首页 > 最新文献

IEEE Open Journal of the Computer Society最新文献

英文 中文
Publish Subscribe System Security Requirement: A Case Study for V2V Communication 发布订阅系统安全要求:V2V 通信案例研究
Pub Date : 2024-08-14 DOI: 10.1109/OJCS.2024.3442921
Hemant Gupta;Amiya Nayak
The Internet of Things (IoT) enables the linkage between the physical and digital domains, with wireless sensor networks (WSNs) playing a vital role in this procedure. The market is saturated with an abundance of IoT devices, a substantial proportion of which are designed for consumer use and have restricted power and memory capabilities. Our analysis found that there is very little research done on defining the security requirements of the IoT ecosystem. A crucial first step in the design process of a secure product entails meticulously scrutinizing and recording the precise security requirements. This paper focuses on defining security requirements for Vehicle-to-Vehicle (V2V) communication systems. The requirements are specified utilizing the Message Queuing Telemetry Transport for Sensor Network (MQTT-SN) communication protocol architecture, specifically tailored for use in sensor networks. The modified Security Requirement Engineering Process (SREP) and Security Quality Requirement Engineering (SQUARE) methodologies have been used in this paper for the case study. The security of the communication between the ClientApp and the road-side infrastructure is our main priority.
物联网(IoT)实现了物理和数字领域之间的连接,无线传感器网络(WSN)在这一过程中发挥着至关重要的作用。市场上大量的物联网设备已经饱和,其中相当一部分是为消费者使用而设计的,其功率和内存能力受到限制。我们的分析发现,在定义物联网生态系统安全要求方面的研究很少。在安全产品的设计过程中,至关重要的第一步就是仔细审查和记录精确的安全要求。本文的重点是定义车对车(V2V)通信系统的安全要求。这些要求是利用专为传感器网络量身定制的传感器网络消息队列遥测传输(MQTT-SN)通信协议架构来规定的。本文在案例研究中使用了修改后的安全需求工程流程(SREP)和安全质量需求工程(SQUARE)方法。客户端应用程序与路边基础设施之间的通信安全是我们的首要任务。
{"title":"Publish Subscribe System Security Requirement: A Case Study for V2V Communication","authors":"Hemant Gupta;Amiya Nayak","doi":"10.1109/OJCS.2024.3442921","DOIUrl":"https://doi.org/10.1109/OJCS.2024.3442921","url":null,"abstract":"The Internet of Things (IoT) enables the linkage between the physical and digital domains, with wireless sensor networks (WSNs) playing a vital role in this procedure. The market is saturated with an abundance of IoT devices, a substantial proportion of which are designed for consumer use and have restricted power and memory capabilities. Our analysis found that there is very little research done on defining the security requirements of the IoT ecosystem. A crucial first step in the design process of a secure product entails meticulously scrutinizing and recording the precise security requirements. This paper focuses on defining security requirements for Vehicle-to-Vehicle (V2V) communication systems. The requirements are specified utilizing the Message Queuing Telemetry Transport for Sensor Network (MQTT-SN) communication protocol architecture, specifically tailored for use in sensor networks. The modified Security Requirement Engineering Process (SREP) and Security Quality Requirement Engineering (SQUARE) methodologies have been used in this paper for the case study. The security of the communication between the ClientApp and the road-side infrastructure is our main priority.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"389-405"},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10636299","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
InFER++: Real-World Indian Facial Expression Dataset InFER++:真实世界印度面部表情数据集
Pub Date : 2024-08-14 DOI: 10.1109/OJCS.2024.3443511
Syed Sameen Ahmad Rizvi;Aryan Seth;Jagat Sesh Challa;Pratik Narang
Detecting facial expressions is a challenging task in the field of computer vision. Several datasets and algorithms have been proposed over the past two decades; however, deploying them in real-world, in-the-wild scenarios hampers the overall performance. This is because the training data does not completely represent socio-cultural and ethnic diversity; the majority of the datasets consist of American and Caucasian populations. On the contrary, in a diverse and heterogeneous population distribution like the Indian subcontinent, the need for a significantly large enough dataset representing all the ethnic groups is even more critical. To address this, we present InFER++, an India-specific, multi-ethnic, real-world, in-the-wild facial expression dataset consisting of seven basic expressions. To the best of our knowledge, this is the largest India-specific facial expression dataset. Our cross-dataset analysis of RAF-DB vs InFER++ shows that models trained on RAF-DB were not generalizable to ethnic datasets like InFER++. This is because the facial expressions change with respect to ethnic and socio-cultural factors. We also present LiteXpressionNet, a lightweight deep facial expression network that outperforms many existing lightweight models with considerably fewer FLOPs and parameters. The proposed model is inspired by MobileViTv2 architecture, which utilizes GhostNetv2 blocks to increase parametrization while reducing latency and FLOP requirements. The model is trained with a novel objective function that combines early learning regularization and symmetric cross-entropy loss to mitigate human uncertainties and annotation bias in most real-world facial expression datasets.
检测面部表情是计算机视觉领域一项极具挑战性的任务。在过去的二十年里,人们提出了多种数据集和算法;然而,将它们部署在真实世界的野外场景中会影响整体性能。这是因为训练数据并不能完全代表社会文化和种族的多样性;大多数数据集都是由美国人和白种人组成的。相反,在印度次大陆这样一个多元异质的人口分布地区,更需要一个足够大的数据集来代表所有的种族群体。为了解决这个问题,我们提出了 InFER++,这是一个印度特有的、多种族的、真实世界中的野外面部表情数据集,由七种基本表情组成。据我们所知,这是最大的印度特定面部表情数据集。我们对 RAF-DB 和 InFER++ 进行的跨数据集分析表明,在 RAF-DB 上训练的模型无法推广到像 InFER++ 这样的种族数据集。这是因为面部表情会因种族和社会文化因素而改变。我们还提出了 LiteXpressionNet,这是一种轻量级深度面部表情网络,其表现优于许多现有的轻量级模型,而且 FLOPs 和参数都少得多。我们提出的模型受到 MobileViTv2 架构的启发,该架构利用 GhostNetv2 块来提高参数化程度,同时降低延迟和 FLOP 要求。该模型采用新颖的目标函数进行训练,该函数结合了早期学习正则化和对称交叉熵损失,以减轻大多数真实世界面部表情数据集中的人为不确定性和注释偏差。
{"title":"InFER++: Real-World Indian Facial Expression Dataset","authors":"Syed Sameen Ahmad Rizvi;Aryan Seth;Jagat Sesh Challa;Pratik Narang","doi":"10.1109/OJCS.2024.3443511","DOIUrl":"https://doi.org/10.1109/OJCS.2024.3443511","url":null,"abstract":"Detecting facial expressions is a challenging task in the field of computer vision. Several datasets and algorithms have been proposed over the past two decades; however, deploying them in real-world, in-the-wild scenarios hampers the overall performance. This is because the training data does not completely represent socio-cultural and ethnic diversity; the majority of the datasets consist of American and Caucasian populations. On the contrary, in a diverse and heterogeneous population distribution like the Indian subcontinent, the need for a significantly large enough dataset representing all the ethnic groups is even more critical. To address this, we present InFER++, an India-specific, multi-ethnic, real-world, in-the-wild facial expression dataset consisting of seven basic expressions. To the best of our knowledge, this is the largest India-specific facial expression dataset. Our cross-dataset analysis of RAF-DB vs InFER++ shows that models trained on RAF-DB were not generalizable to ethnic datasets like InFER++. This is because the facial expressions change with respect to ethnic and socio-cultural factors. We also present LiteXpressionNet, a lightweight deep facial expression network that outperforms many existing lightweight models with considerably fewer FLOPs and parameters. The proposed model is inspired by MobileViTv2 architecture, which utilizes GhostNetv2 blocks to increase parametrization while reducing latency and FLOP requirements. The model is trained with a novel objective function that combines early learning regularization and symmetric cross-entropy loss to mitigate human uncertainties and annotation bias in most real-world facial expression datasets.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"406-417"},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10636346","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142121603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Musical Genre Classification Using Advanced Audio Analysis and Deep Learning Techniques 利用高级音频分析和深度学习技术进行音乐流派分类
Pub Date : 2024-07-19 DOI: 10.1109/OJCS.2024.3431229
Mumtahina Ahmed;Uland Rozario;Md Mohshin Kabir;Zeyar Aung;Jungpil Shin;M. F. Mridha
Classifying music genres has been a significant problem in the decade of seamless music streaming platforms and countless content creations. An accurate music genre classification is a fundamental task with applications in music recommendation, content organization, and understanding musical trends. This study presents a comprehensive approach to music genre classification using deep learning and advanced audio analysis techniques. In this study, a deep learning method was used to tackle the task of music genre classification. For this study, the GTZAN dataset was chosen for music genre classification. This study examines the challenge of music genre categorization using Convolutional Neural Networks (CNN), Feedforward Neural Networks (FNN), Support Vector Machine (SVM), k-nearest Neighbors (kNN), and Long Short-term Memory (LSTM) models on the dataset. This study precisely cross-validates the model's output following feature extraction from pre-processed audio data and then evaluates its performance. The modified CNN model performs better than conventional NN models by using its capacity to capture complex spectrogram patterns. These results highlight how deep learning algorithms may improve systems for categorizing music genres, with implications for various music-related applications and user interfaces. Up to this point, 92.7% of the GTZAN dataset's correctness has been achieved on the GTZAN dataset and 91.6% on the ISMIR2004 Ballroom dataset.
在无缝音乐流媒体平台和无数内容创作的十年间,音乐流派分类一直是一个重要问题。准确的音乐流派分类是一项基本任务,可应用于音乐推荐、内容组织和了解音乐趋势。本研究提出了一种利用深度学习和先进音频分析技术进行音乐流派分类的综合方法。本研究采用深度学习方法来处理音乐流派分类任务。本研究选择 GTZAN 数据集进行音乐流派分类。本研究在数据集上使用卷积神经网络(CNN)、前馈神经网络(FNN)、支持向量机(SVM)、k-近邻(kNN)和长短期记忆(LSTM)模型来研究音乐流派分类所面临的挑战。本研究精确地交叉验证了从预处理音频数据中提取特征后的模型输出,然后评估了其性能。改进后的 CNN 模型利用其捕捉复杂频谱图模式的能力,表现优于传统的 NN 模型。这些结果凸显了深度学习算法如何改进音乐类型分类系统,并对各种音乐相关应用和用户界面产生了影响。到目前为止,GTZAN 数据集的正确率达到 92.7%,ISMIR2004 Ballroom 数据集的正确率达到 91.6%。
{"title":"Musical Genre Classification Using Advanced Audio Analysis and Deep Learning Techniques","authors":"Mumtahina Ahmed;Uland Rozario;Md Mohshin Kabir;Zeyar Aung;Jungpil Shin;M. F. Mridha","doi":"10.1109/OJCS.2024.3431229","DOIUrl":"10.1109/OJCS.2024.3431229","url":null,"abstract":"Classifying music genres has been a significant problem in the decade of seamless music streaming platforms and countless content creations. An accurate music genre classification is a fundamental task with applications in music recommendation, content organization, and understanding musical trends. This study presents a comprehensive approach to music genre classification using deep learning and advanced audio analysis techniques. In this study, a deep learning method was used to tackle the task of music genre classification. For this study, the GTZAN dataset was chosen for music genre classification. This study examines the challenge of music genre categorization using Convolutional Neural Networks (CNN), Feedforward Neural Networks (FNN), Support Vector Machine (SVM), k-nearest Neighbors (kNN), and Long Short-term Memory (LSTM) models on the dataset. This study precisely cross-validates the model's output following feature extraction from pre-processed audio data and then evaluates its performance. The modified CNN model performs better than conventional NN models by using its capacity to capture complex spectrogram patterns. These results highlight how deep learning algorithms may improve systems for categorizing music genres, with implications for various music-related applications and user interfaces. Up to this point, 92.7% of the GTZAN dataset's correctness has been achieved on the GTZAN dataset and 91.6% on the ISMIR2004 Ballroom dataset.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"457-467"},"PeriodicalIF":0.0,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10605044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141741079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeepCon: Unleashing the Power of Divide and Conquer Deep Learning for Colorectal Cancer Classification DeepCon:为结直肠癌分类释放分而治之深度学习的力量
Pub Date : 2024-07-16 DOI: 10.1109/OJCS.2024.3428970
Suhaib Chughtai;Zakaria Senousy;Ahmed Mahany;Nouh Sabri Elmitwally;Khalid N. Ismail;Mohamed Medhat Gaber;Mohammed M. Abdelsamea
Colorectal cancer (CRC) is the second leading cause of cancer-related mortality. Precise diagnosis of CRC plays a crucial role in increasing patient survival rates and formulating effective treatment strategies. Deep learning algorithms have demonstrated remarkable proficiency in the precise categorization of histopathology images. In this article, we introduce a novel deep learning model, termed DeepCon which incorporates the divide-and-conquer principle into the classification task. DeepCon has been methodically conceived to scrutinize the influence of acquired composition on the learning process, with a specific application to the classification of histology images related to CRC. Our model harnesses pre-trained networks to extract features from both the source and target domains, employing a two-stage transfer learning approach encompassing multiple loss functions. Our transfer learning strategy exploits a learned composition of decomposed images to enhance the transferability of extracted features. The efficacy of the proposed model was assessed using a clinically valid dataset of 5000 CRC images. The experimental results reveal that DeepCon when coupled with the Xception network as the backbone model and subjected to extensive fine-tuning, achieved a remarkable accuracy rate of 98.4% and an F1 score of 98.4%.
结直肠癌(CRC)是导致癌症相关死亡的第二大原因。CRC 的精确诊断对于提高患者生存率和制定有效的治疗策略起着至关重要的作用。深度学习算法在组织病理学图像的精确分类方面表现出了非凡的能力。在本文中,我们介绍了一种新的深度学习模型,称为 DeepCon,它将分而治之的原则融入到分类任务中。DeepCon 的构思有条不紊,旨在仔细研究后天组成对学习过程的影响,并具体应用于与 CRC 相关的组织学图像分类。我们的模型利用预先训练好的网络从源域和目标域提取特征,并采用包含多种损失函数的两阶段迁移学习方法。我们的迁移学习策略利用了分解图像的学习组成,以增强提取特征的可迁移性。我们使用一个包含 5000 张 CRC 图像的临床有效数据集对所提出模型的功效进行了评估。实验结果表明,DeepCon 与作为骨干模型的 Xception 网络相结合,并经过大量微调后,准确率达到 98.4%,F1 分数达到 98.4%。
{"title":"DeepCon: Unleashing the Power of Divide and Conquer Deep Learning for Colorectal Cancer Classification","authors":"Suhaib Chughtai;Zakaria Senousy;Ahmed Mahany;Nouh Sabri Elmitwally;Khalid N. Ismail;Mohamed Medhat Gaber;Mohammed M. Abdelsamea","doi":"10.1109/OJCS.2024.3428970","DOIUrl":"10.1109/OJCS.2024.3428970","url":null,"abstract":"Colorectal cancer (CRC) is the second leading cause of cancer-related mortality. Precise diagnosis of CRC plays a crucial role in increasing patient survival rates and formulating effective treatment strategies. Deep learning algorithms have demonstrated remarkable proficiency in the precise categorization of histopathology images. In this article, we introduce a novel deep learning model, termed \u0000<italic>DeepCon</i>\u0000 which incorporates the divide-and-conquer principle into the classification task. \u0000<italic>DeepCon</i>\u0000 has been methodically conceived to scrutinize the influence of acquired composition on the learning process, with a specific application to the classification of histology images related to CRC. Our model harnesses pre-trained networks to extract features from both the source and target domains, employing a two-stage transfer learning approach encompassing multiple loss functions. Our transfer learning strategy exploits a learned composition of decomposed images to enhance the transferability of extracted features. The efficacy of the proposed model was assessed using a clinically valid dataset of 5000 CRC images. The experimental results reveal that \u0000<italic>DeepCon</i>\u0000 when coupled with the Xception network as the backbone model and subjected to extensive fine-tuning, achieved a remarkable accuracy rate of 98.4% and an F1 score of 98.4%.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"380-388"},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599835","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141720314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Taxonomy for Python Vulnerabilities Python 漏洞分类标准
Pub Date : 2024-07-03 DOI: 10.1109/OJCS.2024.3422686
Frédéric C. G. Bogaerts;Naghmeh Ivaki;José Fonseca
Python is one of the most widely adopted programming languages, with applications from web development to data science and machine learning. Despite its popularity, Python is susceptible to vulnerabilities compromising the systems that rely on it. To effectively address these challenges, developers, researchers, and security teams need to identify, analyze, and mitigate risks in Python code, but this is not an easy task due to the scattered, incomplete, and non-actionable nature of existing vulnerability data. This article introduces a comprehensive dataset comprising 1026 publicly disclosed Python vulnerabilities sourced from various repositories. These vulnerabilities are meticulously classified using widely recognized frameworks, such as Orthogonal Defect Classification (ODC), Common Weakness Enumeration (CWE), and Open Web Application Security Project (OWASP) Top 10. Our dataset is accompanied by patched and vulnerable code samples (some crafted with the help of AI), enhancing its utility for developers, researchers, and security teams. In addition, a user-friendly website was developed to allow its interactive exploration and facilitate new contributions from the community. Access to this dataset will foster the development and testing of safer Python applications. The resulting dataset is also analyzed, looking for trends and patterns in the occurrence of Python vulnerabilities, with the aim of raising awareness of Python security and providing practical, actionable guidance to assist developers, researchers, and security teams in bolstering their practices. This includes insights into the types of vulnerabilities they should focus on, the most exploited categories, and the common errors that programmers tend to make while coding that can lead to vulnerabilities.
Python 是应用最广泛的编程语言之一,其应用范围从网络开发到数据科学和机器学习。尽管 Python 广受欢迎,但它也容易受到漏洞的影响,从而危及依赖它的系统。为了有效应对这些挑战,开发人员、研究人员和安全团队需要识别、分析和降低 Python 代码中的风险,但由于现有漏洞数据分散、不完整且不可操作,这并非易事。本文介绍了一个综合数据集,其中包含 1026 个公开披露的 Python 漏洞,这些漏洞来自各种资源库。这些漏洞使用广泛认可的框架进行了细致分类,如正交缺陷分类(ODC)、常见弱点枚举(CWE)和开放式 Web 应用程序安全项目(OWASP)前 10 名。我们的数据集还附有已打补丁和易受攻击的代码示例(有些是在人工智能的帮助下制作的),从而增强了其对开发人员、研究人员和安全团队的实用性。此外,我们还开发了一个用户友好型网站,允许对其进行交互式探索,并促进社区做出新的贡献。对该数据集的访问将促进开发和测试更安全的 Python 应用程序。我们还对所产生的数据集进行了分析,寻找 Python 漏洞发生的趋势和模式,目的是提高人们对 Python 安全性的认识,并提供实用、可操作的指导,帮助开发人员、研究人员和安全团队加强实践。这包括深入了解他们应关注的漏洞类型、最易被利用的漏洞类别,以及程序员在编码时容易导致漏洞的常见错误。
{"title":"A Taxonomy for Python Vulnerabilities","authors":"Frédéric C. G. Bogaerts;Naghmeh Ivaki;José Fonseca","doi":"10.1109/OJCS.2024.3422686","DOIUrl":"10.1109/OJCS.2024.3422686","url":null,"abstract":"Python is one of the most widely adopted programming languages, with applications from web development to data science and machine learning. Despite its popularity, Python is susceptible to vulnerabilities compromising the systems that rely on it. To effectively address these challenges, developers, researchers, and security teams need to identify, analyze, and mitigate risks in Python code, but this is not an easy task due to the scattered, incomplete, and non-actionable nature of existing vulnerability data. This article introduces a comprehensive dataset comprising 1026 publicly disclosed Python vulnerabilities sourced from various repositories. These vulnerabilities are meticulously classified using widely recognized frameworks, such as Orthogonal Defect Classification (ODC), Common Weakness Enumeration (CWE), and Open Web Application Security Project (OWASP) Top 10. Our dataset is accompanied by patched and vulnerable code samples (some crafted with the help of AI), enhancing its utility for developers, researchers, and security teams. In addition, a user-friendly website was developed to allow its interactive exploration and facilitate new contributions from the community. Access to this dataset will foster the development and testing of safer Python applications. The resulting dataset is also analyzed, looking for trends and patterns in the occurrence of Python vulnerabilities, with the aim of raising awareness of Python security and providing practical, actionable guidance to assist developers, researchers, and security teams in bolstering their practices. This includes insights into the types of vulnerabilities they should focus on, the most exploited categories, and the common errors that programmers tend to make while coding that can lead to vulnerabilities.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"368-379"},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10584270","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141551153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Lambertian Surfaces and Their Challenges for Visual SLAM 非朗伯表面及其对视觉 SLAM 的挑战
Pub Date : 2024-06-27 DOI: 10.1109/OJCS.2024.3419832
Sara Pyykölä;Niclas Joswig;Laura Ruotsalainen
Non-Lambertian surfaces are special surfaces that can cause specific type of reflectances called specularities, which pose a potential issue in industrial SLAM. This article reviews fundamental surface reflectance models, modern state-of-the-art computer vision algorithms and two public datasets, KITTI and DiLiGenT, related to non-Lambertian surfaces' research. A new dataset, SPINS, is presented for the purpose of studying non-Lambertian surfaces in navigation and an empirical performance evaluation with ResNeXt-101-WSL, ORB SLAM 3 and TartanVO is performed on the data. The article concludes with discussion about the results of empirical evaluation and the findings of the survey.
非朗伯表面是一种特殊的表面,会产生被称为 "镜面反射 "的特殊反射率,这给工业 SLAM 带来了潜在的问题。本文回顾了与非朗伯表面研究相关的基本表面反射模型、现代最先进的计算机视觉算法和两个公共数据集(KITTI 和 DiLiGenT)。文章介绍了一个新的数据集 SPINS,用于研究导航中的非朗伯表面,并使用 ResNeXt-101-WSL、ORB SLAM 3 和 TartanVO 对数据进行了实证性能评估。文章最后讨论了实证评估结果和调查结果。
{"title":"Non-Lambertian Surfaces and Their Challenges for Visual SLAM","authors":"Sara Pyykölä;Niclas Joswig;Laura Ruotsalainen","doi":"10.1109/OJCS.2024.3419832","DOIUrl":"10.1109/OJCS.2024.3419832","url":null,"abstract":"Non-Lambertian surfaces are special surfaces that can cause specific type of reflectances called specularities, which pose a potential issue in industrial SLAM. This article reviews fundamental surface reflectance models, modern state-of-the-art computer vision algorithms and two public datasets, KITTI and DiLiGenT, related to non-Lambertian surfaces' research. A new dataset, SPINS, is presented for the purpose of studying non-Lambertian surfaces in navigation and an empirical performance evaluation with ResNeXt-101-WSL, ORB SLAM 3 and TartanVO is performed on the data. The article concludes with discussion about the results of empirical evaluation and the findings of the survey.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"430-445"},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10574359","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141503708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Power of Vision Transformers and Acoustic Sensors for Cotton Pest Detection 用于棉花害虫检测的视觉变压器和声学传感器的威力
Pub Date : 2024-06-25 DOI: 10.1109/OJCS.2024.3419027
Remya S;Anjali T;Abhishek S;Somula Ramasubbareddy;Yongyun Cho
Whitefly infestations have posed a severe threats to cotton crops in recent years, affecting farmers globally. These little insects consume food on cotton plants, causing leaf damage and lower crop yields. In response to this agricultural dilemma, we developed a novel method for detecting whitefly infestations in cotton fields. To improve pest detection accuracy, we use the combined efficiency of visual transformers and low-cost acoustic sensors. We train the vision transformer with a large dataset of cotton fields with and without whitefly infestations. Our studies yielded encouraging results, with the vision transformer obtaining an amazing 99% accuracy. Surprisingly, this high degree of accuracy is reached after only 10-20 training epochs, outperforming benchmark approaches, which normally give accuracies ranging from 80% to 90%. These outcomes underline the cost-effective potential of the vision transformer in detecting whitefly attacks on cotton crops. Moreover, the successful integration of acoustic sensors and vision transformers opens doors for further research and advancements in the domain of cotton pest detection, promising more robust and efficient solutions for farmers facing the challenges of whitefly infestations.
近年来,粉虱虫害对棉花作物构成了严重威胁,全球农民都受到了影响。这些小昆虫消耗棉花植株上的食物,造成叶片损伤,降低作物产量。针对这一农业难题,我们开发了一种新型方法来检测棉田中的粉虱虫害。为了提高虫害检测的准确性,我们综合利用了视觉转换器和低成本声学传感器的效率。我们使用有粉虱、无粉虱棉田的大型数据集来训练视觉变换器。我们的研究取得了令人鼓舞的成果,视觉转换器的准确率达到了惊人的 99%。令人惊讶的是,仅用了 10-20 个训练历元就达到了如此高的准确率,超过了通常准确率在 80% 至 90% 之间的基准方法。这些成果凸显了视觉转换器在检测棉花作物遭受粉虱侵害方面的成本效益潜力。此外,声学传感器和视觉转换器的成功集成为棉花害虫检测领域的进一步研究和进步打开了大门,有望为面临粉虱侵扰挑战的农民提供更强大、更高效的解决方案。
{"title":"The Power of Vision Transformers and Acoustic Sensors for Cotton Pest Detection","authors":"Remya S;Anjali T;Abhishek S;Somula Ramasubbareddy;Yongyun Cho","doi":"10.1109/OJCS.2024.3419027","DOIUrl":"10.1109/OJCS.2024.3419027","url":null,"abstract":"Whitefly infestations have posed a severe threats to cotton crops in recent years, affecting farmers globally. These little insects consume food on cotton plants, causing leaf damage and lower crop yields. In response to this agricultural dilemma, we developed a novel method for detecting whitefly infestations in cotton fields. To improve pest detection accuracy, we use the combined efficiency of visual transformers and low-cost acoustic sensors. We train the vision transformer with a large dataset of cotton fields with and without whitefly infestations. Our studies yielded encouraging results, with the vision transformer obtaining an amazing 99% accuracy. Surprisingly, this high degree of accuracy is reached after only 10-20 training epochs, outperforming benchmark approaches, which normally give accuracies ranging from 80% to 90%. These outcomes underline the cost-effective potential of the vision transformer in detecting whitefly attacks on cotton crops. Moreover, the successful integration of acoustic sensors and vision transformers opens doors for further research and advancements in the domain of cotton pest detection, promising more robust and efficient solutions for farmers facing the challenges of whitefly infestations.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"356-367"},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10571347","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141503709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment ECC-PDGPP:在物联网环境中使用零知识属性的基于 ECC 的并行依赖性 RFID-Grouping-Proof 协议
Pub Date : 2024-06-03 DOI: 10.1109/OJCS.2024.3406142
Suman Majumder;Sangram Ray;Dipanwita Sadhukhan;Mou Dasgupta;Ashok Kumar Das;Youngho Park
Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the Internet of Things (IoT) network due to its autonomous data collection as well as transfer incurring low costs. To overcome the insecure exchange of tracking data and to prevent unauthorized access, parallel dependency RFID grouping-proof protocol is applied by the reader to authenticate tags simultaneously. However, conventional grouping-proof authentication schemes are not sufficient for the memory constraint RFID tags due to the recurrent utilization of a 128-bit PRNG (Pseudo Random Number Generator) function. Alternatively, the existing parallel-dependency grouping-proof schemes are not able to overcome numerous limitations regarding session establishment, efficient key management, and multicast message communication within the specified group. In this research, a lightweight, secure, and efficient communication protocol is proposed to overcome the aforementioned limitations using Elliptic Curve Cryptography (ECC) and Zero-Knowledge property to establish a session key among the participated tags, reader, and remote server. The proposed scheme can work in offline mode. The proposed ECC-based parallel dependency grouping-proof scheme is referred to as ECC-PDGPP which abides by the rules of the EPC class-1 gen-2 (C1 G2) standard of RFID tags. Finally, the proposed protocol is analyzed using a formal random oracle model and simulated using a well-known AVISPA simulation tool that shows the proposed scheme is well protected against all potential security threats.
射频识别(RFID)因其自主数据收集和传输成本低,促进了物联网(IoT)网络的基本跟踪程序。为了克服跟踪数据交换的不安全性并防止未经授权的访问,读取器采用并行依赖 RFID 防分组协议来同时验证标签。然而,由于需要反复使用 128 位 PRNG(伪随机数发生器)函数,传统的防分组认证方案无法满足受内存限制的 RFID 标签的要求。另外,现有的并行依赖性防分组方案也无法克服会话建立、高效密钥管理和指定组内多播信息通信方面的诸多限制。本研究提出了一种轻量级、安全、高效的通信协议,利用椭圆曲线加密法(ECC)和零知识属性在参与的标签、阅读器和远程服务器之间建立会话密钥,以克服上述限制。建议的方案可以在离线模式下工作。所提出的基于 ECC 的并行防依赖分组方案被称为 ECC-PDGPP,它遵守 RFID 标签的 EPC class-1 gen-2 (C1 G2)标准规则。最后,利用形式随机甲骨文模型对所提出的协议进行了分析,并利用著名的 AVISPA 仿真工具进行了仿真,结果表明所提出的方案能很好地抵御所有潜在的安全威胁。
{"title":"ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment","authors":"Suman Majumder;Sangram Ray;Dipanwita Sadhukhan;Mou Dasgupta;Ashok Kumar Das;Youngho Park","doi":"10.1109/OJCS.2024.3406142","DOIUrl":"https://doi.org/10.1109/OJCS.2024.3406142","url":null,"abstract":"Radio Frequency Identification (RFID) promotes the fundamental tracking procedure of the Internet of Things (IoT) network due to its autonomous data collection as well as transfer incurring low costs. To overcome the insecure exchange of tracking data and to prevent unauthorized access, parallel dependency RFID grouping-proof protocol is applied by the reader to authenticate tags simultaneously. However, conventional grouping-proof authentication schemes are not sufficient for the memory constraint RFID tags due to the recurrent utilization of a 128-bit PRNG (Pseudo Random Number Generator) function. Alternatively, the existing parallel-dependency grouping-proof schemes are not able to overcome numerous limitations regarding session establishment, efficient key management, and multicast message communication within the specified group. In this research, a lightweight, secure, and efficient communication protocol is proposed to overcome the aforementioned limitations using Elliptic Curve Cryptography (ECC) and Zero-Knowledge property to establish a session key among the participated tags, reader, and remote server. The proposed scheme can work in offline mode. The proposed ECC-based parallel dependency grouping-proof scheme is referred to as ECC-PDGPP which abides by the rules of the EPC class-1 gen-2 (C1 G2) standard of RFID tags. Finally, the proposed protocol is analyzed using a formal random oracle model and simulated using a well-known AVISPA simulation tool that shows the proposed scheme is well protected against all potential security threats.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"329-342"},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10547007","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141326271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Rules Mining Algorithm for Combinatorially Exploded Decision Trees With Modified Aitchison-Aitken Function-Based Bayesian Optimization 基于修正艾奇逊-艾特肯函数贝叶斯优化的组合爆炸决策树多规则挖掘算法
Pub Date : 2024-04-30 DOI: 10.1109/OJCS.2024.3394928
Yuto Omae;Masaya Mori;Yohei Kakimoto
Decision trees offer the benefit of easy interpretation because they allow the classification of input data based on if–then rules. However, as decision trees are constructed by an algorithm that achieves clear classification with minimum necessary rules, the trees possess the drawback of extracting only minimum rules, even when various latent rules exist in data. Approaches that construct multiple trees using randomly selected feature subsets do exist. However, the number of trees that can be constructed remains at the same scale because the number of feature subsets is a combinatorial explosion. Additionally, when multiple trees are constructed, numerous rules are generated, of which several are untrustworthy and/or highly similar. Therefore, we propose “MAABO-MT” and “GS-MRM” algorithms that strategically construct trees with high estimation performance among all possible trees with small computational complexity and extract only reliable and non-similar rules, respectively. Experiments are conducted using several open datasets to analyze the effectiveness of the proposed method. The results confirm that MAABO-MT can discover reliable rules at a lower computational cost than other methods that rely on randomness. Furthermore, the proposed method is confirmed to provide deeper insights than single decision trees commonly used in previous studies. Therefore, MAABO-MT and GS-MRM can efficiently extract rules from combinatorially exploded decision trees.
决策树允许根据 "如果-那么 "规则对输入数据进行分类,因此具有易于解释的优点。然而,由于决策树是通过一种算法构建的,这种算法能以最少的必要规则实现清晰的分类,因此决策树存在一个缺点,即即使数据中存在各种潜在规则,决策树也只能提取最少的规则。使用随机选择的特征子集构建多棵树的方法确实存在。但是,由于特征子集的数量是一个组合爆炸,因此可以构建的树的数量仍然保持在相同的规模。此外,在构建多棵树时,会生成大量规则,其中有几条规则是不可信的和(或)高度相似的。因此,我们提出了 "MAABO-MT "和 "GS-MRM "算法,这两种算法以较小的计算复杂度在所有可能的树中有策略地构建具有较高估计性能的树,并分别只提取可靠规则和非相似规则。我们使用多个开放数据集进行了实验,以分析所提方法的有效性。结果证实,与其他依赖随机性的方法相比,MAABO-MT 能以更低的计算成本发现可靠的规则。此外,与以往研究中常用的单一决策树相比,所提出的方法被证实能提供更深刻的见解。因此,MAABO-MT 和 GS-MRM 可以有效地从组合爆炸决策树中提取规则。
{"title":"Multi-Rules Mining Algorithm for Combinatorially Exploded Decision Trees With Modified Aitchison-Aitken Function-Based Bayesian Optimization","authors":"Yuto Omae;Masaya Mori;Yohei Kakimoto","doi":"10.1109/OJCS.2024.3394928","DOIUrl":"10.1109/OJCS.2024.3394928","url":null,"abstract":"Decision trees offer the benefit of easy interpretation because they allow the classification of input data based on if–then rules. However, as decision trees are constructed by an algorithm that achieves clear classification with minimum necessary rules, the trees possess the drawback of extracting only minimum rules, even when various latent rules exist in data. Approaches that construct multiple trees using randomly selected feature subsets do exist. However, the number of trees that can be constructed remains at the same scale because the number of feature subsets is a combinatorial explosion. Additionally, when multiple trees are constructed, numerous rules are generated, of which several are untrustworthy and/or highly similar. Therefore, we propose “MAABO-MT” and “GS-MRM” algorithms that strategically construct trees with high estimation performance among all possible trees with small computational complexity and extract only reliable and non-similar rules, respectively. Experiments are conducted using several open datasets to analyze the effectiveness of the proposed method. The results confirm that MAABO-MT can discover reliable rules at a lower computational cost than other methods that rely on randomness. Furthermore, the proposed method is confirmed to provide deeper insights than single decision trees commonly used in previous studies. Therefore, MAABO-MT and GS-MRM can efficiently extract rules from combinatorially exploded decision trees.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"215-226"},"PeriodicalIF":0.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10510571","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140840476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Affective Computing and the Road to an Emotionally Intelligent Metaverse 情感计算与情感智能元宇宙之路
Pub Date : 2024-04-18 DOI: 10.1109/OJCS.2024.3389462
Farrukh Pervez;Moazzam Shoukat;Muhammad Usama;Moid Sandhu;Siddique Latif;Junaid Qadir
The metaverse is currently undergoing a profound transformation, fundamentally reshaping our perception of reality. It has transcended its origins to become an expansion of human consciousness, seamlessly blending the physical and virtual worlds. Amidst this transformative evolution, numerous applications are striving to mould the metaverse into a digital counterpart capable of delivering immersive human-like experiences. These applications envisage a future where users effortlessly traverse between physical and digital dimensions. Taking a step forward, affective computing technologies can be utilised to identify users' emotional cues and convey authentic emotions, enhancing genuine, meaningful, and context-aware interactions in the digital world. In this paper, we explore how integrating emotional intelligence can enhance the traditional metaverse, birthing an emotionally intelligent metaverse (EIM). Our work illuminates the multifaceted potential of EIM across diverse sectors, including healthcare, education, gaming, automotive, customer service, human resources, marketing, and urban metaverse cyberspace. Through our examination of these sectors, we uncover how infusing emotional intelligence enriches user interactions and experiences within the metaverse. Nonetheless, this transformative journey is riddled with challenges, and we address the obstacles hindering the realisation of EIM's full potential. By doing so, we lay the groundwork for future research endeavours aimed at further enhancing and refining the captivating journey into the world of EIM.
元宇宙目前正在经历一场深刻的变革,从根本上重塑了我们对现实的认知。它已经超越了其起源,成为人类意识的扩展,将物理世界和虚拟世界完美地融合在一起。在这一变革性的演变过程中,众多应用正在努力将元宇宙塑造成能够提供身临其境的人类体验的数字对应物。这些应用设想的未来是,用户可以毫不费力地在物理和数字维度之间穿行。情感计算技术向前迈进了一步,它可以用来识别用户的情感线索并传达真实的情感,从而增强数字世界中真实、有意义和情境感知的互动。在本文中,我们将探讨如何通过整合情感智能来增强传统的元宇宙,从而诞生情感智能元宇宙(EIM)。我们的工作揭示了 EIM 在医疗保健、教育、游戏、汽车、客户服务、人力资源、市场营销和城市元宇宙网络空间等不同领域的多方面潜力。通过对这些领域的研究,我们发现了在元宇宙中注入情商是如何丰富用户互动和体验的。然而,这一变革之旅充满了挑战,我们要解决阻碍情商信息充分发挥潜力的障碍。通过这样做,我们为未来的研究工作奠定了基础,旨在进一步加强和完善进入 EIM 世界的迷人之旅。
{"title":"Affective Computing and the Road to an Emotionally Intelligent Metaverse","authors":"Farrukh Pervez;Moazzam Shoukat;Muhammad Usama;Moid Sandhu;Siddique Latif;Junaid Qadir","doi":"10.1109/OJCS.2024.3389462","DOIUrl":"10.1109/OJCS.2024.3389462","url":null,"abstract":"The metaverse is currently undergoing a profound transformation, fundamentally reshaping our perception of reality. It has transcended its origins to become an expansion of human consciousness, seamlessly blending the physical and virtual worlds. Amidst this transformative evolution, numerous applications are striving to mould the metaverse into a digital counterpart capable of delivering immersive human-like experiences. These applications envisage a future where users effortlessly traverse between physical and digital dimensions. Taking a step forward, affective computing technologies can be utilised to identify users' emotional cues and convey authentic emotions, enhancing genuine, meaningful, and context-aware interactions in the digital world. In this paper, we explore how integrating emotional intelligence can enhance the traditional metaverse, birthing an emotionally intelligent metaverse (EIM). Our work illuminates the multifaceted potential of EIM across diverse sectors, including healthcare, education, gaming, automotive, customer service, human resources, marketing, and urban metaverse cyberspace. Through our examination of these sectors, we uncover how infusing emotional intelligence enriches user interactions and experiences within the metaverse. Nonetheless, this transformative journey is riddled with challenges, and we address the obstacles hindering the realisation of EIM's full potential. By doing so, we lay the groundwork for future research endeavours aimed at further enhancing and refining the captivating journey into the world of EIM.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"5 ","pages":"195-214"},"PeriodicalIF":0.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10504882","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140626556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Computer Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1