首页 > 最新文献

IEEE Open Journal of the Computer Society最新文献

英文 中文
Kinship Verification Using Hierarchical Structures and Extended Contrastive Learning 基于层次结构和扩展对比学习的亲属关系验证
Pub Date : 2025-09-16 DOI: 10.1109/OJCS.2025.3610270
Eran Dahan;Yosi Keller
In this article, we aim to improve kinship verification performance by optimizing embedding representations tailored to each kinship relation type. We concentrate on two relationship categories: same-generation (e.g., Brothers, Sisters, Siblings) and mixed-generation (e.g., Father-Daughter, Mother-Son). For mixed-generation relationships, we develop a sophisticated contrastive learning framework that takes advantage of the hierarchical structure within a family, such as refining the kinship relation embedding for Mother-Daughter as an extension to the Sisters relationship. For the types of same-generation relationships, we propose a tailored contrastive learning scheme for each specific kinship relationship. Further, we developed a unique sampling method for our scheme which helps to reduce the overfitting of the kinship verification task. Overall, our method achieves state-of-the-art performance on the FIW dataset, outperforming previous benchmarks by a substantial margin.
在本文中,我们的目标是通过优化针对每种亲属关系类型的嵌入表示来提高亲属关系验证性能。我们专注于两种关系类型:同代(例如,兄弟姐妹,兄弟姐妹)和混合代(例如,父女,母子)。对于混合代际关系,我们开发了一个复杂的对比学习框架,该框架利用了家庭内部的等级结构,例如将母女的亲属关系嵌入细化为姐妹关系的延伸。对于同代关系的类型,我们提出了针对每种特定亲属关系量身定制的对比学习方案。此外,我们为我们的方案开发了一种独特的抽样方法,这有助于减少亲属关系验证任务的过拟合。总体而言,我们的方法在FIW数据集上实现了最先进的性能,大大优于以前的基准测试。
{"title":"Kinship Verification Using Hierarchical Structures and Extended Contrastive Learning","authors":"Eran Dahan;Yosi Keller","doi":"10.1109/OJCS.2025.3610270","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3610270","url":null,"abstract":"In this article, we aim to improve kinship verification performance by optimizing embedding representations tailored to each kinship relation type. We concentrate on two relationship categories: same-generation (e.g., <italic>Brothers</i>, <italic>Sisters</i>, <italic>Siblings</i>) and mixed-generation (e.g., <italic>Father-Daughter</i>, <italic>Mother-Son</i>). For mixed-generation relationships, we develop a sophisticated contrastive learning framework that takes advantage of the hierarchical structure within a family, such as refining the kinship relation embedding for <italic>Mother-Daughter</i> as an extension to the <italic>Sisters</i> relationship. For the types of same-generation relationships, we propose a tailored contrastive learning scheme for each specific kinship relationship. Further, we developed a unique sampling method for our scheme which helps to reduce the overfitting of the kinship verification task. Overall, our method achieves state-of-the-art performance on the FIW dataset, outperforming previous benchmarks by a substantial margin.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1549-1560"},"PeriodicalIF":0.0,"publicationDate":"2025-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11164899","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145351889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation 多元约束弹性匹配及其在实时能量分解中的应用
Pub Date : 2025-09-11 DOI: 10.1109/OJCS.2025.3609195
Pascal A. Schirmer;Dimitrios Kolosov;Iosif Mporas
Non-Intrusive Load Monitoring (NILM) aims to estimate the power consumption of electrical appliances from the aggregated power consumption. While recent machine learning approaches have demonstrated very high disaggregation accuracies, ensuring real-time capability is crucial in NILM’s hardware implementations. We propose a constrained elastic matching approach for NILM to reduce execution time significantly. Our approach was tested on two datasets (REDD and AMPds2). The reported performance is on average 93.2% in terms of estimation accuracy for deferrable loads using the AMPds2 dataset. The proposed approach reduces execution time by a factor of ten compared to unconstrained elastic matching techniques, achieving per-frame inference times of 3.5–12.1 ms depending on the hardware platform and model size. Memory usage for the largest model is approximately 7.5 MB, and reducing the model to 10% of reference signatures lowers active power consumption from 12.1 W to 5.2 W, representing a 57% energy saving with minimal accuracy loss. Furthermore, the proposed approach has been evaluated on five different microprocessors, demonstrating consistent runtime reduction and enabling real-time implementation of elastic matching based NILM with large reference databases.
非侵入式负荷监测(NILM)的目的是通过汇总的电力消耗来估计电器的电力消耗。虽然最近的机器学习方法已经证明了非常高的分解精度,但确保实时能力在NILM的硬件实现中至关重要。我们提出了一种约束弹性匹配方法,以显著减少NILM的执行时间。我们的方法在两个数据集(REDD和AMPds2)上进行了测试。就使用AMPds2数据集的可延迟负载的估计精度而言,报告的性能平均为93.2%。与无约束弹性匹配技术相比,该方法将执行时间减少了十倍,根据硬件平台和模型大小,实现了3.5-12.1 ms的每帧推理时间。最大模型的内存使用量约为7.5 MB,将模型减少到参考签名的10%,可将有功功耗从12.1 W降低到5.2 W,在精度损失最小的情况下节省57%的能源。此外,所提出的方法已经在五种不同的微处理器上进行了评估,证明了一致的运行时间减少,并能够与大型参考数据库实时实现基于弹性匹配的NILM。
{"title":"Multivariate Constrained Elastic Matching With Application in Real-Time Energy Disaggregation","authors":"Pascal A. Schirmer;Dimitrios Kolosov;Iosif Mporas","doi":"10.1109/OJCS.2025.3609195","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3609195","url":null,"abstract":"Non-Intrusive Load Monitoring (NILM) aims to estimate the power consumption of electrical appliances from the aggregated power consumption. While recent machine learning approaches have demonstrated very high disaggregation accuracies, ensuring real-time capability is crucial in NILM’s hardware implementations. We propose a constrained elastic matching approach for NILM to reduce execution time significantly. Our approach was tested on two datasets (REDD and AMPds2). The reported performance is on average 93.2% in terms of estimation accuracy for deferrable loads using the AMPds2 dataset. The proposed approach reduces execution time by a factor of ten compared to unconstrained elastic matching techniques, achieving per-frame inference times of 3.5–12.1 ms depending on the hardware platform and model size. Memory usage for the largest model is approximately 7.5 MB, and reducing the model to 10% of reference signatures lowers active power consumption from 12.1 W to 5.2 W, representing a 57% energy saving with minimal accuracy loss. Furthermore, the proposed approach has been evaluated on five different microprocessors, demonstrating consistent runtime reduction and enabling real-time implementation of elastic matching based NILM with large reference databases.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1475-1487"},"PeriodicalIF":0.0,"publicationDate":"2025-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11159158","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing LightPUF-IIoT:一种基于puf的轻量级认证方案,可在雾辅助IIoT数据共享中实时检测流氓设备
Pub Date : 2025-09-09 DOI: 10.1109/OJCS.2025.3607984
Somchart Fugkeaw;Archawit Changtor;Thanabordee Maneerat;Pakapon Rattanasrisuk;Kittipat Tangtanawirut
The Industrial Internet of Things (IIoT) generates a vast volume of sensitive data that demands not only confidentiality but also authenticity and integrity—especially in large-scale deployments. Ensuring that data originates from trusted devices is critical; however, existing authentication mechanisms often lack scalability and effective revocation support. To address these challenges, we propose LightPUF-IIoT, a secure and lightweight authentication scheme designed for fog-assisted IIoT data sharing. The scheme leverages Physical Unclonable Functions (PUFs) and Non-Interactive Zero-Knowledge Proofs (NIZKPs) to enable scalable, group-based authentication for devices and fog nodes. By binding authenticated identities to cryptographic tokens used during data transmission, LightPUF-IIoT ensures data authenticity and supports real-time rogue device detection. The scheme also includes efficient mechanisms for device revocation and secure token regeneration. Experimental results show that LightPUF-IIoT provides strong security guarantees with minimal resource overhead and significantly outperforms existing approaches in terms of computational cost, scalability, and authentication throughput.
工业物联网(IIoT)产生了大量敏感数据,这些数据不仅需要保密性,还需要真实性和完整性,尤其是在大规模部署中。确保数据来自可信设备至关重要;但是,现有的身份验证机制通常缺乏可伸缩性和有效的撤销支持。为了应对这些挑战,我们提出了LightPUF-IIoT,这是一种安全轻量级的认证方案,专为雾辅助IIoT数据共享而设计。该方案利用物理不可克隆功能(puf)和非交互式零知识证明(NIZKPs)为设备和雾节点提供可扩展的、基于组的身份验证。通过将经过认证的身份绑定到数据传输过程中使用的加密令牌,LightPUF-IIoT可确保数据真实性并支持实时流氓设备检测。该方案还包括设备撤销和安全令牌再生的有效机制。实验结果表明,LightPUF-IIoT以最小的资源开销提供了强大的安全保证,并且在计算成本、可扩展性和身份验证吞吐量方面显著优于现有方法。
{"title":"LightPUF-IIoT: A Lightweight PUF-Based Authentication Scheme With Real-Time Detection of Rogue Devices in Fog-Assisted IIoT Data Sharing","authors":"Somchart Fugkeaw;Archawit Changtor;Thanabordee Maneerat;Pakapon Rattanasrisuk;Kittipat Tangtanawirut","doi":"10.1109/OJCS.2025.3607984","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3607984","url":null,"abstract":"The Industrial Internet of Things (IIoT) generates a vast volume of sensitive data that demands not only confidentiality but also authenticity and integrity—especially in large-scale deployments. Ensuring that data originates from trusted devices is critical; however, existing authentication mechanisms often lack scalability and effective revocation support. To address these challenges, we propose <bold>LightPUF-IIoT</b>, a secure and lightweight authentication scheme designed for fog-assisted IIoT data sharing. The scheme leverages <bold>Physical Unclonable Functions (PUFs)</b> and <bold>Non-Interactive Zero-Knowledge Proofs (NIZKPs)</b> to enable scalable, group-based authentication for devices and fog nodes. By binding authenticated identities to cryptographic tokens used during data transmission, LightPUF-IIoT ensures data authenticity and supports real-time rogue device detection. The scheme also includes efficient mechanisms for device revocation and secure token regeneration. Experimental results show that LightPUF-IIoT provides strong security guarantees with minimal resource overhead and significantly outperforms existing approaches in terms of computational cost, scalability, and authentication throughput.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1438-1450"},"PeriodicalIF":0.0,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11153801","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software 系统软件中多模态异常检测的跨模态注意网络
Pub Date : 2025-09-09 DOI: 10.1109/OJCS.2025.3607975
Suchuan Xing;Yihan Wang
Anomaly detection in system software traditionally relies on single-modal algorithms that analyze either discrete log events or continuous performance metrics in isolation, potentially missing complex anomalies that manifest across both modalities. We present a novel deep learning framework that leverages cross-modal attention mechanisms to jointly model log sequences and performance metrics for enhanced anomaly detection. Our method proposes Long Short-Term Memory (LSTM) networks to capture temporal dependencies in log event sequences and Temporal Convolutional Networks (TCNs) to model performance metric time series. The core innovation lies in our Cross-Modal Attention Mechanism, which dynamically weighs log events and metric features based on inter-modal relationships, enabling the detection of subtle anomalies that require contextual information from both data sources. Unlike conventional multi-modal fusion techniques that merely concatenate features, our attention mechanism explicitly models the dependencies between log patterns and metric behaviors, allowing the network to focus on relevant log events during metric anomalies and vice versa. We conduct comprehensive experiments on public datasets including HDFS and BGL logs paired with cloud computing performance metrics, as well as real-world cloud environments. Our method achieves significant improvements over single-modal baselines, with F1-scores increasing by 12.3% on average across datasets. Ablation studies confirm the effectiveness of the cross-modal attention mechanism, while real-time deployment experiments using Apache Flink demonstrate practical applicability with sub-second latency. The proposed framework addresses a critical gap in system software monitoring by providing a principled approach to multi-modal anomaly detection that scales to enterprise-level deployments.
系统软件中的异常检测传统上依赖于单模态算法,这些算法要么孤立地分析离散日志事件,要么孤立地分析连续的性能指标,这可能会遗漏跨两种模式出现的复杂异常。我们提出了一种新的深度学习框架,该框架利用跨模态注意机制来联合建模日志序列和性能指标,以增强异常检测。我们的方法提出了长短期记忆(LSTM)网络来捕获日志事件序列中的时间依赖性,并提出了时间卷积网络(tcn)来建模性能度量时间序列。核心创新在于我们的跨模态注意机制,该机制基于跨模态关系动态地权衡日志事件和度量特征,从而能够检测到需要来自两个数据源的上下文信息的细微异常。与仅仅连接特征的传统多模态融合技术不同,我们的注意力机制明确地模拟了日志模式和度量行为之间的依赖关系,允许网络在度量异常期间关注相关的日志事件,反之亦然。我们对公共数据集进行了全面的实验,包括HDFS和BGL日志与云计算性能指标配对,以及真实的云环境。我们的方法在单模态基线上取得了显著的改进,f1分数在数据集上平均提高了12.3%。消融研究证实了跨模态注意机制的有效性,而使用Apache Flink的实时部署实验则证明了亚秒级延迟的实际适用性。该框架通过提供可扩展到企业级部署的多模态异常检测的原则方法,解决了系统软件监控中的一个关键缺陷。
{"title":"Cross-Modal Attention Networks for Multi-Modal Anomaly Detection in System Software","authors":"Suchuan Xing;Yihan Wang","doi":"10.1109/OJCS.2025.3607975","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3607975","url":null,"abstract":"Anomaly detection in system software traditionally relies on single-modal algorithms that analyze either discrete log events or continuous performance metrics in isolation, potentially missing complex anomalies that manifest across both modalities. We present a novel deep learning framework that leverages cross-modal attention mechanisms to jointly model log sequences and performance metrics for enhanced anomaly detection. Our method proposes Long Short-Term Memory (LSTM) networks to capture temporal dependencies in log event sequences and Temporal Convolutional Networks (TCNs) to model performance metric time series. The core innovation lies in our Cross-Modal Attention Mechanism, which dynamically weighs log events and metric features based on inter-modal relationships, enabling the detection of subtle anomalies that require contextual information from both data sources. Unlike conventional multi-modal fusion techniques that merely concatenate features, our attention mechanism explicitly models the dependencies between log patterns and metric behaviors, allowing the network to focus on relevant log events during metric anomalies and vice versa. We conduct comprehensive experiments on public datasets including HDFS and BGL logs paired with cloud computing performance metrics, as well as real-world cloud environments. Our method achieves significant improvements over single-modal baselines, with F1-scores increasing by 12.3% on average across datasets. Ablation studies confirm the effectiveness of the cross-modal attention mechanism, while real-time deployment experiments using Apache Flink demonstrate practical applicability with sub-second latency. The proposed framework addresses a critical gap in system software monitoring by providing a principled approach to multi-modal anomaly detection that scales to enterprise-level deployments.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1463-1474"},"PeriodicalIF":0.0,"publicationDate":"2025-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11153984","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Three-Stage Hybrid RIS for Energy-Efficient and High-Performance Wireless Networks 节能和高性能无线网络的自适应三级混合RIS
Pub Date : 2025-08-28 DOI: 10.1109/OJCS.2025.3603234
Muhammad Iqbal;Tabinda Ashraf;Jen-Yi Pan
Reconfigurable Intelligent Surfaces (RIS) have emerged as a transformative solution for enhancing spectral and energy efficiency in wireless networks. However, conventional RIS architectures, whether passive or active, face significant limitations due to trade-offs involving power consumption, signal amplification, and deployment complexity. This article aims to overcome these limitations by developing an adaptive RIS architecture suitable for diverse transmission conditions. We propose a novel three-stage hybrid RIS system that dynamically switches among active, passive, and dormant modes based on channel quality and transmit power thresholds. A joint optimization framework is developed to enable adaptive mode selection, beamforming, and RIS configuration. This framework integrates mode-aware control logic and fractional programming to maximize system-wide sum-rate performance while minimizing energy consumption. Extensive simulations across varying propagation scenarios confirm that the proposed hybrid RIS outperforms conventional RIS designs in both spectral and energy efficiency. The results show that active mode yields high gains in low-power or obstructed channels, passive mode supports energy-efficient reflection under moderate conditions, and the dormant mode effectively conserves energy in high-power environments. Overall, the three-stage hybrid RIS architecture provides a robust, flexible, and high-performance solution, making it a promising candidate for future 6G wireless systems.
可重构智能表面(RIS)已成为提高无线网络频谱和能源效率的变革性解决方案。然而,传统的RIS架构,无论是被动的还是主动的,由于涉及功耗、信号放大和部署复杂性的权衡,都面临着很大的限制。本文旨在通过开发适合不同传输条件的自适应RIS架构来克服这些限制。我们提出了一种新的三级混合RIS系统,该系统基于信道质量和发射功率阈值在主动、被动和休眠模式之间动态切换。开发了一个联合优化框架,以实现自适应模式选择、波束形成和RIS配置。该框架集成了模式感知控制逻辑和分数编程,以最大限度地提高系统范围的和速率性能,同时最大限度地减少能源消耗。在不同传播场景下的广泛模拟证实,所提出的混合RIS在频谱和能源效率方面都优于传统RIS设计。结果表明,有源模式在低功率或受阻信道中获得高增益,无源模式在中等条件下支持高能效反射,休眠模式在高功率环境中有效节约能量。总的来说,三级混合RIS架构提供了一个强大、灵活和高性能的解决方案,使其成为未来6G无线系统的一个有希望的候选者。
{"title":"Adaptive Three-Stage Hybrid RIS for Energy-Efficient and High-Performance Wireless Networks","authors":"Muhammad Iqbal;Tabinda Ashraf;Jen-Yi Pan","doi":"10.1109/OJCS.2025.3603234","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3603234","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RIS) have emerged as a transformative solution for enhancing spectral and energy efficiency in wireless networks. However, conventional RIS architectures, whether passive or active, face significant limitations due to trade-offs involving power consumption, signal amplification, and deployment complexity. This article aims to overcome these limitations by developing an adaptive RIS architecture suitable for diverse transmission conditions. We propose a novel three-stage hybrid RIS system that dynamically switches among active, passive, and dormant modes based on channel quality and transmit power thresholds. A joint optimization framework is developed to enable adaptive mode selection, beamforming, and RIS configuration. This framework integrates mode-aware control logic and fractional programming to maximize system-wide sum-rate performance while minimizing energy consumption. Extensive simulations across varying propagation scenarios confirm that the proposed hybrid RIS outperforms conventional RIS designs in both spectral and energy efficiency. The results show that active mode yields high gains in low-power or obstructed channels, passive mode supports energy-efficient reflection under moderate conditions, and the dormant mode effectively conserves energy in high-power environments. Overall, the three-stage hybrid RIS architecture provides a robust, flexible, and high-performance solution, making it a promising candidate for future 6G wireless systems.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1451-1462"},"PeriodicalIF":0.0,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11142651","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gaussian Kernel-Based LSH for High-Dimensional Similarity Search 基于高斯核的LSH高维相似性搜索
Pub Date : 2025-08-25 DOI: 10.1109/OJCS.2025.3602355
Masrat Rasool;Khelil Kassoul;Samir Brahim Belhaouari
High-dimensional similarity search remains a critical challenge in machine learning, particularly when data lie on complex, non-linear manifolds that undermine the effectiveness of classical Locality-Sensitive Hashing (LSH). This work introduces Gaussian LSH, a kernel-based hashing framework that integrates over-clustering with Gaussian probability density modelling to improve locality preservation while maintaining computational efficiency. The method generates compact binary codes from a hybrid kernel–PDF score and supports scalable GPU-accelerated indexing for large datasets. Empirical evaluations across multiple visual and textual benchmarks demonstrate consistent improvements in recall and query latency compared to representative LSH variants and approximate nearest neighbour libraries. Gaussian LSH achieves recall gains of up to $text{9},text{pp}$ and latency reductions of up to $4.3times$, with benefits sustained across a range of code lengths. These results highlight the approach’s scalability and accuracy, supporting its use in medium- to large-scale similarity retrieval tasks across diverse data domains.
高维相似性搜索仍然是机器学习中的一个关键挑战,特别是当数据位于复杂的非线性流形上时,这会破坏经典位置敏感哈希(LSH)的有效性。这项工作引入了高斯LSH,这是一种基于核的哈希框架,它将过度聚类与高斯概率密度建模相结合,在保持计算效率的同时提高了局部保存。该方法从混合内核- pdf分数生成紧凑的二进制代码,并支持可扩展的gpu加速索引大型数据集。跨多个视觉和文本基准的经验评估表明,与代表性LSH变体和近似近邻库相比,在召回和查询延迟方面有一致的改进。高斯LSH实现了高达$ $ text{9}, $ $ text{pp}$的召回增益和高达$ $4.3times$的延迟减少,并且在代码长度范围内持续受益。这些结果突出了该方法的可扩展性和准确性,支持其在跨不同数据域的中型到大规模相似性检索任务中的使用。
{"title":"Gaussian Kernel-Based LSH for High-Dimensional Similarity Search","authors":"Masrat Rasool;Khelil Kassoul;Samir Brahim Belhaouari","doi":"10.1109/OJCS.2025.3602355","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3602355","url":null,"abstract":"High-dimensional similarity search remains a critical challenge in machine learning, particularly when data lie on complex, non-linear manifolds that undermine the effectiveness of classical Locality-Sensitive Hashing (LSH). This work introduces Gaussian LSH, a kernel-based hashing framework that integrates over-clustering with Gaussian probability density modelling to improve locality preservation while maintaining computational efficiency. The method generates compact binary codes from a hybrid kernel–PDF score and supports scalable GPU-accelerated indexing for large datasets. Empirical evaluations across multiple visual and textual benchmarks demonstrate consistent improvements in recall and query latency compared to representative LSH variants and approximate nearest neighbour libraries. Gaussian LSH achieves recall gains of up to <inline-formula><tex-math>$text{9},text{pp}$</tex-math></inline-formula> and latency reductions of up to <inline-formula><tex-math>$4.3times$</tex-math></inline-formula>, with benefits sustained across a range of code lengths. These results highlight the approach’s scalability and accuracy, supporting its use in medium- to large-scale similarity retrieval tasks across diverse data domains.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1402-1413"},"PeriodicalIF":0.0,"publicationDate":"2025-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11134766","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TACS-Net: Temporal-Aware Customer Segmentation Network TACS-Net:时间感知客户细分网络
Pub Date : 2025-08-22 DOI: 10.1109/OJCS.2025.3601668
Abu Sadat Mohammad Shaker;Md Tohidul Islam;A T M Omor Faruq;Hritika Barua;Uland Rozario;M. F. Mridha;Md. Jakir Hossen
Customer segmentation is essential for personalized marketing, customer retention, and strategic decision-making. Traditional segmentation methods, such as k-Means and Gaussian Mixture Models, rely on static features and fail to capture the evolving nature of customer behavior. Existing methods also struggle to account for temporal dynamics, limiting their effectiveness in fast-changing markets. This article proposes TACS-Net, a Temporal-Aware Customer Segmentation Network that dynamically models behavioral shifts using Temporal Convolutional Networks (TCN), Transformers, and a Recurrent Clustering Algorithm (RCA). TACS-Net adapts to changes in customer purchasing patterns over time, offering superior segmentation accuracy and stability. It integrates short- and long-term behavioral modeling, providing a robust, real-time framework for continuous customer profiling. Evaluation on two real-world datasets (CSD1 and CSD2) demonstrates that TACS-Net achieves a silhouette score of 0.55 on CSD1 and 0.54 on CSD2, outperforming traditional baselines. The model also shows higher temporal stability, with 84.3% and 83.7% of customers retaining their segment over one month in CSD1 and CSD2, respectively, compared to 72.1% and 74.0% with k-Means. Explainability analysis using SHAP reveals key factors driving segmentation, such as spending score, purchase frequency, and last purchase amount. While TACS-Net outperforms existing methods in clustering quality and stability, its higher computational cost calls for further optimization.
客户细分对于个性化营销、客户保留和战略决策至关重要。传统的分割方法,如k-Means和高斯混合模型,依赖于静态特征,无法捕捉到客户行为的演变本质。现有的方法也难以解释时间动态,限制了它们在快速变化的市场中的有效性。本文提出了TACS-Net,这是一个时间感知的客户细分网络,它使用时间卷积网络(TCN)、变压器和循环聚类算法(RCA)动态建模行为变化。随着时间的推移,TACS-Net适应客户购买模式的变化,提供卓越的细分准确性和稳定性。它集成了短期和长期的行为建模,为持续的客户分析提供了一个健壮的、实时的框架。对两个真实数据集(CSD1和CSD2)的评估表明,TACS-Net在CSD1和CSD2上的剪影得分分别为0.55和0.54,优于传统基线。该模型还显示出更高的时间稳定性,在CSD1和CSD2中,分别有84.3%和83.7%的客户在一个月内保留了他们的细分市场,而k-Means的这一比例分别为72.1%和74.0%。使用SHAP的可解释性分析揭示了驱动细分的关键因素,如支出分数、购买频率和上次购买金额。虽然TACS-Net在聚类质量和稳定性方面优于现有方法,但其较高的计算成本需要进一步优化。
{"title":"TACS-Net: Temporal-Aware Customer Segmentation Network","authors":"Abu Sadat Mohammad Shaker;Md Tohidul Islam;A T M Omor Faruq;Hritika Barua;Uland Rozario;M. F. Mridha;Md. Jakir Hossen","doi":"10.1109/OJCS.2025.3601668","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3601668","url":null,"abstract":"Customer segmentation is essential for personalized marketing, customer retention, and strategic decision-making. Traditional segmentation methods, such as k-Means and Gaussian Mixture Models, rely on static features and fail to capture the evolving nature of customer behavior. Existing methods also struggle to account for temporal dynamics, limiting their effectiveness in fast-changing markets. This article proposes TACS-Net, a Temporal-Aware Customer Segmentation Network that dynamically models behavioral shifts using Temporal Convolutional Networks (TCN), Transformers, and a Recurrent Clustering Algorithm (RCA). TACS-Net adapts to changes in customer purchasing patterns over time, offering superior segmentation accuracy and stability. It integrates short- and long-term behavioral modeling, providing a robust, real-time framework for continuous customer profiling. Evaluation on two real-world datasets (CSD1 and CSD2) demonstrates that TACS-Net achieves a silhouette score of 0.55 on CSD1 and 0.54 on CSD2, outperforming traditional baselines. The model also shows higher temporal stability, with 84.3% and 83.7% of customers retaining their segment over one month in CSD1 and CSD2, respectively, compared to 72.1% and 74.0% with k-Means. Explainability analysis using SHAP reveals key factors driving segmentation, such as spending score, purchase frequency, and last purchase amount. While TACS-Net outperforms existing methods in clustering quality and stability, its higher computational cost calls for further optimization.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1426-1437"},"PeriodicalIF":0.0,"publicationDate":"2025-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11134290","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extractive Text Summarization Using Formality of Language 运用语言形式进行文本摘要提取
Pub Date : 2025-08-20 DOI: 10.1109/OJCS.2025.3600632
Harsh Mehta;Santosh Kumar Bharti;Nishant Doshi
Automatic text summarization has been a prominent research topic for over a decade, aiming to distill concise summaries from extensive textual documents. This study introduces a novel approach addressing the intricacies of morphologically rich Indo-Iranian languages. We propose a unique method that leverages linguistic formality to guide summary generation. Building on an existing formality formula designed for English, we adapt and extend it for the structural characteristics of Indo-Iranian languages, which follow the Subject-Object-Verb (SOV) order. Our refined formula demonstrates a 7.28% improvement in formality scores compared to informal texts, validated through statistical significance testing. To assess sentence formality, we use our custom formula alongside additional features such as Shannon entropy scores and numeric token presence, combining these into a comprehensive sentence evaluation metric. Using this framework, we generate extractive summaries of Gujarati texts. Comparative evaluations at 20% and 30% compression ratios reveal that our method outperforms existing baselines, with ROUGE-1 score improvements of 14.63% at 30% and 28.60% at 20% compression. For reproducibility and further exploration, all experimental data and source code are made publicly available.
十多年来,自动文本摘要一直是一个突出的研究课题,旨在从大量的文本文档中提取简洁的摘要。本研究介绍了一种新颖的方法来解决形态丰富的印度-伊朗语言的复杂性。我们提出了一种独特的利用语言形式来指导摘要生成的方法。在为英语设计的现有正式公式的基础上,我们根据印度-伊朗语言的结构特征对其进行了调整和扩展,这些语言遵循主语-宾语-动词(SOV)顺序。我们的精炼公式表明,与非正式文本相比,正式性得分提高了7.28%,并通过统计显著性检验进行了验证。为了评估句子的正式性,我们使用自定义公式以及Shannon熵分数和数字标记存在等附加功能,将它们组合成一个综合的句子评估指标。使用这个框架,我们生成古吉拉特语文本的摘录摘要。在20%和30%压缩比下的对比评估表明,我们的方法优于现有的基线,在30%和20%压缩比下ROUGE-1评分分别提高了14.63%和28.60%。为了再现性和进一步探索,所有实验数据和源代码都是公开的。
{"title":"Extractive Text Summarization Using Formality of Language","authors":"Harsh Mehta;Santosh Kumar Bharti;Nishant Doshi","doi":"10.1109/OJCS.2025.3600632","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3600632","url":null,"abstract":"Automatic text summarization has been a prominent research topic for over a decade, aiming to distill concise summaries from extensive textual documents. This study introduces a novel approach addressing the intricacies of morphologically rich Indo-Iranian languages. We propose a unique method that leverages linguistic formality to guide summary generation. Building on an existing formality formula designed for English, we adapt and extend it for the structural characteristics of Indo-Iranian languages, which follow the Subject-Object-Verb (SOV) order. Our refined formula demonstrates a 7.28% improvement in formality scores compared to informal texts, validated through statistical significance testing. To assess sentence formality, we use our custom formula alongside additional features such as Shannon entropy scores and numeric token presence, combining these into a comprehensive sentence evaluation metric. Using this framework, we generate extractive summaries of Gujarati texts. Comparative evaluations at 20% and 30% compression ratios reveal that our method outperforms existing baselines, with ROUGE-1 score improvements of 14.63% at 30% and 28.60% at 20% compression. For reproducibility and further exploration, all experimental data and source code are made publicly available.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1414-1425"},"PeriodicalIF":0.0,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11130639","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FERO: Efficient Deep Reinforcement Learning based UAV Obstacle Avoidance at the Edge FERO:基于高效深度强化学习的无人机边缘避障
Pub Date : 2025-08-20 DOI: 10.1109/OJCS.2025.3600916
Patrick McEnroe;Shen Wang;Madhusanka Liyanage
With the expanding use of unmanned aerial vehicles (UAVs) across various fields, efficient obstacle avoidance has become increasingly crucial. This UAV obstacle avoidance can be achieved through deep reinforcement learning (DRL) algorithms deployed directly on-device (i.e., at the edge). However, practical deployment is constrained by high training time and high inference latency. In this paper, we propose methods to improve DRL-based UAV obstacle avoidance efficiency through improving both training efficiency and inference latency. To reduce inference latency, we employ input dimension reduction, streamlining the state representation to enable faster decision-making. For training time reduction, we leverage transfer learning, allowing the obstacle avoidance models to rapidly adapt to new environments without starting from scratch. To show the generalizability of our methods, we applied them to a discrete action space dueling double deep Q-network (D3QN) model and a continuous action space soft actor critic (SAC) model. Inference results are evaluated on both an NVIDIA Jetson Nano edge device and a NVIDIA Jetson Orin Nano edge device and we propose a combined method called FERO which combines state space reduction, transfer learning, and conversion to TensorRT for optimum deployment on NVIDIA Jetson devices. For our individual methods and combined method, we demonstrate reductions in training and inference times with minimal compromise in obstacle avoidance performance.
随着无人机在各个领域的广泛应用,高效避障变得越来越重要。这种无人机避障可以通过直接部署在设备上(即在边缘)的深度强化学习(DRL)算法来实现。然而,实际部署受到高训练时间和高推理延迟的限制。本文提出了通过提高训练效率和推理延迟来提高基于drl的无人机避障效率的方法。为了减少推理延迟,我们采用输入降维,简化状态表示以实现更快的决策。为了减少训练时间,我们利用迁移学习,使避障模型能够快速适应新环境,而无需从头开始。为了证明我们的方法的泛化性,我们将它们应用于离散动作空间决斗双深度q网络(D3QN)模型和连续动作空间软行为批评家(SAC)模型。在NVIDIA Jetson Nano edge设备和NVIDIA Jetson Orin Nano edge设备上对推理结果进行了评估,并提出了一种称为FERO的组合方法,该方法将状态空间约简、迁移学习和转换到TensorRT相结合,以便在NVIDIA Jetson设备上进行最佳部署。对于我们的单独方法和组合方法,我们证明了在最小程度上损害避障性能的情况下减少了训练和推理时间。
{"title":"FERO: Efficient Deep Reinforcement Learning based UAV Obstacle Avoidance at the Edge","authors":"Patrick McEnroe;Shen Wang;Madhusanka Liyanage","doi":"10.1109/OJCS.2025.3600916","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3600916","url":null,"abstract":"With the expanding use of unmanned aerial vehicles (UAVs) across various fields, efficient obstacle avoidance has become increasingly crucial. This UAV obstacle avoidance can be achieved through deep reinforcement learning (DRL) algorithms deployed directly on-device (i.e., at the edge). However, practical deployment is constrained by high training time and high inference latency. In this paper, we propose methods to improve DRL-based UAV obstacle avoidance efficiency through improving both training efficiency and inference latency. To reduce inference latency, we employ input dimension reduction, streamlining the state representation to enable faster decision-making. For training time reduction, we leverage transfer learning, allowing the obstacle avoidance models to rapidly adapt to new environments without starting from scratch. To show the generalizability of our methods, we applied them to a discrete action space dueling double deep Q-network (D3QN) model and a continuous action space soft actor critic (SAC) model. Inference results are evaluated on both an NVIDIA Jetson Nano edge device and a NVIDIA Jetson Orin Nano edge device and we propose a combined method called FERO which combines state space reduction, transfer learning, and conversion to TensorRT for optimum deployment on NVIDIA Jetson devices. For our individual methods and combined method, we demonstrate reductions in training and inference times with minimal compromise in obstacle avoidance performance.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1378-1389"},"PeriodicalIF":0.0,"publicationDate":"2025-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11130910","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Extreme Order Statistics of Multimodal Mixture Distributions for Complexity Analysis of Semi-Steady-State Jaya Algorithm 用多模态混合分布的极值阶统计量分析半稳态Jaya算法的复杂度
Pub Date : 2025-08-18 DOI: 10.1109/OJCS.2025.3599786
Uday K. Chakraborty;Cezary Z. Janikow
Computational complexity analysis of an algorithm is an integral part of understanding and applying that algorithm. For stochastic, adaptive heuristics in non-convex optimization, however, complexity analysis is often difficult. This article derives, for the first time in the literature, the complexity of the semi-steady-state Jaya algorithm (which is a recently developed variant of the Jaya algorithm) without the unimodality assumption. The Jaya algorithm, and its improvement, the semi-steady-state Jaya, are among the newest metaheuristics in population-based, nature-inspired optimization methods. In black-box function optimization, stochastic models of evolutionary and non-evolutionary heuristics often study the search process as sampling from distributions that are difficult to estimate. Unimodal distributions used for this purpose are easy to analyze but are necessarily restrictive. In this article, we model multimodality using mixtures of unimodal densities. For multimodal mixtures of uniform densities and, separately, of exponential densities (with different location parameters for the mixture components), analytical expressions, many of them closed-form, are derived for (i) the expectation of the largest order statistic for samples from the mixture; (ii) asymptotics of the above expectation for the large-sample case; (iii) survival probability corresponding to the (asymptotic) expected value of the largest order statistic; and (iv) asymptotics of sums of survival probabilities. The above quantities are used in a stochastic model of the semi-steady-state Jaya algorithm, obtaining the (asymptotic) expectation of the number of updates of the best individual in a population of the algorithm, which in turn is used in the derivation of the computational complexity of the algorithm.
算法的计算复杂度分析是理解和应用算法的重要组成部分。然而,对于非凸优化中的随机自适应启发式算法,复杂性分析往往是困难的。本文在文献中首次推导了半稳态Jaya算法(Jaya算法的一个新发展的变体)在没有单峰假设的情况下的复杂性。Jaya算法及其改进的半稳态Jaya算法是基于群体的、自然启发的优化方法中最新的元启发式算法之一。在黑盒函数优化中,进化和非进化启发式的随机模型经常从难以估计的分布中抽样研究搜索过程。用于此目的的单峰分布易于分析,但必然具有限制性。在本文中,我们使用单峰密度的混合物来模拟多模态。对于均匀密度的多模态混合物,以及指数密度的多模态混合物(混合成分具有不同的位置参数),导出了以下解析表达式(其中许多是封闭形式):(i)混合物样本的最大阶统计量的期望;(ii)大样本情况下上述期望的渐近性;(iii)最大阶统计量的(渐近)期望值所对应的生存概率;(iv)生存概率和的渐近性。将上述量用于半稳态Jaya算法的随机模型中,得到算法总体中最优个体更新次数的(渐近)期望,进而用于推导算法的计算复杂度。
{"title":"Using Extreme Order Statistics of Multimodal Mixture Distributions for Complexity Analysis of Semi-Steady-State Jaya Algorithm","authors":"Uday K. Chakraborty;Cezary Z. Janikow","doi":"10.1109/OJCS.2025.3599786","DOIUrl":"https://doi.org/10.1109/OJCS.2025.3599786","url":null,"abstract":"Computational complexity analysis of an algorithm is an integral part of understanding and applying that algorithm. For stochastic, adaptive heuristics in non-convex optimization, however, complexity analysis is often difficult. This article derives, for the first time in the literature, the complexity of the semi-steady-state Jaya algorithm (which is a recently developed variant of the Jaya algorithm) without the unimodality assumption. The Jaya algorithm, and its improvement, the semi-steady-state Jaya, are among the newest metaheuristics in population-based, nature-inspired optimization methods. In black-box function optimization, stochastic models of evolutionary and non-evolutionary heuristics often study the search process as sampling from distributions that are difficult to estimate. Unimodal distributions used for this purpose are easy to analyze but are necessarily restrictive. In this article, we model multimodality using mixtures of unimodal densities. For multimodal mixtures of uniform densities and, separately, of exponential densities (with different location parameters for the mixture components), analytical expressions, many of them closed-form, are derived for (i) the expectation of the largest order statistic for samples from the mixture; (ii) asymptotics of the above expectation for the large-sample case; (iii) survival probability corresponding to the (asymptotic) expected value of the largest order statistic; and (iv) asymptotics of sums of survival probabilities. The above quantities are used in a stochastic model of the semi-steady-state Jaya algorithm, obtaining the (asymptotic) expectation of the number of updates of the best individual in a population of the algorithm, which in turn is used in the derivation of the computational complexity of the algorithm.","PeriodicalId":13205,"journal":{"name":"IEEE Open Journal of the Computer Society","volume":"6 ","pages":"1390-1401"},"PeriodicalIF":0.0,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=11127039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145141629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Open Journal of the Computer Society
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1