PCA)和自动编码器(AE)):决策树 (DT)、随机森林 (RF)、奈夫贝叶斯 (NB)、k-近邻 (kNN) 和多层感知器 (MLP)。我们的分析表明,与 FS 方法相比,FE 技术通常具有更高的准确性和鲁棒性,而 RF 与 AE 搭配使用,尽管计算量更大,但性能更优。DT 对于较小的特征集最为有效,而 MLP 则在较大的特征集上表现出色。Chi-square 被认为是最有效的 FS 方法,在性能和计算效率之间取得了平衡,而 PCA 在运行效率方面优于 AE。研究还突出表明,FE 方法对复杂数据集更有效,对特征集大小的敏感度较低,而 FS 方法在使用信息量更大的特征时性能会有显著提高。尽管 FE 方法的计算成本较高,但它们检测各种攻击类型的能力更强,因此特别适用于复杂的物联网环境。这些发现对学术研究和行业应用都至关重要,为优化物联网网络 NIDS 的检测性能和计算效率提供了启示。
{"title":"Enhancing IoT security: A comparative study of feature reduction techniques for intrusion detection system","authors":"Jing Li ,&nbsp;Hewan Chen ,&nbsp;Mohd Othman Shahizan ,&nbsp;Lizawati Mi Yusuf","doi":"10.1016/j.iswa.2024.200407","DOIUrl":"10.1016/j.iswa.2024.200407","url":null,"abstract":"<div><p>Internet of Things (IoT) devices are extensively utilized but are susceptible to cyberattacks, posing significant security challenges. To mitigate these threats, machine learning techniques have been implemented for network intrusion detection in IoT environments. These techniques commonly employ various feature reduction methods, prior to inputting data into models, in order to enhance the efficiency of detection processes to meet real-time requirements. This study provides a comprehensive comparison of feature selection (FS) and feature extraction (FE) techniques for network intrusion detection systems (NIDS) in IoT environments, utilizing the TON-IoT and BoT-IoT datasets for both binary and multi-class classification tasks. We evaluated FS methods, including Pearson correlation and Chi-square, and FE methods, such as Principal Component Analysis (PCA) and Autoencoders (AE), across five classic machine learning models: Decision Tree (DT), Random Forest (RF), Naive Bayes (NB), k-Nearest Neighbors (kNN), and Multi-Layer Perceptron (MLP). Our analysis revealed that FE techniques generally achieve higher accuracy and robustness compared to FS methods, with RF paired with AE delivering superior performance despite higher computational demands. DTs are most effective with smaller feature sets, while MLPs excel with larger sets. Chi-square is identified as the most efficient FS method, balancing performance and computational efficiency, whereas PCA outperforms AE in runtime efficiency. The study also highlights that FE methods are more effective for complex datasets and less sensitive to feature set size, whereas FS methods show significant performance improvements with more informative features. Despite the higher computational costs of FE methods, they demonstrate a greater capability to detect diverse attack types, making them particularly suitable for complex IoT environments. These findings are crucial for both academic research and industry applications, providing insights into optimizing detection performance and computational efficiency in NIDS for IoT networks.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200407"},"PeriodicalIF":0.0,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000814/pdfft?md5=39f96821978e8d05cd9f43a745da82db&pid=1-s2.0-S2667305324000814-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141390499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thank you for attention: A survey on attention-based artificial neural networks for automatic speech recognition 感谢您的关注:基于注意力的自动语音识别人工神经网络调查
Pub Date : 2024-06-12 DOI: 10.1016/j.iswa.2024.200406
Priyabrata Karmakar , Shyh Wei Teng , Guojun Lu

Attention is a very popular and effective mechanism in artificial neural network-based sequence-to-sequence models. In this survey paper, a comprehensive review of the different attention models used in developing automatic speech recognition systems is provided. The paper focuses on how attention models have grown and changed for offline and streaming speech recognition in recurrent neural networks and Transformer-based systems.

在基于人工神经网络的序列到序列模型中,注意力是一种非常流行和有效的机制。在这篇调查论文中,我们全面回顾了用于开发自动语音识别系统的不同注意力模型。本文重点介绍了在基于递归神经网络和 Transformer 系统的离线和流式语音识别中,注意力模型是如何发展和变化的。
{"title":"Thank you for attention: A survey on attention-based artificial neural networks for automatic speech recognition","authors":"Priyabrata Karmakar ,&nbsp;Shyh Wei Teng ,&nbsp;Guojun Lu","doi":"10.1016/j.iswa.2024.200406","DOIUrl":"https://doi.org/10.1016/j.iswa.2024.200406","url":null,"abstract":"<div><p>Attention is a very popular and effective mechanism in artificial neural network-based sequence-to-sequence models. In this survey paper, a comprehensive review of the different attention models used in developing automatic speech recognition systems is provided. The paper focuses on how attention models have grown and changed for offline and streaming speech recognition in recurrent neural networks and Transformer-based systems.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200406"},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000802/pdfft?md5=594f02433cb07a398e883b4ae65168ef&pid=1-s2.0-S2667305324000802-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141328791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leak detection and localization in underground water supply system using thermal imaging and geophone signals through machine learning 通过机器学习利用热成像和地震检波器信号进行地下供水系统泄漏检测和定位
Pub Date : 2024-06-12 DOI: 10.1016/j.iswa.2024.200404
Mohammed Rezwanul Islam , Sami Azam , Bharanidharan Shanmugam , Deepika Mathur

The underground water pipeline system is a crucial infrastructure that largely remains out of sight. However, it is the source of a clean and uninterrupted flow of water for our everyday lives. Various factors, including corrosion, material degradation, ground movement, and improper maintenance, cause pipe leaks, a silent crisis that causes an estimated 39 billion dollars of loss every year. Prompt leakage detection and localization can help reduce the loss. This research investigates the potential of two machine learning models as supporting tools for surveying extensive areas to identify and pinpoint the location of underground leaks. The presented combined approach ensures the speed and accuracy of the leakage survey. The first machine learning model is a hybrid ML model that employs thermal imaging to identify subterranean water leakage. It relies on detecting thermal anomalies and distinctive signatures associated with water leakage to identify and locate underground water leakage. The developed model can detect up to 750 mm underground leakage with 95.20 % accuracy. The second model uses binaural audio from geophones to localize the leakage position. The model utilizes interaural time difference and interaural phase difference for localization purposes, and the 1D-CNN network delivers an angle in twenty-degree increments with an accuracy of 88.19 %. Large-scale implementation of the proposed model could be a powerful catalyst to reduce water loss in the water supply system.

地下输水管道系统是一种重要的基础设施,在很大程度上不为人们所注意。然而,它却是我们日常生活中清洁、不间断供水的源泉。包括腐蚀、材料退化、地面移动和维护不当在内的各种因素都会导致管道泄漏,这是一种无声的危机,每年造成的损失估计高达 390 亿美元。及时的渗漏检测和定位有助于减少损失。本研究探讨了两种机器学习模型作为辅助工具的潜力,用于勘测大面积区域,以识别和精确定位地下渗漏点。所提出的组合方法可确保渗漏勘测的速度和准确性。第一个机器学习模型是一个混合 ML 模型,利用热成像来识别地下漏水。它依靠检测与漏水相关的热异常和独特特征来识别和定位地下漏水。所开发的模型可以检测到最大 750 毫米的地下漏水,准确率高达 95.20%。第二个模型使用来自检波器的双耳音频来定位漏水位置。该模型利用耳间时差和耳间相位差进行定位,1D-CNN 网络以二十度为增量提供角度,准确率为 88.19%。该模型的大规模应用将有力地促进减少供水系统中的水损失。
{"title":"Leak detection and localization in underground water supply system using thermal imaging and geophone signals through machine learning","authors":"Mohammed Rezwanul Islam ,&nbsp;Sami Azam ,&nbsp;Bharanidharan Shanmugam ,&nbsp;Deepika Mathur","doi":"10.1016/j.iswa.2024.200404","DOIUrl":"10.1016/j.iswa.2024.200404","url":null,"abstract":"<div><p>The underground water pipeline system is a crucial infrastructure that largely remains out of sight. However, it is the source of a clean and uninterrupted flow of water for our everyday lives. Various factors, including corrosion, material degradation, ground movement, and improper maintenance, cause pipe leaks, a silent crisis that causes an estimated 39 billion dollars of loss every year. Prompt leakage detection and localization can help reduce the loss. This research investigates the potential of two machine learning models as supporting tools for surveying extensive areas to identify and pinpoint the location of underground leaks. The presented combined approach ensures the speed and accuracy of the leakage survey. The first machine learning model is a hybrid ML model that employs thermal imaging to identify subterranean water leakage. It relies on detecting thermal anomalies and distinctive signatures associated with water leakage to identify and locate underground water leakage. The developed model can detect up to 750 mm underground leakage with 95.20 % accuracy. The second model uses binaural audio from geophones to localize the leakage position. The model utilizes interaural time difference and interaural phase difference for localization purposes, and the 1D-CNN network delivers an angle in twenty-degree increments with an accuracy of 88.19 %. Large-scale implementation of the proposed model could be a powerful catalyst to reduce water loss in the water supply system.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200404"},"PeriodicalIF":0.0,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000784/pdfft?md5=ac525b424209639336425161aa98f0ca&pid=1-s2.0-S2667305324000784-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141397212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless federated learning for PR identification and analysis based on generalized information 基于泛化信息的公关识别和分析无线联合学习
Pub Date : 2024-06-11 DOI: 10.1016/j.iswa.2024.200403
Jianxin Liu, Ying Li, Jian Zhou, Huangsheng Hua, Pu Zhang

This paper introduces a novel approach to personal risk (PR) identification using federated learning (FL) in wireless communication scenarios, leveraging generalized information. The primary focus is on harnessing the power of distributed data across various wireless devices while ensuring data privacy and security, a critical concern in PR assessment. To this end, we propose an FL-based model that effectively aggregates learning from diverse, decentralized data sources to analyze the PR factors. The proposed method involves training local models on individual devices, which are then aggregated to form a comprehensive global model. This process not only preserves data privacy by keeping sensitive information on the device but also utilizes the widespread availability and connectivity of wireless devices to enhance data richness and model robustness. To address the challenges posed by the wireless environment, such as data heterogeneity and communication constraints, we further implement advanced aggregation algorithms and optimization techniques tailored to these unique conditions. We finally evaluate the performance of our proposed method based on two primary metrics of identification accuracy and convergence rate of the federated learning process. Through extensive simulations and real-world experiments, we demonstrate that our approach not only achieves high accuracy in PR identification but also ensures rapid convergence, making it a viable solution for real-time risk assessment in wireless networks.

本文介绍了一种在无线通信场景中利用联合学习(FL)、利用广义信息进行个人风险(PR)识别的新方法。主要重点是利用各种无线设备上分布式数据的力量,同时确保数据隐私和安全,这是个人风险评估中的一个关键问题。为此,我们提出了一种基于 FL 的模型,该模型能有效聚合从各种分散数据源中学习到的信息,从而分析公关因素。所提出的方法包括在单个设备上训练局部模型,然后将这些模型聚合起来,形成一个全面的全局模型。这一过程不仅通过在设备上保留敏感信息来保护数据隐私,还利用无线设备的广泛可用性和连接性来提高数据的丰富性和模型的稳健性。为了应对无线环境带来的挑战,如数据异构性和通信限制,我们进一步实施了先进的聚合算法和优化技术,以适应这些独特的条件。最后,我们根据联合学习过程的识别准确率和收敛率这两个主要指标来评估所提出方法的性能。通过大量的模拟和实际实验,我们证明了我们的方法不仅能实现高精度的 PR 识别,还能确保快速收敛,使其成为无线网络实时风险评估的可行解决方案。
{"title":"Wireless federated learning for PR identification and analysis based on generalized information","authors":"Jianxin Liu,&nbsp;Ying Li,&nbsp;Jian Zhou,&nbsp;Huangsheng Hua,&nbsp;Pu Zhang","doi":"10.1016/j.iswa.2024.200403","DOIUrl":"10.1016/j.iswa.2024.200403","url":null,"abstract":"<div><p>This paper introduces a novel approach to personal risk (PR) identification using federated learning (FL) in wireless communication scenarios, leveraging generalized information. The primary focus is on harnessing the power of distributed data across various wireless devices while ensuring data privacy and security, a critical concern in PR assessment. To this end, we propose an FL-based model that effectively aggregates learning from diverse, decentralized data sources to analyze the PR factors. The proposed method involves training local models on individual devices, which are then aggregated to form a comprehensive global model. This process not only preserves data privacy by keeping sensitive information on the device but also utilizes the widespread availability and connectivity of wireless devices to enhance data richness and model robustness. To address the challenges posed by the wireless environment, such as data heterogeneity and communication constraints, we further implement advanced aggregation algorithms and optimization techniques tailored to these unique conditions. We finally evaluate the performance of our proposed method based on two primary metrics of identification accuracy and convergence rate of the federated learning process. Through extensive simulations and real-world experiments, we demonstrate that our approach not only achieves high accuracy in PR identification but also ensures rapid convergence, making it a viable solution for real-time risk assessment in wireless networks.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200403"},"PeriodicalIF":0.0,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000772/pdfft?md5=1cfee04c334ad527eb70f3ed4520e33b&pid=1-s2.0-S2667305324000772-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141410366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Normalized flow networks and generalized information aided PR dynamic analysis 归一化流量网络和通用信息辅助 PR 动态分析
Pub Date : 2024-06-07 DOI: 10.1016/j.iswa.2024.200392
Chen Li, Min Xu, Siming He, Zhiyu Mao, Tong Liu

This paper introduces a novel approach utilizing normalized flow networks (NFNs) for dynamic personal risk (PR) analysis, specifically focusing on the assessment of two-way data rates at network nodes. NFNs, a sophisticated paradigm in data processing and modeling derived from machine learning principles, serve as the foundational framework for our analysis. Leveraging NFNs, we develop a generalized method that integrates information transmission techniques into PR dynamics, enabling a comprehensive examination of communication efficacy within network structures. Our study entails the formulation of dynamic models tailored to capture the evolving nature of PR interactions, facilitating the evaluation of data rates exchanged between network nodes. Through extensive simulations and empirical validation, we demonstrate the effectiveness of our approach in elucidating the intricate dynamics of PR campaigns and quantifying the impact on the network performance. The findings underscore the significance of leveraging NFNs for dynamic PR analysis, offering valuable insights into optimizing communication strategies and enhancing network efficiency in diverse domains.

本文介绍了一种利用归一化流量网络(NFN)进行动态个人风险(PR)分析的新方法,尤其侧重于评估网络节点的双向数据传输速率。归一化流量网络是一种源自机器学习原理的数据处理和建模范例,是我们分析的基础框架。利用 NFN,我们开发了一种通用方法,将信息传输技术整合到 PR 动态中,从而能够全面检查网络结构中的通信功效。我们的研究需要建立动态模型,以捕捉公关互动的演变本质,从而促进对网络节点间数据交换率的评估。通过大量的模拟和经验验证,我们证明了我们的方法在阐明公关活动的复杂动态和量化对网络性能的影响方面的有效性。这些发现强调了利用 NFN 进行动态公关分析的重要性,为优化通信策略和提高不同领域的网络效率提供了宝贵的见解。
{"title":"Normalized flow networks and generalized information aided PR dynamic analysis","authors":"Chen Li,&nbsp;Min Xu,&nbsp;Siming He,&nbsp;Zhiyu Mao,&nbsp;Tong Liu","doi":"10.1016/j.iswa.2024.200392","DOIUrl":"https://doi.org/10.1016/j.iswa.2024.200392","url":null,"abstract":"<div><p>This paper introduces a novel approach utilizing normalized flow networks (NFNs) for dynamic personal risk (PR) analysis, specifically focusing on the assessment of two-way data rates at network nodes. NFNs, a sophisticated paradigm in data processing and modeling derived from machine learning principles, serve as the foundational framework for our analysis. Leveraging NFNs, we develop a generalized method that integrates information transmission techniques into PR dynamics, enabling a comprehensive examination of communication efficacy within network structures. Our study entails the formulation of dynamic models tailored to capture the evolving nature of PR interactions, facilitating the evaluation of data rates exchanged between network nodes. Through extensive simulations and empirical validation, we demonstrate the effectiveness of our approach in elucidating the intricate dynamics of PR campaigns and quantifying the impact on the network performance. The findings underscore the significance of leveraging NFNs for dynamic PR analysis, offering valuable insights into optimizing communication strategies and enhancing network efficiency in diverse domains.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200392"},"PeriodicalIF":0.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266730532400067X/pdfft?md5=482c880254c6f41b754b76e2e0cc296e&pid=1-s2.0-S266730532400067X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application analysis of heuristic algorithms integrating dynamic programming in RNA secondary structure prediction 结合动态编程的启发式算法在 RNA 二级结构预测中的应用分析
Pub Date : 2024-06-07 DOI: 10.1016/j.iswa.2024.200400
Tao Yuan , Xu Yan

Ribonucleic acid is a crucial biomolecule in living organisms, with various types. To promote the research process of ribonucleic acid function, this study is for analyzing the utilization of heuristic algorithms on the ground of fusion dynamic programming in predicting the secondary structure of ribonucleic acid. Research on novel use of tree models for RNA secondary structure comparison, and use heuristic algorithms to optimize the multi branch structure comparison of tree models. Firstly, this study utilized dynamic programming algorithms to construct a comparison matrix and successfully found the backtracking path in the matrix. Meanwhile, for ensuring that the structural information of ribonucleic acid is not lost during the comparative analysis process, the study applies the idea of heuristic algorithms to calculate the optimal comparison between multi branched loops. Finally, the weights are adjusted using neural network algorithms to predict the optimal alignment structure. The results showed that the fusion dynamic programming heuristic algorithm achieved generalization performance of 0.928, 0.856, 0.842, and 0.793 on the target base data test sets of humans, mice, yeast, and spotted fish, respectively. Compared with the SimTree algorithm, the generalization performance has been improved by 15.13 %, 27.38 %, 27.77 %, and 38.88 %, respectively. In summary, the application of heuristic algorithms integrating dynamic programming in predicting the secondary structure of ribonucleic acid has good predictive performance. This has reference value for a deeper understanding of the structure and function relationship of ribonucleic acid.

核糖核酸是生物体内重要的生物大分子,种类繁多。为推动核糖核酸功能的研究进程,本研究以融合动态程序设计为基础,分析启发式算法在预测核糖核酸二级结构中的应用。研究利用树状模型进行核糖核酸二级结构比较的新方法,并利用启发式算法优化树状模型的多分支结构比较。首先,该研究利用动态编程算法构建了比较矩阵,并成功找到了矩阵中的回溯路径。同时,为确保在比较分析过程中不丢失核糖核酸的结构信息,该研究运用启发式算法的思想计算多分支环路之间的最优比较。最后,利用神经网络算法调整权重,预测出最佳配位结构。结果表明,融合动态编程启发式算法在人类、小鼠、酵母和斑点鱼等目标基础数据测试集上的泛化性能分别达到了 0.928、0.856、0.842 和 0.793。与 SimTree 算法相比,泛化性能分别提高了 15.13 %、27.38 %、27.77 % 和 38.88 %。综上所述,将启发式算法与动态编程相结合应用于核糖核酸二级结构预测具有良好的预测性能。这对深入理解核糖核酸的结构与功能关系具有参考价值。
{"title":"Application analysis of heuristic algorithms integrating dynamic programming in RNA secondary structure prediction","authors":"Tao Yuan ,&nbsp;Xu Yan","doi":"10.1016/j.iswa.2024.200400","DOIUrl":"https://doi.org/10.1016/j.iswa.2024.200400","url":null,"abstract":"<div><p>Ribonucleic acid is a crucial biomolecule in living organisms, with various types. To promote the research process of ribonucleic acid function, this study is for analyzing the utilization of heuristic algorithms on the ground of fusion dynamic programming in predicting the secondary structure of ribonucleic acid. Research on novel use of tree models for RNA secondary structure comparison, and use heuristic algorithms to optimize the multi branch structure comparison of tree models. Firstly, this study utilized dynamic programming algorithms to construct a comparison matrix and successfully found the backtracking path in the matrix. Meanwhile, for ensuring that the structural information of ribonucleic acid is not lost during the comparative analysis process, the study applies the idea of heuristic algorithms to calculate the optimal comparison between multi branched loops. Finally, the weights are adjusted using neural network algorithms to predict the optimal alignment structure. The results showed that the fusion dynamic programming heuristic algorithm achieved generalization performance of 0.928, 0.856, 0.842, and 0.793 on the target base data test sets of humans, mice, yeast, and spotted fish, respectively. Compared with the SimTree algorithm, the generalization performance has been improved by 15.13 %, 27.38 %, 27.77 %, and 38.88 %, respectively. In summary, the application of heuristic algorithms integrating dynamic programming in predicting the secondary structure of ribonucleic acid has good predictive performance. This has reference value for a deeper understanding of the structure and function relationship of ribonucleic acid.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"23 ","pages":"Article 200400"},"PeriodicalIF":0.0,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000759/pdfft?md5=d17301e4707d1eea977443c38850bee5&pid=1-s2.0-S2667305324000759-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141325339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the diagnosis of chronic kidney disease using a machine learning-based interface with explainable artificial intelligence 利用基于机器学习的可解释人工智能界面诊断慢性肾病
Pub Date : 2024-06-01 DOI: 10.1016/j.iswa.2024.200397
Gangani Dharmarathne , Madhusha Bogahawaththa , Marion McAfee , Upaka Rathnayake , D.P.P. Meddage

Chronic Kidney Disease (CKD) is increasingly recognised as a major health concern due to its rising prevalence. The average survival period without functioning kidneys is typically limited to approximately 18 days, creating a significant need for kidney transplants and dialysis. Early detection of CKD is crucial, and machine learning methods have proven effective in diagnosing the condition, despite their often opaque decision-making processes. This study utilised explainable machine learning to predict CKD, thereby overcoming the 'black box' nature of traditional machine learning predictions. Of the six machine learning algorithms evaluated, the extreme gradient boost (XGB) demonstrated the highest accuracy. For interpretability, the study employed Shapley Additive Explanations (SHAP) and Partial Dependency Plots (PDP), which elucidate the rationale behind the predictions and support the decision-making process. Moreover, for the first time, a graphical user interface with explanations was developed to diagnose the likelihood of CKD. Given the critical nature and high stakes of CKD, the use of explainable machine learning can aid healthcare professionals in making accurate diagnoses and identifying root causes.

慢性肾脏病(CKD)的发病率不断上升,日益成为人们关注的主要健康问题。没有功能性肾脏的平均存活期通常只有大约 18 天,因此对肾脏移植和透析的需求很大。早期发现慢性肾功能衰竭至关重要,尽管机器学习方法的决策过程往往不透明,但已被证明能有效诊断病情。本研究利用可解释的机器学习来预测慢性肾功能衰竭,从而克服了传统机器学习预测的 "黑箱 "性质。在评估的六种机器学习算法中,极端梯度提升算法(XGB)的准确率最高。在可解释性方面,该研究采用了夏普利相加解释(SHAP)和部分依赖图(PDP),它们阐明了预测背后的原理并支持决策过程。此外,该研究还首次开发了带有解释的图形用户界面,用于诊断 CKD 的可能性。鉴于慢性肾功能衰竭的严重性和高风险,使用可解释的机器学习可以帮助医疗保健专业人员做出准确诊断并找出根本原因。
{"title":"On the diagnosis of chronic kidney disease using a machine learning-based interface with explainable artificial intelligence","authors":"Gangani Dharmarathne ,&nbsp;Madhusha Bogahawaththa ,&nbsp;Marion McAfee ,&nbsp;Upaka Rathnayake ,&nbsp;D.P.P. Meddage","doi":"10.1016/j.iswa.2024.200397","DOIUrl":"https://doi.org/10.1016/j.iswa.2024.200397","url":null,"abstract":"<div><p>Chronic Kidney Disease (CKD) is increasingly recognised as a major health concern due to its rising prevalence. The average survival period without functioning kidneys is typically limited to approximately 18 days, creating a significant need for kidney transplants and dialysis. Early detection of CKD is crucial, and machine learning methods have proven effective in diagnosing the condition, despite their often opaque decision-making processes. This study utilised explainable machine learning to predict CKD, thereby overcoming the 'black box' nature of traditional machine learning predictions. Of the six machine learning algorithms evaluated, the extreme gradient boost (XGB) demonstrated the highest accuracy. For interpretability, the study employed Shapley Additive Explanations (SHAP) and Partial Dependency Plots (PDP), which elucidate the rationale behind the predictions and support the decision-making process. Moreover, for the first time, a graphical user interface with explanations was developed to diagnose the likelihood of CKD. Given the critical nature and high stakes of CKD, the use of explainable machine learning can aid healthcare professionals in making accurate diagnoses and identifying root causes.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"22 ","pages":"Article 200397"},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000723/pdfft?md5=43e84197a5307d709678407fa845c5d7&pid=1-s2.0-S2667305324000723-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy rule based classifier model for evidence based clinical decision support systems 基于证据的临床决策支持系统的模糊规则分类器模型
Pub Date : 2024-06-01 DOI: 10.1016/j.iswa.2024.200393
Navin K , Mukesh Krishnan M․ B

Clinicians benefit from the use of artificial intelligence and machine learning techniques applied to health data within health records, which identify commonalities between them. It enables them to get evidence-based support in recommending shared treatment paths for undiagnosed health records. The collective inference from these patterns, drawn from an array of health records, further enhances the capacity to mine essential features, supporting public health experts in their management of population health conditions. This paper presents a novel mapping tool model designed to analyze electronic health records and provide healthcare providers with evidence-based decision support. The work focuses on the analysis of health records from hospital databases, encompassing parameters extracted from routine health checkups. By scrutinizing patterns within examined health records, healthcare providers can seamlessly align with newer health records for diagnosis and treatment recommendations. Core to this approach is the integration of a fuzzy rule-based classifier system within the proposed system. This incorporation facilitates the processing of health records, extracting pertinent features to augment decision-making with the support of knowledge bases. The model architecture provides flexibility and customizability, enabling easy configuration of the system to accurately map new health records to the examined dataset. Additionally, the model utilizes a specially developed distance-measure technique tailored for the proposed fuzzy-based system. Results showcase satisfying performance and robust discriminant capability for accurate recommendations. The alignment of outcomes with expert evaluations underscores the model's efficacy and attainment of benchmarks.

将人工智能和机器学习技术应用于健康记录中的健康数据,找出它们之间的共性,这让临床医生受益匪浅。这使他们能够获得循证支持,为未诊断的健康记录推荐共同的治疗路径。从一系列健康记录中得出的这些模式的集体推论,进一步增强了挖掘基本特征的能力,为公共卫生专家管理人口健康状况提供了支持。本文介绍了一种新颖的绘图工具模型,旨在分析电子健康记录并为医疗保健提供者提供循证决策支持。工作重点是分析医院数据库中的健康记录,包括从常规健康检查中提取的参数。通过仔细研究检查过的健康记录中的模式,医疗服务提供者可以与较新的健康记录无缝对接,以获得诊断和治疗建议。这种方法的核心是在拟议系统中整合基于模糊规则的分类器系统。这种整合有助于处理健康记录,提取相关特征,在知识库的支持下加强决策。该模型的架构具有灵活性和可定制性,能够轻松配置系统,将新的健康记录准确映射到已检查的数据集。此外,该模型还采用了专门为拟议的基于模糊的系统开发的距离测量技术。结果表明,该模型具有令人满意的性能和强大的判别能力,可提供准确的建议。结果与专家评价相吻合,突出了该模型的功效并达到了基准。
{"title":"Fuzzy rule based classifier model for evidence based clinical decision support systems","authors":"Navin K ,&nbsp;Mukesh Krishnan M․ B","doi":"10.1016/j.iswa.2024.200393","DOIUrl":"https://doi.org/10.1016/j.iswa.2024.200393","url":null,"abstract":"<div><p>Clinicians benefit from the use of artificial intelligence and machine learning techniques applied to health data within health records, which identify commonalities between them. It enables them to get evidence-based support in recommending shared treatment paths for undiagnosed health records. The collective inference from these patterns, drawn from an array of health records, further enhances the capacity to mine essential features, supporting public health experts in their management of population health conditions. This paper presents a novel mapping tool model designed to analyze electronic health records and provide healthcare providers with evidence-based decision support. The work focuses on the analysis of health records from hospital databases, encompassing parameters extracted from routine health checkups. By scrutinizing patterns within examined health records, healthcare providers can seamlessly align with newer health records for diagnosis and treatment recommendations. Core to this approach is the integration of a fuzzy rule-based classifier system within the proposed system. This incorporation facilitates the processing of health records, extracting pertinent features to augment decision-making with the support of knowledge bases. The model architecture provides flexibility and customizability, enabling easy configuration of the system to accurately map new health records to the examined dataset. Additionally, the model utilizes a specially developed distance-measure technique tailored for the proposed fuzzy-based system. Results showcase satisfying performance and robust discriminant capability for accurate recommendations. The alignment of outcomes with expert evaluations underscores the model's efficacy and attainment of benchmarks.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"22 ","pages":"Article 200393"},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000681/pdfft?md5=3a83dda73e2da02e292c1aa2c74ed853&pid=1-s2.0-S2667305324000681-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence-based masked face detection: A survey 基于人工智能的蒙面人脸检测:调查
Pub Date : 2024-06-01 DOI: 10.1016/j.iswa.2024.200391
Khalid M. Hosny, Nada AbdElFattah Ibrahim, Ehab R. Mohamed, Hanaa M. Hamza

The COVID-19 virus is causing a global pandemic. The total number of new coronavirus cases worldwide by the end of November 2020 had already surpassed 60 million. The World Health Organization (WHO) has determined that wearing masks is a crucial precaution during the COVID-19 epidemic to limit the growth of viruses, and facemasks are frequently seen in public places worldwide. Also, many public service providers wear face masks (covering their mouths and noses). These events brought attention to the need for automatic computer-vision-based object detection (masked face detection) methods to track public behavior. Therefore, it is necessary to develop tools for monitor people who have not used masks in public service areas in real-time. Reducing the spread of infectious diseases can occur when masked face detection techniques are used for authentication instead of mask removal for face matching. A superior framework of masked face detection could improve security systems and lower the rate of crime. Masked face detection is a computer vision method standard in people's daily lives to recognize, discover, and recognize masked faces in pictures and videos. This study provides a thorough and systematic analysis of masked face detection algorithms. With the help of examples, we have thoroughly examined and reviewed the studies done concerning face mask identification and techniques for masked face detection.

Additionally, we compared and explained different masked face detection dataset types, libraries, and techniques. We also discussed the challenges with masked face detection and whether the researchers could overcome them. We have discussed and conducted a thorough evaluation of the accuracy, pros, and cons of various approaches by comparing their performance on multiple datasets. As a result, this study aims to give the researcher a broader viewpoint to aid him in finding patterns and trends in masked face detection in various COVID-19 contexts, overcoming challenges that are still present, and creating future algorithms for masked face detection that are more reliable and accurate.

COVID-19 病毒正在引发全球大流行。截至 2020 年 11 月底,全球新增冠状病毒病例总数已超过 6 000 万例。世界卫生组织(WHO)认为,在 COVID-19 流行期间,佩戴口罩是限制病毒滋生的重要预防措施,因此在世界各地的公共场所经常可以看到口罩的身影。此外,许多公共服务人员也佩戴口罩(遮住口鼻)。这些事件使人们注意到需要基于计算机视觉的物体自动检测(蒙面检测)方法来跟踪公众行为。因此,有必要开发工具,实时监控公共服务区域内未使用口罩的人员。使用蒙面人脸检测技术进行身份验证,而不是去除面具进行人脸匹配,可以减少传染病的传播。出色的面具人脸检测框架可以改善安全系统,降低犯罪率。蒙面人脸检测是人们日常生活中标准的计算机视觉方法,用于识别、发现和辨认图片和视频中的蒙面人脸。本研究对蒙面人脸检测算法进行了全面系统的分析。此外,我们还比较并解释了不同的蒙面检测数据集类型、库和技术。我们还讨论了蒙面人脸检测所面临的挑战以及研究人员能否克服这些挑战。通过比较各种方法在多个数据集上的表现,我们讨论并全面评估了这些方法的准确性、优点和缺点。因此,本研究旨在为研究人员提供一个更广阔的视角,帮助他们找到在 COVID-19 的各种情况下进行蒙面人脸检测的模式和趋势,克服仍然存在的挑战,并创建更可靠、更准确的未来蒙面人脸检测算法。
{"title":"Artificial intelligence-based masked face detection: A survey","authors":"Khalid M. Hosny,&nbsp;Nada AbdElFattah Ibrahim,&nbsp;Ehab R. Mohamed,&nbsp;Hanaa M. Hamza","doi":"10.1016/j.iswa.2024.200391","DOIUrl":"10.1016/j.iswa.2024.200391","url":null,"abstract":"<div><p>The COVID-19 virus is causing a global pandemic. The total number of new coronavirus cases worldwide by the end of November 2020 had already surpassed 60 million. The World Health Organization (WHO) has determined that wearing masks is a crucial precaution during the COVID-19 epidemic to limit the growth of viruses, and facemasks are frequently seen in public places worldwide. Also, many public service providers wear face masks (covering their mouths and noses). These events brought attention to the need for automatic computer-vision-based object detection (masked face detection) methods to track public behavior. Therefore, it is necessary to develop tools for monitor people who have not used masks in public service areas in real-time. Reducing the spread of infectious diseases can occur when masked face detection techniques are used for authentication instead of mask removal for face matching. A superior framework of masked face detection could improve security systems and lower the rate of crime. Masked face detection is a computer vision method standard in people's daily lives to recognize, discover, and recognize masked faces in pictures and videos. This study provides a thorough and systematic analysis of masked face detection algorithms. With the help of examples, we have thoroughly examined and reviewed the studies done concerning face mask identification and techniques for masked face detection.</p><p>Additionally, we compared and explained different masked face detection dataset types, libraries, and techniques. We also discussed the challenges with masked face detection and whether the researchers could overcome them. We have discussed and conducted a thorough evaluation of the accuracy, pros, and cons of various approaches by comparing their performance on multiple datasets. As a result, this study aims to give the researcher a broader viewpoint to aid him in finding patterns and trends in masked face detection in various COVID-19 contexts, overcoming challenges that are still present, and creating future algorithms for masked face detection that are more reliable and accurate.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"22 ","pages":"Article 200391"},"PeriodicalIF":0.0,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324000668/pdfft?md5=ef5b949ead610616851117161181fb4a&pid=1-s2.0-S2667305324000668-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141145649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Intelligent Systems with Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1