首页 > 最新文献

International Journal of Information Technology and Computer Science最新文献

英文 中文
Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset 确保物联网安全:利用 CIC-IoT2023 数据集评估用于检测物联网网络攻击的机器学习算法
Pub Date : 2024-08-08 DOI: 10.5815/ijitcs.2024.04.04
Akinul Islam Jony, Arjun Kumar Bose Arnob
An increase in cyber threats directed at interconnected devices has resulted from the proliferation of the Internet of Things (IoT), which necessitates the implementation of comprehensive defenses against evolving attack vectors. This research investigates the utilization of machine learning (ML) prediction models to identify and defend against cyber-attacks targeting IoT networks. Central emphasis is placed on the thorough examination of the CIC-IoT2023 dataset, an extensive collection comprising a wide range of Distributed Denial of Service (DDoS) assaults on diverse IoT devices. This ensures the utilization of a practical and comprehensive benchmark for assessment. This study develops and compares four distinct machine learning models Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Tree (DT), and Random Forest (RF) to determine their effectiveness in detecting and preventing cyber threats to the Internet of Things (IoT). The comprehensive assessment incorporates a wide range of performance indicators, such as F1-score, accuracy, precision, and recall. Significantly, the results emphasize the superior performance of DT and RF, demonstrating exceptional accuracy rates of 0.9919 and 0.9916, correspondingly. The models demonstrate an outstanding capability to differentiate between benign and malicious packets, as supported by their high precision, recall, and F1 scores. The precision-recall curves and confusion matrices provide additional evidence that DT and RF are strong contenders in the field of IoT intrusion detection. Additionally, KNN demonstrates a noteworthy accuracy of 0.9380. On the other hand, LR demonstrates the least accuracy with a value of 0.8275, underscoring its inherent incapability to classify threats. In conjunction with the realistic and diverse characteristics of the CIC-IoT2023 dataset, the study's empirical assessments provide invaluable knowledge for determining the most effective machine learning algorithms and fortification strategies to protect IoT infrastructures. Furthermore, this study establishes ground-breaking suggestions for subsequent inquiries, urging the examination of unsupervised learning approaches and the incorporation of deep learning models to decipher complex patterns within IoT networks. These developments have the potential to strengthen cybersecurity protocols for Internet of Things (IoT) ecosystems, reduce the impact of emergent risks, and promote robust defense systems against ever-changing cyber challenges.
随着物联网(IoT)的普及,针对互联设备的网络威胁不断增加,因此有必要针对不断变化的攻击载体实施全面防御。本研究探讨了如何利用机器学习(ML)预测模型来识别和防御针对物联网网络的网络攻击。研究重点是对 CIC-IoT2023 数据集进行彻底检查,该数据集收集了大量针对不同物联网设备的分布式拒绝服务 (DDoS) 攻击。这确保了利用实用而全面的基准进行评估。本研究开发并比较了四种不同的机器学习模型:逻辑回归 (LR)、K-近邻 (KNN)、决策树 (DT) 和随机森林 (RF),以确定它们在检测和预防物联网 (IoT) 网络威胁方面的有效性。综合评估包含了广泛的性能指标,如 F1 分数、准确度、精确度和召回率。值得注意的是,评估结果强调了 DT 和 RF 的卓越性能,准确率分别达到 0.9919 和 0.9916。这些模型在区分良性数据包和恶意数据包方面表现出卓越的能力,其高精度、召回率和 F1 分数也证明了这一点。精度-召回曲线和混淆矩阵进一步证明,DT 和 RF 是物联网入侵检测领域的有力竞争者。此外,KNN 的准确率高达 0.9380。另一方面,LR 的准确率最低,仅为 0.8275,这说明它本身就不具备对威胁进行分类的能力。结合 CIC-IoT2023 数据集的现实性和多样性特征,本研究的经验评估为确定最有效的机器学习算法和加固策略以保护物联网基础设施提供了宝贵的知识。此外,本研究还为后续研究提出了开创性的建议,敦促研究无监督学习方法和深度学习模型,以破解物联网网络中的复杂模式。这些发展有可能加强物联网(IoT)生态系统的网络安全协议,减少突发风险的影响,并促进强大的防御系统,以应对不断变化的网络挑战。
{"title":"Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset","authors":"Akinul Islam Jony, Arjun Kumar Bose Arnob","doi":"10.5815/ijitcs.2024.04.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.04.04","url":null,"abstract":"An increase in cyber threats directed at interconnected devices has resulted from the proliferation of the Internet of Things (IoT), which necessitates the implementation of comprehensive defenses against evolving attack vectors. This research investigates the utilization of machine learning (ML) prediction models to identify and defend against cyber-attacks targeting IoT networks. Central emphasis is placed on the thorough examination of the CIC-IoT2023 dataset, an extensive collection comprising a wide range of Distributed Denial of Service (DDoS) assaults on diverse IoT devices. This ensures the utilization of a practical and comprehensive benchmark for assessment. This study develops and compares four distinct machine learning models Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Tree (DT), and Random Forest (RF) to determine their effectiveness in detecting and preventing cyber threats to the Internet of Things (IoT). The comprehensive assessment incorporates a wide range of performance indicators, such as F1-score, accuracy, precision, and recall. Significantly, the results emphasize the superior performance of DT and RF, demonstrating exceptional accuracy rates of 0.9919 and 0.9916, correspondingly. The models demonstrate an outstanding capability to differentiate between benign and malicious packets, as supported by their high precision, recall, and F1 scores. The precision-recall curves and confusion matrices provide additional evidence that DT and RF are strong contenders in the field of IoT intrusion detection. Additionally, KNN demonstrates a noteworthy accuracy of 0.9380. On the other hand, LR demonstrates the least accuracy with a value of 0.8275, underscoring its inherent incapability to classify threats. In conjunction with the realistic and diverse characteristics of the CIC-IoT2023 dataset, the study's empirical assessments provide invaluable knowledge for determining the most effective machine learning algorithms and fortification strategies to protect IoT infrastructures. Furthermore, this study establishes ground-breaking suggestions for subsequent inquiries, urging the examination of unsupervised learning approaches and the incorporation of deep learning models to decipher complex patterns within IoT networks. These developments have the potential to strengthen cybersecurity protocols for Internet of Things (IoT) ecosystems, reduce the impact of emergent risks, and promote robust defense systems against ever-changing cyber challenges.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"3 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mimicking Nature: Analysis of Dragonfly Pursuit Strategies Using LSTM and Kalman Filter 模仿自然:利用 LSTM 和卡尔曼滤波器分析蜻蜓的追逐策略
Pub Date : 2024-08-08 DOI: 10.5815/ijitcs.2024.04.06
Mehedi Hassan Zidan, Rayhan Ahmed, Khandakar Anim Hassan Adnan, Tajkurun Zannat Mumu, Md. Mahmudur Rahman, D. Karmaker
Pursuing prey by a predator is a natural phenomenon. This is an event when a predator targets and chases prey for consuming. The motive of a predator is to catch its prey whereas the motive of a prey is to escape from the predator. Earth has many predator species with different pursuing strategies. Some of them are sneaky again some of them are bolt. But their chases fail every time. A successful hunt depends on the strategy of pursuing one. Among all the predators, the Dragonflies, also known as natural drones, are considered the best predators because of their higher rate of successful hunting. If their strategy of pursuing a prey can be extracted for analysis and make an algorithm to apply on Unmanned arial vehicles, the success rate will be increased, and it will be more efficient than that of a dragonfly. We examine the pursuing strategy of a dragonfly using LSTM to predict the speed and distance between predator and prey. Also, The Kalman filter has been used to trace the trajectory of both Predator and Prey. We found that dragonflies follow distance maintenance strategy to pursue prey and try to keep its velocity constant to maintain the safe (mean) distance. This study can lead researchers to enhance the new and exciting algorithm which can be applied on Unmanned arial vehicles (UAV).
捕食者追逐猎物是一种自然现象。这是捕食者瞄准并追逐猎物进行消耗的事件。捕食者的动机是捕捉猎物,而猎物的动机则是逃离捕食者。地球上有许多捕食者物种,它们的追捕策略各不相同。它们有的鬼鬼祟祟,有的神出鬼没。但它们的追逐每次都会失败。捕猎成功与否取决于追捕策略。在所有捕食者中,被称为 "天然无人机 "的蜻蜓被认为是最好的捕食者,因为它们的捕猎成功率更高。如果能提取它们追捕猎物的策略进行分析,并制定出适用于无人飞行器的算法,就能提高成功率,而且会比蜻蜓更有效率。我们利用 LSTM 预测捕食者和猎物之间的速度和距离,研究了蜻蜓的追捕策略。此外,我们还使用卡尔曼滤波器追踪捕食者和猎物的轨迹。我们发现,蜻蜓在追逐猎物时会采取保持距离的策略,并尽量保持速度不变,以维持安全(平均)距离。这项研究可以引导研究人员改进新的令人兴奋的算法,并将其应用于无人驾驶飞行器(UAV)。
{"title":"Mimicking Nature: Analysis of Dragonfly Pursuit Strategies Using LSTM and Kalman Filter","authors":"Mehedi Hassan Zidan, Rayhan Ahmed, Khandakar Anim Hassan Adnan, Tajkurun Zannat Mumu, Md. Mahmudur Rahman, D. Karmaker","doi":"10.5815/ijitcs.2024.04.06","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.04.06","url":null,"abstract":"Pursuing prey by a predator is a natural phenomenon. This is an event when a predator targets and chases prey for consuming. The motive of a predator is to catch its prey whereas the motive of a prey is to escape from the predator. Earth has many predator species with different pursuing strategies. Some of them are sneaky again some of them are bolt. But their chases fail every time. A successful hunt depends on the strategy of pursuing one. Among all the predators, the Dragonflies, also known as natural drones, are considered the best predators because of their higher rate of successful hunting. If their strategy of pursuing a prey can be extracted for analysis and make an algorithm to apply on Unmanned arial vehicles, the success rate will be increased, and it will be more efficient than that of a dragonfly. We examine the pursuing strategy of a dragonfly using LSTM to predict the speed and distance between predator and prey. Also, The Kalman filter has been used to trace the trajectory of both Predator and Prey. We found that dragonflies follow distance maintenance strategy to pursue prey and try to keep its velocity constant to maintain the safe (mean) distance. This study can lead researchers to enhance the new and exciting algorithm which can be applied on Unmanned arial vehicles (UAV).","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"45 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141928282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Healthcare Provision in Conflict Zones: Queuing System Models for Mobile and Flexible Medical Care Units with a Limited Number of Treatment Stations 加强冲突地区的医疗服务:治疗站数量有限的移动灵活医疗单位的排队系统模型
Pub Date : 2024-08-08 DOI: 10.5815/ijitcs.2024.04.07
Anatoliy Litvinov, D. Chumachenko, Nataliia Dotsenko, I. Kadykova, I. Chumachenko
We address the challenge of optimizing the interaction between medical personnel and treatment stations within mobile and flexible medical care units (MFMCUs) in conflict zones. For the analysis of such systems, a closed queuing model with a finite number of treatment stations has been developed, which accounts for the possibility of performing multiple tasks for a single medical service request. Under the assumption of Poisson event flows, a system of integro-differential equations for the probability densities of the introduced states has been compiled. To solve it, the method of discrete binomial transformations is employed in conjunction with production functions. Solutions were obtained in the form of finite expressions, enabling the transition from the probabilistic characteristics of the model to the main performance metrics of the MFMCU: the load factor of medical personnel, and the utilization rate of treatment stations. The results show the selection of the number of treatment stations in the medical care area and the calculation of the appropriate performance of medical personnel.
我们所面临的挑战是如何优化冲突地区移动灵活医疗单位(MFMCU)内医务人员与治疗站之间的互动。为分析此类系统,我们开发了一个治疗站数量有限的封闭式排队模型,该模型考虑到了为单个医疗服务请求执行多项任务的可能性。在泊松事件流的假设下,编制了引入状态概率密度的积分微分方程系。为了求解该方程组,采用了离散二叉变换的方法并结合生产函数。以有限表达式的形式获得了解决方案,从而能够从模型的概率特征过渡到多用途医疗单元的主要性能指标:医务人员的负荷系数和治疗站的利用率。结果表明,可以选择医疗区域内的治疗站数量,并计算医务人员的适当绩效。
{"title":"Enhancing Healthcare Provision in Conflict Zones: Queuing System Models for Mobile and Flexible Medical Care Units with a Limited Number of Treatment Stations","authors":"Anatoliy Litvinov, D. Chumachenko, Nataliia Dotsenko, I. Kadykova, I. Chumachenko","doi":"10.5815/ijitcs.2024.04.07","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.04.07","url":null,"abstract":"We address the challenge of optimizing the interaction between medical personnel and treatment stations within mobile and flexible medical care units (MFMCUs) in conflict zones. For the analysis of such systems, a closed queuing model with a finite number of treatment stations has been developed, which accounts for the possibility of performing multiple tasks for a single medical service request. Under the assumption of Poisson event flows, a system of integro-differential equations for the probability densities of the introduced states has been compiled. To solve it, the method of discrete binomial transformations is employed in conjunction with production functions. Solutions were obtained in the form of finite expressions, enabling the transition from the probabilistic characteristics of the model to the main performance metrics of the MFMCU: the load factor of medical personnel, and the utilization rate of treatment stations. The results show the selection of the number of treatment stations in the medical care area and the calculation of the appropriate performance of medical personnel.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"12 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141926049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Machine Learning Based Intelligent Diabetic and Hypertensive Patient Prediction Scheme and A Mobile Application for Patients Assistance 基于机器学习的糖尿病和高血压患者智能预测方案和用于患者援助的移动应用程序
Pub Date : 2024-08-08 DOI: 10.5815/ijitcs.2024.04.02
Md. Amdad Hossain, Mahfuzulhoq Chowdhury
The inaccurate detection of diabetes and hypertension causes’ time wastage and a cost burden due to higher amounts of medicine intake and health problems. The previous works did not investigate machine learning (ML)-based diabetic and hypertension patient prediction by using multiple characteristics. This paper utilizes ML algorithms to predict the presence of diabetes and hypertension in patients. By analyzing patient data, including medical records, symptoms, and risk factors, the proposed system can provide accurate predictions for early detection and intervention. This paper makes a list of eighteen characteristics that can be used for data set preparation. With a classification accuracy of 93%, the Support Vector Machine is the best ML model in our work and is used for the diabetic and hypertension disease prediction models. This paper also gives a new mobile application that alleviates the time and cost burden by detecting diabetic and hypertensive patients, doctors, and medical information. The user evaluation and rating analysis results showed that more than sixty five percent of users declared the necessity of the proposed application features.
糖尿病和高血压的检测不准确会造成时间浪费,并因更多的药物摄入和健康问题而造成成本负担。以往的研究没有研究基于机器学习(ML)的糖尿病和高血压患者预测,而是利用多种特征进行预测。本文利用 ML 算法预测患者是否患有糖尿病和高血压。通过分析患者数据(包括病历、症状和风险因素),所提出的系统可为早期检测和干预提供准确预测。本文列出了可用于数据集准备的十八种特征。支持向量机的分类准确率高达 93%,是我们的工作中最好的 ML 模型,并被用于糖尿病和高血压疾病预测模型。本文还给出了一个新的移动应用程序,通过检测糖尿病和高血压患者、医生和医疗信息,减轻了时间和成本负担。用户评价和评分分析结果显示,超过百分之六十五的用户表示有必要使用所提出的应用功能。
{"title":"A Machine Learning Based Intelligent Diabetic and Hypertensive Patient Prediction Scheme and A Mobile Application for Patients Assistance","authors":"Md. Amdad Hossain, Mahfuzulhoq Chowdhury","doi":"10.5815/ijitcs.2024.04.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.04.02","url":null,"abstract":"The inaccurate detection of diabetes and hypertension causes’ time wastage and a cost burden due to higher amounts of medicine intake and health problems. The previous works did not investigate machine learning (ML)-based diabetic and hypertension patient prediction by using multiple characteristics. This paper utilizes ML algorithms to predict the presence of diabetes and hypertension in patients. By analyzing patient data, including medical records, symptoms, and risk factors, the proposed system can provide accurate predictions for early detection and intervention. This paper makes a list of eighteen characteristics that can be used for data set preparation. With a classification accuracy of 93%, the Support Vector Machine is the best ML model in our work and is used for the diabetic and hypertension disease prediction models. This paper also gives a new mobile application that alleviates the time and cost burden by detecting diabetic and hypertensive patients, doctors, and medical information. The user evaluation and rating analysis results showed that more than sixty five percent of users declared the necessity of the proposed application features.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":"16 15","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141927782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security based on IoT for e-Health Care Using RFID Technology and Steganography 利用 RFID 技术和隐写术实现基于物联网的电子医疗信息安全
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.03
Bahubali Akiwate, Sanjay Ankali, S.G. Gollagi, N. Ghani
The Internet of Things (IoT) allows you to connect a broad spectrum of smart devices through the Internet. Incorporating IoT sensors for remote health monitoring is a game-changer for the medical industry, especially in limited spaces. Environmental sensors can be installed in small rooms to monitor an individual's health. Through low-cost sensors, as the core of the IoT physical layer, the RF (Radio Frequency) identification technique is advanced enough to facilitate personal healthcare. Recently, RFID technology has been utilized in the healthcare sector to enhance accurate data collection through various software systems. Steganography is a method that makes user data more secure than it has ever been before. The necessity of upholding secrecy in the widely used healthcare system will be covered in this solution. Health monitoring sensors are a crucial tool for analyzing real-time data and developing the medical box, an innovative solution that provides patients with access to medical assistance. By monitoring patients remotely, healthcare professionals can provide prompt medical attention whenever needed while ensuring patients' privacy and personal information are protected.
物联网(IoT)允许您通过互联网连接各种智能设备。将物联网传感器用于远程健康监测是医疗行业的一大变革,尤其是在有限的空间内。可以在狭小的房间内安装环境传感器,以监测个人的健康状况。通过低成本传感器,作为物联网物理层的核心,射频(RF)识别技术已足够先进,可促进个人医疗保健。最近,射频识别技术已被用于医疗保健领域,通过各种软件系统提高数据收集的准确性。隐写术是一种使用户数据比以往更加安全的方法。本解决方案将介绍在广泛使用的医疗保健系统中维护保密性的必要性。健康监测传感器是分析实时数据和开发医疗箱的重要工具,医疗箱是为患者提供医疗援助的创新解决方案。通过远程监控病人,医护人员可以在需要时提供及时的医疗服务,同时确保病人的隐私和个人信息得到保护。
{"title":"Information Security based on IoT for e-Health Care Using RFID Technology and Steganography","authors":"Bahubali Akiwate, Sanjay Ankali, S.G. Gollagi, N. Ghani","doi":"10.5815/ijitcs.2024.03.03","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.03","url":null,"abstract":"The Internet of Things (IoT) allows you to connect a broad spectrum of smart devices through the Internet. Incorporating IoT sensors for remote health monitoring is a game-changer for the medical industry, especially in limited spaces. Environmental sensors can be installed in small rooms to monitor an individual's health. Through low-cost sensors, as the core of the IoT physical layer, the RF (Radio Frequency) identification technique is advanced enough to facilitate personal healthcare. Recently, RFID technology has been utilized in the healthcare sector to enhance accurate data collection through various software systems. Steganography is a method that makes user data more secure than it has ever been before. The necessity of upholding secrecy in the widely used healthcare system will be covered in this solution. Health monitoring sensors are a crucial tool for analyzing real-time data and developing the medical box, an innovative solution that provides patients with access to medical assistance. By monitoring patients remotely, healthcare professionals can provide prompt medical attention whenever needed while ensuring patients' privacy and personal information are protected.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Deep Learning Models for Accurate Retinal Disease State Detection 用于准确检测视网膜疾病状态的高级深度学习模型
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.06
Hossein. Abbasi, Ahmed. Alshaeeb, Yasin Orouskhani, Behrouz. Rahimi, Mostafa Shomalzadeh
Retinal diseases are a significant challenge in the realm of medical diagnosis, with potential complications to vision and overall ocular health. This research endeavors to address the challenge of automating the detection of retinal disease states using advanced deep learning models, including VGG-19, ResNet-50, InceptionV3, and EfficientNetV2. Each model leverages transfer learning, drawing insights from a substantial dataset comprising optical coherence tomography (OCT) images and subsequently classifying images into four distinct retinal conditions: choroidal neovascularization, drusen, diabetic macular edema and a healthy state. The training dataset, sourced from repositories that are available to the public including OCT retinal images, spanning all four disease categories. Our findings reveal that among the models tested, EfficientNetV2 demonstrates superior performance, with a remarkable classification accuracy of 98.92%, precision of 99.6%, and a recall of 99.4%, surpassing the performance of the other models.
视网膜疾病是医学诊断领域的一大挑战,对视力和整体眼部健康具有潜在的并发症。这项研究致力于利用先进的深度学习模型(包括 VGG-19、ResNet-50、InceptionV3 和 EfficientNetV2)来应对视网膜疾病状态自动检测的挑战。每个模型都利用迁移学习,从包含光学相干断层扫描(OCT)图像的大量数据集中汲取洞察力,随后将图像分类为四种不同的视网膜状况:脉络膜新生血管、色素沉着、糖尿病性黄斑水肿和健康状态。训练数据集来自公共资源库,包括 OCT 视网膜图像,涵盖所有四种疾病类别。我们的研究结果表明,在所测试的模型中,EfficientNetV2 表现出卓越的性能,其分类准确率高达 98.92%,精确率高达 99.6%,召回率高达 99.4%,超过了其他模型。
{"title":"Advanced Deep Learning Models for Accurate Retinal Disease State Detection","authors":"Hossein. Abbasi, Ahmed. Alshaeeb, Yasin Orouskhani, Behrouz. Rahimi, Mostafa Shomalzadeh","doi":"10.5815/ijitcs.2024.03.06","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.06","url":null,"abstract":"Retinal diseases are a significant challenge in the realm of medical diagnosis, with potential complications to vision and overall ocular health. This research endeavors to address the challenge of automating the detection of retinal disease states using advanced deep learning models, including VGG-19, ResNet-50, InceptionV3, and EfficientNetV2. Each model leverages transfer learning, drawing insights from a substantial dataset comprising optical coherence tomography (OCT) images and subsequently classifying images into four distinct retinal conditions: choroidal neovascularization, drusen, diabetic macular edema and a healthy state. The training dataset, sourced from repositories that are available to the public including OCT retinal images, spanning all four disease categories. Our findings reveal that among the models tested, EfficientNetV2 demonstrates superior performance, with a remarkable classification accuracy of 98.92%, precision of 99.6%, and a recall of 99.4%, surpassing the performance of the other models.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamental Frequency Extraction by Utilizing Accumulated Power Spectrum based Weighted Autocorrelation Function in Noisy Speech 在噪声语音中利用基于累积功率谱的加权自相关函数提取基频
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.05
Nargis Parvin, Moinur Rahman, Irana Tabassum Ananna, Md. Saifur Rahman
This research suggests an efficient idea that is better suited for speech processing applications for retrieving the accurate pitch from speech signal in noisy conditions. For this objective, we present a fundamental frequency extraction algorithm and that is tolerant to the non-stationary changes of the amplitude and frequency of the input signal. Moreover, we use an accumulated power spectrum instead of power spectrum, which uses the shorter sub-frames of the input signal to reduce the noise characteristics of the speech signals. To increase the accuracy of the fundamental frequency extraction we have concentrated on maintaining the speech harmonics in their original state and suppressing the noise elements involved in the noisy speech signal. The two stages that make up the suggested fundamental frequency extraction approach are producing the accumulated power spectrum of the speech signal and weighting it with the average magnitude difference function. As per the experiment results, the proposed technique appears to be better in noisy situations than other existing state-of-the-art methods such as Weighted Autocorrelation Function (WAF), PEFAC, and BaNa.
这项研究提出了一种更适合语音处理应用的高效思路,可在噪声条件下从语音信号中提取准确的音高。为此,我们提出了一种基频提取算法,该算法对输入信号的振幅和频率的非稳态变化具有容忍性。此外,我们使用累积功率谱代替功率谱,利用输入信号的较短子帧来降低语音信号的噪声特性。为了提高基频提取的准确性,我们集中精力保持语音谐波的原始状态,并抑制噪声语音信号中的噪声元素。所建议的基频提取方法分为两个阶段,一是生成语音信号的累积功率谱,二是用平均幅度差函数对其进行加权。实验结果表明,与加权自相关函数 (WAF)、PEFAC 和 BaNa 等其他现有的先进方法相比,建议的技术在噪声环境中的效果更好。
{"title":"Fundamental Frequency Extraction by Utilizing Accumulated Power Spectrum based Weighted Autocorrelation Function in Noisy Speech","authors":"Nargis Parvin, Moinur Rahman, Irana Tabassum Ananna, Md. Saifur Rahman","doi":"10.5815/ijitcs.2024.03.05","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.05","url":null,"abstract":"This research suggests an efficient idea that is better suited for speech processing applications for retrieving the accurate pitch from speech signal in noisy conditions. For this objective, we present a fundamental frequency extraction algorithm and that is tolerant to the non-stationary changes of the amplitude and frequency of the input signal. Moreover, we use an accumulated power spectrum instead of power spectrum, which uses the shorter sub-frames of the input signal to reduce the noise characteristics of the speech signals. To increase the accuracy of the fundamental frequency extraction we have concentrated on maintaining the speech harmonics in their original state and suppressing the noise elements involved in the noisy speech signal. The two stages that make up the suggested fundamental frequency extraction approach are producing the accumulated power spectrum of the speech signal and weighting it with the average magnitude difference function. As per the experiment results, the proposed technique appears to be better in noisy situations than other existing state-of-the-art methods such as Weighted Autocorrelation Function (WAF), PEFAC, and BaNa.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 45","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141370228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A PRISMA-driven Review of Speech Recognition based on English, Mandarin Chinese, Hindi and Urdu Language 基于 PRISMA 的英语、中文普通话、印地语和乌尔都语语音识别综述
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.04
Muhammad Hazique Khatri, Humera Tariq, Maryam Feroze, Ebad Ali, Zeeshan Anjum Junaidi
The objective of this PRISMA-Driven systematic review is to analyze the relative progress of Urdu speech recognition for the very first time by comparing it mainly with three selected languages; English, Mandarin Chinese, and Hindi based on Artificially Intelligent (AI) building blocks i.e. datasets, feature extraction techniques, experimental design, acoustic and language models. The selection of languages embarks from the speakers of a particular language which reveals that the chosen languages are the world's top spoken languages while Urdu ranks at number ten and is continuously progressing. A total of 176 articles were extracted from the Google Scholar database using custom queries for each language. Among them, 47 articles were selected including 5 review articles and 42 research articles, as per our inclusion criteria and after undergoing quality assessment checks. Comparative research has been designed and findings were organized based on four possible speech types i.e. spontaneous, continuous, connected words and isolated words; twenty-one datasets inclusive benchmark; MFCC, Triangular, Mel spectrogram and Log Mel features; state-of-the-art acoustic and language models; and recognition performance. The findings presented in this systematic literature review have enlightened Urdu and Hindi research towards the best available AI and deep learning practices of English and Mandarin Chinese primarily Triangular filters, Mel spectrogram, Transformers, and Attention as these techniques reveal recent trends and achieved breakthrough performance evident by their word error rate, character error rate, and perplexity.
本 PRISMA 驱动的系统性综述旨在分析乌尔都语语音识别的相对进展,首次将其与三种选定的语言(英语、汉语普通话和印地语)进行比较,比较的基础是人工智能(AI)构建模块,即数据集、特征提取技术、实验设计、声学和语言模型。语言的选择来自于特定语言的使用者,这表明所选择的语言是世界上最常用的语言,而乌尔都语排名第十,并且还在不断进步。通过对每种语言的自定义查询,我们从谷歌学术数据库中共提取了 176 篇文章。根据我们的收录标准,并经过质量评估检查,从中挑选出 47 篇文章,包括 5 篇评论文章和 42 篇研究文章。比较研究是根据四种可能的语音类型(即自发语音、连续语音、连接词和孤立词)、21 个数据集(包括基准)、MFCC、三角、梅尔频谱图和对数梅尔特征、最先进的声学和语言模型以及识别性能进行设计和整理的。本系统性文献综述中的研究结果启发了乌尔都语和印地语研究人员对英语和汉语普通话的最佳可用人工智能和深度学习实践进行研究,主要是三角滤波器、梅尔频谱图、变换器和注意力,因为这些技术揭示了最新趋势,并通过其单词错误率、字符错误率和易错性实现了突破性性能。
{"title":"A PRISMA-driven Review of Speech Recognition based on English, Mandarin Chinese, Hindi and Urdu Language","authors":"Muhammad Hazique Khatri, Humera Tariq, Maryam Feroze, Ebad Ali, Zeeshan Anjum Junaidi","doi":"10.5815/ijitcs.2024.03.04","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.04","url":null,"abstract":"The objective of this PRISMA-Driven systematic review is to analyze the relative progress of Urdu speech recognition for the very first time by comparing it mainly with three selected languages; English, Mandarin Chinese, and Hindi based on Artificially Intelligent (AI) building blocks i.e. datasets, feature extraction techniques, experimental design, acoustic and language models. The selection of languages embarks from the speakers of a particular language which reveals that the chosen languages are the world's top spoken languages while Urdu ranks at number ten and is continuously progressing. A total of 176 articles were extracted from the Google Scholar database using custom queries for each language. Among them, 47 articles were selected including 5 review articles and 42 research articles, as per our inclusion criteria and after undergoing quality assessment checks. Comparative research has been designed and findings were organized based on four possible speech types i.e. spontaneous, continuous, connected words and isolated words; twenty-one datasets inclusive benchmark; MFCC, Triangular, Mel spectrogram and Log Mel features; state-of-the-art acoustic and language models; and recognition performance. The findings presented in this systematic literature review have enlightened Urdu and Hindi research towards the best available AI and deep learning practices of English and Mandarin Chinese primarily Triangular filters, Mel spectrogram, Transformers, and Attention as these techniques reveal recent trends and achieved breakthrough performance evident by their word error rate, character error rate, and perplexity.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 29","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141369988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Brain Tumor Classification in MRI: Leveraging Deep Convolutional Neural Networks for Improved Accuracy 增强磁共振成像中的脑肿瘤分类:利用深度卷积神经网络提高准确性
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.02
Shourove Sutradhar Dip, Md. Habibur Rahman, Nazrul Islam, Md. Easin Arafat, Pulak Kanti Bhowmick, Mohammad Abu Yousuf
Brain tumors are among the deadliest forms of cancer, and there is a significant death rate in patients. Identifying and classifying brain tumors are critical steps in understanding their functioning. The best way to treat a brain tumor depends on its type, size, and location. In the modern era, Radiologists utilize Brain tumor locations that can be determined using magnetic resonance imaging (MRI). However, manual tests and MRI examinations are time-consuming and require skills. In addition, misdiagnosis of tumors can lead to inappropriate medical therapy, which could reduce their chances of living. As technology advances in Deep Learning (DL), Computer Assisted Diagnosis (CAD) as well as Machine Learning (ML) technique has been developed to aid in the detection of brain tumors, radiologists can now more accurately identify brain tumors. This paper proposes an MRI image classification using a VGG16 model to make a deep convolutional neural network (DCNN) architecture. The proposed model was evaluated with two sets of brain MRI data from Kaggle. Considering both datasets during the training at Google Colab, the proposed method achieved significant performance with a maximum overall accuracy of 96.67% and 97.67%, respectively. The proposed model was reported to have worked well during the training period and been highly accurate. The proposed model's performance criteria go beyond existing techniques.
脑肿瘤是最致命的癌症之一,患者死亡率很高。识别和分类脑肿瘤是了解其功能的关键步骤。治疗脑瘤的最佳方法取决于其类型、大小和位置。在现代,放射科医生利用磁共振成像(MRI)来确定脑肿瘤的位置。然而,人工测试和核磁共振成像检查既耗时又需要技术。此外,对肿瘤的误诊会导致不恰当的医疗治疗,从而降低患者的生存机会。随着深度学习(DL)、计算机辅助诊断(CAD)以及机器学习(ML)技术的发展,放射科医生现在可以更准确地识别脑肿瘤。本文提出了一种使用 VGG16 模型进行磁共振成像分类的深度卷积神经网络(DCNN)架构。我们用 Kaggle 上的两组脑部 MRI 数据对所提出的模型进行了评估。在谷歌实验室训练期间,考虑到这两个数据集,所提出的方法取得了显著的性能,最高总体准确率分别为 96.67% 和 97.67%。据报告,所提出的模型在训练期间运行良好,准确率很高。拟议模型的性能标准超越了现有技术。
{"title":"Enhancing Brain Tumor Classification in MRI: Leveraging Deep Convolutional Neural Networks for Improved Accuracy","authors":"Shourove Sutradhar Dip, Md. Habibur Rahman, Nazrul Islam, Md. Easin Arafat, Pulak Kanti Bhowmick, Mohammad Abu Yousuf","doi":"10.5815/ijitcs.2024.03.02","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.02","url":null,"abstract":"Brain tumors are among the deadliest forms of cancer, and there is a significant death rate in patients. Identifying and classifying brain tumors are critical steps in understanding their functioning. The best way to treat a brain tumor depends on its type, size, and location. In the modern era, Radiologists utilize Brain tumor locations that can be determined using magnetic resonance imaging (MRI). However, manual tests and MRI examinations are time-consuming and require skills. In addition, misdiagnosis of tumors can lead to inappropriate medical therapy, which could reduce their chances of living. As technology advances in Deep Learning (DL), Computer Assisted Diagnosis (CAD) as well as Machine Learning (ML) technique has been developed to aid in the detection of brain tumors, radiologists can now more accurately identify brain tumors. This paper proposes an MRI image classification using a VGG16 model to make a deep convolutional neural network (DCNN) architecture. The proposed model was evaluated with two sets of brain MRI data from Kaggle. Considering both datasets during the training at Google Colab, the proposed method achieved significant performance with a maximum overall accuracy of 96.67% and 97.67%, respectively. The proposed model was reported to have worked well during the training period and been highly accurate. The proposed model's performance criteria go beyond existing techniques.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Test Performance of BSIT Students and Question Quality: A Study on Item Difficulty Index and Item Discrimination Index for Test Question Improvement 分析 BSIT 学生的考试成绩和试题质量:试题难度指数和试题区分度指数对试题改进的影响研究
Pub Date : 2024-06-08 DOI: 10.5815/ijitcs.2024.03.01
C. P. Olipas, Ruth G. Luciano
This study presents a comprehensive assessment of the test performance of Bachelor of Science in Information Technology (BSIT) students in the System Integration and Architecture (SIA) course, coupled with a meticulous examination of the quality of test questions, aiming to lay the groundwork for enhancing the assessment tool. Employing a cross-sectional research design, the study involved 200 fourth-year students enrolled in the course. The results illuminated a significant discrepancy in scores between upper and lower student cohorts, highlighting the necessity for targeted interventions, curriculum enhancements, and assessment refinements, particularly for those in the lower-performing group. Further examination of the item difficulty index of the assessment tool unveiled the need to fine-tune certain items to better suit a broader spectrum of students. Nevertheless, the majority of items were deemed adequately aligned with their respective difficulty levels. Additionally, an analysis of the item discrimination index identified 25 items suitable for retention, while 27 items warranted revision, and 3 items were suitable for removal, as per the analysis outcomes. These insights provide a valuable foundation for improving the assessment tool, thereby optimizing its capacity to evaluate students' acquired knowledge effectively. The study's novel contribution lies in its integration of both student performance assessment and evaluation of assessment tool quality within the BSIT program, offering actionable insights for improving educational outcomes. By identifying challenges faced by BSIT students and proposing targeted interventions, curriculum enhancements, and assessment refinements, the research advances our understanding of effective assessment practices. Furthermore, the detailed analysis of item difficulty and discrimination indices offers practical guidance for enhancing the reliability and validity of assessment tools in the BSIT program. Overall, this research contributes to the existing body of knowledge by providing empirical evidence and actionable recommendations tailored to the needs of BSIT students, promoting educational quality and student success in Information Technology.
本研究对信息技术学士(BSIT)学生在系统集成与架构(SIA)课程中的考试成绩进行了全面评估,并对试题质量进行了细致检查,旨在为改进评估工具奠定基础。该研究采用横断面研究设计,涉及 200 名该课程的四年级学生。研究结果表明,高年级学生和低年级学生之间的分数差距很大,这突出表明有必要采取有针对性的干预措施、加强课程设置和改进评估方法,尤其是针对成绩较差的学生。对评估工具项目难度指数的进一步研究表明,有必要对某些项目进行微调,以更好地适应更广泛的学生群体。尽管如此,大部分项目还是被认为与各自的难度水平相匹配。此外,根据对项目辨别指数的分析结果,有 25 个项目适合保留,27 个项目需要修改,3 个项目适合删除。这些见解为改进测评工具,从而优化其有效评价学生所学知识的能力奠定了宝贵的基础。这项研究的新颖之处在于,它将学生成绩评估和评估工具质量评估整合到了 BSIT 项目中,为改善教育成果提供了可操作的见解。通过确定 BSIT 学生面临的挑战,并提出有针对性的干预措施、课程改进和评估改进建议,该研究推进了我们对有效评估实践的理解。此外,对项目难度和区分度指数的详细分析为提高 BSIT 项目中评估工具的可靠性和有效性提供了实用指导。总之,这项研究为现有的知识体系做出了贡献,针对 BSIT 学生的需求提供了经验证据和可操作的建议,促进了信息技术专业的教育质量和学生的成功。
{"title":"Analyzing Test Performance of BSIT Students and Question Quality: A Study on Item Difficulty Index and Item Discrimination Index for Test Question Improvement","authors":"C. P. Olipas, Ruth G. Luciano","doi":"10.5815/ijitcs.2024.03.01","DOIUrl":"https://doi.org/10.5815/ijitcs.2024.03.01","url":null,"abstract":"This study presents a comprehensive assessment of the test performance of Bachelor of Science in Information Technology (BSIT) students in the System Integration and Architecture (SIA) course, coupled with a meticulous examination of the quality of test questions, aiming to lay the groundwork for enhancing the assessment tool. Employing a cross-sectional research design, the study involved 200 fourth-year students enrolled in the course. The results illuminated a significant discrepancy in scores between upper and lower student cohorts, highlighting the necessity for targeted interventions, curriculum enhancements, and assessment refinements, particularly for those in the lower-performing group. Further examination of the item difficulty index of the assessment tool unveiled the need to fine-tune certain items to better suit a broader spectrum of students. Nevertheless, the majority of items were deemed adequately aligned with their respective difficulty levels. Additionally, an analysis of the item discrimination index identified 25 items suitable for retention, while 27 items warranted revision, and 3 items were suitable for removal, as per the analysis outcomes. These insights provide a valuable foundation for improving the assessment tool, thereby optimizing its capacity to evaluate students' acquired knowledge effectively. The study's novel contribution lies in its integration of both student performance assessment and evaluation of assessment tool quality within the BSIT program, offering actionable insights for improving educational outcomes. By identifying challenges faced by BSIT students and proposing targeted interventions, curriculum enhancements, and assessment refinements, the research advances our understanding of effective assessment practices. Furthermore, the detailed analysis of item difficulty and discrimination indices offers practical guidance for enhancing the reliability and validity of assessment tools in the BSIT program. Overall, this research contributes to the existing body of knowledge by providing empirical evidence and actionable recommendations tailored to the needs of BSIT students, promoting educational quality and student success in Information Technology.","PeriodicalId":130361,"journal":{"name":"International Journal of Information Technology and Computer Science","volume":" 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141368163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1