首页 > 最新文献

Comput.最新文献

英文 中文
Efficient Algebraic Method for Testing the Invertibility of Finite State Machines 有限状态机可逆性检验的有效代数方法
Pub Date : 2023-06-28 DOI: 10.3390/computation11070125
Zineb Lotfi, Hamid Khalifi, Faissal Ouardi
The emergence of new embedded system technologies, such as IoT, requires the design of new lightweight cryptosystems to meet different hardware restrictions. In this context, the concept of Finite State Machines (FSMs) can offer a robust solution when using cryptosystems based on finite automata, known as FAPKC (Finite Automaton Public Key Cryptosystems), introduced by Renji Tao. These cryptosystems have been proposed as alternatives to traditional public key cryptosystems, such as RSA. They are based on composing two private keys, which are two FSMs M1 and M2 with the property of invertibility with finite delay to obtain the composed FSM M=M1oM2, which is the public key. The invert process (factorizing) is hard to compute. Unfortunately, these cryptosystems have not really been adopted in real-world applications, and this is mainly due to the lack of profound studies on the FAPKC key space and a random generator program. In this paper, we first introduce an efficient algebraic method based on the notion of a testing table to compute the delay of invertibility of an FSM. Then, we carry out a statistical study on the number of invertible FSMs with finite delay by varying the number of states as well as the number of output symbols. This allows us to estimate the landscape of the space of invertible FSMs, which is considered a first step toward the design of a random generator.
新的嵌入式系统技术的出现,如物联网,需要设计新的轻量级密码系统来满足不同的硬件限制。在这种情况下,有限状态机(FSMs)的概念可以在使用基于有限自动机的密码系统时提供一个健壮的解决方案,称为FAPKC(有限自动机公钥密码系统),由陶仁次介绍。这些密码系统已被提议作为传统公钥密码系统(如RSA)的替代方案。它们是基于组合两个私钥,即两个具有有限延迟可逆性的FSM M1和M2,从而得到组合的FSM M=M1oM2,即公钥。逆过程(因式分解)很难计算。不幸的是,这些密码系统并没有真正应用于实际应用,这主要是由于缺乏对FAPKC密钥空间和随机生成器程序的深入研究。本文首先介绍了一种基于测试表概念的计算FSM可逆性延迟的有效代数方法。然后,通过改变状态数和输出符号数,对有限延迟可逆fsm的数量进行了统计研究。这使我们能够估计可逆fsm空间的景观,这被认为是设计随机发生器的第一步。
{"title":"Efficient Algebraic Method for Testing the Invertibility of Finite State Machines","authors":"Zineb Lotfi, Hamid Khalifi, Faissal Ouardi","doi":"10.3390/computation11070125","DOIUrl":"https://doi.org/10.3390/computation11070125","url":null,"abstract":"The emergence of new embedded system technologies, such as IoT, requires the design of new lightweight cryptosystems to meet different hardware restrictions. In this context, the concept of Finite State Machines (FSMs) can offer a robust solution when using cryptosystems based on finite automata, known as FAPKC (Finite Automaton Public Key Cryptosystems), introduced by Renji Tao. These cryptosystems have been proposed as alternatives to traditional public key cryptosystems, such as RSA. They are based on composing two private keys, which are two FSMs M1 and M2 with the property of invertibility with finite delay to obtain the composed FSM M=M1oM2, which is the public key. The invert process (factorizing) is hard to compute. Unfortunately, these cryptosystems have not really been adopted in real-world applications, and this is mainly due to the lack of profound studies on the FAPKC key space and a random generator program. In this paper, we first introduce an efficient algebraic method based on the notion of a testing table to compute the delay of invertibility of an FSM. Then, we carry out a statistical study on the number of invertible FSMs with finite delay by varying the number of states as well as the number of output symbols. This allows us to estimate the landscape of the space of invertible FSMs, which is considered a first step toward the design of a random generator.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"7 1","pages":"125"},"PeriodicalIF":0.0,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86750240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Operation of Determining the Sign of a Number in RNS Using the Akushsky Core Function 利用Akushsky核心函数快速确定RNS中数的符号
Pub Date : 2023-06-28 DOI: 10.3390/computation11070124
E. Shiriaev, N. Kucherov, M. Babenko, A. Nazarov
This article presents a study related to increasing the performance of distributed computing systems. The essence of fog computing lies in the use of so-called edge devices. These devices are low-power, so they are extremely sensitive to the computational complexity of the methods used. This article is aimed at improving the efficiency of calculations while maintaining an appropriate level of reliability by applying the methods of the Residue Number System (RNS). We are investigating methods for determining the sign of a number in the RNS based on the core function in order to develop a new, fast method. As a result, a fast method for determining the sign of a number based on the Akushsky core function, using approximate calculations, is obtained. Thus, in the course of this article, a study of methods for ensuring reliability in distributed computing is conducted. A fast method for determining the sign of a number in the RNS based on the core function using approximate calculations is also proposed. This result is interesting from the point of view of nebulous calculations, since it allows maintaining high reliability of a distributed system of edge devices with a slight increase in the computational complexity of non-modular operations.
本文介绍了一项有关提高分布式计算系统性能的研究。雾计算的本质在于所谓的边缘设备的使用。这些设备是低功耗的,因此它们对所用方法的计算复杂性非常敏感。本文旨在通过应用剩余数系统(RNS)的方法来提高计算效率,同时保持适当的可靠性水平。我们正在研究基于核心函数的RNS中数字符号的确定方法,以开发一种新的、快速的方法。结果,得到了一种基于Akushsky核心函数的快速确定数的符号的近似计算方法。因此,在本文的过程中,对分布式计算中保证可靠性的方法进行了研究。提出了一种基于核心函数近似计算的快速确定RNS中数字符号的方法。从模糊计算的角度来看,这个结果很有趣,因为它允许在非模块化操作的计算复杂性略有增加的情况下保持边缘设备分布式系统的高可靠性。
{"title":"Fast Operation of Determining the Sign of a Number in RNS Using the Akushsky Core Function","authors":"E. Shiriaev, N. Kucherov, M. Babenko, A. Nazarov","doi":"10.3390/computation11070124","DOIUrl":"https://doi.org/10.3390/computation11070124","url":null,"abstract":"This article presents a study related to increasing the performance of distributed computing systems. The essence of fog computing lies in the use of so-called edge devices. These devices are low-power, so they are extremely sensitive to the computational complexity of the methods used. This article is aimed at improving the efficiency of calculations while maintaining an appropriate level of reliability by applying the methods of the Residue Number System (RNS). We are investigating methods for determining the sign of a number in the RNS based on the core function in order to develop a new, fast method. As a result, a fast method for determining the sign of a number based on the Akushsky core function, using approximate calculations, is obtained. Thus, in the course of this article, a study of methods for ensuring reliability in distributed computing is conducted. A fast method for determining the sign of a number in the RNS based on the core function using approximate calculations is also proposed. This result is interesting from the point of view of nebulous calculations, since it allows maintaining high reliability of a distributed system of edge devices with a slight increase in the computational complexity of non-modular operations.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"14 1","pages":"124"},"PeriodicalIF":0.0,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74995689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Dynamic Software-Defined Networking Approach to Neutralize Traffic Burst 一种新的动态软件定义网络方法来中和流量突发
Pub Date : 2023-06-27 DOI: 10.3390/computers12070131
Aakanksha Sharma, V. Balasubramanian, J. Kamruzzaman
Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation.
软件定义网络(SDN)对网络有一个整体的看法。它非常适合处理传统网络中的动态负载,而只需对网络基础结构进行最小的更新。然而,标准的SDN架构控制平面是针对单个或多个分布式SDN控制器设计的,面临着严重的瓶颈问题。我们最初的研究为传统网络创建了一个参考模型,在一个名为NetSim的网络模拟器中使用标准SDN(以下简称SDN)。根据网络流量,参考模型根据连接物联网设备的数量分为轻型、中型和重型网络。此外,在标准SDN中提出了一种优先级调度和拥塞控制算法,称为扩展SDN (eSDN),该算法使拥塞最小化,性能优于标准SDN。然而,这种增强只适用于小规模网络,因为在大规模网络中,eSDN不支持动态SDN控制器映射。通常,同一个SDN控制器会过载,导致单点故障。我们的文献综述表明,大多数提出的解决方案都是基于静态SDN控制器部署,没有考虑流量波动和流量突发,导致SDN控制器之间缺乏实时负载均衡,最终增加网络延迟。因此,为了保持网络中的服务质量(QoS),静态SDN控制器必须中和动态流量突发。因此,我们在SDN中放置多控制器的新型动态控制器映射算法对于解决所识别的问题至关重要。在dSDN中,SDN控制器随负载波动动态映射。当任何一个SDN控制器达到最大阈值时,剩余的流量将被分流到另一个控制器上,大大减少了时延,提高了整体性能。该技术考虑了网络中的延迟和负载波动,解决了静态映射无法处理动态流量变化的问题。
{"title":"A Novel Dynamic Software-Defined Networking Approach to Neutralize Traffic Burst","authors":"Aakanksha Sharma, V. Balasubramanian, J. Kamruzzaman","doi":"10.3390/computers12070131","DOIUrl":"https://doi.org/10.3390/computers12070131","url":null,"abstract":"Software-defined networks (SDN) has a holistic view of the network. It is highly suitable for handling dynamic loads in the traditional network with a minimal update in the network infrastructure. However, the standard SDN architecture control plane has been designed for single or multiple distributed SDN controllers facing severe bottleneck issues. Our initial research created a reference model for the traditional network, using the standard SDN (referred to as SDN hereafter) in a network simulator called NetSim. Based on the network traffic, the reference models consisted of light, modest and heavy networks depending on the number of connected IoT devices. Furthermore, a priority scheduling and congestion control algorithm is proposed in the standard SDN, named extended SDN (eSDN), which minimises congestion and performs better than the standard SDN. However, the enhancement was suitable only for the small-scale network because, in a large-scale network, the eSDN does not support dynamic SDN controller mapping. Often, the same SDN controller gets overloaded, leading to a single point of failure. Our literature review shows that most proposed solutions are based on static SDN controller deployment without considering flow fluctuations and traffic bursts that lead to a lack of load balancing among the SDN controllers in real-time, eventually increasing the network latency. Therefore, to maintain the Quality of Service (QoS) in the network, it becomes imperative for the static SDN controller to neutralise the on-the-fly traffic burst. Thus, our novel dynamic controller mapping algorithm with multiple-controller placement in the SDN is critical to solving the identified issues. In dSDN, the SDN controllers are mapped dynamically with the load fluctuation. If any SDN controller reaches its maximum threshold, the rest of the traffic will be diverted to another controller, significantly reducing delay and enhancing the overall performance. Our technique considers the latency and load fluctuation in the network and manages the situations where static mapping is ineffective in dealing with the dynamic flow variation.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"1 1","pages":"131"},"PeriodicalIF":0.0,"publicationDate":"2023-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88779611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A FEM Structural Analysis of a Francis Turbine Blade Parametrized Using Piecewise Bernstein Polynomials 用分段Bernstein多项式参数化混流式涡轮叶片的有限元结构分析
Pub Date : 2023-06-26 DOI: 10.3390/computation11070123
Heriberto Arias-Rojas, Miguel A. Rodríguez-Velázquez, Ángel Cerriteño-Sánchez, F. Domínguez-Mota, S. Galván-González
Several methodologies have successfully described the runner blade shape as a set of discrete sections joining the hub and shroud, defined by 3D geometrical forms of considerable complexity. This task requires an appropriate parametric approach for its accurate reconstruction. Among them, piecewise Bernstein polynomials have been used to create parametrizations of twisted runner blades by extracting some cross-sectional hydrofoil profiles from reference CAD data to be approximated by such polynomials. Using the interpolating polynomial coefficients as parameters, more profiles are generated by Lagrangian techniques. The generated profiles are then stacked along the spanwise direction of the blade via transfinite interpolation to obtain a smooth and continuous representation of the reference blade. This versatile approach makes the description of a range of different blade shapes possible within the required accuracy and, furthermore, the design of new blade shapes. However, even though it is possible to redefine new blade shapes using the aforementioned parametrization, a remaining question is whether the parametrized blades are suitable as a replacement for the currently used ones. In order to assess the mechanical feasibility of the new shapes, several stages of analysis are required. In this paper, bearing in mind the standard hydraulic test conditions of the hydrofoil test case of the Norwegian Hydropower Center, we present a structural stress–strain analysis of the reparametrization of a Francis blade, thus showing its adequate computational performance in two model tests.
有几种方法已经成功地将流道叶片的形状描述为连接轮毂和叶冠的一组离散部分,由相当复杂的3D几何形式定义。这项任务需要一种适当的参数化方法来精确地重建它。其中,利用分段Bernstein多项式对扭曲流道叶片进行参数化,从参考CAD数据中提取部分截面水翼型线进行近似。以插值多项式系数为参数,利用拉格朗日方法生成了更多的剖面。然后,通过超限插值将生成的轮廓沿叶片展向叠加,以获得参考叶片的光滑连续表示。这种通用的方法使得在所需的精度范围内描述一系列不同的叶片形状成为可能,此外,还可以设计新的叶片形状。然而,尽管使用上述参数化可以重新定义新的叶片形状,但剩下的问题是参数化叶片是否适合替代当前使用的叶片。为了评估新形状的力学可行性,需要进行几个阶段的分析。本文结合挪威水电中心水翼试验箱的标准水力试验条件,对法兰式叶片的再参数化进行了结构应力-应变分析,在两次模型试验中显示了其足够的计算性能。
{"title":"A FEM Structural Analysis of a Francis Turbine Blade Parametrized Using Piecewise Bernstein Polynomials","authors":"Heriberto Arias-Rojas, Miguel A. Rodríguez-Velázquez, Ángel Cerriteño-Sánchez, F. Domínguez-Mota, S. Galván-González","doi":"10.3390/computation11070123","DOIUrl":"https://doi.org/10.3390/computation11070123","url":null,"abstract":"Several methodologies have successfully described the runner blade shape as a set of discrete sections joining the hub and shroud, defined by 3D geometrical forms of considerable complexity. This task requires an appropriate parametric approach for its accurate reconstruction. Among them, piecewise Bernstein polynomials have been used to create parametrizations of twisted runner blades by extracting some cross-sectional hydrofoil profiles from reference CAD data to be approximated by such polynomials. Using the interpolating polynomial coefficients as parameters, more profiles are generated by Lagrangian techniques. The generated profiles are then stacked along the spanwise direction of the blade via transfinite interpolation to obtain a smooth and continuous representation of the reference blade. This versatile approach makes the description of a range of different blade shapes possible within the required accuracy and, furthermore, the design of new blade shapes. However, even though it is possible to redefine new blade shapes using the aforementioned parametrization, a remaining question is whether the parametrized blades are suitable as a replacement for the currently used ones. In order to assess the mechanical feasibility of the new shapes, several stages of analysis are required. In this paper, bearing in mind the standard hydraulic test conditions of the hydrofoil test case of the Norwegian Hydropower Center, we present a structural stress–strain analysis of the reparametrization of a Francis blade, thus showing its adequate computational performance in two model tests.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"110 1","pages":"123"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73037742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stealth Literacy Assessments via Educational Games 通过教育游戏进行隐形素养评估
Pub Date : 2023-06-25 DOI: 10.3390/computers12070130
Ying Fang, Tong Li, Linh Huynh, Katerina Christhilf, Rod D. Roscoe, D. McNamara
Literacy assessment is essential for effective literacy instruction and training. However, traditional paper-based literacy assessments are typically decontextualized and may cause stress and anxiety for test takers. In contrast, serious games and game environments allow for the assessment of literacy in more authentic and engaging ways, which has some potential to increase the assessment’s validity and reliability. The primary objective of this study is to examine the feasibility of a novel approach for stealthily assessing literacy skills using games in an intelligent tutoring system (ITS) designed for reading comprehension strategy training. We investigated the degree to which learners’ game performance and enjoyment predicted their scores on standardized reading tests. Amazon Mechanical Turk participants (n = 211) played three games in iSTART and self-reported their level of game enjoyment after each game. Participants also completed the Gates–MacGinitie Reading Test (GMRT), which includes vocabulary knowledge and reading comprehension measures. The results indicated that participants’ performance in each game as well as the combined performance across all three games predicted their literacy skills. However, the relations between game enjoyment and literacy skills varied across games. These findings suggest the potential of leveraging serious games to assess students’ literacy skills and improve the adaptivity of game-based learning environments.
扫盲评估对有效的扫盲教学和培训至关重要。然而,传统的纸本读写能力评估通常是脱离语境的,可能会给考生带来压力和焦虑。相比之下,严肃游戏和游戏环境允许以更真实、更吸引人的方式评估素养,这有可能提高评估的有效性和可靠性。本研究的主要目的是研究一种利用游戏在智能辅导系统(ITS)中暗中评估阅读理解策略训练的读写技能的新方法的可行性。我们调查了学习者的游戏表现和乐趣在多大程度上预测了他们在标准化阅读测试中的分数。Amazon Mechanical Turk的参与者(n = 211)在iSTART中玩了三款游戏,并在每次游戏后自我报告他们的游戏享受程度。参与者还完成了盖茨-麦金蒂阅读测试(GMRT),其中包括词汇知识和阅读理解测试。结果表明,参与者在每个游戏中的表现以及在所有三个游戏中的综合表现预测了他们的读写能力。然而,游戏乐趣与识字技能之间的关系在不同游戏中有所不同。这些发现表明,利用严肃游戏来评估学生的读写能力和提高基于游戏的学习环境的适应性是有潜力的。
{"title":"Stealth Literacy Assessments via Educational Games","authors":"Ying Fang, Tong Li, Linh Huynh, Katerina Christhilf, Rod D. Roscoe, D. McNamara","doi":"10.3390/computers12070130","DOIUrl":"https://doi.org/10.3390/computers12070130","url":null,"abstract":"Literacy assessment is essential for effective literacy instruction and training. However, traditional paper-based literacy assessments are typically decontextualized and may cause stress and anxiety for test takers. In contrast, serious games and game environments allow for the assessment of literacy in more authentic and engaging ways, which has some potential to increase the assessment’s validity and reliability. The primary objective of this study is to examine the feasibility of a novel approach for stealthily assessing literacy skills using games in an intelligent tutoring system (ITS) designed for reading comprehension strategy training. We investigated the degree to which learners’ game performance and enjoyment predicted their scores on standardized reading tests. Amazon Mechanical Turk participants (n = 211) played three games in iSTART and self-reported their level of game enjoyment after each game. Participants also completed the Gates–MacGinitie Reading Test (GMRT), which includes vocabulary knowledge and reading comprehension measures. The results indicated that participants’ performance in each game as well as the combined performance across all three games predicted their literacy skills. However, the relations between game enjoyment and literacy skills varied across games. These findings suggest the potential of leveraging serious games to assess students’ literacy skills and improve the adaptivity of game-based learning environments.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"15 1","pages":"130"},"PeriodicalIF":0.0,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85447216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Bug Assignment and Developer Allocation in Software Engineering through Interpretable Machine Learning Models 通过可解释的机器学习模型改进软件工程中的Bug分配和开发人员分配
Pub Date : 2023-06-23 DOI: 10.3390/computers12070128
Mina Samir, N. Sherief, W. Abdelmoez
Software engineering is a comprehensive process that requires developers and team members to collaborate across multiple tasks. In software testing, bug triaging is a tedious and time-consuming process. Assigning bugs to the appropriate developers can save time and maintain their motivation. However, without knowledge about a bug’s class, triaging is difficult. Motivated by this challenge, this paper focuses on the problem of assigning a suitable developer to a new bug by analyzing the history of developers’ profiles and analyzing the history of bugs for all developers using machine learning-based recommender systems. Explainable AI (XAI) is AI that humans can understand. It contrasts with “black box” AI, which even its designers cannot explain. By providing appropriate explanations for results, users can better comprehend the underlying insight behind the outcomes, boosting the recommender system’s effectiveness, transparency, and confidence. The trained model is utilized in the recommendation stage to calculate relevance scores for developers based on expertise and past bug handling performance, ultimately presenting the developers with the highest scores as recommendations for new bugs. This approach aims to strike a balance between computational efficiency and accurate predictions, enabling efficient bug assignment while considering developer expertise and historical performance. In this paper, we propose two explainable models for recommendation. The first is an explainable recommender model for personalized developers generated from bug history to know what the preferred type of bug is for each developer. The second model is an explainable recommender model based on bugs to identify the most suitable developer for each bug from bug history.
软件工程是一个综合的过程,需要开发人员和团队成员跨多个任务进行协作。在软件测试中,bug分类是一个冗长而耗时的过程。将错误分配给适当的开发人员可以节省时间并保持他们的动力。但是,如果不了解bug的类,则很难进行分类。在这一挑战的激励下,本文通过分析开发人员配置文件的历史,并使用基于机器学习的推荐系统分析所有开发人员的错误历史,专注于为新错误分配合适的开发人员的问题。可解释AI (Explainable AI, XAI)是人类能够理解的AI。它与“黑匣子”人工智能形成鲜明对比,后者甚至连设计者都无法解释。通过为结果提供适当的解释,用户可以更好地理解结果背后的潜在洞察力,从而提高推荐系统的有效性、透明度和信心。经过训练的模型在推荐阶段使用,根据专业知识和过去的错误处理性能为开发人员计算相关性分数,最终将最高分作为新错误的建议呈现给开发人员。这种方法的目的是在计算效率和准确预测之间取得平衡,在考虑开发人员专业知识和历史性能的同时,实现有效的bug分配。在本文中,我们提出了两个可解释的推荐模型。第一个是一个可解释的推荐模型,为个性化开发人员从bug历史中生成,以了解每个开发人员偏好的bug类型。第二个模型是基于bug的可解释推荐模型,从bug历史中为每个bug确定最合适的开发人员。
{"title":"Improving Bug Assignment and Developer Allocation in Software Engineering through Interpretable Machine Learning Models","authors":"Mina Samir, N. Sherief, W. Abdelmoez","doi":"10.3390/computers12070128","DOIUrl":"https://doi.org/10.3390/computers12070128","url":null,"abstract":"Software engineering is a comprehensive process that requires developers and team members to collaborate across multiple tasks. In software testing, bug triaging is a tedious and time-consuming process. Assigning bugs to the appropriate developers can save time and maintain their motivation. However, without knowledge about a bug’s class, triaging is difficult. Motivated by this challenge, this paper focuses on the problem of assigning a suitable developer to a new bug by analyzing the history of developers’ profiles and analyzing the history of bugs for all developers using machine learning-based recommender systems. Explainable AI (XAI) is AI that humans can understand. It contrasts with “black box” AI, which even its designers cannot explain. By providing appropriate explanations for results, users can better comprehend the underlying insight behind the outcomes, boosting the recommender system’s effectiveness, transparency, and confidence. The trained model is utilized in the recommendation stage to calculate relevance scores for developers based on expertise and past bug handling performance, ultimately presenting the developers with the highest scores as recommendations for new bugs. This approach aims to strike a balance between computational efficiency and accurate predictions, enabling efficient bug assignment while considering developer expertise and historical performance. In this paper, we propose two explainable models for recommendation. The first is an explainable recommender model for personalized developers generated from bug history to know what the preferred type of bug is for each developer. The second model is an explainable recommender model based on bugs to identify the most suitable developer for each bug from bug history.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"24 1","pages":"128"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74660946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tiny Deep Learning Architectures Enabling Sensor-Near Acoustic Data Processing and Defect Localization 微型深度学习架构实现传感器附近的声学数据处理和缺陷定位
Pub Date : 2023-06-23 DOI: 10.3390/computers12070129
Giacomo Donati, F. Zonzini, L. Marchi
The timely diagnosis of defects at their incipient stage of formation is crucial to extending the life-cycle of technical appliances. This is the case of mechanical-related stress, either due to long aging degradation processes (e.g., corrosion) or in-operation forces (e.g., impact events), which might provoke detrimental damage, such as cracks, disbonding or delaminations, most commonly followed by the release of acoustic energy. The localization of these sources can be successfully fulfilled via adoption of acoustic emission (AE)-based inspection techniques through the computation of the time of arrival (ToA), namely the time at which the induced mechanical wave released at the occurrence of the acoustic event arrives to the acquisition unit. However, the accurate estimation of the ToA may be hampered by poor signal-to-noise ratios (SNRs). In these conditions, standard statistical methods typically fail. In this work, two alternative deep learning methods are proposed for ToA retrieval in processing AE signals, namely a dilated convolutional neural network (DilCNN) and a capsule neural network for ToA (CapsToA). These methods have the additional benefit of being portable on resource-constrained microprocessors. Their performance has been extensively studied on both synthetic and experimental data, focusing on the problem of ToA identification for the case of a metallic plate. Results show that the two methods can achieve localization errors which are up to 70% more precise than those yielded by conventional strategies, even when the SNR is severely compromised (i.e., down to 2 dB). Moreover, DilCNN and CapsNet have been implemented in a tiny machine learning environment and then deployed on microcontroller units, showing a negligible loss of performance with respect to offline realizations.
在缺陷形成初期及时诊断缺陷对延长技术设备的生命周期至关重要。这是机械相关应力的情况,无论是由于长时间的老化降解过程(例如,腐蚀)还是由于操作中的力(例如,冲击事件),这可能会引起有害的损害,例如裂纹,分离或分层,最常见的是随后释放声能。采用基于声发射(AE)的检测技术,通过计算到达时间(ToA),即声事件发生时释放的感应机械波到达采集单元的时间,可以成功地实现这些源的定位。然而,较差的信噪比(SNRs)可能会阻碍ToA的准确估计。在这些情况下,标准的统计方法通常会失败。在这项工作中,提出了两种替代的深度学习方法用于处理声发射信号的ToA检索,即扩展卷积神经网络(DilCNN)和用于ToA的胶囊神经网络(CapsToA)。这些方法还具有在资源受限的微处理器上可移植的额外好处。它们的性能已经在合成和实验数据上进行了广泛的研究,重点是金属板的ToA识别问题。结果表明,即使在信噪比严重受损(即低至2 dB)的情况下,这两种方法的定位误差也比传统策略的定位误差高出70%。此外,DilCNN和CapsNet已经在一个小型机器学习环境中实现,然后部署在微控制器单元上,相对于离线实现,表现出可以忽略不计的性能损失。
{"title":"Tiny Deep Learning Architectures Enabling Sensor-Near Acoustic Data Processing and Defect Localization","authors":"Giacomo Donati, F. Zonzini, L. Marchi","doi":"10.3390/computers12070129","DOIUrl":"https://doi.org/10.3390/computers12070129","url":null,"abstract":"The timely diagnosis of defects at their incipient stage of formation is crucial to extending the life-cycle of technical appliances. This is the case of mechanical-related stress, either due to long aging degradation processes (e.g., corrosion) or in-operation forces (e.g., impact events), which might provoke detrimental damage, such as cracks, disbonding or delaminations, most commonly followed by the release of acoustic energy. The localization of these sources can be successfully fulfilled via adoption of acoustic emission (AE)-based inspection techniques through the computation of the time of arrival (ToA), namely the time at which the induced mechanical wave released at the occurrence of the acoustic event arrives to the acquisition unit. However, the accurate estimation of the ToA may be hampered by poor signal-to-noise ratios (SNRs). In these conditions, standard statistical methods typically fail. In this work, two alternative deep learning methods are proposed for ToA retrieval in processing AE signals, namely a dilated convolutional neural network (DilCNN) and a capsule neural network for ToA (CapsToA). These methods have the additional benefit of being portable on resource-constrained microprocessors. Their performance has been extensively studied on both synthetic and experimental data, focusing on the problem of ToA identification for the case of a metallic plate. Results show that the two methods can achieve localization errors which are up to 70% more precise than those yielded by conventional strategies, even when the SNR is severely compromised (i.e., down to 2 dB). Moreover, DilCNN and CapsNet have been implemented in a tiny machine learning environment and then deployed on microcontroller units, showing a negligible loss of performance with respect to offline realizations.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"30 1 1","pages":"129"},"PeriodicalIF":0.0,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80491759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Control Framework for a Secure Internet of Things within Small-, Medium-, and Micro-Sized Enterprises in a Developing Economy 发展中经济体中小微企业安全物联网控制框架
Pub Date : 2023-06-22 DOI: 10.3390/computers12070127
Tebogo Mhlongo, J. A. V. D. Poll, Tebogo Sethibe
Small and medium enterprises (SMEs) play a critical role in the economic growth of a nation, and their significance is increasingly acknowledged. More than 90% of commercial establishments, almost 70f% of jobs, and 55% of the GDP are held by SMEs in mature economies. Additionally, this sector accounts for 70% of employment possibilities and up to 40% of the GDP in developing countries. Technologically, the Internet of Things (IoT) enables multiple connected devices, i.e., “things”, to add value to businesses, as they can communicate and send messages or signals promptly. In this article, we investigate various challenges SMEs experience in IoT adoption to further their businesses. Amongst others, the challenges elicited include IoT considerations for SMEs, data, financial availability, and challenges related to the SME environment. Having analysed the challenges, a three-tiered solution framework coined the Secure IoT Control Framework (SIoTCF) to address the said challenges is developed and briefly validated through a theoretical analysis of the elements of the framework. It is hoped that the proposed framework will assist with aspects of design, governance, and maintenance in enhancing the security levels of IoT adoption and usage in SMEs, especially start-ups or less experienced SMEs. Future work in this area will involve surveying SME owners and ICT staff to validate the utility of the SIoTCF further. The study adds to the body of knowledge in general by developing a secure IoT control framework. In the field of ICT, this paradigm is expected to be useful for academics, researchers, and students.
中小企业在一个国家的经济增长中发挥着至关重要的作用,其重要性日益得到承认。在成熟经济体中,超过90%的商业机构、近70%的就业岗位和55%的GDP由中小企业掌握。此外,该部门占发展中国家就业机会的70%,占国内生产总值的40%。从技术上讲,物联网(IoT)使多个连接的设备(即“事物”)能够为企业增加价值,因为它们可以及时通信和发送消息或信号。在本文中,我们调查了中小企业在采用物联网以进一步发展业务方面遇到的各种挑战。其中,引发的挑战包括中小企业的物联网考虑、数据、财务可用性以及与中小企业环境相关的挑战。在分析了这些挑战之后,开发了一个三层解决方案框架,即安全物联网控制框架(SIoTCF),以应对上述挑战,并通过对框架要素的理论分析进行了简要验证。希望拟议的框架能够在设计、治理和维护方面提供帮助,以提高中小企业(特别是初创企业或经验不足的中小企业)采用和使用物联网的安全水平。未来在这方面的工作将包括调查中小企业业主和资讯及通讯科技人员,以进一步验证创新科技基金的效用。该研究通过开发安全的物联网控制框架,总体上增加了知识体系。在信息通信技术领域,这一范式有望对学者、研究人员和学生有用。
{"title":"A Control Framework for a Secure Internet of Things within Small-, Medium-, and Micro-Sized Enterprises in a Developing Economy","authors":"Tebogo Mhlongo, J. A. V. D. Poll, Tebogo Sethibe","doi":"10.3390/computers12070127","DOIUrl":"https://doi.org/10.3390/computers12070127","url":null,"abstract":"Small and medium enterprises (SMEs) play a critical role in the economic growth of a nation, and their significance is increasingly acknowledged. More than 90% of commercial establishments, almost 70f% of jobs, and 55% of the GDP are held by SMEs in mature economies. Additionally, this sector accounts for 70% of employment possibilities and up to 40% of the GDP in developing countries. Technologically, the Internet of Things (IoT) enables multiple connected devices, i.e., “things”, to add value to businesses, as they can communicate and send messages or signals promptly. In this article, we investigate various challenges SMEs experience in IoT adoption to further their businesses. Amongst others, the challenges elicited include IoT considerations for SMEs, data, financial availability, and challenges related to the SME environment. Having analysed the challenges, a three-tiered solution framework coined the Secure IoT Control Framework (SIoTCF) to address the said challenges is developed and briefly validated through a theoretical analysis of the elements of the framework. It is hoped that the proposed framework will assist with aspects of design, governance, and maintenance in enhancing the security levels of IoT adoption and usage in SMEs, especially start-ups or less experienced SMEs. Future work in this area will involve surveying SME owners and ICT staff to validate the utility of the SIoTCF further. The study adds to the body of knowledge in general by developing a secure IoT control framework. In the field of ICT, this paradigm is expected to be useful for academics, researchers, and students.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"72 1","pages":"127"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82869159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Limit computability and ultrafilters 限制可计算性和超过滤器
Pub Date : 2023-06-21 DOI: 10.3233/com-170176
U. Andrews, Mingzhong Cai, David Diamondstone, N. Schweber
We study a class of operators on Turing degrees arising naturally from ultrafilters. Suppose U is a nonprincipal ultrafilter on ω. We can then view a sequence of sets A = ( A i ) i ∈ ω as an “approximation” of a set B produced by amalgamating the A i via U: we set lim U ( A ) = { x : { i : x ∈ A i } ∈ U }. This can be extended to the Turing degrees, by defining δ U ( a ) = { lim U ( A ) : A = ( A i ) i ∈ ω ∈ a }. The δ U – which we call “ultrafilter jumps” – resemble classical limit computability in certain ways. In particular, δ U ( a ) is always a Turing ideal containing Δ 2 0 ( a ). However, they are also closely tied to Scott sets: δ U ( a ) is always a Scott set containing a ′ . (This yields an alternate proof of the standard result in reverse mathematics that Weak Konig’s Lemma is strictly weaker than arithmetic comprehension.) Our main result is that the converse also holds: if S is a countable Scott set containing a ′ , then there is some ultrafilter U with δ U ( a ) = S. We then turn to the problem of controlling the action of an ultrafilter jump δ U on two degrees simultaneously, and for example show that there are nontrivial degrees which are “low” for some ultrafilter jump. Finally, we study the structure on the set of ultrafilters arising from the construction U ↦ δ U ; in particular, we introduce a natural preordering on this set and show that it is connected with the classical Rudin–Keisler ordering of ultrafilters. We end by presenting two directions for further research.
研究了由超滤自然产生的一类图灵度算子。假设U是ω上的非主超滤波器。然后我们可以把集合序列a = (a i) i∈ω看作是集合B的一个“近似”,它是由集合i通过U合并而产生的:我们设lim U (a) = {x: {i: x∈a i}∈U}。这可以扩展到图灵度,通过定义δ U (a) = {lim U (a): a = (a i) i∈ω∈a}。δ U——我们称之为“超滤跳变”——在某些方面类似于经典的极限可计算性。特别地,δ U (a)总是包含Δ 20 (a)的图灵理想。然而,它们也与Scott集合紧密相连:δ U (a)总是包含a '的Scott集合。(这就产生了另一种证明,证明了逆向数学中的标准结果,即弱柯尼格引理严格弱于算术理解。)我们的主要结果是,反之也成立:如果S是一个包含a '的可数Scott集合,那么存在一个δ U (a) = S的超过滤器U。然后,我们转向控制一个超过滤器δ U同时在两个度上的作用的问题,并举例说明对于一些超过滤器的跳变存在“低”的非平凡度。最后,我们研究了由构造U≠δ U产生的超滤集合的结构;特别地,我们在这个集合上引入了一个自然的预序,并证明了它与经典的Rudin-Keisler超滤序有关。最后,提出了进一步研究的两个方向。
{"title":"Limit computability and ultrafilters","authors":"U. Andrews, Mingzhong Cai, David Diamondstone, N. Schweber","doi":"10.3233/com-170176","DOIUrl":"https://doi.org/10.3233/com-170176","url":null,"abstract":"We study a class of operators on Turing degrees arising naturally from ultrafilters. Suppose U is a nonprincipal ultrafilter on ω. We can then view a sequence of sets A = ( A i ) i ∈ ω as an “approximation” of a set B produced by amalgamating the A i via U: we set lim U ( A ) = { x : { i : x ∈ A i } ∈ U }. This can be extended to the Turing degrees, by defining δ U ( a ) = { lim U ( A ) : A = ( A i ) i ∈ ω ∈ a }. The δ U – which we call “ultrafilter jumps” – resemble classical limit computability in certain ways. In particular, δ U ( a ) is always a Turing ideal containing Δ 2 0 ( a ). However, they are also closely tied to Scott sets: δ U ( a ) is always a Scott set containing a ′ . (This yields an alternate proof of the standard result in reverse mathematics that Weak Konig’s Lemma is strictly weaker than arithmetic comprehension.) Our main result is that the converse also holds: if S is a countable Scott set containing a ′ , then there is some ultrafilter U with δ U ( a ) = S. We then turn to the problem of controlling the action of an ultrafilter jump δ U on two degrees simultaneously, and for example show that there are nontrivial degrees which are “low” for some ultrafilter jump. Finally, we study the structure on the set of ultrafilters arising from the construction U ↦ δ U ; in particular, we introduce a natural preordering on this set and show that it is connected with the classical Rudin–Keisler ordering of ultrafilters. We end by presenting two directions for further research.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"45 1","pages":"101-115"},"PeriodicalIF":0.0,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76166182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Multi-Phase Flow to Test the Effectiveness of the Casting Yard Aspiration System 用多相流模拟来检验铸造场抽吸系统的有效性
Pub Date : 2023-06-20 DOI: 10.3390/computation11060121
S. Lobov, Yevhen Pylypko, Viktoriya Kruchyna, Ihor Bereshko
The metallurgical industry is in second place among all other industries in terms of emissions into the atmosphere, and air pollution is the main cause of environmental problems arising from the activities of metallurgical enterprises. In some existing systems for localization, in the trapping and removal of dust emissions from tapholes and cast-iron gutters of foundries, air flow parameters may differ from the optimal ones for solving aspiration problems. The largest emissions are observed in the area of the taphole (40–60%) and from the ladles during their filling (35–50%). In this paper, it is proposed to consider a variant of the blast furnace aspiration system with the simultaneous supply of a dust–gas–air mixture from two-side smoke exhausters and two upper hoods with two simultaneously operating tapholes, that is, when the blast furnace operates in the maximum emissions mode. This article proposes an assessment of the effectiveness of the modernized blast furnace aspiration system using computer CFD modeling, where its main parameters are given. It is shown that the efficiency of dust collection in the proposed system is more than 90%, and the speed of the gas–dust mixture is no lower than 20 m/s, which prevents gravitational settling on the walls. The distribution fields of temperatures and velocities are obtained for further engineering analysis and the possible improvement of aspiration systems.
冶金工业向大气的排放量在所有其他工业中排名第二,大气污染是冶金企业活动产生环境问题的主要原因。在一些现有的定位系统中,在从铸造厂的出料口和铸铁排水沟中捕获和清除粉尘时,空气流动参数可能与解决吸入问题的最佳参数不同。最大的排放发生在出水口区域(40-60%)和钢包填充期间(35-50%)。本文提出了一种高炉抽吸系统的变体,即当高炉在最大排放模式下运行时,从两侧排烟器和两个具有两个同时运行的出烟口的两个上罩同时供应粉尘-气体-空气混合物。本文利用计算机CFD模型对现代化高炉抽吸系统的有效性进行了评价,并给出了系统的主要参数。结果表明,该系统的除尘效率在90%以上,气尘混合物的速度不低于20 m/s,防止了重力沉降在壁上。为进一步的工程分析和改进抽吸系统提供了温度和速度的分布场。
{"title":"Simulation of Multi-Phase Flow to Test the Effectiveness of the Casting Yard Aspiration System","authors":"S. Lobov, Yevhen Pylypko, Viktoriya Kruchyna, Ihor Bereshko","doi":"10.3390/computation11060121","DOIUrl":"https://doi.org/10.3390/computation11060121","url":null,"abstract":"The metallurgical industry is in second place among all other industries in terms of emissions into the atmosphere, and air pollution is the main cause of environmental problems arising from the activities of metallurgical enterprises. In some existing systems for localization, in the trapping and removal of dust emissions from tapholes and cast-iron gutters of foundries, air flow parameters may differ from the optimal ones for solving aspiration problems. The largest emissions are observed in the area of the taphole (40–60%) and from the ladles during their filling (35–50%). In this paper, it is proposed to consider a variant of the blast furnace aspiration system with the simultaneous supply of a dust–gas–air mixture from two-side smoke exhausters and two upper hoods with two simultaneously operating tapholes, that is, when the blast furnace operates in the maximum emissions mode. This article proposes an assessment of the effectiveness of the modernized blast furnace aspiration system using computer CFD modeling, where its main parameters are given. It is shown that the efficiency of dust collection in the proposed system is more than 90%, and the speed of the gas–dust mixture is no lower than 20 m/s, which prevents gravitational settling on the walls. The distribution fields of temperatures and velocities are obtained for further engineering analysis and the possible improvement of aspiration systems.","PeriodicalId":10526,"journal":{"name":"Comput.","volume":"68 1","pages":"121"},"PeriodicalIF":0.0,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81209175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1