首页 > 最新文献

Int. Arab J. Inf. Technol.最新文献

英文 中文
A Novel Architecture for Search Engine using Domain Based Web Log Data 一种基于域的Web日志数据搜索引擎架构
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/10
P. Sharma, Divakar Yadav
Search engines, an information retrieval tool are the main source of information for users’ information need now a day. For every query, the search engine explores its repository and/or indexer to find the relevant documents/URLs for that query. Page ranking algorithms rank the Uniform Resource Locator in abstract section (URLs) according to its relevancy with respect to users’ query. It is analyzed that many of the queries fired by users on search engines are duplicate. There is a scope to improve the performance of search engine to reduce its efforts for duplicate queries. In this paper a proxy server is created that keep store the search results of user queries in web log. The proposed proxy server uses this web log to find results faster for duplicate queries fired next time. The proposed scheme has been tested and found prominent. The proposed architecture tested for ten duplicate user queries. it return all relevant web pages for duplicate user query (if query is found in web log at proxy server) from a particular domain instead of entire database. It reduces the perceived latency for duplicate query and also improves the value of precession and accuracy up to 81.8% and 99% respectively for all duplicate user queries.
搜索引擎作为一种信息检索工具,是当今用户信息需求的主要信息来源。对于每个查询,搜索引擎探索其存储库和/或索引器,以查找该查询的相关文档/ url。页面排序算法根据url与用户查询的相关性对url中的统一资源定位符进行排序。据分析,用户在搜索引擎上发出的查询有很多是重复的。搜索引擎的性能还有待改进,以减少重复查询的工作量。本文创建了一个代理服务器,将用户查询的搜索结果保存在web日志中。建议的代理服务器使用此web日志来更快地找到下次触发的重复查询的结果。所提出的方案已经过测试,效果显著。所提出的体系结构针对十个重复的用户查询进行了测试。它返回所有相关的网页重复用户查询(如果查询在代理服务器的web日志中找到)从一个特定的域,而不是整个数据库。它减少了重复查询的感知延迟,并将所有重复用户查询的进动和准确率分别提高了81.8%和99%。
{"title":"A Novel Architecture for Search Engine using Domain Based Web Log Data","authors":"P. Sharma, Divakar Yadav","doi":"10.34028/iajit/20/1/10","DOIUrl":"https://doi.org/10.34028/iajit/20/1/10","url":null,"abstract":"Search engines, an information retrieval tool are the main source of information for users’ information need now a day. For every query, the search engine explores its repository and/or indexer to find the relevant documents/URLs for that query. Page ranking algorithms rank the Uniform Resource Locator in abstract section (URLs) according to its relevancy with respect to users’ query. It is analyzed that many of the queries fired by users on search engines are duplicate. There is a scope to improve the performance of search engine to reduce its efforts for duplicate queries. In this paper a proxy server is created that keep store the search results of user queries in web log. The proposed proxy server uses this web log to find results faster for duplicate queries fired next time. The proposed scheme has been tested and found prominent. The proposed architecture tested for ten duplicate user queries. it return all relevant web pages for duplicate user query (if query is found in web log at proxy server) from a particular domain instead of entire database. It reduces the perceived latency for duplicate query and also improves the value of precession and accuracy up to 81.8% and 99% respectively for all duplicate user queries.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"8 1","pages":"92-101"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91047162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of TCP issues and their possible solutions in the internet of things 分析物联网中TCP问题及其可能的解决方案
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/2/7
S. Z. Hussain, Sultana Parween
The Internet of Things (IoT) is widely known as a revolutionary paradigm that offers communication among different types of devices. The primary goal of this paradigm is to implement efficient and high-quality smart services. It requires a protocol stack that offers different service requirements for inter-communication between different devices. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are used as transport layer protocols in IoT to provide the quality of service needed in various IoT devices. IoT encounters many shortcomings of wireless networks, while also posing new challenges due to its uniqueness. When TCP is used in an IoT system, a variety of challenging issues have to be dealt with. This paper provides a comprehensive survey of various issues which arises due to the heterogeneous characteristics of IoT. We identify main issues such as Retransmission Timeout (RTO) algorithm issue, congestion and packet loss issue, header overhead, high latency issue, link layer interaction issue, etc. Moreover, we provide several most probable solutions to the above-mentioned issues in the case of IoT scenarios. RTO algorithm issue has been resolved by using algorithms such as CoCoA, CoCoA+, and CoCoA++. Apart from these, the high latency issue has been solved with the help of a long lived connection and TCP Fast open. Congestion and packet loss issue has been resolved by using several TCP variants such as TCP New Reno, Tahoe, Reno, Vegas, and Westwood.
物联网(IoT)被广泛认为是一种革命性的范例,它提供了不同类型设备之间的通信。此范例的主要目标是实现高效和高质量的智能服务。它需要一个协议栈,为不同设备之间的相互通信提供不同的服务需求。传输控制协议(TCP)和用户数据报协议(UDP)作为物联网中的传输层协议,为各种物联网设备提供所需的服务质量。物联网遇到了无线网络的许多缺点,同时也因其独特性提出了新的挑战。在物联网系统中使用TCP时,必须处理各种具有挑战性的问题。本文全面调查了由于物联网的异构特性而产生的各种问题。我们确定了主要问题,如重传超时(RTO)算法问题,拥塞和数据包丢失问题,报头开销,高延迟问题,链路层交互问题等。此外,在物联网场景下,我们为上述问题提供了几种最可能的解决方案。RTO算法问题已经通过使用CoCoA、CoCoA+和CoCoA+等算法解决。除此之外,在长连接和TCP快速打开的帮助下,高延迟问题已经得到了解决。拥塞和丢包问题已经通过使用几个TCP变体(如TCP New Reno、Tahoe、Reno、Vegas和Westwood)得到解决。
{"title":"Analysis of TCP issues and their possible solutions in the internet of things","authors":"S. Z. Hussain, Sultana Parween","doi":"10.34028/iajit/20/2/7","DOIUrl":"https://doi.org/10.34028/iajit/20/2/7","url":null,"abstract":"The Internet of Things (IoT) is widely known as a revolutionary paradigm that offers communication among different types of devices. The primary goal of this paradigm is to implement efficient and high-quality smart services. It requires a protocol stack that offers different service requirements for inter-communication between different devices. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) are used as transport layer protocols in IoT to provide the quality of service needed in various IoT devices. IoT encounters many shortcomings of wireless networks, while also posing new challenges due to its uniqueness. When TCP is used in an IoT system, a variety of challenging issues have to be dealt with. This paper provides a comprehensive survey of various issues which arises due to the heterogeneous characteristics of IoT. We identify main issues such as Retransmission Timeout (RTO) algorithm issue, congestion and packet loss issue, header overhead, high latency issue, link layer interaction issue, etc. Moreover, we provide several most probable solutions to the above-mentioned issues in the case of IoT scenarios. RTO algorithm issue has been resolved by using algorithms such as CoCoA, CoCoA+, and CoCoA++. Apart from these, the high latency issue has been solved with the help of a long lived connection and TCP Fast open. Congestion and packet loss issue has been resolved by using several TCP variants such as TCP New Reno, Tahoe, Reno, Vegas, and Westwood.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"16 1","pages":"206-214"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81109562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming 基于MISO波束形成射频发射机的SDWSN高效能量采集技术
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/13
Subaselvi Sundarraj, Gunaseelan Konganathan
Software Defined Wireless Sensor Networks (SDWSN) is emerged to overcome the additional energy consumption in WSN. Even then the sensor nodes in the SDWSN suffer from scarce battery resources. Generally, the Radio Frequency (RF) transmitters are deployed around the base station in the SDWSN to overcome the high energy consumption problem. To enhance harvesting energy and coverage of nodes in the network, a new energy harvesting technique using RF transmitters with Multiple Input and Single Output (MISO) beamforming is proposed. In this method, multiple antenna RF transmitters and single antenna sensor nodes are deployed. The optimization problem subject to Signal to Noise Ratio (SNR) and energy harvesting constraints is formulated for hybrid beamforming design to reduce the transmit power in the network. The optimization problem based on convex Second Order Cone Programming (SOCP) is derived to get the optimal solution for hybrid beamforming design. The beamforming technique is used to steer the beam in the desired direction and null to the other direction improves the energy harvesting. The simulation results show that the proposed technique provides better average harvesting energy, average transmit power, average residual energy and throughput than the existing RF transmitter based energy harvesting methods.
软件定义无线传感器网络(SDWSN)的出现是为了克服无线传感器网络中额外的能量消耗。即使这样,SDWSN中的传感器节点也会受到电池资源稀缺的影响。为了克服SDWSN的高能耗问题,通常在基站周围部署射频发射机(RF)。为了提高能量收集和网络中节点的覆盖,提出了一种利用多输入单输出(MISO)波束形成的射频发射机能量收集新技术。在该方法中,部署了多个天线射频发射器和单个天线传感器节点。提出了基于信噪比和能量收集约束的混合波束形成优化问题,以降低网络发射功率。为了得到混合波束形成设计的最优解,推导了基于凸二阶锥规划的优化问题。采用波束形成技术将波束引导到期望的方向,而将波束引导到另一个方向,提高了能量的收集。仿真结果表明,与现有基于射频发射机的能量收集方法相比,该方法具有更好的平均收集能量、平均发射功率、平均剩余能量和吞吐量。
{"title":"A Novel Energy Efficient Harvesting Technique for SDWSN using RF Transmitters with MISO Beamforming","authors":"Subaselvi Sundarraj, Gunaseelan Konganathan","doi":"10.34028/iajit/20/1/13","DOIUrl":"https://doi.org/10.34028/iajit/20/1/13","url":null,"abstract":"Software Defined Wireless Sensor Networks (SDWSN) is emerged to overcome the additional energy consumption in WSN. Even then the sensor nodes in the SDWSN suffer from scarce battery resources. Generally, the Radio Frequency (RF) transmitters are deployed around the base station in the SDWSN to overcome the high energy consumption problem. To enhance harvesting energy and coverage of nodes in the network, a new energy harvesting technique using RF transmitters with Multiple Input and Single Output (MISO) beamforming is proposed. In this method, multiple antenna RF transmitters and single antenna sensor nodes are deployed. The optimization problem subject to Signal to Noise Ratio (SNR) and energy harvesting constraints is formulated for hybrid beamforming design to reduce the transmit power in the network. The optimization problem based on convex Second Order Cone Programming (SOCP) is derived to get the optimal solution for hybrid beamforming design. The beamforming technique is used to steer the beam in the desired direction and null to the other direction improves the energy harvesting. The simulation results show that the proposed technique provides better average harvesting energy, average transmit power, average residual energy and throughput than the existing RF transmitter based energy harvesting methods.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"167 ","pages":"125-133"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72555248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A method of extracting malware features based on gini impurity increment and improved TF-IDF 基于gini杂质增量和改进TF-IDF的恶意软件特征提取方法
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/3/14
Shimiao Sun, Yashu Liu
In recent years, the quantities and types of malwares have grown explosively, which bring many challenges to identify and detect them. In order to improve the identification efficiency of malicious code, a malicious code feature representation method based on feature dimension reduction is proposed. By fusing the Gini impurity increment and the Improved Term Frequency-Inverse Document Frequency algorithm (ITF-IDF), ΔGini-Improving Term frequency inverse document frequency (ΔGini-ITFIDF) method is presented, which can get more valuable assembly instruction features for family detection. ΔGini-ITFIDF standardizes the assembly instructions of the PE disassembly files, then, measures the two indicators of the expected error rate increment and weight of the malicious code assembly instruction features, and obtains more valuable features to identify malicious codes. The experimental results show that the classification accuracy of the ITF-IDF algorithm is significantly improved compared with the ITF-IDF algorithm. At the same time, ΔGini-ITFIDF can effectively improve the classification performance.
近年来,恶意软件的数量和类型呈爆炸式增长,这给恶意软件的识别和检测带来了许多挑战。为了提高恶意代码的识别效率,提出了一种基于特征降维的恶意代码特征表示方法。通过融合Gini杂质增量和改进的词频逆文档频率算法(ITF-IDF),提出了ΔGini-Improving词频逆文档频率(ΔGini-ITFIDF)方法,该方法可以获得更多有价值的汇编指令特征,用于家族检测。ΔGini-ITFIDF对PE反汇编文件的汇编指令进行标准化,然后对恶意代码汇编指令特征的期望错误率增量和权重两个指标进行度量,从而获得更多有价值的特征来识别恶意代码。实验结果表明,与ITF-IDF算法相比,ITF-IDF算法的分类精度有显著提高。同时,ΔGini-ITFIDF可以有效地提高分类性能。
{"title":"A method of extracting malware features based on gini impurity increment and improved TF-IDF","authors":"Shimiao Sun, Yashu Liu","doi":"10.34028/iajit/20/3/14","DOIUrl":"https://doi.org/10.34028/iajit/20/3/14","url":null,"abstract":"In recent years, the quantities and types of malwares have grown explosively, which bring many challenges to identify and detect them. In order to improve the identification efficiency of malicious code, a malicious code feature representation method based on feature dimension reduction is proposed. By fusing the Gini impurity increment and the Improved Term Frequency-Inverse Document Frequency algorithm (ITF-IDF), ΔGini-Improving Term frequency inverse document frequency (ΔGini-ITFIDF) method is presented, which can get more valuable assembly instruction features for family detection. ΔGini-ITFIDF standardizes the assembly instructions of the PE disassembly files, then, measures the two indicators of the expected error rate increment and weight of the malicious code assembly instruction features, and obtains more valuable features to identify malicious codes. The experimental results show that the classification accuracy of the ITF-IDF algorithm is significantly improved compared with the ITF-IDF algorithm. At the same time, ΔGini-ITFIDF can effectively improve the classification performance.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"48 1","pages":"419-427"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75584257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent recognition of gas-liquid two-phase flow based on optical image 基于光学图像的气液两相流智能识别
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/4/7
Shujuan Wang, Haofu Guan, Yuqing Wang, Kanghui Zhang, Yuntao Dai, S. Qiao
Gas-liquid two-phase flow is widely involved in many scientific and technological fields, such as energy, electricity, nuclear energy, aerospace and environmental protection. In some fields, extracting the accurate position of bubbles in space can not only accurately capture the characteristics of bubbles in two-phase flow, but also plays an important role in the subsequent research like bubble tracking. It has got some progresses to use Convolutional Neural Network (CNNs) to identify bubbles in gas-liquid two-phase flow, while accurate pixel segmentation map in the bubble identification problem is more desirable in many areas. In this paper, VGG16-FCN model and U-Net model are utilized to identify bubbles in two-phase flow images from the perspective of semantic segmentation. LabelMe is used to label the images in the experiment, which can remove the noise in the original image. In addition, bubble pixels with low ratio relative to the background affects the loss function value tinily which cause the irrational evaluation for the recognition in traditional semantic segmentation, thus, Dice loss is used as the loss function for training to improve the recognition effect. The research results show that the two deep learning models have strong feature extraction ability and accurately detect the bubble boundary.
气液两相流广泛涉及能源、电力、核能、航空航天、环保等诸多科技领域。在某些领域,准确提取气泡在空间中的位置不仅可以准确地捕捉两相流中气泡的特征,而且在气泡跟踪等后续研究中具有重要作用。利用卷积神经网络(cnn)识别气液两相流中的气泡已经取得了一定的进展,而在气泡识别问题中更需要精确的像素分割图。本文从语义分割的角度,利用VGG16-FCN模型和U-Net模型对两相流图像中的气泡进行识别。LabelMe用于对实验中的图像进行标记,可以去除原始图像中的噪声。此外,由于气泡像素相对于背景的比例较低,对损失函数值的影响较小,导致传统语义分割中对识别的评价不合理,因此采用Dice loss作为损失函数进行训练,提高识别效果。研究结果表明,两种深度学习模型具有较强的特征提取能力,能够准确检测气泡边界。
{"title":"Intelligent recognition of gas-liquid two-phase flow based on optical image","authors":"Shujuan Wang, Haofu Guan, Yuqing Wang, Kanghui Zhang, Yuntao Dai, S. Qiao","doi":"10.34028/iajit/20/4/7","DOIUrl":"https://doi.org/10.34028/iajit/20/4/7","url":null,"abstract":"Gas-liquid two-phase flow is widely involved in many scientific and technological fields, such as energy, electricity, nuclear energy, aerospace and environmental protection. In some fields, extracting the accurate position of bubbles in space can not only accurately capture the characteristics of bubbles in two-phase flow, but also plays an important role in the subsequent research like bubble tracking. It has got some progresses to use Convolutional Neural Network (CNNs) to identify bubbles in gas-liquid two-phase flow, while accurate pixel segmentation map in the bubble identification problem is more desirable in many areas. In this paper, VGG16-FCN model and U-Net model are utilized to identify bubbles in two-phase flow images from the perspective of semantic segmentation. LabelMe is used to label the images in the experiment, which can remove the noise in the original image. In addition, bubble pixels with low ratio relative to the background affects the loss function value tinily which cause the irrational evaluation for the recognition in traditional semantic segmentation, thus, Dice loss is used as the loss function for training to improve the recognition effect. The research results show that the two deep learning models have strong feature extraction ability and accurately detect the bubble boundary.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"263 1","pages":"609-617"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76772650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Highly accurate grey neural network classifier for an abdominal aortic aneurysm classification based on image processing approach 基于图像处理方法的腹主动脉瘤高精度灰色神经网络分类器
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/2/8
A. Bose, Vasuki Ramesh
An Abdominal Aorta Aneurysm (AAA) is an abnormal focal dilation of the aorta. Most un-ruptured AAAs are asymptomatic, which leads to the problem of having abdominal malignancy, kidney damage, heart attack and even death. As it is ominous, it requires an astute scrutinizing approach. The significance of this proposed work is to scrutinize the exact location of the ruptured region and to make astute report of the pathological condition of AAA by computing the Ruptured Potential Index (RPI). To determine these two factors, image processing is performed in the retrieved image of aneurysm. Initially, it undergoes a process to obtain a high-quality image by making use of Adaptive median filter. After retrieving high quality image, segmentation is carried out using Artificial Neural Network-based segmentation. After segmenting the image into samples, 12 features are extracted from the segmented image by Gray Level Co-Occurrence Matrix (GLCM), which assists in extracting the best feature out of it. This optimization is performed by using Particle Swarm Optimization (PSO). Finally, Grey Neural Network (GNN) classifier is applied to analogize the trained and test set data. This classifier helps to achieve the targeted objective with high accuracy.
腹主动脉动脉瘤(AAA)是一种异常局灶性扩张的主动脉。大多数未破裂的AAAs是无症状的,这可能导致腹部恶性肿瘤、肾脏损害、心脏病发作甚至死亡。由于这是一个不祥之兆,它需要一种敏锐的审视方法。这项工作的意义在于通过计算破裂电位指数(ruptured Potential Index, RPI)来精确地检查破裂区域的确切位置,并对AAA的病理状况做出准确的报告。为了确定这两个因素,对检索到的动脉瘤图像进行图像处理。首先,利用自适应中值滤波器获得高质量图像。在检索到高质量图像后,采用基于人工神经网络的分割方法进行分割。将图像分割成样本后,利用灰度共生矩阵(GLCM)从分割后的图像中提取12个特征,帮助提取最佳特征。该算法采用粒子群算法(PSO)进行优化。最后,利用灰色神经网络(GNN)分类器对训练集和测试集数据进行模拟。该分类器有助于以较高的准确率实现目标。
{"title":"Highly accurate grey neural network classifier for an abdominal aortic aneurysm classification based on image processing approach","authors":"A. Bose, Vasuki Ramesh","doi":"10.34028/iajit/20/2/8","DOIUrl":"https://doi.org/10.34028/iajit/20/2/8","url":null,"abstract":"An Abdominal Aorta Aneurysm (AAA) is an abnormal focal dilation of the aorta. Most un-ruptured AAAs are asymptomatic, which leads to the problem of having abdominal malignancy, kidney damage, heart attack and even death. As it is ominous, it requires an astute scrutinizing approach. The significance of this proposed work is to scrutinize the exact location of the ruptured region and to make astute report of the pathological condition of AAA by computing the Ruptured Potential Index (RPI). To determine these two factors, image processing is performed in the retrieved image of aneurysm. Initially, it undergoes a process to obtain a high-quality image by making use of Adaptive median filter. After retrieving high quality image, segmentation is carried out using Artificial Neural Network-based segmentation. After segmenting the image into samples, 12 features are extracted from the segmented image by Gray Level Co-Occurrence Matrix (GLCM), which assists in extracting the best feature out of it. This optimization is performed by using Particle Swarm Optimization (PSO). Finally, Grey Neural Network (GNN) classifier is applied to analogize the trained and test set data. This classifier helps to achieve the targeted objective with high accuracy.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"112 1","pages":"215-223"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79666666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining android bytecodes through the eyes of gabor filters for detecting malware 通过gabor过滤器的眼睛挖掘android字节码来检测恶意软件
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/2/4
Shahid Alam, A. K. Demir
One of the basic characteristics of a Gabor filter is that it provides useful information about specific frequencies in a localized region. Such information can be used in locating snippets of code, i.e., localized code, in a program when transformed into an image for finding embedded malicious patterns. Keeping this phenomenon, we propose a novel technique using a sliding Window over Gabor filters for mining the Dalvik Executable (DEX) bytecodes of an Android application (APK) to find malicious patterns. We extract the structural and behavioral functionality and localized information of an APK through Gabor filtered images of the 2D grayscale image of the DEX bytecodes. A Window is slid over these features and a weight is assigned based on its frequency of use. The selected Windows whose weights are greater than a given threshold, are used for training a classifier to detect malware APKs. Our technique does not require any disassembly or execution of the malware program and hence is much safer and more accurate. To further improve feature selection, we apply a greedy optimization algorithm to find the best performing feature subset. The proposed technique, when tested using real malware and benign APKs, obtained a detection rate of 98.9% with 10-fold cross-validation.
Gabor滤波器的一个基本特性是它能提供局部区域内特定频率的有用信息。当转换成图像以查找嵌入的恶意模式时,这些信息可用于定位程序中的代码片段,即本地化代码。为了保持这种现象,我们提出了一种新的技术,使用Gabor过滤器上的滑动窗口来挖掘Android应用程序(APK)的Dalvik可执行文件(DEX)字节码来发现恶意模式。通过对DEX字节码的二维灰度图像进行Gabor滤波,提取APK的结构、行为功能和定位信息。在这些特征上滑动一个窗口,并根据其使用频率分配权重。选择权重大于给定阈值的Windows,用于训练分类器来检测恶意软件apk。我们的技术不需要任何反汇编或执行恶意软件程序,因此更安全,更准确。为了进一步改进特征选择,我们采用贪婪优化算法来寻找性能最好的特征子集。当使用真实恶意软件和良性apk进行测试时,该技术通过10倍交叉验证获得了98.9%的检测率。
{"title":"Mining android bytecodes through the eyes of gabor filters for detecting malware","authors":"Shahid Alam, A. K. Demir","doi":"10.34028/iajit/20/2/4","DOIUrl":"https://doi.org/10.34028/iajit/20/2/4","url":null,"abstract":"One of the basic characteristics of a Gabor filter is that it provides useful information about specific frequencies in a localized region. Such information can be used in locating snippets of code, i.e., localized code, in a program when transformed into an image for finding embedded malicious patterns. Keeping this phenomenon, we propose a novel technique using a sliding Window over Gabor filters for mining the Dalvik Executable (DEX) bytecodes of an Android application (APK) to find malicious patterns. We extract the structural and behavioral functionality and localized information of an APK through Gabor filtered images of the 2D grayscale image of the DEX bytecodes. A Window is slid over these features and a weight is assigned based on its frequency of use. The selected Windows whose weights are greater than a given threshold, are used for training a classifier to detect malware APKs. Our technique does not require any disassembly or execution of the malware program and hence is much safer and more accurate. To further improve feature selection, we apply a greedy optimization algorithm to find the best performing feature subset. The proposed technique, when tested using real malware and benign APKs, obtained a detection rate of 98.9% with 10-fold cross-validation.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"33 1","pages":"180-189"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80422811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Genetic algorithm with random and memory immigrant strategies for solving dynamic load balanced clustering problem in wireless sensor networks 基于随机和记忆迁移策略的遗传算法求解无线传感器网络中的动态负载均衡聚类问题
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/4/3
Mohaideen Pitchai
In Wireless Sensor Networks (WSNs), clustering is an effective method to distribute the load equally among all the nodes as compared to flat network architecture. Due to the dynamic nature of the network, the clustering process can be viewed as a dynamic optimization problem and the conventional computational intelligence techniques are not enough to solve these problems. The Dynamic Genetic Algorithm (DGA) addresses these problems with the help of searching optimal solutions in new environments. Therefore the dynamic load-balanced clustering process is modeled using the basic components of standard genetic algorithm and then the model is enhanced is using immigrants and memory-based schemes to elect suitable cluster heads. The metrics nodes’ residual energy level, node centrality, and mobility speed of the nodes are considered to elect the load-balanced cluster heads and the optimal number of cluster members are assigned to each cluster head using the proposed DGA schemes such as Random Immigrants Genetic Approach (RIGA), Memory Immigrants Genetic Approach (MIGA), and Memory and Random Immigrants Genetic Approach (MRIGA). The simulation results show that the proposed DGA scheme MRIGA outperforms well as compared with RIGA and MIGA in terms of various performance metrics such as the number of nodes alive, residual energy level, packet delivery ratio, end-to-end delay, and overhead for the formation of clusters.
在无线传感器网络(WSNs)中,与平面网络结构相比,聚类是一种有效的将负载平均分配给所有节点的方法。由于网络的动态性,聚类过程可以看作是一个动态优化问题,传统的计算智能技术不足以解决这些问题。动态遗传算法(DGA)通过在新环境中寻找最优解来解决这些问题。因此,采用标准遗传算法的基本组件对动态负载均衡聚类过程进行建模,然后采用基于迁移和基于内存的方案对模型进行增强,以选择合适的簇头。采用随机移民遗传方法(RIGA)、内存移民遗传方法(MIGA)和内存和随机移民遗传方法(MRIGA),根据节点的剩余能量水平、节点的中心性和节点的移动速度来选择负载均衡的簇头,并为每个簇头分配最优的簇成员数量。仿真结果表明,与RIGA和MIGA方案相比,MRIGA方案在存活节点数、剩余能量水平、分组投递率、端到端延迟和集群形成开销等性能指标上都有较好的表现。
{"title":"Genetic algorithm with random and memory immigrant strategies for solving dynamic load balanced clustering problem in wireless sensor networks","authors":"Mohaideen Pitchai","doi":"10.34028/iajit/20/4/3","DOIUrl":"https://doi.org/10.34028/iajit/20/4/3","url":null,"abstract":"In Wireless Sensor Networks (WSNs), clustering is an effective method to distribute the load equally among all the nodes as compared to flat network architecture. Due to the dynamic nature of the network, the clustering process can be viewed as a dynamic optimization problem and the conventional computational intelligence techniques are not enough to solve these problems. The Dynamic Genetic Algorithm (DGA) addresses these problems with the help of searching optimal solutions in new environments. Therefore the dynamic load-balanced clustering process is modeled using the basic components of standard genetic algorithm and then the model is enhanced is using immigrants and memory-based schemes to elect suitable cluster heads. The metrics nodes’ residual energy level, node centrality, and mobility speed of the nodes are considered to elect the load-balanced cluster heads and the optimal number of cluster members are assigned to each cluster head using the proposed DGA schemes such as Random Immigrants Genetic Approach (RIGA), Memory Immigrants Genetic Approach (MIGA), and Memory and Random Immigrants Genetic Approach (MRIGA). The simulation results show that the proposed DGA scheme MRIGA outperforms well as compared with RIGA and MIGA in terms of various performance metrics such as the number of nodes alive, residual energy level, packet delivery ratio, end-to-end delay, and overhead for the formation of clusters.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"11 19 1","pages":"575-583"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87226218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retina disorders classification via OCT scan: a comparative study between self-supervised learning and transfer learning 视网膜疾病OCT扫描分类:自监督学习与迁移学习的比较研究
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/3/8
Saeed Shurrab, Yazan Shannak, R. Duwairi
Retina disorders are among the common types of eye disease that occur due to several reasons such as aging, diabetes and premature born. Besides, Optical Coherence Tomography (OCT) is a medical imaging method that serves as a vehicle for capturing volumetric scans of the human eye retina for diagnoses purposes. This research compared two pretraining approaches including Self-Supervised Learning (SSL) and Transfer Learning (TL) to train ResNet34 neural architecture aiming at building computer aided diagnoses tool for retina disorders recognition. In addition, the research methodology employs convolutional auto-encoder model as a generative SSL pretraining method. The research efforts are implemented on a dataset that contains 109,309 retina OCT images with three medical conditions including Choroidal Neovascularization (CNV), Diabetic Macular Edema (DME), DRUSEN as well as NORMAL condition. The research outcomes showed better performance in terms of overall accuracy, sensitivity and specificity, namely, 95.2%, 95.2% and 98.4% respectively for SSL ResNet34 in comparison to scores of 90.7%, 90.7% and 96.9% respectively for TL ResNet34. In addition, SSL pretraining approach showed significant reduction in the number of epochs required for training in comparison to both TL pretraining as well as the previous research performed on the same dataset with comparable performance.
视网膜疾病是由衰老、糖尿病和早产等多种原因引起的常见眼病之一。此外,光学相干断层扫描(OCT)是一种医学成像方法,可作为捕获人眼视网膜的体积扫描以用于诊断目的的工具。本研究比较了自监督学习(Self-Supervised Learning, SSL)和迁移学习(Transfer Learning, TL)两种预训练方法来训练ResNet34神经结构,旨在构建视网膜疾病识别的计算机辅助诊断工具。此外,研究方法采用卷积自编码器模型作为生成式SSL预训练方法。研究工作是在包含109,309张视网膜OCT图像的数据集上实施的,这些图像具有三种医疗条件,包括脉络膜新生血管(CNV)、糖尿病性黄斑水肿(DME)、DRUSEN以及正常状态。研究结果显示,SSL ResNet34的总体准确性、敏感性和特异性分别为95.2%、95.2%和98.4%,而TL ResNet34的总体准确性、敏感性和特异性分别为90.7%、90.7%和96.9%。此外,与TL预训练和之前在相同数据集上进行的研究相比,SSL预训练方法显示出训练所需的epoch数量显著减少。
{"title":"Retina disorders classification via OCT scan: a comparative study between self-supervised learning and transfer learning","authors":"Saeed Shurrab, Yazan Shannak, R. Duwairi","doi":"10.34028/iajit/20/3/8","DOIUrl":"https://doi.org/10.34028/iajit/20/3/8","url":null,"abstract":"Retina disorders are among the common types of eye disease that occur due to several reasons such as aging, diabetes and premature born. Besides, Optical Coherence Tomography (OCT) is a medical imaging method that serves as a vehicle for capturing volumetric scans of the human eye retina for diagnoses purposes. This research compared two pretraining approaches including Self-Supervised Learning (SSL) and Transfer Learning (TL) to train ResNet34 neural architecture aiming at building computer aided diagnoses tool for retina disorders recognition. In addition, the research methodology employs convolutional auto-encoder model as a generative SSL pretraining method. The research efforts are implemented on a dataset that contains 109,309 retina OCT images with three medical conditions including Choroidal Neovascularization (CNV), Diabetic Macular Edema (DME), DRUSEN as well as NORMAL condition. The research outcomes showed better performance in terms of overall accuracy, sensitivity and specificity, namely, 95.2%, 95.2% and 98.4% respectively for SSL ResNet34 in comparison to scores of 90.7%, 90.7% and 96.9% respectively for TL ResNet34. In addition, SSL pretraining approach showed significant reduction in the number of epochs required for training in comparison to both TL pretraining as well as the previous research performed on the same dataset with comparable performance.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"28 1","pages":"357-367"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84319388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets 基于遗传算法的灾难主题文本推文分类领域自适应框架
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/1/7
Lokabhiram Dwarakanath, A. Kamsin, Liyana Shuib
The ability to post short text and media messages on Social media platforms like Twitter, Facebook, etc., plays a huge role in the exchange of information following a mass emergency event like hurricane, earthquake, tsunami etc. Disaster victims, families, and other relief operation teams utilize social media to help and support one another. Despite the benefits offered by these communication media, the disaster topic related posts (posts that indicate conversations about the disaster event in the aftermath of the disaster) gets lost in the deluge of posts since there would be a surge in the amount of data that gets exchanged following a mass emergency event. This hampers the emergency relief effort, which in turn affects the delivery of useful information to the disaster victims. Research in emergency coordination via social media has received growing interest in recent years, mainly focusing on developing machine learning-based models that can separate disaster-related topic posts from non-disaster related topic posts. Of these, supervised machine learning approaches performed well when the machine learning model trained using source disaster dataset and target disaster dataset are similar. However, in the real world, it may not be feasible as different disasters have different characteristics. So, models developed using supervised machine learning approaches do not perform well in unseen disaster datasets. Therefore, domain adaptation approaches, which address the above limitation by learning classifiers from unlabeled target data in addition to source labelled data, represent a promising direction for social media crisis data classification tasks. The existing domain adaptation techniques for the classification of disaster tweets are experimented with using single disaster event dataset pairs; then, self-training is performed on the source target dataset pairs by considering the highly confident instances in subsequent iterations of training. This could be improved with better feature engineering. Thus, this research proposes a Genetic Algorithm based Domain Adaptation Framework (GADA) for the classification of disaster tweets. The proposed GADA combines the power of 1) Hybrid Feature Selection component using the Genetic Algorithm and Chi-Square Feature Evaluator for feature selection and 2) the Classifier component using Random Forest to classify disaster-related posts from noise on Twitter. The proposed framework addresses the challenge of the lack of labeled data in the target disaster event by proposing a Genetic Algorithm based approach. Experimental results on Twitter datasets corresponding to four disaster domain pair shows that the proposed framework improves the overall performance of the previous supervised approaches and significantly reduces the training time over the previous domain adaptation techniques that do not use the Genetic Algorithm (GA) for feature selection.
在Twitter、Facebook等社交媒体平台上发布短文本和媒体信息的能力,在飓风、地震、海啸等大规模紧急事件后的信息交流中发挥了巨大作用。灾难受害者、家属和其他救援团队利用社交媒体互相帮助和支持。尽管这些通信媒体提供了好处,但与灾难主题相关的帖子(表明灾难发生后关于灾难事件的对话的帖子)会在大量帖子中丢失,因为在大规模紧急事件发生后交换的数据量会激增。这妨碍了紧急救济工作,而紧急救济工作又影响了向灾民提供有用信息的工作。近年来,通过社交媒体进行应急协调的研究日益受到关注,主要侧重于开发基于机器学习的模型,将与灾害有关的主题帖子与与灾害无关的主题帖子区分开来。其中,当使用源灾难数据集和目标灾难数据集训练的机器学习模型相似时,监督机器学习方法表现良好。然而,在现实世界中,由于不同的灾害具有不同的特征,这可能并不可行。因此,使用监督机器学习方法开发的模型在看不见的灾难数据集中表现不佳。因此,除了源标记数据之外,领域自适应方法通过从未标记的目标数据中学习分类器来解决上述限制,代表了社交媒体危机数据分类任务的一个有希望的方向。利用单灾难事件数据对,对现有的灾难推文分类领域自适应技术进行了实验;然后,通过考虑后续训练迭代中的高置信度实例,对源目标数据集对进行自训练。这可以通过更好的特征工程来改进。因此,本研究提出了一种基于遗传算法的领域自适应框架(GADA)用于灾难推文分类。提出的GADA结合了1)使用遗传算法和卡方特征评估器进行特征选择的混合特征选择组件和2)使用随机森林对Twitter上与灾害相关的帖子进行噪声分类的分类器组件的功能。该框架通过提出一种基于遗传算法的方法,解决了目标灾害事件中缺乏标记数据的挑战。在4个灾难域对对应的Twitter数据集上进行的实验结果表明,所提出的框架提高了先前监督方法的整体性能,并且与先前不使用遗传算法(GA)进行特征选择的域自适应技术相比,显著减少了训练时间。
{"title":"A Genetic Algorithm based Domain Adaptation Framework for Classification of Disaster Topic Text Tweets","authors":"Lokabhiram Dwarakanath, A. Kamsin, Liyana Shuib","doi":"10.34028/iajit/20/1/7","DOIUrl":"https://doi.org/10.34028/iajit/20/1/7","url":null,"abstract":"The ability to post short text and media messages on Social media platforms like Twitter, Facebook, etc., plays a huge role in the exchange of information following a mass emergency event like hurricane, earthquake, tsunami etc. Disaster victims, families, and other relief operation teams utilize social media to help and support one another. Despite the benefits offered by these communication media, the disaster topic related posts (posts that indicate conversations about the disaster event in the aftermath of the disaster) gets lost in the deluge of posts since there would be a surge in the amount of data that gets exchanged following a mass emergency event. This hampers the emergency relief effort, which in turn affects the delivery of useful information to the disaster victims. Research in emergency coordination via social media has received growing interest in recent years, mainly focusing on developing machine learning-based models that can separate disaster-related topic posts from non-disaster related topic posts. Of these, supervised machine learning approaches performed well when the machine learning model trained using source disaster dataset and target disaster dataset are similar. However, in the real world, it may not be feasible as different disasters have different characteristics. So, models developed using supervised machine learning approaches do not perform well in unseen disaster datasets. Therefore, domain adaptation approaches, which address the above limitation by learning classifiers from unlabeled target data in addition to source labelled data, represent a promising direction for social media crisis data classification tasks. The existing domain adaptation techniques for the classification of disaster tweets are experimented with using single disaster event dataset pairs; then, self-training is performed on the source target dataset pairs by considering the highly confident instances in subsequent iterations of training. This could be improved with better feature engineering. Thus, this research proposes a Genetic Algorithm based Domain Adaptation Framework (GADA) for the classification of disaster tweets. The proposed GADA combines the power of 1) Hybrid Feature Selection component using the Genetic Algorithm and Chi-Square Feature Evaluator for feature selection and 2) the Classifier component using Random Forest to classify disaster-related posts from noise on Twitter. The proposed framework addresses the challenge of the lack of labeled data in the target disaster event by proposing a Genetic Algorithm based approach. Experimental results on Twitter datasets corresponding to four disaster domain pair shows that the proposed framework improves the overall performance of the previous supervised approaches and significantly reduces the training time over the previous domain adaptation techniques that do not use the Genetic Algorithm (GA) for feature selection.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"53 1","pages":"57-65"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91358427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. Arab J. Inf. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1